Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Describe the Carbon Black EDR server installation process Manage and configure the Carbon Black EDR sever based on organizational requirements Perform searches across process and binary information Implement threat intelligence feeds and create watchlists for automated notifications Describe the different response capabilities available from the Carbon Black EDR server Use investigations to correlate data between multiple processes This course teaches you how to use the VMware Carbon Black© EDR? product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Planning and Installation Hardware and software requirements Architecture Data flows Server installation review Installing sensors Server Administration Configuration and settings Carbon Black EDR users and groups Process Search and Analysis Filtering options Creating searches Process analysis and events Binary Search and Banning Binaries Filtering options Creating searches Hash banning Search best practices Search operators Advanced queries Threat Intelligence Enabling alliance feeds Threat reports details Use and functionality Watchlists Creating watchlists Use and functionality Alerts / Investigations / Response Using the HUD Alerts workflow Using network isolation Using live response
Duration 3 Days 18 CPD hours This course is intended for Service providers who are designing or using VMware SD-WAN solutions or managing SD-WAN networks for customers Service providers looking to deliver a managed hybrid WAN with MPLS service Service providers transforming their MPLS networks for direct access to cloud services and increased network agility Overview By the end of the course, you should be able to meet the following objectives: Describe how VMware SASE⢠solves security challenges for distributed enterprises Identify where VMware SD-WAN fits in the VMware SASE framework Describe the process for validating the installation of VMware SD-WAN Orchestrator and Gateway in a service provider environment Describe the features for monitoring and maintaining a VMware SD-WAN installation Evaluate the security features and certificate operations for managing a VMware SD-WAN installation Describe VMware SD-WAN Edge licensing and license types Describe the features of VMware Edge Network Intelligence⢠Recognize VMware SD-WAN network monitoring tools for generating reports, events, and alerts Recognize the remote diagnostic actions available on VMware SD-WAN Orchestrator Troubleshoot VMware SD-WAN Orchestrator and Gateway common issues This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware SD-WAN? environment for service providers.In this course, you focus on deploying and managing VMware SD-WAN for a service provider, including troubleshooting common issues. Course Introduction Introductions and course logistics Course objectives VMware SD-WAN Installation for Service Providers Describe security challenges for distributed enterprises Describe the VMware SASE solution for securing distributed enterprises Describe VMware deployment models for service providers Explain how VMware SD-WAN can help to transform MPLS networks to service-ready networks Identify resource requirements for installing VMware SD-WAN Orchestrator and Gateways Describe the procedure for installing VMware SD-WAN Orchestrator Describe the process for provisioning VMware SD-WAN Orchestrator Identify the external service dependencies for VMware SD-WAN Orchestrator Recognize disaster recovery options for SD-WAN Orchestrator Describe the disaster recovery workflow for VMware SD-WAN Orchestrator Identify the requirements for installing VMware SD-WAN Gateway instances Describe the procedure for installing VMware SD-WAN Gateway instances Describe the procedure for installing VMware SD-WAN Gateway instances on ESXi hosts identify Data Plane Development Kit support for gateway performance Describe the VMware SD-WAN Gateway deployment modes for service providers Configure a VMware SD-WAN Gateway for a service provider Assign a VMware SD-WAN Gateway for a service provider VMware SD-WAN Monitoring and Maintenance Describe VMware SD-WAN Orchestrator system health-monitoring features Describe VMware SD-WAN Orchestrator process-monitoring features Describe VMware SD-WAN Orchestrator storage-monitoring features Describe VMware SD-WAN Orchestrator database-monitoring features Describe the VMware SD-WAN Orchestrator upgrade process Describe the VMware SD-WAN Orchestrator backup and data archival processes Describe the VMware SD-WAN Orchestrator process to expand database disks Describe the VMware SD-WAN Orchestrator system metrics for monitoring Describe how systems metrics are collected for monitoring VMware SD-WAN Orchestrator Describe VMware SD-WAN Gateway additions and removals Describe the VMware SD-WAN Gateway upgrade process Describe the VMware SD-WAN Gateway validation process VMware SD-WAN Security and Edge Licensing Describe the VMware SD-WAN PKI security infrastructure Recognize VMware SD-WAN PKI authentication modes Describe VMware SD-WAN certificate operations Describe the VMware SD-WAN PKI certificate authentication configuration Describe the VMware SD-WAN PKI configuration process Compare operator and partner logins Describe the VMware SD-WAN self-signed certificate authority process Describe VMware SD-WAN certificate authority renewal and revocation Describe the VMware SD-WAN intermediate certificate authority Describe the VMware SD-WAN certificate chain of trust Describe the VMware SD-WAN Edge licensing and license types Assign and view the VMware SD-WAN Edge licenses and reports VMware SD-WAN Reporting and Diagnostics Describe the VMware SD-WAN network monitoring tools Describe the VMware SD-WAN network visibility options and controls Identify the VMware SD-WAN Orchestrator reporting features Describe and analyze VMware SD-WAN Orchestrator events View enterprise reports by operator, partner, and administrator View historical network insights and real-time reports on path visibility Describe common VMware SD-WAN alerts Describe the VMware SD-WAN heart mechanism for alerts Configure VMware SD-WAN alerts Analyze common VMware SD-WAN alerts Use standard networking tools for monitoring VMware SD-WAN Describe remote diagnostic actions available on VMware SD-WAN Orchestrator Use the remote diagnostics tools on VMware SD-WAN Orchestrator Generate remote diagnostics bundles and packet captures VMware SD-WAN Orchestrator and Gateway Troubleshooting Recognize the basic sanity checks to troubleshoot VMware SD-WAN Orchestrator Create diagnostic bundles to enable support to troubleshoot VMware SD-WAN Orchestrator Recognize the basic checks to troubleshoot VMware SD-WAN Orchestrator Troubleshoot common VMware SD-WAN Orchestrator performance issues Describe the tools available to troubleshoot VMware SD-WAN Gateway Analyze sample outputs for debugging a VMware SD-WAN Gateway issue Use Data Plane Development Kit to improve VMware SD-WAN Gateway performance VMware SD-WAN Orchestrator and Gateway Commands Recognize when and how to use VMware SD-WAN Orchestrator database-monitoring commands Recognize when and how to use the VMware SD-WAN Gateway process-monitoring commands
Duration 2 Days 12 CPD hours This course is intended for This course assumes that you have successfully completed the Administering BIG-IP course, or equivalent, and have hands-on experience working in a production BIG-IP environment for several months. You should have a solid understanding of the environment in which the BIG-IP is deployed. This course is meant for BIG-IP administrators, network engineers, applications engineers, etc., who will be responsible for troubleshooting problems associated with their BIG-IP system. This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Reviewing High Availability (HA) Module 3: Troubleshooting Methodology Step-By-Step Process Step 1: State the Problem Step 2: Specify the Problem Step 3: Map the System Step 4: Develop Possible Causes Step 5: Test Theories Step 6: Iterate Until Root Cause Identified Documenting a Problem Putting Troubleshooting Steps to Use Module 4: Working with F5 Support Leveraging F5 Support Resources AskF5.com DevCentral iHealth Leveraging F5 Labs Working with F5 Technical Support Running End User Diagnostics (EUD) - Hardware Only New Platform Diagnostic Tools Always-On Management (AOM) Subsystem Requesting Return Materials Authorization F5?s Software Version Policy Managing the BIG-IP License for Upgrades Managing BIG-IP Disk Space Upgrading BIG-IP Software Module 5: Troubleshooting ? Bottom to Top Introducing Differences between BIG-IP and LINUX Tools Troubleshooting with Layer 1/Layer 2 Tools Troubleshooting with Layer 2/Layer 3 Tools Troubleshooting with Layer 3 Tools Troubleshooting with LINUX Tools Troubleshooting Memory and CPU Troubleshooting with watch Troubleshooting with Additional tmsh commands Module 6: Troubleshooting Tools tcpdump Wireshark ssldump Fiddler diff KDiff3 cURL Module 7: Using System Logs Configuring Logging Log Files Understanding BIG-IP Daemons Functions Triggering an iRule Deploying and Testing iRules Application Visibility and Reporting Module 8: Troubleshooting Lab Projects Network Configurations for Project Additional course details: Nexus Humans F5 Networks Troubleshooting BIG-IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Troubleshooting BIG-IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Discuss Horizon Connection Server advanced configurations List troubleshooting techniques for Horizon Connection Server common issues Interpret Horizon 8 Connection Server logs Identify Unified Access Gateway configuration and certificate issues List troubleshooting steps for Unified Access Gateway common issues Describe BLAST configuration verification using logs and settings Describe BLAST optimization recommendations for different use cases Describe Horizon 8 Connections and how to troubleshoot related issues Describe Horizon 8 certificates List troubleshooting steps for common issues with Horizon 8 certificates Leverage Horizon infrastructure troubleshooting steps to resolve issues This three-day, hands-on training provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon© 8 infrastructure. This workshop teaches the required skill and competence for troubleshooting VMware Horizon© Connection Server?, VMware Unified Access Gateway?, protocols, connections, and certificates Course Introduction Introduction and course logistics Course objectives Horizon Connection Server Troubleshooting Discuss Horizon Connection Server general troubleshooting techniques Identity Horizon Connection Server common issues through logs Describe AD LDS replication Discuss Horizon Connection Server replication common issues Review and Interpret Horizon Connection Server logs Compare successful and unsuccessful logs from everyday infrastructure administration tasks Unified Access Gateway Troubleshooting List and identify common Unified Access Gateway deployment issues Monitor the Unified Access Gateway deployment to identify health and issues Identify and troubleshoot Unified Access Gateway certificate issues Monitor, test, and troubleshoot network problems Discuss general Unified Access Gateway troubleshooting processes BLAST Configuration Verification Discuss BLAST Codecs and Encoder Switch settings. Describe how to verify BLAST configuration using logs and settings BLAST Optimization List general BLAST optimization recommendations Summarize BLAST tuning recommendations that apply to WAN connections Summarize BLAST tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe recommended tuning options to increase display protocol quality for all use cases and applications. VMware Horizon Connections Troubleshooting Explain Horizon connections Describe the role of Primary and Secondary protocols in Horizon connections Describe HTML client access connections Describe Horizon connections load balancing Describe timeout settings, supported health monitoring string, and suitable load balancer persistence values Identify troubleshooting steps for failing Horizon load balancer connections List troubleshooting steps for Horizon connections VMware Horizon Certificates Troubleshooting List Horizon certificate functions Describe Horizon certificates scenarios. Discuss potential challenges related to certificates in Horizon Describe the troubleshooting approach to Horizon certificate issues VMware Horizon Challenge Lab Leverage Horizon infrastructure troubleshooting steps to resolve issue Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Infrastructure Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Infrastructure Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Cloud architects, systems engineers, data center administrators, and cloud administrators with experience in a service provider or managed services environment. Overview By the end of the course, you should be able to meet the following objectives: Describe how VMware Integrated OpenStack fits into the VMware SDDC and its use cases List the deployment options and how to install VMware Integrated OpenStack Describe the architecture of VMware Integrated OpenStack and its components Configure tenancy and manage user authentication Integrate the OpenStack Neutron Networking service with VMware NSX-T⢠Data Center networking platform Deploy and manage virtual machine instances Monitor VMware Integrated OpenStack with OpenStack monitoring services Design an auto-scale, multitier application using built-in automation tools Manage a VMware Integrated OpenStack control plane using Kubernetes Use the HTML5 Web UI and CLI commands to view and edit the configuration, monitor log files, and view database tables used by VMware Integrated OpenStack components This five-day course provides you with the skills to build a private cloud using VMware© Integrated OpenStack on a proven VMware SDDC. Through a combination of lecture and hands-on labs, this course builds your skills in installing, configuring, and managing VMware Integrated OpenStack. You learn how to offer IaaS and PaaS with advanced networking and security features to end users using VMware Integrated OpenStack. Course Introduction Introductions and course logistics Course objectives References and resources Introduction to VMware Integrated OpenStack Describe what an OpenStack is Describe the services that make up VMware Integrated OpenStack Describe what VMware Integrated OpenStack is Describe what is NFV and how does VIO fit in Understand the licensing model of VIO Understand the use cases of VMware Integrated OpenStack VMware Integrated OpenStack Deployment Understand the role of Kubernetes in the VIO control plane List the VMware Integrated OpenStack deployment models How to perform VIO high-availability deployment How to perform VIO compact installation Pre-requisites for installing VMware Integrated OpenStack How to use the HTML5 web UI / VIOCLI to check the deployment configurations and deployment running status Explain steps involved in patching VIO high availability setup VMware Integrated OpenStack Architecture List the VMs deployed after a VMware Integrated OpenStack high-availability installation Describe the overall architecture of the VIO HA setup List the VIO services running within Kubernetes pods Describe the role of each service Understand ssl certificates in VIO Keystone Authentication Understand keystone use cases and services List the features offered by keystone in VIO How to integrate keystone with LDAP List the configuration, view logs, and database tables related to keystone Glance Images Understand Glance use case and its services List the features offered by Glance in VIO Explain how to create flavors and images Describe how to set up metadata, for example SPBM storage policy List the custom resources/logs and database tables related to Glance Networking with Neutron Understand the Neutron use case and its services Integrate Neutron with NSX-T Data Center List the custom resources, logs, and database tables related to Neutron Managing Instances with Nova Understand Nova use cases and services Understand regions, availability zones, and host aggregates Understand the concept of tenant VDC Nova support for multiple vCenter instances How to deploy an instance using Nova How to resize an instance and view the console logs Configuration and logs related to Nova service Cinder Block Storage Understand Cinder use cases and services List the features offered by Cinder Adding a persistent volume to an instance Explain the Snapshot of a Cinder volume and attach it to another instance List the custom resources, log files, and database tables related to Cinder Monitoring with Ceilometer List the Telemetry use cases and services How to enable Ceilometer in VIO How to monitor the VIO environment using Ceilometer Configuration and log files related to Ceilometer service Automating with Heat Define Heat use cases templates and services Describe use cases of Heat Troubleshooting Concepts List common issues in VMware Integrated OpenStack Use troubleshooting tools Describe simple troubleshooting procedures List and explain Day-2 operations Advanced Features Describe Load Balancer as a Service (Octavia) Explain Firewall as a Service Describe Designate (DNS as a Service) Demonstrate automating scaling Describe selective vCPU pinning Explain SRIOV network redundancy support Describe network trunk services support Describe Live resize Describe hardware passthrough (GPU pass through) Describe external REST API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Integrated Openstack: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Integrated Openstack: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Threat Intelligence Analyst students will be able to proactively collect threat data and implement strategies to limit exposure to those threats. Additionally, they will be prepared to take the C)TIA exam Everywhere you turn today, you hear about the need for threat intelligence analysis! However, in some cases, it is just a buzzword, while in other cases, threat intelligence is being touted as the remedy toward advanced persistent threats. The real question is, how do we leverage threat intelligence to reduce network vulnerabilities without wasting time and money? The answer is simple, Mile2?s Certified Threat Intelligence Analyst course. Mile2?s CTIA course will help security professionals learn how to make good use of the many sources of threat intelligence. It will aid an individual to understand what threat sources are helpful, which specific threats are targeted and which ones may need minor adjustments to monitor within your organization. Mile2?s CTIA course focuses heavily on hands-on labs, concentrating on discerning and interpreting threats and responding to them.ÿ The CTIA course focuses overall on current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security posture. Once complete, the student will be competent toward improving a company?s existing security infrastructure. Policies and methodologies learned in the CTIA will allow the student to use threat intelligence concepts to decrease overall company risk. Course Outline Threat Intelligence Basics Cyber Threats Threat Actors Case Studies Threat Identification Proactive Approach
Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Customers, cloud architects, systems engineers, data center administrators Network administrators with experience in managed services or managing a Telco Cloud environment Overview By the end of the course, you should be able to meet the following objectives: Deploy VMware Telco Cloud Service Assurance Manage VMware Telco Cloud Service Assurance to satisfy Telco cloud provider needs Discuss configurable options for VMware Telco Cloud Service Assurance Identify and configure different data sources which are used with VMware Telco Cloud Service Assurance Configure different collectors in VMware Telco Cloud Service Assurance Identify the Root Cause Analysis options with VMware Telco Cloud Service Assurance Discuss data collection in VMware Telco Cloud Service Assurance Explain root cause analysis in VMware Telco Cloud Service Assurance Navigate through the logs for troubleshooting This three-day, hands-on training course provides the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Telco Cloud Service Assurance environment. In this course, you are introduced to the installation methods of VMware Telco Cloud Service Assurance? across various supported platforms and troubleshooting tools that help you install, manage, and troubleshoot your VMware Telco Cloud Service Assurance environment. In addition, you are presented with various types of configuration options, which you will identify, analyze, and navigate through as you explore the UI and configurable options of the product. Course Introduction Introduction and course logistics Course objectives Introduction to VMware Telco Cloud Service Assurance Describe the features of VMware Telco Cloud Service Assurance List the capabilities of VMware Telco Cloud Service Assurance Discuss the use cases of VMware Telco Cloud Service Assurance Describe the role played by VMware Telco Cloud Service Assurance components in delivering service assurance Deploying VMware Telco Cloud Service Assurance Explain different deployment options of VMware Telco Cloud Service Assurance Identify different deployment methods of VMware Telco Cloud Service Assurance Discuss different phases in deploying VMware Telco Cloud Service Assurance Identify different footprints available for HA based and non-HA based installation of VMware Telco Cloud Service Assurance Describe the SMARTs components of VMware Telco Cloud Service Assurance Deploy VMware Telco Cloud Service Assurance User Access Control Describe the features Role-based Access Control (RBAC) Outline the role of Keycloak in implementing RBAC in VMware Telco Cloud Service Assurance Configure user federation in Keycloak Use the VMware Telco Cloud Service Assurance UI to manage RBAC Create policies in VMware Telco Cloud Service Assurance that align with job roles Services and User Interface Configurations Describe the architecture of logical switching Describe the core services on a TCSA cluster Discuss the Global Manager or Service Assurance Manager (SAM), IP Domain Manager, Server Manager (ESM) Discuss VMware Telco Cloud Service Assurance UI Overview Explain Working with Notifications Elaborate Configuring Summary's Describe Accessing Notification Details Explain Viewing and configuring Topologies List Customizing Topologies Describe Topology Explorer Explain Collecting Troubleshooting Information Discuss Custom models Describe how compute resources are provided to VMware Telco Cloud Service Assurance Describe how storage is provided to VMware Telco Cloud Service Assurance Configure and manage VMware Telco Cloud Service Assurance Discuss configurable options for VMware Telco Cloud Service Assurance Day 1 and Day 2 Operations Review the architecture of logical routing and NSX Edge nodes Identify different data sources to be used with VMware Telco Cloud Service Assurance Configure different collectors with VMware Telco Cloud Service Assurance Describe Alarms and Thresholds Demonstrate how to configure alarms with VMware Telco Cloud Service Assurance Explain how to setup thresholds and timelines in VMware Telco Cloud Service Assurance Define Catalog management and sharing catalogs inside and between organizations. Identify the steps to import or upload data into catalogs. Explain the purpose of catalogs and How to Create a catalog organization. Describe the Purpose and Usage of Open Virtualization Format (OVA) and Custom vApp or VM Properties. Discuss vApp Templates Logs and Troubleshooting Review the architecture of the Distributed Firewall Discuss VMware Telco Cloud Service Assurance installations logs List Smarts installation logs Explain backup and restore options of VMware Telco Cloud Service Assurance Identify the approach for troubleshooting containerized services Discuss monitoring services
Duration 3 Days 18 CPD hours This course is intended for Any IT specialist eager to become an industry recognized expert on Veeam software solutions. Overview This certification is an excellent investment for an IT professional looking to increase productivity, reduce operating costs, increase potential for personal career advancement and gain recognition from the employer and customers. By completing the Veeam Certified Engineer (VMCE) course you should be able to:Get more functionality out of Veeam solutionsIdentify and resolve issues more efficientlyGain a distinction from your peers The Veeam Certified Engineer (VMCE) course is a 3-day technical deep-dive focused on teaching engineers to architect, implement, optimize and troubleshoot the Veeam software solution. Module 1 Introduction Module 2 Veeam Products Veeam Availability Suite Key Concepts Module 3 Auto Discovery of Backup and Virtual Infrastructure Business Categorization Pre-Defined Alerting Unattended Monitoring Reporting and Dashboards Agentless Data Gathering Hyper-V Specific Features Veeam One Deployment Veeam One Assessment Tool Module 4 Core Components and Their Interaction Optional Components Deployment Scenarios Prerequisites Upgrading Veeam Backup & Replication Module 5 Adding Servers Adding a VMware Backup Proxy Adding a Hyper-V Off-host Backup Proxy Adding Backup Repositories Performing Configuration Backup and Restore Managing Network Traffic Global Notification Settings Getting to Know User Interface Module 6 Creating Backup Jobs Creating Restore Points with VeeamZIP and Quick Backup Backup Copy Replication Creating VM/File Copy Jobs Module 7 SureBackup Recovery Verification SureReplica Module 8 Data Recovery Working with Veeam Backup & Replication Utilities Insight into Recovery from Replica Module 9 Item-Level Recovery Guest OS File Recovery Module 10 Tape Device Support SAN Storage Systems Support Support for Deduplicating Storage Systems Veeam Cloud Connect Veeam Backup Enterprise Manager vCloud Director Support Module 11 Product Editions Comparison Full and Free Functionality Modes Module 12 How to Identify the Problem How to review and analyze the issue Search for additional information Veeam Support
Duration 3 Days 18 CPD hours This course is intended for Participants are any IT specialist eager to become an industry recognized expert on Veeam software solutions:System Engineer / Administrator Backup / Virtualization Administrators Pre-Sales / Post-Sales / Solution Architects / Consultants Overview This certification is an excellent investment for an IT professional looking to increase productivity, reduce operating costs, increase potential for personal career advancement and gain recognition from the employer and customers. By completing the Veeam Certified Engineer (VMCE) course you should be able to:Get more functionality out of Veeam solutionsIdentify and resolve issues more efficientlyGain a distinction from your peers The Veeam Certified Engineer (VMCE) course is a 3 day technical deep-dive focused on teaching consultants and engineers to architect, implement, optimize and troubleshoot the Veeam software solution. Introduction Introduction Overview of Veeam products Hypervisor Support Veeam Backup & Replication key features Veeam One key features Veeam Management Pack vCloud Director Support Key concepts Backup Methods Scheduling Changed Block Tracking (CBT) Compression and Deduplication Retention Policy Veeam ONE features and functionality Auto Discovery of Backup and Virtual Infrastructure Business Categorization Pre-Defined Alerting Unattended monitoring Reporting and dashboards Agentless data gathering Hyper-V specific features Veeam One Deployment Veeam One assessment Tool Deployment Solution Architecture Deployment Scenarios Prerequisites Upgrading Veeam Backup & Replication Initial Configuration Adding Servers Adding a VMware Backup Proxy Adding a Hyper-V Offhost Backup Proxy Adding Backup Repositories Performing Configuration Backup and Restore Getting to Know User Interface Performing Backup Creating Backup Jobs Creating VM Copy Jobs Instant VM Recovery Replication (Replication Job, Failover, Failback) Insight into Replication Insight into Failover Insight into Failback SureBackup, SureReplica SureBackup Recovery Verification SureReplica Restore your VMs and Objects Data Recovery Restoring Microsoft Exchange and SharePoint objects Working with Veeam Backup & Replication Utilities 3-2-1 rule (Backup to tape, WAN, Backup Copy) Wan Accelerator Offsite Backup Copy Job Delegate file and VM restores with Veeam Backup Enterprise Manager Veeam Backup Enterprise Manager RESTful API HP StoreVirtual VSA Product Editions Product Editions Comparison Full and Free Troubleshooting How to review and analyze the issue Search for additional information Veeam Support Additional course details: Nexus Humans Veeam Certified Engineer (VMCE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Veeam Certified Engineer (VMCE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.