Duration 2 Days 12 CPD hours This course is intended for This course assumes that you have successfully completed the Administering BIG-IP course, or equivalent, and have hands-on experience working in a production BIG-IP environment for several months. You should have a solid understanding of the environment in which the BIG-IP is deployed. This course is meant for BIG-IP administrators, network engineers, applications engineers, etc., who will be responsible for troubleshooting problems associated with their BIG-IP system. This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Reviewing High Availability (HA) Module 3: Troubleshooting Methodology Step-By-Step Process Step 1: State the Problem Step 2: Specify the Problem Step 3: Map the System Step 4: Develop Possible Causes Step 5: Test Theories Step 6: Iterate Until Root Cause Identified Documenting a Problem Putting Troubleshooting Steps to Use Module 4: Working with F5 Support Leveraging F5 Support Resources AskF5.com DevCentral iHealth Leveraging F5 Labs Working with F5 Technical Support Running End User Diagnostics (EUD) - Hardware Only New Platform Diagnostic Tools Always-On Management (AOM) Subsystem Requesting Return Materials Authorization F5?s Software Version Policy Managing the BIG-IP License for Upgrades Managing BIG-IP Disk Space Upgrading BIG-IP Software Module 5: Troubleshooting ? Bottom to Top Introducing Differences between BIG-IP and LINUX Tools Troubleshooting with Layer 1/Layer 2 Tools Troubleshooting with Layer 2/Layer 3 Tools Troubleshooting with Layer 3 Tools Troubleshooting with LINUX Tools Troubleshooting Memory and CPU Troubleshooting with watch Troubleshooting with Additional tmsh commands Module 6: Troubleshooting Tools tcpdump Wireshark ssldump Fiddler diff KDiff3 cURL Module 7: Using System Logs Configuring Logging Log Files Understanding BIG-IP Daemons Functions Triggering an iRule Deploying and Testing iRules Application Visibility and Reporting Module 8: Troubleshooting Lab Projects Network Configurations for Project Additional course details: Nexus Humans F5 Networks Troubleshooting BIG-IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Troubleshooting BIG-IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours Overview In this course you?ll learn how to: Containerize and deploy a new Python script Configure the deployment with ConfigMaps, Secrets and SecurityContexts Understand multi-container pod design Configure probes for pod health Update and roll back an application Implement services and NetworkPolicies Use PersistentVolumeClaims for state persistence And more In this vendor agnostic course, you will use Python to build, monitor and troubleshoot scalable applications in Kubernetes. Introduction Objectives Who You Are The Linux Foundation Linux Foundation Training Preparing Your System Course Registration Labs Kubernetes Architecture What Is Kubernetes? Components of Kubernetes Challenges The Borg Heritage Kubernetes Architecture Terminology Master Node Minion (Worker) Nodes Pods Services Controllers Single IP per Pod Networking Setup CNI Network Configuration File Pod-to-Pod Communication Cloud Native Computing Foundation Resource Recommendations Labs Build Container Options Containerizing an Application Hosting a Local Repository Creating a Deployment Running Commands in a Container Multi-Container Pod readinessProbe livenessProbe Testing Labs Design Traditional Applications: Considerations Decoupled Resources Transience Flexible Framework Managing Resource Usage Multi-Container Pods Sidecar Container Adapter Container Ambassador Points to Ponder Labs Deployment Configuration Volumes Overview Introducing Volumes Volume Spec Volume Types Shared Volume Example Persistent Volumes and Claims Persistent Volume Persistent Volume Claim Dynamic Provisioning Secrets Using Secrets via Environment Variables Mounting Secrets as Volumes Portable Data with ConfigMaps Using ConfigMaps Deployment Configuration Status Scaling and Rolling Updates Deployment Rollbacks Jobs Labs Security Security Overview Accessing the API Authentication Authorization ABAC RBAC RBAC Process Overview Admission Controller Security Contexts Pod Security Policies Network Security Policies Network Security Policy Example Default Policy Example Labs Exposing Applications Service Types Services Diagram Service Update Pattern Accessing an Application with a Service Service without a Selector ClusterIP NodePort LoadBalancer ExternalName Ingress Resource Ingress Controller Labs Troubleshooting Troubleshotting Overview Basic Troubleshooting Steps Ongoing (Constant) Change Basic Troubleshooting Flow: Pods Basic Troubleshooting Flow: Node and Security Basic Troubleshooting Flow: Agents Monitoring Logging Tools Monitoring Applications System and Agent Logs Conformance Testing More Resource Labs Additional course details: Nexus Humans Kubernetes for App Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Kubernetes for App Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This basic course is for everyone needing to write, support, or understand SQL queries. This includes but is not limited to end-users, programmers, application designers, database administrators, and system administrators who do not yet have knowledge of Overview Code SQL statements to retrieve data from a DB2 or Informix table, including the SELECT, FROM, WHERE, GROUP BY, HAVING and ORDER BY clauses Code inner joins and non-correlated subqueries Use SQL arithmetic operations Use scalar and column functions Use UNION and UNION ALL INSERT, UPDATE and DELETE rows Code simple CREATE TABLE and CREATE VIEW statements This course is appropriate for customers working in all DB2 environments, that is, z/OS, VM/VSE, iSeries, Linux, UNIX, and Windows. It is also appropriate for customers working in an Informix environment. Outline Introduction Simple SQL Queries Retrieving Data from Multiple Tables Scalar Functions and Arithmetic Column Functions and Grouping UNION and UNION ALL Using Subqueries Maintaining data
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators System engineers System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Monitor and optimize compute, network, and storage performance on ESXi hosts Monitor and optimize vCenter Server performance Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi⢠host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, accelerated, hands-on training course is a blend of the VMware vSphere: Optimize and Scale and VMware vSphere: Troubleshooting courses. This Fast Track course includes topics from each of these advanced courses to equip experienced VMware administrators with the knowledge and skills to effectively optimize and troubleshoot vSphere at an expert level. Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems
Duration 5 Days 30 CPD hours This course is intended for Audience for this course This course is designed for system administrators responsible for creating OpenShift Enterprise instances, deploying applications, creating process customizations, managing instances and projects. Prerequisites for this course Have taken Red Hat Enterprise Linux Administration I and II (RH124 and RH134), or equivalent Red Hat Enterprise Linux© system administration experience Be certified as a Red Hat Certified System Administrator (RHCSA), or equivalent Red Hat Enterprise Linux system administration experience Be certified as a Red Hat Certified Engineer (RHCE©) Overview Learn to install, configure, and manage OpenShift Enterprise by Red Hat instances - OpenShift Enterprise Administration (DO280) prepares the system administrator to install, configure, and manage OpenShift Enterprise by Red Hat© instances. OpenShift Enterprise, Red Hat's platform-as-a-service (PaaS) offering, provides pre-defined deployment environments for applications of all types through its use of container technology. This creates an environment that supports DevOps principles such as reduced time to market and continuous delivery. - In this course, students will learn how to install and configure an instance of OpenShift Enterprise, test the instance by deploying a real world application, and manage projects/applications through hands-on labs. - Course content summary - Container concepts - Configuring resources with the command line interface - Building a pod - Enabling services for a pod - Creating routes - Downloading and configuring images - Rolling back and activating deployments - Creating custom S2I images This course will empower you to install and administer the Red Hat© OpenShift© Container Platform, with hands-on, lab-based materials that show you how to install, configure, and manage OpenShift clusters and deploy sample applications to further understand how developers will use the platform. This course is based on Red Hat© Enterprise Linux© 7.5 and Openshift Container Platform 3.9. OpenShift is a containerized application platform that allows your enterprise to manage container deployments and scale your applications using Kubernetes. OpenShift provides predefined application environments and builds upon Kubernetes to provide support for DevOps principles such as reduced time to market, infrastructure-as-code, continuous integration (CI), and continuous delivery (CD). 1 - INTRODUCTION TO RED HAT OPENSHIFT ENTERPRISE Review features and architecture of OpenShift Enterprise. 2 - INSTALL OPENSHIFT ENTERPRISE Install OpenShift Enterprise and configure a master and node. 3 - EXECUTE COMMANDS Execute commands using the command line interface. 4 - BUILD APPLICATIONS Create, build, and deploy applications to an OpenShift Enterprise instance. 5 - PERSISTENT STORAGE Provision persistent storage and use it for the internal registry. 6 - BUILD APPLICATIONS WITH SOURCE-TO-IMAGE (S2I) Create and build applications with S2I and templates. 7 - MANAGE THE SYSTEM Use OpenShift Enterprise components to manage deployed applications. 8 - CUSTOMIZE OPENSHIFT ENTERPRISE Customize resources and processes used by OpenShift Enterprise. 9 - COMPREHENSIVE REVIEW Practice and demonstrate knowledge and skills learned in the course. 10 - NOTE: Course outline is subject to change with technology advances and as the nature of the underlying job evolves. For questions or confirmation on a specific objective or topic, please contact us. Additional course details: Nexus Humans Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster (DO280) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface. Overview After completing this course, students will be able to: Migrate and SAP HANA, S/4HANA, SAP NetWeaver to Azure Leverage Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Use intersite connectivity features including VNet Peering and VNet-to-VNet connections Work with Azure Active Directory (AAD) and Azure AD Connect As an IT Professionals experienced in SAP solutions, you will discover how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. You will also be introduced to concepts, scenarios, procedures, and hands-on labs that will empower you to best plan and implement migration and operation of an SAP solution on Azure. You will also receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution. Introduction Contains an overview of the SAP and Microsoft partnership. Foundations of SAP on Azure Contains brief lessons on Azure compute, Azure storage, Azure networking, SAP HANA for Azure (Large Instances), identity services, governance and manageability, backup and data protection services, and migration services. SAP Certified Offerings on Azure Contains lessons on general prerequisites (SAP support in public cloud environments), deployment options of Azure for SAP workloads, SAP product-specific support for Azure, operating System support of Azure for SAP workloads, storage support of Azure for SAP workloads, networking support for SAP, database support for SAP, high availability and disaster recovery support for SAP, and monitoring requirements for SAP. Lab : Online Lab: Implementing Linux clustering on Azure VMs Lab : Online Lab: Implementing Windows clustering on Azure VMs SAP on Azure Reference Architecture Contains lessons on SAP NetWeaver with AnyDB, SAP S4 HANA, and SAP HANA on Azure (Large Instances) on Azure VMs. Planning for Implementing SAP Solutions on Azure Contains lessons on Azure VM compute, network, and storage considerations. As well as Azure VM high availability and disaster recovery, Azure VM backup considerations, Azure VM monitoring considerations, Azure VM security considerations, and Azure VM authentication and access control considerations. Planning for Migrating SAP Workloads to Azure Contains lessons on strategies for migrating SAP systems to Microsoft Azure and SAP a workload planning and deployment checklist. Implementing Azure VM-based SAP Solutions Contains lessons on Azure VM deployment methodologies, single-instance implementations (2-tier or 3-tier), implementing HA SAP NetWeaver with AnyDB on Azure VMs, implementing HA SAP HANA on Azure VMs, configure the Azure Enhanced Monitoring Extension for SAP, and implementing AD and Azure AD-based authentication. Module 8-Deploying HANA Large Instances (HLI) Contains a lesson on implementing HANA Large Instances (HLI). Migrating SAP Workloads to Azure Contains lessons on migration options, DMO methodologies, cloud migration options, and Very Large Database Migration to Azure. Lab : Online Lab-Implement SAP architecture on Azure VMs running Linux Lab : Online Lab-Implement SAP architecture on Azure VMs running Windows Maintaining SAP on Azure Contains lessons on, remote management, performing backups and restores, OS and workload updates, vertical and horizontal scaling, and Disaster Recovery (DR). Monitoring and Troubleshooting SAP on Azure Contains lessons on monitoring Azure VMs, monitoring SAP HANA on Azure (Large Instances), and integrating SAP solutions with Microsoft cloud services.
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview Configure Red Hat Virtualization Configure networking and storage for use with Red Hat Virtualization Manage user accounts and access to the Red Hat Virtualization environment Install and manage virtual machines in Red Hat Virtualization Use templates for rapid virtual machine deployment Manage virtual machine snapshots and images Migrate virtual machines and explore high-availability options Deploy, configure, manage, and migrate virtual environments Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam. This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6. 1 - Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. 2 - Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. 3 - Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. 4 - Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. 5 - Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. 6 - Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. 7 - Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. 8 - Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. 9 - Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. 10 - Migrate virtual machines Migrate and control automatic migration of virtual machines. 11 - Manage virtual machine images Manage virtual machine snapshots and disk images. 12 - Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. 13 - Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. 14 - Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. 15 - Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization. Additional course details: Nexus Humans Red Hat Virtualization (RH318) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Virtualization (RH318) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks
Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization's end-user computing infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client⢠systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Identify Horizon Connection Server installation, architecture, and requirements. Describe the authentication and certification options for a Horizon environment Recognize the integration process and benefits of VMware Workspace ONE Access⢠and Horizon 8 Discuss performance and scalability options available in Horizon 8 Describe different security options for the Horizon environment VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon© 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of Horizon Describe the conceptual and logical architecture of Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere© Client? to access your Center Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floating-assignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and user-level policies VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant clone desktop pools Set up an automated pool of instant clones Push updated images to instant clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application pool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the Horizon Connection Server supported features Identify the recommended system requirements for Horizon Connection Server Configure the Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the ADAM database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the Smartcard authentication options that Horizon Connection Server supports Outline the steps to create a Horizon administrator and custom roles Describe the roles available in a Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a Horizon environment Workspace ONE Access & Virtual Application Management Recognize the features and benefits of Workspace ONE Access Recognize the Workspace ONE Access console features Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe the BLAST Display Protocol Codecs Describe BLAST and PCoIP ADMX GPO common configurations Graphic Cards Describe the 3D rendering options available in Horizon 8 Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure Horizon connections Describe how to restrict Horizon connections. Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List Unified Access Gateway firewall rules Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Deploy and Manage training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Deploy and Manage course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Maximize the value of data assets in the oil and gas sector with EnergyEdge's assessment-based training course on Python programming and analytics.