• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

13379 Environment courses

Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for IT professionals interested in understanding the capabilities of the MDS 9000 Series, including: Data center architects Data center engineers IT directors IT managers Network architects Network engineers Solutions architects Systems engineers Overview After taking this course, you should be able to: Describe Cisco MDS SAN features and advantages Define fixed and modular platforms Understand Cisco MDS architecture and high-availability mechanisms Identify technologies used in modern SANs Describe SAN management with Cisco Data Center Network Manager (DCNM) Explain key value-add features that distinguish Cisco MDS switches The Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.5 course gives you a technical overview of how Cisco Multilayer Director Switch (MDS) 9000 Series, can be used to build highly available and scalable storage networks with advanced security and unified management. The course is for technical decision makers and IT professionals who architect, implement, and manage data center Storage Area Network (SAN) environments. In this course, you?ll learn about key capabilities of the MDS 9000 Series, including platforms, architecture, software, management, and key features that contribute to performance, high availability, flexibility, and operational simplicity of storage environments. Define Cisco MDS Platform Overview Introduction and Advantages of Cisco MDS Fixed Platforms Modular Platforms Describe Cisco MDS Architecture Store-and-Forward Architecture High Availability Redundancy Explore Cisco MDS Key Features Virtual Storage Area Networks Port Channels Slow Drain Device and Path Analysis Using Congestion Control Mechanisms Cisco DCNM SAN Insights for SAN Analytics Zoning Smart Zoning Other Differentiating Features Examine Cisco MDS Management Cisco Data Center Network Manager Additional course details: Nexus Humans Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco MDS 9000 Series Switches Overview v1.5 (DCMDSO)
Delivered OnlineFlexible Dates
Price on Enquiry

Troubleshooting VMware vRealize Operations [V8.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators tasked with maintaining a vRealize Operations cluster Overview By the end of the course, you should be able to meet the following objectives: Identify the vRealize Operations components affected in typical troubleshooting scenarios List the environmental and operational factors that can generate problems in vRealize Operations Use self-monitoring tools to assess and troubleshoot operational issues in vRealize Operations Access CLI-based tools to assess and troubleshoot operational issues in vRealize Operations Use the vRealize Operations API tool to retrieve cluster data and perform actions Retrieve and review log files associated with specific vRealize Operations components Use available tools to troubleshoot problem scenarios in vRealize Operations Identify the best practices to ensure a vRealize Operations instance remains in a healthy state Locate resources to help you troubleshoot vRealize Operations This two-day course gives VMware vRealize© Operations? administrators the skills to perform basic troubleshooting tasks. The course also gives administrators the skills to ensure that their vRealize Operations instance meets its use-case objectives of continuous performance optimization, app-aware intelligent remediation, and integrated compliance. Course Introduction Introduction and course logistics Course objectives Running a vRealize Operations Instance Identify the components of a vRealize Operations cluster Identify common problems that affect vRealize Operations List the environmental and operational factors that can affect vRealize Operations Identify the affected components vRealize Operations Troubleshooting Tools Use vRealize Operations self-monitoring tools to troubleshoot problems Use CLI tools to troubleshoot vRealize Operations problems Identify the log files used by individual vRealize Operations components Run commands to analyze vRealize Operations log files Use the vRealize Operations API tool vRealize Operations Troubleshooting Scenarios Use relevant tools to troubleshoot problem scenarios Maintaining vRealize Operations Use best practices to ensure the vRealize Operations cluster remains in a healthy state Back up and restore vRealize Operations Identify vRealize Operations troubleshooting resources Additional course details: Nexus Humans Troubleshooting VMware vRealize Operations [V8.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Troubleshooting VMware vRealize Operations [V8.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Troubleshooting VMware vRealize Operations [V8.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Data Center engineers Cloud engineers System engineers Field engineers Implementation/operation/support/installation and upgrade specialists IT administrators Network engineers Cloud computing experts Security specialists Cisco integrators and partners Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe items to be aware of before installing a Cisco CSR 1000V, including virtual machine requirements for installing Cisco CSR 1000V, licensing options that are available with Cisco CSR 1000V, supported Cisco IOS XE technologies, and management options for Cisco CSR 1000V. Prepare for installation of Cisco CSR 1000V Series routers. Explain common Cisco IOS XE Command-Line Interface (CLI) commands and conventions that can make it easier to work in the CLI, and describe how you can get help with command syntax and command options. Describe the options you can use to activate the license for Cisco CSR 1000V and activate the license for each option. Troubleshoot issues with Cisco CSR 1000V licenses. Upgrade the Cisco IOS XE software for an existing Cisco CSR 1000V installation. Describe the Call Home feature and its benefits, configure the feature on the Cisco CSR 1000V, including the anonymous reporting option, and display the Call Home configuration. List the different Call Home events that trigger alerts and commands that are executed as a result of the alert. Troubleshoot Cisco CSR 1000V Virtual Machine (VM) issues. Rehost a Cisco CSR 1000V license to a new VM, whether the current Cisco CSR 1000V router is accessible or not. Describe the Virtual Extensible LAN (VXLAN) Layer 2 gateway feature and configure this feature on the Cisco CSR 1000V router. Deploy the Cisco CSR 1000V in a virtual private cloud using Microsoft Azure or Amazon Web Services (AWS). Describe common network operations that the Cisco CSR 1000V supports. Explore programmability support on Cisco CSR 1000V, including APIs, shells, and data models. The Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) course shows you how to deploy and operate Cisco© Cloud Services Router 1000V (CSR1000V) to provide comprehensive WAN gateway and network services functions including connectivity, routing, and security into virtual and cloud environments. Through expert instruction and hands-on labs, you will learn: Cisco CSR 1000V deployment options and requirements; hypervisor support, licensing models, features and programmability support; and how to implement, integrate, install, manage, and troubleshoot the deployment process and common operation issues.This class will help you:Learn how to use the CSR 1000V Series to extend your enterprise network to public and private cloudsGain hands-on practice acquiring skills in virtual and cloud-based technologies Course Outline Introducing Cisco CSR Product Overview Preparing for Installation Installing Cisco CSR 1000V in VMware Elastic Sky X (ESXi) Environments Booting Cisco CSR 1000V and Accessing the Console Using Cisco IOS XE Software Managing Cisco CSR 1000V Licenses Upgrading the Cisco IOS XE Software Mapping Cisco CSR 1000V Network Interfaces to Virtual Machine Network Interfaces Using GRUB Mode (Bootstrap Program) Configuring Call Home for Cisco CSR 1000V Configuring Virtual CPU (vCPU) Distribution Across Data, Control, and Service Planes Troubleshooting Cisco CSR 1000V Virtual Machine Issues Rehosting a Smart License Supporting the Cisco CSR 1000V Virtual Extensible LAN (VXLAN) Feature Deploying Cisco CSR 1000V in a Virtual Private Cloud Exploring Cisco CSR 1000V Operations Exploring Programmability on Cisco CSR 1000V

Cisco Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR)
Delivered OnlineFlexible Dates
Price on Enquiry

Juniper Networks Design Fundamentals (JNDF)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas ƒ?? data center, security, and WAN. Course IntroductionNetwork Design Fundamentals A Need for Design Knowledge is King A Proposed Design Methodology A Reference Network Understanding Customer Requirements RFP Requirements Scoping the Design Project Analyzing the Data Lab: Understanding Customer Requirements Organizing the Data Processing the Data and Requests Understanding Boundaries and Scope Design Proposal Considerations Securing the Network Why Secure the Network? Security Design Considerations Creating the Design Campus The Campus Network: An Overview Best Practices and Considerations Architectural Design Options Lab: Creating the Design Campus Creating the Design Wide Area Network The WAN: An Overview Best Practices and Considerations WAN Design Examples Lab: Creating the Design WAN Creating the Design Data Center The Data Center: An Overview Best Practices and Considerations Data Center Design Examples Lab: Creating the Design Data Center Business Continuity & Network Enhancements Business Continuity Planning High Availability Design Considerations and Best Practices Offerings and Solutions CoS and Traffic Engineering Considerations Environmental Design Network Management Designing for Network Management Automation Designing for Network Automation Lab: Enhancing the Design Putting Network Design Into Practice Network Design Recap Responding to the RFP Final Lab Introduction Lab: Putting Network Design into Practice

Juniper Networks Design Fundamentals (JNDF)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Mission Control: Management and Operations 2024

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Administrators or application owners who are responsible for deploying and managing Kubernetes clusters and workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create and manage Kubernetes clusters Control access Create image registry, network, quota, security, custom and mutation policies Connect your on-premises vSphere with Tanzu Supervisor to VMware Tanzu Mission Control Create, manage, and back up VMware Tanzu Kubernetes Grid™ clusters Create and manage Amazon Elastic Kubernetes Service clusters Perform cluster inspections Manage packages in your clusters Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply image registry, network, security, quota, custom, and mutation policies to Kubernetes environments. It focuses on how to deploy, upgrade, back up, and monitor Kubernetes clusters on VMware vSphere© with VMware Tanzu©, and it also covers package management using the VMware Tanzu Mission Control catalog. Course Introduction Introduction and course logistics Course Objectives What Is VMware Tanzu Mission Control Describe VMware Tanzu Mission Control Describe vSphere with Tanzu Describe Tanzu Kubernetes Grid Describe VMware Tanzu© for Kubernetes Operations Explain how to request access to VMware Tanzu Mission Control Describe VMware Cloud? services Describe the VMware Cloud services catalog Explain how to access VMware Tanzu Mission Control Identify the components of VMware Tanzu Mission Control Explain the resource hierarchy of VMware Tanzu Mission Control Access, Users, and Groups Explain VMware Cloud services and enterprise federation Describe VMware Cloud services roles Explain multifactor authentication Describe the VMware Tanzu Mission Control UI List the components of the VMware Tanzu Mission Control UI Describe the VMware Tanzu CLI Describe the VMware Tanzu Mission Control API Cluster Lifecycle Management Outline the steps for registering a management cluster to VMware Tanzu Mission Control Discuss what a management cluster is Describe provisioners Explain the purpose of a cloud provider account Describe Amazon Elastic Kubernetes Service Describe Azure Kubernetes Service Workload Clusters Describe Tanzu Kubernetes Grid workload clusters Explain how to create a cluster Explain how to configure a cluster Describe Amazon Elastic Kubernetes Service workload clusters Describe Azure Kubernetes Service workload clusters Explain how to attach a Kubernetes cluster Explain how to verify the connections to the cluster Describe cluster health Policy Management Explain how access policies grant users access to different resources Describe the policy model Describe the available policy types Explain how image registry policies restrict from which image registries container images can be pulled Outline how network policies are applied to clusters Discuss how security policies control deployment of pods in a cluster Discuss how quota policies manage resource consumption in your clusters Discuss how custom policies implement specialized policies that govern your Kubernetes clusters Describe mutation policies Explain how Policy Insights reports VMware Tanzu Mission Control policy issues Control Catalog Describe the VMware Tanzu Mission Control catalog Explain how to install packages Describe cert-manager Explain Service Discovery and ExternalDNS Describe Multus CNI and Whereabouts Describe Fluent-Bit Explain Prometheus and Grafana Describe Harbor Describe Flux Describe Helm Describe Git repositories Tanzu Mission Control Day 2 Operations Describe data protection Describe cluster inspections Explain life cycle management Describe VMware Aria Operations? for Applications Discuss VMware Tanzu© Service Mesh? Advanced edition Describe VMware Aria Cost? powered by CloudHealth©

VMware Tanzu Mission Control: Management and Operations 2024
Delivered OnlineFlexible Dates
Price on Enquiry

Business Analysis - Requirements Engineering

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of managing requirements (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Requirements Engineering principles and techniques. Key areas are: Requirements Engineering framework The hierarchy of requirements Key stakeholders in the framework Requirements elicitation Requirements modelling Requirements documentation Requirements analysis Requirements validation Requirements management The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The practical course provides in-depth knowledge and practice in Requirements Engineering. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The definition of strategy Strategy development External environmental analysis Internal environmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage Additional course details: Nexus Humans Business Analysis - Requirements Engineering training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Requirements Engineering course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Analysis - Requirements Engineering
Delivered OnlineFlexible Dates
Price on Enquiry

