Duration 2 Days 12 CPD hours This course is intended for Storage and virtual infrastructure administrators who want to be able to perform initial troubleshooting on their software-defined storage with vSAN Overview By the end of the course, you should be able to meet the following objectives: Describe the software components of vSAN and their roles Diagram how the components relate to each other Use Skyline Health to investigate and help determine failure conditions Use the command-line tools to help determine failure conditions In this two-day course, you focus on learning the tools and skills necessary to troubleshoot VMware vSAN? 7 implementations. You gain practical experience with vSAN troubleshooting concepts through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives vSAN Architecture Describe the vSAN architecture and components Describe the policy-driven, object-based vSAN storage environment Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Explain the relationships between the vSAN software components Explain the relationship between objects and components Determine how specific storage policies affect components Describe component placement Troubleshooting Methodology Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Troubleshooting Tools Discuss the improvements and added capabilities in Skyline Health for vSAN Use Skyline Health for vSAN to identify and correct issues in vSAN Discuss the ways to run various command-line tools Discuss the ways to access VMware vSphere© ESXi? Shell Use commands to view, configure, and manage your vSphere environment Discuss the esxcli vsan namespace commands Discuss when to use Ruby vSphere Console (RVC) commands Explain which log files are useful for vSAN troubleshooting Use log files to help troubleshoot vSAN problems
Duration 1 Days 6 CPD hours This course is intended for Experienced system administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Explain and configure Local Load Balancing constructors such as Virtual Services, Pools, Health Monitors and related components During this one-day course, you gain an understanding of the architecture and features of VMware NSX Advanced Load Balancer (Avi Networks) solution. This course provides hands-on labs to provide a solid foundation to load balancing fundamentals and work with most common load balancing functionality offered by VMware NSX Advanced Load Balancer (Avi Networks) solution. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups
Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Test Engineering course is anyone involved in defining a DevOps Testing strategy, such as: Delivery Staff DevOps Engineers IT Managers Project Managers Lab Staff Maintenance and Support Staff Quality Assurance Managers Quality Assurance Teams Release Managers Testers Software Engineers Overview The learning objectives for DTE include a practical understanding of: The purpose, benefits, concepts and vocabulary of DevOps testing How DevOps testing differs from other types of testing DevOps testing strategies, test management and results analysis Strategies for selecting test tools and implementing test automation Integration of DevOps testing into Continuous Integration and Continuous Delivery workflows How DevOps testers fit with a DevOps culture, organization and roles This comprehensive course addresses testing in a DevOps environment and covers concepts such as the active use of test automation, testing earlier in the development cycle, and instilling testing skills in developers, quality assurance, security, and operational teams. The course is relevant for every modern IT professional involved in defining or deploying a DevOps testing strategy for their organization, as test engineering is the backbone of DevOps and the primary key for successful DevOps pipeline to support digital transformation. This course prepares you for the Continuous Testing Foundation(CTF) certification. Course Objectives and Modules, Logistics What is DevOps Testing and its Business Benefits?Relation of DevOps Testing in other Test MethodologiesDevOps Testing Best Practices DevOps Testing Terminology Culture changes Organization changes Process and team friction Motivation strategies Measuring Success Continuous Evolution Troubleshooting What is the DevOps pipeline? DevOps Testing on the pipeline Test strategy choices Pre-Flight strategies Continuous Integration Testing System, Delivery and Customer Testing Test Environments Lab Management Topology orchestration Test Automation Frameworks Test Tools Selection criterion Automated metrics Key concepts Test Case Best Practices & Design Exercise Test Suite Best Practices & Design Exercise Principles of DevOps Management DevOps Test Management Metrics DevOps Management Tools DevOps Test Results Analysis Integrating DevOps Results Analysis Test Management Exercise Fictitious Product Test Requirements Individual Exercise Class discussion Exam Preparation
