Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client⢠systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access⢠and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere© Client? to access your Center Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a Horizon administrator and custom roles Describe the roles available in a Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a Horizon environment Workspace ONE Access & Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Describe BLAST and PCoIP ADMX GPO common configurations Graphic Cards Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure Horizon connections Describe how to restrict Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Tier 1 system administrators, and integrators responsible for managing and maintaining VMware Horizon Infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Describe the installation, architecture, and requirements of Horizon Connection Server Describe the authentication and certificate options for a VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access and VMware Horizon Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in VMware Horizon Discuss the scalability options available in VMware Horizon Describe the different security options for VMware Horizon environments Discuss the advanced configurations of Horizon Connection Server List the troubleshooting techniques for common Horizon Connection Server issues Interpret the Horizon Connection Server logs Identify Unified Access Gateway configuration and certificate issues List the troubleshooting steps for common Unified Access Gateway common issues Describe Blast configuration verification using logs and settings Describe the Blast optimization recommendations for different use cases Describe VMware Horizon connections and how to troubleshoot related problems Describe VMware Horizon certificates List the troubleshooting steps for common VMware Horizon certificates issues Describe Cloud Pod Architecture troubleshooting scenarios Identify and fix problems in a VMware Horizon environment VMware Horizon 8: Infrastructure Administrator and Troubleshooting is a five-day combination course of VMware Horizon 8: Infrastructure Administration & VMware Horizon 8: Infrastructure Troubleshooting. This training collection gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon© through a combination of lecture and hands-on labs. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Also, this course provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon 8 infrastructure. This workshop teaches the required skill and competence for troubleshooting Horizon Connection Server, Unified Access Gateway, protocols, connections, and certificates. This course provides a challenge lab designed to present participants with infrastructure issues that may arise in actual Horizon environments. The lab objective is to put into practice the contents covered during the training to create a working environment. Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the supported features of Horizon Connection Server Identify the recommended system requirements for Horizon Connection Server Configure the VMware Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD Lightweight Directory Service (LDS) database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the smart card authentication options that Horizon Connection Server supports Outline the steps to create a VMware Horizon administrator and custom roles Describe the roles available in a VMware Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a VMware Horizon environment Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Describe the features of the Workspace ONE Access console Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace ONE services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe Blast Describe the Blast display protocol codecs Summarize the Blast codec options List the ideal applications for each Blast codec Describe Blast and PCoIP ADMX GPO common configurations Graphics Cards Describe the 3D rendering options available in Vmware Horizon Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a VMware Horizon environment Configure a load balancer for use in a VMware Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure VMware Horizon connections Describe how to restrict VMware Horizon connections Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List the Unified Access Gateway firewall rules Describe the situations in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Troubleshooting Horizon Connection Server Identify the general troubleshooting techniques for Horizon Connection Server Explain how to use logs to identify common Horizon Connection Server problems Describe AD LDS replication Discuss common Horizon Connection Server replication issues Explain how to interpret Horizon Connection Server logs Compare successful and unsuccessful logs from common infrastructure administration tasks Troubleshooting Unified Access Gateway Identify common Unified Access Gateway deployment issues Explain how to monitor the health of a Unified Access Gateway deployment Identify and troubleshoot Unified Access Gateway certificate issues Explain how to monitor, test, and troubleshoot network errors using