CE131 IBM DB2 SQL Workshop for Experienced Users

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for experienced SQL end users, application programmers, database administrators, and user support staff who need more advanced knowledge of SQL. Overview Discuss basic relational database concepts Use some of the OLAP features of DB2, such as GROUPing and RANKing functions Create tables, views and indexes Use referential integrity, check constraints and triggers Use outer joins, and join tables to themselves Use CASE expressions, and the CAST function Identify the impact of Summary Tables, Materialized Query Tables, and temporary tables Use complex subqueries Use a greater number of scalar SQL functions Use advanced SQL constructs, such as recursive SQL and table expressions Define User-Defined Distinct Types and User-Defined Functions Avoid several of the most common causes for poorly-performing SQL This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows. Introduction Identify the purpose of the clauses in the SELECT statement Describe the key differences among the IBM DB2 platforms Describe and use some of the OLAP features of DB2, such as GROUPING functions like CUBE and ROLLUP, and the RANK, DENSE_RANK and ROW_NUMBER functions Create Objects Code statements to: Create tables and views, Alter tables, Create indexes, Implement referential integrity (RI), and Define triggers and check constraints Identify impacts and advantages of referential integrity, including impacts of delete rules Identify considerations when using triggers and check constraints Define and make use of INSTEAD OF triggers Join Retrieve data from more than one table via inner and outer joins Use outer joins (LEFT, RIGHT, FULL) Use ANTI JOINS Join a table to itself Use UNION and UNION ALL Use EXCEPT and INTERCEPT CASE, CAST, Summary Tables, and Materialized Query Tables Identify when CASE expressions can be used Code CASE expressions in SELECT list and in the WHERE clause Identify when CAST specifications can be used Identify the advantages of using Summary (Materialized Query) Tables and Temporary tables Identify the advantages of using Materialized Query Tables (MQTs) Identify when and how to use Temporary tables Using Subqueries Code subqueries using the ALL, ANY/SOME, and EXISTS keywords Code correlated subqueries Choose the proper type of subquery to use in each case Scalar Functions Extend your knowledge of scalar functions which: Manipulate arithmetic data, Manipulate date values, and Manipulate character data Examples of scalar functions that are addressed in this course: SUBSTR POSSTR COALESCE/VALUE DECIMAL ROUND DIGITS CHAR DATE/TIME Table Expressions and Recursive SQL Identify reasons for using table expressions and recursive SQL Use nested and common table expressions Identify the difference between views and table expressions Code recursive SQL Control the depth of recursion when coding recursive SQL UDTs/UDFs and Performance Describe the concepts behind User-Defined Types, User-Defined Functions and Stored Procedures Predict when queries will use indexes to get better performance Identify concepts of predicate processing State introductory concepts about index structure State general best practices advice Additional course details: Nexus Humans CE131 IBM DB2 SQL Workshop for Experienced Users training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CE131 IBM DB2 SQL Workshop for Experienced Users course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CE131 IBM DB2 SQL Workshop for Experienced Users
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Learning Subscription Premium

By Nexus Human

Duration 45.625 Days 273.75 CPD hours Overview Live, instructor-led virtual classes: Benefit from an interactive classroom with added flexibility and convenience. Access to Red Hat certified instructors: Virtual classes are taught by the same experienced subject matter experts who lead classroom trainings. Flexible scheduling options: Various class topics and time options facilitate incorporating learning and preferences into busy schedules. Focused training sessions: Participants can narrow their learning to more specific topic areas. Choice of learning modality: A combination of self-paced materials and expert-taught classes maximizes learning. Train without traveling: Learn when, where, and how it is best for you Red Hat© Learning Subscription Premium provides a customizable learning experience with self-paced and live training options. Users can tailor their learning with recorded video classes, e-books, online content, and live virtual classes. A subscription provides access to content across the entire Red Hat product portfolio, content that is continuously updated by Red Hat experts. Live, instructor-led classes create an engaging, immersive learning experience. These interactive sessions compliment the on-demand, self-paced learning materials available with a Red Hat Learning Subscription for highly effective, flexible training for everyone from beginners to experienced professionals.This subscription provides an array of additional features to complement the learning experience. Cloud-based labs give the opportunity for hands-on practice in actual Red Hat environments. Expert extras are short, on-demand videos where Red Hat practitioners demonstrate innovative technologies in practical scenarios. Skills paths and pre-assessments are available for course selection guidance. Red Hat Learning Subscription Premium also includes certification exams. Red Hat?s exams are industry-recognized and performance-based. These exams validate that holders have the skills needed to undertake even the most ambitious technology projects. Reporting capabilities to track progress toward training and certification goals. 24x7 self-paced access to Red Hat online training and video classroom courses Content is created by Red Hat experts who build and use Red Hat technology and is directly related to Red Hat certification exams. Early access Be the first to explore in-development technology before it is officially released by accessing courses and labs in development. Cloud-based labs Get hands-on practice in authentic Red Hat environments, delivered 24x7 on six continents. Skills paths Map your learning and certification goals to one of the skills paths inside the platform to develop a strong foundation for a specific skill set. Certification exams and retakes Validate your skills through performance-based exams remotely or at a testing station. Exams can be taken when and where it's most convenient. Expert extras Red Hat field practitioners present short demo videos to supplement courses by showing innovative technologies and practices based on actual use cases. Expert chat Get direct answers and guidance from curriculum experts via a 30-minute chat session per day. Machine translations provide chat dialogue in local languages. E-book Downloads Download course e-books to continue learning offline. Reporting An individual?s dashboard provides a summary of training progress, courses and labs taken, and exam status. Management reports provide insights so a team?s engagement and progress can be measured. Globally available,translated content Access Red Hat?s most popular courses in as many as 11 languages: English, International Spanish, Brazilian Portuguese, French, Italian, German, Simplified Chinese, Korean, Japanese, Hindi, and Czech. Additional course details: Nexus Humans Red Hat Learning Subscription Premium training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Learning Subscription Premium course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Learning Subscription Premium
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments: Security architects Cloud architects Security engineers Cloud engineers System engineers Cisco integrators and partners Overview After taking this course, you should be able to: Contrast the various cloud service and deployment models. Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services. Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security. Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud. Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec. Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments. Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilities. This course shows you how to implement Cisco© cloud security solutions to secure access to the cloud, workloads in the cloud, and software as a service (SaaS) user accounts, applications, and data. This course covers usage of Cisco Cloudlock, Cisco Umbrella?, Cisco Cloud Email Security, Cisco Advanced Malware Protection (AMP) for Endpoints, Cisco Stealthwatch© Cloud and Enterprise, Cisco Firepower© NGFW (next-generation firewall), and more. Introducing the Cloud and Cloud Security Describe the Evolution of Cloud Computing Explain the Cloud Service Models Explore the Security Responsibilities Within the Infrastructure as a Service (IaaS) Service Model Explore the Security Responsibilities Within the Platform as a Service (PaaS) Service Model Explore the Security Responsibilities Within the SaaS Service Model Describe Cloud Deployment Models Describe Cloud Security Basics Implementing the Cisco Security Solution for SaaS Access Control Explore Security Challenges for Customers Using SaaS Describe User and Entity Behavior Analytics, Data Loss Prevention (DLP), and Apps Firewall Describe Cloud Access Security Broker (CASB) Describe Cisco CloudLock as the CASB Describe OAuth and OAuth Attacks Deploying Cisco Cloud-Based Security Solutions for Endpoints and Content Security Describe Cisco Cloud Security Solutions for Endpoints Describe AMP for Endpoints Architecture Describe Cisco Umbrella Describe Cisco Cloud Email Security Design Comprehensive Endpoint Security Introducing Cisco Security Solutions for Cloud Protection and Visibility Describe Network Function Virtualization (NFV) Describe Cisco Secure Architectures for Enterprises (Cisco SAFE) Describe Cisco NGFWv/Cisco Firepower Management Center Virtual Describe Cisco ASAv Describe Cisco Services Router 1000V Describe Cisco Stealthwatch Cloud Describe Cisco Tetration Cloud Zero-Trust Model Describing the Network as the Sensor and Enforcer Describe Cisco Stealthwatch Enterprise Describe Cisco ISE Functions and Personas Describe Cisco TrustSec Describe Cisco Stealthwatch and Cisco ISE Integration Describe Cisco Encrypted Traffic Analytics (ETA) Implementing Cisco Security Solutions in AWS Explain AWS Security Offerings Describe AWS Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) Discover Cisco Security Solutions in AWS Explain Cisco Stealthwatch Cloud in AWS Describing Cloud Security Management Describe Cloud Management and APIs Explain API Protection Illustrate an API Example: Integrate to ISE Using pxGrid Identify SecDevOps Best Practices Illustrate a Cisco Cloud Security Management Tool Example: Cisco Defense Orchestrator Illustrate a Cisco Cloud Security Management Tool Example: Cisco CloudCenter? Describe Cisco Application Centric Infrastructure (ACI) Describe AWS Reporting Tools Additional course details: Nexus Humans Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Securing Cloud Deployments with Cisco Technologies v1.0 (SECCLD)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Aria Automation: Install, Configure, Manage [V8.10]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Aria Automation architecture and use cases in cloud environments Describe the key services of VMware Cloud Automation Services™ Manage VMware Aria Automation entities on VMware and third-party virtual and cloud infrastructures Install VMware Aria Automation with VMware Aria Suite Lifecycle Configure and manage cloud accounts, projects, flavor mappings, image mappings, network profiles, storage profiles, volumes, tags, and services Create, modify, manage, and deploy VMware Aria Automation Templates Customize services and virtual machines with cloudConfig and cloudbase-init Configure and manage VMware Aria Automation Consumption Configure and manage ABX actions, custom properties, event broker subscriptions, and VMware Aria Automation Orchestrator workflows Connect to a Kubernetes cluster and manage namespaces Use VMware Aria Automation Config to configure and deploy systems Use logs and CLI commands to monitor and troubleshoot VMware Aria Automation During this five-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10? on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how VMware Aria Automation Consumption? can aggregate content in native formats from multiple clouds and platforms into a common catalog.This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config? as a configuration management tool. Course Introduction Introductions and course logistics Course objectives VMware Aria Automation Overview and Architecture Describe the purpose and functionality of VMware Aria Automation Identify the key services offered by VMware Aria Automation Describe the VMware Aria Automation architecture Describe the use of VMware Workspace ONE Access? Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services Installing VMware Aria Automation List the different VMware Aria Automation deployment types Describe the purpose of Easy Installer Describe the VMware Aria Automation installation process Authentication and Authorization Identify the steps to integrating Workspace ONE© Access with Active Directory Describe the features of Workspace ONE Access Describe the user roles available in VMware Aria Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping VMware Aria Automation Templates Configure and deploy a basic VMware Aria Automation template Create a VMware Aria Automation template that can run on any cloud Use cloudConfig and cloudbase-init to run commands, create users, and install software Use YAML for inputs, variables, and conditional deployments Tags Configure tags Describe functions of tags Manage tags Storage Configuration Configure storage profiles Use tags and storage profiles Integrating NSX With VMware Aria Automation List the capabilities and use cases of VMware NSX© Describe the NSX architecture and components Integrate NSX with VMware Aria Automation List the supported network profiles in VMware Aria Automation Use the NSX components to design a multitier application with VMware Aria Automation Templates Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX Day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation? accounts Integrate VMware Cloud Director? account Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Integrate VMware Cloud on AWS cloud account Using VMware Aria Automation Consumption Release a VMware Aria Automation template Define content source and content sharing Define VMware Aria Automation policy enforcement Use custom forms for catalog items VMware Aria Automation Extensibility Describe VMware Aria Automation extensibility Use event topics Create a subscription Call a VMware Aria Automation Orchestrator workflow Create ABX actions Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Create a VMware Aria Automation template with Kubernetes components Using VMware Aria Automation Config for Configuration Management Describe VMware Aria Automation Config Use VMware Aria Automation Config for software deployment Use VMware Aria Automation Config for configuration management Use VMware Aria Automation Config with event-driven orchestration VMware Aria Automation Troubleshooting and Integration Demonstrate how to monitor deployment history Demonstrate basic troubleshooting Execute CLI commands Explain how to collect logs Describe integration with VMware Aria Operations for Logs Describe integration with VMware Aria Operations

VMware Aria Automation: Install, Configure, Manage [V8.10]
Delivered OnlineFlexible Dates
Price on Enquiry