• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2883 Learning courses delivered Live Online

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Those who will provide container orchestration management in the AWS Cloud including: DevOps engineers Systems administrators Overview In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster. Publish container images to ECR and secure access via IAM policy. Automate and deploy applications, examine automation tools and pipelines. Create a GitOps pipeline using WeaveFlux. Collect monitoring data through metrics, logs, tracing with AWS X-Ray and identify metrics for performance tuning. Review scenarios where bottlenecks require the best scaling approach using horizontal or vertical scaling. Assess the tradeoffs between efficiency, resiliency, and cost and impact for tuning one over the other. Describe and outline a holistic, iterative approach to optimizing your environment. Design for cost, efficiency, and resiliency. Configure the AWS networking services to support the cluster. Describe how EKS/Amazon Virtual Private Cloud (VPC) functions and simplifies inter-node communications. Describe the function of VPC Container Network Interface (CNI). Review the benefits of a service mesh. Upgrade your Kubernetes, Amazon EKS, and third party tools Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You will build an Amazon EKS cluster, configure the environment, deploy the cluster, and then add applications to your cluster. You will manage container images using Amazon Elastic Container Registry (ECR) and learn how to automate application deployment. You will deploy applications using CI/CD tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal/vertical scaling. You will learn how to design and manage a large container environment by designing for efficiency, cost, and resiliency. You will configure AWS networking services to support the cluster and learn how to secure your Amazon EKS environment. Module 0: Course Introduction Course preparation activities and agenda Module 1: Container Fundamentals Best practices for building applications Container fundamentals Components of a container Module 2: Kubernetes Fundamentals Container orchestration Kubernetes objects Kubernetes internals Preparing for Lab 1: Deploying Kubernetes Pods Module 3: Amazon EKS Fundamentals Introduction to Amazon EKS Amazon EKS control plane Amazon EKS data plane Fundamentals of Amazon EKS security Amazon EKS API Module 4: Building an Amazon EKS Cluster Configuring your environment Creating an Amazon EKS cluster Demo: Configuring and deploying clusters in the AWS Management Console Working with eksctl Preparing for Lab 2: Building an Amazon EKS Cluster Module 5: Deploying Applications to Your Amazon EKS Cluster Configuring Amazon Elastic Container Registry (Amazon ECR) Demo: Configuring Amazon ECR Deploying applications with Helm Demo: Deploying applications with Helm Continuous deployment in Amazon EKS GitOps and Amazon EKS Preparing for Lab 3: Deploying App Module 6: Configuring Observability in Amazon EKS Configuring observability in an Amazon EKS cluster Collecting metrics Using metrics for automatic scaling Managing logs Application tracing in Amazon EKS Gaining and applying insight from observability Preparing for Lab 4: Monitoring Amazon EKS Module 7: Balancing Efficiency, Resilience, and Cost Optimization in Amazon EKS The high level overview Designing for resilience Designing for cost optimization Designing for efficiency Module 8: Managing Networking in Amazon EKS Review: Networking in AWS Communicating in Amazon EKS Managing your IP space Deploying a service mesh Preparing for Lab 5: Exploring Amazon EKS Communication Module 9: Managing Authentication and Authorization in Amazon EKS Understanding the AWS shared responsibility model Authentication and authorization Managing IAM and RBAC Demo: Customizing RBAC roles Managing pod permissions using RBAC service accounts Module 10: Implementing Secure Workflows Securing cluster endpoint access Improving the security of your workflows Improving host and network security Managing secrets Preparing for Lab 6: Securing Amazon EKS Module 11: Managing Upgrades in Amazon EKS Planning for an upgrade Upgrading your Kubernetes version Amazon EKS platform versions Additional course details: Nexus Humans Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-400 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. Overview After completing this course, students will be able to: Plan for the transformation with shared goals and timelines Select a project and identify project metrics and Key Performance Indicators (KPI's) Create a team and agile organizational structure Design a tool integration strategy Design a license management strategy (e.g., Azure DevOps and GitHub users) Design a strategy for end-to-end traceability from work items to working software Design an authentication and access strategy Design a strategy for integrating on-premises and cloud resources Describe the benefits of using Source Control Describe Azure Repos and GitHub Migrate from TFVC to Git Manage code quality including technical debt SonarCloud, and other tooling solutions Build organizational knowledge on code quality