• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

298 History courses in Pencoed delivered Live Online

Unconscious bias

By Underscore Group

Understand the biases we all have and the impact they can have in the workplace. Look at how to minimise their impact on others and the organisation. Course overview Duration: 1 day (6.5 hours) The purpose of this course is to help individuals understand and recognise their own unconscious biases, and to provide strategies on how to minimise the impact of those biases in the workplace. The course will provide an overview of what unconscious bias is, its prevalence and impact, and ways to mitigate its effects. Objectives By the end of the course you will be able to: Define unconscious bias and recognise different types of bias Understand how unconscious bias affects decision-making and behaviours in the workplace Identify their own unconscious biases Understand the impact of unconscious bias on individual and team performance Apply strategies to mitigate the effects of unconscious bias in the workplace Content Module 1: Introduction to Unconscious Bias Definition of unconscious bias History and prevalence of unconscious bias Different types of unconscious bias (e.g. affinity bias, confirmation bias) Module 2: Understanding the Impact of Unconscious Bias How unconscious bias affects decision-making and behaviours in the workplace Examples of unconscious bias in the workplace Impact of unconscious bias on individual and team performance Module 3: Recognising Your Own Unconscious Biases Identifying personal biases Tools to recognise and minimise unconscious biases Module 4: Mitigating the Impact of Unconscious Bias in the Workplace Best practices for reducing unconscious bias in the workplace Strategies for managerial and executive leadership to combat unconscious bias Tips for creating a culture of inclusion and diversity

Unconscious bias
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/CAN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection OfficersData Protection ManagersAuditorsLegal Compliance OfficersSecurity ManagerInformation ManagersAnyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they?ve gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure their place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Common Principles and Approaches to Privacy This unit includes a brief discussion about the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards, and threats/ vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit focuses on the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children?s online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. Canadian Legal Framework This unit provides an introduction to the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Private-sector Privacy Laws This unit focuses on the Canadian legal system. It includes enforcement agencies and their powers, privacy basics from a Canadian perspective and the underlying framework for Canadian privacy law and practice. Canadian Public-sector Privacy Laws This unit highlights key concepts and practices related to the collection, retention, use, disclosure and disposal of personal information by federal, provincial and territorial governments. Health Information Privacy Laws This unit touches on the applicability and purpose of health information privacy laws. Private-sector Compliance Practices This unit delves into the components that make up compliance regulations, including Generally Accepted Privacy Principals and security breach notification, and also examines compliance track records and Federal Commissioner Findings. Public-sector Compliance Practices This unit presents the various methods that can be implemented for compliance in the public sector, such as privacy impact assessments and data sharing agreements. In addition, it discusses the challenges presented by digital information exchanges, as well as non-legislative considerations. Health-sector Compliance Practices This unit covers the issues presented with digital compliance in the health sector. Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/CAN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/CAN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/CAN)
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Teams for the Remote Business User

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Overview What is Microsoft Teams? How to Access Microsoft Teams Etiquette for using teams Integration and Storage Capabilities Interface Permissions, Access & Restrictions Owner, Member & Guest Team restrictions Channel restrictions Call Restrictions Team Management (Power Users) Create a Team Access administrator settings Add/delete members to a Team Add/delete a guest user Create and manage Channels Create and manage Private channels Customize Channel tabs Creating Tags Team Management (End Users) Getting your Channel email address Integration with Outlook Leave a Team or Channel Communication and Collaboration Team Conversations Using the New Conversation panel Replying to a conversation Using the interactive options Deleting and editing a conversation Turn off notifications for a conversation Using Mentions and Tags Saving messages Accessing your saved messages Accessing recent chats Create a new Chat for one-2-one Create a new chat for group chats Read Receipts