tcpdump and curl Detail the general Unified Access Gateway troubleshooting methods Blast Configuration Discuss Blast codecs and Encoder Switch settings Describe how to verify BLAST configuration using logs and settings Optimizing Blast List general Blast optimization recommendations Summarize Blast tuning recommendations that apply to WAN connections Summarize Blast tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe the recommended tuning options to increase display protocol quality for all use cases and applications Troubleshooting VMware Horizon Connections Explain VMware Horizon connections Describe the role of primary and secondary protocols in VMware Horizon connections Describe HTML client access connections Describe Horizon Connections load balancing Describe timeout settings, supported health monitoring strings, and suitable load balancer persistence values Identify the troubleshooting steps for failing VMware Horizon load balancer connections List the steps for troubleshooting VMware Horizon connections Troubleshooting VMware Horizon Certificates List the functions of VMware Horizon certificates Describe VMware Horizon certificate scenarios Discuss potential challenges related to certificates in VMware Horizon Describe the troubleshooting approach to VMware Horizon certificates issues Cloud Pod Architecture Describe Cloud Pod Architecture troubleshooting scenarios Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Infrastructure Administration and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Infrastructure Administration and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Discuss the requirements for deploying Horizon Cloud Service on Microsoft Azure Demonstrate how to deploy or upgrade Horizon Cloud Service on Microsoft Azure Identify the Horizon Cloud Service console controls that are available to administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image List the steps to install the user software on the primary VM Describe pools and pool groups Explain the creation process and configuration options for single-session and multisession pools and pool groups Create single-session and multisession assignments and entitlements Explain power management options in the multisession pool groups Manage assignable images on Horizon Cloud Service on Microsoft Azure Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Describe the integration of VMware Dynamic Environment Manager with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the VMware Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to successfully deploy and manage VMware Horizon© Cloud Service? on Microsoft Azure. This training also teaches you how to use the VMware Horizon Cloud administration console and Microsoft Azure portal. Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for single and multisession assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, VMware Workspace ONE© Access?, and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. Course Introduction Introduction and course logistics Course objectives Introduction to Horizon Cloud Service on Microsoft Azure Discuss the features and benefits of Horizon Cloud Service on Microsoft Azure Identify the available Horizon Cloud and Microsoft licensing options Identify the system architecture components of Horizon Cloud Service on Microsoft Azure Explain how VMware Dynamic Environment Manager is used in Horizon Cloud profile management Describe Horizon Cloud application management using App Volumes Identify the Microsoft Azure configuration prerequisites for a Horizon Cloud integration Identify the main Microsoft Azure components required for a Horizon Cloud deployment Review the virtual machines supported in Horizon Cloud Service on Microsoft Azure Microsoft Azure Networking Requirements Discuss Horizon Cloud connectivity considerations and tasks Explain the networking concepts for Horizon Cloud Service on Microsoft Azure Identify the ports required for local connections, remote connections, and endpoint OS firewall rules Identity Management Explain computer identity type and user identity type Discuss the best practices for Horizon Cloud Service on Microsoft Azure AD integrations Determine the requirements for Horizon Cloud Service on Microsoft Azure AD Describe the benefits of integrating Horizon Cloud with Workspace ONE Access Explain how a user obtains access to an entitled virtual desktop or application from the VMware Workspace ONE© Intelligent Hub catalog Discuss the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization Discuss the importance of configuring the Remote App Access client in Workspace ONE Access Demonstrate how to access an entitled Horizon virtual desktop or application in the Workspace ONE Intelligent Hub catalog Deployment and Upgrades Explain the steps and requirements for deploying Horizon Cloud Service on Microsoft Azure Describe the features and benefits of Horizon Edge Describe the differences between internal and external gateways Outline the Horizon Universal Console controls available for administrators Identify the features and benefits of the Horizon Cloud upgrades Creating Images Outline the process and configuration choices for setting up primary VMs Identify the configuration choices for importing primary VMs List the steps to install the user software on the primary VM Explain how to convert a configured primary VM to an assignable image Describe pools and pool groups List the steps for configuring an image to a pool List the steps for configuring an image to a pool group Pool Groups Compare dedicated assignments to floating assignments Outline the steps for creating single-session and multisession assignment Explain the entitlement of pool groups Outline the creation process and configuration options for multisession pools and pool groups Explain the power management selections in the multisession pool groups Compare the rolling maintenance and loadbalancing options Identify the actions related to the multisession groups page Identify the actions to add and assign applications to a user or group Outline the prerequisites for entitling a multisession assignment Access Desktops and Applications Identify the different versions of Horizon Client Describe how to access desktops and remote applications with Horizon Client Describe how to access desktops and remote applications with a browser Compare the remote display protocols that are available for Horizon Cloud Describe the Blast Extreme display protocol codecs List the ideal applications for each Blast Extreme codec Describe the Blast Extreme policy configurations Managing Images Describe images Explain how to manage images VMware Dynamic Environment Manager on Horizon Cloud Service on Microsoft Azure Identify the functional areas of VMware Dynamic Environment Manager and their benefits Explain how to use the VMware Dynamic Environment Manager console and application profiler to manage user personalization and application configurations App Volumes for Horizon Cloud Service on Microsoft Azure Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure Demonstrate how to configure App Volumes in Horizon Cloud Service on Microsoft Azure Scalability Considerations Recognize the scalability settings for Horizon Cloud Service on Microsoft Azure Troubleshooting Horizon Cloud Service on Microsoft Azure Explain the troubleshooting basics for Horizon Cloud Service on Microsoft Azure Identify the analytics and monitoring capabilities of Horizon Cloud Service on Microsoft Azure Explain the troubleshooting basics for Horizon Cloud Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon Cloud Service Next Gen on Microsoft Azure: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This course aims to prepare individuals for the AWS Certified Solutions Architect Associate exam. It covers essential AWS services, cloud architecture design, deployment strategies, and best practices for managing various AWS components. Learning Outcomes: Understand the fundamental concepts of AWS Cloud Services and their application in real-world scenarios. Design and implement AWS Storage and Virtual Private Cloud (VPC) solutions. Learn how to design, implement, and manage Compute Services effectively. Master Identity and Access Management (IAM) and its best practices for secure access control. Explore Auto Scaling Solutions and Virtual Network Services to optimize AWS infrastructure. Gain proficiency in deploying applications and databases on AWS. Discover additional AWS services and their integration for comprehensive cloud solutions. Develop insights into achieving operational excellence with AWS services. Why buy this AWS Certified Solutions Architect Associate Preparation? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the AWS Certified Solutions Architect Associate Preparation there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This AWS Certified Solutions Architect Associate Preparation course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This AWS Certified Solutions Architect Associate Preparation does not require you to have any prior qualifications or experience. You can just enrol and start learning.This AWS Certified Solutions Architect Associate Preparation was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This AWS Certified Solutions Architect Associate Preparation is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Section 01: Introduction Introduction 00:03:00 Section 02: Exam Tips and Tricks What is AWS? 00:02:00 Why use AWS? 00:03:00 How to Get Started with AWS 00:04:00 AWS Certifications 00:04:00 Preparation Resources 00:02:00 Benefits of Certification 00:02:00 AWS CSA-A Overview 00:04:00 What's New on the 2020 Updated Exam? 00:03:00 AWS CSA-A Exam Objectives 00:06:00 The Four Key Areas (Compute, Networking, Storage, and Databases) 00:04:00 Master the Knowledge Areas 00:02:00 Use the System 00:05:00 Take Notes 00:03:00 Be Mentally and Physically Prepared 00:04:00 Take the Exam 00:04:00 Section 03: AWS Cloud Services Overview Cloud Computing Defined 00:08:00 Benefits of Cloud Computing 00:10:00 Cloud Computing Models 00:07:00 History 00:07:00 Platform 00:06:00 Services, Part 1 00:10:00 Services, Part 2 00:08:00 Security and Compliance 00:07:00 Regions and Availability 00:06:00 Section 04: AWS Storage Design Storage Services 00:07:00 S3 Storage Class 00:07:00 S3 Terminology 00:09:00 S3 Advanced Features 00:08:00 Creating S3 Buckets Lab 00:08:00 S3 Bucket Properties 00:08:00 S3 Managing Objects Lab 00:11:00 Glacier 00:07:00 Setting up a Glacier Vault Lab 00:08:00 S3 and Tape Gateway 00:06:00 S3 Enhanced Features 00:08:00 Elastic Block Store (EBS) 00:08:00 Creating EBS Volumes Lab 00:07:00 Elastic File System (EFS) 00:07:00 Creating an EFS File System Lab 00:07:00 EFS and PrivateLink 00:03:00 Intro to Amazon FSx 00:06:00 Hands-on with FSx 00:06:00 Integrating on-Premises Storage 00:07:00 Storage Access Security Lab 00:10:00 Storage Performance 00:08:00 Section 05: Virtual Private Cloud (VPC) Virtual Private Cloud (VPC) Overview 00:10:00 Creating a VPC Lab 00:11:00 Configuring DHCP Options Lab 00:04:00 Elastic IP Addresses 00:07:00 Elastic Network Interfaces (ENIs) 00:05:00 Endpoints 00:07:00 VPC Peering 00:08:00 Creating a VPC Peering Connection Lab 00:10:00 Security Groups Overview 00:07:00 Network Address Translation (NAT) 00:11:00 Gateways (VPGs and CGWs) 00:08:00 VPN Configuration Option 00:04:00 Section 06: Compute Services Design EC2 Overview 00:11:00 EC2 Instance Types 00:11:00 EC2 Pricing 00:13:00 EBS and EC2 00:05:00 Section 07: Compute Services Implementation Launching an EC2 Linux Instance Lab 00:13:00 Configuring an EC2 Linux Instance Lab 00:08:00 Setting up an EC2 Windows Instance Lab 00:12:00 Shared Tenancy 00:05:00 Dedicated Hosts 00:08:00 Dedicated Instances 00:06:00 AMI Virtualization 00:12:00 Section 08: Compute Services Management Instance Management 00:09:00 Connecting to Instances Lab 00:09:00 Working with Security Groups 00:10:00 Working with Security Groups Lab 00:10:00 Advanced EC2 Management 00:06:00 AWS Batch 00:06:00 Elastic Container Service (ECS) 00:08:00 Elastic Beanstalk Environment 00:11:00 Section 09: Identity and Access Management (IAM) Identity and Access Management (IAM) Overview 00:07:00 Principals 00:10:00 Root User 00:06:00 Authentication 00:06:00 Authorization Policies 00:13:00 Multi-Factor Authentication 00:08:00 Key Rotation 00:10:00 Multiple Permissions 00:06:00 AWS Compliance Program 00:07:00 AWS Security Hub 00:06:00 Shared Responsibility Models 00:06:00 Section 10: IAM Best Practices User Accounts 00:11:00 Password Policies 00:09:00 Credential Rotation 00:06:00 Principle of Least Privilege 00:05:00 IAM Roles 00:08:00 Policy Conditions 00:08:00 CloudTrail 00:12:00 Section 11: Auto Scaling Solutions Auto Scaling Overview 00:06:00 Auto Scaling Groups 00:04:00 Termination Policies 00:07:00 Auto Scaling Configuration Lab 00:13:00 Launch Methods 00:04:00 Load Balancer Concepts 00:08:00 Elastic Load Balancing (ELB) 00:10:00 Section 12: Virtual Network Services DNS 00:14:00 Configuring DNS Lab 00:07:00 Configuring Route 53 Lab 00:13:00 Configuring ACLs and NACLs Lab 00:09:00 Flow Logs 00:07:00 Section 13: AWS Application Deployment Application and Deployment Services 00:04:00 Lambda 00:06:00 API Gateway 00:09:00 Kinesis 00:06:00 Kinesis Data Streams and Firehose 00:06:00 Kinesis Data Analytics 00:04:00 Reference Architectures 00:06:00 CloudFront 00:10:00 Web Application Firewall (WAF) 00:09:00 Simple Queue Service (SQS) 00:10:00 Simple Notification Service (SNS) 00:08:00 Simple Workflow (SWF) 00:07:00 Step Functions 00:05:00 OpsWorks 00:08:00 Cognito 00:04:00 Elastic MapReduce (EMR) 00:05:00 CloudFormation 00:10:00 CloudFormation Properties 00:03:00 CloudWatch 00:06:00 Trusted Advisor 00:07:00 Organizations 00:09:00 Section 14: AWS Database Design Database Types 00:08:00 Relational Databases 00:08:00 Database Hosting Methods 00:05:00 High Availability Solutions 00:06:00 Scalability Solutions 00:06:00 Database Security 00:08:00 Aurora 00:06:00 Redshift 00:11:00 DynamoDB 00:10:00 Section 15: Database Deployment DynamoDB Tables Lab 00:08:00 MySQL Lab 00:13:00 Configuration Lab 00:13:00 Backups Lab 00:04:00 Restore Lab 00:04:00 Snapshot Lab 00:08:00 Monitoring Lab 00:06:00 Section 16: Additional AWS Services Media Content Delivery 00:13:00 Desktop and Appstreaming 00:06:00 ElastiCache 00:05:00 Security Services Lab 00:12:00 Analytics Engines 00:11:00 Development Operations (DevOps) 00:12:00 AWS Solutions 00:05:00 AWS Transit Gateway 00:03:00 AWS Backup 00:04:00 AWS Cost Explorer 00:04:00 Section 17: Operational Excellence with AWS The Operational Excellence Process 00:08:00 Widget Makers Scenario 00:06:00 Resilient Design 00:08:00 Resilient Design Scenario 00:05:00 Performant Design 00:09:00 Performant Design Scenario 00:06:00 Secure Design 00:08:00 Secure Design Scenario 00:05:00 Cost Optimization 00:07:00 Cost Optimization Scenario 00:05:00 General Best Practices 00:07:00
Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of VMware Horizon Use VMware vSphere to create VMs to be used as desktops for VMware Horizon Create and optimize Windows VMs to create VMware Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client⢠systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the VMware Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a VMware Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access⢠and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment Describe the features and functions of App Volumes and Dynamic Environment Manager Demonstrate the architectures of App Volumes and Dynamic Environment Manager Install and configure App Volumes Create and deploy Application Packages and writable volumes Install and configure Dynamic Environment Manager Manage application configurations, user environment settings, and personalization settings This five-day accelerated, hands-on training course is a blend of VMware Horizon© 8: Skills for Virtual Desktop Management, VMware Horizon 8: Infrastructure Administration, and VMware App Volumes?, and VMware Dynamic Environment Manager?. Eight days of content are taught in five-days of extending learning.This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users.You learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server? and VMware Unified Access Gateway?. You also learn how to configure a load balancer for use with Horizon and how to establish Cloud Pod Architecture.Additionally, you learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles from installation to update and replacement. You also learn how to use Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of VMware Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use vSphere Client to access your vCenter Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up VMware Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the Horizon Connection Server inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access the VMware Horizon desktop using various VMware Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant-clone desktop pools Set up an automated pool of instant clones Push updated images to instant-clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the VMware Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of the Horizon Connection Server installation VMware Horizon Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a VMware Horizon administrator and custom roles Describe the roles available in a VMware Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a VMware Horizon environment Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services VMware Horizon Performance and Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Describe the 3D rendering options available in VMware Horizon 8 List the steps to configure graphics cards for use in a VMware Horizon environment Configure a load balancer for use in a VMware Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Managing VMware Horizon Security Explain concepts relevant to secure VMware Horizon connections Describe how to restrict VMware Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Overview of Application and Profile Management Profile Management Application Management Overview of App Volumes App Volumes components App Volumes Installation Overview Requirements Installing and configuring App Volumes Manager Installing the App Volumes agent Working with Application Packages Packaging Applications Maintaining Applications Working with Writable Volumes Default writable volume templates Writable volume policies at creation Updating and rescanning writable volumes Working with AppStacks Enabling AppStacks Creating and provisioning AppStacks Assigning and updating AppStacks Overriding precedence in AppStacks Overview of Dynamic Environment Manager Features and benefits VMware Dynamic Environment Manager terminology User environment settings and scope User profile scenarios Install VMware Dynamic Environment Manager Infrastructure and system requirements VMware Dynamic Environment Manager Agent (FlexEngine) requirements Group Policy configuration Management Console configuration Management Console User Interface Personalize User Profile User environment configuration Application Configuration Management Predefined and user-customized application settings Using Application Profiler Using the Self-Support Tool Using the Helpdesk Support Tool VMware Horizon Smart Policies Scope of VMware Horizon Smart Policies Configure VMware Horizon Smart Policies settings Define Smart Policies conditions Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Are you worried how to secure your data? Enrol the Cyber Security Advanced Diploma course and learn the practical techniques for securing your information. In recent time, cybersecurity becomes mandatory because of the risk of unauthorised use and criminal activity by the hackers. Throughout the Cyber Security Advanced Diploma course, you will learn to protect and secure your company's data through the proper use of internet security management along with the IT Security knowledge. The course teaches you the up to date procedures for securing your data. Course Highlights The price is for the whole course including final exam - no hidden fees Accredited Certificate upon successful completion at an additional cost Efficient exam system with instant results Track progress within own personal learning portal 24/7 customer support via live chat Cyber Security Advanced Diploma has been given CPD accreditation and is one of the best-selling courses available to students worldwide. This valuable course is suitable for anyone interested in working in this sector or who simply wants to learn more about the topic. If you're an individual looking to excel within this field then Cyber Security Advanced Diploma is for you. We've taken this comprehensive course and broken it down into several manageable modules which we believe will assist you to easily grasp each concept - from the fundamental to the most advanced aspects of the course. It really is a sure pathway to success. All our courses offer 12 months access and are designed to be studied at your own pace so you can take as much or as little time as you need to complete and gain the full CPD accredited qualification. And, there are no hidden fees or exam charges. We pride ourselves on having friendly and experienced instructors who provide full weekday support and are ready to help with any of your queries. So, if you need help, just drop them an email and await a speedy response. Furthermore, you can check the validity of your qualification and verify your certification on our website at anytime. So, why not improve your chances of gaining professional skills and better earning potential. Assessment and Certification At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at an additional cost of £19 for a PDF copy and £29 for an original print copy sent to you by post or for both £39. Career Path Not only does our CPD and CiQ accredited course look good on your CV, setting you apart from the competition, it can be used as a stepping stone to greater things. Further advance your learning, launch a new career or reinvigorate an existing one. On successful completion of this course, you have the potential to achieve an estimated salary of £30,000. The sky really is the limit. Course Curriculum Cyber Security Basics Introduction 00:30:00 Child Safety Online 01:00:00 Secure Payment Sites 01:00:00 Online Banking 00:30:00 How To Keep Your Password Safe 00:30:00 Common Scams 01:00:00 How I Got Pharmed 01:00:00 Virus Protection 01:00:00 Self Maintenance 00:30:00 Personal Information Online 01:00:00 Is The Internet Safe? 00:30:00 Importance of Cyber Security 00:30:00 Internet Security Management Internet Security- The Truth About Identify Theft 01:00:00 Internet Security for Teens- What You Need to Do 01:00:00 Internet Security-Downloading Email Attachments 00:15:00 Internet Security- 5 Tips for Using Facebook 00:30:00 Internet Security- 8 Tips to Protect Yourself When Dating Online 00:30:00 Internet Security for Teens and Tweens- 10 Tips to Keep You Protected 00:15:00 Internet Security- Parental Control Software 00:30:00 Internet Security- Online Safety for Your Children 00:30:00 Cyber Bullying- Another Aspect of Breaking Internet Security 00:30:00 Tips to Ensure Internet Security 00:30:00 Internet Security- Downloading Music off the Internet 01:00:00 Internet Security- Protect Your Wireless Connection 00:30:00 Internet Security- How to Deal with Spyware 00:15:00 Internet Security- Protecting Yourself When You Shop Online 00:15:00 Internet Security- Make Sure Your Passwords Protect You 00:15:00 Make Sure Your Emails Are Safe: Tips for Internet Security 01:00:00 Internet Security- Why Should You Use a Firewall? 01:00:00 Internet security-Signs That Your Child's Safety Might Be Compromised 01:00:00 Internet Security- Safety When Using Public Computers 01:00:00 Internet Security- Storing Your Password on Your Computer 01:00:00 Internet Security-Using Social Utility Sites 00:30:00 IT Security Spyware Can Destroy 00:30:00 How Does Spyware Spread? 01:00:00 How To Remove Spyware 01:00:00 Anti Spyware Program 01:00:00 The Anti Anti-Spyware Programs 00:30:00 Research And Learn More 00:30:00 Choosing The Best Anti Spyware Tool 01:00:00 Computer Security And Spyware 01:00:00 The Programs To Avoid 00:15:00 Is It Legal? 00:30:00 Checklist Of Protection 00:15:00 Recommended Reading Recommended Reading : Cyber Security Advanced Diploma 00:00:00 Mock Exam Mock Exam - Cyber Security Advanced Diploma 00:30:00 Final Exam Final Exam - Cyber Security Advanced Diploma 00:30:00
CCNP training course description The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam What will you learn Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP training course details Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting Duration 5 days CCNP training course content Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunkingBuilding Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networkingImplementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and TechniquesVPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards.Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location ServicesWireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized managementWireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshootingMulticast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis ToolsInfrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experienceCisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gatewaysCisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planesBasics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.
Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.
Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
CompTIA A+ bootcamp training course description This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. What will you learn Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. Perform basic PC maintenance. Configure access control measures. Perform basic PC maintenance. CompTIA A+ bootcamp training course details Who will benefit: Students wishing to take both CompTIA A+ exams. Prerequisites: PC fundamentals Duration 5 days Networking Microsoft Systems course contents Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.