Explain how to structure Git repos Describe Git branching workflows Leverage pull requests for collaboration and code reviews Leverage Git hooks for automation Use Git to foster inner source across the organization Explain the role of Azure Pipelines and its components Configure Agents for use in Azure Pipelines Explain why continuous integration matters Implement continuous integration using Azure Pipelines Define Site Reliability Engineering Design processes to measure end-user satisfaction and analyze user feedback Design processes to automate application analytics Manage alerts and reduce meaningless and non-actionable alerts Carry out blameless retrospectives and create a just culture Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure Implement compliance and security in your application infrastructure Describe the potential challenges with integrating open-source software Inspect open-source software packages for security and license compliance Manage organizational security and compliance policies Integrate license and vulnerability scans into build and deployment pipelines Configure build pipelines to access package security and license ratings This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms. Module 1: Get started on a DevOps transformation journey Introduction to DevOps Choose the right project Describe team structures Choose the DevOps tools Plan Agile with GitHub Projects and Azure Boards Introduction to source control Describe types of source control systems Work with Azure Repos and GitHub Module 2: Development for enterprise DevOps Structure your Git Repo Manage Git branches and workflows Collaborate with pull requests in Azure Repos Explore Git hooks Plan foster inner source Manage Git repositories Identify technical debt Module 3: Implement CI with Azure Pipelines and GitHub Actions Explore Azure Pipelines Manage Azure Pipeline agents and pools Describe pipelines and concurrency Explore Continuous integration Implement a pipeline strategy Integrate with Azure Pipelines Introduction to GitHub Actions Learn continuous integration with GitHub Actions Design a container build strategy Module 4: Design and implement a release strategy Introduction to continuous delivery Explore release strategy recommendations Build a high-quality release pipeline Introduction to deployment patterns Implement blue-green deployment and feature toggles Implement canary releases and dark launching Implement A/B testing and progressive exposure deployment Module 5: Implement a secure continuous deployment using Azure Pipelines Create a release pipeline Provision and test environments Manage and modularize tasks and templates Automate inspection of health Manage application configuration data Integrate with identity management systems Implement application configuration Module 6: Manage infrastructure as code using Azure and DSC Explore infrastructure as code and configuration management Create Azure resources using Azure Resource Manager templates Create Azure resources by using Azure CLI Explore Azure Automation with DevOps Implement Desired State Configuration (DSC) Implement Bicep Module 7: Implement security and validate code bases for compliance Introduction to Secure DevOps Implement open-source software Software Composition Analysis Static analyzers OWASP and Dynamic Analyzers Security Monitoring and Governance Module 8: Design and implement a dependency management strategy Explore package dependencies Understand package management Migrate, consolidate, and secure artifacts Implement a versioning strategy Introduction to GitHub Packages Module 9: Implement continuous feedback Implement tools to track usage and flow Develop monitor and status dashboards Share knowledge within teams Design processes to automate application analytics Manage alerts, Blameless retrospectives and a just culture Additional course details: Nexus Humans AZ-400 Designing and Implementing Microsoft DevOps Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-400 Designing and Implementing Microsoft DevOps Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-400 Designing and Implementing Microsoft DevOps Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Implement and Configure Cisco Endpoints Implement and Configure Cisco Unified Communications Manager for Video Endpoints Implement and Configure Cisco IMP for Jabber Implement and Configure Cisco Expressway Implement and Configure Cisco Video Communications Server (VCS) Control Implement and Configure Cisco Video Communications Server (VCS) Expressway Implement and Configure connectivity between a Cisco VCS and Cisco UCM Implement and Configure a Cisco Conductor Implement, Configure, and Operate Cisco TelePresence Management Suite (TMS) and provision devices using Cisco TMS Provisioning Extension (TMSPE) Implement and Configure Cisco Meeting Server This one of kind Cisco Collaboration in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco Collaboration Components. Students will have extensive labs in which they will configure and troubleshoot a full Cisco Telepresence Deployment. Participants will gain in-depth practical knowledge with exercises on installing, configuring, maintaining and troubleshooting of all Cisco