Duration 2 Days 12 CPD hours This course is intended for This course is ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users. Overview Organizations are increasingly integrating Mac computers into Windows or other standards-based network environments. This course gives both users and the IT professionals who support them the skills necessary to make integration easy. This two day Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. Directory Services Connect a Mac to an Active Directory server Share Files Connect to file servers. Turn on personal file sharing. Configure Collaborative Services Manage Internet Accounts preferences. Connect to an Exchange Server. Connect Mail to non-Windows servers. Add accounts in Mail, Contacts, and Calendars. Secure a Mac Built-In Security features. Create strong passwords. Use two-factor authentication. Set a firmware password. Lock a Mac screen. Create user accounts. Disable automatic login. Protect start-up disk files. Ensure that the apps you download are safe. Provide network security. Printing Connect to a local printer. Connect to, share, and print from network printers. Move and Back Up Content Move content. Back up content. Run Windows on a Mac Run Windows natively or virtually. Microsoft Office for macOS. Cross-platform apps. Cross-platform files. Troubleshooting How to best troubleshoot macOS. Questions & Answers
Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to improve working relationships and maximize cooperation and productivity will benefit from this course. Overview After completing this workshop, students will be able to: Describe the importance of effective work relationships Identify the interdependencies between you and your colleagues Communicate effectively to create rapport and connect with others Identify and maintain your network of professional relationships Develop collaborative, trust-based relationships that achieve meaningful results In the interdependent workplace, we rely on each other to get things done. A professional network isn?t something we can take for granted ? mapping work relationships can be a complex task and understanding different behavioral styles takes effort - but it pays off! Good working relationships means more than just reducing conflict and misunderstandings. It also means building trust, increasing influence, and benefitting from the knowledge and advice of co-workers and senior managers. This workshop will help you develop relationship building skills so you can communicate who you are, what you need, and why you need it in a way that builds trust, respect, and a professional reputation. The Importance of Work Relationships Expectations of Work Relationships The Value of Relationships Effects of Work Relationships Mapping Your Work Relationships A Network of Relationships Mapping Work Relationships Languages of Appreciation Identifying Interdependencies Clarifying Purpose Systems Thinking Analyzing Independencies Bridging Work Styles Understanding Behavioral Styles Strengths and Trouble Spots Bridging Different Styles Building Your Network Relationships, Communication, and Results Networking Principles Reputation Management Collaborating For Success Understanding Personalities Aspects of Trust Recognizing Blind Spots Additional course details: Nexus Humans Building Successful Work Relationships (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Successful Work Relationships (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
During this training course, you will acquire the knowledge and skills to plan and carry out internal audits in compliance with ISO 19011. About This Course Based on a number of exercises, you will learn how to utilise audit techniques and become competent to manage an internal audit programme, communicate with customers, and manage conflict resolution. After acquiring the necessary expertise, you can sit for the exam and gain 'Certified ISO/IEC 27001: 2022 Internal Auditor' Certification. By holding this Certificate, you will demonstrate that you have the capabilities and competencies to audit organizations based on best practices. Learning objectives By the end of this training course, the participants will be able to: Explain the concepts and principles of an information security management system (ISMS) based on ISO/IEC 27001: 2022 Analyse the ISO/IEC 27001: 2022 requirements for an ISMS from the perspective of an auditor Evaluate the ISMS conformity requirements Plan, conduct, and close an ISO/IEC 27001: 2022 compliance audit programme Assist an organisation in transitioning from ISO 27001: 2013 Deliver an ISO/IEC 27001: 2022 Internal audit programme Our approach This training is based on both theory and best practices used in ISMS audits Lessons are illustrated with examples based on case studies Practical exercises are based on a real world case study Practice tests are similar to the Certification Exam Course Overview Module 1 Foundational Audit principles and concepts of Information Security Management System (ISMS) Module 2 The Information Security Management System (ISMS) Module 3 ISO 19011 audit concepts and principles Module 4 Preparation of an ISO/IEC 27001 audit Module 5 Providing an ISO/IEC 27001 audit Module 6 Closing an ISO/IEC 27001 audit Module 7 Managing an ISO/IEC 27001 Internal audit programme Course Agenda Day 1: Introduction to the information security management system (ISMS) and ISO/IEC 19011 Day 2: Audit principles, preparation, and initiation of an audit Day 3: Audit activities, Closing the Audit and the Certification exam Accreditation Assessment All candidates at official training courses are tested throughout their course with quizzes and exercises, in combination with a final exam held on the last day of the course. Both elements are a part of the overall score. For this course, the final exam constitutes a 10 question essay type which should be completed within 125 minutes. A passing score is achieved at 70%. Self-study candidates can purchase an exam voucher from our Store. Exam results are returned within 24 hours, with successful candidates receiving both a digital badge and a Certificate of Achievement Prerequisites A general understanding of ISO/IEC 27001: 2022 and knowledge of audit principles. Provided by This course is Accredited by NACS and Administered by the IECB What's Included? Refreshments & Lunch (Classroom courses only) Course Slide Deck Official Study Guides CPD Certificate The Exam Who Should Attend? Auditors seeking to perform Internal Information Security Management System (ISMS) certification audits Managers or consultants seeking to master an Information Security Management System audit process Individuals responsible for maintaining conformance with Information Security Management System requirements Technical experts seeking to prepare for an Information Security Management System audit Expert advisors in Information Security Management
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators System engineers System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Monitor and optimize compute, network, and storage performance on ESXi hosts Monitor and optimize vCenter Server performance Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi⢠host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, accelerated, hands-on training course is a blend of the VMware vSphere: Optimize and Scale and VMware vSphere: Troubleshooting courses. This Fast Track course includes topics from each of these advanced courses to equip experienced VMware administrators with the knowledge and skills to effectively optimize and troubleshoot vSphere at an expert level. Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems
Duration 2 Days 12 CPD hours This course is intended for Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Install, Configure, and Implement Cisco Emergency Responder (Cisco ER). Configure CUCM for CER Configure Emergency Response Locations (ERLs) Configure Emergency Location Identification Numbers (ELINs) Configure PSAP calls and PSAP CallBack Configure Users and onsite Security Management This is a 2-day hands-on course, where students will Install, Deploy, and Configure Cisco Emergency Responder (Cisco ER) 12.5. Student will also integrate emergency communication system with Cisco Unified Communications Manager. Students will learn how Cisco ER automatically notifies and routes calls to the local public safety answering point (PSAP) operator. Students will configure emergency response locations (ERLs) and emergency location identification numbers (ELINs) in CER to properly route enhanced 911 (E911) calls. You will also examine CER disaster recovery and user management. Cisco Emergency Responder Overview PSAP/ Emergency Calling Overview National Emergency Number Association Legislation and Regulation Service Provider ALI Automatic Number Identification (ANI) Automatic Location Identification (ALI) NENA Emergency Response Location NENA Guidelines for ERLs NENA Emergency Location Identification Number (ELIN) E911 Preparation Cisco Emergency Call Handler Cisco Emergency Responder 11.x Enhancements License Management Emergency Responder Redundancy Clustering CER over the WAN Integration with UC Manager Intrado Architecture CER Wireless Features Overview Installing Cisco Emergency Responder Supported Hardware Platforms CER Virtual Server Requirements Deploy Cisco CER OVF/OVA Installation of CER CER CLI Interface Reset Application Administrator Password Add 2nd CER Server - Subscriber Upgrade VMware Tools on Cisco Emergency Responder Server CER Backup and Restore CER PLM Licensing Unified Communication Manager CER Configuration Cisco Unified Communications Manager Administrator Interfaces Cisco Unified Communications Manager Required Services for CER CUCM SNMP Settings Phone Partition and Calling Search Spaces Partitions for 911 Services CER CUCM Configuration for CTI Route Points and CTI Ports Configure CER Route Patterns for 911 and Security Personal Create Translation Patterns for ELINs Create Emergency Responder Cisco Unified Communications Manager User Location Awareness Overview Configure Wireless Endpoint Tracking Feature on UCM 11.5 Cisco Emergency Responder (CER) Configuration Emergency Responder Interface E.164 Dial Plan Support Cisco Emergency Responder Groups Setup CER Groups CER Telephony Settings for CER Cisco CER License Manager Cisco CER Email Settings Cisco CER - Add Subscriber Onsite Security Alerts for Security Personnel Pager Alert Configuration Configure Emergency Response Location (ERL) Configure Emergency Location Identification Number (ELIN) ERL Migration Tool Configure SNMP Configure Phone Tracking Configure LAN Switch Tracking Configuring IP Subnet-based ERLs Configuring Manual Phone Tracking Emergency Responder User Management Manage Onsite Alerts, ERLs, and ALI Data User and Security Logins CER - Web Alerts CER - ERL Audit Trail Export PS-ALI Records ERL Debug Tool
Elevate your expertise in clean hydrogen derivatives - ammonia, methanol, and synthetic hydrocarbon with EnergyEdge's course. Enroll now for virtual instructor-led training!
Duration 3 Days 18 CPD hours This course is intended for Experienced system integrators and consultants responsible for designing and deploying vSphere environments Overview By the end of the course, you should be able to meet the following objectives: Identify the business objectives for the vSphere environment Identify business requirements, constraints, assumptions, and risks for all layers in the vSphere environment Apply a framework to a design Analyze design choices and best-practice recommendations Create a design that ensures availability, manageability, performance, recoverability, and security Design the core management infrastructure for an enterprise Design the virtual data center for an enterprise Design the compute infrastructure for an enterprise Design the storage and networking infrastructures for an enterprise Design virtual machines to run applications in a vSphere infrastructure Design security, manageability, and recoverability features for an enterprise This three-day training course equips you with the knowledge, skills, and abilities to design a VMware vSphere© 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security, and that uses VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Given a case study, you practice your design skills by working with peers on a design project Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Follow a proven process to design a virtualization solution Define customer business objectives Gather and analyze business and application requirements Document design requirements, constraints, assumptions, and risks Use a systematic method to evaluate and document design decisions Create a conceptual design Core Management Infrastructure Determine the number of VMware vCenter© Server ApplianceTM instances to include in a design Choose the appropriate single sign-on identity source Choose the time synchronization method Choose methods to collect log files and VMware ESXi? core dumps Design a vCenter Server deployment topology that is appropriate for the size and requirements of the data center Virtual Data Center Infrastructure Calculate total compute capacity requirements for a virtual data center Create a virtual data center cluster design that meets business and workload requirements Evaluate in the virtual data center the use of several management services, such as VMware vSphere© High Availability and VMware vSphere© Distributed Resource Scheduler? Evaluate the use of resource pools in the virtual data center design Compute Infrastructure Create a compute infrastructure design that includes the appropriate ESXi boot, installation, and configuration options Choose the ESXi host hardware for the compute infrastructure Storage Infrastructure Calculate storage capacity and performance requirements for a design Evaluate the use of different storage platforms and storage management solutions Design a storage platform infrastructure and storage management architecture that meets the needs of the vSphere environment Network Infrastructure Evaluate the use of different network component and network management solutions Design a network component architecture that includes information about network segmentation and virtual switch types Design a network management architecture that meets the needs of the vSphere environment Virtual Machine Design Make virtual machine design decisions, including decisions about resources Design virtual machines that meet the needs of the applications in the vSphere environment and follow VMware best practices Infrastructure Security Make security design decisions for various layers in the vSphere environment Design a security strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Manageability Make infrastructure manageability design decisions that adhere to business requirements Design an infrastructure manageability strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Recoverability Make infrastructure recoverability design decisions that adhere to business requirements Design an infrastructure recoverability strategy that meets the needs of the vSphere environment and follows VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-1) 102 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: customize shell environments to meet users' needs customize existing scripts or write simple new Bash scripts install and configure X11 add, remove, suspend and change user accounts use cron and systemd timers to run jobs at regular intervals and to use at to run jobs at a specific time localize a system in a different language than English properly maintain the system time and synchronize the clock via NTP manage print queues and user print jobs using CUPS and the LPD compatibility interface manage the persistent network configuration of a Linux host configure DNS on a client host review system configuration to ensure host security in accordance with local security policies know how to set up a basic level of host security use public key techniques to secure data and communication. This course prepares students to take the 102 exam of the LPI level 1 certification. Shells and Shell Scripting Customize and use the shell environment Customize or write simple scripts User Interfaces and Desktops Install and configure X11 Graphical Desktops Accessibility Administrative Tasks Manage user and group accounts and related system files Automate system administration tasks by scheduling jobs Localisation and internationalisation Essential System Services Maintain system time System logging Mail Transfer Agent (MTA) basics Manage printers and printing Networking Fundamentals Fundamentals of internet protocols Persistent network configuration Basic network troubleshooting Configure client side DNS Security Perform security administration tasks Setup host security Securing data with encryption Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-1) 102 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-1) 102 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for students with previous Citrix ADC experience, and best suited for individuals who will be deploying Citrix Application Delivery Management to administer a Citrix Networking environment or optimize Citrix ADC-managed application delivery traffic. Overview Manage multiple Citrix ADC platforms centrallyOrchestrate configuration changesReport on transactions passing through the Citrix ADC environmentVisualize infrastructure and plan expansion Master the deployment and usage of Citrix Application Delivery Management with this two-day management and optimization course. Students will gain the skills needed to automate and manage network services for scale out of application architectures, and to optimize Citrix ADC-managed application delivery traffic. The curriculum focuses on centrally managing multiple Citrix ADC platforms, orchestrating configuration changes, reporting on transactions, visualizing infrastructure and planning infrastructure expansion. Students will also learn how to implement Citrix ADC features, including caching, frontend optimization, Citrix ADC web logging and TCP/HTTP optimization, to optimize traffic managed by your Citrix networking environment. Citrix Application Delivery Management Introduction An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing and Monitoring Application Delivery Management An introduction to Application Delivery Management Application Delivery Management Deployment and Configuration Deploying Application Delivery Management in High Availability Application Delivery Management Instance Management Managing Citrix ADC Configuration Application Management StyleBooks Configuration Management Citrix ADC Web Logging Understanding Web Traffic Installing and configuring Citrix ADC Web Logging Troubleshooting Citrix ADC Web Logging Citrix ADC Integrated Caching Introduction to Integrated Caching Static and Dynamic Content Request and Response Process Flow Understanding Cache Policies Identifying Content Group Settings Front-End Optimization Improving Content Delivery Front-End Optimization Use Cases Understanding Minification CSS Optimizations Tuning and Optimizations Connections on the Citrix ADC Connection Profiles Queuing on the Citrix ADC Connection Tuning Practices