• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

53586 Courses delivered Online

C)ISSM - Certified Information Systems Security Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSM - Certified Information Systems Security Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

C)CSA: Cybersecurity Analyst Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)CSA: Cybersecurity Analyst Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Business Writing that Works

By Nexus Human

Duration 1 Days 6 CPD hours Overview In writing, it is important to make sure your message is easy to understand, that you have included all the necessary information, and that the points are expressed clearly. In business writing, it is also essential to convey information in a professional and courteous manner using proper formatting. Learn how to perfect your business writing in this one-day workshop. This one-day workshop will help you teach participants how to: Write and proofread your work so it is clear, concise, complete, and correct. Apply these skills in real world situations. Use language that is courteous. Understand the proper format for memos, letters, and emails. Determine whether your writing can be easily understood by your intended audience. Learn how to perfect your business writing in this one-day workshop.While there are many types of business writing, this workshop will provide tools to write effective memos, emails, and letters, as well as briefly touch on reports and proposals. The 4 C?s: Clear, Concise, Complete, and Correct Good writing must be clear, concise, complete, and correct. In this session, learn how to write with these principles in mind. Manners and Courtesy Courtesy is an important part of good business writing. During this session, participants will learn ways to make their writing respectful and polite. Writing Memos Memos are another challenge that many writers face. Participants will look at parts of a memo and complete a fun exercise. Writing Effective E-mails Mostly everyone today uses email to communicate at work and at home. This session will give participants some tips on writing effective emails and managing email. Reports and Proposals Reports and proposals are two important types of business writing. In this session, an overview of the steps involved with writing these pieces is presented. Writing Business Letters This session reviews the steps for writing a business letter, types of letters, and the parts of a business letter. Participants then examine samples of business letters to determine the type and the parts of each letter. Readability Index The readability index determines the difficulty level of a written piece. Participants will apply the index to a sample and to their own work. Proofreading Participants learn about checking the grammar, spelling and punctuation in their written pieces, and then review their pre-assignment. Reviewing Your Writing In this session, participants complete a final review of their piece of writing. Workshop Wrap-Up At the end of the workshop, students will have an opportunity to ask questions and fill out an action plan.

Business Writing that Works
Delivered OnlineFlexible Dates
Price on Enquiry

Business Analysis - Requirements Engineering

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The definition of strategy Strategy development External environmental analysis Internal environmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage Additional course details: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Analysis - Requirements Engineering
Delivered OnlineFlexible Dates
Price on Enquiry

DSP01 SAP Introduction to SAP Data Warehouse Cloud

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Application Consultant Business Analyst Business Process Architect Business Process Owner / Team Lead / Power User Developer Enterprise Architect Solution Architect Trainer Overview This course will prepare you to: Understand the basic concepts of SAP data warehousing Position the value-added of SAP Data Warehouse Cloud Integrate on-premise SAP Sources Model in SAP Data Warehouse Cloud Consume Data in SAP Analytics Cloud This course will prepare you to:Understand the basic concepts of SAP data warehousingPosition the value-added of SAP Data Warehouse CloudIntegrate on-premise SAP SourcesModel in SAP Data Warehouse CloudConsume Data in SAP Analytics Cloud Course Outline Getting started with data warehousing and the training environment Short introduction in SAP BW Bridge and other sources SAP Data Warehouse Cloud: -Introducing SAP Data Warehouse Cloud -Describing Spaces, integration options, operations and best practices -Introducing modeling in the Data Builder -Introducing modeling the Business Layer Describing consumption options in SAP Analytics Cloud Additional aspects in SAP Data Warehouse Cloud Outlook and roadmap Additional course details: Nexus Humans DSP01 SAP Introduction to SAP Data Warehouse Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DSP01 SAP Introduction to SAP Data Warehouse Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DSP01 SAP Introduction to SAP Data Warehouse Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

DS10 SAP Data Services - Platform and Transforms

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course are Application Consultants, Developers, Developer Consultants, and Technology Consultants. Overview Define Data ServicesDefine Source and Target ConnectionsTrace, Validate, and Debug Data Services JobsUse Data Services TransformsImplement Change Data Capture in Data Services In this course, students will learn how to define data services, source, and target connections, as well as use data services transforms and implement change in data capture within data services. Data Services Defining Data Services Source and Target Metadata Defining Datastores in Data Services Defining a Data Services Flat File Format Batch Job Creation Creating Batch Jobs Batch Job Troubleshooting Writing Comments with Descriptions and Annotations Validating and Tracing Jobs Debugging Data Flows Auditing Data Flows Functions, Scripts, and Variables Using Built-In Functions Using Variables, Parameters, and Scripts Platform Transforms Using Platform Transforms Using the Map Operation Transform Using the Validation Transform Using the Merge Transform Using the Case Transform Using the SQL Transform Error Handling Setting Up Error Handling Changes in Data Capturing Changes in Data Using Source-Based Change Data Capture (CDC) Using Target-Based Change Data Capture (CDC) Data Services (Integrator) Platform Transforms Using Data Services (Integrator) Platform Transforms Using the Pivot Transform Using the Data Transfer Transform Additional course details: Nexus Humans DS10 SAP Data Services - Platform and Transforms training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DS10 SAP Data Services - Platform and Transforms course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DS10 SAP Data Services - Platform and Transforms
Delivered OnlineFlexible Dates
Price on Enquiry

DP120 Data Protector 9.x Essentials

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Storage and system administrators using HP Data Protector software, System Engineers, Consultants, Project Managers, Professional Services, and Sales. Overview Upon successful completion of this course, you should be able to:Install and distribute HP Data Protector software in your environmentConfigure the HP Data Protector software productConfigure your tape and disk-based backup solutions for use with HP Data Protector softwareUse HP Data Protector software to run backups and restores, and monitor these sessions from both the Data Protector GUI and command lineManage the HP Data Protector software Internal Database (IDB)Create custom reports and notification proceduresSecure your installation by configuring user access and adding security to the Cell Manager and DP client systemsPrepare your client to recover from a disaster situationUnderstand the Data Protector processes and perform basic troubleshooting of your installation The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. Additional course details: Nexus Humans DP120 Data Protector 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP120 Data Protector 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP120 Data Protector 9.x Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Data-driven Business Using Statistical Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is suited to marketeers, business analysts, and researchers who are interested in increasing their statistical knowledge. Overview After attending this course, delegates will understand how statistics can be used to provide valuable insight into their business, and be able to apply statistical methods to solve business problems. On returning to work delegates will immediately be able to make a difference to the way that their organisations make decisions. This course covers the statistical methods that analysts need to move from simple reporting on business problems to extracting insight to solve business problems. Course Outline The course will explore the following topics through a series of lectures and workshops: Summary statistics for both continuous data and categorical data Using and reporting confidence intervals Using hypothesis tests to answer business questions Using correlations to explore data relationships Simple prediction models Analysing categorical data Additional course details: Nexus Humans Data-driven Business Using Statistical Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Data-driven Business Using Statistical Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Data-driven Business Using Statistical Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-316 Citrix Provisioning 7 Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionalsworking with Citrix Virtual Appsand Desktops who need to plan for,implement, or manage a ProvisioningServices environment. Potential studentsinclude administrators, engineers, andarchitects. Overview #NAME? In this course, students will learn to install and configure a highly available Citrix Provisioning farm according to leading practices. In this course, students will learn about the architecture, communication, and processes that make up Citrix Provisioning to be successful with deploying and managing a farm. Manage and integrate vDisks and target devices with Citrix Virtual Apps and Desktops for easy rollback, upgrades, and performance of Virtual Delivery Agent machines. At the end of this course students will be able to install, configure and manage the CitrixProvisioning 7 solution. Advanced Provisioning Learning Objectives Introduction to Citrix Provisioning (PVS) Getting Started with Citrix Provisioning Citrix Provisioning Architecture Citrix Provisioning Infrastructure Lab VM Power Management Learning Objectives The Citrix Provisioning Server The Farm Database The Store Streaming the vDisk Lab VM Power Management Learning Objectives vDisk Introduction Master Target Device Preparation Streaming Introduction Boot Methods Target Devices Lab VM Power Management Learning Objectives Target Devices Introduction Reads and Writes Machine and User Data Integrating Citrix Provisioning with Citrix Virtual Apps and Desktops Lab VM Power Management Learning Objectives The Complete Architecture Overview The Citrix Virtual Desktops Setup Wizard Manage the Target Devices through Creating Device Collections Using Provisioned Services with Citrix Virtual Apps and Desktops Managing Citrix Provisioning from Citrix Cloud Advanced Architecture Lab VM Power Management Learning Objectives Farm Component Scalability Store Redundancy Farm Database Redundancy Supporting Citrix Provisioning Lab VM Power Management Learning Objectives vDisk Updates Delegate Administration Audit and Support Alternative vDisk Update Methods

CWS-316 Citrix Provisioning 7 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Developed for experienced IT Professionals working with Citrix Virtual Apps and Desktops 7.1x. Potential students include administrators, engineers, and architects responsible for the end user workspace, provisioning services environment, and overall health and performance of the solution. Overview How to configure Workspace Environment Management to improve the end user environment and virtual resource consumption Understand Zones in Citrix Virtual Apps and Desktops 7.1x and how to account for user and desktop locations and optimal connection and registration How to build and manage App Layers to minimize image sprawl with Citrix Virtual Apps and Desktops 7.1x Understand and configure HDX channels and protocols for improved performance delivering multimedia and data over network connections Get more value out of your Citrix Virtual Apps and Desktops 7.1x investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, and advanced features. Students leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. Students will gain the skills to improve logon times, user personalization, and resource performance through Workspace Environment Management. Also, learn to optimize management of your app and desktop images by building and combining App Layers. End the course by learning to install, configure, and manage Provisioning Services in accordance with leading practices.This course includes a voucher to take the related exam (1Y0-311 Citrix XenApp and XenDesktop 7.15 Advanced Administration) and earn your Citrix Certified Professional - Virtualization (CCP-V) certification. Implementing Redundancy and Scalability StoreFront and Citrix Gateway Site Infrastructure Machines Running the Virtual Delivery Agent Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones Managing StoreFront Store Subscriptions in a Multi- Location Environment StoreFront and Citrix ADC Branding Implementing Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Implementing Advanced Authentication Methods Multi-factor Authentication - RADIUS & OTP Multi-factor Authentication - Smart Card Authentication Federated Authentication - ADFS, SAML, and FAS Improving App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Securing Machines Running the Virtual Delivery Agent TLS to VDA Encryption GPOs and Citrix Policies Image Management Introduction to Troubleshooting Troubleshooting Methodology Process (Standard Slide) Resource Tools and Utilities Introduction to PowerShell Troubleshooting Access Issues Troubleshooting StoreFront Troubleshooting Citrix Gateway Troubleshooting Delivery Controller Issues Validating FMA Services Troubleshooting VDA Registration Issues Troubleshooting VDA Registration Troubleshooting HDX Connection Issues Troubleshooting HDX Connections Introduction to App Layering App Layering Introduction Architecture and How it Works Creating an OS Layer The OS Layer Creating a Platform Layer The Platform Layer Creating App Layers The App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimization Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Environments Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration
Delivered OnlineFlexible Dates
Price on Enquiry