Telepresence Components.The software applications that are covered in this course include:Cisco Unified Communications Manager (CUCM)Cisco Unified Communications Manager IM and PresenceCisco ExpresswayCisco Video Communication Server (VCS)Cisco ConductorCisco Telepresence Server (TS)Cisco Meeting Server (CMS)Cisco Telepresence Management Suite (TMS)Cisco TMS Extensions Understanding Cisco TelePresence Endpoints Cisco TelePresence Endpoint Solutions Overview Cisco DX Series Endpoint Characteristics Cisco TelePresence TC Software-Based Endpoint Characteristics Cisco TelePresence EX60 and EX90 Cisco TelePresence MX Series Cisco TelePresence SX Series Endpoints Cisco TelePresence Room Kits Cisco Intelligent Proximity Cisco TelePresence TC Software-Based Endpoint Peripherals Cisco TelePresence TC Software-Based Endpoint Deployments Cisco TelePresence Integrator C Series-Based Endpoints Cisco Jabber Video for TelePresence Characteristics Cisco Jabber Understanding the Cisco Video Network Network Overview H323 Overview SIP Overview VCS vs Unified Communications Manager Internetworking QOS Overview Implementing and Configuring Unified Communication Manager Unified Communications Manager Initial Settings Service Activation Enterprise and Service Parameters SIP Domains Configure IMP for Jabber Configure Jabber Settings Registering Endpoints Verifying Network Registration Cisco VCS / Expressway Overview and Configuration Configuring Initial VCS Setting Configuring Authentication Registration Conflict Policy Registration Restriction Policy Local Zone Components Membership Rules Transforms Purpose of Zones Search Priority Neighbor Zones Creating Neighbor Zones Need for Traversal Zones H.460 and Assent Protocols Traversal Zone Configuration Domain Name System Dialing E.164 Number Mapping Bandwidth Management Pipes Subzones and Zones Subzone Call Failure Call Processing Order Certificates Certificate Installation Clustering and the Cisco VCS Clustering Configuration Collecting Information Log Files Search History Connecting VCS-C to CUCM Connect VCS-C to VCS-E Connecting CUCM to VCS-C Understanding the Cisco TelePresence Conductor What is Conductor? Conductor ? How it works Installing Cisco Conductor Configuring Conductor Network Settings Configuring Conductor for a CUCM Configuration MCU Configuration Telepresence Server Telepresence Conductor Server Configuration Configuring TelePresence Conductor for ad hoc conferences Configuring TelePresence Conductor for rendezvous conferences Configuring Unified CM Configuring general settings on Unified CM Locations in Unified CM Unified CM trusts TelePresence Conductor's server certificate SIP trunk security profile Configuring Unified CM for rendezvous conferences Sip Trunk Configuration Conference Bridge Configuration MRG and MRGL Configuration Unified CM normalization scripts Configuring Unified CM for ad hoc conferences Sip Trunk Configuration Route pattern to match the SIP Trunk Configuration Unified CM normalization scripts Configuring the Cisco VCS with TelePresence Conductor Designing a Dial Plan MCU Configuration Telepresence Server Configuring the Cisco VCS Telepresence Conductor Server Configuration Backing Up Conductor Troubleshooting Conductor Overview of Cisco Telepresence Management Server (TMS) Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Initial Configuration Endpoint Configuration Adding Systems to TMS Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS CUCM Configuration for TMS Direct Endpoint Management?CUCM Phonebooks & Phonebook Sources Conference Creation Advanced Conference Settings Booking & Scheduling Participant Types Methods Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Managing and Troubleshooting Cisco TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance Configuring Cisco Meeting Server (formerly Acano) Setting up CMS Installing Certificates Configuring CUCM with CMS Provision the RTC Client Configuring Meeting Spaces Additional course details: Nexus Humans Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Cloud: Design and Process

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cloud Solutions Architects, Site Reliability Engineers, Systems Operations professionals, DevOps Engineers, IT managers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview Apply a tool set of questions, techniques and design considerations Define application requirements and express them objectively as KPIs, SLO's and SLI's Decompose application requirements to find the right microservice boundaries Leverage Google Cloud developer tools to set up modern, automated deployment pipelines Choose the appropriate Google Cloud Storage services based on application requirements Architect cloud and hybrid networks Implement reliable, scalable, resilient applications balancing key performance metrics with cost Choose the right Google Cloud deployment services for your applications Secure cloud applications, data and infrastructure Monitor service level objectives and costs using Stackdriver tools This course features a combination of lectures, design activities, and hands-on labs to show you how to use proven design patterns on Google Cloud to build highly reliable and efficient solutions and operate deployments that are highly available and cost-effective. This course was created for those who have already completed the Architecting with Google Compute Engine or Architecting with Google Kubernetes Engine course. Defining the Service Describe users in terms of roles and personas. Write qualitative requirements with user stories. Write quantitative requirements using key performance indicators (KPIs). Evaluate KPIs using SLOs and SLIs. Determine the quality of application requirements using SMART criteria. Microservice Design and Architecture Decompose monolithic applications into microservices. Recognize appropriate microservice boundaries. Architect stateful and stateless services to optimize scalability and reliability. Implement services using 12-factor best practices. Build loosely coupled services by implementing a well-designed REST architecture. Design consistent, standard RESTful service APIs. DevOps Automation Automate service deployment using CI/CD pipelines. Leverage Cloud Source Repositories for source and version control. Automate builds with Cloud Build and build triggers. Manage container images with Google Container Registry. Create infrastructure with code using Deployment Manager and Terraform. Choosing Storage Solutions Choose the appropriate Google Cloud data storage service based on use case, durability, availability, scalability and cost. Store binary data with Cloud Storage. Store relational data using Cloud SQL and Spanner. Store NoSQL data using Firestore and Cloud Bigtable. Cache data for fast access using Memorystore. Build a data warehouse using BigQuery. Google Cloud and Hybrid Network Architecture Design VPC networks to optimize for cost, security, and performance. Configure global and regional load balancers to provide access to services. Leverage Cloud CDN to provide lower latency and decrease network egress. Evaluate network architecture using the Cloud Network Intelligence Center. Connect networks using peering and VPNs. Create hybrid networks between Google Cloud and on-premises data centers using Cloud Interconnect. Deploying Applications to Google Cloud Choose the appropriate Google Cloud deployment service for your applications. Configure scalable, resilient infrastructure using Instance Templates and Groups. Orchestrate microservice deployments using Kubernetes and GKE. Leverage App Engine for a completely automated platform as a service (PaaS). Create serverless applications using Cloud Functions. Designing Reliable Systems Design services to meet requirements for availability, durability, and scalability. Implement fault-tolerant systems by avoiding single points of failure, correlated failures, and cascading failures. Avoid overload failures with the circuit breaker and truncated exponential backoff design patterns. Design resilient data storage with lazy deletion. Analyze disaster scenarios and plan for disaster recovery using cost/risk analysis. Security Design secure systems using best practices like separation of concerns, principle of least privilege, and regular audits. Leverage Cloud Security Command Center to help identify vulnerabilities. Simplify cloud governance using organizational policies and folders. Secure people using IAM roles, Identity-Aware Proxy, and Identity Platform. Manage the access and authorization of resources by machines and processes using service accounts. Secure networks with private IPs, firewalls, and Private Google Access. Mitigate DDoS attacks by leveraging Cloud DNS and Cloud Armor. Maintenance and Monitoring Manage new service versions using rolling updates, blue/green deployments, and canary releases. Forecast, monitor, and optimize service cost using the Google Cloud pricing calculator and billing reports and by analyzing billing data. Observe whether your services are meeting their SLOs using Cloud Monitoring and Dashboards. Use Uptime Checks to determine service availability. Respond to service outages using Cloud Monitoring Alerts. Additional course details: Nexus Humans Architecting with Google Cloud: Design and Process training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Cloud: Design and Process course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting with Google Cloud: Design and Process
Delivered OnlineFlexible Dates
Price on Enquiry

55355 SharePoint 2016 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for an IT person wanting to learn about administrating SharePoint 2016. Overview After completing this course, you will be able to: The Installation and configure a SharePoint 2016 Farm How to manage a SharePoint 2016 Farm through the GUI and PowerShell How to create site collections via GUI and PowerShell How to create and configure the all the required service applications for SharePoint 2016 How to backup and restore in SharePoint 2016 This SharePoint 2016 Administrator course is design for Administrators who are new to SharePoint Server Administration or who are upgrading from previous versions of SharePoint.This course covers content that was in retired Microsoft Course 20339-1. Module 1: Hardware, Installation and Patching How to build a Min Role Farm How to View ULS Logs How to document and check IIS Settings for SharePoint 2016 Module 2: Farm Management How to manage the SharePoint Farm Administors group How to configure Outgoing Email How to configure Incoming Email How to Configure Diagnostic and Usage Log Options Module 3: Web Applications How to define a new Managed Account How to add new IP Addresses to a SharePoint Server How to create a claims based web application in SharePoint Central Administration How to create a claims based web application in PowerShell How to create a hosting web application in PowerShell Module 4: Site Collections How to create a managed path How to create a site collection using SharePoint Central Administration How to create a site collection using PowerShell How to create a site collection in its own database using SharePoint Central Administration How to create a site collection in its own database using PowerShell How to create a host named site collection using PowerShell Module 5: Service Applications How to create a State Service Application How to create a Search Service Application How to create the Managed Metadate Service Module 6: Application Management How to add a new IP and Certificate to a SharePoint Web Application How to configure DNS for SharePoint Web Application How to Create a Subscription Settings Service Application How to create the Application Management Application Service How to configure the application URLs How to create the App Catalog Site Colleciton How to Add Apps to the catalog Module 7: Managing the User Profile Service How to create the My Site Web Application How to create the User Profile Service Application How to Configure the User Profile Synchronization Permissions How to create the Active Directory Import Connection How to assign permissions for the AD Group to create a My Site How to create a My Site Module 8: Search How to view the currenty Search Topology How to create an Enterprise Search Centre How to configure a new search schema property How to create a site collection-level result source How to create a new content source Module 9: Office Online Server How to install the pre-requisites for Office Online Server How to install the Office Online Server Binaries How to create the Office Online Server SSL Certifcate How to create the Office Online Server Farm How to connect to the farm from SharePoint How to test the connectivity Module 10: Enterprise Content Management How to create and Apply a site policy How to create discovery sets How to configure In Place records management How to configure the records centre How to configure DLP Module 11: Web Content Management How to configure cross-site publication How to configure content deployment Module 12: Workflow Server How to install Workflow Manger server and Client Binaires How to configure the workflow farm How to patch the workflow farm manager and clients How to register the workflow service in SharePoint How to test Workflow creation Module 13: Business Connectity Services and Secure Store How to configure the secure store service How to create the BCS service Application How to setup the products database How to import the BCS Definition How to use the BDC file in a list web part Module 14: Hybrid SharePoint Shown and Demonstrated the Hybrid features of SharePoint 2016 Module 15: Backup and Restore How to backup SharePoint 2016 Content How to delete SharePoint 2016 Content How to restore SharePoint 2016 Content via PowerShell How to recover a unattached content database Module 16: Upgrade How to restore and attach a SharePoint 2013 Database How to upgrade a SharePoint 2013 MMS Service Application Additional course details: Nexus Humans 55355 SharePoint 2016 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55355 SharePoint 2016 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55355 SharePoint 2016 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Power BI - introduction (2 day) (In-House)

By The In House Training Company

There is a lot to learn in Power BI, this course takes a comprehensive look at the fundamentals of analysing data and includes a balanced look at the four main components that make up Power BI Desktop: Report view, Data view, Model view, and the Power Query Editor. It also demonstrates how to utilise the online Power BI service. It looks at authoring tools that enable you to connect to and transform data from a variety of sources, allowing you to produce detailed reports through a range of visualisations, in an interactive and dynamic way. It also includes a detailed look at formulas by writing both M functions in Power Query, and DAX functions in Desktop view. This knowledge will allow you to take your reports to the next level. The aim of this course is to provide a complete introduction to understanding the Power BI analysis process, by working hands-on with examples that will equip you with the necessary skills to start applying your learning straight away. 1 Getting Started The Power BI ecosystem Opening Power BI Desktop Power BI's four views Introduction to Dashboards 2 Importing Files Importing data sources Importing an Excel file Importing a CSV file Importing a database Connect to an SQL Server Database Import vs. Direct Query Importing from the web Importing a folder of files Managing file connections 3 Shape