• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

112 Inventory courses in Cardiff delivered Live Online

Advanced Supply Chain Management, Purchasing & Procurement Strategies

By NextGen Learning

Enhance your training & mentoring skills with this CPD-accredited, QLS-endorsed course. Gain expertise & career growth with flexible learning.

Advanced Supply Chain Management, Purchasing & Procurement Strategies
Delivered OnlineFlexible Dates
£12.99

VMware vRealize Operations: Install, Configure, Manage [V8.6]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators Consultants responsible for designing, implementing, and customizing vRealize Operations Overview By the end of the course, you should be able to meet the following objectives: List the vRealize Operations use cases Identify features and benefits of vRealize Operations Determine the vRealize Operations cluster that meets your monitoring requirements Deploy and configure a vRealize Operations cluster Use interface features to assess and troubleshoot operational problems Describe vRealize Operations certificates Create policies to meet the operational needs of your environment Recognize effective ways to optimize performance, capacity, and cost in data centers Troubleshoot and manage problems using workbench, alerts, and predefined dashboards Manage configurations Configure application monitoring using VMware vRealize Operations Cloud Appliance™ Create custom symptoms and alert definitions, reports, and views Create various custom dashboards using the dashboard creation canvas Configure widgets and widget interactions for dashboards Create super metrics Set up users and user groups for controlled access to your environment Extend the capabilities of vRealize Operations by adding management packs and configuring solutions Monitor the health of the vRealize Operations cluster by using self-monitoring dashboards This course provides you with the knowledge and skills to deploy a VMware vRealize Operations cluster that meets the monitoring requirements of your environment.This course includes advanced capabilities such as customizing alerts, views, reports, and dashboards and explains the deployment and architecture in vRealize Operations. This course explains application monitoring, certificates, policies, capacity and cost concepts, and workload optimization with real-world use cases. This course covers troubleshooting using the workbench, alerts, and predefined dashboards, and how to manage compliance and configurations. This course also covers several management packs. Course Introduction Introduction and course logistics Course objectives Introduction to vRealize Operations List the vRealize Operations use cases Access the vRealize Operations User Interface (UI) vRealize Operations Architecture Identify the functions of components in a vRealize Operations node Identify the types of nodes and their role in a vRealize Operations cluster Outline how high availability is achieved in vRealize Operations List the components required to enable Continuous Availability (CA) Deploying vRealize Operations Design and size a vRealize Operations cluster Deploy a vRealize Operations node Install a vRealize Operations instance Describe different vRealize Operations deployment scenarios vRealize Operations Concepts Identify product UI components Create and use tags to group objects Use a custom group to group objects vRealize Operations Policies and Certificate Management Describe vRealize Operations certificates Create policies for various types of workloads Explain how policy inheritance works Capacity Optimization Define capacity planning terms Explain capacity planning models Assess the overall capacity of a data center and identify optimization recommendations What-If Scenarios and Costing in vRealize Operations Run what-if scenarios for adding workloads to a data center Discuss the types of cost drivers in vRealize Operations Assess the cost of your data center inventory Performance Optimization Introduction to performance optimization Define the business and operational intentions for a data center Automate the process of optimizing and balancing workloads in data centers Report the results of optimization potential Troubleshooting and Managing Configurations Describe the troubleshooting workbench Recognize how to troubleshoot problems by monitoring alerts Use step-by-step workflows to troubleshoot different vSphere objects Assess your environment?s compliance to standards View the configurations of vSphere objects in your environment Operating System and Application Monitoring Describe native service discovery and application monitoring features Configure application monitoring Monitor operating systems and applications by using VMware vRealize© Operations Cloud Appliance? Custom Alerts Create symptom definitions Create recommendations, actions, and notifications Create alert definitions that monitor resource demand in hosts and VMs Build and use custom views in your environment Custom Views and Reports Build and use custom views in your environment Create custom reports for presenting data about your environment Custom Dashboards Create dashboards that use predefined and custom widgets Configure widgets to interact with other widgets and other dashboards Configure the Scoreboard widget to use a metric configuration file Manage dashboards by grouping dashboards and sharing dashboards with users Super Metrics Recognize different types of super metrics Create super metrics and associate them with objects Enable super metrics in policies User Access Control Recognize how users are authorized to access objects Determine privilege priorities when a user has multiple privileges Import users and user groups from an LDAP source Extending and managing a vRealize Operations Deployment Identify available management packs in the VMware Marketplace? Monitor the health of a vRealize Operations cluster Generate a support bundle View vRealize Operations logs and audit reports Perform vRealize Operations cluster management tasks Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Operations: Install, Configure, Manage [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Operations: Install, Configure, Manage [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vRealize Operations: Install, Configure, Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

SA120 - Server Automation 10.x Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. Course Overview and Introduction to HP Server Automation ? Discuss the IT organization?s preference for automation ? Discuss the main features of HP SA ? Discuss the benefits of using SA ? Describe the distributed architecture of SA Exploring the Architecture and Interfaces ? Define an SA core ? Describe the functionality of each key component of SA ? Describe SA users ? Use the SA client to explore a managed server environment ? Describe the SA core architecture and key components ? Learn how to use the SA interfaces to explore the server environment Agent Functionality and Server Integration ? Differentiate the agent types ? Describe the SA agent functionality ? Specify the requirements for installing an SA agent onto an unmanaged server ? Install an agent onto an unmanaged server using the SA client and manual installation ? Troubleshoot agent installation and communication failures ? Explore the server inventory using the Device Explorer of the SA client ? Describe the Agent Tools feature within SA ? Integrate existing, unmanaged servers into the SA managed environment ? Summarize what server information is collected by the agent ? Explain the server module objects ? Explain agent extensions Provisioning Operating Systems (OS) Using OS Build Plans (OSBPs) ? Describe the Operating System (OS) provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Build Plan (OSBP) Dynamic Host Configuration Protocol (DHCP) Less or Static IP Provisioning ? Configure and run the Managed Boot Client(s) (MBC) ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) Managing Virtualization ? Describe the supported virtualization management features in SA ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 ? Identify the relationship between the hypervisor and its virtual servers ? Manage the lifecycle of VMware Virtual Machines (VMs) ? Manage the lifecycle of Solaris zones ? Integrate with VMware Virtual Center using Virtualization Service (VS) Exploring Device Groups ? Explain device groups and their characteristics ? Describe the different types of device groups supported in SA ? Create static and dynamic device groups using the SA client Exploring Device Groups with Search Results ? Describe the different types of search in the SA client ? Discuss the process to save and retrieve search results ? Create device groups from search results ? Develop sample reports using advanced search Managing Packages ? Describe how to manage packages in SA ? Discuss the supported package types ? Explain how to organize the software library ? Import and export packages into the software repository ? Install and uninstall packages ? Manage Red Hat Package Manager (RPM) packages Software Management ? Describe the use of policy-based software management in SA ? Describe how to manage software policies in SA ? List the software management setup tasks ? Install and uninstall software using software policies ? Manage software updates using software policies Working with Application Deployment Manager (ADM) ? Describe the Application Deployment Manager (ADM) and its functions ? Manage the ADM ? Set permissions for ADM ? Define an application, a target, and a component ? Deploy an application ? Manage an Application Deployment job ? Describe the rollback and undeploy process ? Import and export Application Deployment data from SA Application Configuration Management ? Describe how application configurations are managed in SA ? Describe application configuration components ? Control values using an application configuration inheritance model ? Push application configuration values to servers Managing Patches ? Describe the patch management feature in SA ? View patch information ? Describe UNIX patch management tasks ? Install patches using patch policies on the Windows platform ? Identify Microsoft patch administration tasks ? Manage patches on Red Hat LINUX Working with Audits, Snapshots, and Remediation ? Describe the audit and remediation feature in SA ? Create and run audits ? Configure file audit rules ? Set audit rule exceptions ? View audit results and remediate the differences ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits Enforcing Compliance ? Define server compliance concepts ? Describe the compliance management feature in SA ? Scan and view the compliance status of servers ? Remediate non-compliant servers Exploring Servers Using the Global Shell and Global File System ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment ? Describe how to navigate and filter data in the OGFS using the Global Shell ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server ? Use the SA remote terminal feature to access and manage servers in the managed environment Scripting with SA ? Describe the script management and execution feature in SA ? Create scripts using the SA client ? Execute ad hoc or saved scripts ? View and download script results ? Describe PowerShell integration with SA ? Explain the Extensible Discovery server module ? Introduce Automation Platform eXtensions (APX) scripting Exploring Reports in SA ? Explain SA reports ? List the reports available in SA ? Generate an SA report ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS Provisioning with OS Sequences ? Describe the OS Provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Sequence

SA120 - Server Automation 10.x Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon 8: Deploy and Manage

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access™ and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere© Client? to access your Center Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a Horizon administrator and custom roles Describe the roles available in a Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a Horizon environment Workspace ONE Access & Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Describe BLAST and PCoIP ADMX GPO common configurations Graphic Cards Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure Horizon connections Describe how to restrict Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Deploy and Manage
Delivered OnlineFlexible Dates
Price on Enquiry

SDI 2.0 (Strength Deployment Inventory) : personality profiling

By Beyond Theory: business training & coaching

leadership management training course

SDI 2.0 (Strength Deployment Inventory) : personality profiling
Delivered in Northampton or UK Wide or OnlineFlexible Dates
Price on Enquiry

VMware Cloud Foundation: Planning, Management, Operations [V4.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system integrators, and consultants responsible for implementing and managing VMware Cloud Foundation Overview By the end of the course, you should be able to meet the following objectives: Describe design implications of VMware Cloud Foundation standard or consolidated architecture List requirements for VMware Cloud Foundation deployment Describe the VMware Cloud Foundation bring-up process and the VMware Cloud Foundation architecture Perform VMware Cloud Foundation bring-up Describe physical and virtual networking considerations Outline VMware Cloud Foundation storage options Use the VMware Imaging Appliance to image ESXi hosts Describe VMware Cloud Foundation multi-instance federation Use VMware Cloud Foundation™ SDDC Manager™ to perform operational tasks Describe user roles in VMware Cloud Foundation and VMware vSphere Manage users and passwords using VMware Cloud Foundation Manage certificate rotation for VMware Cloud Foundation components Use Active Directory integration to automate certificate generation and rotation Describe workload domains Manage workload domains in VMware Cloud Foundation Manage VMware NSX-T™ for VMware Cloud Foundation Describe use cases for Application Virtual Networks (AVNs) Meet vSphere with VMware Tanzu™ requirements Deploy a vSphere with Tanzu enabled workload domain Manage VMware vSAN™ storage in a workload domain Create vSAN storage policies Describe Cloud Native storage Describe the importance of business continuity measures in VMware Cloud Foundation Plan appropriate backup and restore workflows for VMware Cloud Foundation components Implement stretched clusters in VMware Cloud Foundation workload domains This five-day course includes instruction on the capabilities of VMware Cloud Foundation? and how to successfully plan, deploy, manage, and operate hybrid and cloud infrastructures, including customization. The course explains the architecture of VMware Cloud Foundation and explains licensing, certificates, and storage and network management. The course also covers workload domains, availability, life cycle management, and troubleshooting. Course Introduction Introductions and course logistics Course objectives VMware Cloud Foundation Overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe VMware Cloud Foundation topology Define VMware Cloud Foundation terminology Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Identify management domain sizing considerations Identify workload domain sizing considerations Detail design considerations for ESXi in management and VI workload domains Detail design considerations for vCenter in management and VI workload domains Detail the VMware Cloud Foundation bring-up process Identify information required for the Planning and Preparation Workbook Identify information required for the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Explain how the Deployment Parameter Workbook is imported into VMware Cloud Builder Recognize the configuration validation process performed by VMware Cloud Builder Detail the deployment of the management domain Recognize the options to image a host Identify the key capabilities of VIA Recognize how to use VIA for imaging the ESXi Nodes Post Deployment Operations Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources in vSphere to use with VMware Cloud Foundation Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Detail the best practices for password management for VMware Cloud Foundation Retrieve and secure the password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation License Management Describe how to add license keys to the VMware Cloud Foundation inventory Describe how to view license keys in SDDC Manager Describe how to assign license keys Describe how to remove license keys Describe how to replace expiring licenses VMware Cloud Foundation Networking with NSX-T Describe NSX Management plane and Control planes Detail design considerations for workload domains with shared NSX Manager instances Detail design considerations for workload domains with dedicated NSX Manager instances Describe the spine-and-leaf design Describe the addressing scheme for the underlay Recognize possible variations of the spine-and-leaf design Describe the multi-NIC design Describe NSX Edge node design and BGP peering with the physical network Describe cluster design and rack design Explain dynamic routing with BGP Explain virtual IP addressing Describe logical switching Detail NSX Edge functions Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Describe NSX-T Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX-T Data Center Identify NSX Edge functions Describe data plane preparation for NSX-T Data Center Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Recognize features of NSX distributed firewalls Describe the benefits of NSX Federation in VMware Cloud Foundation Identify NSX Federation Use Cases Explain NSX Federation Components and Architecture Discuss NSX Federation configuration basics Managing Workload Domains Define workload domains Detail design considerations for vSphere networking in management and VI workload domains Detail design considerations for storage in management and VI workload domains Recognize design choices for a consolidated design or standard design List the types of workload domains State scale limits for workload domains Identify use cases for multiple clusters in a workload domain List workload domain prerequisites Explain how to create a workload domain Describe how to scale a workload domain Explain how to delete a workload domain Describe host decommissioning vSphere with Tanzu in VMware Could Foundation Discuss the vSphere with Tanzu solution Define the role of Spherelet Describe the supervisor cluster control plane Define vSphere with Tanzu namespaces Describe the role of NSX-T networking components Discuss vSphere with Tanzu networking topology Describe VMware Container Networking with Antrea Describe control plane VM management networking requirements Plan appropriate IP address CIDR ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace Enabling Harbor Image Registry VMware Cloud Foundation Storage Management Identify vSAN architecture and components Recognize storage options for VMware Cloud Foundation Recognize the connectivity options for supplemental storage Explain why vSAN is the best option for VMware Cloud Foundation storage Recognize vSAN design considerations Identify sizing and performance considerations that impact the storage design Describe vSAN requirements for the management and workload domains Define deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Explain how storage policies work with VMware Cloud Foundation vSAN clusters Explain storage policy failure tolerance rules Identify a VM storage policy compliance status Relate storage policies to Kubernetes storage classes Describe persistent volumes Monitor Cloud Native Storage in the vSphere Client Availability and Business Continuity Identify steps in the SDDC Manager backup and restore process Recognize the importance of external service availability Describe native vSphere availability options Identify steps in the NSX backup and restore process Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Describe public key infrastructure (PKI) Explain the purpose of certificate signing requests (CSRs) List the available CA options in SDDC Manager Describe how to view certificates Explain how to generate a CSR Describe how to replace and install certificates for VMware Cloud Foundation components List the available CA options in SDDC Manager Explain how to configure the Microsoft CA server Describe how to install certificates issued by the Microsoft CA server Explain how to add OpenSSL CA in SDDC Manager Describe how to install certificates issued by OpenSSL CA Explain how to install certificates issued by third-party CAs

VMware Cloud Foundation: Planning, Management, Operations [V4.3]
Delivered OnlineFlexible Dates
Price on Enquiry

Sales & Operational Planning

5.0(6)

By Supply Chain Academy

The core principles gained from this course will help delegates have a better understanding of how to manage the relationships between sales and marketing stakeholders on the demand side and the manufacturing and other operational stakeholders on the supply side. PARTICIPANTS WILL LEARN HOW TO: • Take a different perspective on traditional data such as sales history and forecasts, as well as time-phased inventory projections and production capacity. • Recognise how their forecasts impact manufacturing schedules and inventory levels. • Assess whether they are producing enough products to meet sales demand. • Recognise how production is tied to finance and see the financial impact of production decisions, so appropriate adjustments may be then undertaken. COURSE TOPICS INCLUDE: What is S&OP? – Introduction – Definition and benefits S&OP processes – What information is required? – The stages of the S&OP process (including inputs & outputs) The integration of S&OP into a business – Critical success factors for an effective implementation – Typical roles and responsibility matrix

Sales & Operational Planning
Delivered in Upminster or UK Wide or OnlineFlexible Dates
Price on Enquiry

Fundamentals of Supply Chain

5.0(6)

By Supply Chain Academy

This foundational course will help all managers to better understand what a supply chain is and how their roles impact and interact with, their end-to-end supply chain process. PARTICIPANTS WILL LEARN HOW TO: • Understand the role of the supply chain within the wider business context • Become aware of the fundamental trade-offs in the supply chain (e.g. supply chain cost vs service level, efficiency vs flexibility etc.) • Understand the importance of supply chain planning and be able to identify its key components • Develop awareness of the key challenges in modern inventory management and distribution; become familiar with tested practices that allow responding to these challenges • Understand the meaning of essential supply chain terminology • Understand how supply chain performance affects company financial results COURSE TOPICS INCLUDE: • What is supply chain management? Why is it important? • The importance of cost versus service • Purchasing and procurement • Manufacturing processes • Demand management • Warehouse and inventory management • Logistics and transport • Risk management

Fundamentals of Supply Chain
Delivered in Upminster or UK Wide or OnlineFlexible Dates
Price on Enquiry

LMO (Lean Manufacturing Operations) Level 2

By Rachel Hood

Carrying out manufacturing activities on multiple products with different specifications consecutively.

LMO  (Lean Manufacturing Operations) Level 2
Delivered OnlineFlexible Dates
Price on Enquiry