• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

35140 Design courses delivered Online

VMware Data Center Virtualization: Core Technical Skills

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Technical professionals with basic system administration skills and operators responsible for managing virtual machines using VMware ESXi™ and VMware vCenter Server Overview By the end of the course, you should be able to meet the following objectives: Describe virtualization and virtual machines Describe vSphere components and the software-defined data center (SDDC) Explain the concepts of server, network, and storage virtualization Monitor network and datastore configurations in VMware vSphere Client™ Deploy, configure, and clone virtual machines Migrate, monitor, and manage virtual machines Monitor tasks and events in VMware vSphere Client™ Recognize how vSphere DRS and VMware vSphere High Availability improve performance and availability of a vSphere cluster This three-day, hands-on training course is an introduction to VMware vSphere©. In this course, you acquire the skills needed to perform Day 2 operational tasks that are typically assigned to the roles of operator or junior administrator in a vSphere environment. Course Introduction Introductions and course logistics Course objectives Virtualization and vSphere Concepts Describe how virtual machines (VMs) work Recognize the purpose of a hypervisor Describe how VMs share resources in a virtualized environment Recognize the components of an SDDC Describe the relationship between vSphere, the SDDC, and cloud computing Recognize the functions of the components in a vSphere environment Access and view vSphere graphical user interfaces Identify VMware solutions that integrate with vSphere in the SDDC Navigating the vSphere Client View and organize the inventory objects managed by vCenter Server Add and assign vSphere licenses Change the log level of vCenter Server Edit the startup policy of ESXi services Describe how vCenter Server roles and permissions work Add permissions to virtual machines Lifecycle of Virtual Machines Add and remove VM virtual hardware components Identify the purpose of different VM files Configure VM settings Create and delete virtual machines Recognize the benefits of installing VMware Tools? Install VMware Tools into a guest operating system Upgrade VMware Tools and VM hardware compatibility vSphere Networking Describe virtual networking Recognize ways that virtual switches connect VMs and ESXi hosts to the network View components and properties of a vSphere standard switch configuration View a vSphere distributed switch configuration in vSphere Client Recognize when and how to use the settings for the security networking policy Recognize when and how to use the settings for the traffic shaping networking policy Describe how the NIC teaming and failover policy helps maintain network connectivity Perform basic checks to diagnose VM connectivity issues vSphere Storage Describe the function of a datastore Recognize types of vSphere datastores View datastore information in vSphere Client Monitor datastore usage in vSphere Client Virtual Machine Management Recognize the benefits of using VM templates Create and update a VM template Deploy a VM from an existing template Clone a virtual machine Recognize how to use guest OS customization specifications Deploy VMs from a content library Deploy a virtual appliance from an OVF template Perform a hot and cold migrations of VMs Identify requirements for using VMware vSphere© Storage vMotion© Perform a vSphere Storage vMotion migration Identify use cases for VM snapshots Create and manage snapshots of a virtual machine Resource Monitoring Recognize the purpose of each type of VM resource control Configure the resource allocation settings of a VM Observe the behavior of virtual machines with different share values Manage and acknowledge vSphere alarms Use performance charts to monitor VM CPU and memory usage Monitor tasks and events in vSphere Client vSphere Clusters View information about the services that a vSphere cluster offers Recognize how vSphere HA responds to different types of failures Monitor vSphere HA during a host failure Describe how vSphere DRS works Interpret DRS scores given to VMs Recognize how to apply the appropriate vSphere DRS automation and migration threshold levels Describe how vSphere Fault Tolerance works Recognize how Enhanced vMotion Compatibility works Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Data Center Virtualization: Core Technical Skills training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Data Center Virtualization: Core Technical Skills course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Data Center Virtualization: Core Technical Skills
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Management and Operations [V7]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Storage and virtual infrastructure administrators who are responsible for production support and administration of VMware vSAN 7. Overview By the end of the course, you should be able to meet the following objectives: Define the tasks involved in vSAN node management Updating and upgrading vSAN using VMware vSphere Lifecycle Manager™ Explain vSAN resilience and data availability features Reconfigure vSAN storage policies and observe the cluster-wide impact Perform vSAN cluster scale-out and scale-up operations Describe common vSAN cluster maintenance operations Control vSAN resync operations Configure vSAN storage efficiency and reclamation features Use VMware Skyline™ Health to monitor cluster health, performance, and storage capacity Describe vSAN security operations Configure vSAN Direct for cloud native applications Configure remote vSAN datastore and vSAN native file services Manage two-node cluster and stretched cluster advance operations In this three-day course, you learn about managing and operating VMware vSAN? 7. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as, vSAN node management, cluster maintenance, security operations and advanced vSAN cluster operations. You also gain practical experience through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives vSAN Node Management Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Lifecycle Manager to perform upgrades vSAN Resilience and Data Availability Operations Describe vSAN storage policies Recognize the impact of a vSAN storage policy change Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configure the vSAN fault domains vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Cluster Performance Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use vSphere Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IO Insight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use a vSAN proactive test to detect and diagnose cluster issues vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server (KMS) vSAN Direct Discuss the use cases for vSAN Direct Understand the overall architecture of vSAN Direct Describe the workflow of vSAN Direct datastore creation Explore how vSAN Direct works with storage policy tagging Remote vSAN Discuss the use cases for remote vSAN Understand the high-level architecture Describe remote datastore operations Discuss the network requirement Interoperability between remote vSAN and VMware vSphere© High Availability vSAN Native File Service Discuss the use cases for vSAN file service Understand the high-level architecture of vSAN file service Discuss the authentication model Configure file shares Monitor file share health and capacity utilization Manage Advanced vSAN Cluster Operations Describe the architecture for stretched clusters and two-node clusters Understand the importance of witness node Describe how stretched cluster storage policies affect vSAN objects Create and apply a vSAN stretched cluster policy to meet specific needs Discuss stretched cluster failure scenarios and responses Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Management and Operations [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Management and Operations [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSAN: Management and Operations [V7]
Delivered OnlineFlexible Dates
Price on Enquiry

BA08 - Agile for Business Analysts

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Anyone with the need to understand how business analysis is performed to support agile projects or who must transition their existing business analysis skills and practices from waterfall to agile. Overview In this course, students will: Understand the fundamentals of agile delivery and agile business analysis Compare and contrast business analysis on waterfall and agile projects Explain the value proposition for agile product development Define the 4 main types of project life cycles Complete an in-depth walkthrough of the agile delivery life cycle Explain the major flavors of agile Understand the major standards available to assist in transition of skills Define business analysis tailoring and understand how to apply it Learn over 20 business analysis techniques commonly used on agile projects In this course, students will gain an understanding about agile business analysis. Students will learn how business analysis on an agile project is ?the same? and ?different? than business analysis performed on waterfall projects. Students will understand how the business analysis role changes on an agile team. A number of business analysis techniques suited for supporting agile teams will be introduced as will the various standards available to the community to help teams and organizations transition. Since few organizations are pure agile, students will also learn about delivery approaches that use a combination of practices from waterfall and agile and will also be introduced to the important concept of business analysis tailoring ? the key skill used to adapt business analysis skills to all environments ? regardless of the delivery life cycle selected. Introduction What is agile The Agile Manifesto Agile principles Agile benefits Hands-on activity Learning and course objectives The current state of agile Agile trends Agile skills Value proposition The business case for agile The BA role changes on an agile project Hands-on activity Understanding project life cycles Project life cycle Product life cycle Incremental versus Iterative Hybrid approaches to delivery Choosing a project life cycle An in-depth look at Agile The agile development life cycle A sequence of iterations Essential concepts Inside each iteration Iteration goal Iteration planning Sequence of tasks Work period Testing End of iteration activities Evaluation and feedback Structured walkthroughs Evaluation guidelines The BA role in structured walkthroughs Scripting scenarios Defect list Retrospectives Hands-on exercise Type of Agile Delivery Approaches The flavors of agile Scrum Scrum roles Extreme Programming (XP) Dynamic System Development Method (DSDM) Feature Driven Development (FDD) Testing Best practices used by FDD Kanban Kanban Boards Agile Unified Process Scaling Frameworks Introduction to Agile Business Analysis What is business analysis? What is agile business analysis? Framework for agile business analysis Business analysis components International Institute of Business Analysis (IIBA©) Project Management Institute (PMI©) Context to business analysis Our industry BA standards Our industry Agile BA standards Product Owners What stays the same What is expected to change Agile requirements deliverables Lightweight documentation Requirements repository Where business analysis fits in The BA workload Hands-on exercise Business Analysis Tailoring Business analysis tailoring (defined) Tailoring considerations What tailoring looks like The PMI Guide to Business Analysis Determining the ?best? BA approach Methodology vs Standard Why use methodologies Determining your methodology Business analysis impacts Tools and techniques for agile business analysis Agile BA techniques Backlog refinements Behavior Driven Development (BDD) Burndown chart Collaborative games Definition of done Definition of ready INVEST Iteration planning Kanban board Minimum marketable features (MMF) Minimum viable product (MVP) MoSCoW Narrative writing Persona analysis Product roadmap Progressive Elaboration Prototyping Purpose alignment model Retrospectives Story slicing Hands-on Exercise Prioritization Techniques Requirements prioritization Prioritizing on agile projects Prioritization criteria Business benefit MoSCoW Pair-choice comparison Setting priorities with multi-voting Cost to acquire and operate Determining business value Story point estimating Planning poker Project velocity Hands-on activity Course wrap-up Making the transition to agile How my role will be different Course summary Retrospective Questions Additional course details: Nexus Humans BA08 - Agile for Business Analysts training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA08 - Agile for Business Analysts course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA08 - Agile for Business Analysts
Delivered OnlineFlexible Dates
Price on Enquiry

20345-1 Administering Microsoft Exchange Server 2016/2019

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The audience for this course includes enterprise-level messaging administrators on Exchange Server. IT generalists and helpdesk professionals who want to learn about Exchange Server may also take this course. Students taking this course are expected to have at least two years of experience working in the IT field-typically in the areas of Windows Server administration, network administration, helpdesk, or system administration. They are also expected to have some experience with Exchange Server concepts but previous experience managing Exchange Server is not a requirement. Overview After completing this course, students will be able to: Deploy Exchange Server. Plan and configure storage for Exchange Server. Create and manage various recipient objects in Exchange Server. Perform recipient management and Exchange server management tasks by using Exchange Server cmdlets. Deploy Client Access services in Exchange Server. Manage high availability in Exchange Server. Implement disaster recovery for Exchange Server. Configure and manage message transport in Exchange Server. Configure message security in Exchange Server. Monitor and troubleshoot Exchange Server. Configure Exchange Server role-based access control permissions and configure audit logging for both administrators and users. Implement and manage integration with Exchange Online. This course teaches IT professionals how to administer and support Exchange Server. The course covers how install and configure Exchange Server. It also covers how to manage mail recipients and public folders, including how to perform bulk operations by using Exchange Management Shell. In addition, the course covers how to manage client connectivity, message transport and hygiene, and highly available Exchange Server deployments. It also covers how to implement disaster recovery solutions. Finally, the course covers how to maintain and monitor an Exchange Server deployment and how to administer Exchange Online in a Office 365 deployment. Deploying Microsoft Exchange Server 2016 Overview of Exchange Server Exchange Server architecture Requirements for Exchange Server Deploying Exchange Server Exchange Server Exchange Server Management Tools Lab : Deploying Exchange Server Managing Exchange Server 2016 storage Exchange Server mailbox databases Exchange Server storage Configuring Exchange Server mailbox databases and storage Lab : Configuring Exchange Server storage Managing recipient objects Managing user mailboxes Managing other types of mailboxes Managing other recipients objects Configuring policies and address lists Lab : Managing recipient objects Lab : Configuring address lists and policies Managing recipients and Exchange servers by using Exchange Server cmdlets Overview of the Exchange Management Shell Managing Exchange Servers by using Exchange Management Shell cmdlets Managing Exchange servers by using scripts Lab : Managing Exchange Server and recipient objects by using Exchange Management Shell Implementing client connectivity Configuring client access services