• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3267 Management courses in Linlithgow delivered Live Online

VMware Horizon 8: Infrastructure Administration and Troubleshooting

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Tier 1 system administrators, and integrators responsible for managing and maintaining VMware Horizon Infrastructure. Overview By the end of the course, you should be able to meet the following objectives: Describe the installation, architecture, and requirements of Horizon Connection Server Describe the authentication and certificate options for a VMware Horizon environment Recognize the integration process and benefits of Workspace ONE Access and VMware Horizon Compare the remote display protocols that are available in VMware Horizon Describe the 3D rendering options available in VMware Horizon Discuss the scalability options available in VMware Horizon Describe the different security options for VMware Horizon environments Discuss the advanced configurations of Horizon Connection Server List the troubleshooting techniques for common Horizon Connection Server issues Interpret the Horizon Connection Server logs Identify Unified Access Gateway configuration and certificate issues List the troubleshooting steps for common Unified Access Gateway common issues Describe Blast configuration verification using logs and settings Describe the Blast optimization recommendations for different use cases Describe VMware Horizon connections and how to troubleshoot related problems Describe VMware Horizon certificates List the troubleshooting steps for common VMware Horizon certificates issues Describe Cloud Pod Architecture troubleshooting scenarios Identify and fix problems in a VMware Horizon environment VMware Horizon 8: Infrastructure Administrator and Troubleshooting is a five-day combination course of VMware Horizon 8: Infrastructure Administration & VMware Horizon 8: Infrastructure Troubleshooting. This training collection gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon© through a combination of lecture and hands-on labs. You learn how to install and configure VMware Horizon© Connection Server?, VMware Unified Access Gateway?, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture. Also, this course provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon 8 infrastructure. This workshop teaches the required skill and competence for troubleshooting Horizon Connection Server, Unified Access Gateway, protocols, connections, and certificates. This course provides a challenge lab designed to present participants with infrastructure issues that may arise in actual Horizon environments. The lab objective is to put into practice the contents covered during the training to create a working environment. Course Introduction Introductions and course logistics Course objectives Horizon Connection Server Recognize VMware Horizon reference architecture Identify the supported features of Horizon Connection Server Identify the recommended system requirements for Horizon Connection Server Configure the VMware Horizon event database Outline the steps for the initial configuration of Horizon Connection Server Discuss the AD Lightweight Directory Service (LDS) database as a critical component of Horizon Connection Server installation Authentication and Certificates Compare the authentication options that Horizon Connection Server supports Describe the smart card authentication options that Horizon Connection Server supports Outline the steps to create a VMware Horizon administrator and custom roles Describe the roles available in a VMware Horizon environment Explain the role that certificates play for Horizon Connection Server Install and configure certificates for Horizon Connection Server Install and configure True SSO in a VMware Horizon environment Workspace ONE Access and Virtual Application Management Recognize the features and benefits of Workspace ONE Access Describe the features of the Workspace ONE Access console Explain identity management in Workspace ONE Access Explain access management in Workspace ONE Access Describe the Workspace ONE Access directory integration Deploy virtual applications with Workspace ONE services Horizon Protocols Compare the remote display protocols that are available in VMware Horizon Describe Blast Describe the Blast display protocol codecs Summarize the Blast codec options List the ideal applications for each Blast codec Describe Blast and PCoIP ADMX GPO common configurations Graphics Cards Describe the 3D rendering options available in Vmware Horizon Compare vSGA and vDGA List the steps to configure graphics cards for use in a VMware Horizon environment Horizon Scalability Describe the purpose of a replica connection server Explain how multiple Horizon Connection Server instances in a pod maintain synchronization List the steps to configure graphics cards for use in a VMware Horizon environment Configure a load balancer for use in a VMware Horizon environment Explain Horizon Cloud Pod Architecture LDAP replication and VIPA Explain Horizon Cloud Pod Architecture scalability options Horizon Security Explain concepts relevant to secure VMware Horizon connections Describe how to restrict VMware Horizon connections Discuss the benefits of using Unified Access Gateway List the two-factor authentication options that are supported by Unified Access Gateway List the Unified Access Gateway firewall rules Describe the situations in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces Troubleshooting Horizon Connection Server Identify the general troubleshooting techniques for Horizon Connection Server Explain how to use logs to identify common Horizon Connection Server problems Describe AD LDS replication Discuss common Horizon Connection Server replication issues Explain how to interpret Horizon Connection Server logs Compare successful and unsuccessful logs from common infrastructure administration tasks Troubleshooting Unified Access Gateway Identify common Unified Access Gateway deployment issues Explain how to monitor the health of a Unified Access Gateway deployment Identify and troubleshoot Unified Access Gateway certificate issues Explain how to monitor, test, and troubleshoot network errors using tcpdump and curl Detail the general Unified Access Gateway troubleshooting methods Blast Configuration Discuss Blast codecs and Encoder Switch settings Describe how to verify BLAST configuration using logs and settings Optimizing Blast List general Blast optimization recommendations Summarize Blast tuning recommendations that apply to WAN connections Summarize Blast tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe the recommended tuning options to increase display protocol quality for all use cases and applications Troubleshooting VMware Horizon Connections Explain VMware Horizon connections Describe the role of primary and secondary protocols in VMware Horizon connections Describe HTML client access connections Describe Horizon Connections load balancing Describe timeout settings, supported health monitoring strings, and suitable load balancer persistence values Identify the troubleshooting steps for failing VMware Horizon load balancer connections List the steps for troubleshooting VMware Horizon connections Troubleshooting VMware Horizon Certificates List the functions of VMware Horizon certificates Describe VMware Horizon certificate scenarios Discuss potential challenges related to certificates in VMware Horizon Describe the troubleshooting approach to VMware Horizon certificates issues Cloud Pod Architecture Describe Cloud Pod Architecture troubleshooting scenarios Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Infrastructure Administration and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Infrastructure Administration and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Infrastructure Administration and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSAN: Fast Track (v7)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN [v7] Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM Storage policy Discuss the impact of vSAN storage policy changes Describe vSAN storage space efficiency Explain how vSAN encryption works Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN file service architecture and configuration Explain the use cases of vSAN Direct Describe how to setup stretched and two-node vSAN clusters Explain the importance vSAN node hardware compatibility Describe the use of VMware vSphere Lifecycle Manager™ to automate driver and firmware installations Detail vSAN resilience and data availability Discuss the vSAN cluster backup methodology Describe the vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health™ for monitoring vSAN health Apply a structured approach to troubleshoot vSAN cluster configuration and operational problems During this five-day, intensive course, you gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, and advanced vSAN cluster operations.You also focus on learning the tools and skills necessary to troubleshoot vSAN 7 implementations and gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises.This course is a combination of the following courses: VMware vSAN: Plan and Deploy, VMware vSAN: Management and Operations, and VMware vSAN: Troubleshooting. Course Introduction Introductions and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use vSphere Life Cycle Manager to perform upgrades Deploy and configure a vSAN Cluster using Cluster Quickstart wizard Manually configure a vSAN Cluster using vSphere Client Explain and configure vSAN fault domains Using vSphere HA with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN Object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN Datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Configuring vSAN Storage Space Efficiency Discuss Deduplication and Compression techniques Understand Deduplication and Compression overhead Discuss Compression only mode Configure Erasure Coding Configure swap object Thin Provisioning Discuss Reclaiming Storage Space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of Data-in Transit encryption Identify the steps involved in replacing Key Management Server Introduction to Advanced vSAN Configurations Identify requirements to configure vSAN iSCSI target Detail HCI Mesh technology and architecture Detail vSAN File Service architecture and configuration Explain the use cases of vSAN Direct vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN Nodes vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN Witness node Describe the architecture and uses case for two-node clusters Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster Explain storage policies for vSAN stretched cluster vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use vSphere Skyline Health for monitoring vSAN Cluster Health Manage alerts, alarms, and notifications related to vSAN in vSphere Client Create and configure custom alarms to trigger vSAN health issues Use IO Insight metrics for monitoring vSAN performance Analyse vsantop performance metrics Use vSAN Proactive Test to detect and diagnose cluster issues vSAN Troubleshooting Methodology Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency vSAN Troubleshooting Tools Use Skyline Health for vSAN to identify and correct issues in VMware vSAN Discuss the ways to run various command-line tools Discuss the ways to access VMware vSphere ESXi Shell Use commands to view, configure, and manage your VMware vSphere environment Discuss the esxcli vsan namespace commands Use log files to help vSAN troubleshooting Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSAN: Fast Track (v7) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSAN: Fast Track (v7) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSAN: Fast Track (v7)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Firewall: Troubleshooting EDU-330 (11.0)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps

Palo Alto Networks : Firewall: Troubleshooting EDU-330 (11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco SDWAN Fundamentals v2.0 (SDWFND)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Enterprise network system installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Identify the various network elements of the Cisco SD-WAN solution. Deploy WAN Edge routers. Create templates to aid in the deployment and operation of the Cisco SD-WAN network. Configure and verify Cisco SD-WAN overlay routing. Create simple policies to control traffic flow through the Cisco SD-WAN fabric. The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco© Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.The course will allow you to earn 16 Continuing Education (CE) credits toward recertification. Course Outline Cisco SD-WAN Solution Components Cisco SD-WAN Network Deployment Cisco SD-WAN Configuration Management Cisco SD-WAN Overlay Routing Cisco SD-WAN Policies

Cisco SDWAN Fundamentals v2.0 (SDWFND)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Multicast v2.0 (MCAST)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network professionals, including systems engineers Channel Partners Customers Overview After taking this course, you should be able to: Describe IP multicast services Identify IP multicast issues on a data link layer Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol Describe Rendezvous Point (RP) distribution solutions Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment Describe solutions to mitigate security issues in the IP multicast network Describe the process of monitoring and maintaining multicast high-availability operations Design multicast-related application and network solutions in customer and service provider networks The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco© routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully. Course Outline Module 1: IP Multicast Concepts and Technologies Module 2: Multicast on the LAN Module 3: PIM Sparse Mode Module 4: Rendezvous Point Engineering Module 5: PIM Sparse Mode Protocol Extensions Module 6: Multiprotocol Extensions for BGP Module 7: Interdomain IP Multicast Module 8: IP Multicast Security Module 9: Multicast Optimization and High-Availability Features Module 10: Applications of Multicast

Cisco Implementing Cisco Multicast v2.0 (MCAST)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Quality of Service v2.5 (QOS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel Partner / Reseller Customer Employee Overview At course completion students will be able to: - Explain the need for QoS, describe the fundamentals of QoS policy, and identify and describe the different models that are used for ensuring QoS in a network - Explain the use of MQC and AutoQoS to implement QoS on the network and describe some of the mechanisms used to monitor QoS implementations - Given a converged network and a policy defining QoS requirements, classify and mark network traffic to implement the policy - Use Cisco QoS queuing mechanisms to manage network congestion - Use Cisco QoS congestion avoidance mechanisms to reduce the effects of congestion on the network - Use Cisco QoS traffic policing and traffic shaping mechanisms to effectively limit the rate of network traffic - Given a low speed WAN link, use Cisco link efficiency mechanisms to improve the badwidth efficiency of the link - Describe the recommended best practices and methods used for end-to-end QoS deployment in the enterprise This course provides students with knowledge of IP QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms. Introduction to QoS Review Converged Networks Understand QoS Describe Best-Effort and Integrated Services Models Describe the Differentiated Services Model Module Summary Module Self-Check Implement and Monitor QoS MQC Introduction Monitor QoS Define Campus AutoQoS Define WAN AutoQoS Module Summary Module Self-Check Lab 2-1: IP SLA Setup and QoS Baseline Measurement Lab 2-2: Configuring QoS with Cisco AutoQoS Classification and Marking Classification and Marking Overview Case Study 3-1: Classification and Marking MQC for Classification and Marking NBAR for Classification Use of QoS Preclassify Campus Classification and Marking Module Summary Module Self-Check Lab 3-1: Classification and Marking Using MQC Lab 3-2: Using NBAR for Classification Lab 3-3: Configuring QoS Preclassify Lab 3-4: Campus Classification and Marking Using MQC Congestion Management Queuing Introduction Configure WFQ Configure CBWFQ and LLQ Configure Campus Congestion Management Module Summary Module Self-Check Lab 4-1: Configuring Fair Queuing Lab 4-2: Configuring LLQ-CBWFQ Lab 4-3: Configuring Campus-Based Queuing Mechanisms Congestion Avoidance Congestion Avoidance Introduction Configure Class-Based WRED Case Study 5-1: WRED Traffic Profiles Configure ECN Describe Campus-Based Congestion Avoidance Module Summary Module Self-Check Lab 5-1: Configuring DSCP-Based WRED Lab 5-2: Configuring WTD Thresholds Traffic Policing and Shaping Traffic Policing and Shaping Overview Configure Class-Based Policing Campus Policing Configure Class-Based Shaping Configure Class-Based Shaping on Frame Relay Interfaces Configure Frame Relay Voice-Adaptive Traffic Shaping and Fragmentation Module Summary Module Self-Check Lab 6-1: Configuring Class-Based Policing Lab 6-2: Configuring Class-Based Shaping Link Efficiency Mechanisms Link Efficiency Mechanisms Overview Configure Class-Based Header Compression Configure LFI Module Summary Module Self-Check Lab 7-1: Configuring Class-Based Header Compression Lab 7-2: Configuring LFI Deploying End-to-End QoS Apply Best Practices for QoS Policy Design End-to-End QoS Deployments Module Summary Module Self-Check Lab 8-1: Mapping Enterprise QoS Policy to the Service Provider Policy Additional course details: Nexus Humans Cisco Implementing Cisco Quality of Service v2.5 (QOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Quality of Service v2.5 (QOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Quality of Service v2.5 (QOS)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

AAT Level 3 Advanced Diploma in Accounting

By Osborne Training

AAT Level 3 Advanced Diploma in Accounting AAT Level 3 is an Advanced or Intermediate level of AAT qualification in accounting. This course gives successful students the skills and knowledge to work competently in finance, accountancy, or bookkeeping role. Moreover, the students also have the opportunity to progress their studies with AAT Level 4 Diploma in Accounting and acquire full membership of the AAT. You will be awarded AAT Level 3 Advanced Diploma in Accounting certificate from Association of Accounting Technicians (AAT), once you have passed all the advanced-level qualification exams and skill tests. The Level 3 Diploma in Accounting covers the following areas: Advanced Bookkeeping Final Accounts Preparation Indirect Tax Management Accounting: Costing Ethics for Accountants Spreadsheets for Accounting

AAT Level 3 Advanced Diploma in Accounting
Delivered in Birmingham or OnlineFlexible Dates
Price on Enquiry

Technology and innovation and its profound impact on financial operations

By FD Capital

Technology and innovation and its profound impact on financial operations Technology adoption indeed comes with risks, particularly around data security and privacy. As CFOs, we must ensure robust cybersecurity measures and adhere to strict data protection regulations. It requires ongoing investment in secure systems, staff training, and proactive monitoring to mitigate risks and protect sensitive financial information. Change management is also crucial. The adoption of new technologies requires proper planning, training, and cultural adjustments. As CFOs, we need to foster a culture that embraces innovation and continuous learning. Clear communication about the benefits and objectives of technology adoption is essential to gain buy-in and drive successful implementation. Fantastic insights! Now, let’s discuss the future. What emerging technologies do you foresee shaping the future of finance functions? One area that holds immense potential is blockchain technology. Its decentralised and transparent nature has the potential to streamline financial transactions, enhance auditability, and revolutionize supply chain finance. We’re closely monitoring blockchain’s development and exploring pilot projects to leverage its benefits. I agree, blockchain is a game-changer. Additionally, as the internet of things (IoT) expands, we anticipate new opportunities and challenges. CFOs will need to adapt to the influx of real-time data from interconnected devices, leveraging this information to optimize financial processes, enhance risk management, and improve operational efficiencies. Before we wrap up, any final thoughts or advice for our CFO audience? Embrace technology and view it as an opportunity rather than a threat. Invest in understanding the technological landscape and its implications for finance. Stay curious, adapt, and be open to change. Technology will continue to evolve, and as CFOs, we must evolve with it. Absolutely. Collaboration is key. Engage with IT teams, industry peers, and external experts to stay informed about the latest technological advancements. By fostering partnerships and sharing knowledge, we can collectively navigate the ever-changing technology landscape and drive innovation within our organisations. https://www.fdcapital.co.uk/podcast/technology-and-innovation-and-its-profound-impact-on-financial-operations/ Tags Online Events Things To Do Online Online Conferences Online Science & Tech Conferences #technology #innovation #financial #impact #operations

Technology and innovation and its profound impact on financial operations
Delivered OnlineFlexible Dates
FREE

Adobe Acobat Pro DC - Advanced

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The target students for this course are office professionals with a foundational understanding of Adobe Acrobat Pro DC who want to use the advanced productivity features and the creative features of Acrobat Pro DC. Overview In this course you will create and manage PDF documents.Students will: ?Customize the Acrobat Pro DC workspace.?Create PDFs from technical documents.?Enhance PDF documents.?Create interactive PDF forms.?Finalize PDF files for commercial printing. In this course, students will use Adobe Acrobat Pro DC to convert technical documents to PDF files, enhance PDF documents, create interactive PDF forms, and prepare PDF files for commercial printing. Customizing the Acrobat Pro DC Workspace Customize the Toolbars Create Custom Tool Sets Creating PDFs from Technical Documents Create PDF Documents by Using Autodesk AutoCAD Measure Technical Drawings Create PDF Documents by Using Autodesk AutoCAD Embed Multimedia Enhance PDF Document Accessibility Use Actions Manage the Security of PDF Documents Creating Interactive PDF Forms Create a PDF Form Compile and Manage PDF Form Data Finalizing PDF Files for Commercial Printing Apply Color Management Settings Preview Printed Effects Perform Preflight on a PDF Document Create PDF/X, PDF/A, and PDF/E Compliant Files Create a Composite and Color Separations Export a PDF Document to Other Formats

Adobe Acobat Pro DC - Advanced
Delivered OnlineFlexible Dates
Price on Enquiry