Pop out Chats Searching and Activity Use the search tool to find Specific messages Files People Accessing your Activity Accessing your Feed Filtering your feed and activity Sharing Files Uploading files Viewing files Attaching files to a conversation Sharing a link to a file Edit and Collaborate on files Create files Open files in Teams Online Desktop SharePoint Add a file to a tab Share file outside your organization Customizing your settings Filter Teams Hide channels Channel notifications Channel analytics Changing your Status Setting your status message Controlling the general user settings Controlling your privacy settings Controlling your personal notification settings Controlling your device settings (headphones and microphone) Controlling your call settings Setting your Voicemail message Controlling your app permissions Meetings and Calls Accessing your calendar Calendar views Create a Teams meeting Meeting options Meeting requests and RSVP options Join a Teams meeting Copy join information Create a meeting from Outlook Using the Meet Now option Sharing your screen Changing your background image Adding more people to a meeting Meetings menu Download meeting attendees End meetings for everyone (Organizer only) Accessing your Contacts Accessing your Voicemail Accessing your call history Additional course details: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Teams for the Remote Business User
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain - An Overview for Business Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Technical leaders Overview This course provides general overview of Blockchain technology and is specifically designed to answer the following questions:What is Blockchain? (What exactly is it?)Non-Technical Technology Overview (How does it work?)Benefits of Blockchain (Why should anyone consider this?)Use Cases (Where and for what apps is it appropriate?)Adoption (Who is using it and for what?)Implementation (How do I get started?)Future of Blockchain (What is its future?) This instructor-led 1 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks Additional course details: Nexus Humans Blockchain - An Overview for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Blockchain - An Overview for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Blockchain - An Overview for Business Professionals
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Tuning (TTOR21519)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate-level course requires students have incoming experience working with Oracle Database 18 or higher. Overview Working in a hands-on learning environment led by our expert facilitator, you'll explore: The Oracle Database Architecture Query Optimizer Tuning Container Databases and Pluggable Databases Oracle 19c Tuning features Evaluating Execution Plans Oracle Tuning Tools Using Automatic Workload Repository Join Types AWR Using Baselines Additional AWR performance tools Optimizer Statistics Monitoring a Service Bind Variables and database parameters Oracle's Real Application Testing (RAT) SQL Tuning Advisor Automatic Sql Tuning Sql Plan Management Shared Pool Tuning Tuning the database buffer cache Tuning the PGA (Program Global Area) Automatic Memory Management (AMM) Tuning Segment Space Utilization (ASSM) Automatic Storage Management Oracle 19C Database Tuning is an intermediate level course for Oracle database experienced attendees that explores core tuning skills such as Database parameters, SQL Tuning Advisor, SQL Access Advisor, Adaptive SQL plans and more. Overview Oracle Database Architecture Instance Definition Define SGA Define Background Processes Datafile Definition Query Optimizer SQL Parsing Optimizing Terms Optimizing Methods Query Plan Generation Query Plan Control Tuning Container Databases and Pluggable Databases Pluggable tuning parameters Define Container tuning structure Using PDB$SEED Create a new PDB Plug and unplug a PDB Oracle 12c Tuning features Identifying and Using Oracle's Heat Map 12c Compression Levels and Types Evaluating Execution Plans Defining SQL execution plans Automatic Workload Repository Reading execution plans Oracle Tuning Tools Monitoring tools overview Enterprise Manager Dynamic Performance Views Automatic Workload Repository Automatic Database Diagnostic Monitor Sql Tuning Advisor SQL Access Advisor Sql Access Advisor DB operation Tuning DB operation Active Reporting Using Automatic Workload Repository Defining AWR AWR Settings Creating AWR Baselines Metrics, Alerts, and Thresholds Defining Metrics Setting Alerts Setting Corrective Actions User Defined Metrics Metric Dynamic Views Join Types Nested Loops Join Sort Merge join Hash Join and Cartesian Join Equijoins and Nonequijoins Outer Joins Semijoins AWR Using Baselines Creating AWR baselines Creating AWR Repeating baselines Moving Window Baseline Additional AWR performance tools Automatic Maintenance Tasks Segment Advisor Statistics Gathering Automatic Tuning Optimizer Automatic Database Diagnostic Monitor Active Session History (ASH) Optimizer Statistics Optimizer Statistics Overview Table and Index Statistics Statistic Preferences Statistics Gathering e) Locking Statistics, Export/Import Statistics Pending and published statistics Optimizer Hints Optimizer Paths Cost Base Optimization Monitoring a Service Overview of what is an Oracle Service Creating an Oracle Service for Single instance and RAC Monitoring a Service Resource Management and a Service Enterprise Manager and a Service Bind Variables and database parameters Bind variable definition Cursor_sharing parameter Adaptive Cursor Sharing Oracle's Real Application Testing (RAT) Sql Performance Analyzer overview Sql Performance Analyzer Options Database Parameter changes Database version changes Creating SQL Tuning Sets Database Replay Overview Database Replay Configuration Database Replay Options SQL Tuning Advisor SQL Tuning Advisor: Overview SQL Tuning Advisor Limited Mode Sql Tuning Advisor Comprehensive mode Sql Tuning Profiles SQL Access Advisor SQL Access Advisor: Overview Sql Access Advisor options SQL Access Advisor and Sql Tuning Sets Sql Access Advisor and AWR Results and Implementation Automatic Sql Tuning Automatic Sql Tuning Maintenance Task Automatic Tuning Optimization implementation(ATO) Automatic Tuning Optimization Results Enable/Disable Automatic Tuning Optimization Sql Plan Management Sql plan Management and baseline overview Enable sql plan management Loading Sql Plan baselines into the SGA Adaptive plan management Shared Pool Tuning Shared pool architecture Shared pool parameters Library Cache Dictionary cache Large pool considerations and contents Tuning the database buffer cache Database buffer cache overview Database buffer cache parameters Oracle and Dirty reads and writes Automatic Shared Memory Management (ASMM) Buffer Cache goals and responsibility Buffer Cache pools Tuning the PGA (Program Global Area) PGA Overview PGA Database Parameters Temporary Segments Temporary Tablespace Sizing the PGA Automatic Memory Management (AMM) Oracle's Automatic Memory Management Overview Database Auto-tuned Parameters Database Non Auto-tuned Parameters Automatic Memory Management Hints and Sizing suggestions AMM versus ASMM Tuning Segment Space Utilization (ASSM) Overview of Automatic Segment Space Management Defining the DB_BLOCK_SIZE Defining DB_nk_CACHE_SIZE parameter The DB_BLOCK_SIZE Parameter Overview of table compression, block chaining, and block migration Automatic Storage Management Overview of ASM Definition of Grid Infrastructure ASM Instance ASM Diskgroups ASM Diskgroup parameters and templates ASMCMD

Oracle 19c Database Tuning (TTOR21519)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Install, Configure, Manage [v8.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators responsible for designing and implementing vRealize Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the vRealize Automation architecture and use cases in cloud environments Manage vRealize Automation entities on VMware and third-party virtual and cloud infrastructures Configure and manage Cloud Accounts, Projects, Flavor Mappings, Image Mappings, Network Profiles, Storage Profiles, Volumes, Tags, and Services Create, modify, manage, and deploy Cloud Templates Connect to a Kubernetes Cluster and manage namespaces Customize services and virtual machines with cloudConfig Configure and manage the Service Broker Configure and manage ABX actions, custom properties, event broker subscriptions, and vRealize Orchestrator workflows Integrate with vRealize Orchestrator Install vRealize Automation with Lifecycle Configuration Manager Describe Cloud Automation Services (Cloud Assembly and Code Stream). Integrate Cloud Assembly with Terraform and SaltStack Use logs and CLI commands to monitor and troubleshoot vRealize Automation During this five-day course, you focus on installing, configuring, and managing VMware vRealize© Automation?. You learn about how vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how to manage both on-premise systems and cloud services. The course covers how vRealize Automation Service Broker can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing vRealize Automation with other systems using VMware vRealize© Orchestrator? and how to use vRealize Automation to manage Kubernetes systems and leverage other systems. The course also covers integrating with Terraform and using SaltStack as a configuration management tool. Course Introduction Introductions and course logistics Course objectives vRealize Automation Overview and Architecture Describe the purpose and functionality of vRealize Automation Describe the vRealize Automation architecture Describe the use of VMware Workspace ONE© AccessTM Describe the relationship between Kubernetes clusters, containers, and vRealize Automation services Describe CLI commands for vRealize Automation 8 cluster management Describe Cloud Assembly Describe Service Broker Describe Code Stream Installing vRealize Automation List the different vRealize Automation deployment types Describe the purpose of vRealize easy installer Describe the vRealize Automation installation process Authentication and Authorization Identity the steps involved in integrating Workspace One with Active Directory Describe features of Workspace One Describe the user roles available in vRealize Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Quickly create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping. VMware Cloud Templates Configure and deploy a basic cloud template Create cloud templates that can run on any cloud Use cloudConfig to run commands, install software, and create users Use YAML for inputs, variables, and conditional deployments Tags and Storage Configuration Configure tags Describe different types of tags Manage tags Configure storage profiles Use tags and storage profiles Integrating NSX-T Data Center List the capabilities and use cases of NSX-T Data Center Describe the NSX-T Data Center architecture and components Integrate NSX-T Data Center with vRealize Automation List the supported network profiles in vRealize Automation Use NSX-T Data Center components to design a multitier application Cloud Template Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX-T day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation accounts Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Using Service Broker for Catalog Management Release a VMware Cloud Template? Define content source and content sharing Define Service Broker policy enforcement Use custom forms for catalog items vRealize Automation Extensibility Describe Extensibility Use event topics Create a subscription Call a vRealize Orchestrator workflow Create ABX actions Using Code Stream Introduction to Code Stream The CI/CD process Integrate GitLab with Code Stream and Cloud Assembly Use Code Stream to install software Using Terraform Integrate Cloud Assembly with Terraform Use Terraform with a VMware Cloud Template Use Terraform with Code Stream Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Integrate VMware Tanzu? Grid Integrated Edition Create a Supervisor Namespace as a catalog item Using SaltStack for Configuration Management Introduction SaltStack with vRealize Automation Use SaltStack for software deployment Use SaltStack for configuration management Use SaltStack with event-driven orchestration vRealize Automation Troubleshooting and Integration Location of logs Using Activity Monitoring deployment history Basic troubleshooting CLI commands Collecting logs (VAMI console) Integration with VMware vRealize© Log Insight? Integration with vRealize Operations Migrating vRealize Automation 7.x to 8

VMware vRealize Automation: Install, Configure, Manage [v8.3]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Aria Automation: Install, Configure, Manage [V8.10]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Aria Automation architecture and use cases in cloud environments Describe the key services of VMware Cloud Automation Services™ Manage VMware Aria Automation entities on VMware and third-party virtual and cloud infrastructures Install VMware Aria Automation with VMware Aria Suite Lifecycle Configure and manage cloud accounts, projects, flavor mappings, image mappings, network profiles, storage profiles, volumes, tags, and services Create, modify, manage, and deploy VMware Aria Automation Templates Customize services and virtual machines with cloudConfig and cloudbase-init Configure and manage VMware Aria Automation Consumption Configure and manage ABX actions, custom properties, event broker subscriptions, and VMware Aria Automation Orchestrator workflows Connect to a Kubernetes cluster and manage namespaces Use VMware Aria Automation Config to configure and deploy systems Use logs and CLI commands to monitor and troubleshoot VMware Aria Automation During this five-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10? on-premises systems. You learn how it can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how VMware Aria Automation Consumption? can aggregate content in native formats from multiple clouds and platforms into a common catalog.This course also covers interfacing VMware Aria Automation with other systems using VMware Aria Orchestrator and how to use VMware Aria Automation to manage Kubernetes systems and leverage other systems. In this course, you will use VMware Aria Automation Config? as a configuration management tool. Course Introduction Introductions and course logistics Course objectives VMware Aria Automation Overview and Architecture Describe the purpose and functionality of VMware Aria Automation Identify the key services offered by VMware Aria Automation Describe the VMware Aria Automation architecture Describe the use of VMware Workspace ONE Access? Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services Installing VMware Aria Automation List the different VMware Aria Automation deployment types Describe the purpose of Easy Installer Describe the VMware Aria Automation installation process Authentication and Authorization Identify the steps to integrating Workspace ONE© Access with Active Directory Describe the features of Workspace ONE Access Describe the user roles available in VMware Aria Automation Identify the key tasks performed by each user role Define custom roles Configure branding and multitenancy Basic Initial Configuration Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping VMware Aria Automation Templates Configure and deploy a basic VMware Aria Automation template Create a VMware Aria Automation template that can run on any cloud Use cloudConfig and cloudbase-init to run commands, create users, and install software Use YAML for inputs, variables, and conditional deployments Tags Configure tags Describe functions of tags Manage tags Storage Configuration Configure storage profiles Use tags and storage profiles Integrating NSX With VMware Aria Automation List the capabilities and use cases of VMware NSX© Describe the NSX architecture and components Integrate NSX with VMware Aria Automation List the supported network profiles in VMware Aria Automation Use the NSX components to design a multitier application with VMware Aria Automation Templates Identify the network and security options available in design canvas Create and manage on-demand networks and security groups Configure NSX Day 2 actions Integrating with Public Clouds Configure and use VMware Cloud Foundation? accounts Integrate VMware Cloud Director? account Configure and use an AWS cloud account Configure and use an Azure cloud account Configure and use a Google Cloud Platform cloud account Integrate VMware Cloud on AWS cloud account Using VMware Aria Automation Consumption Release a VMware Aria Automation template Define content source and content sharing Define VMware Aria Automation policy enforcement Use custom forms for catalog items VMware Aria Automation Extensibility Describe VMware Aria Automation extensibility Use event topics Create a subscription Call a VMware Aria Automation Orchestrator workflow Create ABX actions Using Kubernetes Clusters Introduction to Kubernetes Connect to an existing Kubernetes Cluster Create a VMware Aria Automation template with Kubernetes components Using VMware Aria Automation Config for Configuration Management Describe VMware Aria Automation Config Use VMware Aria Automation Config for software deployment Use VMware Aria Automation Config for configuration management Use VMware Aria Automation Config with event-driven orchestration VMware Aria Automation Troubleshooting and Integration Demonstrate how to monitor deployment history Demonstrate basic troubleshooting Execute CLI commands Explain how to collect logs Describe integration with VMware Aria Operations for Logs Describe integration with VMware Aria Operations

VMware Aria Automation: Install, Configure, Manage [V8.10]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Web Application Firewall Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators and security professionals Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Describe NSX Advanced Load Balancer Web Application Firewall architecture Describe the NSX Advanced Load Balancer Web Application Firewall components and main functions Explain the NSX Advanced Load Balancer Web Application Firewall key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components Understand and modify application behavior leveraging Profiles, Policies and DataScripts Configure and customize the NSX Advanced Load Balancer Web Application Firewall Describe and leverage NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer Web Application Firewall application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of Web Application Firewall applications leveraging built-in NSX Advanced Load Balancer tooling This three-day course provides comprehensive training on how to configure, maintain and troubleshoot the Web Application Firewall component of the VMware NSX Advanced Load Balancer (Avi Networks) solution as well as provide an understanding of additional security related functionality. This course covers key NSX Advanced Load Balancer (Avi Networks) Web Application Firewall features and functionality offered in the NSX Advanced Load Balancer 18.2 release, including the overall infrastructure, virtual services and application components as well as application troubleshooting and solution monitoring. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Introduction to NSX ALB Web Application Firewall Introduce the NSX Advanced Load Balancer Web Application Firewall Discuss NSX Advanced Load Balancer Web Application Firewall use cases and benefits Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Attacking and Defending Web Applications Introduce the processes and methodologies used when attacking and defending web applications Introduce the tools used to attack web applications Explain with examples terminology such as Reflected XSS and SQL injection Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies DDOS Protection Introduce the NSX Advanced Load Balancer rate limiting functionality Explain the NSX Advanced Load Balancer rate limiting functionality Hands on examples of rate limiting in action Customizing Application Delivery with Datascripts Introduce the concept of datascripts to manipulate data Explain the various components and inspection points IWAF Deep Dive Describe the building blocks of the iWAF implementation Explain the various iWAF components Introduce both Positive and Negative security models Explain the iWAF Policies, profiles and rule sets IWAF Core Rule Set Explain the history and rationale of the core rule set Describe the NSX ALB (Avi) Core Rule Set IWAF Custom Rules Describe the power and complexity available via custom rules Explain the rule language Implement various use cases Explain common errors and possible solutions IWAF Operations Describe the iWAF application onboarding process Tuning the iWAF policies Working with iWAF logs and analytics Explaining false positive mitigation tactics IWAF Best Practices Provide guidance on how to get the best results Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Web Application Firewall Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This section specifies the primary and secondary target audiences of this course by job roles and notes the relevance to each job role. Collaboration Engineers and Administration Primary audiences: Collaboration engineers involved in the design, implementation, and troubleshooting of Cisco collaboration core technologies. Secondary audiences: Administration involved in support and troubleshooting of Cisco collaboration technologies. Overview Upon completing this course, you will be able to meet these objectives: Describe the Cisco Expressway - C features and functionality within the collaboration architecture Configure and troubleshoot Cisco Unified Communications Manager and Cisco expressway Series integration Describe the Cisco Expressway - C additional features Configure and troubleshoot Cisco Collaboration solutions for B2B calls Describe how to secure B2B communication with Cisco Expressway Series Describe the MRA feature Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity Connection and Cisco IM&P Configure Cisco Webex Hybrid Services This course provides students knowledge about Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Configuring and Troubleshooting the Cisco Expressway Series Cisco Expressway Series Architecture Discovery 1: Deploy virtualized Cisco Expressway Discovery 2: Perform the initial Cisco Expressway series configuration Describe SIP and H.323 in the Cisco Expressway series Describe interworking in the Cisco Expressway series Discovery 3: Register endpoints on Cisco Expressway series Zones Digital string manipulation Search rules Transforms Discovery 4: Call search history and registrations Troubleshoot call processing on Cisco Expressway series Discovery 5: Troubleshooting tools Backup and restore Rerference Configuring Cisco Expressway Additional Freatures Describe bandwidth management Hardening local endpoint registrations Discovery 6: Configure Cisco Expressway series bandwidth management and registration restrictions Discovery 7: Troubleshoot Cisco Expressway series endpoint registration and local dial plan Describe Cisco Expressway security and clustering features Discovery 8: Configure Cisco Expressway series security features Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series Cisco unified communications manager and Cisco Expressway-C integration overview Dian plan overview Call policy Discovery 9: Configure Cisco unified communications manager to connect with Cisco Expressway-C Troubleshooting options for Cisco unified communications manager and Cisco Expressway-C intergration Discovery 10: Troubleshoot Cisco unified communications manager and Cisco Expressway series integration Discovery 11: Configure and troubleshoot Cisco unified communications manager and Cisco Expressway series integration (practice activity) References Configuring and Troubleshooting Cisco Collaboration Solutions for Bussiness-to-Bussiness Describe supported services for B2B collaboration Describe prerequisites for business to business collaboration Call flow including Cisco unified communications manager endpoints Network address translation in a collaboration environment Discovery 12: Implement a B2B Cisco collaboration solution Cisco Expressway series B2B call troubleshooting Discovery 13: Troubleshoot B2B calls on the Cisco Expressway series References Discovery 14: Troubleshoot B2B calls on the Cisco Expressway series (practice activity) Securing Business-Business Communication Firewall Traversal Secure media Secure media between Cisco unified communications manager and Cisco Expressway series Toll fraud prevention Discovery 15: Secure a B2B Cisco collaboration communication Refrences Configuring and Troubleshooting Mobile and Remote Access Describe prerequisites for mobile and remote access Describe service discovery Explore Expressway settings for MRA Certificates HTTP proxy Cisco jabber registration procedure Cisco jabber registration procedure in Hybrid deployment Cisco jabber configuration file Discovery 16: Configure MRA on the Cisco Expressway series MRA troubleshooting Discovery 17: Troubleshoot MRA on the Cisco Expressway series Integrating and Securing Mobile and Remote Access Secure Cisco unified communications integration Cisco unity connection integration Cisco MRA access control options Additional Cisco MRA features Discovery 18: Configure MRA with additional application integrations References Configuring Cisco Webex Hybrid Services Cisco Webex teams Describe Cisco Webex control hub Describe Cisco Webhex hybrid media services Describe Cisco Expressway requirements for using hybrid call service connect Explore Cisco Expressway requirements for using hybrid call service connect Describe Cisco Webex video mesh Discovery 19: Prepare for Cisco Webex teams integration Discovery 20: Configure Cisco Webex hybrid services Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Site Recovery Manager: Install, Configure, Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager Overview By the end of the course, you should be able to meet the following objectives: Summarize the components of Site Recovery Manager architecture Deploy and configure the Site Recovery Manager appliance Describe the principal disaster recovery topologies that are used with Site Recovery Manager Configure inventory and resource mappings Describe the storage replication options that are used with Site Recovery Manager Configure Site Recovery Manager to leverage array-based replication Describe VMware vSphere Replication™ functionality Describe the vSphere Replication architecture Deploy and configure vSphere Replication for use with Site Recovery Manager Build Site Recovery Manager array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups. Build, edit, execute, test, and remove a recovery plan Perform a planned migration This two-day, hands-on training course gives experienced VMware vSphere© administrators the knowledge to install, configure, and manage VMware Site Recovery Manager? 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager. Course Introduction Introductions and course logistics Course objectives Site Recovery Manager Architecture Describe Site Recovery Manager architecture Identify disaster recovery options with Site Recovery Manager Evaluate how Site Recovery Manager integrates with VMware products Describe Site Recovery Manager licensing options List the disaster recovery topologies supported by Site Recovery Manager Describe how VMware Site Recovery for VMware Cloud on AWS integrates with Site Recovery Manager Deploying and Configuring Site Recovery Manager Identify the vSphere and vCenter Server requirements for deploying Site Recovery Manager Define Site Recovery Manager virtual appliance system requirements Deploy the Site Recovery Manager appliance Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Navigate the Site Recovery Manager configuration UI Describe the process for registering Site Recovery Manager with vCenter Server Describe how to start and stop services in Site Recovery Manager Identify ways to perform updates to the Site Recovery Manager appliance Describe the options for accessing the Site Recovery Manager Describe the process for configuring site pairing Describe how to import and export Site Recovery Manager configuration Configuring Inventory Mappings Explain the importance of inventory mappings Identify configuration options for inventory mappings Describe the importance of placeholder virtual machines and datastores Describe the importance of the vSphere inventory changes for Site Recovery Manager operation Using Array-Based Replication Describe array-based replication Describe Storage Replication Adapters and explain their role for the array-based replication Describe the concept and configuration of array pairs Describe datastore groups and the relationship between devices and datastore groups Describe the role of consistency groups Identify the advantages of array-based replication vSphere Replication Describe Site Recovery Manager with vSphere Replication Architecture Discuss the role of vSphere Replication components Discuss use cases for vSphere Replication Discuss system requirements and operational limits of vSphere Replication Determine how to calculate bandwidth requirements for vSphere Replication Identify the advantages of vSphere Replication Deploy a vSphere Replication appliance Configure a vSphere Replication appliance and register it with vCenter Server Pair vSphere Replication appliances Deploy an additional vSphere Replication server Register a vSphere Replication server with a vSphere Replication management server Replicating VMs Using vSphere Replication Describe the replication process used by vSphere Replication List vSphere Replication replica states Describe vSphere Replication of encrypted virtual machines Describe vSphere native key provider Describe how to configure vSphere Replication Discuss vSphere Replication RPO settings Describe MPIT instances Describe additional vSphere Replication settings Describe how to disable vSphere Replication Protection Groups Define protection group functionality Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups Create a protection group View a placeholder virtual machine in the inventory Configure protection for virtual machines and edit protection groups Recovery Plans Discuss recovery plan concepts Discuss network planning Discuss the organization of storage for recovery plans Describe customization options in recovery planning Describe priority groups and VM dependencies Describe how to implement a recovery plan Configure VM recovery plan properties Describe the customization of recovery plans Configure additional steps in the recovery plan Delete a recovery plan Executing Recovery Plans Discuss use cases for Site Recovery Manager Describe planned migration Identify Site Recovery Manager workflows Examine Site Recovery Manager integration with various vSphere technologies Describe how to conduct a recovery plan test Perform a recovery plan test Identify the effect on the storage layer during the test recovery steps Review the recovery plan test steps Describe how to cancel a recovery plan test and clean up after recovery plan test cancelation Explain a recovery plan execution in planned migration or disaster recovery mode Identify the recovery steps for each execution type Describe a forced recovery Explain the importance of reprotection processes and states Examine failback steps Describe how to reprotect a data center Monitoring and Troubleshooting Identify Site Recovery Manager alarm options Generate Site Recovery Manager recovery plan history reports Configure Site Recovery Manager advanced settings Identify Site Recovery Manager logs Describe the vRealize Operations management pack for Site Recovery Manager

VMware Site Recovery Manager: Install, Configure, Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry