Duration 5 Days 30 CPD hours This course is intended for Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts Overview Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam. Blue Team?Principles Network Architecture?and how it lays the groundwork Defensive Network Security Data Locations?and how they tie together Security?Operations?Center The People, Processes, and Technology Triage and Analysis Digital Forensics Incident Handling Vulnerability Management Automation, Improvement, and Tuning Digital?Forensics Investigative Theory and?Processes Digital Acquisition Evidence Protocols Evidence Presentation Computer Forensics?Laboratory Protocols Processing Techniques Specialized?Artifacts Advanced Forensics for Today?s?Exploitations Malware Analysis Creating the Safe Environment Static Analysis Dynamic Analysis Behavior Based Analysis What is different about?Ransomware? Manual Code Reversing Traffic Analysis Manual Analysis Principles Automated?Analysis Principles Signatures?compared to?Behaviors Application Protocols Analysis Principles Networking Forensics Assessing the Current State of Defense with the?Organization Network Architecture and Monitoring Endpoint Architecture and Monitoring Automation, Improvement, and continuous?monitoring Leveraging SIEM for Advanced Analytics Architectural Benefits Profiling and?Baselining Advanced Analytics Defeating the Red Team with Purple Team tactics Penetration Testing?with full knowledge Reconnaissance Scanning Enumeration Exploitation Lateral Movement Additional course details: Nexus Humans C)CSA: Cybersecurity Analyst Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)CSA: Cybersecurity Analyst Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for System administrators who are either new to JBoss or have experience with JBoss Enterprise Application Platform 5. Base experience with system administration on Microsoft Windows, UNIX, or Linux© operating systems. Understanding of hardware and networking. Note: No prior knowledge of Java, scripting, or JBoss Developer Studio is required. Overview Upon successful completion of this course, students will be able to take the Red Hat Certified JBoss Administration (RHCJA) Exam. In this course, you'll discover the best practices for installing and configuring Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) 7. Through hands-on labs, you'll learn the essential, real-world tasks that you need to know as a system administrator to effectively deploy and manage applications on JBoss EAP. This course will help prepare you to take the Red Hat Certified Specialist in Enterprise Application Server Administration exam. 1 - OVERVIEW OF JBOSS ENTERPRISE APPLICATION PLATFORM Learn the concepts and terminology of JBoss© Enterprise Application Platform 6, and install and run a JBoss Enterprise Application Platform instance. 2 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN STANDALONE MODE Understand the directory structure of standalone mode and the standalone.xml configuration file, and deploy an application onto a standalone server. 3 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN DOMAIN MODE Set up a domain, including a domain controller managing multiple host controllers. Also learn how to deploy an application onto a domain. 4 - CONFIGURE SERVERS Define a server group on a host, add servers to a server group, and deploy an application to a server group. 5 - USE THE CLI TOOL Learn how the command-line Interface tool can be used to script administrative tasks. 6 - THE DATASOURCE SUBSYSTEM Understand database connection pools in JBoss Enterprise Application Platform and how to configure the datasource subsystem. Learn how to deploy a Java? Database Connectivity (JDBC) driver and define a datasource. 7 - THE LOGGING SUBSYSTEM Configure the logging subsystem, including configuring the built-in handlers and loggers. 8 - THE MESSAGING SUBSYSTEM Understand JMS and HornetQ, including how to define and configure connection factories and destinations (topics and queues). 9 - THE SECURITY SUBSYSTEM Configure the security subsystem, including securing the management interfaces, securing an application, and securing a JMS destination. Also learn how to define an Lightweight Directory Access Protocol (LDAP) and database security realm. 10 - JVM CONFIGURATION Configure the JVM for both standalone and domain modes. 11 - MIGRATING APPLICATIONS TO JBOSS ENTERPRISE APPLICATION PLATFORM 6 Understand classpath and module dependencies, JPA issues, updating security settings, and other tips on how to migrate an application to JBoss Enterprise Application Platform 6. 12 - THE WEB SUBSYSTEM Configure the HTTP and HTTPS Connectors, set up an SSL connection, and configure an AJP Connector. 13 - INTRODUCTION TO CLUSTERING Set up JBoss Enterprise Application Platform 6 in a cluster in both standalone and domain mode. Additional course details: Nexus Humans Red Hat JBoss Application Administration I with Exam (AD249) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat JBoss Application Administration I with Exam (AD249) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Network designers Network managers System engineers Overview After taking this course, you should be able to: Review the Cisco Catalyst 9000 Series Switches identify the switches' features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution. Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration. Identify the role and value of Cisco Silicon One in a campus environment. Examine management capabilities of the Cisco Catalyst 9000 Series Switches. Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features. Describe automation features, Application Programming Interface (API), Infrastructure as Code, and automation tools supported on Cisco Catalyst 9000 Series switches. Describe the new QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches. Describe the maintenance features on Cisco Catalyst 9000 Series switches. Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices. Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP. Describe how to manage and host applications on Cisco Catalyst 9000 Series switches using Cisco DNA Center. Explore a modern approach to cloud-managed networking for Cisco Catalyst 9000 Series switches and wireless access points that uses the Meraki Dashboard and analytics. Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities. Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables. Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles. Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features. The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) v4.0 course provides you with insight into Cisco Catalyst 9000 Series Switches and its solution components. You will learn about the architecture, capabilities, positioning, and implementation of the Cisco Catalyst 9000 Series switches, as well as the management of the switches using CLI, Cisco DNA Center, and IOS-XE web user GUI. Additionally, you will be introduced to security, cloud, automation, and other important features of Cisco Catalyst 9000 Series switches. Course Outline Introducing the Cisco Catalyst 9000 Series Switches Positioning Cisco Catalyst 9000 Series Switches Cisco Catalyst Silicon One Architecture Exploring Cisco Catalyst 9000 Series Switches Management Capabilities Scale and Performance Features on Cisco Catalyst 9000 Series Switches Security Features on Cisco Catalyst 9000 Series Switches Automation Features on Cisco Catalyst 9000 Series Switches QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches Maintenance Features on Cisco Catalyst 9000 Series Switches Cisco SD-Access Solution on Cisco Catalyst 9000 Series Switches Application Hosting on Cisco Catalyst 9000 Series Switches Cloud Management for Catalyst 9000 Series Using Meraki Dashboard Automating Network Changes with Cisco DNA Center Introducing Cisco Catalyst 9200 Series Switches Introducing Cisco Catalyst 9300 Series Switches Introducing Cisco Catalyst 9400 Series Switches Introducing Cisco Catalyst 9500 Series Switches Introducing Cisco Catalyst 9600 Series Switches Additional course details: Nexus Humans Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Catalyst 9000 Switches v4.0 (ENC9K) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Phone Network Administrators Phone Network Engineers Data System Administrators Entry-level Network Engineers Channel Partners/Resellers, Customers, Employees Overview Describe the Cisco Unified Communications Manager network, service, and features Understand the importance of and configuration of redundancy and high availability in the enterprise network Describe user configuration and the user web interface Explain basic phone options and the use of BAT Explain the route plan and on-net/off-net calling Describe the various media resources, including conferencing and MOH Describe the basic phone features and use of hunt groups Administering Cisco Unified Communications Manager (ACUCM) v12.0 is a 3-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. The Cisco IT training course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level IP telephony course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. The course focuses on Cisco Unified Communications Manager version v12.x.The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The Cisco training course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involves routers, switches, or Cisco IOS software configuration. Exploring IP Telephone Traditional Voice versus IP Telephony Clustering Overview Intracluster Communications Cisco Unified Communications Manager Clusters Clustering Options Platform Requirements Describing Deployment Models Single-Site Deployment Centralized Call-Processing Deployment Distributed Call-Processing Deployment Distributed Single-Cluster Call-Processing Deployment Hybrid Call-Processing Deployment New Advanced Multicluster Options Understanding Advanced Multisite Features Need for CAC Deploying AAR Survivable Remote Site Telephony SRST Failover Logging in to Cisco Unified Communications Manager Logging In to Cisco Unified CM Administration and Cisco Unified Serviceability Logging In to Cisco Unified Operating System Administration and the DRS Navigation Menu Command-Line Interface Examining Basic Server Configuration Server Configuration?Eliminating DNS Reliance Configuring Enterprise Parameters Describing Multilevel Administration Configuring Multilevel Administration Creating End Users Creating Roles Creating User Groups Assigning Users to User Groups Configuring DRS Backup and Restore Procedures DRS Backup Procedures DRS Restore Procedures Understanding User Configuration Understanding User Management Configuring Users Using the User Web Pages Understanding the User Web Pages Using the User Web Pages Configuring System Parameter Cisco Unified CM Configuration Cisco Unified Communications Manager Group Configuration Phone NTP Configuration Date/Time Group Codecs and Regions Location Configuration Device Pool Configuration DHCP Service Configuration Device Defaults Configuration Clusterwide Parameters Licensing Supporting Cisco Unified IP Phones Cisco Unified IP Phones Overview Specialized Cisco Unified IP 7900 Series Phones Phone Button Templates Softkey Templates Exploring Phone Registration and IP Phone Communications Cisco Unified IP Phone Registration Cisco Unified IP Phone Configuration Utilizing the Bulk Administration Tool (BAT) Overview of Cisco Unified Communications Manager BAT Cisco Unified Communications Manager TAPS Implementing Dial Plan Connectivity Organizational Dial Plan Trunks Gateways Creating Route Plans Dial Plan Overview Route Pattern Overview Digit Collection Call Routing Configuring Transition Patterns and Route Filters Translation Patterns The 9.@ Pattern Route Filters Implementing Digit Manipulation Discard Digits Instruction Transformation Masks Route Plan Report Defining Class of Control Overview of Class of Control Partitions CSS Configuration PLAR Application Using Class of Control Features Call Restriction Time of Day Routing Traditional vs. Line/Device Approach Defining Media Resources Overview of Media Resources Conference Bridge Media Termination Points Transcoder Music on Hold Annunciator Exploring Media Resource Management MRG Management Configuring MRGs Configuring MRGLs Describing Basic Features Call Park Call Pickup Cisco Call Back Shared Lines with Barge and Privacy Exploring Hunt Groups Hunt Group Overview Line Group Configuration Hunt List Configuration Hunt Pilot Configuration Final Forwarding Describing Phone Services Cisco IP Phone Services Cisco Phone Services Configuration
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview Configure Red Hat Virtualization Configure networking and storage for use with Red Hat Virtualization Manage user accounts and access to the Red Hat Virtualization environment Install and manage virtual machines in Red Hat Virtualization Use templates for rapid virtual machine deployment Manage virtual machine snapshots and images Migrate virtual machines and explore high-availability options Deploy, configure, manage, and migrate virtual environments Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam. This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6. 1 - Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. 2 - Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. 3 - Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. 4 - Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. 5 - Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. 6 - Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. 7 - Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. 8 - Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. 9 - Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. 10 - Migrate virtual machines Migrate and control automatic migration of virtual machines. 11 - Manage virtual machine images Manage virtual machine snapshots and disk images. 12 - Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. 13 - Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. 14 - Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. 15 - Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization. Additional course details: Nexus Humans Red Hat Virtualization (RH318) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Virtualization (RH318) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for System integrators, Consultants, Solution architects Overview By the end of the course, you should be able to meet the following objectives: Create a vSphere design given a case study Identify and assess the business objectives of the vSphere environment Identify business requirements, constraints, assumptions, and risks, for all layers in the vSphere environment Apply a framework to a design Analyze design choices for vCenter, ESXi, storage, networking, vSphere clusters, and virtual machines Identify design decisions to ensure manageability, which include scalability, capacity planning and lifecycle management Identify design decisions to ensure that the vSphere environment is highly available Identify design decisions to ensure that the vSphere environment performs well Identify design decisions to ensure that the vSphere environment is secure Identify design decisions to ensure that the vSphere environment can recover from data loss or disaster This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Describe various design framework principles Follow a proven process to design a virtualization solution Define customer business objectives and requirements Use a systematic method to evaluate and document a conceptual model Create a logical design from a conceptual model Recognize key information contained in the physical design Designing for Manageability: Capacity Planning Make capacity planning design decisions that adhere to business requirements Design capacity planning strategies that meet the needs of the vSphere environment and follow VMware best practices Calculate compute and storage requirements for the VMs in the vSphere environment Designing for Manageability: Scalability Make scalability design decisions that adhere to business requirements Design scalability strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Manageability: Lifecycle Management Make lifecycle management design decisions that adhere to business requirements Design lifecycle management strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Availability Make availability design decisions that adhere to business requirements Design availability strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Performance Make performance design decisions that adhere to business requirements Design performance strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Security Make security design decisions that adhere to business requirements Design security strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Recoverability Make recoverability design decisions that adhere to business requirements Design recoverability strategies that meet the needs of the vSphere environment and follow VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [V8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [V8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Ideal candidate for this course Consultants Pre-sales Engineers Sales Engineers Systems Engineers Solutions Architects Overview This course teaches advanced level HPE Server technologies. Topics Include:HPE Apollo ServersHPE Moonshot ServersHPE Integrity SuperdomeX ServersManagement ToolsCustomer Engagement Skills This course teaches advanced level HPE Server technologies. Topics Include:HPE Apollo ServersHPE Moonshot ServersHPE Integrity SuperdomeX ServersManagement ToolsCustomer Engagement Skills Recognizing Industry Trends Describe trends affecting enterprises and explain how these trends lead to the four Transformation Describe key business challenges enterprises are facing. Review the role of a server architect, emphasizing how the architect helps companies. Provide an overview of the HPE enterprise server solutions covered in this course: Apollo solutions Moonshot Integrity Superdome X Gathering Customer Requirements Identify key decision makers and explain how to engage them in a discussion about the company?s business requirements and challenges Obtain data and documentation required to understand the company? business requirements Explain best practices for creating requirements statements and documents Advanced Architecture for Server Solutions Analyze the special needs of data, High Performance Computing (HPC), and mission-critical workloads Given a customers? specific requirements, architect a solution for a data, HPC, and mission critical workloads HPE Apollo Solutions for HPC Explain the features and benefits of HPE Apollo 2000, 6000, and 8000 solutions Position HPE Apollo 2000 and 6000 solutions for the right use cases and workloads Create an implementation plan for an HPE Apollo 2000 or 6000 solution, including plans for the proper performance, scalability, high availability, and management HPE Apollo 4000 for Data-Driven Organizations Briefly describe the HPE Apollo 4000 portfolio Position HPE Apollo 4000 solutions for the right use cases Create an implementation plan for an HPE Apollo 4000 solution, including plans for the proper performance, scalability, and high availability HPE Moonshot Solutions Briefly describe the HPE Moonshot portfolio Position HPE Moonshot solutions for the right use cases Explain options and best practices for designing the networking component of an HPE Moonshot solution HPE Moonshot Workloads Position HPE Moonshot cartridges for the right use cases and workloads Create an implementation plan for the following solutions, including plans for the proper performance, scalability, and high availability: Big data and analytics solution Video processing solution Mobile workspace solution Web infrastructure solution HPE Integrity Superdome X Solutions Explain the benefits of the HPE Integrity Superdome X and describe its available options Explain the benefits of nPar and RAS features for HPE Integrity X solutions Position HPE Integrity Superdome X solutions for the right use cases Create an implementation plan for HPE Integrity X solutions, including plans for the proper performance, scalability, fault tolerance, high availability, and manageability Monitoring and Managing HPE Solutions Recommend and substantiate the HPE management tools that optimize administrative operations for various customer environments Explain the benefits of the HPE Representational State Transfer (REST) application program interface (API) Working with Customer Business Financials Demonstrate business acumen through an ability to analyze financial statements Define basic financial terms used when talking with a customer's executive officers Calculate key performance indicators (KPIs) to analyze a customer's financial health and understand industry and company trends Use HPE tools analyze a company's financial position Additional course details: Nexus Humans Architecting Adv HPE Server Solutions Rev 16.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting Adv HPE Server Solutions Rev 16.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1.5 Days 9 CPD hours This course is intended for This course is intended for individuals who want to gain basic knowledge communicating, etiquette, professionalism and time management for the office environment. Overview Upon successful completion of this course, students will be able to communicate, be professional and manage their time effectively in a business environment. In this course, students will learn how to communicate, act and manage time effective in a business environment. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives The Big Picture What is Communication? How Do We Communicate? Other Factors in Communication Understanding Communication Barriers An Overview of Common Barriers Language Barriers Cultural Barriers Differences in Time and Place Paraverbal Communication Skills The Power of Pitch The Truth about Tone The Strength of Speed Non-Verbal Communication Understanding the Mehrabian Study All About Body Language Interpreting Gestures Speaking like a Star S = Situation T = Task A = Action R = Result Summary Listening Skills Seven Ways to Listen Better Today Understanding Active Listening Sending Good Signals to Others Asking Good Questions Open Questions Closed Questions Probing Questions Appreciative Inquiry The Purpose of AI The Four Stages Examples and Case Studies Mastering the Art of Conversation Level One: Discussing General Topics Level Two: Sharing Ideas and Perspectives Level Three: Sharing Personal Experiences Our Top Networking Tips Advanced Communication Skills Understanding Precipitating Factors Establishing Common Ground Using ?I? Messages Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Principles of Professional Behavior Always be Your Best Meeting and Greeting Sending Social Invitations to Business Associates Interview Etiquette Interviewing Before the Interview In the Waiting Room During the Interview After the Interview Job Fair Interviews Planning & Attending Business Meetings Office Meetings Meal Meetings Electronic Etiquette Voicemail Cell Phones Email Multiculture Etiquette Defining the Challenge Five Steps to Dealing with Diversity Guidelines for Managing Diverse Relationships Time Management Concepts Benefits of better time utilization Who controls your schedule? Your Job: What You Are Responsible for Accomplishing? Your job responsibilities Setting objectives Setting priorities How to Use Your Time Gathering data-the time log Analyzing the data Delegation: Working Through Others Why some people don't delegate Levels of delegation How to delegate Benefits of delegation Getting started Planning: Keys to Achievement Planning: Keys to Achievement Coping with Common Time Wasters Coping with self-generated time wasters Coping with environmental time wasters Personal Needs that Get in the Way of Effective Time Utilization Needs profile analysis Self-assessment questionnaire Applying needs assessment results Planning for Improvement Six tips for effective time management Planning for improved time utilization Follow-Up: Staying on Track Time savings progress report Time savings progress chart Time management progress survey Additional course details: Nexus Humans Business Soft Skills training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Soft Skills course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE's ArubaOS-CX switches. Overview After you successfully complete this course, expect to be able to: Use NetEdit to manage switch configurations Use the Network Analytics Engine (NAE) to implement scripting solutions to provide for proactive network management and monitoring Compare and contrast VSX, VSF, and backplane stacking Explain how VSX handles a split-brain scenario Implement and manage a VSX fabric Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on AOS-CX switches to select given traffic Apply static ACLs to interfaces to meet the needs of a particular scenario Examine an ACL configuration and determine the action taken on specific packets Deploy AOS-Switches in single-area and multi-area OSPF systems Use area definitions and summaries to create efficient and scalable multiple area designs Advertise routes to external networks in a variety of OSPF environments Promote fast, effective convergence during a variety of failover situations Use virtual links as required to establish non-direct connections to the backbone Implement OSFP authentication Establish and monitor BGP sessions between your routers and ISP routers Advertise an IP block to multiple ISP routers Configure a BGP router to advertise a default route in OSPF Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicast traffic within VLANs Describe the differences between IGMP and IGMP snooping Distinguish between PIM-DM and PIM-SM Implement PIM-DM and PIM-SM to route multicast traffic Implement Virtual Routing Forwarding (VRF) policies to contain and segregate routing information Create route maps to control routing policies Understand the use of user roles to control user access on AOS-CX switches Implement local user roles on AOS-CX switches and downloadable user roles using a ClearPass solution Implement 802.1X on AOS-CX switch ports Integrate AOS-CX switches with an Aruba ClearPass solution, which might apply dynamic role settings Implement RADIUS-based MAC Authentication (MAC-Auth) on AOS-CX switch ports Configure captive portal authentication on AOS-CX switches to integrate them with an Aruba ClearPass solution Combine multiple forms of authentication on a switch port that supports one or more simultaneous users Configure dynamic segmentation on AOS-CX switches This course teaches you the advanced skills necessary to implement and operate enterprise level Aruba campus switching solutions. You will build on the skills you learned at the Associate level to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. In this course, participants learn about ArubaOS-CX switch technologies including: securing port access with Aruba's dynamic segmentation, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Extension (VSX) and Aruba's Virtual Switching Framework (VSF). This course is approximately 50% lecture and 50% hands-on lab exercises. Introduction to Aruba Switching Switches overview Architectures NetEdit Overview Centralized configuration Switch groups/templates AOS-CX mobile App Network Analytics Engine (NAE) Overview Configuration Core NAE feature lab sflow, local mirror, remote mirror VSX VSF vs. VSX: access and Agg/core design Stacking review VSF and uni/multi packet forwarding Stack fragments / split brain VSX Overview: roles, control, data, management planes VSX components (ISL, Keepalive, VSX LAG, Active Gateway, Active-Forwarding, Link Delay) Split Brain scenario Upstream Connectively Options (ROP single VRF, SVIs with multiple VRF, VSX Lag SVIs with multiple VRFs) Upstream/Downstream unicast traffic flow (South-North and North-South) VSX Configuration: VSX and Active Gateway VSX firmware updates ACLs Overview: types, components MAC ACL, Standard ACL, Extended ACL, Classifier-based Policies Configuration: wildcard bits, logging, pacl, vacl, racl Advanced OSPF Review basic OSPF Multi area: setup and aggregation Area-Types Stub, Totally Stub, NSSA, Totally NSSA External routes OSPF tuning: costs, bfd, gr, auth, vrrp, virt link BGP Overview: i/e bgp, as numbers Best path selection Configuration: route announcement Route filtering to prevent transit as IGMP Overview Querier Snooping Unknown multicasts Multicast Routing: PIM Overview PIM DM 802.1X Authentication Overview: roles, requirements, coa, accounting Dynamic port configuration: avp, acl, qos, VLAN Port-based vs. user-based: examples Radius service tracking, critical VLAN MAC Authentication Overview: Use cases Radius-based MAC Auth Dynamic Segmentation Leverage dynamic segmentation features Configure tunneled-node on AOS-CX switches Describe when and how to configure PAPI enhanced security, high availability, and fallback switching for tunneled-node Quality of Service Overview VoQ (Virtual Output Queue) QOS: queueing, QOS marks, dot1p, dscp Trust levels QOS configuration: port, VLAN, policies Interaction with user roles Queue configuration Rate limiters LLDP-MED Additional Routing Technologies VRF - Management VRF PBR MDNS PIM SM Capitve Portal Authentication Overview of guest solutions Built-in web auth ClearPass redirect with CPPM
Understand how to effectively manage conflict and learn that conflict can be healthy and need not damage relationships. Course overview Duration: 1 day (6.5 hours) Conflict and differences of opinion are inevitable in the today’s fast moving, complex business world, some would argue they are even necessary. This highly interactive and practical course addresses the many aspects of effectively managing conflict and will help you ensure that conflict can be healthy and need not damage the relationship. This workshop has been specifically designed to give you an opportunity to learn and test a range of influencing and conflict handling models and techniques. The course is aimed at anyone who interacts with others on a regular basis. Objectives By the end of the course you will be able to: Utilise influencing skills to pre-empt and defuse conflict Resolve conflict by choosing the right approach Recognise the impact of non-verbal communication in managing conflict Use language skills necessary to get you message across in the ‘right’ way Present your case in a reasonable and responsible manner Identify behaviours that can help or hinder interactions with others Apply different techniques for managing conflict positively and for dealing with aggression Content Developing Influence Networking Sources of influence Influencing techniques Effective Behaviour Choosing the right approach Techniques to pre-empt or defuse conflict Behavioural styles and their impact on working relationships Triggers to aggressive behaviour Managing conflict flash points Dealing with different behaviour types Developing Skills Communication skills in conflict situations Using the right language Verbal and non verbal communications Managing our body language Your conflict management style analysis Thomas Killman Conflict Handling Instrument Working in groups Practical exercises and case studies The language of mediation Transactional Analysis Practical Practical exercises Case studies Personal action planning