Data in the Query Editor The process of shaping data Managing data types Keeping and removing rows Add a custom column Appending tables together Hiding queries in reports Fixing error issues Basic maths operations 4 The Data Model Table relationships Relationship properties 5 Merge Queries Table join kinds Merging tables 6 Inserting Dashboard Visuals Things to keep in mind Inserting maps Formatting Maps Inserting charts Formatting Charts Inserting a tree map Inserting a table, matrix, and card Controlling number formats About report themes Highlighting key points Filter reports with slicers Sync slicers across dashboards Custom web visuals 7 Publish and share Reports Publishing to Power BI service Editing online reports Pinning visuals to a dashboard What is Q&A? Sharing dashboards Exporting reports to PowerPoint Exporting reports as PDF files 8 The Power Query Editor Fill data up and down Split column by delimiter Add a conditional column More custom columns Merging columns 9 The M Functions Inserting text functions Insert an IF function Create a query group 10 Pivoting Tables Pivot a table Pivot and append tables Pivot but don't aggregate Unpivot tables Append mismatched headers 11 Data Modelling Expanded Understanding relationships Mark a date table 12 DAX New Columns New columns and measures New column calculations Insert a SWITCH function 13 Introduction to DAX Measures Common measure functions Insert a SUM function Insert a COUNTROWS function Insert a DISTINCTCOUNT function Insert a DIVIDE function DAX rules 14 The CALCULATE Measure The syntax of CALCULATE Insert a CALCULATE function Control field summarisation Things of note 15 The SUMX measure X iterator functions Anatomy of SUMX Insert a SUMX function When to use X functions 16 Time Intelligence Measures Importance of a calendar table Insert a TOTALYTD function Change financial year end date Comparing historical data Insert a DATEADD function 17 Hierarchies and Groups Mine data using hierarchies Compare data in groups

Power BI - introduction (2 day) (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Effective project leadership (In-House)

By The In House Training Company

The leadership role of the project manager is increasingly recognised as a key determinant in delivering success. These skills can often be critical in project situations, where tight budgets and deadlines demand the highest levels of team performance and where the working environment presents fresh challenges on a daily basis. This programme focuses on the leadership skills required of project managers and will benefit anyone involved in managing projects large or small wishing to extend or enhance those skills. The objectives of this programme are to help the participants: Understand the significance of leadership skills to the project manager and the impact of these skills on project performance Review the key skills needed to be an effective 'multi-dimensional' project leader and learn how to develop, adapt and apply them in practice Learn how to identify the preferred leadership style for the context and organisational culture of a project and how to develop personal style versatility Understand the role of the project leader in building an effective team and the skills required to promote and sustain team performance Gain a better understanding of the interpersonal skills needed to motivate individual team members and harness the full potential of the team DAY ONE 1 Introduction Aims and objectives Personal objectives 2 Project management and leadership What is a leader? How much can leadership be learned? The project environment and the impact of leadership skills The characteristics of high performance project teams and their leaders 3 Principles of effective leadership Some useful models and theories of leadership explored Types of leadership; choosing how to use leadership power Evaluating personal leadership style; how to develop style flexibility 4 Syndicate case study: Leadership in action Review of the role of leadership in a contemporary project Feedback and plenary discussion: effective project leadership 5 Team exercise: Leadership skills of the project manager Teams compete in performing a project simulation Project review and feedback Discussion of the outcome: role and skills of the project leader 6 Leadership skills for project managers The 3 dimensions of project leadership: inwards, outwards, and upwards The vital role of communication skills and how to develop them Developing a 'project vision': strategic thinking skills Understanding others; emotional intelligence skills Being a visible leader; behavioural and influencing skills Building effective relationships; the importance of trust and respect DAY TWO 7 Leading the project team The role of leadership in developing team performance Understanding individual strengths; recognising team role preferences Managing conflict and promoting positive team dynamics Setting standards, maintaining discipline and rewarding performance Harnessing team potential: building motivation within the team Promoting team learning; the team leader as coach / mentor 8 Leading through the organisation Gaining the support others; developing effective influencing skills Getting empowerment from key stakeholders Knowing when and how to take the initiative and lead Building and maintaining rapport with key partners Becoming an effective team player in leadership teams Becoming a business leader; leading colleagues and co-workers 9 Team exercise: Leadership and negotiation Teams engage in a negotiation exercise Exercise review and feedback Discussion of the outcome: negotiation skills of the project leader 10 Negotiation skills for project leaders Characteristics of effective negotiators Classic problem behaviours and mind-sets to avoid Getting to win-win; building partnership and trust 11 Leading more senior stakeholders The challenges and skills of leading and managing upwards Communicating with more senior stakeholders; building credibility Negotiating upwards: knowing when and how The role of networking skills; building and maintaining rapport Handling disagreements; the art of diplomacy Handling personality and style conflicts with more senior people

Effective project leadership (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Contract management for practitioners (In-House)

By The In House Training Company

This two-day programme gives the key insights and understanding of contracting principles and the impact they have on business and operations. The course is designed for individuals involved in or supporting contracting who want to improve their commercial management skills; individuals in functions such as project management, business development, finance, operations who need practical training in commercial management; general audiences wanting to gain a basic understanding of commercial management. This is an assessed programme, leading to the International Association for Contracts & Commercial Management (IACCM)'s coveted Contract and Commercial Management Associate (CCMA) qualification. The programme addresses 31 different subject areas, across the five stages of the contracting process. By the end of the course the participants will be able, among other things, to: Develop robust contract plans, including scope of work and award strategies Conduct effective contracting activities, including ITT, RFP, negotiated outcomes Negotiate effectively with key stakeholders, making use of the key skills of persuading and influencing and to work with stakeholders to improve outcomes Set up and maintain contract management systems Take a proactive approach to managing contracts Make effective use of lessons learned to promote improvements from less than optimal outcomes, using appropriate templates Develop and monitor appropriate and robust Key Performance Indicators to manage the contractor and facilitate improved performance Understand the approvals process and how to develop and present robust propositions Make appropriate use of best practice contract management tools, techniques and templates DAY ONE 1 Introductions Aims Objectives Plan for the day 2 Commercial context Explaining the contracting context Define the key objective The importance of contact management Impact upon the business 3 Stakeholders How to undertake stakeholder mapping and analysis Shared vision concept, How to engage with HSE, Finance, Operations 4 Roles and responsibilities Exploring the key roles and responsibilities of contract administrators, HSE, Finance, Divisional managers, etc 5 Initiating the contract cycle Overview of the contracting cycle Requirement to tender Methods Rationale and exceptions 6 Specifications Developing robust scope of works Use of performance specifications Output based SOW 7 Strategy and award criteria Developing a robust contract strategy Award submissions/criteria 8 Managing the tender process Review the pre-qualification process Vendor registration rules and processes Creation of bidder lists Evaluation, short listing, and how to use of the 10Cs© model template and app 9 Types of contract Classify the different types of contracts Call-offs Framework agreement Price agreements Supply agreements 10 The contract I: price Understanding contract terms Methods of compensation Lump sum, unit price, cost plus, time and materials, alternative methods Cost plus a fee, target cost, gain share contracts Advanced payments Price escalation clauses DAY TWO 11 Risk How to manage risks Risk classification Mitigation of contractual risks 12 Contractor relationship management session Effectively managing relationships with contractors, Types of relationships Driving forces? Link between type of contract and style of relationship 13 Disputes Dealing with disputes Conflict resolution Negotiation Mediation Arbitration 14 Contract management Measuring and improving contract performance Using KPIs and SLAs Benchmarking Cost controls 15 The contract II: terms and conditions Contract terms and conditions Legal aspects Drafting special terms 16 Managing claims and variations How to manage contract and works variations orders Identifying the causes of variations Contractor claims process 17 Completion Contract close-out process Acceptance/completion Capture the learning/HSE Final payments, evaluation of performance 18 Close Review Final assessment

Contract management for practitioners (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry