• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3072 FA courses in Cardiff delivered Live Online

Developing Emotional Intelligence

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who want to recognize and manage their emotions, behaviors and impulses and apply these skills to the world around them. Overview Upon successful completion of the Developing Emotional Intelligence course, participants will have the tools to gain control over emotions, navigate challenging situations, and communicate empathetically. In this course, students will develop the skill of emotional intelligence to help maximize personal and professional success. Module One: Getting Started Getting Started Module Two: Introduction to Emotional Intelligence Defining Emotional Intelligence The Importance of EI Who Needs It? What Are Emotions? EQ vs. IQ Practical Illustration Module Three: The Components of EI Self-Management Self-Awareness Social Skills Internal Motivation Empathy Practical Illustration Module Four: Tools to Gain Control Journaling Meditation and Mindfulness Identifying Emotional Triggers Breathing Techniques Taking a Break Practical Illustration Module Five: Verbal Communication Skills Active Listening Asking Questions Consider Your Audience Choosing Your Words Be Authentic Practical Illustration Module Six: Nonverbal Communication Skills Body Language Tone Matters Facial Expressions Eye Contact Distance and Personal Space Practical Illustration Module Seven: Managing Relationships With Others Building Rapport Respond, Don?t React Show Gratitude Finding Common Ground Setting Boundaries Practical Illustration Module Eight: Overcoming Obstacles Recognizing and Admitting Failure Disagreeing Constructively Staying Cool Under Pressure Be Open to Perspectives The Power of Forgiveness Practical Illustration Module Nine: Application to Business Practices Working as a Team Setting Business Goals Interviewing for Successful Hires Giving and Receiving Feedback Customer Experience and Rapport Practical Illustration Module Ten: Benefits of Being Emotionally Aware Strong Interpersonal Relationships Able to Manage Change Reduced Stress and Anxiety Improved Decision Making Boosts Employee Morale Practical Illustration Module Eleven: Making an Impact Creating a Powerful First Impression Maintaining Your Composure Inspiring Leadership Gaining Self-Confidence Patience and Practice Practical Illustration Module Twelve: Wrapping Up Words from the Wise Additional course details: Nexus Humans Developing Emotional Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Developing Emotional Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Developing Emotional Intelligence
Delivered OnlineFlexible Dates
Price on Enquiry

CCES Check Point Certified Endpoint Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCES Check Point Certified Endpoint Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an Intermediate and beyond-level Tableau course geared for experienced Tableau users who wish to leverage Tableau's more advanced capabilities. Overview This skills-focused course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: Understand what data works best with Tableau Desktop and how to shape and clean it appropriately to get Learn how to maximize flexibility from Tableau Desktop. Learn how Tableau Prep folds into the analytic cycle, and when to prep data in Tableau Prep vs. Tableau Desktop. Understand the terminology used in Tableau Prep. Know how Tableau Prep approaches data sampling. Create and understand data prep flows that address common scenarios encountered in data preparation, as applied to common data use cases Know how to view data prepared in Tableau Prep using Tableau Desktop. Understand data exploration and validation in Tableau Prep and Tableau Desktop. Geared for experienced Tableau Users, Tableau Prep Building (Tableau Data Prep) for Experienced Users is a two-day hands-on course designed to provide you with the tools and knowledge of how to prepare and shape data in Tableau Prep. It?s best suited for people who have 3-6 months experience in Tableau Desktop and are somewhat familiar with writing calculations. Throughout the course, our instructors will take you from conceptual data preparation material to creating useful Tableau Prep flows that can be output to Tableau Desktop for analysisNOTE: The Tableau Training Series is independent-format training that can be tuned and adjusted to best meet your needs. Our materials are flexible, comprehensive, and are always instructed by a senior instructor with a deep understanding of Tableau and its most current features, benefits and functionality in a wide array of uses. This is not Official Tableau Training. Course Outline Introduction to the workspace Introduction to the workflow Data literacy concepts Connecting to and configuring data Exploring data Cleaning data Preferred data structures in Tableau Shaping data Combining data Opening a data sample and creating an output file Best practices for data preparation Complex flows Starting with a question Hands-on data preparation Additional course details: Nexus Humans Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010)
Delivered OnlineFlexible Dates
Price on Enquiry

AI for beginners

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course does not have any technical knowledge prerequisites for the learners, besides being proficient in using a computer and the Internet. IT and/or AI knowledge is a benefit but not a hard requirement. Given the rapid development of AI and the broad range of its applications in everyday life, it is crucial for anyone to attend this course to update their digital skills in an ever-changing world. It is expected that all learners have registered for a free account of OpenAI ChatGPT at https://chat.openai.com. Overview Discover how AI relates to other 4th industrial revolution technologies Learn about AI, ML, and associated cognitive services Overview of AI development frameworks, tools and services Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail The core aim of this ?AI for beginners? course is to introduce its audience to Artificial Intelligence (AI) and Machine Learning (ML) technologies and allow them to understand the practical applications of AI in their everyday personal and professional life. Moreover, the course aims to provide a handful of demos and hands-on exercises to allow the learners to familiarize themselves with usage scenarios of OpenAI ChatGPT and other Generative AI (GenAI) models. The content of this course has been created primarily by using the OpenAI ChatGPT model. AI theoretical concepts. Introduction to AI, ML, and associated cognitive services (Computer vision, Natural language processing, Speech analysis, Decision making). How AI relates to other 4th industrial revolution technologies (cloud computing, edge computing, internet of things, blockchain, metaverse, robotics, quantum computing). AI model classification by utilizing mind maps and the distinctive role of Gen AI models. Introduction to the OpenAI ChatGPT model and alternative generative AI models. Familiarization with the basics of the ChatGPT interface (https://chat.openai.com). Talking about Responsible AI: Security, privacy, compliance, copyright, legal challenges, and ethical implications. AI practical applications Overview of AI development frameworks, tools and services. AI aggregators review. Hand-picked AI tool demos: a.Workplace productivity and the case of Microsoft 365 Copilot. b.The content creation industry. Create text, code, images, audio and video with Gen AI. c.Redefining the education sector with AI-powered learning. Evaluate the OpenAI ChatGPT4 / ChatGPT3.5 model features in more detail: a.Prompting and plugin demos. b.Code interpreter demos. Closing words. Discussion with an AI model on the future of AI. Additional course details: Nexus Humans AI for beginners training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI for beginners course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AI for beginners
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Data Center Automation with vRealize Orchestrator and vSphere PowerCLI

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced vSphere administrators who want to use available tools to automate day-to-day tasks. Overview By the end of the course, you should be able to meet the following objectives:Describe the features and benefits of automation in a vSphere environmentUnderstand the role of the vSphere Web services API in automationUse the Managed Object Browser to view the structure of the vSphere Web services API and theVMware vCenter Server? inventoryUse vSphere PowerCLI to deploy and manage virtual machines and virtual infrastructureRun and manage vRealize Orchestrator workflows from the libraryDesign, develop, and run custom, reusable vRealize Orchestrator workflowsIncorporate JavaScript into vRealize Orchestrator workflowsSelect the appropriate tool for automating tasks in vCenter Server This course equips experienced administrators with the knowledge to use the automation tools that all vSphere customers have access to. Students learn how to automate administration tasks with VMware vSphere© PowerCLI? and VMware vRealize© Orchestrator?. Course Introduction Introductions and course logistics Course objectives Automation in vSphere Identify the features and the advantages of automation List the tools used to automate vCenter Server tasks vSphere API Identify the function of an API Recognize the components of VMware vSphere© API Understand how an API is consumed View objects and invoke methods with the Managed Object Browser vSphere PowerCLI Basics Connect vSphere PowerCLI to vCenter Server systems and VMware ESXi? hosts Understand vSphere PowerCLI concepts Use vSphere PowerCLI cmdlets Deploy and manage virtual infrastructure Advanced vSphere PowerCLI and the vSphere API Explore the vSphere object model Capture code with Onyx Use vSphere API documentation to analyze vCenter Server actions View objects with the Get-View cmdlet vSphere PowerCLI Use Cases Manage host networking Create a distributed switch Migrate hosts Create reports vRealize Orchestrator Basics Identify workflow components Run and manage library workflows Edit a workflow Build and schedule a simple workflow Debug a workflow vRealize Orchestrator Advanced Identify and use advanced vRealize Orchestrator workflow elements Implement vRealize Orchestrator workflow nesting Use variable types in a workflow Use JavaScript to create complex workflows Incorporate an Oynx script in a workflow vRealize Orchestrator Use Cases Create automation workflows that map to real-world scenarios Create reporting workflows that map to real-world scenarios Create migration workflows that map to real-world scenarios Create provisioning workflows that map to real-world scenarios vRealize Orchestrator PowerCLI Plug-In Invoke external scripts and pass workflow parameters as script inputs Generate new vRealize Orchestrator actions from Windows PowerShell and vSphere PowerCLI scripts and cmdlets Browse snap-ins and their associated cmdlets in the vRealize Orchestrator workflow editor vRealize Orchestrator Integration Understand the connectivity options for vRealize Orchestrator Differentiate between north-facing and south facing APIs List the APIs and their use cases Run a workflow through a REST call Guest Operations with vRealize Orchestrator and vSphere PowerCLI Use the most appropriate tools to perform guest operations Software Development Process & Tools Understand the software development lifecycle Understand version control system tools Map the correct tools to vRealize Orchestrator and vSphere PowerCLI

VMware Data Center Automation with vRealize Orchestrator and vSphere PowerCLI
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Test Automation Essentials (TT3511)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The content is appropriate for test automation engineering roles, test manager roles, test lead roles, test architect roles, as well as developer roles. This course assumes you have a foundational understanding of testing and the purpose of automation. This course will be beneficial to anyone who is accountable for assessing, planning, designing, and implementing an integrated set of technology (testing infrastructure) that supports development, testing, and deployment. Overview Working in an interactive learning environment, led by our expert facilitator, attendees will learn to: Document the current state of test automation in your organization Define a custom test automation plan and architecture to fit their situation Create an initial implementation plan Identify initial key measures Develop a metrics dashboard for tracking the value of test automation Lay out a future strategy and roadmap to get there Introduction to Test Automation is a one-day, hands-on event designed to provide participants with the skills required to develop a custom test automation plan and architecture for their organization. Throughout the course, students will examine and work through various practical examples, learning how to create an integrated test automation plan and develop a test automation architecture. Participants will also learn about the possible real-world challenges they may face while trying to accomplish their goals, exploring the practical positive aspects of engaging their technical team, along with the possible frustrations of experiencing too much isolation between test automators and test designers. Getting Started Automation beginnings Software as a series of imperfect translations The Compelling Business Needs for Automation Automation the next opportunity Islands of Automation Getting products to market more quickly, at the right costs and quality Automation Challenges and Requirements Automation Challenges Test Automation Key Requirements Foundational material for your automation plan Templates Questions Examples Virtual Consulting included with this course Automation plan vision and strategy Vision, Strategy, Approach Example Defining your end in mind Deciding where to start Engaging Others Conducting a current state tools inventory Assessing your current state - tools and processes Tools inventory example and template Radar Chart as a means of presenting current state information Consider the best automation approach Waterfall vs. agile cycles of work Aligning tools with your methodologies Strategies for Automating The Test Automation Pyramid Developing your test automation architecture Blocks of automation capabilities Islands of Automation Integrated Tools Architecture Template Integrated Tools Architecture Examples Test automation architecture examples Examples of different test automation architectures and frameworks Selenium Key Test Automation Architecture Characteristics Acceptance test-driven and behavior-driven testing overview Test automation approaches FitNesse Cucumber Gherkin script overview Tool workflow Considerations for what to automate and when Categories of tests that might be automated We have many tool choices Key points in Test Tool Architecture Planning Piloting and Implementing automation Selecting and evaluating tools and rolling them out Selling Automation - qualitative questions Selling Automation - quantitative questions Measuring automation benefits Measures in technical terms Measures in business terms Measures of testing vs. measures of test automation Next Steps A few keys to success

Introduction to Test Automation Essentials (TT3511)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Security Specialist (CKS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10

Certified Kubernetes Security Specialist (CKS)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Certified Solutions Architect - Associate

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This course is intended for individuals who have basic knowledge on cloud computing; on-premise system administrators; IT specialists, interested in AWS and Cloud Technologies. Overview Upon successful completion of this course, students will know how to design and deploy scalable, highly accessible and fault-tolerant systems in AWS. In this course, students will learn the main 'Managed Service' offered by AWS; How to design and deploy scalable, highly accessible and fault-tolerant systems in AWS; How to choose the most appropriate AWS service. Introduction Course overview Exam Blue Print Public clouds & cloud economics AWS Overview & Whitepapers Setting up AWS Account Identity and Access Management (IAM) Local users, groups & roles SAML providers Policies Cross Account Access Best practices & Examples Lab Exam highlights Sample questions Simple Storage Service (S3) & Glacier Buckets Objects Lifecycle Configurations and permissions Custom bucket policies Best Practices & Examples Lab Exam highlights Sample questions Virtual Private Cloud (VPC) VPC Internet gateway vs NAT Gateway Elastic IPs Subnets & Routing tables Security Groups & Network Access Lists VPC Peering & Endpoints Managed VPN Connections Best Practices & Examples Lab Exam highlights Sample questions Elastic Compute Cloud (EC2) Instances Amazon Machine Images(AMIs) Elastic Block Store (EBS) Network & Security Load Balancers (ELB) Auto Scaling Groups (ASG) Instance Management Best Practices & Examples Lab Exam highlights Sample questions Route 53 Hosted Zones Health checks Traffic flow Best Practices & Examples Lab Exam highlights Sample questions Relational Database Service (RDS) Engine types Performance & Resilience Subnet groups Best Practices & Examples Lab Exam highlights Sample questions CloudWatch Dashboard and Metrics CloudWatch logs CloudWatch rules Best Practices & Examples Lab Exam highlights Sample questions Other AWS Services Simple Overview CloudFront DynamoDB Elasticache Redshift SQS SWF SNS Elastic Transcoder API Gateway Kenesis CloudFormation Exam highlights Sample questions Multiple AWS Services exercise Lab 1 - Architecting multi-tier environment Lab 2 - Configure backup and monitoring Practice Exam Additional course details: Nexus Humans AWS Certified Solutions Architect - Associate training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Certified Solutions Architect - Associate course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Certified Solutions Architect - Associate
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Operate, Scale and Secure [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority

VMware vSphere: Operate, Scale and Secure [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry