• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4071 Engineer courses

Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers System Administrators Architects Channel Partners Data Analysts Overview Upon completing this course, you will be able to meet these overall objectives: Describe how harnessing the power of your machine data enables you to make decisions based on facts, bot intuition or best guesses. Reduce the time you spend investigating incidents by up to 90%. Find and fix problems faster by learning new technical skills for real world scenarios. Get started with Splunk Enterprise, from installation and data onboarding to running search queries to creating simple reports and dashboards. Accelerate time to value with turnkey Splunk integrations for dozens of Cisco products and platforms. Ensure faster, more predictable Splunk deployments with a proven Cisco Validated Design and the latest Cisco UCS server. This course will cover how Splunk software scales to collect and index hundreds of terabytes of data per day, across multi-geography, multi-datacenter and cloud based infrastructures. Using Cisco?s Unified Computing System (UCS) Integrated Infrastructure for Big Data offers linear scalability along with operational simplification for single-rack and multiple-rack deployments. Cisco Integrated Infrastructure for Big Data and Splunk What is Cisco CPA? Architecture benefits for Splunk Components of IIBD and relationship to Splunk Architecture Cisco UCS Integrated Infrastructure for Big Data with Splunk Enterprise Splunk- Big Data Analytics NFS Configurations for the Splunk Frozen Data Storage NFS Client Configurations on the Indexers Splunk- Start Searching Chargeback Reporting Building custom reports using the report builder Application Containers Understanding Application Containers Understanding Advanced Tasks Task Library & Inputs CLI & SSH Task Understanding Compound Tasks Custom Tasks Open Automation Troubleshooting UCS Director Restart Module Loading Report Errors Feature Loading Report Registration REST API- Automation UCS Director Developer Tools Accessing REST using a REST client Accessing REST using the REST API browser Open Automation SDK Overview Open Automation vs. Custom Tasks Use Cases UCS Director PowerShell API Cisco UCS Director PowerShell Console Installing & Configuring Working with Cmdlets Cloupia Script Structure Inputs & Outputs Design Examples Additional course details: Nexus Humans Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Splunk for Cisco Integrated Infrastructure (SPLUNK)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-314 Citrix App Layering and WEM Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Built for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7 in an on-premises environment or Citrix Cloud looking to expand their Citrix Virtual Apps and Desktops skills to an advanced level. Potential students include administrators or engineers responsible for the Citrix Apps and Desktop 7 Site. Overview After completing this course you should be able to: Configure Workspace Environment Management to improve the end user environment and virtual resource consumption Implement App Layering skills, for example how to create and administer OS, platform, application, elastic and user layers Migrate to Workspace Environment Management Students will learn to build and combine App Layers to optimize management of your app and desktop images and to implement Workspace Environment Management to improve log-on times, centralize user settings management, and optimize the performance of machines. Students will leave this course with a good understanding of how to manage more complex solutions and features in their Citrix Virtual Apps and Desktop 7 site. Introduction to App Layering App Layering Introduction Architecture and How it Works The OS Layer Creating an OS Layer The Platform Layer Creating a Platform Layer The App Layers Creating App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Environment Management Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Security Features Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations Additional course details: Nexus Humans CWS-314 Citrix App Layering and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-314 Citrix App Layering and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-314 Citrix App Layering and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Security Specialist (CKS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10

Certified Kubernetes Security Specialist (CKS)
Delivered OnlineFlexible Dates
Price on Enquiry

