Duration 4 Days 24 CPD hours This course is intended for This course is intended for: System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe Cisco DWDM platform basics Describe DWDM network topologies Describe the management software used for managing Cisco DWDM networks List the different hardware components of the Cisco ONS and Cisco NCS DWDM systems Provision nodes and circuits in a Cisco DWDM network Perform node and multishelf configurations Implement SMR-based rings Provision optical circuit protection mechanisms Configure Any Rate cards Describe the function of Raman amplifiers Perform basic maintenance and troubleshooting of a Cisco DWDM network The Cisco Optical Technology Intermediate (OPT200) v3.0 course is designed to teach you the skills necessary to deploy the Cisco© Optical Networking System (ONS), 15454 Multiservice Transport Platform (MSTP), and Cisco Network Convergence System (NCS) 2000 Series Dense Wavelength-Division Multiplexing (DWDM) networks from installation to protection. Through a combination of lecture and hands-on experience, you will learn installation, configuration, circuit protection, maintenance, and basic troubleshooting using the Cisco Transport Controller for the Cisco ONS 15454 M6 and M12 shelves, and for the Cisco NCS 2016 shelf.Additionally, in this course you will review DWDM terminology and components, explore available chassis and cards, and discuss hardware installation. You will learn to use the Cisco Transport Controller server software to connect to the nodes, perform network turn-up and circuit creation, and deploy linear and single-module ROADM (SMR) DWDM multishelf topologies. Using this software, you will also configure Raman amplifiers and Any Rate cards, and configure protected and unprotected circuits. The course covers a variety of card options: controllers, transponders, multiplexer-demultiplexer, add/drop, Raman amplifiers, and Cisco Any Rate muxponder cards. You will use the various cards to configure terminal, amplifier, mesh, split, Optical Service Channel (OSC) regenerator, and Reconfigurable Optical Add/Drop Multiplexing (ROADM) nodes. Finally, you will learn how to use many of the tools and features available with the Cisco Transport Controller to perform maintenance, testing, and basic troubleshooting of your optical network. Course Outline DWDM Optical Platform Foundation Chassis and Cards Hardware Installation Node Turn-Up and Circuit Creation Node and Multishelf Configurations SMR-Based Rings 10Gb Circuit Protection Any Rate Card Configuration Raman Amplifiers Maintenance and Basic Troubleshooting Additional course details: Nexus Humans Cisco Optical Technology Intermediate v3.0 (OPT200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Optical Technology Intermediate v3.0 (OPT200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for Security EngineersNetwork Engineers Overview This course is intended to provide a top-level overview of Palo Alto Networks© Traps? Endpoint protection product. Upon completion of the class the student will be able to understand these principles: Explain the core technologies of Traps? and how it differs from traditional signature recognition technologies. Understand the advantages of these technologies over existing solutions. Understand Traps? product architecture and deployment requirements. Installation requirements for Traps? installations. Deploy Exploit Prevention Module defenses to endpoints with Policies. Deploy Malware Protection defenses to endpoints. Provide Application Execution Control in conjunction with WildFire?. Understand deployment strategies and tactics for Workstations, VDI and Server endpoints. Gather and analyze Security Event reports and forensics. Foundation classes are just introductory trainings, NOT a full technical training. Compromise isn?t inevitable, or, at least, it shouldn?t be. Traditional endpoint protection simply cannot keep up with the rapidly evolving threat landscape, leaving organizations vulnerable to advanced attacks. A new approach is needed, one that can rebuild confidence in endpoint security. This new approach needs to prevent advanced attacks originating from executables, data files or network-based exploits ? known and unknown ? before any malicious activity could successfully run. Palo Alto Networks© call this ?advanced endpoint protection.? By focusing on the attacker?s core techniques and putting up barriers to mitigate them, the attacker?s path for exploitation becomes known, even when the attack isn?t. Traps? focuses on the core techniques leveraged by exploits in advanced cyberattacks and renders these techniques ineffective by breaking the exploit sequence and blocking the technique the moment it is attempted. IntroductionThe Traps? technology alternative to endpoint defenseTraps? Exploit and Malware protectionTraps? Product ArchitectureTraps? DeploymentTraps? Exploit Policy ManagementTraps? Malware Protection PoliciesTraps? ForensicsPractical Traps? Implementation considerations Additional course details: Nexus Humans Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks - Foundations of Palo Alto Networks Traps Endpoint protection (EDU-180) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. Introduction Veeam Availability Suite v11: Configuration and Management Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them The 3-2-1 Rule and its importance in formulating a successful backup strategy Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types Building backup capabilities Backup methods, the appropriate use cases and impact on underlying file systems Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure Building replication capabilities Identify and describe the options available for replication and impacts of using them Create and modify replication jobs, outline considerations to ensure success Introduce the new Continuous Data Protection (CDP) policy Secondary backups Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery Discuss using tapes for backups Advanced repository capabilities Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage Ensure compatibility with existing deduplication appliances Introduce the new hardened repository Protecting data in the cloud Review how Veeam can protect the data of a cloud native application Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam Review how Veeam can be used to protect your Office 365 data Restoring from backup Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders Utilize Secure Restore to prevent the restoration of malware Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production Identify, describe and utilize the different explores and instant recovery tools and features Recovery from replica Identify and describe in detail, failover features and the appropriate usage Develop, prepare and test failover plans to ensure recovery Disaster recovery from replica to meet a variety of real-world recovery needs Testing backup and replication Testing backups and replicas to ensure you can recover, what you need, when you need to Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots Veeam Backup Enterprise Manager and Veeam ONE Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? Configuration backup Locate, migrate or restore backup configuration Introduction Veeam Backup & Replication v11: Architecture and Design Review the architecture principles Explore what a successful architecture looks like Review Veeam?s architecture methodology Discovery Analyze the existing environment Uncover relevant infrastructure metrics Uncover assumptions and risks Identify complexity in the environment Conceptual design Review scenario and data from discovery phase Identify logical groups of objects that will share resources based on requirements Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks Review infrastructure data with each product component in mind Create high level design and data flow Logical design Match critical components and features of VBR with requirements Create logical groupings Determine location of components and relationship to logical grouping Aggregate totals of component resources needed per logical grouping Calculate component (storage, CPU, memory) quantity sizing Physical/tangible design Convert the logical design into a physical design Physical hardware sizing Create a list of physical Veeam backup components Implementation and Governance Review physical design and implantation plan Review Veeam deployment hardening Describe the architect?s obligations to the implementation team Provide guidance on implementation specifics that relate to the design Validation and Iteration Provide framework for how to test the design Further develop the design according to a modification scenario
Duration 5 Days 30 CPD hours Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This course is designed for experienced Linux administrators who require networking and security administration skills. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode Additional course details: Nexus Humans Enterprise Linux System Admin 3 with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin 3 with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for IT Professionals and Consultants. Overview Identify risks and areas for improvement in a Citrix Virtual Apps and Desktops environment by assessing relevant information in an existing deployment. Determine core Citrix Virtual Apps and Desktops design decisions and align them to business requirements to achieve a practical solution. Design a Citrix Virtual Apps and Desktops disaster recovery plan and understand different disaster recovery considerations. This advanced 5-day training course teaches the design principles for creating a Citrix Virtual Apps and Desktops virtualization solution. In this training, you will also learn how to assess existing environments, explore different scenarios, and make design decisions based on business requirements. This course covers the Citrix Consulting approach to design and covers the key design decisions through lectures, lab exercises, and interactive discussions. You will also learn about additional considerations and advanced configurations for multi-location solutions and disaster recovery planning. This training will help you prepare for the Citrix Certified Expert in Virtualization (CCE-V) exam. Module 1: Methodology & Assessment The Citrix Consulting Methodology Citrix Consulting Methodology Use Business Drivers Prioritize Business Drivers User Segmentation User Segmentation Process App Assessment Introduction App Assessment Analysis Why Perform a Capabilities Assessment? Common Capabilities Assessment Risks Module 2: User Layer Endpoint Considerations Peripherals Considerations Citrix Workspace App Version Considerations Citrix Workspace App Multiple Version Considerations Network Connectivity and the User Experience Bandwidth and Latency Considerations Graphics Mode Design Considerations HDX Transport Protocols Considerations Media Content Redirection Considerations Session Interruption Management Session Reliability Feature Considerations Session Interruption Management Auto-Client Reconnect Feature Considerations Session Interruption Management ICA Keep-Alive Feature Considerations Module 3: Access Layer Access Matrix Access Layer Access Layer Communications Double-Hop Access Layer Considerations Citrix Cloud Access Layer Considerations Use Cases for Multiple Stores Define Access Paths per User Group Define Number of URLs Configuration and Prerequisites for Access Paths Citrix Gateway Scalability Citrix Gateway High Availability StoreFront Server Scalability StoreFront Server High Availability Module 4: Resource Layer - Images Flexcast Models VDA Machine Scalability VDA Machine Sizing with NUMA VDA Machine Sizing VDA Machine Scalability Cloud Considerations Scalability Testing and Monitoring Secure VDA Machines Network Traffic Secure VDA Machines Prevent Breakouts Secure VDA Machines Implement Hardening Secure VDA Machines Anti-Virus Review of Image Methods Citrix Provisioning Overall Benefits and Considerations Citrix Provisioning Target Device Boot Methods Citrix Provisioning Read Cache and Sizing Citrix Provisioning Write Cache Type Citrix Provisioning vDisk Store Location Citrix Provisioning Network Design Citrix Provisioning Scalability Considerations Citrix Machine Creation Services Overall Benefits and Considerations Citrix Machine Creation Services Cloning Types Citrix Machine Creation Services Storage Locations & Sizing Citrix Machine Services Read and Write Cache App Layering Considerations Image Management Methods Module 5: Resource Layer - Applications and Personalization Application Delivery Option Determine the Optimal Deployment Method for an App General Application Concerns Profile Strategy Profile Types Review Citrix Profile Management Design Considerations Citrix Profile Management Scaling Citrix Profile Management Permissions Policies Review Optimize Logon Performance with Policies Printing Considerations Module 6: Control Layer Pod Architecture Introduction Pod Architecture Considerations Citrix Virtual Apps and Desktops Service Design Considerations Implement User Acceptance Testing Load Balancing the Machine Running the VDA Citrix Director Design Considerations Management Console Considerations Change Control Delivery Controller Scalability and High Availability Control Layer Security Configuration Logging Considerations Session Recording Module 7: Hardware/Compute Layer Hypervisor Host Hardware Considerations Separating Workloads Considerations Workload Considerations VMs Per Host and Hosts Per Pool Citrix Hypervisor Scalability VM Considerations in Azure and Amazon Web Services Storage Tier Considerations Storage I/O Considerations Storage Architecture Storage RAID & Disk Type Storage Sizing LUNs Storage Bandwidth Storage in Public Cloud Datacenter Networking Considerations Securing Hypervisor Administrative Access Secure the Physical Datacenter Secure the Virtual Datacenter Module 8: Module 8: High Availability and Multiple Location Environments Redundancy vs. Fault Tolerance vs. High Availability Multi-Location Architecture Considerations Multi-Site Architecture Considerations Global Server Load Balancing Optimal Gateway Routing Zone Preference and Failover StoreFront Resource Aggregation StoreFront Subscription Sync Hybrid Environment Options Citrix Provisioning Across Site Site Database Scalability and High Availability Citrix Provisioning Across Sites Considerations Citrix Machine Creation Across Sites App Layering Across Sites Managing Roaming Profiles and Citrix Workspace App Configurations Across Devices Profile Management Multi-Site Replication Considerations Folder Redirections and Other User Data in a Multi-Location Environment Application Data Considerations Cloud-Based Storage Replication Options Multi-Location Printing Considerations Zone Considerations Active Directory Considerations Module 9: Disaster Recovery Tiers of Disaster Recovery Disaster Recovery Considerations Business Continuity Planning and Testing Citrix Standard of Business Continuity
Duration 4 Days 24 CPD hours This course is intended for Risk professionals Business analysts Project managers Compliance professionals IT professionals Anyone whose work includes evaluating and mitigating risk Overview This boot camp prepares you to pass the ISACA CGEIT exam, which covers four domain areas designed to reflect the work performed by individuals who have a significant management, advisory or assurance role relating to the governance of IT. Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization This CGEIT Boot Camp is designed for experienced IT governance personnel and those who have responsibilities for the stewardship of IT resources. You will learn how to effectively implement and manage governance across all areas of technology ? as well as align that technology with strategic enterprise goals. This training also explains the CGEIT examination process and helpsprepare you for your CGEIT exam by providing guidance and testing your exam readiness through sample questions. You?ll leave fully prepared to earn your CGEIT certification. Course Outline Domain 1: Governance of enterprise IT Domain 2: IT resources Domain 3: Benefits realization Domain 4: Risk optimization
Duration 4 Days 24 CPD hours This course is intended for Information Assurance Managers/Auditors System Implementors/administrators IT Administrators Auditors/Auditees Federal Agencies/Contractors Security Vendors and Consulting Groups Overview Upon completion, the IS20 Security Controls candidate will be able to not only competently take the IS20 Controls exam but will also have an understanding of how to implement the top 20 most critical controls in the work place. IS20 controls are the Top Twenty Most Critical Security Controls in Information Technology.ÿ This 4 day training course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. Nearly all organizations that maintain sensitive information are adopting these Security Controls. These controls were chosen by leading government and private organizations who are experts on how attacks work and what can be done to prevent them from happening. The controls were selected as the best way to block known attacks as well as help search for and alleviate any damage from the attacks that are successful. This course allows the security professional to see how to implement controls in an existing network through highly effective and economical automation. For management, this training is the best way to distinguish how you will assess whether these security controls are effectively being administered. Introduction Critical Control 1 Critical Control 2 Critical Control 3 Critical Control 4 Critical Control 5 Critical Control 6 Critical Control 7 Critical Control 8 Critical Control 9 Critical Control 10 Critical Control 11 Critical Control 12 Critical Control 13 Critical Control 14 Critical Control 15 Critical Control 16 Critical Control 17 Critical Control 18 Critical Control 19 Critical Control 20
Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to: Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement and administer Active Directory Rights Management Services (AD RMS). Implement synchronization between AD DS and Azure AD. Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer This is a two day instructor-led course that focuses on the skills and knowledge needed to implement and configure a Cisco TelePresence Management Suite and Cisco TelePresence Management Suite Extensions. Students will configure TMS, TMSPE, TMSXE, VCS and UCM for management of endpoints. Students will also learn to Configure and Schedule Conferencing, Administrative Tasks, Set up Microsoft Active Directory Users, Manage Conferences and Provision Devices. Installing Cisco Telepresence Management Server Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Release and Option Keys Upgrading TMS Backup TMS Configuring Cisco TelePresence Management Suite (TMS) Initial Configuration Endpoint Configuration Adding User Accounts and Profiles Groups and Permissions Active Directory Lookup Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS Direct Managed Endpoint Features CUCM Configuration for TMS Direct Endpoint Management ? CUCM TMS Responsibilities CUCM Responsibilities Findme Configuration Phonebooks & Phonebook Sources Booking Conferencing Conference Creation Advanced Conference Settings Booking & Scheduling Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Reporting on TMS Reporting Basics Creating a Report Using Reporting Templates Bridge Utilization Call Detail Records Billing Code Statistics Conferences System Managing and Troubleshooting TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance
Duration 0.5 Days 3 CPD hours This course is intended for This course is intended for people who have made the transition to remote working and now wish to fully leverage Microsoft Teams for their day to day business needs. Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Features such as: how to manage communications, file sharing for collaboration, calendar events, conference calling, search functions and other daily tasks. Prerequisites: To ensure your success in this course, you should have end-user skills with any current version of Windows, including being able to open and close applications, navigate basic file structures, and manage files and folders. Overview Overview of Teams Permissions, Access & Restrictions Team Management (Power Users) Team Management (End Users) Communication and Collaboration Searching and Activity Sharing Files Customizing your settings Meetings and Calls Done in a show and Tell style, this course is designed to give business users a thorough understanding of how to use Teams features from an organizational perspective. Overview What is Microsoft Teams? How to Access Microsoft Teams Etiquette for using teams Integration and Storage Capabilities Interface Permissions, Access & Restrictions Owner, Member & Guest Team restrictions Channel restrictions Call Restrictions Team Management (Power Users) Create a Team Access administrator settings Add/delete members to a Team Add/delete a guest user Create and manage Channels Create and manage Private channels Customize Channel tabs Creating Tags Team Management (End Users) Getting your Channel email address Integration with Outlook Leave a Team or Channel Communication and Collaboration Team Conversations Using the New Conversation panel Replying to a conversation Using the interactive options Deleting and editing a conversation Turn off notifications for a conversation Using Mentions and Tags Saving messages Accessing your saved messages Accessing recent chats Create a new Chat for one-2-one Create a new chat for group chats Read Receipts Pop out Chats Searching and Activity Use the search tool to find Specific messages Files People Accessing your Activity Accessing your Feed Filtering your feed and activity Sharing Files Uploading files Viewing files Attaching files to a conversation Sharing a link to a file Edit and Collaborate on files Create files Open files in Teams Online Desktop SharePoint Add a file to a tab Share file outside your organization Customizing your settings Filter Teams Hide channels Channel notifications Channel analytics Changing your Status Setting your status message Controlling the general user settings Controlling your privacy settings Controlling your personal notification settings Controlling your device settings (headphones and microphone) Controlling your call settings Setting your Voicemail message Controlling your app permissions Meetings and Calls Accessing your calendar Calendar views Create a Teams meeting Meeting options Meeting requests and RSVP options Join a Teams meeting Copy join information Create a meeting from Outlook Using the Meet Now option Sharing your screen Changing your background image Adding more people to a meeting Meetings menu Download meeting attendees End meetings for everyone (Organizer only) Accessing your Contacts Accessing your Voicemail Accessing your call history Additional course details: Nexus Humans Microsoft Teams for the Remote Business User training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Teams for the Remote Business User course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.