• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

212 Identity courses delivered Live Online

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered OnlineFlexible Dates
£2,380

6th May Julie Gourinchas #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(2)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Julie Gourinchas (she/they) is developing a selective list focused on upmarket and literary adult fiction across a wide variety of genres. Writers she represents have been nominated for the British Book Awards, the Hugo Awards, the BSFA Awards, and the Saltire National Book Awards, among others. In fiction, she's drawn to a uncommon voices, and striking, intelligent writing – whether vibrant and floral or tense, quick, and sparse – as well as texture in both tone and setting (particularly anything with a strong aesthetic). Above all, she is looking for hooky, high-concept work, but her taste can perhaps be best summarised as "the weird, dark, and gruesome." While literary-speculative is her sweet spot, she considers herself genre agnostic within upmarket/literary fiction, and remains open to compelling and well-executed genre overlap. These include: upmarket and literary horror: especially featuring feminist or cultural themes, body horror, mangled nature, or cosmic, Lovecraftian vibes and looking for a fresh, literary take on vampires. Think Mona Awad, Lucy Rose, Julia Armfield, Jade Song, Stephen Graham Jones. dark and spiky literary dramas with high emotional stakes - think Eliza Clark, Julia May Jonas. razor-sharp dark academia particularly with something to say about the complex and exploitative systems within academia, more The Secret History, less The Atlas Six. gothic fiction, specifically regional gothic anchored in an evocative sense of place in the vein of Alexis Henderson and Alix E. Harrow. grounded fantasy or otherwise speculative fiction with coherent, sharp worldbuilding that feels recognisable and familiar, or directly set in our world. Play with magic, faith, and technology in your story like Babel, or a more literary version like Emily Wilde's Encyclopaedia of Faeries, Blood Over Bright Haven, Metal From Heaven. Searing contemporary fiction centred on themes of identity and belonging: think Sally Rooney, Torrey Peters, or what Saltburn should have been. dark westerns, in particular any that play with the truth and false hopes of the American Dream. magical realism both whimsy with a touch of darkness, and darkness with a touch of whimsy. unhappy romances anything -punk: steampunk, solarpunk, silkpunk, clockpunk, dieselpunk, cyberpunk and more of these! Suffice to say: if you can successfully and smartly comp to Arcane, Julie wants to see it! character-focused historical fiction with a literary edge: think Lauren Groff, Anthony Doerr, Eleanor Catton, particularly in the 19th and 20th centuries; including and indeed encouraging alternate history. Stylistically, Julie loves uncommon, thought-provoking experimentation with both prose and form, and anything spiky, toothy, and dark. Happy endings, to her, should feel earned. In all things, compelling character development should come first. First person narration is not impossible, but hard to sell. A smart genre blend is always welcome, as is any fresh-eyed approach to a well-trodden trope. Julie is also very much looking for her first romantasy – especially one that approaches this exciting new genre from a fresh, bold perspective. She is keenly interested in hearing from authors traditionally underrepresented in the industry, including but not restricted to writers of colour; queer, trans, and nonbinary writers; working class writers; disabled writers; etc. Her enduring favourite books include All The Light We Cannot See by Anthony Doerr, Do Not Say We Have Nothing by Madeleine Thien, The Luminaries by Eleanor Catton, and Philip Pullman’s His Dark Materials series. More recent favourites include the masterful Tomorrow and Tomorrow and Tomorrow by Gabrielle Zevin, Babel by R.F. Kuang, Detransition Baby by Torrey Peters, Matrix by Lauren Groff, Tell Me I’m Worthless by Alison Rumfitt, Brother Alive by Zain Khalid, and Our Wives Under the Sea by Julia Armfield. In non-fiction, Julie is keen to read in the narrative and “big ideas” spaces, particularly in the realms of politics, history, and the social sciences. Please note: Julie is not looking for young adult, middle grade, and children’s books. Strictly no AI-generated content of any description. Please also bear in mind that, despite a deep and abiding love for all things Tolkien and Star Wars, she is not typically the right fit for epic or high fantasy, nor space-faring science fiction. She would also prefer to avoid pulpy crime and straightforward romance/romcoms. Julie would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document.  (In addition to the paid sessions, Julie is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 29th April 2025

6th May Julie Gourinchas #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

MS-700T00 Managing Microsoft Teams

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. A Microsoft Teams administrator must be able to plan, deploy, and manage teams, chat, apps, channels, meetings, audio/video conferencing, live events, calling, and Teams certified devices. A Microsoft Teams administrator has experience integrating Microsoft Teams with SharePoint, OneDrive, Exchange, Microsoft 365 Groups, and other Microsoft, third-party, and custom apps. A Microsoft Teams administrator understands and collaborates with other workloads and roles, such as Network, Voice, Identity, Access, Devices, Licensing, Security, Compliance, Information management, and User Adoption. Overview What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment How to deploy and manage teams How to manage collaboration and communication experiences in Microsoft Teams Techniques to manage and troubleshoot communication in Microsoft Teams The Managing Microsoft Teams course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. In this course, you will learn about various Teams management tools, security and compliance feature for Teams, network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience in Teams. Prerequisites A proficient understanding of basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices, including using PowerShell. 1 - Explore Microsoft Teams Explore capabilities in Microsoft Teams Explore Microsoft Teams integration with Microsoft 365 Explore Microsoft Teams integration with Microsoft Power Platform Illustrate Microsoft Teams architecture Describe Microsoft Teams with Microsoft 365 Groups Describe Microsoft Teams with SharePoint and OneDrive Describe Microsoft Teams with Exchange Understand Microsoft Teams certified solutions 2 - Plan and deploy Microsoft Teams Designate Teams admin roles Understand Teams management tools Plan for Teams rollout Plan for Teams adoption Plan for Teams licensing Deploy Microsoft Teams clients 3 - Implement lifecycle management and governance for Microsoft Teams Plan for lifecycle management Plan for Teams governance Manage Microsoft 365 Groups creation Configure Microsoft 365 Groups expiration policy Configure Microsoft 365 Groups naming policy Plan policy assignment for users and groups Create and manage policy packages Manage Teams preview features using Teams update policies Create and manage teams templates and template policies 4 - Monitor your Microsoft Teams environment Monitor Microsoft Teams usage reports Monitor Microsoft 365 usage reports Interpret Microsoft Adoption Score Manage user access with Azure Active Directory access reviews Monitor the Microsoft 365 network connectivity dashboard Manage Teams notifications and alerts Manage feedback policies 5 - Manage access for external users Understand features in Azure Active Directory Work with external users in Microsoft Teams Manage access for external users Manage external collaboration in Azure AD Manage external collaboration in Microsoft 365 Manage external access in Microsoft Teams Manage guest access in Microsoft Teams Manage file sharing in SharePoint and OneDrive 6 - Implement security for Microsoft Teams Configure conditional access and multifactor authentication for Microsoft Teams Configure Safe Attachments for Microsoft Teams Configure Safe Links for Microsoft Teams Examine the Defender for Cloud Apps Monitor security reports for Microsoft Teams Plan and configure enhanced encryption policies 7 - Implement compliance for Microsoft Teams Create and manage sensitivity labels Create and manage retention policies Create and manage Data Loss Prevention policies Deploy communication compliance Enable scoped directory search Create information barrier policy Create security and compliance alerts for Microsoft Teams 8 - Plan and configure network settings for Microsoft Teams Examine network requirements for Microsoft Teams Plan for network deployment using Network Planner Configure network ports and protocols for Microsoft Teams Implement Quality of Service Configure reporting labels for location-enhanced Call Analytics reports Configure tenant data for Call Quality Dashboard reports Assess network readiness Manage network topology 9 - Create and manage teams Create teams Create a team from existing resources Plan and create org-wide teams Manage teams Manage users in a team Configure dynamic membership Archive restore and delete a team 10 - Manage collaboration experiences for chat and channels Create and manage channels in a team Create and manage Teams policies for channels Configure teams settings Create and manage messaging policies Manage channel moderation Manage access to channels 11 - Manage apps for Microsoft Teams Explore apps in Microsoft Teams Describe admin settings for Teams apps Manage access to Teams apps at the organization level Create and manage app permission policies Create and manage app setup policies Manage permissions and consent for Teams apps Plan and configure connectors Manage custom apps uploads Publish custom apps to Microsoft Teams Manage purchasing of apps in the Microsoft Teams app store Customize the organization's app store Customize the branded experience of an app 12 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 13 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 14 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 15 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 16 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 17 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 18 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 19 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 20 - Troubleshoot audio, video, and client issues Troubleshoot Teams Collect and identify logs Clear Microsoft Teams client cache Identify issues with call analytics Identify issues with Call Quality Dashboard Use Power BI to analyze Call Quality Dashboard data Identify issues with the Direct Routing Health Dashboard Additional course details: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MS-700T00 Managing Microsoft Teams
Delivered OnlineFlexible Dates
£2,380

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Channel and Customer Engineers Network Engineer System Engineer Wireless Engineer Consulting Systems Engineer Technical Solutions Architect Network Admisnistrator Wireless Design Engineer Network Manager Channel SEs Sales Engineer Channel AMs Account Manager Overview Upon completing this course, students will be able to meet these objectives: Understand the overall architecture of the Cisco security solutions and how APIs help enable security Understand how to use Cisco Firepower APIs Understand how pxGrid APIs function and their benefits Understand what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes Understand the features and benefits of using Cisco Stealthwatch Cloud APIs Learn how to use the Cisco Umbrella Investigate API Understand the Functionality provided by Cisco AMP and its APIs Learn how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats This course demonstrates the tools and the benefits of leveraging programmability and automation in Cisco Security Solutions, including Cisco Firepower Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella, Cisco AMP, Cisco Threat grid, and Cisco Security Management Appliances. Students will learn how to use the API for each Cisco security solution and specific applications of when the API benefits IT security content. Introducing Cisco Security APIs Role of APIs in Cisco Security Solutions Cisco Firepower, Cisco ISE, Cisco pxGrid, and Cisco Stealthwatch APIs Use cases and security workflow Consuming Cisco Advanced Malware Protection APIs Cisco AMP overview Cisco AMP endpoint API Cisco AMP use cases and workflows Discovery 1: Query Cisco AMP endpoint APIs for verifying compliance Using Cisco ISE Introducing Cisco Identity services engine Cisco ISE use cases Cisco ISE APIs Using Cisco pxGrid APIs Cisco pxGrid overview WebSockets and STOMP messaging protocol Discovery 2: Use the REST API and Cisco pxGrid with Cisco Identity services engine Using Cisco Threat Grid APIs Cisco threat grid overview Cisco threat grid API Cisco threat grid use cases and workflows Discovery 3: Construct a Python script using the Cisco threat grid API Investigating Cisco Umbrella Security Data Programmatically Cisco Umbrella investigate API overview Cisco Umbrella investigate API: Details Discovery 4: Query security data with the Cisco Umbrella investigate API Exploring Cisco Umbrella Reporting and Enforcement APIs Cisco Umbrella reporting and enforcement APIs: Overview Cisco Umbrella reporting and enforcement APIs: Deep dive Discovery 5: Generate reports using the Cisco Umbrella reporting API Automating Security with Cisco Firepower APIs Review basic constructs of Firewall policy management Design policies for automation Cisco FMC APIs in depth Discovery 6: Explore the Cisco Firepower management center API Cisco FTD automation with ansible Discovery 7: Use ansible to automate Cisco Firepower threat defense configuration Cisco FDM API in depth Discovery 8: Automate Firewall policies using the Cisco Firepower device manager API Operationalizing Cisco Stealthwatch and Its API Capabilities Cisco Stealthwatch overview Cisco Stealthwatch APIs: Details Discovery 9: Automate alarm policies and create reports using the Cisco Stealthwatch APIs Using Cisco Stealthwatch Cloud APIs Cisco Stealthwatch Cloud overview Cisco Stealthwatch Cloud APIs: Deep dive Discovery 10: Construct a report using Cisco stealthwatch Cloud APIs Describing Cisco Security Management Appliance APIs Cisco SMA APIs overview Cisco SMA API Discovery 11: Construct reports using Cisco SMA APIs

Cisco Implementing Automation for Cisco Security Solutions v1.0 (SAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

