• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1554 Manager courses in Rickmansworth delivered Live Online

WA599G IBM WebSphere Application Server V9 Administration in a Federated Environment

By Nexus Human

Duration 1.5 Days 9 CPD hours This course is intended for This course is designed for WebSphere administrators who have experience with stand-alone application server environments, and want to learn about creating and managing a federated environment. Overview After completing this course, you should be able to: Describe the architectural concepts that are related to WebSphere Application Server Network Deployment Create a deployment manager instance Federate an application server to a cell Add a stand-alone application server to a WebSphere Application Server cell Cluster an application server within a WebSphere Application Server cell Configure WebSphere Application Server SSL security settings Deploy applications in clustered environments Describe the features of Intelligent Management This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment.This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell.Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practicalexperience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server. Course Introduction WebSphere Application Server architecture: Federated Federating a cell Exercise: Configuring the lab workstation Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management WebSphere security: SSL Exercise: Configuring SSL for WebSphere Overview of Intelligent Management Course summary

WA599G IBM WebSphere Application Server V9 Administration in a Federated Environment
Delivered OnlineFlexible Dates
Price on Enquiry

Well Integrity (Basic and Advanced)

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This intensive 5 full-day has been designed as a separately bookable course comprising 3 days of Well Integrity (Basic) and 2 days of Advanced Well Integrity. The intensive 3 full-day course will equip the participants with a thorough knowledge of well integrity management and risk assessment in producing assets. Based on the regulatory requirements and using real examples and exercises from around the world, this represents best practice integrity management within the oil and gas industry. When to take action with a well is a critical decision, both from a safety and economic perspective. A consistent approach to decision-making provides certainty within the organisation, focusing effort, and spending wisely. The decision-making steps will be set out to ensure all critical aspects are captured consistently. Risk analysis approaches used by different organisations and examples of risk management and risk-ranking methods will be discussed. The 2 full-day course will deepen the participants' knowledge of well integrity management, and skills for designing, operating, and maintaining well equipment. The ultimate goal is to optimise productivity at the lowest Unit Operating Cost (UOC) and to maintain mechanical integrity throughout well life cycle. Well Integrity management is looked at in three distinct stages. The first stage is during the well design which includes material selection, engineering design, cement design, coating and inhibitors and cathodic protection. The second stage is monitoring the well during the life of the well, locating possible leaks and / or loss of metal. The last stage is to manage and control any well integrity issues using specialised products, services and techniques. Training Objectives 1. Well Integrity Training: Upon completion of this course, the participants will be able to: Define the building blocks of a successful well integrity management system Develop an approach to risk management, understand risk analysis and methods applied across the industry How do we 'Make Wells Safer', learn about emerging technologies for well integrity problem diagnosis and new techniques available to 'repair' the issues Execute the basic elements of well integrity management training for field operators Evaluate well design elements that enhance or hinder well integrity status definition during the operating phase of the well life-cycle Gain the demonstrable benefits of well integrity management from field experience Review cases studies and discuss them to enhance knowledge and take on board lessons learned 2. Advanced Well Integrity: Define well integrity well categorization based on compliance to the barrier policy outlined in the regulations and develop an approach to risk management Discuss well-completion design and construction to create a 'integer' well with the lowest life cycle maintenance cost from a WIM perspective Monitoring and surveillance of well integrity, focusing on barrier competence such as cementing and corrosion Investigate and manage well integrity issues, causes & potential solutions Understand repairs needed to address 'Loss of Well Operating Envelope' Gain an overview understanding of Well Suspension & Well Abandonment Discuss further case studies as well as conduct a post course test Target Audience Invaluable for production, operations, and integrity professionals involved in implementing & managing well integrity and seeking to improve performance. It is also essential for those who need to develop and implement such systems, or who have a general need to know and understand more about well integrity management. The course will also provide a fresh approach for senior professionals and managers. Designed for professionals in the oil and gas industry who are involved in the design, construction and operation of wells from the following disciplines: Production Maintenance Production Operations Drilling Engineering Safety engineering Well Intervention Well Integrity Engineering Asset Management Course Level Intermediate Advanced Trainer Gordon Duncan has over 40 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in well intervention and completions. After a number of years working for intervention service companies (completions, slickline & workovers), he joined Shell as a well service supervisor. He was responsible for the day-to-day supervision of all well intervention work on Shell's Persian/Arabian Gulf platforms. This included completion running, coil tubing, e-line, slickline, hydraulic workovers, well testing and stimulation operations. An office-based role as a senior well engineer followed. He was responsible for planning, programming and organising of all the well engineering and intervention work on a number of fields in the Middle East. He had a brief spell as a Site Representative for Santos in Australia before joining Petro-Canada as Completions Superintendent in Syria, then moved to Australia as Completions Operations Superintendent for Santos, before returning to Shell as Field Supervisor Completions and Well Interventions in Iraq where he carried out the first ever formal abandonment of a well in the Majnoon Field. While working on rotation, he regularly taught Completion Practices, Well Intervention, Well Integrity and Reporting & Planning courses all over the world. In 2014, he started to focus 100% on training and became the Technical Director for PetroEDGE. Since commencing delivering training courses in 2008, he has taught over 300 courses in 31 cities in 16 countries to in excess of 3,500 participants. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Well Integrity (Basic and Advanced)
Delivered in Internationally or OnlineFlexible Dates
£1,891 to £2,199

Compassionate Leadership: 1-Day workshop. Closed group for up to 16 learners

By Mindmaps Wellbeing

Compassion-focussed leadership is a transformative move for driving both individual and organisational performance. Long-term success comes from creating a workplace where people actually want to stay and thrive. For all leaders and managers of all levels to attend — Learn an actionable workplace wellbeing action plan that generates a real culture change to workplace wellbeing

Compassionate Leadership: 1-Day workshop.
Closed group for up to 16 learners
Delivered in Devon or UK Wide or OnlineFlexible Dates
£1,800

Version 2 - How to use CAD Heat Engineer Software 15th Feb 4pm

3.7(8)

By Heat Engineer

This is designed to be an introduction into how to start a room by room survey using the new CAD Heat Engineer feature, using the online dashboard. We will then go through the different steps to complete this heat loss report. Optional pages will also be worked through and shown. Examples of how to select the flow temperature and the heat source (heat pumps and boilers) will be presented once the heat loss result is completed.

Version 2 - How to use CAD Heat Engineer Software 15th Feb 4pm
Delivered OnlineJoin Waitlist
£47.93

VMware NSX-T Data Center: Install, Configure, Manage [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX-T Data Center Explain the features and benefits of NSX-T Data Center Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ and KVM hosts to participate in NSX-T Data Center networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX-T Data Center Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T? Data Center environment. This course covers key NSX-T Data Center features and functionality offered in the NSX-T Data Center 3.2 release, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and NSX-T Data Center Introduce the VMware Virtual Cloud Network vision Discuss NSX-T Data Center solutions, use cases, and benefits Explain NSX-T Data Center architecture and components Describe the VMware NSXTM product portfolio and features Explain the management, control, data, and consumption planes and function Preparing the NSX-T Data Center Infrastructure Describe NSX Management Cluster Deploy VMware NSXTM ManagerTM nodes on VMware ESXi and KVM hypervisors Navigate through the NSX Manager UI Explain data-plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and establish the data center infrastructure Verify transport node status and connectivity NSX-T Data Center Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the GENEVE encapsulation Configure logical segments and attach hosts using NSX Manager UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX-T Data Center Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 Gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 Gateways Examine the single-tier and multitier packet flow Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on Tier-0 Gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX-T Data Center Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX-T Data Center Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX-T Data Center Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy the NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of NSX Intelligence Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX-T Data Center Services Describe NSX-T Data Center services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX Manager UI NSX-T Data Center User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX-T Data Center Integrate VMware Identity Manager with NSX-T Data Center Integrate LDAP with NSX-T Data Center Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access NSX-T Data Center Federation Introduce the NSX-T Data Center Federation key concepts, terminology, and use-cases. Explain the onboarding process of NSX-T Data Center Federation Describe the NSX-T Data Center Federation switching and routing functions. Describe the NSX-T Data Center Federation security concepts.

VMware NSX-T Data Center: Install, Configure, Manage [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

DevSecOps Foundation (DSOF)?

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevSecOps Foundation course are professionals including: Anyone involved or interested in learning about DevSecOps strategies and automation Anyone involved in Continuous Delivery toolchain architectures Compliance Team Business managers Delivery Staff DevOps Engineers IT Managers IT Security Professionals, Practitioners, and Managers Maintenance and support staff Managed Service Providers Project & Product Managers Quality Assurance Teams Release Managers Scrum Masters Site Reliability Engineers Software Engineers Testers Overview You will learn: The purpose, benefits, concepts, and vocabulary of DevSecOps How DevOps security practices differ from other security approaches Business-driven security strategies and Best Practices Understanding and applying data and security sciences Integrating corporate stakeholders into DevSecOps Practices Enhancing communication between Dev, Sec, and Ops teams How DevSecOps roles fit with a DevOps culture and organization In this course, students will gain a solid understanding of how DevSecOps provides business value, enhancing your business opportunities, and improving corporate value. The core DevSecOps principles taught can support an organizational transformation, increase productivity, reduce risk, and optimize resource usage. This course explains how DevOps security practices differ from other approaches then delivers the education needed to apply changes to your organization. Participants learn the purpose, benefits, concepts, vocabulary and applications of DevSecOps. Most importantly, students learn how DevSecOps roles fit with a DevOps culture and organization. At the course?s end, participants will understand ?security as code? to make security and compliance value consumable as a service. This course prepares you for the DevSecOps Foundation (DSOF) certification. Realizing DevSecOps Outcomes Origins of DevOps Evolution of DevSecOps CALMS The Three Ways Defining the Cyberthreat Landscape What is the Cyber Threat Landscape? What is the threat? What do we protect from? What do we protect, and why? How do I talk to security? Building a Responsive DevSecOps Model Demonstrate Model Technical, business and human outcomes What?s being measured? Gating and thresholding Integrating DevSecOps Stakeholders The DevSecOps State of Mind The DevSecOps Stakeholders What?s at stake for who? Participating in the DevSecOps model Establishing DevSecOps Best Practices Start where you are Integrating people, process and technology and governance DevSecOps operating model Communication practices and boundaries Focusing on outcomes Best Practices to get Started The Three Ways Identifying target states Value stream-centric thinking DevOps Pipelines and Continuous Compliance The goal of a DevOps pipeline Why continuous compliance is important Archetypes and reference architectures Coordinating DevOps Pipeline construction DevSecOps tool categories, types and examples Learning Using Outcomes Security Training Options Training as Policy Experiential Learning Cross-Skilling The DevSecOps Collective Body of Knowledge Preparing for the DevSecOps Foundation certification exam Additional course details: Nexus Humans DevSecOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevSecOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevSecOps Foundation (DSOF)?
Delivered OnlineFlexible Dates
£1,495

DevOps Foundation©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as: Individuals involved in IT development IT operations or IT service management. Individuals who require an understanding of DevOps principles. IT professionals working within, or about to enter, an Agile Service Design Environment The following IT roles: Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architect, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Tester/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers. Overview The learning objectives for DevOps Foundation include an understanding of: DevOps objectives and vocabulary Benefits to the business and IT Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways DevOps relationship to Agile, Lean and ITSM Improved workflows, communication and feedback loops Automation practices including deployment pipelines and DevOps toolchains Scaling DevOps for the enterprise Critical success factors and key performance indicators Real-life examples and results The DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organizational success. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. This course prepares you for the DevOps Foundation (DOFD) certification. Exploring DevOps Defining DevOps Why Does DevOps Matter? Core DevOps Principles The Three Ways The First Way The Theory of Constraints The Second Way The Third Way Chaos Engineering Learning Organizations Key DevOps Practices Continuous Testing, Integration, Delivery, Deployment Site Reliability & Resilience Engineering DevSecOps ChatOps Kanban Business and Technology Frameworks Agile ITSM Lean Safety Culture Learning Organizations Continuous Funding Culture, Behaviors & Operating Models Defining Culture Cultural Debt Behavioral Models Organizational maturity models Automation & Architecting DevOps Toolchains CI/CD Cloud, Containers, and Microservices AI and Machine Learning Automation DevOps Toolchains Measurement, Metrics, and Reporting The Importance of Measurement DevOps Metrics - Speed, Quality, Stability, Culture Change lead/cycle time Value Driven Metrics Sharing, Shadowing and Evolving DevOps in the Enterprise Roles DevOps Leadership Organizational Considerations Getting Started Challenges, Risks, and Critical Success Factors Additional course details: Nexus Humans DevOps Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Foundation©
Delivered OnlineFlexible Dates
£1,495

Certified TIA-942 Internal Auditor (CTIA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audiences for this course are quality directors and quality assurance managers, managers responsible for the governance of an enterprise and management of its risks, technical experts, project managers and consultants, internal auditors, compliance officers and virtually anybody involved in ANSI/TIA-942 compliance certification related projects either from an end-user or vendor perspective. Participants must hold a valid CTDC certificate in order to be able to register for the CTIA class. Overview After completion of the course the participant will be able to: 1. Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself 2. Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines 3. Facilitate and support the external audit to ANSI/TIA-942 4. Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and _nal certification 5. Facilitate surveillance and recertification audits This intensive course builds further on the technical understanding of the standard acquired in the CTDC© (Certified TIA-942 Design Consultant) course. Fundamental concepts and process of an internal audit Terms and de_nitions Difference between an internal and external auditor Audit principles Auditor competency requirements Managing an audit programme Establishing the audit objectives Establishing the audit programme Planning the audit Planning the schedule Resource planning Tools/equipment required Document requirements - Design documents - Process documents - Declarations Conducting the audit Conducting an opening meeting Conducting the audit Interviews Document review Facility review Typical non-conformities - Architectura - Electrica - Mechanical - Telecommunications Preparing the audit conclusions Conducting the closing meeting Preparing and distributing the audit report Audit report requirements Classification of non-conformities Typical format of an audit report Following up on the audit The CAR ? Corrective Action Report Evaluation of the Corrective Action Report Requesting a formal external auditIssuing a conformity certificate Requirements of the certificate Registration of the certificate Surveillance auditsRecertification auditsExam: Certified TIA-942 Internal Auditor) Actual course outline may vary depending on offering center. Contact your sales representative for more information. Additional course details: Nexus Humans Certified TIA-942 Internal Auditor (CTIA) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified TIA-942 Internal Auditor (CTIA) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified TIA-942 Internal Auditor (CTIA)
Delivered OnlineFlexible Dates
£1,500

QN201G IBM Engineering Requirements Management DOORS V9.6 - Practitioner

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This basic course is for: Business Analyst Systems Engineer Software Engineer Requirements Engineer Requirements Manager Requirements Team Leader Overview Build projects in DOORS, including defining data structure, linking schema, attributes, and access permissions Use DOORS external linking facilities Share DOORS information with 3rd parties Control the flow of changes through your DOORS database Apply configuration management and backup strategies to your DOORS data This course builds on the content learned in the IBM Engineering Requirements Management DOORS V9.6 Foundation course. It is designed for those who will be in the role of team lead or project manager, or who want to learn more about advanced DOORS end-user functionality. It discusses creating and structuring DOORS projects, defining linking relationships and attributes, setting access permissions, and managing change. It also discusses external linking, working with spreadsheets, and applying configuration management strategies to DOORS data. Course Outline Build projects in DOORS, including defining data structure, linking schema, attributes, and access permissions Use DOORS external linking facilities Share DOORS information with 3rd parties Control the flow of changes through your DOORS database Apply configuration management and backup strategies to your DOORS data

QN201G IBM Engineering Requirements Management DOORS V9.6 - Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon Cloud Service: Deploy and Manage on Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Determine steps and requirements to deploy or upgrade Horizon Cloud Service on Microsoft Azure Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Discuss and create Remote Desktop Session Host Farms Explain power management options in the RDSH farm Create VDI desktop assignments and entitlements Manage assignable images on Horizon Cloud Service on Microsoft Azure Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure Describe the integration of Dynamic Environment Manger with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod's environment Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to achieve competence in deploying and managing VMware Horizon© Cloud Service? on Microsoft Azure. This training increases your skills and competence in using the VMware Horizon© Cloud Administration Console and Microsoft Azure portal.Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for VDI and RDSH assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, Workspace ONE Access and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. Course Introduction Introduction and course logistics Course objectives Introduction to Horizon Cloud Service on Microsoft Azure Identify Horizon Cloud Service on Microsoft Azure features, benefits, and licensing options Interpret Horizon Cloud Service on Microsoft Azure architecture components to identify configuration prerequisite Interpret Horizon Cloud Service on Microsoft Azure deployment models Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Microsoft Azure Networking Requirements Summarize Horizon Cloud connectivity considerations and tasks Discuss Horizon Cloud on Microsoft Azure networking concepts Identify ports required for local connections, remote connections, and endpoint operating system firewall rules Active Directory List the features and limitations of supported AD configurations Discuss Horizon Cloud Service on Microsoft Azure AD integration best practices Determine Horizon Cloud Service on Microsoft Azure AD requirements Deployment and Upgrades Determine steps and requirements to deploy Horizon Cloud Service on Microsoft Azure Discuss the features and benefits of using multiple tenant subnets for desktops and RDSH Discuss the features and benefits of using Internal and External UAG Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits Creating Images Outline the process and choices to set up primary VMs Identify the configuration choices for importing primary VMs List steps to install the user software on the primary VM Identify steps to convert a configured primary VM to an assignable image Access Desktops and Applications Use Horizon Client to access desktops and remote applications Compare the remote display protocols that are available for Horizon Cloud Remote Desktop Session Host Farms List the steps and considerations to take when creating an RDSH farm List the actions that can be performed on farms listed on the console?s Farms page List the actions to assign an application to a user or group List the prerequisites and steps to create an RDSH session assignment VDI Desktops Compare a dedicated assignment to floating assignment Outline steps to create a VDI desktop assignment Explain the entitlement of desktops Managing Assignable Images Describe and manage assignable images Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure VMware Dynamic Environment Manager Identify the VMware Dynamic Environment Manager functional areas and their benefits Prepare an infrastructure for VMware Dynamic Environment Manager Outline the steps that are required to install and configure Dynamic Environment Manager components Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler App Volumes for Horizon Cloud Service on Microsoft Azure Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure Install and configure App Volumes in Horizon Cloud Service on Microsoft Azure Workspace ONE Access Describe the benefits of integrating VMware Horizon Cloud service with Workspace ONE Access. Describe how a user obtains access to an entitled virtual desktop or application from the Intelligent Hub catalog. Describe the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization. Describe the importance of configuring the Remote App Access Client in Workspace ONE Access. Summarize the steps of configuring the Access settings in Horizon Cloud control panel. Access an entitled Horizon virtual desktop or application in the Intelligent Hub catalog. Scalability Considerations Discuss the Horizon Cloud Service on Microsoft Azure scalability cost and settings Describe the usage of Universal Broker in Horizon Cloud Service on Microsoft Azure Horizon Cloud Connector Describe the features and benefits of Horizon Cloud Connector List the prerequisites and requirements to connect a Horizon pod with Horizon Cloud Connector Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod?s environment Troubleshooting Horizon Cloud Service on Microsoft Azure Discuss Horizon Cloud Service on Microsoft Azure troubleshooting basics Discuss Horizon Cloud Service troubleshooting basics Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure

VMware Horizon Cloud Service: Deploy and Manage on Microsoft Azure
Delivered OnlineFlexible Dates
Price on Enquiry