Working with Elasticsearch (TTDS6882)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This training is ideally suited for data analysts, IT professionals, and software developers who seek to augment their data processing and analytics capabilities. It will also benefit system administrators and data engineers who wish to harness Elastic Stack's functionalities for efficient system logging, monitoring, and robust data visualization. With a focus on practical application, this course is perfect for those aspiring to solve complex data challenges in real-time environments across diverse industry verticals. Overview This course combines engaging instructor-led presentations and useful demonstrations with valuable hands-on labs and engaging group activities. Throughout the course you'll explore: New features and updates introduced in Elastic Stack 7.0 Fundamentals of Elastic Stack including Elasticsearch, Logstash, and Kibana Useful tips for using Elastic Cloud and deploying Elastic Stack in production environments How to install and configure an Elasticsearch architecture How to solve the full-text search problem with Elasticsearch Powerful analytics capabilities through aggregations using Elasticsearch How to build a data pipeline to transfer data from a variety of sources into Elasticsearch for analysis How to create interactive dashboards for effective storytelling with your data using Kibana How to secure, monitor and use Elastic Stack's alerting and reporting capabilities The Elastic Stack is a powerful combination of tools for techniques such as distributed search, analytics, logging, and visualization of data. Elastic Stack 7.0 encompasses new features and capabilities that will enable you to find unique insights into analytics using these techniques. Geared for experienced data analysts, IT professionals, and software developers who seek to augment their data processing and analytics capabilities, Working with Elasticsearch will explore how to use Elastic Stack and Elasticsearch efficiently to build powerful real-time data processing applications. Throughout the two-day hands-on course, you?ll explore the power of this robust toolset that enables advanced distributed search, analytics, logging, and visualization of data, enabled by new features in Elastic Stack 7.0. You?ll delve into the core functionalities of Elastic Stack, understanding the role of each component in constructing potent real-time data processing applications. You?ll gain proficiency in Elasticsearch for distributed searching and analytics, Logstash for logging, and Kibana for compelling data visualization. You?ll also explore the art of crafting custom plugins using Kibana and Beats, and familiarize yourself with Elastic X-Pack, a vital extension for effective security and monitoring. The course also covers essentials like Elasticsearch architecture, solving full-text search problems, data pipeline building, and creating interactive Kibana dashboards. Learn how to deploy Elastic Stack in production environments and explore the powerful analytics capabilities offered through Elasticsearch aggregations. The course will also touch upon securing, monitoring, and utilizing Elastic Stack's alerting and reporting capabilities. Hands-on labs, captivating demonstrations, and interactive group activities enrich your learning journey throughout the course. Introducing Elastic Stack What is Elasticsearch, and why use it? Exploring the components of the Elastic Stack Use cases of Elastic Stack Downloading and installing Getting Started with Elasticsearch Using the Kibana Console UI Core concepts of Elasticsearch CRUD operations Creating indexes and taking control of mapping REST API overview Searching - What is Relevant The basics of text analysis Searching from structured data Searching from the full text Writing compound queries Modeling relationships Analytics with Elasticsearch The basics of aggregations Preparing data for analysis Metric aggregations Bucket aggregations Pipeline aggregations Substantial Lab and Case Study Analyzing Log Data Log analysis challenges Using Logstash The Logstash architecture Overview of Logstash plugins Ingest node Visualizing Data with Kibana Downloading and installing Kibana Preparing data Kibana UI Timelion Using plugins

Working with Elasticsearch (TTDS6882)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Operate, Scale and Secure [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority

VMware vSphere: Operate, Scale and Secure [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators and system engineers Overview By the end of the course, you should be able to meet the following objectives: List the use cases for VMware Aria Suite Lifecycle Deploy and configure VMware Aria Suite Lifecycle Manage certificates in VMware Aria Suite Lifecycle environments Create, manage, and scale VMware Aria Suite Lifecycle environments Add VMware Aria Suite products to VMware Aria Suite Lifecycle Manage VMware Aria Suite products with VMware Aria Suite Lifecycle Use VMware Aria Suite Lifecycle to perform content life cycle management Migrate a legacy VMware Aria Suite Lifecycle instance Explain the VMware Aria Suite Lifecycle component settings Troubleshoot day-to-day operations of VMware Aria Suite Lifecycle This two-day, hands-on training course focuses on installing, configuring, and managing VMware Aria Suite Lifecycle?, which manages products such as VMware Aria Operations?, VMware Aria Operations? for Logs, and VMware Aria Automation?. This course prepares you to perform Day 0 to Day 2 operations for your environment using VMware Aria Suite Lifecycle. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Suite Lifecycle Describe the use cases for VMware Aria Suite Lifecycle List the features of VMware Aria Suite Lifecycle List system requirements for VMware Aria Suite Lifecycle Use Easy Installer to deploy VMware Aria Suite Lifecycle VMware Aria Suite Lifecycle Configuration Create Certificate Signing Requests (CSRs) for VMware Aria Suite product instances Configure VMware Aria Suite Lifecycle settings Add certificates to VMware Aria Suite product instances Add VMware Aria Suite Lifecycle environments Add VMware Aria Suite product binaries Adding VMware Aria Suite Products Deploy a new VMware Aria Suite product Manage a VMware Aria Suite product using VMware Aria Suite Lifecycle Add an existing VMware Aria Suite product to an environment VMware Aria Suite Lifecycle Day 2 Operations Perform ongoing management tasks Monitor the health of the environment Use content from the marketplace Use VMware Aria Suite Lifecycle to perform content life cycle management VMware Aria Suite Lifecyle Migration Prepare a legacy VMware Aria Suite Lifecycle instance for migration Migrate VMware Aria Suite Lifecycle using Easy Installer Troubleshooting VMware Aria Suite Lifecycle Identify the VMware Aria Suite Lifecycle component settings Describe the procedure to generate and download the log bundle Use Linux commands to assist with troubleshooting VMware Aria Suite Lifecycle Recognize entries in commonly accessed VMware Aria Suite Lifecycle log files Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for the following professionals: Data Network Engineers and Administrators Data Center Technical Managers Overview After completing the course, you should be able to: Describe the components and functionality of DCNM. Describe the software define network protocols of VXLAN, eVPN and BGP. Deploy a DCNM environment in high-availability environment. Operate the DCNM discovery process to acquire management of all devices. List high lever navigation features of DCNM and utilize the DCNM GUI (Graphical User Interface) to optimize data center topologies. Manage and monitor data center LAN fabric from DCNM. Program RESTful APIs native to DCNM to perform any network management task. Troubleshoot and monitor the network using DCNM troubleshooting tools. Describe the benefits of DCNM Network Insights. The course, Managing LAN Infrastructure with Cisco Data Center Network Manager (DCNML) v1.0 enhances your knowledge of managing LAN Infrastructure with Cisco Data Center Network Manager (DCNM) implementing a spine-and-leaf network fabric using DCNM with Virtual Extensible LAN (VXLAN), Ethernet VPN (EVPN), and Border Gateway Protocol (BGP). You will learn how the integration of spine-and-leaf network fabric with Cisco Data Center Network Manager increases overall data center infrastructure uptime and reliability, thereby improving business continuity. It provides a robust framework and comprehensive feature set that meets the routing, switching, and storage administration needs of data centers. Cisco DCNM streamlines the provisioning for the unified fabric and monitors the SAN (Storage area network) and LAN (Local area network) components. Introducing Cisco DCNM LAN Cisco DCNM Introduction Cisco DCNM LAN Solution Overview Deploying VXLAN EVPN with Cisco DCNM LAN VXLAN Overlays and Underlays Easy Fabric VXLAN EVPN Underlay Model Deploying Cisco DCNM Cisco DCNM High Availability Cisco DCNM Installation Requirements Discovering Existing Network Devices with Cisco DCNM Configure Switches for Discovery Exploring the Data Center with Cisco DCNM Topology Access Topology View in the GUI Navigate the Map Views and Layouts Managing and Monitoring the Data Center with Cisco DCNM LAN Manage the Configuration Archive Deploy Changes to the Fabric Automating Cisco DCNM Programmatically Explore APIs for the Network REST API Tool Troubleshooting and Monitoring Cisco DCNM Troubleshoot and Monitor Cisco DCNM Describing Network Insights Network Insights Advisor Additional course details: Nexus Humans Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Managing LAN Infrastructure with Cisco Data Center Network Manager v1.1 (DCNML)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-251 Implement Citrix DaaS on Microsoft Azure

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Prepare the Azure environment for secure integration with Citrix DaaS. Deploy and manage Virtual Delivery Agent machines in Microsoft Azure using Machine Creation Services. Integrate Citrix Cloud and Citrix DaaS with Microsoft Azure Active Directory. Design Machine Catalogs and virtual machines on Microsoft Azure Resource Manager. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you willLearn to deploy and manage your Citrix DaaS deployment on Microsoft Azure. Gain the skills to plan your machine catalog and virtual machine design based in Microsoft's public cloud and get hands-on practice deploying those machines using Machine Creation Services. You will also learn about additional Azure considerations including maintenance and power management which are critical in a cloud environment. For remote access, you will learn to configure Citrix StoreFront and Citrix Gateway on the Azure platform. This course focuses on Microsoft Azure as a Citrix Cloud resource location however concepts are relevant to both Citrix Cloud and fully managed Citrix DaaS sites. Module 1: Introduction to Citrix DaaS on Microsoft Azure Partnering for Success Module 2: Planning - Citrix DaaS Resource Location on Microsoft Azure Overview of Citrix DaaS Components Creating a Citrix DaaS Deployment Overview Module 3: Planning - Microsoft Azure Overview Azure Virtual Network Structure Azure Virtual Network Connectivity Azure Virtual Resources Azure Active Directory Identity and Access Management Azure Active Directory Options and Considerations Module 4: Planning - Deploying Citrix DaaS on Microsoft Azure Citrix DaaS Resource Locations in Azure Citrix DaaS Components in Azure Creating and Managing Workloads in an Azure Resource Location Module 5: Planning - Provide Access to End Users Providing Access to Resources in Citrix Cloud Citrix Gateway Deployment Options Deploying Citrix Gateway or ADC in Azure GSLB and StoreFront Optimal Gateway in Hybrid Environments Module 6: Rollout - Citrix DaaS Deployment on Microsoft Azure Citrix Workspace App Rollout Preparing Migration of End-Users to Workspace Platform Module 7: Managing - Citrix DaaS Workloads on Microsoft Azure Maintaining Citrix Gateway Backup and Monitoring in Azure Maintaining Master Images in Azure Monitoring VDAs in Manage Console and Azure Module 8: Optimize - Citrix DaaS on Microsoft Azure Managing Azure Costs Using Azure Pricing Calculator - Instructor Demo Student Exercise - Calculate a case Additional course details: Nexus Humans CWS-251 Implement Citrix DaaS on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-251 Implement Citrix DaaS on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-251 Implement Citrix DaaS on Microsoft Azure
Delivered OnlineFlexible Dates
Price on Enquiry

Logging, Monitoring and Observability in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following customer job roles: Cloud architects, administrators, and SysOps personnel Cloud developers and DevOps personnel Overview This course teaches participants the following skills: Plan and implement a well-architected logging and monitoring infrastructure Define Service Level Indicators (SLIs) and Service Level Objectives (SLOs) Create effective monitoring dashboards and alerts Monitor, troubleshoot, and improve Google Cloud infrastructure Analyze and export Google Cloud audit logs Find production code defects, identify bottlenecks, and improve performance Optimize monitoring costs This course teaches you techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud. Guided by the principles of Site Reliability Engineering (SRE), and using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage. Introduction to Google Cloud Monitoring Tools Understand the purpose and capabilities of Google Cloud operations-focused components: Logging, Monitoring, Error Reporting, and Service Monitoring Understand the purpose and capabilities of Google Cloud application performance management focused components: Debugger, Trace, and Profiler Avoiding Customer Pain Construct a monitoring base on the four golden signals: latency, traffic, errors, and saturation Measure customer pain with SLIs Define critical performance measures Create and use SLOs and SLAs Achieve developer and operation harmony with error budgets Alerting Policies Develop alerting strategies Define alerting policies Add notification channels Identify types of alerts and common uses for each Construct and alert on resource groups Manage alerting policies programmatically Monitoring Critical Systems Choose best practice monitoring project architectures Differentiate Cloud IAM roles for monitoring Use the default dashboards appropriately Build custom dashboards to show resource consumption and application load Define uptime checks to track aliveness and latency Configuring Google Cloud Services for Observability Integrate logging and monitoring agents into Compute Engine VMs and images Enable and utilize Kubernetes Monitoring Extend and clarify Kubernetes monitoring with Prometheus Expose custom metrics through code, and with the help of OpenCensus Advanced Logging and Analysis Identify and choose among resource tagging approaches Define log sinks (inclusion filters) and exclusion filters Create metrics based on logs Define custom metrics Link application errors to Logging using Error Reporting Export logs to BigQuery Monitoring Network Security and Audit Logs Collect and analyze VPC Flow logs and Firewall Rules logs Enable and monitor Packet Mirroring Explain the capabilities of Network Intelligence Center Use Admin Activity audit logs to track changes to the configuration or metadata of resources Use Data Access audit logs to track accesses or changes to user-provided resource data Use System Event audit logs to track GCP administrative actions Managing Incidents Define incident management roles and communication channels Mitigate incident impact Troubleshoot root causes Resolve incidents Document incidents in a post-mortem process Investigating Application Performance Issues Debug production code to correct code defects Trace latency through layers of service interaction to eliminate performance bottlenecks Profile and identify resource-intensive functions in an application Optimizing the Costs of Monitoring Analyze resource utilization cust for monitoring related components within Google Cloud Implement best practices for controlling the cost of monitoring within Google Cloud

Logging, Monitoring and Observability in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced AWS Well-Architected Best Practices

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Learners who will find this course applicable to their work include: Solutions architects Cloud practitioners Data engineers Data scientists Developers Overview In this course, you will explore: Workload definition and key concepts The AWS Well-Architected Framework Review phases, process, best practices, and antipatterns High and medium risks Prioritizing improvements to the AWS Well-Architected workflow Locating and using the AWS Well-Architected Framework white paper, labs, prebuilt solutions in the AWS solutions library, AWS Well-Architected independent software vendors (ISVs), and AWS Well-Architected Partner Program (WAPP) This interactive course provides a deep dive into Amazon Web Services (AWS) best practices to help you perform effective and efficient AWS Well-Architected Framework Reviews. The course covers the phases of a review, including how to prepare, run, and get guidance after a review has been performed. Attendees should have familiarity with the AWS concepts, terminology, services, and tools that are covered in the intermediate, 200-levelAWS Well-Architected Best Practices.This course provides an AWS Well-Architected Framework Review simulation and instructor-led group exercises and discussions regarding prioritizing and solutioning risks. The content focuses on teaching learners how to prepare proposals on high and medium risk issues using the AWS Well-Architected Tool. Module 1: AWS Well-Architected Framework Reviews Workload definition Key concepts of a workload AWS Well-Architected Review phases AWS Well-Architected Review approach, lessons learned, and use case AWS Well-Architected Review best practices AWS Well-Architected Review anti-patterns Module 2: Customer Scenario Group Sessions Demonstration of a Review question and answer example Operational excellence Group role-play exercise Two questions in this pillar Security Group role-play exercise Three questions in this pillar Reliability Group role-play exercise Three questions in this pillar Performance efficiency Group role-play exercise Three questions in this pillar Cost optimization Group role-play exercise Three questions in this pillar Module 3: Risk Solutions and Priorities AWS Well-Architected workflow Defining and solutioning high risk issues (HRIs) and medium risk issues (MRIs) Identifying significant risks and solutioning group discussion for: Operational excellence Security Reliability Performance efficiency Cost optimization Prioritizing improvements Module 4: Resources Resource pages AWS Well-Architected ISVs Module 5: Course Summary Objective recap Debrief What?s next? Additional course details: Nexus Humans Advanced AWS Well-Architected Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced AWS Well-Architected Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced AWS Well-Architected Best Practices
Delivered OnlineFlexible Dates
Price on Enquiry