Administering Cisco Data Center Unified Computing System with Intersight (DCUCAI)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Systems Administrators and Engineers Technical Solutions Architects Systems Integrators Channel Partners Value-Added Resellers Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand the B-Series and C-Series product line similarities and differences Describe the Intersight support for C-Series standalone and UCS managed architectures Describe Cisco Intersight and how it can be used to manage UCS and Hyperflex Understand the process for upgrading B-Series and C-Series Firmware with UCSM and Intersight Administering service profiles, pools, and policies with UCSM and Intersight Understanding RBAC with Active Directory integration Administering backup and restores in UCS Manager Learn and discuss the various management tools for Cisco UCS including Intersight Perform basic troubleshooting of B-Series and C-Series in normal operations with UCSM and Intersight Describe how to get started with Intersight programmability DCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers including using Cisco Intersight for UCS management. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager or Intersight as the primary interface. Using real-world scenarios and examples, this Cisco training course will explore all the components of the UCS B-Series and C-Series solutions from a day-to-day administrative point of view. Learn C-Series standalone, C-Series under UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central, as well as using Cisco Intersight for UCS and Hyperflex operations and management. Module 1: UCS Infrastructure Components with Intersight Cisco UCS Product Line, Use Cases, and Components Introducing Cisco Intersight Describing Cisco UCS C-Series Servers Module 2: Administering Cisco UCS with Intersight Managing Virtual Resources Configuring Compute Node LAN Connectivity Configuring Compute Node SAN Connectivity Creating Identity and Resource Pools Creating Service Profiles Creating Service Profile Templates and Cloning Service Profiles Managing Service Profiles Troubleshooting Cisco UCS B-Series Configuration Troubleshooting Cisco UCS B-Series Operation Backing Up & Restoring the Cisco UCS Manager Database Managing and Upgrading Cisco UCS B-Series Firmware Module 3: Administering UCS Management Tools with Intersight Describing Cisco UCS User Interfaces Exploring Intersight User Interfaces Describing Cisco UCS Management Framework & Features Describing Cisco UCS Hyperflex Getting Started with Intersight Programmability Lab Outline: Labs are designed to assure learners a whole practical experience, through the following practical activities: Connecting to the Lab Environment Explore the Cisco UCS GUI and CLI Environment Explore the Cisco Intersight Dashboard and claim devices Create Users, Groups, Roles and Organizations in Intersight Provision Identity and Resource Pools in UCSM Provision Mobile Service Profiles from Updating Templates Backup and Restore Cisco UCS Manager Database Objects Configure Logging in Cisco Intersight Create LAN and SAN Network Policies in Intersight Build a Server Profile and deploy to a UCS blade from Intersight Using Intersight to upgrade Firmware Install an OS from Intersight Using Rest API to Query UCSM Objects in Intersight

Administering Cisco Data Center Unified Computing System with Intersight (DCUCAI)
Delivered OnlineFlexible Dates
Price on Enquiry

Developing on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Intermediate software developers Overview In this course, you will learn to: Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript Interact with AWS services and develop solutions by using the AWS SDK Use AWS Identity and Access Management (IAM) for service authentication Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as data stores Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions Use Amazon Cognito for user authentication Use Amazon ElastiCache to improve application scalability Leverage the CI/CD pipeline to deploy applications on AWS In this course, you learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips. Module 0: Course Overview Agenda Introductions Student resources Module 1: Introduction to AWS Introduction to the AWS Cloud Cloud scenarios Infrastructure overview Introduction to AWS foundation services Module 2: Introduction to Developing on AWS Getting started with developing on AWS Introduction to developer tools Introduction to management tools Module 3: Introduction to AWS Identity and Access Management Shared responsibility model Introduction to IAM Use authentication and authorization Module 4: Introduction to the Lab Environment Introduction to the lab environment Lab 1: Getting started and working with IAM Module 5: Developing Storage Solutions with Amazon Simple Storage Service Overview of AWS storage options Amazon S3 key concepts Best practices Troubleshooting Scenario: Building a complete application Lab 2: Developing storage solutions with Amazon S3 Module 6: Developing Flexible NoSQL Solutions with Amazon DynamoDB Introduction to AWS database options Introduction to Amazon DynamoDB Developing with DynamoDB Best practices Troubleshooting Scenario: Building an end-to-end app Lab 3: Developing flexible NoSQL solutions with Amazon DynamoDB Module 7: Developing Event-Driven Solutions with AWS Lambda What is serverless computing? Introduction to AWS Lambda Key concepts How Lambda works Use cases Best practices Scenario: Build an end-to-end app Module 8: Developing Solutions with Amazon API Gateway Introduction to Amazon API Gateway Developing with API Gateway Best practices Introduction to AWS Serverless Application Model Scenario: Building an end-to-end app Lab 4: Developing event-driven solutions with AWS Lambda Module 9: Developing Solutions with AWS Step Functions Understanding the need for Step Functions Introduction to AWS Step Functions Use cases Module 10: Developing Solutions with Amazon Simple Queue Service and Amazon Simple Notification Service Why use a queueing service? Developing with Amazon Simple Queue Service Developing with Amazon Simple Notification Service Developing with Amazon MQ Lab 5: Developing messaging solutions with Amazon SQS and Amazon SNS Module 11: Caching Information with Amazon ElastiCache Caching overview Caching with Amazon ElastiCache Caching strategies Module 12: Developing Secure Applications Securing your applications Authenticating your applications to AWS Authenticating your customers Scenario: Building an end-to-end app Module 13: Deploying Applications Introduction to DevOps Introduction to deployment and testing strategies Deploying applications with AWS Elastic Beanstalk Scenario: Building an end-to-end app Lab 6: Building an end-to-end app Module 14: Course wrap-up Course overview AWS training courses Certifications Course feedback

Developing on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

HA240 SAP Authorization, Security, and Scenarios

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators, developers, developer consultants, system administrators, and technology consultants. Overview This training course will focus on the authorization, security, and integrated scenario. In this course, students will focus on the authorization, security, and integrated scenarios for SAP HANA. Module 1 Creation of authorizations and authorization roles Module 2 User management Module 3 Access control for HANA native models Module 4 Authorization trace Module 5 Auditing Module 6 Authentication and single sign-on options Module 7 Encryption options Module 8 Security considerations for Multitenant Database Containers Module 9 SAP GRC Integration for Governance Risk and Compliance Module 10 HANA use case scenarios and security requirements Module 11 SAP Netweaver Identity Management integration Module 12 Reusing of BW authorizations for SAP HANA applications Module 13 HANA Cloud Platform (HCP) security Module 14 HANA Enterprise Cloud security

HA240 SAP Authorization, Security, and Scenarios
Delivered OnlineFlexible Dates
Price on Enquiry

Nice Work x Fiasco

By Right Aligned

Our masterclass series goes behind the studio door and explores the processes of globally respected people, studios and businesses.

Nice Work x Fiasco
Delivered OnlineFlexible Dates
FREE to £100

VMware vSphere: Advanced Administration Workshop [v7]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineer Overview By the end of the course, you should be able to meet the following objectives: Configure and manage complex storage solutions in a vSphere environment (including NFS, iSCSI, and so on) Configure and manage complex, scalable vSphere networking operations (vSphere Standard Switch and Distributed Switches) Deploy, manage, and optimize virtual machines (advanced configuration, content library, latency-sensitive workloads, and more) Manage business continuity and operations in your vSphere environment (VMware vCenter Server Appliance™ file-based backup, VMware vCenter Server profiles, host profiles, and so on) Plan and implement increased vSphere security (use a Key Provider, VM Encryption, CPU scheduler remediations, and so on) Troubleshoot the vSphere environment Use VMware vSphere Lifecycle Manager™ to upgrade to VMware ESXi™ hosts and virtual machines (VUM, image-based clusters, and so on) Implement vSphere cluster solutions (Cluster QuickStart wizard, VMware vSphere Distributed Resource Scheduler™, VMware vSphere High Availability, VMware vSAN™, and so on) Implement resource optimizations to streamline vSphere deployments Create an advanced configuration of vCenter Server (including an identity source) This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere© 7 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure. Approximately 90% of the class is application-focused and taught through labs. The course aligns fully with the VMware Certified Advanced Professional ? Data Center Virtualization Deploy exam objectives. Course Introduction Introductions and course logistics Course objectives Introduction to fictitious company: VMBeans Configure and Manage Your vSphere Environment Perform various vCenter Server configurations Configure an external identity source Configure virtual networking with advanced options Configure and manage advanced storage configurations Configure vSphere clusters (also using Cluster QuickStart) Management and Operations in Your Data Center Collect vSphere log files Configure vCenter Server file-based backup Working with vCenter Server profiles Configure and manage advanced cluster settings Create and configure advanced host options Create and manage host profiles Manage and remediate clusters using vSphere Lifecycle Manager Create and configure a Content Library Update a managed virtual machine template Configure a central VMware ToolsTM installation repository Manage vSphere roles and permissions Troubleshoot Your Data Center Environment Troubleshoot vSphere configuration issues Troubleshoot resource pool configuration issues Troubleshoot network and storage issues Troubleshoot ESXi host issues Troubleshoot vCenter Server resource issues Increasing Security in Your Data Center Create and manage a Key Management solution Create an encrypted virtual machine Configure CPU scheduler options to achieve security remediations Performance and Optimization in Your Data Center Manage advanced virtual machine configurations Identify and implement vSphere resource optimization opportunities Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Advanced Administration Workshop [v7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Advanced Administration Workshop [v7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Advanced Administration Workshop [v7]
Delivered OnlineFlexible Dates
Price on Enquiry

16th May Ciara McEllin #Agent121. Looking for: ADULT FICTION / NON-FICTION

5.0(2)

By I Am In Print

LOOKING FOR: ADULT FICTION / NON-FICTION Ciara McEllin is building her list as a Junior Agent at Watson Little. She reads widely across book club, upmarket and literary fiction. Within these areas, she is drawn to novels that examine family and relationship dynamics, sexuality, identity, and vulnerability. Ciara is keen to hear from writers who take a fresh approach to these themes, whether that be a new perspective on a traditional narrative or a focus on characters and voices that remain underrepresented: think Kairos by Jenny Erpenbeck, Asymmetry by Lisa Halliday or Monkey Grip by Helen Garner. She will always want to read beautifully written novels with a strong sense of place, tangible characters and an essence that stays with you – living deep in your bones – long after you’ve finished reading. Recent reads Ciara has enjoyed include: Lonesome Dove by Larry McMurtry, Enter Ghost by Isabella Hammad, Close to Home by Michael Magee, Siblings by Brigitte Reimann, Trespasses by Louise Kennedy, The Idiot by Elif Batuman, Highway Blue by Ailsa McFarlane and My Phantoms by Gwendoline Riley. At the moment Ciara is particularly eager to see: - Sexy, sensual and seductive stories that explore desire and sexual boundaries not often represented in literature such as Little Rabbit by Alyssa Songsiridej, Cleanness by Garth Greenwell and Mrs. S by K Patrick - An atmospheric and existential thriller in the vein of Intimacies by Katie Kitamura, In The Cut by Susanna Moore and Drive Your Plow Over the Bones of the Dead by Olga Tokarczuk - An intoxicating coming of-age-tale that captures the aliveness, intelligence and wildness of girlhood like Brutes by Dizz Tate, The Virgin Suicides by Jeffrey Eugenides and The Girls by Emma Cline - Books that are joyful or brutal, particularly those that are both, similar to Headshot by Rita Bullwinkel, Kick the Latch by Kathryn Scanlan and Small Things Like These by Claire Keegan - Stories exploring an Australia or Ireland that is rarely seen in literature for example A Loving, Faithful Animal by Josephine Rowe and Wild Houses by Colin Barrett In non-fiction, Ciara enjoys narrative, memoir and essay collections. She is interested in hearing from experts, academics, critics and journalists writing about society, culture and food, and excited by writers seeking to revise, reshape or revolutionise the conversation in their area of expertise. Some of her favourite non-fiction titles include How To Survive A Plague by David France, The Transgender Issue by Shon Faye, the Living Autobiography Series by Deborah Levy, Last Witnesses: Unchildlike Stories by Svetlana Alexievich, King Kong Theory by Virginie Despentes; and she particularly enjoys the work of M.F.K Fisher, Annie Ernaux, Natalia Ginsburg and Helen Garner. Ciara is not looking for Children’s, YA or Fantasy. Ciara would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Ciara is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 8th May 2025

16th May Ciara McEllin #Agent121. Looking for: ADULT FICTION / NON-FICTION
Delivered Online + more
£72