Join our Electrical Engineering for Electrical Substations course and discover your hidden skills, setting you on a path to success in this area. Get ready to improve your skills and achieve your biggest goals. The Electrical Engineering for Electrical Substations course has everything you need to get a great start in this sector. Improving and moving forward is key to getting ahead personally. The Electrical Engineering for Electrical Substations course is designed to teach you the important stuff quickly and well, helping you to get off to a great start in the field. So, what are you looking for? Enrol now! You will Learn The Following Things: Learn strategies to boost your workplace efficiency. Hone your skills to help you advance your career. Acquire a comprehensive understanding of various topics and tips. Learn in-demand skills that are in high demand among UK employers This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Electrical Engineering for Electrical Substations. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-to-one support from a dedicated tutor throughout your course. Study online - whenever and wherever you want. Instant Digital/ PDF certificate 100% money back guarantee 12 months access Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement After completing the Electrical Engineering for Electrical Substations course, you will receive your CPD-accredited Digital/PDF Certificate for £5.99. To get the hardcopy certificate for £12.99, you must also pay the shipping charge of just £3.99 (UK) and £10.99 (International). Who Is This Course for? This Electrical Engineering for Electrical Substations is suitable for anyone aspiring to start a career in relevant field; even if you are new to this and have no prior knowledge, this course is going to be very easy for you to understand. On the other hand, if you are already working in this sector, this course will be a great source of knowledge for you to improve your existing skills and take them to the next level. This course has been developed with maximum flexibility and accessibility, making it ideal for people who don't have the time to devote to traditional education. Requirements There is no prerequisite to enrol in this course. You don't need any educational qualification or experience to enrol in the Electrical Engineering for Electrical Substations course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path The certification and skills you get from this Electrical Engineering for Electrical Substations Course can help you advance your career and gain expertise in several fields, allowing you to apply for high-paying jobs in related sectors. Course Curriculum Electrical Engineering for Electrical Substations Unit 1: Basics of Electrical Substations Module 1: Introduction To Electrical Substation 00:06:00 Module 2: Construction of Electrical Substation and Transformers 00:09:00 Module 3: Instrument Transformers and Principle of Operation of Trip Circuit 00:13:00 Module 4: Types Of Circuit Breakers And Fuses 00:23:00 Module 5: Types of Relays According to Function, Construction and Time Characteristics 00:06:00 Module 6: Definition of Busbar and Its Schemes 00:17:00 Module 7: Construction of Underground Cables 00:10:00 Module 8: Construction of Overhead Transmission Lines 00:15:00 Module 9: Comparison between Underground Cables and Overhead Transmission Lines 00:05:00 Module 10: Types of Switches In Power System and Substations 00:08:00 Module 11: Importance of Capacitor Banks in Power System 00:08:00 Module 12: Other Important Components in Electrical Substation 00:07:00 Module 13: Classification of Substations 00:05:00 Module 14: Relation between Voltage and Substations 00:02:00 Module 15: Air Insulated Substation and Gas Insulated Substation 00:09:00 Module 16: Importance of Ring Main Unit in Power System 00:07:00 Module 17:Extra Images 00:01:00 Unit 2: Design of Earthing System Module 1: Effect of Current on Human Body 00:09:00 Module 2: Types of Electric Hazards 00:08:00 Module 3: Classification of Earthing Systems 00:24:00 Module 4: Components of Earthing System 00:09:00 Module 5: Design and Resistance of Earthing Electrode 00:12:00 Module 6: Design and Resistance of Earthing Conductor 00:13:00 Module 7: Earth Resistance by Megger and Three Point Method 00:03:00 Module 8: Design Earthing or Ground Grid Using ETAP 00:21:00 Unit 3: Introduction to Design of Substation Module 1: What Ip or Ingress Protection 00:05:00 Module 2: Selection of Busbars in Electrical Substation 00:11:00 Module 3: Design of Substations 00:19:00 Module 4: Single Line Diagram of 66 to 11kv Substation 00:20:00 Mock Exam Mock Exam - Electrical Engineering for Electrical Substations 00:20:00 Final Exam Final Exam - Electrical Engineering for Electrical Substations 00:20:00
Are you tired of waiting for a repairman when your washing machine stops working or your fridge gives up? Do you want to save money and impress your family by fixing appliances yourself? Look no further! Our Domestic Appliances Repairing Course is here to turn you into a home repair hero. If you are wondering whether you can build a career on Domestic Appliances Repairing, well no worries as acquiring proficiency in Domestic Appliances Repairing enhances employability prospects in the UK, with salaries averaging around £25,000 to £30,000 per annum. Moreover, with the continuous surge in appliance usage and technological advancements, the demand for skilled repair technicians is on the rise, showcasing a promising growth trajectory in this sector. Join our Domestic Appliances Repairing Course and become the go-to person for appliance repairs. Whether you want to save money, start a new career, or just love learning new skills, this course is perfect for you. Key Features: This Domestic Appliances Repairing Course Includes: This Domestic Appliances Repairing Course is CPD Certified Free Certificate from Reed CIQ Approved Domestic Appliances Repairing Course Developed by Specialist Lifetime Access Why Choose Our Course? By choosing our Domestic Appliances Repairing courseis a smart investment in your professional future. Our Domestic Appliances Repairing course is designed by industry professionals to stay ahead of trends, offering the most current and relevant content. This Domestic Appliances Repairing course provides you with the tools and knowledge needed to excel in today's competitive landscape. With flexible learning options and a commitment to your success, our Domestic Appliances Repairing course is the key to unlocking your potential and advancing your professional journey. Course Curriculum Domestic Appliances Repairing Course: Module 01: Introduction to Household Appliances Module 02: Fixing a Clothes Dryer Module 03: Fixing a Dishwashing Machine Module 04: Fixing a Fridge Module 05: Fixing a TV Module 06: Fixing a Vacuum Module 07: Fixing a Washer Module 08: Fixing a Hot Water Heater Module 09: Fixing an AC Module 10: Fixing Kitchen Appliances Module 11: Fixing Electrical Connections Module 12: Safety Measures during Appliance Repairs Learning Outcomes Domestic Appliances Repairing Course: Identify common faults in various domestic appliances for efficient repairs. Demonstrate proficient repair techniques for a range of household appliances. Apply safety protocols during the repair process to prevent accidents. Analyze electrical wiring systems to troubleshoot and rectify faults effectively. Implement appropriate tools and methods to diagnose appliance malfunctions accurately. Evaluate the functionality of repaired appliances to ensure optimal performance and safety. CPD 10 CPD hours / points Accredited by CPD Quality Standards Domestic Appliances Repairing Course 3:00:05 1: Module 01: Introduction to Household Appliances Preview 11:45 2: Module 02: Fixing a Clothes Dryer 16:00 3: Module 03: Fixing a Dishwashing Machine 17:12 4: Module 04: Fixing a Fridge 14:15 5: Module 05: Fixing a TV 12:40 6: Module 06: Fixing a Vacuum 12:58 7: Module 07: Fixing a Washer 13:04 8: Module 08: Fixing a Hot Water Heater 14:56 9: Module 09: Fixing an AC 14:14 10: Module 10: Fixing Kitchen Appliances 19:27 11: Module 11: Fixing Electrical Connections 13:05 12: Module 12: Safety Measures during Appliance Repairs 18:29 13: CPD Certificate - Free 01:00 14: Leave A Review 01:00 Who is this course for? This Domestic Appliances Repairing course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Domestic Appliances Repairing. Moreover, this course is ideal for: Homeowners seeking to fix appliances independently. Beginners interested in learning domestic appliance repair skills. Individuals aiming to enhance their household maintenance capabilities. Those looking to save money on repair technician fees. DIY enthusiasts passionate about understanding appliance mechanics. Requirements There are no requirements needed to enrol into this Domestic Appliances Repairing course. We welcome individuals from all backgrounds and levels of experience to enrol into this Domestic Appliances Repairing course. Career path After finishing this Domestic Appliances Repairing Courseyou will have multiple job opportunities waiting. Some of the Job sectors of Domestic Appliances Repairingare: Household Appliance Mechanic - £25K to £30K/year Appliance Repair Technician - £20K to £30K/year HVAC Technician - £25K to £35K/year Electrical Appliance Technician - £22K to £32K/year Maintenance Engineer - £27K to £37K/year Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.
Are you looking forward to Electrical Safety training, the most demanding skills for the ongoing year and beyond? Then you are in the perfect place. Let's explore! Stand out in the job market by completing the Electrical Safety course. Get an accredited certificate and add it to your resume to impress your employers. Our Electrical Safety course starts with the basics of Electrical Safety and gradually progresses towards advanced topics. Therefore, each lesson of this Electrical Safety is intuitive and easy to understand. Electrical Safety course Learning Outcomes: Concept of Power and Control Circuits Indication Circuits Local Remote & Auto Manual Operation Basics of Safety Precautions Metering Circuits Learn Certain Key Switchgear Electrical Symbols Cross-referencing and Designations in Schematics Starter Circuit Key Highlights for Electrical Safety course: Lifetime access to Electrical Safety course materials Full tutor support is available from Monday to Friday with the Electrical Safety course Learn Electrical Safety skills at your own pace from the comfort of your home Gain a complete understanding of the Electrical Safety course Accessible, informative Electrical Safety learning modules designed by experts Get 24/7 help or advice from our email and live chat teams with Electrical Safety Study Electrical Safety in your own time through your computer, tablet or mobile device A 100% learning satisfaction guarantee with your Electrical Safety course Curriculum Breakdown of the Electrical Safety Course Module 01: Introduction and Basics Module 02: Safety Precautions Module 03: Electrical Incidents Module 04: Reducing and Controlling Risks Certification: CPD Accredited (CPD QS) Certificate Free PDF & Hardcopy certificates All in all, this Electrical Safety course is perfect for quickly and easily enhancing your grasp on Electrical Safety and supercharging your career. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Electrical Safety course. Requirements To enrol in this Electrical Safety course, all you need is a basic understanding of the English Language and an internet connection. Career path After completing this course, you can explore trendy and in-demand jobs related to this course, such as: Electrical Safety Manager Electrical Duty Holder Electrical Safety Compliance Co-ordinator Electrical Safety Engineer Safety & Environment Field Specialist Certificates Certificate of completion Digital certificate - Included Certificate of completion Hard copy certificate - Included After successfully completing this Electrical Safety course, you get hardcopy certificate for free. The delivery charge of the hardcopy certificate inside the UK is £3.99 and international students need to pay £9.99 to get their hardcopy certificate.
Duration 4.5 Days 27 CPD hours This course is intended for This intermediate course is for people who are new to the RACF component of the z/OS Security Server, and responsible for security administration. This includes people who are planning to implement RACF for the first time, and people who are security administrators in installations where RACF is already implemented. Those inexperienced z/OS users may find the course Basics of z/OS RACF Administration (ES19) more appropriate Overview Identify the security requirements of a system Evaluate the facilities and options of RACF Define users to RACF Set up a RACF group structure Use RACF to protect resources Select options to tailor RACF Evaluate and implement RACF database and performance options Identify tools available for auditing Administer the system so that it is consistent with the installation's security goals Be a more effective security administrator using the RACF component of the z/OS Security Server to define users, set up group structures, define general resources, protect z/OS data sets, & use several RACF utilities. Security and RACF overview . Administering groups and users . Protecting z/OS data sets . Introduction to user administration and delegation and general resources . RACF database, tables, and performance options . RACF utilities and exits . RACF options . Auditing the RACF environment . Storage management and RACF . Security for JES facilities . Security classification .
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Duration 5 Days 30 CPD hours This course is intended for Customers: Administrators, developers, web developers, and managers who are managing the Asset Manager 9.x product- Channel Partners and HP C&I Personnel: Consultants, system architects, integrators, and planners who help customers with Asset Manager 9.x implementations- HP Engineers: HP personnel who provide pre-sales and post-sales support for Asset Manager 9.x Overview At the end of the course, you should be able to:? Describe an evolutionary approach to assetmanagement? Explain the capabilities provided by AssetManager's core modules? Use the clients to navigate within Asset Manager'score tables? Create a database? Create and manage portfolio items? Reconcile software installations with softwarelicenses? Write scripts to extend Asset Manager'sfunctionality? Create queries and views to filter data? Configure Asset Manager security and controldatabase access? Import and export data using Asset Manager? Schedule automatic processes This five-day instructor-led training course is designed to provide the essential skills and knowledge needed to configure, deploy, and use Asset Manager 9.40 to successfully implement an asset management solution. This five-day instructor-led training course is designed to provide the essential skills and knowledge needed to configure, deploy, and use Asset Manager 9.40 to successfully implement an asset management solution. Additional course details: Nexus Humans AM120 - Asset Manager 9.x Software - Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AM120 - Asset Manager 9.x Software - Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi⢠host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, hands-on training course provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 7.x environment. This workshop increases your skill and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. Chapter 1: Course IntroductionChapter 2: ScreenOS Concepts, Terminology, and PlatformsChapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Chapter 5: Layer 3 Operations Lab 3: Layer 3 Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Chapter 9: VPN ConceptsChapter 10: Policy-Based VPNs Lab 7: Policy-Based VPNs Chapter 11: Route-Based VPNs Lab 8: Route-Based VPNs Chapter 12: IPv6 Lab 9: IPv6 Appendix A: Additional FeaturesAppendix B: Transparent Mode Lab 10: Transparent Mode (Optional) Additional course details: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators System engineers System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Monitor and optimize compute, network, and storage performance on ESXi hosts Monitor and optimize vCenter Server performance Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi⢠host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, accelerated, hands-on training course is a blend of the VMware vSphere: Optimize and Scale and VMware vSphere: Troubleshooting courses. This Fast Track course includes topics from each of these advanced courses to equip experienced VMware administrators with the knowledge and skills to effectively optimize and troubleshoot vSphere at an expert level. Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems
Duration 5 Days 30 CPD hours This course is intended for Senior Linux system administrators who use high-availability clustering and fault-tolerant shared storage technologies to maximize resiliency of production services. Overview Install and configure a Pacemaker-based high availability cluster. Create and manage highly available services. Troubleshoot common cluster issues. Work with shared storage (iSCSI) and configure multipathing. Implement Logical Volume Manager (LVM) in cluster-aware configurations. Configure GFS2 file systems on storage shared by multiple nodes. Deploy reliable, available critical production services in a high availability cluster In the Red Hat High Availability Clustering (RH436) course, you will learn how to provide highly available network services to a mission-critical enterprise environment through the deployment and management of shared storage and server clusters. Created for senior Linux system administrators, this 4-day course strongly emphasizes lab-based activities. You will set up a cluster of systems running the Pacemaker component of the Red Hat Enterprise Linux High-Availability Add-On, and deploy Linux-based services such as web servers and databases on that cluster. Cluster storage components from the Resilient Storage Add-On are also covered; installations and applications that require multiple cluster nodes can access the same storage simultaneously. This includes Logical Volume Manager (LVM) Shared Volume Groups, Red Hat Global File System 2 (GFS2), and Device-Mapper Multipath. This course is based on Red Hat Enterprise Linux 8.3. Prerequisites Red Hat Certified System Administrator (RHCSA) exam (EX200) and associated courses. Red Hat Cerfitied Engineer (RHCE) exam (EX294) and associated courses. 1 - Creating high availability clusters Create a basic high availability cluster. 2 - Managing cluster nodes and quorum Manage node membership in the cluster and describe how it impacts cluster operation. 3 - Isolating malfunctioning cluster nodes Isolate unresponsive cluster nodes to protect data and recover services and resources after a failure. 4 - Creating and configuring resources Create basic resources and resource groups to provide highly available services. 5 - Troubleshooting high availability clusters Identify, diagnose, and fix cluster issues. 6 - Automating cluster and resource deployment Deploy a new high availability cluster and cluster resources using Ansible automation. 7 - Managing two-node clusters Operate two-node clusters while identifying and avoiding issues specific to a two-node cluster configuration. 8 - Accessing iSCSI storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters. 9 - Accessing storage devices resiliently Configure resilient access to storage devices that have multiple access paths. 10 - Configuring LVM in clusters Select, configure, and manage the correct LVM configuration for use in your cluster. 11 - Providing storage with the GFS2 cluster file system Use the GFS2 cluster file system to simultaneously pProvide tightly coupled shared storage that can be accessed by multiple nodes. 12 - Eliminating single points of failure Identify and eliminate single points of failure in your cluster to decrease risk and increase average service availability. Note: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact a training specialist. Additional course details: Nexus Humans Red Hat High Availability Clustering (RH436) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat High Availability Clustering (RH436) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.