Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who have experience with IBM Spectrum Protect. Overview After completing this course, you should be able to: Describe a multi-server IBM Spectrum Protect storage environment. Manage storage containers and traditional storage pools. Configure a multi-server environment. Improve data protection and recovery with replication. Enable advanced client functions. Protect and monitor the IBM Spectrum Protect environment. Use scripting to automate daily processing. Optimize the IBM Spectrum Protect server and client. Troubleshoot common problems. Describe the other IBM Spectrum Protect family products. IBM Spectrum Protect, formerly known as IBM Tivoli Storage Manager, is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using objectbased data management, policy-driven retention, and an easy to use interface, the Operations Center.In this advanced-level course, you streamline your daily operations with the latest features, such as using Retention Sets for data retention, and using the Web Client 2.0 to restore data. You use the Operations Center and administrative command line to manage multiple IBM Spectrum Protect servers and nodes. This course also includes scripting, performance tuning, restoring the database and storage, and an overview of integration with IBM Spectrum Protect Plus 10.1.6. The hands-on exercises are performed on two Windows 2016 R2 virtual machines.This course is the second in a two-course series. It is for storage administrators familiar with the daily management of IBM Spectrum Protect, and focuses on the latest features, such as container pool storage. Basic concepts and installation are not covered in this course. TS618G, the first course in the series, IBM Spectrum Protect 8.1.9 Implementation and Administration, covers basic administration and installation. Unit 1 The IBM Spectrum Protect 8.1.11 environment Unit 2 Storage pool management overview Unit 3 Multi- server management Unit 4 Recovery and long-term retention Unit 5 Client functions and management Unit 6 Daily maintenance and monitoring Unit 7 Automation and scripting Unit 8 Tuning the server and client for optimization Unit 9 Troubleshooting and recovery
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Customers, cloud architects, systems engineers, data center administrators Network administrators with experience in managed services or managing a Telco Cloud environment Overview By the end of the course, you should be able to meet the following objectives: Deploy VMware Telco Cloud Service Assurance Manage VMware Telco Cloud Service Assurance to satisfy Telco cloud provider needs Discuss configurable options for VMware Telco Cloud Service Assurance Identify and configure different data sources which are used with VMware Telco Cloud Service Assurance Configure different collectors in VMware Telco Cloud Service Assurance Identify the Root Cause Analysis options with VMware Telco Cloud Service Assurance Discuss data collection in VMware Telco Cloud Service Assurance Explain root cause analysis in VMware Telco Cloud Service Assurance Navigate through the logs for troubleshooting This three-day, hands-on training course provides the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Telco Cloud Service Assurance environment. In this course, you are introduced to the installation methods of VMware Telco Cloud Service Assurance? across various supported platforms and troubleshooting tools that help you install, manage, and troubleshoot your VMware Telco Cloud Service Assurance environment. In addition, you are presented with various types of configuration options, which you will identify, analyze, and navigate through as you explore the UI and configurable options of the product. Course Introduction Introduction and course logistics Course objectives Introduction to VMware Telco Cloud Service Assurance Describe the features of VMware Telco Cloud Service Assurance List the capabilities of VMware Telco Cloud Service Assurance Discuss the use cases of VMware Telco Cloud Service Assurance Describe the role played by VMware Telco Cloud Service Assurance components in delivering service assurance Deploying VMware Telco Cloud Service Assurance Explain different deployment options of VMware Telco Cloud Service Assurance Identify different deployment methods of VMware Telco Cloud Service Assurance Discuss different phases in deploying VMware Telco Cloud Service Assurance Identify different footprints available for HA based and non-HA based installation of VMware Telco Cloud Service Assurance Describe the SMARTs components of VMware Telco Cloud Service Assurance Deploy VMware Telco Cloud Service Assurance User Access Control Describe the features Role-based Access Control (RBAC) Outline the role of Keycloak in implementing RBAC in VMware Telco Cloud Service Assurance Configure user federation in Keycloak Use the VMware Telco Cloud Service Assurance UI to manage RBAC Create policies in VMware Telco Cloud Service Assurance that align with job roles Services and User Interface Configurations Describe the architecture of logical switching Describe the core services on a TCSA cluster Discuss the Global Manager or Service Assurance Manager (SAM), IP Domain Manager, Server Manager (ESM) Discuss VMware Telco Cloud Service Assurance UI Overview Explain Working with Notifications Elaborate Configuring Summary's Describe Accessing Notification Details Explain Viewing and configuring Topologies List Customizing Topologies Describe Topology Explorer Explain Collecting Troubleshooting Information Discuss Custom models Describe how compute resources are provided to VMware Telco Cloud Service Assurance Describe how storage is provided to VMware Telco Cloud Service Assurance Configure and manage VMware Telco Cloud Service Assurance Discuss configurable options for VMware Telco Cloud Service Assurance Day 1 and Day 2 Operations Review the architecture of logical routing and NSX Edge nodes Identify different data sources to be used with VMware Telco Cloud Service Assurance Configure different collectors with VMware Telco Cloud Service Assurance Describe Alarms and Thresholds Demonstrate how to configure alarms with VMware Telco Cloud Service Assurance Explain how to setup thresholds and timelines in VMware Telco Cloud Service Assurance Define Catalog management and sharing catalogs inside and between organizations. Identify the steps to import or upload data into catalogs. Explain the purpose of catalogs and How to Create a catalog organization. Describe the Purpose and Usage of Open Virtualization Format (OVA) and Custom vApp or VM Properties. Discuss vApp Templates Logs and Troubleshooting Review the architecture of the Distributed Firewall Discuss VMware Telco Cloud Service Assurance installations logs List Smarts installation logs Explain backup and restore options of VMware Telco Cloud Service Assurance Identify the approach for troubleshooting containerized services Discuss monitoring services
ð Unlock the Power of Email Marketing with 'Maximizing Email Impact Using Amazon SES' Course! ð§ Are you ready to skyrocket your email marketing game and transform your business? Introducing our groundbreaking online course: 'Maximizing Email Impact Using Amazon SES' - your key to unlocking the full potential of Amazon Simple Email Service (SES) for unparalleled email success! ð Why Choose Amazon SES? Amazon SES is more than just an email delivery service; it's a game-changer for businesses looking to streamline their email communications, enhance deliverability, and boost engagement. With its scalable infrastructure, powerful analytics, and cost-effective pricing, Amazon SES is the secret weapon to revolutionize your email marketing strategy. ð¡ What You'll Learn: Mastering Amazon SES Setup: Navigate the intricacies of setting up Amazon SES like a pro. From authentication protocols to domain verification, we'll guide you through the entire process. Optimizing Deliverability: Learn the insider tips and tricks to ensure your emails land in the inbox, not the spam folder. Boost deliverability rates and reach your audience with precision. Personalization and Segmentation: Tailor your email campaigns for maximum impact. Understand how to use Amazon SES to create personalized and segmented campaigns that resonate with your audience. Advanced Analytics: Uncover the secrets hidden in your data. Leverage Amazon SES analytics to gain valuable insights into your email performance and make data-driven decisions for future campaigns. Automation Mastery: Save time and increase efficiency by automating your email workflows. Explore how to set up automated campaigns that nurture leads, drive conversions, and build customer loyalty. Troubleshooting and Best Practices: Overcome common challenges and pitfalls. Discover best practices for maintaining a high-quality sender reputation and troubleshooting issues to keep your email marketing on track. ð¥ Why Enroll in This Course? Expert-Led Instruction: Learn from industry experts with hands-on experience in maximizing email impact using Amazon SES. Practical Insights: Gain practical, real-world insights that you can apply immediately to see results. Lifetime Access: Enjoy unlimited access to course materials, updates, and a supportive community of like-minded professionals. Certificate of Completion: Showcase your expertise with a certificate upon successful course completion. Don't miss out on the opportunity to transform your email marketing strategy and achieve unprecedented success with 'Maximizing Email Impact Using Amazon SES.' Enroll now and take the first step towards email mastery! ðð§ Course Curriculum Basic Overview 00:00 Basic Pricing for Amazon SES 00:00 Most Common Uses for SES 00:00 SES Terms of Service and Marketing E-Mail 00:00 GDPR Considerations 00:00 Set Up and Authentication - Part 1 00:00 Domain Authentication 00:00 From E-Mail and Authentication 00:00 Notifications and Authentication 00:00 Deliverability - Domains 00:00 Deliverability - E-Mail Addresses 00:00 Deliverability - Links - Dedicated IP 00:00 Content and Deliverability 00:00 Testing Sites and Deliverability 00:00 Double or Single Opt-In and Deliverability 00:00 Using an Interface and SMTP Credentials 00:00 3 SES Interfaces 00:00 3 SES Interfaces - Part 2 00:00 3 SES Interfaces - Part 3 00:00 Conclusion 00:00 Advanced Overview 00:00 Server Based Systems and Technical Ability 00:00 Cost Vs. Cloud Based Interfaces 00:00 Server Based - Unzip and Upload Mautic 00:00 Why Mautic May Not Be a Straigth Forward Install 00:00 Server Based - Download Sendy and Upload to the Server 00:00 Server Based - Sendy FTP File Permissions 00:00 Server Based - Sendy Installation and IAM User Creation 00:00 Server Based - E-Mail Verification With Sendy 00:00 Cloud Based - E-Mail Octopus 00:00 Cloud Based- E-Mail Octopus SES Access 00:00 Cloud Based - E-Mail Octopus - Connection 00:00 Cloud Based - E-Mail Octopus - Promoting Website Domains 00:00 Sendy WordPress Integration 00:00 E-Mail Octopus WordPress Installation 00:00 WP Basic Set Up 00:00 WP Plugin Set Up 00:00 WP Interface SES Connection 00:00 WP Transactional and Notifcation E-Mails 00:00 WP Newsletter E-Mail Paid Plugin 00:00 Conclusion 00:00
QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support | All-Inclusive Cost
Duration 4 Days 24 CPD hours This course is intended for Storage and system administrators using HP Data Protector software, System Engineers, Consultants, Project Managers, Professional Services, and Sales. Overview Upon successful completion of this course, you should be able to:Install and distribute HP Data Protector software in your environmentConfigure the HP Data Protector software productConfigure your tape and disk-based backup solutions for use with HP Data Protector softwareUse HP Data Protector software to run backups and restores, and monitor these sessions from both the Data Protector GUI and command lineManage the HP Data Protector software Internal Database (IDB)Create custom reports and notification proceduresSecure your installation by configuring user access and adding security to the Cell Manager and DP client systemsPrepare your client to recover from a disaster situationUnderstand the Data Protector processes and perform basic troubleshooting of your installation The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. The hands-on lab exercises reinforce the theory sessions to ensure a thorough understanding of backup and recovery concepts, the functionality of the software and its application to typical storage implementations. Additional course details: Nexus Humans DP120 Data Protector 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP120 Data Protector 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours Overview ?The OS X Sierra troubleshooting process?How to use OS X Sierra tools and resources to troubleshoot OS X Sierra?OS X Sierra features and functionality, including how to find more information about OS X Sierra?How to prepare for Apple Certified Support Professional (ACSP) 10.12 certification In this course students will receive an in-depth exploration of troubleshooting on OS X Sierra. Installation and Configuration Install OS X Sierra Setup and Configuration OS X Recovery OS X Software Updates User Accounts User Accounts User Home Folders System Security Keychain Management File Systems File Systems and Storage FileVault 2 Permissions and Sharing File System Troubleshooting SIP Data Management Hidden Items and Shortcuts System resources Metadata and Spotlight File Archives Time Machine Applications and Processes Application Installation Document Management Application Management and Troubleshooting Network Configuration Network Essentials Advanced Network Configuration Network Troubleshooting Network Services Network Services Host Sharing and Personal Firewall System Management Peripherals and Drivers Print and Scan System Troubleshooting Additional course details: Nexus Humans Sierra 101 - OS X Support Essentials 10.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Sierra 101 - OS X Support Essentials 10.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for SQL professionals, Microsoft Analysis Services cube and report developers, and business intelligence professionals. Overview ?Understand common Analysis Services solutions.?Understand version changes of SSAS from 2008-2014.?Understand Analysis Services installation and architecture.?Understand how to choose the right model.?Understand the Analysis Services tools available.?Understand the multidimensional model.?Utilize data sources and data source views.?Create a cube.?Understand and utilize dimensions.?Understand and utilize attributes.?Understand and utilize relationships.?Understand and utilize hierarchies.?Understand and utilize measures and measure groups.?Understand and utilize calculated members.?Understand and utilize perspectives.?Understand and utilize translations.?Browse perspectives and translations.?Understand and utilize deployment options.?Understand and utilize processing strategies.?Understand and utilize security.?Deploy a multidimensional model.?Understand the tabular model.?Create a tabular project.?Analyze the data using Microsoft Excel.?Create and configure calculated measures and calculated fields.?Backup and Restore. This course is intended for IT professionals who are interested in quickly learning how to utilize an Analysis Services multidimensional or tabular solution. Course Overview Introduction Course Materials Facilities Prerequisites What We'll Be Discussing Lab 1: Course Overview Introduction to Microsoft SQL Server Analysis Services Common Analysis Services Solutions Version Changes of SSAS from 2008-2014 Analysis Services Installation and Architecture: One Product, Two Models Choosing the Right Model Analysis Services Tools Lab 1: Introduction to Microsoft SQL Server Analysis Services The Multidimensional Solution Understanding the Multidimensional Model Utilizing Data Sources and Data Source Views Creating a Cube Lab 1: The Multidimensional Solution Dissecting with Dimensions Developing Dimensions Utilizing Attributes Relating with Relationships Handling Hierarchies Lab 1: Dissecting with Dimensions Managing Measures Measures and Measure Groups Calculated Members Lab 1: Managing Measures Configuring Cube Options Understanding Perspectives Utilizing Translations Browsing Perspectives and Translations Lab 1: Configuring Cube Options Deploying Examining Deployment Options Processing Strategies Exploring Security Lab 1: Deploying The Tabular Solution Understanding the Tabular Model Creating a Tabular Project Deploying Browsing the Model Querying the Solution and Understanding DAX Maintaining and Optimizing Lab 1: The Tabular Solution
SQL Training - Overview Elevate your data game with our revolutionary SQL Training course, designed to unlock the full potential of data management and manipulation. Whether you're a coding prodigy, a data-savvy strategist, or a seasoned professional hungry for new challenges, this SQL Training course is your roadmap to SQL supremacy. From basics to advanced techniques, we cover it in a clear, concise manner designed to suit learners of all levels. With a focus on practicality, our SQL Training course begins with XAMPP (PHPmyadmin) installation, ensuring you're set up for success right from the start. You'll gain insights into creating databases and tables, understanding data types, and mastering the art of inserting, updating, and deleting data. One of the key highlights of this course is the in-depth exploration of SQL functions and clauses. In this SQL Training course, you will learn how to wield conditional and comparison operators effectively, implement constraints like primary and foreign keys for data integrity, and leverage advanced SQL clauses for precise querying. As you progress in the SQL Training course, you'll venture into advanced areas of SQL, including views, functions, and triggers, gaining invaluable insights that will set you apart in today's competitive landscape. Furthermore, in this SQL Training course, you will gain in-depth knowledge about joining tables using aliases, inner joins, left and right joins, and unions, facilitating seamless data retrieval across multiple datasets. Enrol in the SQL Training course to boost your SQL knowledge without further delay. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Unit 01: Introduction Module 01-Introduction 00:09:00 Module 02-Xampp (PHPmyadmin) installation 00:05:00 Unit 02: Getting Started With Databases Module 01: Creating a database 00:02:00 Module 02: Creating tables 00:03:00 Module 03: More about tables 00:01:00 Module 04: Inserting into tables 00:03:00 Module 05: Updating and deleting 00:04:00 Module 06: Data types 00:03:00 Module 07: Conditional and comparison operators 00:04:00 Unit 03: Constraints Module 01: Primary keys 00:05:00 Module 02: Foreign keys 00:07:00 Module 03: Indexes 00:03:00 Module 04: Unique indexes 00:03:00 Unit 04: SQL Functions Module 01: Functions part one 00:02:00 Module 02: Functions part two 00:03:00 Unit 05: SQL Clauses Module 01: Basic queries and where claueses 00:04:00 Module 02: Order by 00:03:00 Module 03: Distinct 00:05:00 Module 04: In 00:04:00 Module 05: Group by 00:07:00 Unit 06: Alters Module 01: Alters part one 00:03:00 Module 02: Alters part two 00:05:00 Module 03: Alters part three 00:05:00 Unit 07: All about Joins and SQL Relations Module 01: Aliases 00:04:00 Module 02: Inner joins 00:07:00 Module 03: Left and right joins 00:06:00 Module 04: Unions 00:06:00 Unit 08: Wild Cards Module 01: Wild cards part one 00:07:00 Module 02: Wild cards part two 00:05:00 Unit 09: More Advanced Areas of SQL Module 01: Views 00:09:00 Module 02: Creating functions 00:07:00 Module 03: Triggers 00:09:00
Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client
Level 5 QLS Endorsed Course with FREE Certificate | CPD & CiQ Accredited |150 CPD Points | Lifetime Access