• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

31782 Courses delivered Online

Google Cloud Fundamentals - Core Infrastructure

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Individuals planning to deploy applications and create application environments on Google Cloud. Developers, systems operations professionals, and solution architects getting started with Google Cloud. Executives and business decision makers evaluating the potential of Google Cloud to address their business needs. Overview Identify the purpose and value of Google Cloud products and services. Interact with Google Cloud services. Describe ways in which customers have used Google Cloud. Choose among and use application deployment environments on Google Cloud: App Engine, Google Kubernetes Engine, and Compute Engine. Choose among and use Google Cloud storage options: Cloud Storage, Cloud SQL, Cloud Bigtable, and Firestore. Make basic use of BigQuery, Google's managed data warehouse for analytics. This course uses lectures, demos, and hands-on labs to give you an overview of Google Cloud products and services so that you can learn the value of Google Cloud and how to incorporate cloud-based solutions into your business strategies. Introducing Google Cloud Platform Explain the advantages of Google Cloud Platform. Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). Getting Started with Google Cloud Platform Identify the purpose of projects on Google Cloud Platform. Understand the purpose of and use cases for Identity and Access Management. List the methods of interacting with Google Cloud Platform. Lab: Getting Started with Google Cloud Platform. Google Compute Engine and Networking Identify the purpose of and use cases for Google Compute Engine. Understand the basics of networking in Google Cloud Platform. Lab: Deploying Applications Using Google Compute Engine. Google Cloud Platform Storage Options Understand the purpose of and use cases for: Google Cloud Storage, Google Cloud SQL, and Google Cloud Bigtable. Learn how to choose between the various storage options on Google Cloud Platform. Lab: Integrating Applications with Google Cloud Storage. Google Container Engine Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Introduction to Hybrid and Multi-Cloud computing (Anthos). Lab: Deploying Applications Using Google Container Engine. Google App Engine and Google Cloud Datastore Understand the purpose of and use cases for Google App Engine and Google Cloud Datastore. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand the purpose of and use cases for Google Cloud Endpoints. Lab: Deploying Applications Using App Engine and Cloud Datastore. Deployment and Monitoring Understand the purpose of template-based creation and management of resources. Understand the purpose of integrated monitoring, alerting, and debugging. Lab: Getting Started with Stackdriver and Deployment Manager. Big Data and Machine Learning Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Lab: Getting Started with BigQuery. Summary and Review Summary and Review. What's Next?.

Google Cloud Fundamentals - Core Infrastructure
Delivered OnlineFlexible Dates
Price on Enquiry

BA17 - Problem Determination Root Cause Analysis (RCA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to: Identify the different types of tools and techniques available Apply change management successfully Review what to look for when applying business case thinking to Root Cause Analysis Develop a process to systematically approach problems Business success is dependent on effective resolution of the problems that present themselves every day. Often the same or similar problems continue causing repeated losses in time or money and your staff become experts at fixing rather than preventing the problems. Learn to find and fix root causes and develop corrective actions that will effectively eliminate or control these problems. Section 1: RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? What is Root Cause? RCA Benefits and Approaches Event and Casual Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Section Summary and Conclusions Section 2: Enhance use of RCA tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Tool: Cause and Effect Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Tool: Design / Application Review Section 3: Problem Resolution and Prevention Section Objectives The Secret of Solving Problems: -A Note about Statistical Control -A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN): -What is Business Process Modeling Notation (BPMN)? -Benefits of BPMN -Basic Components of BPMN Technique: Business Process Maturity Model Five Levels of Maturity Section 4: Capability Improvement for RCA Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? -Awareness of the need for change -Desire to participate and support the change -Knowledge on how to change -Ability to implement required skills and behaviors -Reinforcement to sustain the change The ADKAR Model: Reinforcement Section 5: Course Summary and Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Resource Guide Questions

BA17 - Problem Determination Root Cause Analysis (RCA)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Security Governance at Scale

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Governance at Scale
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introduction to SD-Access and DNA Center (SDAINT)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows:Anyone interested in knowing about DNA Center and SD-AccessPersonnel involved in SD-Access Design and ImplementationNetwork Operations team with SD-Access solutionNetwork admin staff that deal with User AccessChannel Partner SEs and other sales supportNetwork Access Control administrationNetwork AdministratorsNetwork ArchitectsNetwork Engineers Overview Upon completing this course, the learner will be able to meet these overall objectives:Know and understand Cisco?s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today?s networks.Differentiate and explain each of the building blocks of SD-Access SolutionExplain the concept of ?Fabric? and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access SolutionUnderstand the role of DNA Center as solution orchestrator and Intelligent GUIBe familiar with workflow approach in DNA Center and its 4 Steps: Design, Policy, Provision and Assurance DNA Center and SD-Access offer Cisco?s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Introduction to Cisco?s Software Defined Access (SD-Access) SD-Access Overview SD-Access Benefits SD-Access Key Concepts SD-Access Main Components SD-Access Campus Fabric The concept of Fabric Node types Fabric Edge Nodes Control Plane Nodes Border Nodes LISP as protocol for Control Plane VXLAN as protocol for Data Plane Concept of Virtual Network Fabric-enabled WLAN DNA Center and Workflow for SD-Access Introduction to DNA Center Workflow for SD-Access in DNA Center Integration with Cisco ISE for Policy Enforcement Integration with Cisco NDP for Analytics and Assurance Relationship with APIC-EM controller DNA Center Workflow First Step - Design Creating Enterprise and Sites Hierarchy Discuss and Demonstrate General Network Settings Loading maps into the GUI IP Address Administration Administering Software Images Network Device Profiles DNA Center Workflow Second Step - Policy 2-level Hierarchy Policy Types ISE Integration with DNA Center Cross Domain Policies DNA Center Workflow Third Step - Provision Devices Onboarding Fabric Domains Adding Nodes DNA Center Workflow Fourth Step ? Assurance Introduction to Analytics NDP Fundamentals Overview of DNA Assurance Components of DNA Assurance DNA Center Assurance Dashboard Implementing WLAN in SD-Access Solution WLAN Integration Strategies in SD-Access Fabric SD-Access Wireless Architecture Sample Design for SD-Access Wireless Campus Fabric External Connectivity for SD-Access Enterprise Sample Topology for SD-Access Role of Border Nodes Types of Border Nodes Single Border vs. Multiple Border Designs Collocated Border and Control Plane Nodes Distributed (separated) Border and Control Plane Nodes

Cisco Introduction to SD-Access and DNA Center (SDAINT)
Delivered OnlineFlexible Dates
Price on Enquiry

BIT100 SAP NetWeaver Integration Technology Overview

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is primarily for Developers, Developer Consultants, Help Desk/COE Support, Program/Project Manager, System Administrators, System Architects, and Technology Consultants. Overview Explaining scenarios and processes in SAP NetWeaver process integrationIdentify the technical communications modes and processesExplain business scenarios and the business hierarchy used by SAP In this course, students learn how to explain scenarios & processes in SAP NetWeaver process integration. They learn how to identify the technical communications modes & processes, as well as explain business scenarios & the business hierarchy used by SAP. Integration Basics Explaining Scenarios and Processes in SAP NetWeaver Process Integration Explaining Technical Communication Modes and Processes Explaining Business Scenarios Classical System-to-System Communication Communicating Between Two SAP Systems Communicating Between Two Non-SAP Systems Communicating Using Business Application Programming Interfaces (BAPIs) Communicating Using IDocs Processing IDocs Web Services Processing HTTP Requests Describing Simple Object Access Protocol (SOAP) Basics Analyzing Different Web Services Describing Inside-Out and Outside-In Web Services Explaining Service Oriented Architecture (SOA) Integration Technologies: On-Premise Process Integration (Design Time) Processing Integration Middleware Tools (PI Dual Stack) Installing Dual-Stack or Single-Stack Options Securing Objects Creating PI Objects Explaining Design Objects Modeling PI Scenarios Creating an Integration Scenario Configuring an Integration Scenario Displaying the Configuration Objects in the Integration Directory Integration Technologies: On-Premise Process Integration (Runtime) Connecting SAP NetWeaver PI with Proxies Creating File Adapters Executing Configuration Objects Monitoring Tools Integration Technologies: On-Premise Process Orchestration (PO) Explaining Business Process Management (BPM) Explaining Process Orchestration (PO) Explaining Advanced Adapter Engine Extended (AEX) Explaining Business Rules Management (BRM) Integration Technologies: On Demand Explaining SAP HANA Cloud Integration (HCI) Describing Eclipse-Based Access Using the Web UI to Access HCI SAP NetWeaver Gateway Explaining the SAP NetWeaver Gateway Scenario Explaining the SAP NetWeaver Gateway Development View Accessing an Open Data (OData) Service Additional course details: Nexus Humans BIT100 SAP NetWeaver Integration Technology Overview training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT100 SAP NetWeaver Integration Technology Overview course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BIT100 SAP NetWeaver Integration Technology Overview
Delivered OnlineFlexible Dates
Price on Enquiry

IBM Sterling B2B Integrator Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Consultants, Support, System Administrators Overview Upon completion of the course, students will be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course teaches students techniques, tools, and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. About IBM Sterling B2B Integrator High level overview of the Admin Console with an exercise to start the application XML and XPath Basics Review the basics of XML and XPath which is heavily used in the application Basic Business Process Concepts Reviewing what XML and XPath components are used to build business processes Reviewing how to manually execute a business process within the application Tracking and Troubleshooting Business Processes Exercises to demonstrate how to work with business process instances Graphical Process Modeler (GPM) Overview of the Graphical Process Modeler Exercises to walk through the development of a business process in the GPM Exercises for checking in, executing, and modifying business processes Introduction to Service Management Several exercises showcasing specific services/adapters and other functionality Best Practices Covers specific business process development methods that are best practice Mapping Introduction to the Map Editor and Standards Exercises to build and use an XML Encoder Map Typing Map Exercises to build and use a Typing Map Case Study Exercise to build an end-to-end solution using what was learned in previous exercises Tracking System Health Review of archiving, migrating, and deleting business processes Additional course details: Nexus Humans IBM Sterling B2B Integrator Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IBM Sterling B2B Integrator Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IBM Sterling B2B Integrator Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

Formatting Technical Documents Using Microsoft for Office 365

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for individuals who want to gain an indepth knowledge of formatting documents using Word. Overview Upon successful completion of this course, students will be able to create and modify documents by using Microsoft Office Word 2016/365/2019. In this course, students will create, edit, and enhance technical documents using Microsoft Office Word 2016/365/2019. Formatting Text and Paragraphs Apply Character Formatting Control Paragraph Layout Aligh Text Using Tabs Display Text in Bulleted or Numbered Lists Working More Efficiently Make Repetitive Edits Apply Repetitive Formatting Use Styles to Streamline Repetitive Formatting Tasks Customize the Word Environment Managing Lists Sort a List Format a List Adding Tables Insert a Table Modify a Table Format a Table Inserting Graphic Objects Insert Symbols and Special Characters Add Images to a Document Controlling Page Appearance Add Headers and Footers Control Page Layout Add a Watermark Preparing to Publish Check Spelling, Grammar, and Readability Previw and Print Documents Use Research Tools Customizing Formats Using Styles and Themes Create and Modify Text Styles Cerate Custom List or Table Styles Apply Document Themes Inserting Content Using Quick Parts Insert Building Blocks Create and Modify building Blocks Insert Fields Using Quick Parts Using Templates to Automate Document Formatting Create a Document Using a Template Create and Modify a Template Manage Templates with the Template Organizer Controlling the Flow of a Document Control Paragrpah Flow Insert Section Breaks Insert Columns Managing Long Documents Insert Blank and Cover Pages Insert an Index Insert a Table of Contents Insert an Anchillary Table Manage Outlines Create a Master Document Manipulating Images Integrate Pictures and Text Adjust Image Appearance Adding Document References and Links Add Captions Add Cross-References Add Bookmarks Add Hyperlinks Insert Footnotes and Endnotes Add Citations and a Bibilography Additional course details: Nexus Humans Formatting Technical Documents Using Microsoft for Office 365 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Formatting Technical Documents Using Microsoft for Office 365 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Formatting Technical Documents Using Microsoft for Office 365
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Collaboration Foundations v1.1 (CLFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students preparing to take the CCNP Collaboration certification Network administrators Network engineers Systems engineers Overview After taking this course, you should be able to: - Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model - Configure and modify required parameters in Cisco Unified Communications Manager (CM) including service activation, enterprise parameters, CM groups, time settings, and device pool - Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM - Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup - Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP]) including the role/group, service profile, UC service, and credential policy - Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transforms, SIP Trunks, and SIP Route Patterns - Configure Class of Control on Cisco Unified CM to control which devices and lines have access to services - Configure Cisco Unified CM for Cisco Jabber and implement common endpoint features including call park, softkeys, shared lines, and pickup groups - Deploy a simple SIP dial plan on a Cisco Integrated Service Routers (ISR) gateway to enable access to the PSTN network - Manage Cisco UCM access to media resources available within Cisco UCM and Cisco ISR gateways - Describe tools for reporting and maintenance including Unified Reports, Cisco Real-Time Monitoring Tool (RTMT), Disaster Recovery System (DRS), and Call Detail Records (CDRs) within Cisco Unified CM - Describe additional considerations for deploying video endpoints in Cisco Unified CM - Describe the integration of Cisco Unity with Cisco Unified CM and the default call handler The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco© Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. The course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. Course Outline Exploring The Path To Collaboration Introducing Cisco Unified Communications Manager And Initial Parameters Xploring Endpoints And The Registration Process Exploring Codecs And Call Signaling Managing Users In Cisco Unified Communication Manager Describing A Basic Dial Plan Describing Class Of Service Enabling Endpoints And Features Describing The Cisco Isr As A Voice Gateway Exploring Cisco Unified Communication Manager Media Resources Reporting And Maintenance Exploring Additional Requirements For Video Endpoints Describing Cisco Unity Connection

Cisco Understanding Cisco Collaboration Foundations v1.1 (CLFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Deployment Solution 7.5 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for system administrators or anyone who will be installing, configuring, and managing a Deployment Solution system. Overview This course includes practical exercises using your own network by means of virtual computers enabling you to learn and fine tune the skills required to be successful in your working environment. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Deployment Solution Overview Symantec software overview Symantec Management Platform overview Installing Deployment Solution and pcAnywhere Installation prerequisites Installing the Symantec Installation Manager Installing Deployment Solution Installing agents and plug-ins Upgrading Deployment Solution Deployment Solution Console Fundamentals Console fundamentals Creating and managing Jobs and Tasks Scheduling Jobs and Tasks Monitoring Jobs and Tasks Searching for Jobs, Tasks, and computers Configuring Deployment Solution Adding configuration files and keys Symantec Network Boot Service Preboot configurations Configuring Network Boot Service (PXE/BSDP) Driver database management Preparing a Computer for Imaging Including agents and plug-ins Installing Software Installing software updates and service packs Creating Images Imaging Tools and Types About Prepare for Image capture tasks Creating Images PC Transplant with Deployment Solution PC Transplant overview Creating a PCT template file PC Transplant tasks Editing Personality Packages Building and editing A2i files Deploying Operating Systems & Performing Computer Migrations Deploying Images & Performing Computer Migrations Deploying computer images Unicast and multicast imaging Advanced options when deploying images Changing a computer?s system configuration Initial Deployment imaging Imaging predefined computers Disk preparations Performing scripted OS installations Jobs to migrate computers Installing and Using Deployment Site Servers Understanding Sites and Site Servers Understanding & Installing Deployment Site Server Components Image Management Advanced Features Using job conditions Custom Ghost imaging and Ghost tools Editing image files Creating bootable media Remote control with pcAnywhere Solution About pcAnywhere Solution Installing Symantec pcAnywhere Solution and plug-in Starting a pcAnywhere session Managing a pcAnywhere session Configuring pcAnywhere settings Additional course details: Nexus Humans Symantec Deployment Solution 7.5 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Deployment Solution 7.5 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Deployment Solution 7.5 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Endpoint Protection 12.X - Manage And Administer

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Endpoint Protection 12.X - Manage And Administer
Delivered OnlineFlexible Dates
Price on Enquiry