Duration 4 Days 24 CPD hours This course is intended for Anyone who is preparing to build and run Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Build, test, and publish Docker container images Become familiar with YAML files that define Kubernetes objects Understand Kubernetes core user-facing concepts, including pods, services, and deployments Use kubectl, the Kubernetes CLI, and become familiar with its commands and options Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet) Learn how to troubleshoot issues with deployments on Kubernetes Apply resource requests, limits, and probes to deployments Manage dynamic application configuration using ConfigMaps and Secrets Deploy other workloads, including DaemonSets, Jobs, and CronJobs Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes. Course Introduction Introductions and objectives Containers What and Why containers Building images Running containers Registry and image management Kubernetes Overview Kubernetes project Plugin interfaces Building Kubernetes Kubectl CLI Beyond Kubernetes Basics Kubernetes objects YAML Pods, replicas, and deployments Services Deployment management Rolling updates Controlling deployments Pod and container configurations Kubernetes Networking Networking within a pod Pod-to-Pod Networking Services to Pods ClusterIP, NodePort, and LoadBalancer Ingress controllers Service Discovery via DNS Stateful Applications in Kubernetes Stateless versus Stateful Volumes Persistent volumes claims StorageClasses StatefulSets Additional Kubernetes Considerations Dynamic configuration ConfigMaps Secrets Jobs, CronJobs Security Network policy Applying a NetworkPolicy SecurityContext runAsUser/Group Service accounts Role-based access control Logging and Monitoring Logging for various objects Sidecar logging Node logging Audit logging Monitoring architecture Monitoring solutions Octant VMware vRealize Operations Manager Cluster Operations Onboarding new applications Backups Upgrading Drain and cordon commands Impact of an upgrade to running applications Troubleshooting commands VMware Tanzu portfolio overview
Duration 2 Days 12 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: List the use cases for vRealize Suite Lifecycle Manager Describe the architecture of vRealize Suite Lifecycle Manager Deploy and configure vRealize Suite Lifecycle Manager Create, manage, and scale vRealize Suite Lifecycle Manager environments Add VMware vRealize Suite products to vRealize Suite Lifecycle Manager Manage vRealize Suite products with vRealize Suite Lifecycle Manager Use vRealize Suite Lifecycle Manager to perform content lifecycle management Troubleshoot day-to-day operations of vRealize Suite Lifecycle Manager This two-day course features hands-on training that focuses on installing, configuring, and managing VMware vRealize© Suite Lifecycle Manager?, which includes products such as VMware vRealize© Operations?, VMware vRealize© Log Insight?, and VMware vRealize© Automation?. This course prepares you to administer a vRealize infrastructure for an organization. Course Introduction Introductions and course logistics Course objectives Introduction to Lifecycle Manager Describe the use cases for Lifecycle Manager List the features of Lifecycle Manager List system requirements for Lifecycle Manager Use vRealize Easy Installer to deploy Lifecycle Manager Verify that a Lifecycle Manager deployment is successful Lifecycle Manager Configuration Create SSL certificates for vRealize Suite product instances Import custom SSL certificates Add Lifecycle Manager infrastructure elements Create a Lifecycle Manager private cloud environment Add vRealize Suite product Installation media Adding vRealize Suite Applications Deploy a new vRealize Suite product Manage a vRealize Suite product using Lifecycle Manager Add an existing vRealize Suite product to an environment Day 2 Operations Perform On-going Management Tasks Monitor environment health Ensure product configuration compliance Scale-out VMware Identity Manager? Replace an existing certificate with a new one Manage SDDC content Perform source control Describe content pipelines Describe check-in and multi check-in feature Use content from Marketplace Lifecycle Manager Migration List the migration options available for Lifecycle Manager Migrate Lifecycle Manager using vRealize Easy Installer Troubleshooting Lifecycle Manager Access log files in Lifecycle Manager Configure the vRealize Log Insight Agent Use tools and log data to troubleshoot common problems
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. Introduction to ISO 45001 and initiation of an OH&S MS implementation Training course objectives and structure Standards and regulatory frameworks Fundamental concepts and principles of OH&S Initiation of the OH&S MS implementation The organization and its context Implementation plan of an OH&S MS Leadership and worker participation OH&S MS scope OH&S policy and objectives Hazard identification and assessment of risks and opportunities Implementation of an OH&S MS Resource management Awareness and communication Documented information management Operations management Emergency preparedness and response OH&S MS performance evaluation, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit Management review Treatment of nonconformities and incidents Continual improvement Preparation for the certification audit Closing of the training course
Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Project managers and consultants involved in business continuity Expert advisors seeking to master the implementation of the business continuity management system Individuals responsible to maintain conformity with BCMS requirements within an organization Members of the BCMS team Overview Understand the concepts, approaches, methods, and techniques used for the implementation and effective management of a BCMS. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. Understand the operation of the business continuity management system and its processes based on ISO 22301. Learn how to interpret and implement the requirements of ISO 22301 in the specific context of an organization. No two disasters in the world cause equal damage. Between the unpredictability of natural disasters, information security breaches, and incidents of different nature, preparedness can make you stand out in the crowd and predict the future of your business. In light of this, proper planning is essential to mitigating risks, avoiding consequences, coping with the negative effects of disasters and incidents, but at the same time, continuing your daily operations so that customer needs do not remain unfulfilled.This training course will prepare its participants to implement a business continuity management system (BCMS) in compliance with the requirements of ISO 22301. Attending this training course allows you to gain a comprehensive understanding of the best practices of the business continuity management system and to be able to establish a framework that allows the organization to continue operating efficiently during disruptive events Introduction to ISO 22301 and initiation of a BCMS Training course objectives and structure Standards and regulatory frameworks Business continuity management system (BCMS) Fundamental business continuity concepts and principles Initiation of the BCMS implementation Understanding the organization and its context BCMS scope Implementation plan of a BCMS Leadership and commitment Business continuity policy Risks, opportunities, and business continuity objectives Support for the BCMS Business impact analysis Risk assessment Implementation of a BCMS Business continuity strategies and solutions Business continuity plans and procedures Incident response and emergency response Crisis management Exercise programs Monitoring, measurement, analysis, and evaluation Internal audit BCMS monitoring, continual improvement, and preparation for the certification audi Management review Treatment of nonconformities Continual improvement Preparation for the certification audit Closing of the training course
Duration 2 Days 12 CPD hours This course is intended for This course is a must-have for the Business Analyst, Business Systems Analyst, Systems Analyst, and Requirements Engineer. The Business Sponsor and the Project Manager who are actively involved with specifying requirements for their project will also benefit from this workshop. Overview Describe the planning, techniques, and partnerships that are vital to the success of requirements elicitationIdentify and differentiate between the different types of requirements that need to be elicitedDescribe the importance of documenting business objectives and project scope before eliciting requirementsUtilize a context diagram to scope the requirementsUtilize a process, techniques, and templates for stakeholder identification and analysisApply industry best practices to common issues with Stakeholders during requirements elicitationPlan and conduct a good InterviewIntroduce standards in process modelingPlan and develop a prototype to elicit requirements In this interactive 2-day course, you will learn how to enhance and refine your elicitation skills. Working in small groups, you will practice new techniques and discuss strategies that your organization should be using to better define stakeholder needs. Day 1 Unit 1: Course Introduction Unit 2: Fundamentals of Requirements Elicitation Unit 3: Understanding the Project Objectives and Scope Unit 4: Identifying and Analyzing Your Stakeholders Unit 5: Interviewing Techniques Day 2 Unit 6: Facilitation Techniques Unit 7: Process Modeling Unit 8: Prototyping Unit 9: Document Analysis, Interface analysis, and Reverse Engineering Unit 10: Course Summary Additional course details: Nexus Humans BA26 - Requirements Elicitation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA26 - Requirements Elicitation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with VMware Workspace ONE© UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Course Introduction Introductions and course logistics Course objectives Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Audit and Remediation Identify the architecture and data flows for Carbon Black Cloud Audit and Remediation communication Describe the use case and functionality of recommended queries Achieve a basic knowledge of SQL Describe the elements of a SQL query Evaluate the filtering options for queries Perform basic SQL queries on endpoints Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Audit and Remediation? product to build queries for IT hygiene, incident response, and vulnerability assessment to support your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Query Basics Osquery Available tables Query scope Running versus scheduling Recommended Queries Use cases Inspecting the SQL query SQL Basics Components Tables Select statements Where clause Creating basic queries Filtering Results Where clause Exporting and filtering Basic SQL Queries Query creation Running queries Viewing results Advanced Search Capabilities Advanced SQL options Threat hunting Response Capabilities Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Audit and Remediation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Audit and Remediation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.