A hybrid community learning event for all ORSC members and ORSC curious! We'll be using the Deep Democracy process to explore what community means to us.
Airline Cabin Crew also known as: Air Hostess, Flight Attendant and Stewardess. This intensive class based – 10 weeks, part-time (lessons once a week) course will give you all information and tools you will need to succeed. Enter the world of possibilities, adventure and travel with leading Airline Cabin Crew course Provider in the UK. Flight Attendant, Cabin Crew, Stewardess, Air Hostess – Regardless of what this career is called in your part of the world, we have the training program for you. Join the elite team of flight attendants and experience the thrill of flying while making a difference in people’s journey. Fly the world and get paid for it! Join our Airline Cabin Crew course and take the first step towards an exciting career in the skies. Our Airline Cabin Crew course is designed to make you ready for the job. This intensive class based 10 weeks (part time) Airline Cabin Crew course will give you all information and tools you will need to become successful job candidate. You will have one class per week for ten consecutive weeks. Our Aviation Team provide full support to each candidate who wish to become Airline Cabin Crew or start a career in Aviation. We provide A-Z guidance starting from before and after the course. Our graduates are flying around the globe and we are confident that we can help to make your dream a reality! 98% Employment rate after completion of the course. Who is a Flight Attendant? Flight attendant/Airline Cabin Crew/Stewardess/Air Hostess are the most visible, glamorous jobs of all airline employees. A Flight Attendant is someone whose primary duty is to ensure the safety and comfort of passengers during a flight. They are members of an aircrew team , who operate a commercial, business or even military aircraft while travelling domestically or internationally. Flight Attendant benefits: Getting paid for travelling the world Lifestyle Flexible Work Schedules Meeting Interesting People Free Food & Accommodation Excellent Compensation The uniforms Working Environment How to become Flight Attendant?Airline companies look for individuals who share their values and can act as ambassadors for the company’s brand. Airline Cabin Crew are the face of the airline company which means they deliver a fantastic service that makes airline world famous. Airline companies prefer candidates with knowledge of Cabin Crew role. Airline companies have selection day or online tests as a first stage of recruitment, after which, they will take a closer look at applicants CV, skills and experience. If you completed Airline Cabin Crew course at least 70 hours (we offer 90 hour training), your application will stand out and you can get an offer from the first round. You will be able to pass all tasks during interview process as you will have knowledge about Cabin Crew role. Student – Cabin Crew Flying Support Group As a market leading Airline Cabin Crew Training Company with a wealth of experience in Aviation, we constantly upgrading our course and going extra nautical mile to guide and support all our students to ensure they can reach their goals. Graduates who are already flying, offer their full support to us and new students. They share an insight of the airline they already fly with, and help new students through the process of joining them at that airline. It gives a flying start to a career to new learners. Why London Waterloo Academy? Top Airline Cabin Crew course provider in London 98% Employment rate after completion of the course Individual support on the journey from the course to a job placement With years of experience in Airline Cabin Crew industry, London Waterloo Academy has been recognised by major TV, radio channels who have invited our Aviation Team for expert advice or interview. We are recognised by major airline companies in Europe and overseas who have approached London Waterloo Academy to deliver internal cabin crew training, corporate training and to recruit our graduates as a result of their high qualification standards and knowledge. Our graduates are now flying with Etihad, Saudi Air, Hainan Airlines, Small Planet, British Airways, Qatar, EasyJet, Thomas Cook, Ryanair, Cubana de Aviación, Air France,Titan, Norwegian B737 Short Haul and many more. You will become a qualified Cabin Crew, meet the standards and requirements by employers globally On successful completion you will hold: Airline Cabin Crew certificate in Current Airline Training Standards and Equipment, TUI, British Airways or Virgin Atlantic certificates for the SEP (Safety Equipment & Procedures) training Exclusive class visit by Leading Airline Representatives (questions and answers sessions) Exclusive practical training with TUI, Virgin Atlantic or British Airways We will enhance your CV Successful students will get an exclusive VIP hangar tour and a private aircraft recognition certificate of attendance Guidance through the job application process (free of charge) Gain an insight into the airline selection process and final one-to-one interview The vast global experience of our instructors Great working relationship with Corporate Crew Solution This course has been developed in accordance with EASA PART-CC We have a community feel atmosphere where each individual values and respects one another. This may be the reason why our graduates, even those who have completed the course many years ago, continue to come back not only for a chat and a cuppa, but also to share personal issues, tell us of their experience and give us invitations, among many other reasons. Working together – Starting a new career isn’t easy and often it can seem like a lonely and impossible process. Our Aviation Department stays behind each learner, supporting every step of the way. We give you tools, skills and assistance you need to succeed. Our success, built on the success of our students and a long list of graduates with successful stories. How will you learn? The course based on theory and external practical classes with British Airways, Virgin Atlantic or TUI Aviation includes: Aircraft door operations and Passenger Evacuation drills from the crew seat. A320 slide decent, Fire and Smoke drills. Pilot Incapacitation and Immediate Care drills including CPR and Defibrillator training. Course Entry Requirements: English Language at B2 (CEFR) level or above. We accept a huge range of international qualifications so don’t worry. Pop in for a chat with us if you’re unsure (or drop us a line – info@waterlooacademy.co.uk; or, if you prefer speaking to a human voice, +44(0)7484 014980). This is quite important because, for better or for worse, English is the international language. Therefore, your future fly-mates and customers would expect you to speak English. What if I speak broken English or have a strong accent? What can I do? Frantic mode ON. Don’t panic! As a multi-disciplinary Academy, we have a huge range of English language coursesclick here. Our English Language Department is one of the best in London. We are here to help. We won’t let you be deterred simply because of language issues. Courses can be combined, it will also boost your confidence when applying for the job or having an interview. What else do I need? Nothing! Our cabin crew course, as we’ve alluded before, is really good. We teach you everything you need to know from scratch. Since aviation is so different from other fields, we think, as long as you have the passion and determination, we are absolutely honoured to have you on board (pun most certainly intended)! Course dates (please choose one for your course): 15 May 2024 – 17 July 2024, Wednesday classes 18 September 2024 – 20 November 2024, Wednesday classes 14 November 2024 – 16 January 2025, Thursday classes Course duration – 10 weeks, once a week classes. Available Study mode – class based, Virtual (via Zoom) and hybrid Time – 10am to 5pm Registration fee for UK/EU candidates– £300 (includes: examination, Airline Cabin Crew certificate in Current Airline Training Standards and Equipment, participation certificate by TUI/British Airways or Virgin Atlantic in Introduction to SEP (Safety Equipment & Procedures, please note this is not a Cabin Crew attestation)) Tuition fee – £829 (we offer flexible payment plan and accept weekly instalments) International Candidates – Check if you need a UK visa here – £1,729 must be paid in full on registration. In case of visa refusal only £300 will be refunded.
Join lifestyle and streetwear label Stööki as they host their exclusive jewellery workshops at their studio in Greenwich. This ticket is valid for entry for 1 person for the date of the workshop session & includes the Brass 18k Gold-Plated Ring casting and finishing fee. The session will be focused on the creation and personalisation of rings and pendants and led by Stööki's jewellery technologist Nadia Abbas. In this workshop you will: Get an insight in to the jewellery making process Receive a wax ring or pendant template to customise with your own design Get a tutorial covering a range of jewellery making techniques The aim is to have a finished wax master at the end of the workshop that can be taken home, but there is also the option of turning your personalised wax ring or pendant into a finished jewellery piece. Prices to get jewellery made are as follows: Rings: Silver - £70, Brass 18k Gold-Plated - £85, Solid 9k Gold - £ available on request Pendants: Silver - £75, Brass 18k Gold-Plated - £90, Solid 9k Gold - £ available on request *Please note that his ticket option includes the £85 Brass 18k Gold-Plated Ring casting and finishing fee. Add a Stööki sterling silver curb necklace for an additional £15 Stööki will provide all the equipment needed for this session. There is free parking on-site if driving.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Network virtualization training course description This course covers network virtualization. It has been designed to enable network engineers to recognise and handle the requirements of networking Virtual Machines. Both internal and external network virtualization is covered along with the technologies used to map overlay networks on to the physical infrastructure. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer implementations. What will you learn Evaluate network virtualization implementations and technologies. Connect Virtual Machines with virtual switches. Explain how overlay networks operate. Describe the technologies in overlay networks. Network virtualization training course details Who will benefit: Engineers networking virtual machines. Prerequisites: Introduction to virtualization. Duration 2 days Network virtualization training course contents Virtualization review Hypervisors, VMs, containers, migration issues, Data Centre network design. TOR and spine switches. VM IP addressing and MAC addresses. Hands on VM network configuration Network virtualization What is network virtualization, internal virtual networks, external virtual networks. Wireless network virtualization: spectrum, infrastructure, air interface. Implementations: Open vSwitch, NSX, Cisco, others. Hands on VM communication over the network. Single host network virtualization NICs, vNICs, resource allocation, vSwitches, tables, packet walks. vRouters. Hands on vSwitch configuration, MAC and ARP tables. Container networks Single host, network modes: Bridge, host, container, none. Hands on Docker networking. Multi host network virtualization Access control, path isolation, controllers, overlay networks. L2 extensions. NSX manager. OpenStack neutron. Packet walks. Distributed logical firewalls. Load balancing. Hands on Creating, configuring and using a distributed vSwitch. Mapping virtual to physical networks VXLAN, VTEP, VXLAN encapsulation, controllers, multicasts and VXLAN. VRF lite, GRE, MPLS VPN, 802.1x. Hands on VXLAN configuration. Orchestration vCenter, vagrant, OpenStack, Kubernetes, scheduling, service discovery, load balancing, plugins, CNI, Kubernetes architecture. Hands on Kubernetes networking. Summary Performance, NFV, automation. Monitoring in virtual networks.
Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
VMware training course description This five-day VMware course features intensive handson training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. What will you learn Install and configure ESXi hosts. Deploy and configure vCenter. Create virtual networks using standard and distributed switches. Configure VMs, templates, clones, and snapshots. Manage virtual machine resource allocation. Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion. VMware training course details Who will benefit: Systems administrators and engineers. Prerequisites: Introduction to data communications & networking. Windows/Linux Administration. Duration 5 days VMware training course contents Course Introduction Introductions and course logistics. Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts, Describe how vSphere fits in the software-defined data center and the cloud infrastructure, Recognize the user interfaces for accessing vSphere, Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Installing and Configuring ESXi Install an ESXi host, Recognize ESXi user account best practices, Configure the ESXi host settings using the DCUI and VMware Host Client Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter, Deploy vCenter Server Appliance, Configure vCenter settings, Use the vSphere Client to add and manage license keys, Create and organize vCenter inventory objects, Recognize the rules for applying vCenter permissions, View vCenter logs and events Configuring vSphere Networking Configure and view standard switch configurations, Configure and view distributed switch configurations, Recognize the difference between standard switches and distributed switches, Explain how to set networking policies on standard and distributed switches Configuring vSphere Storage Recognize vSphere storage technologies, Identify types of vSphere datastores, Describe Fibre Channel components and addressing, Describe iSCSI components and addressing, Configure iSCSI storage on ESXi, Create and manage VMFS datastores, Configure and manage NFS datastores Deploying Virtual Machines Create and provision VMs, Explain the importance of VMware Tools, Identify the files that make up a VM Recognize the components of a VM, Navigate the vSphere, Client and examine VM settings and options, Modify VMs by dynamically increasing resources, Create VM templates and deploy VMs from them, Clone VMs, Create customization specifications for guest operating systems, Create local, published, and subscribed content libraries, Deploy VMs from content libraries, Manage multiple versions of VM templates in content libraries Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances, Migrate VMs using vSphere vMotion, Describe the role of Enhanced vMotion Compatibility in migrations, Migrate VMs using vSphere Storage vMotion, Take a snapshot of a VM, Manage, consolidate, and delete snapshots, Describe CPU and memory concepts in relation to a virtualized environment, Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA, View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster, Recognize use cases for vSphere DRS settings, Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures, Identify options for configuring network redundancy in a vSphere HA cluster, Recognize vSphere HA design considerations, Recognize the use cases for various vSphere HA settings, Configure a vSphere HA cluster, Recognize when to use vSphere Fault Tolerance Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster, Describe features of the vCenter Update Planner, Run vCenter upgrade prechecks and interoperability reports, Recognize features of vSphere Lifecycle Manager, Distinguish between managing hosts using baselines and managing hosts using images, Describe how to update hosts using baselines, Describe ESXi images, Validate ESXi host compliance against a cluster image and update ESXi hosts, Update ESXi hosts using vSphere Lifecycle Manager, Describe vSphere Lifecycle Manager automatic recommendations, Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware
Host your own group to learn how to make a fabulous flower crown using fresh or dried flowers.