• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4071 Engineer courses

Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This section specifies the primary and secondary target audiences of this course by job roles and notes the relevance to each job role. Collaboration Engineers and Administration Primary audiences: Collaboration engineers involved in the design, implementation, and troubleshooting of Cisco collaboration core technologies. Secondary audiences: Administration involved in support and troubleshooting of Cisco collaboration technologies. Overview Upon completing this course, you will be able to meet these objectives: Describe the Cisco Expressway - C features and functionality within the collaboration architecture Configure and troubleshoot Cisco Unified Communications Manager and Cisco expressway Series integration Describe the Cisco Expressway - C additional features Configure and troubleshoot Cisco Collaboration solutions for B2B calls Describe how to secure B2B communication with Cisco Expressway Series Describe the MRA feature Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity Connection and Cisco IM&P Configure Cisco Webex Hybrid Services This course provides students knowledge about Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Configuring and Troubleshooting the Cisco Expressway Series Cisco Expressway Series Architecture Discovery 1: Deploy virtualized Cisco Expressway Discovery 2: Perform the initial Cisco Expressway series configuration Describe SIP and H.323 in the Cisco Expressway series Describe interworking in the Cisco Expressway series Discovery 3: Register endpoints on Cisco Expressway series Zones Digital string manipulation Search rules Transforms Discovery 4: Call search history and registrations Troubleshoot call processing on Cisco Expressway series Discovery 5: Troubleshooting tools Backup and restore Rerference Configuring Cisco Expressway Additional Freatures Describe bandwidth management Hardening local endpoint registrations Discovery 6: Configure Cisco Expressway series bandwidth management and registration restrictions Discovery 7: Troubleshoot Cisco Expressway series endpoint registration and local dial plan Describe Cisco Expressway security and clustering features Discovery 8: Configure Cisco Expressway series security features Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series Cisco unified communications manager and Cisco Expressway-C integration overview Dian plan overview Call policy Discovery 9: Configure Cisco unified communications manager to connect with Cisco Expressway-C Troubleshooting options for Cisco unified communications manager and Cisco Expressway-C intergration Discovery 10: Troubleshoot Cisco unified communications manager and Cisco Expressway series integration Discovery 11: Configure and troubleshoot Cisco unified communications manager and Cisco Expressway series integration (practice activity) References Configuring and Troubleshooting Cisco Collaboration Solutions for Bussiness-to-Bussiness Describe supported services for B2B collaboration Describe prerequisites for business to business collaboration Call flow including Cisco unified communications manager endpoints Network address translation in a collaboration environment Discovery 12: Implement a B2B Cisco collaboration solution Cisco Expressway series B2B call troubleshooting Discovery 13: Troubleshoot B2B calls on the Cisco Expressway series References Discovery 14: Troubleshoot B2B calls on the Cisco Expressway series (practice activity) Securing Business-Business Communication Firewall Traversal Secure media Secure media between Cisco unified communications manager and Cisco Expressway series Toll fraud prevention Discovery 15: Secure a B2B Cisco collaboration communication Refrences Configuring and Troubleshooting Mobile and Remote Access Describe prerequisites for mobile and remote access Describe service discovery Explore Expressway settings for MRA Certificates HTTP proxy Cisco jabber registration procedure Cisco jabber registration procedure in Hybrid deployment Cisco jabber configuration file Discovery 16: Configure MRA on the Cisco Expressway series MRA troubleshooting Discovery 17: Troubleshoot MRA on the Cisco Expressway series Integrating and Securing Mobile and Remote Access Secure Cisco unified communications integration Cisco unity connection integration Cisco MRA access control options Additional Cisco MRA features Discovery 18: Configure MRA with additional application integrations References Configuring Cisco Webex Hybrid Services Cisco Webex teams Describe Cisco Webex control hub Describe Cisco Webhex hybrid media services Describe Cisco Expressway requirements for using hybrid call service connect Explore Cisco Expressway requirements for using hybrid call service connect Describe Cisco Webex video mesh Discovery 19: Prepare for Cisco Webex teams integration Discovery 20: Configure Cisco Webex hybrid services Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI)
Delivered OnlineFlexible Dates
Price on Enquiry

Veeam Certified Architect v11 (VMCE11-A)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario

Veeam Certified Architect v11 (VMCE11-A)
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Cloud: Design and Process

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Solutions Architects, Site Reliability Engineers, Systems Operations professionals, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview Apply a tool set of questions, techniques and design considerations Define application requirements and express them objectively as KPIs, SLO's and SLI's Decompose application requirements to find the right microservice boundaries Leverage Google Cloud developer tools to set up modern, automated deployment pipelines Choose the appropriate Google Cloud Storage services based on application requirements Architect cloud and hybrid networks Implement reliable, scalable, resilient applications balancing key performance metrics with cost Choose the right Google Cloud deployment services for your applications Secure cloud applications, data and infrastructure Monitor service level objectives and costs using Stackdriver tools This course features a combination of lectures, design activities, and hands-on labs to show you how to use proven design patterns on Google Cloud to build highly reliable and efficient solutions and operate deployments that are highly available and cost-effective. This course was created for those who have already completed the Architecting with Google Compute Engine or Architecting with Google Kubernetes Engine course. Defining the Service Describe users in terms of roles and personas. Write qualitative requirements with user stories. Write quantitative requirements using key performance indicators (KPIs). Evaluate KPIs using SLOs and SLIs. Determine the quality of application requirements using SMART criteria. Microservice Design and Architecture Decompose monolithic applications into microservices. Recognize appropriate microservice boundaries. Architect stateful and stateless services to optimize scalability and reliability. Implement services using 12-factor best practices. Build loosely coupled services by implementing a well-designed REST architecture. Design consistent, standard RESTful service APIs. DevOps Automation Automate service deployment using CI/CD pipelines. Leverage Cloud Source Repositories for source and version control. Automate builds with Cloud Build and build triggers. Manage container images with Google Container Registry. Create infrastructure with code using Deployment Manager and Terraform. Choosing Storage Solutions Choose the appropriate Google Cloud data storage service based on use case, durability, availability, scalability and cost. Store binary data with Cloud Storage. Store relational data using Cloud SQL and Spanner. Store NoSQL data using Firestore and Cloud Bigtable. Cache data for fast access using Memorystore. Build a data warehouse using BigQuery. Google Cloud and Hybrid Network Architecture Design VPC networks to optimize for cost, security, and performance. Configure global and regional load balancers to provide access to services. Leverage Cloud CDN to provide lower latency and decrease network egress. Evaluate network architecture using the Cloud Network Intelligence Center. Connect networks using peering and VPNs. Create hybrid networks between Google Cloud and on-premises data centers using Cloud Interconnect. Deploying Applications to Google Cloud Choose the appropriate Google Cloud deployment service for your applications. Configure scalable, resilient infrastructure using Instance Templates and Groups. Orchestrate microservice deployments using Kubernetes and GKE. Leverage App Engine for a completely automated platform as a service (PaaS). Create serverless applications using Cloud Functions. Designing Reliable Systems Design services to meet requirements for availability, durability, and scalability. Implement fault-tolerant systems by avoiding single points of failure, correlated failures, and cascading failures. Avoid overload failures with the circuit breaker and truncated exponential backoff design patterns. Design resilient data storage with lazy deletion. Analyze disaster scenarios and plan for disaster recovery using cost/risk analysis. Security Design secure systems using best practices like separation of concerns, principle of least privilege, and regular audits. Leverage Cloud Security Command Center to help identify vulnerabilities. Simplify cloud governance using organizational policies and folders. Secure people using IAM roles, Identity-Aware Proxy, and Identity Platform. Manage the access and authorization of resources by machines and processes using service accounts. Secure networks with private IPs, firewalls, and Private Google Access. Mitigate DDoS attacks by leveraging Cloud DNS and Cloud Armor. Maintenance and Monitoring Manage new service versions using rolling updates, blue/green deployments, and canary releases. Forecast, monitor, and optimize service cost using the Google Cloud pricing calculator and billing reports and by analyzing billing data. Observe whether your services are meeting their SLOs using Cloud Monitoring and Dashboards. Use Uptime Checks to determine service availability. Respond to service outages using Cloud Monitoring Alerts. Additional course details: Nexus Humans Architecting with Google Cloud: Design and Process training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Cloud: Design and Process course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting with Google Cloud: Design and Process
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Define Infrastructure Automation and describe infrastructure deployment Describe the VMware Telco Cloud Automation infrastructure settings Configure containers as a service functionality Describe partner integration options and procedures Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Automation environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options and procedures. You will explore containers as a service and understand the workflow details of partner integration processes. You will learn about infrastructure automation and its importance in VMware Telco Cloud Automation. You will onboard and instantiate network functions and network services using hands-on lab exercises.In addition, this course teaches life cycle management workflows as well as several types of technical problems in VMware Telco Cloud Automation, which you will identify, analyze, and solve through a systematic process. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements for other applications such as vRealize Orchestrator and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day 1 Operations: Infrastructure Automation Describe infrastructure automation List the use cases of infrastructure automation List the benefits of infrastructure automation Describe the infrastructure requirements of infrastructure automation Describe the infrastructure automation domains List the steps to deploy an infrastructure using infrastructure automation Day 1 Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and VMware Telco Cloud Automation Identify the benefits of public and private infrastructures List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day 1 Operations: Containers as a Service Define containers as a service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and Tanzu Kubernetes Grid architectures List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups List the steps to support anti-affinity of workload cluster nodes Describe cluster monitoring List CaaS scale options Day 1 Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases List the benefits and challenges of using Airgap Day 1 Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day 2 Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a vCenter Server system in credential management Define the role of Keycloak in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List the roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Day 2 Operations: Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule for life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule for life cycle management in VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Perform network function and network service termination Day 2 Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of CCLI for troubleshooting Define the procedures to integrate vRealize Operations Manager with VMware Telco Cloud Automation Describe how to use vRealize Operations Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [V2.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day-zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day One Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and TCA Identify the benefits of public versus private infrastructure List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day One Operations: Containers as a Service Define Containers as a Service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures Describe supporting technologies like Cluster API List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups Describe cluster monitoring List CaaS scale options Day One Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases Day One Operations: Zero Touch Provisioning and Infrastructure Deployment Describe zero-touch provisioning List the use cases of zero-touch provisioning List the benefits of zero-touch provisioning Describe the infrastructure requirements of zero-touch provisioning Describe the zero-touch provisioning domains List the steps to deploy an infrastructure using zero-touch provisioning Day One Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day Two Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a VMware vCenter Server© system in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Summarize the role-based access control model of VMware Telco Cloud Automation Day Two Operations: Platform Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Set up Network Function and Network Service monitoring Perform Network Function and Network Service termination Day Two Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Troubleshoot using tcf_manager, app.log, and web.log Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation Usage of VMware vRealize© Operations? Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Explain how to configure an external REST API Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples

VMware Telco Cloud Automation: Install, Configure, Manage [v1.8]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon Cloud Service: Deploy and Manage on Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Determine steps and requirements to deploy or upgrade Horizon Cloud Service on Microsoft Azure Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Discuss and create Remote Desktop Session Host Farms Explain power management options in the RDSH farm Create VDI desktop assignments and entitlements Manage assignable images on Horizon Cloud Service on Microsoft Azure Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure Describe the integration of Dynamic Environment Manger with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod's environment Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to achieve competence in deploying and managing VMware Horizon© Cloud Service? on Microsoft Azure. This training increases your skills and competence in using the VMware Horizon© Cloud Administration Console and Microsoft Azure portal.Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for VDI and RDSH assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, Workspace ONE Access and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. Course Introduction Introduction and course logistics Course objectives Introduction to Horizon Cloud Service on Microsoft Azure Identify Horizon Cloud Service on Microsoft Azure features, benefits, and licensing options Interpret Horizon Cloud Service on Microsoft Azure architecture components to identify configuration prerequisite Interpret Horizon Cloud Service on Microsoft Azure deployment models Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Microsoft Azure Networking Requirements Summarize Horizon Cloud connectivity considerations and tasks Discuss Horizon Cloud on Microsoft Azure networking concepts Identify ports required for local connections, remote connections, and endpoint operating system firewall rules Active Directory List the features and limitations of supported AD configurations Discuss Horizon Cloud Service on Microsoft Azure AD integration best practices Determine Horizon Cloud Service on Microsoft Azure AD requirements Deployment and Upgrades Determine steps and requirements to deploy Horizon Cloud Service on Microsoft Azure Discuss the features and benefits of using multiple tenant subnets for desktops and RDSH Discuss the features and benefits of using Internal and External UAG Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits Creating Images Outline the process and choices to set up primary VMs Identify the configuration choices for importing primary VMs List steps to install the user software on the primary VM Identify steps to convert a configured primary VM to an assignable image Access Desktops and Applications Use Horizon Client to access desktops and remote applications Compare the remote display protocols that are available for Horizon Cloud Remote Desktop Session Host Farms List the steps and considerations to take when creating an RDSH farm List the actions that can be performed on farms listed on the console?s Farms page List the actions to assign an application to a user or group List the prerequisites and steps to create an RDSH session assignment VDI Desktops Compare a dedicated assignment to floating assignment Outline steps to create a VDI desktop assignment Explain the entitlement of desktops Managing Assignable Images Describe and manage assignable images Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure VMware Dynamic Environment Manager Identify the VMware Dynamic Environment Manager functional areas and their benefits Prepare an infrastructure for VMware Dynamic Environment Manager Outline the steps that are required to install and configure Dynamic Environment Manager components Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler App Volumes for Horizon Cloud Service on Microsoft Azure Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure Install and configure App Volumes in Horizon Cloud Service on Microsoft Azure Workspace ONE Access Describe the benefits of integrating VMware Horizon Cloud service with Workspace ONE Access. Describe how a user obtains access to an entitled virtual desktop or application from the Intelligent Hub catalog. Describe the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization. Describe the importance of configuring the Remote App Access Client in Workspace ONE Access. Summarize the steps of configuring the Access settings in Horizon Cloud control panel. Access an entitled Horizon virtual desktop or application in the Intelligent Hub catalog. Scalability Considerations Discuss the Horizon Cloud Service on Microsoft Azure scalability cost and settings Describe the usage of Universal Broker in Horizon Cloud Service on Microsoft Azure Horizon Cloud Connector Describe the features and benefits of Horizon Cloud Connector List the prerequisites and requirements to connect a Horizon pod with Horizon Cloud Connector Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod?s environment Troubleshooting Horizon Cloud Service on Microsoft Azure Discuss Horizon Cloud Service on Microsoft Azure troubleshooting basics Discuss Horizon Cloud Service troubleshooting basics Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure

VMware Horizon Cloud Service: Deploy and Manage on Microsoft Azure
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure™ architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. Course Introduction Introductions and course logistics Course objectives Day 0 Operations: VMware Telco Cloud Infrastructure Installation Describe the challenges of the telco cloud Describe the key functions of the telco cloud List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure Describe the VMware Telco Cloud Infrastructure architecture Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture List the VMware Telco Cloud Infrastructure deployment options Describe the VMware Cloud Director architecture List the key VMware components that are part of VMware Cloud Director Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure Day 0 Operations: ETSI NFV Requirements for Cloud Platforms Compare physical and virtual infrastructures List the benefits and challenges of physical infrastructure Describe the types of virtual infrastructure Describe the advantages and components of the NFV infrastructure (NFVI) Explain the role of network virtualization in the NFVI List the requirements of NFVI for VMware Cloud Director Describe the networking options of VMware Cloud Director Describe the key networking use cases Describe requirements of VMware Telco Cloud Automation? for networking Describe the storage options of VMware Cloud Director Describe the key storage use cases Day 1 Operations: Virtualized Infrastructure Manager (VIM) Configuration Explain basic concepts related to VMware Cloud Director Describe the components of the VMware Cloud Director architecture Describe the basic configuration of the VMware Cloud Director architecture Describe virtual data centers or VDCs Explain the role of organization VDCs Describe the relationship between provider VDCs and organization VDCs Describe resources in VMware Cloud Director List the key resource organization Create resource pools Describe how vSAN integrates with VMware Cloud Director Day 1 Operations: Configuring VMware Cloud Director Providers Describe how compute resources are provided to VMware Cloud Director Describe how storage resources are provided to VMware Cloud Director Describe provider VDC requirements and best practices List the requirements of creating VDCs Describe the VNF on-boarding process Create provider VDCs Day 1 Operations: Configuring VMware Cloud Director Organizations Describe VMware Cloud Director organizations Create VMware Cloud Director organizations Navigate through the VMware Cloud Director HTML5 provider portal Describe the VMware Cloud Director organization VDC Navigate through the tenant portal List use cases for a VMware Cloud Director organization VDC List the organization VDC allocation models Describe the types of resources that can be allocated Describe how resources are allocated for an organization Examine the function and requirements of network pools Describe the network types available in VMware Cloud Director (external, organization, and vApp) Create and manage organization VDC networks Describe catalogs Manage an organization?s catalog Populate, share, and publish catalogs Describe vApps Manage access to vApps and catalogs Modify the configuration of vApps and their virtual machines (VMs) Manage organization VDC networking Create affinity and anti-affinity rules Day 1 Operations: Configuring VMware Cloud Director Security Describe role-based access Create custom security roles Describe the directory services in VMware Cloud Director Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director Explain the use of VMware Cloud Director with SSO Day 1 Operations: Configuring VMware Cloud Director Networking List networking options in VMware Cloud Director Describe key networking use cases in VMware Cloud Director Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall Describe an overview of VMware NSX-T? Data Center Explain the architecture of NSX-T Data Center Describe VMware Cloud Director supported features of NSX-T Data Center Describe the benefits and challenges of multisite networking List the requirements for multisite networking Describe the benefits and challenges of networking between VDCs List the requirements for networking between VDCs Configure cross-VDC networking Day 2 Operations: VMware Cloud Director Resource Management and Monitoring Identify the key resources that need to be managed with VMware Cloud Director List monitoring options with VMware Cloud Director Explain the resource management and monitoring architecture in VMware Cloud Director Monitor objects from the VMware Cloud Director portal Identify features of VMware vRealize© Operations Manager? Integrate VMware Cloud Director with vRealize Operations Manager Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director Integrate VMware Cloud Director with the Tenant App Configure the Tenant App for VMware Cloud Director Monitor objects with the Tenant App List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? List the steps to review historical virtual machine metrics in VMware Cloud Director Examine VMware Cloud Director logs Day 2 Operations: VMware Cloud Director Troubleshooting Identify the features of the VMware Telco Cloud Automation dashboards List the components of the VMware Telco Cloud Automation dashboards Explain the features of fault management in VMware Telco Cloud Director Describe the use of fault management in VMware Cloud Director Describe the use of performance management in VMware Cloud Director Describe the use of logs in VMware Cloud Director Troubleshoot using VMware Cloud Director

VMware Telco Cloud Infrastructure: Install, Configure, Manage [V2.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Workspace ONE: Deploy and Manage [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionalities that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.Please note - This course is a combination of the VMware Workspace ONE: Skills for UEM and the VMware Workspace ONE: Integrations course. Course Introduction Introductions and course logistics Course objectives Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for the Workspace ONE solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process of integrating with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize the platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use case for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable. Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway Describe the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List view and the Details view. Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page. Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline the authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application SSO authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile SSO Outline the mobile SSO workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Workspace ONE: Deploy and Manage [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Workspace ONE: Deploy and Manage [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Workspace ONE: Deploy and Manage [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry