• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3038 Driver courses

Train to Become A Driving Instructor

5.0(61)

By Driving Skills Academy

Train to become a Driving Instructor with Driving Skills Academy and earn up to £40,000 + per annum after meeting all your business and car expenses. If you want to be your own boss and are looking for a well-paid job that you can fit in and around your lifestyle then becoming a driving instructor could be the ideal full time or part time career.

Train to Become A Driving Instructor
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-420 Citrix (NetScaler) Networking Assessment, Design, and Advanced Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Built for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodology Assess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deployment Apply advanced authentication and load balancing principles In this expert level 5-day training course you will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, you will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare you for the Citrix Certified Expert in Networking (CCE-N) exam. Module 1: Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirementrs User Segmentation Application Assessment Capabilities Assessment Module 2: Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Module 3: Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Module 4: Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Module 5: Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Module 6: Advanced Load Distribution and Link Load balancing Advanced Load Balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Module 7: Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new)

CNS-420 Citrix (NetScaler) Networking Assessment, Design, and Advanced Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Developed for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodologyAssess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deploymentApply advanced authentication and load balancing principles In this expert training course students will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, students will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare students for the Citrix Certified Expert in Networking (CCE-N) exam.This course includes a voucher to take the related exam (1Y0-440: Citrix Networking Assessment, Design, and Advanced Configuration) and earn your Citrix Certified Expert ? Networking (CCE-N) certification. Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirements User Segmentation Application Assessment Capabilities Assessment Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Advanced Load Distribution and Link Load balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new) Additional course details: Nexus Humans CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to MongoDB for Developers (TTDB4683)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This introductory-level course is for experienced application developers new to MongoDB. Overview This course is approximately 50% hands-on lab to lecture ratio, combining engaging expert lessons, demos and group discussions with real-world, skills-focused machine-based labs and exercises. Working in a hands-on learning environment, guided by our expert team, you'll explore: Storage Basics MongoDB Document Model MongoDB Setup CRUD: Basics through Advanced Concepts Performance: Basics through Advanced Concepts Aggregation: Basics through Advanced Concepts Replication: Basics through Advanced Concepts Sharding: Basics through Advanced Concepts Schema Design Security Basics, Authentication & Authorization Application Development and Drivers Geared for experienced developers, Introduction to MongoDB for Developers is a comprehensive course that provides you with hands-on experience with the MongoDB query language, aggregation framework, data modeling, indexes, drivers, basic performance tuning, high availability and scaling. Throughout the course, you?ll explore the MongoDB Atlas database environment in detail, gaining job-ready skills you can put right to work after class. Storage Basics What is a Storage Engine? WiredTiger Storage Engine In-Memory Storage Engine Encrypted Storage Engine MongoDB Document Model JSON and BSON MongoDB Data Types MongoDB Setup Atlas Setup / Local MongoDB Setup CRUD Basics Insert Command Find Command Query Operators Remove Command Updating Documents CRUD Advanced Bulk Writes Retryable Writes Find and Modify Transactions Performance Basics Indexes Aggregation Basics Aggregation Pipeline Concepts Aggregation Pipeline Stages Aggregation Pipeline Expressions Aggregation Advanced $lookup stage $graphLookup stage $expr operator Faceted Search Type Conversions Advanced Expression Operators Date Expression Operators Expression Variables Aggregation Pipeline Optimizations Aggregation in a Sharded Cluster Replication Basics MongoDB Replica Sets Replica Set Use Cases Replication Mechanics Replication Advanced Using Write Concern to Tune Durability Semantics Using Read Concern to Tune Read Isolation Using Read Preference Replica Set Tag Sets Sharding Basics Sharding Concepts When to Shard What is a Shard Key? Zoned Sharding / MongoDB Atlas Global Clusters Sharding Advanced Components of a Sharded Cluster Sharding Mechanics Choosing a Good Shard Key Schema Design Schema Design Core Concepts Common Patterns Security Basics Authentication & Authorization Network Encryption Encryption at Rest Auditing

Introduction to MongoDB for Developers (TTDB4683)
Delivered OnlineFlexible Dates
Price on Enquiry

CCAS Check Point Certified Automation Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who automate, orchestrate, and troubleshoot Check Point secured environments. Overview Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API The goal of this course is to provide an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies Course Ouline Explain how automation and orchestration work together Understand the key drivers for incorporating automation and orchestration into security management Execute a shell script that demonstrates how to build a comprehensive Security Policy. Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions Demonstrate how to define new objects and modify existing ones by using the Check Point API Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database Demonstrate how to use different methods to update the database with API commands Become familiar with client-side and server-side scripting and scripting languages Understand how to use the Bash shell to develop APIs Recognize and describe many of the open source tools that are available to assist with API development Demonstrate how to use a custom REST application to update the database of a Security Management Server Demonstrate how to use Postman to manage the Security Policy database through the Check Point API Understand what steps to take to troubleshoot and debug API scripts Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms Understand how to use self-service portal capabilities to provide general IT services Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals Demonstrate common tasks that are automated in a Web portal to manage the Security Policy LAB Exercises Demonstrate Check Point automation and orchestration Manage objects using the Check Point API Create a management API shell script Use a variety of methods to execute API commands Use a custom REST tool for API calls Use Postman for API calls Debug the Check Point management API Automate tasks using a Check Point API enabled Web portal Additional course details: Nexus Humans CCAS Check Point Certified Automation Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCAS Check Point Certified Automation Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCAS Check Point Certified Automation Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NSO Essentials for Programmers and Network Architects v3.0 (NSO201)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolutions designers Overview After completing this course, you should be able to:Explain transactional service activation and how it relates to business requirementsExplain the benefits and uses of Cisco NSOExplain how Cisco NSO communicates with network devicesUnderstand the NETCONF protocol and be able to read and write simple YANG modelsInstall NSO and describe how NSO uses NETCONF and the Device Manager componentUnderstand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capableExplain the YANG service model structureDescribe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAPDesign and manage services with YANG modelsPerform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packsUse logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devicesExplain the mapping logic of service parameters to device models and consequently to device configurationsDescribe the use of different integration options and APIsExplain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) componentsDescribe the use of feature components and function packsDefine and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solutionWork with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides a brief overview of NSO as a network automation solution, as well as an introduction to NETCONF, YANG, and XPath. You will learn about service packages, network element drivers, and Application Programming Interfaces (APIs). The course also covers service creation, device and configuration management, NSO maintenance, NSO options and integrations, and basic NSO troubleshooting. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP

Cisco NSO Essentials for Programmers and Network Architects v3.0 (NSO201)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco NSO Essentials for Programmers and Network Architects (NSO201) v4.0

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for System installers System integrators System administrators Network administrators Solutions designers Overview After completing this course, you should be able to: Explain transactional service activation and how it relates to business requirements Explain the benefits and uses of Cisco NSO Explain how Cisco NSO communicates with network devices Understand the NETCONF protocol and be able to read and write simple YANG models Install NSO and describe how NSO uses NETCONF and the Device Manager component Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable Explain the YANG service model structure Describe how YANG is used with NSO, create and deploy a service, and explain NSO FASTMAP Design and manage services with YANG models Perform NSO configuration and basic troubleshooting, and describe the following NSO features: integration options, alarms and reporting, scalability and performance options, and available function packs Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices Explain the mapping logic of service parameters to device models and consequently to device configurations Describe the use of different integration options and APIs Explain the use of Reactive FASTMAP for manipulating and implementing advanced Network Functions Virtualization (NFV) components Describe the use of feature components and function packs Define and explain the European Telecommunications Standards Institute (ETSI) Open Source NFV Management and Orchestration (MANO) principles and solution Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures The Cisco NSO Essentials for Programmers and Network Architects (NSO201) v. 4.0 course introduces you to Cisco© Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides an overview of NSO as a network automation solution, as well as introductions to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO. Introduction to Cisco NSO Meeting Challenges with Orchestration Challenges of Network Management Challenges of Network Orchestration NSO Features and Benefits That Meet Challenges Standardized Approach What Is NSO? Logical Architecture Components What Does NSO Do? Orchestration Use Cases How Does NSO Work? Introduction to NETCONF and YANG Packages Mapping Logic Network Element Drivers (NEDs) Resources and Training Resources Training Get Started with Cisco NSO Installing Cisco NSO Setup Overview Cisco NSO Local Installation Installing NEDs Using NetSim NETCONF Overview Challenges of Network Management Introduction to NETCONF NETCONF Operation Device Manager Device Manager Overview Device Configuration Management Device Connection Management Templates and Groups Other Device Management Tools Service Manager Essentials YANG Overview Introduction to YANG Other Representations of YANG Data Types XPath Overview Basic YANG Statements Can You Spot the Error? Using Services Package Architecture Creating a Service Package Sample Service Configuration Service Template YANG Service Model Deploying a Service Model-to-Model Mapping Mapping Introduction Mapping Logic FASTMAP Template Processing Service Design and Cisco NSO Programmability Service Design Service Design Overview Top-Down Approach Bottom-Up Approach Device Configuration Service Model Service Management Service Management Tasks Service Lifecycle Management Guidelines NSO Programmability Introduction NSO Programmability Overview Python Service Skeleton Creating a Service YANG Model Creating a Service Template Template Processing with Python Cisco NSO Flexibility System Configuration and Troubleshooting System Configuration System Troubleshooting Integration Integration Options NETCONF Server Web Integration SNMP Agent Alarm Management and Reporting Alarm Management Reporting Scalability and Performance High Availability High-Availability Cluster Communications Clustering Layered Service Architecture Addressing Performance Limitations Components and Function Packs Function Packs NFV Orchestration Reactive FASTMAP

Cisco NSO Essentials for Programmers and Network Architects (NSO201) v4.0
Delivered OnlineFlexible Dates
Price on Enquiry

Migrating to AWS

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Solutions architects, Software engineers, Operations leads, and IT project managers. Overview Recognize the common business and technical drivers for migrating to the cloud Summarize the three phases of a migration and associated objectives, tasks, and stakeholders for each Describe AWS architecture, tools, and migration best practices Distinguish between the various cloud migration strategies and when each is most appropriate Determine an organization?s application migration readiness Discover a portfolio and gather data necessary for migration Plan and design an application migration strategy Perform and validate application migration to the cloud Optimize applications and operations after migrating to the cloud This course is for individuals who seek an understanding of how to plan and migrate existing workloads to the AWS Cloud. You will learn about various cloud migration strategies and how to apply each step of the migration process, including portfolio discovery, application migration planning and design, conducting a migration, and post-migration validation and application optimization. Hands-on labs reinforce learning, and each lab is designed to provide you with the understanding and foundation necessary to complete migration tasks in your organization. Prerequisites We recommend that attendees of this course have: Familiarity with enterprise IT infrastructure (hardware and software) Completed the AWS Technical Essentials or Architecting on AWS training 1 - What Is a Cloud Migration? Summarize the drivers and desired outcomes of a cloud migration Identify the elements of a successful migration journey Describe the three-phase AWS migration process 2 - Assessing Migration Readiness Summarize the activities and goals of the assess phase Evaluate tools for assessing your organization?s cloud readiness Describe Migration Readiness Assessments (MRAs) and their importance 3 - Preparing for a Migration and Understanding Related Workstreams Summarize the mobilize phase of the process Discuss the eight unique migration-related workstreams 4 - Discovering Landing Zones and Their Benefits Explain the function of a landing zone Discuss best practices for creating a custom landing zone Describe how you would use AWS Control Tower to create a landing zone 5 - Building a Landing Zone Summarize the process of building a landing zone Determine the best multi-account structure, governance policies, and connectivity plan for a landing zone 6 - Discovering the Portfolio and Understanding Migration Strategies Explain the activities of the detailed portfolio discovery workstream Describe how to assess an application?s migration readiness Summarize the seven migration strategies 7 - Understanding and Choosing Portfolio Discovery Tools Summarize the various discovery tools available Distinguish which tools are best to use based on scenario 8 - Planning and Designing a Migration Describe the planning and design process Summarize how to set up a migration factory Choose and finalize an application migration strategy 9 - Performing the Migration to AWS Explain the server migration process Discuss the various migration automation and governance tools available Evaluate server migration tools for compatibility with your environment 10 - Understanding Database and Data Migration Services Summarize the significance of database and data migration Discuss the various data migration tools available 11 - Understanding Additional Migration Support Options Discuss additional migration support options Summarize AWS Managed Services and AWS Marketplace Describe SAP on AWS and services offered for Windows 12 - Integrating, Validating, and Cutting Over Applications Discuss the process and benefits of integrating, validating, and cutting over applications 13 - Modernizing and Optimizing an Application Migration Identify post-migration opportunities for modernization and optimization Understand cost and security optimization processes Explore tools available to support these processes 14 - Understanding Operations Tools, Integration Testing, and Automation Summarize operations in the cloud Discuss four functions of operations and their domains Review operations automation and relevant support tools 15 - Migration Best Practices Course review and key takeaways Summarize and reinforce AWS best practices for migrating Additional course details: Nexus Humans Migrating to AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Migrating to AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Migrating to AWS
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity

CWS-415 Citrix Virtual Apps and Desktops 7 Architect Design Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC-2) 201

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 201 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: measure hardware resource and network bandwidth, identify and troubleshoot resource problems monitor resource usage to predict future resource needs utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements properly configure a kernel to include or disable specific features of the Linux kernel as necessary manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules query and modify the behaviour of system services at various targets / run levels properly manipulate a Linux system during both the boot process and during recovery mode properly configure and navigate the standard Linux filesystem configure automount filesystems using AutoFS configure and implement software RAID configure kernel options to support various drives create and remove logical volumes, volume groups, and physical volumes use system tools to back up important system data. This course prepares students to take the 201 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Capacity Planning Measure and Troubleshoot Resource Usage Predict Future Resource Needs Linux Kernel Kernel components Compiling a Linux kernel Kernel runtime management and troubleshooting System Startup Customising system startup System recovery Alternate Bootloaders Filesystem and Devices Filesystem and Devices Maintaining a Linux filesystem Creating and configuring filesystem options Advanced Storage Device Administration Configuring RAID Adjusting Storage Device Access Logical Volume Manager Networking Configuration Basic networking configuration Advanced Network Configuration Troubleshooting network issue System Maintenance Make and install programs from source Backup operations Notify users on system-related issues

Linux Professional Institute Certification  (LPIC-2) 201
Delivered OnlineFlexible Dates
Price on Enquiry