About this Virtual Instructor Led Training (VILT) This 4 half-day Virtual Instructor Led Training (VILT) course presents the principles and best practices of portfolio management in the upstream (E&P) oil and gas industry. The VILT course is equally valuable for small independents, large integrated international companies and national oil companies. The VILT course consists of presentations, case studies, illustrative practical exercises and syndicate discussions. Particular emphasis is given to pragmatic portfolio management approaches and solutions which can be implemented swiftly without recourse to major investments in planning and portfolio management software. The VILT course will draw on examples from your expert course leader's 35+ years' experience in the oil and gas industry as an explorationist, upstream vice-president and management consultant. The VILT course handout will comprise softcopy slides used in the presentation and a softcopy workbook for the exercises. Participants will gain proficiency in portfolio management techniques, understand how and why to undertake this activity and be able to apply key concepts directly in the business of their teams / divisions. The VILT course will be presented over 4 half-days, using Microsoft Teams or Zoom and a proprietary set of VILT tools. Participants will be asked to complete a pre course questionnaire (PCQ) addressing their objectives and experience, and attend a session to familiarise themselves with VILT tools before course commencement. Training Objectives To present the tools, concepts and principles of portfolio management To define the quantitative metrics which are used to describe projects in a portfolio To understand the benefits of portfolio management at different stages of the upstream business: in strategy development, opportunity screening, business development, drilling prospects, conducting appraisal of discoveries and developing fields To put portfolio management in the organisational context by describing the role of the portfolio management team and examining how value assurance (quality control) is best conducted on portfolio data for projects and assets To demonstrate how portfolio management contributes to improved business performance By the end of the VILT course, participants will understand: Key concepts and principles of portfolio management How to design a simple portfolio database and describe complex projects in a small number of objective metrics How to segment the portfolio into meaningful units How to use portfolio data in making business choices and decisions at the strategic and tactical levels The extent to which it is meaningful and reasonable to make comparisons across different portfolio segments How the portfolio management team can support the wider business in decision-making Target Audience This VILT course is specially designed for exploration and development geoscientists, E&P economists and finance staff, and E&P managers. Both technical and non-technical staff will benefit from the concepts presented. Companies are encouraged to send participants from different functions and seniority levels to gain great benefits especially those which would like to implement the concepts presented in this VILT course. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 4 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. The VILT course will be presented in an interactive workshop format that allows for discussion. Course Duration: 4 half-day sessions, 4 hours per session (16 hours in total). Trainer Your expert course leader draws on more than 35 years of experience managing, reviewing and directing projects in all aspects of the exploration business: from exploration business development (new ventures), through prospect maturation and drilling, to the appraisal of discoveries. He has more than 30 years' experience with Shell International, followed by 10 years consulting to NOCs in Asia Pacific, Africa and South America and independent oil companies in the United Kingdom, continental Europe and North America. Other than delivering industry training, he has worked on projects for oil & gas companies of all sizes, including independents, national oil companies and (super)-majors, private equity firms, hedge funds and investment banks, and leading management consulting firms. He is an alumnus of Cambridge University. He has M.A and Ph.D. degrees in geology and is a Fellow of the Geological Society of London as well as a respected speaker on management panels at international conferences. Professional Experience Management consultancy & executive education: Advice to investment banks, businesses and major consulting firms. Specialist expertise in upstream oil & gas, with in depth experience in exploration strategy, portfolio valuation and risk assessment. Leadership: Managed and led teams and departments ranging from 3 - 60 in size. Provided technical leadership to a cadre of 800 explorationists in Shell worldwide. Member of the 12-person VP team leading global exploration in Shell, a $3 bln p.a. business and recognised as the most effective and successful among its industry peers. Accountability & decision-making: Accountable for bottom-line results: in a range of successful exploration ventures with budgets ranging from $10's million to $100's million. Made, or contributed to, complex business decisions / investments, taking into account strategic, technical, commercial, organisational and political considerations. Corporate governance: Served as non-executive director on the Boards of the South Rub al Khali Company (oversight of gas exploration studies and drilling in Saudi Arabia) and SEAPOS B.V. (exploration deep-water drilling and facilities management). Technical & operations: Skilled in exploration opportunity evaluation, the technical de risking of prospects, portfolio analysis and managing the interface between exploration and well engineering activities. Unparalleled knowledge of the oil and gas basins of the world, and of different operating regimes and contractual structures, ranging from Alaska, Gulf of Mexico and Brazil, through to the Middle East, former Soviet Union, Far East and Australia. Safety: Following an unsatisfactory audit, became accountable for safety performance in Shell's exploration new ventures. Through personal advocacy and leadership of a small team, delivered pragmatic and effective HSE systems, tools and staff training / engagement and a dramatically improved safety record. R&D: Experience in the 3 key roles in R&D: scientific researcher, research manager, and 'customer' for R&D products. After re-defining Shell's exploration R&D strategy, led the re-structuring of the R&D organization, its interface with 'the business' and approaches to deployment and commercialization. Strategy: Accomplished at formulating competitive strategies in business, R&D and technology deployment, translating them into actionable tactics and results. Defined the exploration strategy of PDO (a Shell subsidiary in Oman) and latterly of Shell's global exploration programme. Professional education, behavioural/motivational coaching: Experienced in organisational re-design, change management, leadership education and talent development. Commercial skills: Personally negotiated drilling compensation claims, educational contracts and E&P contracts, with values of $5 million to $100+ million. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Lean Six Sigma Green Belt Certification Program: In-House Training This learning series is designed to enable participants to fulfill the important role of a Lean Six Sigma Green Belt and to incorporate the Lean Six Sigma mindset into their leadership skills. Green Belt is not just a role, it is also a competency required for leadership positions at many top companies. This learning series is designed to enable participants to fulfill the important role of a Lean Six Sigma Green Belt and to incorporate the Lean Six Sigma mindset into their leadership skills. With a real-world project focus, the series will teach the fundamental methodology, tools, and techniques of the Define, Measure, Analyze, Improve and Control Process Improvement Methodology. This course is delivered through sixteen 3-hour online sessions. What you Will Learn At the end of this program, you will be able to: Identify strategies for effectively leading high performing process improvement teams Analyze whether projects align with business strategy Apply process improvement methodologies to DMAIC steps, based on real world scenarios Explain ways to appropriately respond to process variation Distinguish among best practice problem solving methodologies Evaluate and effectively communicate data-driven decisions, based on real world scenarios Introduction Lean Six Sigma & quality The vision The methodologies The metric Project Selection Why Projects Random idea generation Targeted idea generation CTQs (Critical to Quality) & projects Project screening criteria Quick improvements Introduction to Define Project Planning Developing the core charter Developing a project charter Facilitation Process Management Business process management Top-down process mapping Voice of the Customer Voice of Customer Stakeholder analysis Communication planning Kicking off the project Define Summary Introduction to Measure Data Collection Fact-based decision making Data sampling Operations definitions Data collection plan Measurement system analysis Graphical Statistics for Continuous Data Meet Six SigmaXL Graphical & statistical tools Data stratification Graphical Statistics for Discrete Data Pareto analysis Dot plots Plotting data over time: Looking for patterns Variation Concepts Variation is reality Special Cause and Common Cause variation Example of standard business reporting Individuals Control Chart Process Capability Genesis of process capability Calculating the metrics of Six Sigma Yield metrics: Measuring process efficiency Cost of Poor Quality The Cost of Poor Quality (COPQ) Cost of Quality categories Calculating the Cost of Poor Quality Measure Summary Introduction to Analyze Process Analysis Introduction to process analysis Value-added analysis Cycle time analysis WIP & pull systems Analyzing bottlenecks and constraints Cause & Effect Analysis Fishbone/Ishikawa diagram 5-Whys analysis Graphical & statistical tools Advanced Analysis Why use hypothesis rests? Hypothesis tests Correlation and regression analysis Analyze Summary Introduction to Improve Solutions Creativity techniques Generating alternative solutions Solution selection techniques Introduction to Design of Experiments Introduction to DOE DOE activity Error Proofing Failure mode & effect analysis Poka-Yoke Project Management Fundamentals Successful teams Project roles Conflict management Standardization Standardization The Visual Workplace 5S Piloting & Verifying Results What is a pilot? Evaluating results Improve Summary Introduction to Control Statistical Process Control Review of Special & Common Cause variation Review of Individual Control Chart P-Chart for discrete proportion data Transition Planning Control plan Project closure Control Summary Summary and Next Steps
VoIP training course description Convergence of voice and data is now a common place mainstream technology. Our Voice Over IP course investigates the characteristics of voice transmission and then studies the impact on IP networks. Practical sessions with soft phones, hard phones and gateways allow the students to see all aspects of VoIP. Network analysers are used to study packets on the wire. What will you learn Describe the issues of voice and data convergence. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate VoIP technologies. Design data networks, which will support voice. VoIP training course details Who will benefit: Anyone working in the field of networking or telecommunications. Prerequisites: TCP/IP foundation for engineers Intro to data communications & networking Duration 3 days VoIP training course contents What is VoIP Voice over IP, brief review of IP, brief review of telephones and voice. Configuring IP softphones What are softphones? Downloading, installing. Hands on Building the base IP network, a simple VoIP call with softphones, Internet telephony. Addressing E164, FQDN, IP addresses, URIs, DNS, SIP addressing, H.323 addressing. VoIP issues Bandwidth, Delay, Jitter, digitising voice, digitisation steps, coding, quality issues, MOS, voice compression, silence suppression, packetising voice, prioritising voice, jitter buffers. Hands on Simple packet analysis. Architectures Desktop, backbone, gateway, hard phones, PoE, integrating phones and PCs, carriers, Softswitches. Hands on Integrating Softphones, hard phones and analog phones. IP performance and QoS ITU delay recommendations, IP DSCP field, DiffServ, IP precedence, queuing strategies; FIFO, WFQ, custom, priority, RED, LLQ. VoIP protocol stack RTP, RTCP, mixers and translators, RSVP. Bandwidth, Erlang models, link layer overhead. Hands on Calculating VoIP bandwidth, analysing RTP packets. ITU Recommendation H.323 Architecture, protocols, terminals, Call setup, Gatekeepers, gateway discovery, H.323 registration with a gatekeeper. Hands on PC to PC using H.323. IETF - Session Initiation Protocol What is SIP? SIP protocol stack, SDP, Sip architecture, SIP messages, Initial SIP phone startup, SIP servers, proxy server, redirect server. Hands on PC to PC using SIP. Carrier networks Signalling systems, SS7, media gateways, Media gateway controllers, signalling gateways, MGCP, Megaco, SIGTRAN. Hands on PSTN interworking. Video over IP Video components, digital video, pictures and audio, video codecs, issues and solutions, video conferencing, multipoint video conferencing, video protocol stack. Appendix 1: Multicasting. Appendix 2: Voice/data integration without IP.
Managing Successful Programmes (MSP®) 5th Edition Practitioner: In-House Training Managing Successful Programmes (MSP®) is a globally-recognized framework for best practice programme management. MSP certification provides guidance for programme managers, business change managers, and the next step for project managers to develop their knowledge and skills to be able to positively respond to the challenges of managing programmes and larger, more strategic, or multiple projects. MSP 5th Edition emphasizes flexibility, adaptability, and responsiveness by adopting an incremental approach to the programme lifecycle and thus enabling organizational agility. AXELOS offers two levels of MSP Examination: MSP Foundation and MSP Practitioner. The MSP 5th Edition Foundation Examination is intended to assess whether the candidate can demonstrate sufficient recall and understanding of the MSP programme management framework. MSP 5th Edition Practitioner is for project, programme, and business change managers that want to build on their knowledge of MSP in order to practically apply the MSP framework to real-life scenarios, providing the skills to lead and manage a programme. It is a must-have certification for both project and programme management professionals to deliver organizational value to their employers and boost their careers. What you will Learn At the end of this course, participants will be able to: Understand how to apply the MSP principles in context Understand how to apply and tailor relevant aspects of the MSP themes in context Understand how to apply and tailor relevant aspects of the MSP processes in context Course Introduction Application of MSP Principles Program Strategy and Themes Application of Organization Theme Application of Design Theme Application of Justification Theme Application of Structure Theme Application of Knowledge Theme Application of Assurance Theme Application of Decisions Theme Application of MSP Processes
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
The Gold Card Training Programme is the most comprehensive electrician course available. We offer weekday, weekend and evening delivery options. JIB ECS (Gold) Card is quickly becoming a necessity when seeking work on commercial sites, or sub-contracting to larger contractors.
Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration
CCNP training course description The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam What will you learn Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP training course details Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting Duration 5 days CCNP training course content Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunkingBuilding Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networkingImplementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and TechniquesVPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards.Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location ServicesWireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized managementWireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshootingMulticast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis ToolsInfrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experienceCisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gatewaysCisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planesBasics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.
VMware training course description This five-day VMware course features intensive handson training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. What will you learn Install and configure ESXi hosts. Deploy and configure vCenter. Create virtual networks using standard and distributed switches. Configure VMs, templates, clones, and snapshots. Manage virtual machine resource allocation. Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion. VMware training course details Who will benefit: Systems administrators and engineers. Prerequisites: Introduction to data communications & networking. Windows/Linux Administration. Duration 5 days VMware training course contents Course Introduction Introductions and course logistics. Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts, Describe how vSphere fits in the software-defined data center and the cloud infrastructure, Recognize the user interfaces for accessing vSphere, Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Installing and Configuring ESXi Install an ESXi host, Recognize ESXi user account best practices, Configure the ESXi host settings using the DCUI and VMware Host Client Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter, Deploy vCenter Server Appliance, Configure vCenter settings, Use the vSphere Client to add and manage license keys, Create and organize vCenter inventory objects, Recognize the rules for applying vCenter permissions, View vCenter logs and events Configuring vSphere Networking Configure and view standard switch configurations, Configure and view distributed switch configurations, Recognize the difference between standard switches and distributed switches, Explain how to set networking policies on standard and distributed switches Configuring vSphere Storage Recognize vSphere storage technologies, Identify types of vSphere datastores, Describe Fibre Channel components and addressing, Describe iSCSI components and addressing, Configure iSCSI storage on ESXi, Create and manage VMFS datastores, Configure and manage NFS datastores Deploying Virtual Machines Create and provision VMs, Explain the importance of VMware Tools, Identify the files that make up a VM Recognize the components of a VM, Navigate the vSphere, Client and examine VM settings and options, Modify VMs by dynamically increasing resources, Create VM templates and deploy VMs from them, Clone VMs, Create customization specifications for guest operating systems, Create local, published, and subscribed content libraries, Deploy VMs from content libraries, Manage multiple versions of VM templates in content libraries Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances, Migrate VMs using vSphere vMotion, Describe the role of Enhanced vMotion Compatibility in migrations, Migrate VMs using vSphere Storage vMotion, Take a snapshot of a VM, Manage, consolidate, and delete snapshots, Describe CPU and memory concepts in relation to a virtualized environment, Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA, View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster, Recognize use cases for vSphere DRS settings, Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures, Identify options for configuring network redundancy in a vSphere HA cluster, Recognize vSphere HA design considerations, Recognize the use cases for various vSphere HA settings, Configure a vSphere HA cluster, Recognize when to use vSphere Fault Tolerance Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster, Describe features of the vCenter Update Planner, Run vCenter upgrade prechecks and interoperability reports, Recognize features of vSphere Lifecycle Manager, Distinguish between managing hosts using baselines and managing hosts using images, Describe how to update hosts using baselines, Describe ESXi images, Validate ESXi host compliance against a cluster image and update ESXi hosts, Update ESXi hosts using vSphere Lifecycle Manager, Describe vSphere Lifecycle Manager automatic recommendations, Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware