Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution
Duration 3 Days 18 CPD hours Overview Our engaging instructors and mentors are highly-experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment, guided by our expert team, attendees will explore: New Features Overview Multitenant New Features Security Features Cloud Services Networking Globalization Big Data Support Database Installation and Configuration Database Tuning Backup and Recovery Oracle 19c New Features is a hands-on course that explores the newest features such as Big Data Enhancements, Security, Multitenant features, Oracle Cloud Services, Networking, and much more. Oracle is one of the leading databases in industry today. Learn what their latest flagship product has to offer from industry experts. Oracle 19c New Features Overview Introduction to Oracle 19c New Features Oracle 19c Multitenant New Features Refreshable PDB Switchover PDB Integration with Data Guard PDB Snapshot Carousel CDB Fleet Management Oracle 19c Security Features Profile Lockdown Create a User Defined Master Encryption Key Encrypted Passwords in Database Links and Data Pump Create Keystores for Pluggable Databases Datapump and Unified Auditing Schema Only Accounts Oracle 19c Cloud Services Oracle IaaS Oracle Saas Oracle PaaS Oracle 19c Networking Database Connection Manager Database Proxy Support Tenant Isolation Oracle 19c Globalization New globalization for Bind Variables New Database Local Support Additional Unicode Support Big Data Support New Analytic Support Data Mining Data Warehouse Additional Parallel Processing Support Inline External Tables Database Installation and Configuration Zero Downtime Upgrades Dry Run Command implementation New location for Password File Improved Bulk Operations Database Tuning SQL Tuning Advisor and Exadata New SQL Tuning Set API Concurrent SQL and Sql Performance Analyzer Database In Memory Features In Memory Support for External Tables In Memory Features for Analytics Oracle 19c Backup and Recovery Active Pluggable Cloning Pluggable and non Pluggable Database Migration Additional course details: Nexus Humans Oracle 19c New Features (TTOR20019) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c New Features (TTOR20019) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is designed for data analysts, business intelligence specialists, developers, system architects, and database administrators. Overview Skills gained in this training include:The features that Pig, Hive, and Impala offer for data acquisition, storage, and analysisThe fundamentals of Apache Hadoop and data ETL (extract, transform, load), ingestion, and processing with HadoopHow Pig, Hive, and Impala improve productivity for typical analysis tasksJoining diverse datasets to gain valuable business insightPerforming real-time, complex queries on datasets Cloudera University?s four-day data analyst training course focusing on Apache Pig and Hive and Cloudera Impala will teach you to apply traditional data analytics and business intelligence skills to big data. Hadoop Fundamentals The Motivation for Hadoop Hadoop Overview Data Storage: HDFS Distributed Data Processing: YARN, MapReduce, and Spark Data Processing and Analysis: Pig, Hive, and Impala Data Integration: Sqoop Other Hadoop Data Tools Exercise Scenarios Explanation Introduction to Pig What Is Pig? Pig?s Features Pig Use Cases Interacting with Pig Basic Data Analysis with Pig Pig Latin Syntax Loading Data Simple Data Types Field Definitions Data Output Viewing the Schema Filtering and Sorting Data Commonly-Used Functions Processing Complex Data with Pig Storage Formats Complex/Nested Data Types Grouping Built-In Functions for Complex Data Iterating Grouped Data Multi-Dataset Operations with Pig Techniques for Combining Data Sets Joining Data Sets in Pig Set Operations Splitting Data Sets Pig Troubleshoot & Optimization Troubleshooting Pig Logging Using Hadoop?s Web UI Data Sampling and Debugging Performance Overview Understanding the Execution Plan Tips for Improving the Performance of Your Pig Jobs Introduction to Hive & Impala What Is Hive? What Is Impala? Schema and Data Storage Comparing Hive to Traditional Databases Hive Use Cases Querying with Hive & Impala Databases and Tables Basic Hive and Impala Query Language Syntax Data Types Differences Between Hive and Impala Query Syntax Using Hue to Execute Queries Using the Impala Shell Data Management Data Storage Creating Databases and Tables Loading Data Altering Databases and Tables Simplifying Queries with Views Storing Query Results Data Storage & Performance Partitioning Tables Choosing a File Format Managing Metadata Controlling Access to Data Relational Data Analysis with Hive & Impala Joining Datasets Common Built-In Functions Aggregation and Windowing Working with Impala How Impala Executes Queries Extending Impala with User-Defined Functions Improving Impala Performance Analyzing Text and Complex Data with Hive Complex Values in Hive Using Regular Expressions in Hive Sentiment Analysis and N-Grams Conclusion Hive Optimization Understanding Query Performance Controlling Job Execution Plan Bucketing Indexing Data Extending Hive SerDes Data Transformation with Custom Scripts User-Defined Functions Parameterized Queries Choosing the Best Tool for the Job Comparing MapReduce, Pig, Hive, Impala, and Relational Databases Which to Choose?
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture, components, and main functions Explain the key features and benefits of NSX Advanced Load Balancer Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components Recognize web application breaches and threats Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked Describe how to configure the NSX Advanced Load Balancer WAF components Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security Explain how to size the NSX Advanced Load Balancer WAF data plane Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse) Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks. Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII) This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs Introduction to Application Security Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications Attacking Web Applications Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks Types of Transport Understand different web traffic transport modes Describe web traffic and API traffic NSX Advanced Load Balancer WAF Components Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects NSX Advanced Load Balancer WAF Operations Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation NSX Advanced Load Balancer WAF Best Practices Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic NSX Advanced Load Balancer WAF Sizing Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments NSX Advanced Load Balancer WAF Custom Rules Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule NSX Advanced Load Balancer WAF Application Learning Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. Malware Protection Through ICAP in NSX Advanced Load Balancer Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics NSX Advanced Load Balancer IP Reputation Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting DataScript for Application Security Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues Rate Limiting and DOS Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS Bot Management Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management Managing Personally Identifiable Information in NSX Advanced Load Balancer Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. Threat Intelligence Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer Application Programming Interface Security Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Developers, Functional Testers, Test Automation Specialists, Performance Specialists, Environment and Data Specialists, Security Specialists Prerequisites for taking part in the workshop: It is recommended that participants should have completed the ISTQB© Certified Tester Foundation Level certification, or have attended the workshop. Overview Defined tasks need to be structured according to the technical requirements and the internal structure of the system needs to be analysed in detail in order to achieve the expected level of quality and detect errors during development. The ISTQB© Advanced Level Technical Test Analyst certification will teach you on the basis of the current ISTQB© Advanced Level syllabus. The various procedures, techniques and tools for non-functional system testing will be explained, and you will then be in a position to apply these in your future work as a Technical Test Analyst. The three-day certification will be followed by a two-hour examination. During the workshop, our experienced trainers will fully prepare you for the ISTQB© Advanced Level Technical Test Analyst examination. Following on from the ISTQB© Certified Tester Foundation Level training, this workshop covers the increasing technical challenges faced by system testing in particular. Topic 1 Tasks of a Technical Test Analyst in risk-based testing Topic 2 Structure-based testing: Simple condition test, condition/decision test, modified condition/decision test, multiple condition test, path test, API test, selection of structure-based procedures Topic 3 Analytical testing methods: static analysis (control flow analysis, data flow analysis, improved maintainability/adaptability with static analysis, call graphs), dynamic analysis (detection of memory leaks/?rogue? pointers, analysis of system performance) Topic 4 Quality features in technical tests (ISO 25000 standard): Planning aspects of technical testing, security testing, reliability testing, performance testing, resource usage, maintainability testing, portability testing Topic 5 Review checklists (architecture and code reviews) Topic 6 Testing tools and automation, tool integration, test automation projects, specific testing tools Topic 7 Practical exercises on all core topics Notes In order to take the examination, you must show at least 18 months? practical experience as a tester and be certified at ISTQB© Foundation Level. Confirmation from your employer or from your reference customers are accepted as proof of practical experience. Additional course details: Nexus Humans ISTQB Certified Tester, Advanced Level - Technical Test Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ISTQB Certified Tester, Advanced Level - Technical Test Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Developed for IT Professionals interested in learning how to manage Citrix Endpoint Management on-premises or cloud environments using leading practices. Potential students include Administrators and Implementers. Overview How to manage a Citrix Endpoint Management implementation in a On-premises or cloud environment How to perform common enterprise mobility management tasks and mobile application managementUnderstand the device enrollment processHow to perform monitoring, troubleshooting, and reporting on a Citrix Endpoint Management Enterprise solution Students will explore how to manage Citrix Endpoint Management in this course. Venture into the cloud as students learn to manage devices, apps, and users. Students will learn how the architecture, management, and communication flow function with Citrix Endpoint Management Service and how they can fit their organization?s needs. Students will learn how to administer their Citrix Endpoint Management environment and how to support your end users, as well as working with applications and securing a variety of endpoints. Introduction to Citrix Endpoint Management Citrix Endpoint Management Features Citrix Cloud and Citrix Endpoint Management Citrix Endpoint Management User Experience and Security Citrix Endpoint Management Entitlements Citrix Endpoint Management Architecture Citrix Endpoint Management Prerequisites Citrix Endpoint Management Server Citrix Endpoint Management and Microsoft Intune Apple APNs and Google Firebase Cloud Messaging MDX Architecture and Features Cloud Components Cloud Component Overview Onboarding and Access Cloud Connector and Cloud Resource Locations Cloud Migration Cloud Updates and Features Common Device Management Tasks Administrative Console Overview Delivery Groups Device Policies Device Enrollment Enrollment Methods iOS Device Enrollment Android Device Enrollment Windows 10 Enrollment Other Devices Managing Device Security Security Policies Automated Actions Android for Work ActiveSync Filtering Shared Devices Working with Apps Application Integration Citrix Endpoint Management Productivity Apps Application Security with MDX 3rd Part Applications Integrating Citrix Content Collaboration Citrix Content Collaboration Overview Integrating Citrix Endpoint Management with Content Collaboration Content Collaboration Workflows Maintaining and Troubleshooting Maintaining Citrix Endpoint Management Maintaining Certificates Troubleshooting Citrix Gateway (formerly NetScaler Gateway) Troubleshooting Tools for Citrix Productivity Apps Firewall Issues Monitoring and Reporting Monitoring and Reporting of Devices Monitoring and Reporting of Citrix Content Collaboration Additional course details: Nexus Humans CEM-205 Manage Citrix Endpoint Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CEM-205 Manage Citrix Endpoint Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced vSphere administrators who want to use available tools to automate day-to-day tasks. Overview By the end of the course, you should be able to meet the following objectives:Describe the features and benefits of automation in a vSphere environmentUnderstand the role of the vSphere Web services API in automationUse the Managed Object Browser to view the structure of the vSphere Web services API and theVMware vCenter Server? inventoryUse vSphere PowerCLI to deploy and manage virtual machines and virtual infrastructureRun and manage vRealize Orchestrator workflows from the libraryDesign, develop, and run custom, reusable vRealize Orchestrator workflowsIncorporate JavaScript into vRealize Orchestrator workflowsSelect the appropriate tool for automating tasks in vCenter Server This course equips experienced administrators with the knowledge to use the automation tools that all vSphere customers have access to. Students learn how to automate administration tasks with VMware vSphere© PowerCLI? and VMware vRealize© Orchestrator?. Course Introduction Introductions and course logistics Course objectives Automation in vSphere Identify the features and the advantages of automation List the tools used to automate vCenter Server tasks vSphere API Identify the function of an API Recognize the components of VMware vSphere© API Understand how an API is consumed View objects and invoke methods with the Managed Object Browser vSphere PowerCLI Basics Connect vSphere PowerCLI to vCenter Server systems and VMware ESXi? hosts Understand vSphere PowerCLI concepts Use vSphere PowerCLI cmdlets Deploy and manage virtual infrastructure Advanced vSphere PowerCLI and the vSphere API Explore the vSphere object model Capture code with Onyx Use vSphere API documentation to analyze vCenter Server actions View objects with the Get-View cmdlet vSphere PowerCLI Use Cases Manage host networking Create a distributed switch Migrate hosts Create reports vRealize Orchestrator Basics Identify workflow components Run and manage library workflows Edit a workflow Build and schedule a simple workflow Debug a workflow vRealize Orchestrator Advanced Identify and use advanced vRealize Orchestrator workflow elements Implement vRealize Orchestrator workflow nesting Use variable types in a workflow Use JavaScript to create complex workflows Incorporate an Oynx script in a workflow vRealize Orchestrator Use Cases Create automation workflows that map to real-world scenarios Create reporting workflows that map to real-world scenarios Create migration workflows that map to real-world scenarios Create provisioning workflows that map to real-world scenarios vRealize Orchestrator PowerCLI Plug-In Invoke external scripts and pass workflow parameters as script inputs Generate new vRealize Orchestrator actions from Windows PowerShell and vSphere PowerCLI scripts and cmdlets Browse snap-ins and their associated cmdlets in the vRealize Orchestrator workflow editor vRealize Orchestrator Integration Understand the connectivity options for vRealize Orchestrator Differentiate between north-facing and south facing APIs List the APIs and their use cases Run a workflow through a REST call Guest Operations with vRealize Orchestrator and vSphere PowerCLI Use the most appropriate tools to perform guest operations Software Development Process & Tools Understand the software development lifecycle Understand version control system tools Map the correct tools to vRealize Orchestrator and vSphere PowerCLI
Duration 3 Days 18 CPD hours This course is intended for System administrators System engineers Consultants Overview By the end of the course, you should be able to meet the following objectives: Identify the features and benefits of VMware Aria Operations for Logs Determine which VMware Aria Operations for Logs cluster meets your monitoring requirements Describe the VMware Aria Operations for Logs architecture and use cases Deploy and configure a VMware Aria Operations for Logs cluster Use the Explore Logs page to get a deep understanding of log data Create and manage queries Manage VMware Aria Operations for Logs agents and agent Groups Create custom dashboards Explain how to use the VMware Aria Operations for Logs widgets Extend the capabilities of VMware Aria Operations for Logs by adding content packs and configuring solutions Discuss VMware Aria Operations for Logs (SaaS) This three-day course features hands-on training that focuses on deploying, configuring, and managing VMware Aria Operations? for Logs 8.12. You will learn the UI enhancements, features, architecture, use cases, and benefits of VMware Aria Operations for Logs. This course provides you with the knowledge and skills to use VMware Aria Operations for Logs 8.12 to monitor your environment. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Aria Operations for Logs Describe the VMware Aria cloud management platform Describe the VMware Aria? use cases Describe the key capabilities of VMware Aria Operations for Logs Describe the requirements for a log analytics solution Explain the importance of efficient log management Navigate the VMware Aria Operations for Logs UI Describe the various stages of log processing VMware Aria Operations for Logs Architecture and Deployment Identify the minimum requirements for deploying VMware Aria Operations for Logs Explain how to use the VMware Aria Operations for Logs sizing calculator Describe VMware Aria Operations for Logs compatibility with other VMware products Describe the VMware Aria Operations for Logs architecture Explain how to install the VMware Aria Operations for Logs virtual appliance Analyzing Logs Describe the primary functions of the VMware Aria Operations for Logs UI Describe log events Use Explore Logs for understanding and analyzing the log data VMware Using Dashboards Alerts and Reports Create VMware Aria Operations for Logs custom dashboards Describe how to use the VMware Aria Operations for Logs widgets Configure alerts Explain how to view and manage reports Administering VMware Aria Operations for Logs Describe user access control in VMware Aria Operations for Logs Describe user management Configure VMware Aria Operations for Logs settings Managing Data Sources and Content packs Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Install and manage content packs Manage certificates Install and manage agents for VMware Aria Operations for Logs Describe the VMware Aria Operations for Logs Importer VMware Aria Operations for Logs Integrations Describe how to integrate VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of integrating VMware Operations for Logs with VMware Aria Operations for Logs Discuss the advantages of using the vSAN content pack Explain how to configure the NSX content pack VMware Aria Operations for Logs (SaaS) Explain the VMware Aria Operations for Logs (SaaS) architecture Describe the ingestion options for Aria Operations for Logs (SaaS) Discuss integration with on-premises Aria Operations for Logs