Managing client access services Client connectivity in Exchange Server Configuring Outlook on the web Configuring mobile messaging Lab : Configuring client access services Lab : Deploying and configuring client access services on Exchange Server Managing high availability in Exchange Server High availability on Exchange Server Configuring highly available mailbox databases Configuring high availability of Client Access services Lab : Implementing DAGs Lab : Implementing and testing high availability Implementing disaster recovery for Exchange Server Implementing Exchange Server backup Implementing Exchange Server recovery Lab : Backing up Exchange Server data Lab : Restoring Exchange Server data Configuring and managing message transport Overview of message transport Configuring message transport Managing transport rules Lab : Configuring and managing message transport Configuring message security Deploying and managing an Edge Transport server for message security Implementing an antivirus solution for Exchange Server Implementing an antispam solution for Exchange Server Lab : Configuring message security in Exchange Server Monitoring and troubleshooting Exchange Server Monitoring Exchange Server Troubleshooting Exchange Server Lab : Monitoring and troubleshooting Exchange Server Securing and maintaining Exchange Server Securing Exchange Server by using RBAC Configuring audit logging in Exchange Server Maintaining Exchange Server Lab : Securing and maintaining Exchange Server Implementing and managing Exchange Online deployments Overview of Exchange Online and Office 365 Managing Exchange Online Implementing the migration to Exchange Online Managing a hybrid environment Lab : Managing Exchange Online Additional course details: Nexus Humans 20345-1 Administering Microsoft Exchange Server 2016/2019 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20345-1 Administering Microsoft Exchange Server 2016/2019 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20345-1 Administering Microsoft Exchange Server 2016/2019
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle PeopleSoft Time and Labor - North America Rel. 9.2

By Nexus Human

Duration 5 Days 30 CPD hours Overview Ensure a smooth, rapid implementation of PeopleSoft Time and Labor. Better understand how to facilitate the management, planning, reporting and approving of time, and calendar and schedule creation and usage. Set Up System and Time and Labor Tables Learn about and set up the tables that support your Time and Labor system. Identify how to track employee time by period and define workgroups and task groups to group time reporters into useful segments for processing. Manage Time Reporting Enroll time reporters into Time and Labor, and assign them to work schedules. Report time using different tools. Process reported time using the rules you defined to match your business processes. This PeopleSoft Time and Labor - North America Rel. 9.2 training will show you how to implement the PeopleSoft Time and Labor product encompassing features and functionality , and develop a solid foundation of knowledge that allows you to enroll time reporters into Time and Labor, assign them to work schedules, and report and process reported time. Setting Up PeopleSoft Human Resources, Payroll, and Benefits Tables Indentifying Prerequisite Human Resources, Benefits, and Payroll Tables Defining Prerequisite Tables Defining Holiday Schedules Defining Earnings Codes and Programs Defining Pay Groups and Pay Calendars Setting Up Basic PeopleSoft Time and Labor Tables Setting Up Time Zone Offsets Setting Up the Time and Labor Installation Table Setting Up Manager Time Calendar View Options Selecting the Labor Distriution and Labor Dilution Options Establishing Time Reporting Codes Describing Time Reporting Codes (TRC) Defining Time Reporting Code Categories Establishing Time Reporting Codes Defining TRC Programs Defning Compensatory Time Plans Establishing Time Periods Describing Time Periods Establishing Time Periods Establishing Planned Overtime Describing Planned Overtime Features Establishing Planned Overtime Creating Workgroups Describing Key Workgroup Concepts Creating Workgroups Defining Template Built Rules Identifying Online Rule Definition Tools Identifying Steps to Define Rules Defining Template Built Rules Defining Rule Programs Exporting and Importing Rules Describing Rule Template Creation Creating Task Groups Identifying Task Functinlaity Concepts Creating Task Templates Creating Task Profiles Creating Taskgroups Describing Task Profile Reporting Precedence Building Schedules Identifying Scheduling Concepts Describing Scheduling Integrations Identifying the Steps to Create a Schedule Setting Up Schedules Validating Schedules Setting Up Time Reporters Creating Time Reporter Data Maintaining Time Reporter Data Assigning Time Reporters to a Schedule Assigning and Viewing Compensatory Time Off Plans Setting Up Groups and Security Describing PeopleSoft Time and Labor Groups and Security Setting Up Group Creating Security Setting Up Dynamic Groups Setting Up Static Groups Viewing Time Reporters in Groups Setting Up Group Security Reporting Time Using Rapid Entry Describing Time Reporting Establishing Rapid Time Templates Performing Rapid Entry Running the Time Administration Process Describing the Time Administration Process Describing Time Reporter and Payable Time Status Reporting Time Using Self-Service Identifying Time Reporting Defining Time Reoprting Templates Defining User Preferences Reporting Time Using Timesheets Reporting Time Using the Web Clock Identifying Mass Time Reporting Requesting Overtime Requesting Absence Managing Exceptions Defining Exceptions Managing Exceptions Using Fluid and Workforce Availability Setting Up the Time and Labor Mobile Applications Entering Time Reporting as an Employee Managing Time Administration as a Manager Setting Up Workforce Availability Viewing Workforce Availability for Daily and Weekly Time Integrating with PeopleSoft Payroll for North America Integrating with Absence Management Preparing for a Payrun Running the Time and Labor Load Process Setting Up and Using Auto Enrollment Setting Up Auto Enrollment Defining Auto Enrollment Groups Previewing the Enrollment Data Performing Labor Distribution and Dilution Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs Auditing and Adjusting Payable Time Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets Performing Labor Distribution and Dilution Identifying Labor Distribution and Dilution Sending Costs to Time and Labor Viewing Distributed and Diluted Costs Auditing and Adjusting Payable Time Identifying the Stages of Payable Time Adjusting Paid Time Viewing Unprocessed Reported Time Viewing Unprocessed PayableTime Locking Timesheets Additional course details: Nexus Humans Oracle PeopleSoft Time and Labor - North America Rel. 9.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle PeopleSoft Time and Labor - North America Rel. 9.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle PeopleSoft Time and Labor - North America Rel. 9.2
Delivered OnlineFlexible Dates
Price on Enquiry

NECA: Nutanix Enterprise Cloud Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Administrators, architects, and business leaders who manage Nutanix clusters in the datacenter Managers and technical staff seeking information to drive purchase decisions Anyone who is seeking the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification Overview During this program, attendees will: Develop a working knowledge of the Nutanix product family. Understand the requirements and considerations involved in setting up a Nutanix cluster. Familiarize themselves with cluster management and monitoring via the Prism web console. Learn how to create, manage, and migrate VMs, set up data protection services, and plan for business continuity. Understand how to plan and handle upgrades, assess future requirements, and create what-if scenarios to adress scaling for business needs. The Nutanix Enterprise Cloud Administration (ECA) course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks Nutanix administrators perform through the use of graphical user interfaces (GUIs) and command line interfaces (CLIs). It also provides insight into a Nutanix cluster?s failover and self-healing capabilities, offers tips for solving common problems, and provides guidelines for collecting information when interacting with Nutanix Support Introduction The section describes the Nutanix HCI solution, walks you through the components of the Nutanix Enterprise Cloud, and explains the relationship between physical and logical cluster components. Managing the Nutanix Cluster In this section, you will use the Prism console to monitor a cluster, configure a cluster using various interfaces, use the REST API Explorer to manage the cluster, and learn how to deploy Nutanix-specific PowerShell cmdlets. Securing the Nutanix Cluster This section shows how to secure a Nutanix cluster through user authentication, SSL certificate installation, and cluster access control. Acropolils Networking This section explains how to configure managed and unmanaged Acropolis networks and describes the use of Open vSwitch (OVS) in Acropolis. You will learn how to display and manage network details, differentiate between supported OVS bond modes, and gain insight into default network configuration. VM Management This section shows you how to upload images, and how to create and manage virtual machines. Health Monitoring and Alerts In this section, you will use the Health Dashboard to monitor a cluster?s health and performance. You will also use Analysis Dashboard to create charts that you can export with detailed information on a variety of components and metrics. Distributed Storage Fabric This section discusses creating and configuring storage containers, including the storage optimization features: deduplication, compression, and erasure coding. AHV Workload Migration Using Nutanix Move, this section shows how to migrate workloads to a cluster running AHV. This is followed by a lab where a VM running on a Nutanix cluster configured with ESXi is migrated to a Nutanix cluster running AHV. File and Volumes This section gives you detailed information on Nutanix Volumes, which provides highly available, high-performance block storage through a few easy configuration steps. It also discusses Nutanix Files. Understanding Infrastructure Resiliency This section shows how Nutanix provides comprehensive data protection at all levels of the virtual datacenter: logical and physical. Data Protection Data can be replicated between Nutanix clusters, synchronously and asynchronously. This section shows how to configure a Protection Domain (PD) and Remote Sites, recover a VM from a PD, and perform a planned failover of a PD. Prism Central Having discussed and used Prism Element earlier, this section looks at the capabilities of Prism Central. With the added functionality provided by a Pro license, the focus is on features related to monitoring and managing multiple activities across a set of clusters. Monitoring the Nutanix Cluster This section shows you where to locate and how to interpret cluster-related log files. In addition, you will take a closer look at the Nutanix Support Portal and online help. Cluster Management and Expansion This section outlines essential life-cycle operations, including starting/stopping a Nutanix cluster, as well as starting/shutting down a node. You will also learn how to expand a cluster, manage licenses, and upgrade the cluster?s software and firmware. Remote Office Branch Office (ROBO) Deployments In this section, you will understand various configurations and requirements specific to a ROBO site. This includes hardware/software, Witness VM, networking, failure and recovery scenarios for two-node clusters, and the seeding process. Additional course details: Nexus Humans NECA: Nutanix Enterprise Cloud Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NECA: Nutanix Enterprise Cloud Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NECA: Nutanix Enterprise Cloud Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. Introduction Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios Building Backup Capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction Restoring from Backup Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time Using Secure Restore to prevent the restoration of malware Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios Backup Copy Jobs Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery Utilizing tape jobs, how to create and modify Replication Identify and describe the options available for replication, the use cases and impacts of using Create, modify and delete replication jobs, outline considerations to ensure success Failover Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios Advanced Repository Capabilities Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Ensure scalability by integrating off-site S3 storage Ensure compatibility with existing deduplication appliances Testing Backup and Replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production Veeam Backup Enterprise Manager Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. Create user and group roles, delegate workloads whilst maintaining data control Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords Veeam ONE Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business Support Locate, migrate or restore backup configuration Identify and locate appropriate support resources Troubleshooting methodology to identify, isolate and remediate support issues Additional course details: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered OnlineFlexible Dates
Price on Enquiry

Systems Operations on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview In this course, you will learn to: Recognize the AWS services that support the different phases of Operational Excellence, a WellArchitected Framework pillar. Manage access to AWS resources using AWS Accounts and Organizations and AWS Identity and Access Management (IAM). Maintain an inventory of in-use AWS resources using AWS services such as AWS Systems Manager, AWS CloudTrail, and AWS Config. Develop a resource deployment strategy utilizing metadata tags, Amazon Machine Images, and Control tower to deploy and maintain an AWS cloud environment. Automate resource deployment using AWS services such as AWS CloudFormation and AWS Service Catalog. Use AWS services to manage AWS resources through SysOps lifecycle processes such as deployments and patches. Configure a highly available cloud environment that leverages AWS services such as Amazon Route 53 and Elastic Load Balancing to route traffic for optimal latency and performance. Configure AWS Auto Scaling and Amazon Elastic Compute Cloud auto scaling to scale your cloud environment based on demand. Use Amazon CloudWatch and associated features such as alarms, dashboards, and widgets to monitor your cloud environment. Manage permissions and track activity in your cloud environment using AWS services such as AWS CloudTrail and AWS Config. Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service. State the purpose, benefits, and appropriate use cases for mountable storage in your AWS cloud environment. Explain the operational characteristics of object storage in the AWS cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier. Build a comprehensive costing model to help gather, optimize, and predict your cloud costs using services such as AWS Cost Explorer and the AWS Cost & Usage Report. This course teaches systems operators and anyone performing system operations functions how to install, configure, automate, monitor, secure, maintain and troubleshoot the services, networks, and systems on AWS necessary to support business applications. The course also covers specific AWS features, tools, andbest practices related to these functions. Module 1: Introduction to System Operations on AWS Systems operations AWS Well-Architected Framework AWS Well-Architected Tool Module 2a: Access Management Access management Resources, accounts, and AWS Organizations Module 2b: System Discovery Methods to interact with AWS services Introduction to monitoring services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Troubleshooting scenario Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config Module 3: Deploying and Updating Resources Systems operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower Troubleshooting scenario Module 4: Automating Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Troubleshooting scenario Hands-On Lab: Infrastructure as Code Module 5: Manage Resources AWS Systems Manager Troubleshooting scenario Hands-On Lab: Operations as Code Module 6a: Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 Module 6b: Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager Troubleshooting scenario Module 7: Monitor and Maintaining System Health Monitoring and maintaining healthy workloads Monitoring distributed applications Monitoring AWS infrastructure Monitoring your AWS account Troubleshooting scenario Hands-On Lab: Monitoring Applications and Infrastructure Module 8: Data Security and System Auditing Maintain a strong identity and access foundation Implement detection mechanisms Automate incident remediation Troubleshooting scenario Hands-On Lab: Securing the Environment Module 9: Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC Troubleshooting scenario Module 10a : Mountable Storage Configuring Amazon Elastic Block Storage (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Module 10b: Object Storage Deploying Amazon Simple Storage Service (Amazon S3) with Access Logs, Cross-Region Replication, and S3 Intelligent-Tiering Hands-On Lab: Automating with AWS Backup for Archiving and Recovery Module 11: Cost Reporting, Alerts, and Optimization Gain AWS expenditure awareness Use control mechanisms for cost management Optimize your AWS spend and usage Hands-On Lab: Capstone lab for SysOps Additional course details: Nexus Humans Systems Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Systems Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Systems Operations on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 4 Days 24 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware Tanzu portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management and supervisor clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this four-day course, you focus on installing VMware Tanzu© Kubernetes Grid? in a VMware vSphere© environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multipod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management, supervisor, and workload clusters List the components of a Tanzu Kubernetes Grid instance VMware Tanzu Kubernetes Grid CLI and API Illustrate how to use the Tanzu CLI Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API custom resource definitions Authentication Explain how Kubernetes manages authentication with Management clusters Explain how Kubernetes manages authentication with supervisor clusters Define Pinniped Define Dex Describe the Pinniped authentication workflow Load Balancers Illustrate how load balancing works for the Kubernetes control plane Illustrate how load balancing works for application workload Explain how Tanzu Kubernetes Grid integrates with VMware NSX Advanced Load Balancer List load balancing options available on public clouds VMware Tanzu Kubernetes Grid on vSphere List the requirements for deploying a supervisor cluster List the steps to install a Tanzu Kubernetes Grid supervisor cluster Summarize the events of a supervisor cluster creation List the requirements for deploying a management cluster List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters VMware Tanzu Kubernetes Grid on Public Clouds List the requirements for deploying a management cluster on AWS and Microsoft Azure List the configuration options to install a Tanzu Kubernetes Grid a management cluster on AWS and Azure Tanzu Kubernetes Workload Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain the difference between the v1alpha3 and v1beta1 APIs Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs compose a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes Grid cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Tanzu Kubernetes Grid Packages Define the Tanzu Kubernetes Grid packages Explain the difference between Auto-Managed and CLI-Managed packages Define packages repositories Configuring and Managing Tanzu Kubernetes Grid Operation and Analytics Packages Describe Cert-Manager Describe the Harbor Image Registry Describe Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe Prometheus and Grafana Configuring and Managing Tanzu Kubernetes Grid Networking Packages Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Describe ExternalDNS Demonstrate how to install Service Discovery with ExternalDNS Describe Multus CNI Tanzu Kubernetes Grid Day 2 Operations List the load balancer configuration options in vSphere to load balance applications Demonstrate how to configure Ingress with the NodePortLocal Mode Explain how to install VMware Tanzu Application Platform Describe life cycle management in Tanzu Kubernetes Grid Explain how backup and restore are implemented in Tanzu Kubernetes Grid Describe Velero and Restic List the steps to back up a Workload cluster using Velero and Restic Troubleshooting Tanzu Kubernetes Grid Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to check the health of a Tanzu Kubernetes Grid cluster Explain packages cleanup procedures Explain management recovery procedures Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry