• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1472 Opera courses in Wetherby delivered Live Online

SA120 - Server Automation 10.x Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. Course Overview and Introduction to HP Server Automation ? Discuss the IT organization?s preference for automation ? Discuss the main features of HP SA ? Discuss the benefits of using SA ? Describe the distributed architecture of SA Exploring the Architecture and Interfaces ? Define an SA core ? Describe the functionality of each key component of SA ? Describe SA users ? Use the SA client to explore a managed server environment ? Describe the SA core architecture and key components ? Learn how to use the SA interfaces to explore the server environment Agent Functionality and Server Integration ? Differentiate the agent types ? Describe the SA agent functionality ? Specify the requirements for installing an SA agent onto an unmanaged server ? Install an agent onto an unmanaged server using the SA client and manual installation ? Troubleshoot agent installation and communication failures ? Explore the server inventory using the Device Explorer of the SA client ? Describe the Agent Tools feature within SA ? Integrate existing, unmanaged servers into the SA managed environment ? Summarize what server information is collected by the agent ? Explain the server module objects ? Explain agent extensions Provisioning Operating Systems (OS) Using OS Build Plans (OSBPs) ? Describe the Operating System (OS) provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Build Plan (OSBP) Dynamic Host Configuration Protocol (DHCP) Less or Static IP Provisioning ? Configure and run the Managed Boot Client(s) (MBC) ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) Managing Virtualization ? Describe the supported virtualization management features in SA ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 ? Identify the relationship between the hypervisor and its virtual servers ? Manage the lifecycle of VMware Virtual Machines (VMs) ? Manage the lifecycle of Solaris zones ? Integrate with VMware Virtual Center using Virtualization Service (VS) Exploring Device Groups ? Explain device groups and their characteristics ? Describe the different types of device groups supported in SA ? Create static and dynamic device groups using the SA client Exploring Device Groups with Search Results ? Describe the different types of search in the SA client ? Discuss the process to save and retrieve search results ? Create device groups from search results ? Develop sample reports using advanced search Managing Packages ? Describe how to manage packages in SA ? Discuss the supported package types ? Explain how to organize the software library ? Import and export packages into the software repository ? Install and uninstall packages ? Manage Red Hat Package Manager (RPM) packages Software Management ? Describe the use of policy-based software management in SA ? Describe how to manage software policies in SA ? List the software management setup tasks ? Install and uninstall software using software policies ? Manage software updates using software policies Working with Application Deployment Manager (ADM) ? Describe the Application Deployment Manager (ADM) and its functions ? Manage the ADM ? Set permissions for ADM ? Define an application, a target, and a component ? Deploy an application ? Manage an Application Deployment job ? Describe the rollback and undeploy process ? Import and export Application Deployment data from SA Application Configuration Management ? Describe how application configurations are managed in SA ? Describe application configuration components ? Control values using an application configuration inheritance model ? Push application configuration values to servers Managing Patches ? Describe the patch management feature in SA ? View patch information ? Describe UNIX patch management tasks ? Install patches using patch policies on the Windows platform ? Identify Microsoft patch administration tasks ? Manage patches on Red Hat LINUX Working with Audits, Snapshots, and Remediation ? Describe the audit and remediation feature in SA ? Create and run audits ? Configure file audit rules ? Set audit rule exceptions ? View audit results and remediate the differences ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits Enforcing Compliance ? Define server compliance concepts ? Describe the compliance management feature in SA ? Scan and view the compliance status of servers ? Remediate non-compliant servers Exploring Servers Using the Global Shell and Global File System ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment ? Describe how to navigate and filter data in the OGFS using the Global Shell ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server ? Use the SA remote terminal feature to access and manage servers in the managed environment Scripting with SA ? Describe the script management and execution feature in SA ? Create scripts using the SA client ? Execute ad hoc or saved scripts ? View and download script results ? Describe PowerShell integration with SA ? Explain the Extensible Discovery server module ? Introduce Automation Platform eXtensions (APX) scripting Exploring Reports in SA ? Explain SA reports ? List the reports available in SA ? Generate an SA report ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS Provisioning with OS Sequences ? Describe the OS Provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Sequence

SA120 - Server Automation 10.x Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting Hybrid Cloud Infrastructure with Anthos

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation

Architecting Hybrid Cloud Infrastructure with Anthos
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco SDWAN Fundamentals v2.0 (SDWFND)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Enterprise network system installers System integrators System administrators Network administrators Solutions designers Overview After taking this course, you should be able to: Identify the various network elements of the Cisco SD-WAN solution. Deploy WAN Edge routers. Create templates to aid in the deployment and operation of the Cisco SD-WAN network. Configure and verify Cisco SD-WAN overlay routing. Create simple policies to control traffic flow through the Cisco SD-WAN fabric. The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco© Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.The course will allow you to earn 16 Continuing Education (CE) credits toward recertification. Course Outline Cisco SD-WAN Solution Components Cisco SD-WAN Network Deployment Cisco SD-WAN Configuration Management Cisco SD-WAN Overlay Routing Cisco SD-WAN Policies

Cisco SDWAN Fundamentals v2.0 (SDWFND)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to MongoDB for Developers (TTDB4683)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This introductory-level course is for experienced application developers new to MongoDB. Overview This course is approximately 50% hands-on lab to lecture ratio, combining engaging expert lessons, demos and group discussions with real-world, skills-focused machine-based labs and exercises. Working in a hands-on learning environment, guided by our expert team, you'll explore: Storage Basics MongoDB Document Model MongoDB Setup CRUD: Basics through Advanced Concepts Performance: Basics through Advanced Concepts Aggregation: Basics through Advanced Concepts Replication: Basics through Advanced Concepts Sharding: Basics through Advanced Concepts Schema Design Security Basics, Authentication & Authorization Application Development and Drivers Geared for experienced developers, Introduction to MongoDB for Developers is a comprehensive course that provides you with hands-on experience with the MongoDB query language, aggregation framework, data modeling, indexes, drivers, basic performance tuning, high availability and scaling. Throughout the course, you?ll explore the MongoDB Atlas database environment in detail, gaining job-ready skills you can put right to work after class. Storage Basics What is a Storage Engine? WiredTiger Storage Engine In-Memory Storage Engine Encrypted Storage Engine MongoDB Document Model JSON and BSON MongoDB Data Types MongoDB Setup Atlas Setup / Local MongoDB Setup CRUD Basics Insert Command Find Command Query Operators Remove Command Updating Documents CRUD Advanced Bulk Writes Retryable Writes Find and Modify Transactions Performance Basics Indexes Aggregation Basics Aggregation Pipeline Concepts Aggregation Pipeline Stages Aggregation Pipeline Expressions Aggregation Advanced $lookup stage $graphLookup stage $expr operator Faceted Search Type Conversions Advanced Expression Operators Date Expression Operators Expression Variables Aggregation Pipeline Optimizations Aggregation in a Sharded Cluster Replication Basics MongoDB Replica Sets Replica Set Use Cases Replication Mechanics Replication Advanced Using Write Concern to Tune Durability Semantics Using Read Concern to Tune Read Isolation Using Read Preference Replica Set Tag Sets Sharding Basics Sharding Concepts When to Shard What is a Shard Key? Zoned Sharding / MongoDB Atlas Global Clusters Sharding Advanced Components of a Sharded Cluster Sharding Mechanics Choosing a Good Shard Key Schema Design Schema Design Core Concepts Common Patterns Security Basics Authentication & Authorization Network Encryption Encryption at Rest Auditing

Introduction to MongoDB for Developers (TTDB4683)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified CISO (C|CISO) w/exam

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. Governance Drivers that Influence Governance Corporate Governance Activities Information Security Governance Activities Governance and Ethical Decision Making Security Risk Management, Controls, and Audit Management Risk Management Audit Management Risk Treatment Risk Management Frameworks Risk Communication and Organizational Reporting Security Program Management and Operations Information Security Portfolio Management Information Security Program Management Information Security Project Management Security Operations Information Security Core Competencies Access Control Physical Security Network and Communications Security Threat and Vulnerability Management System and Application Security Encryption Concepts and Technology Strategic Planning, Financial Management, and Vendor Management Strategic Planning Financial Management Vendor Risk Management Additional course details: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified CISO (C|CISO) w/exam
Delivered OnlineFlexible Dates
Price on Enquiry

Attack Prevention with Juniper Networks Firewalls

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Concepts Review Configuration Review Lab: ScreenOS Basics Review Chapter 3: SCREEN Options Multilayer Network Protection Types of Attacks SCREEN Options Configuration SCREEN Best Practices Lab: SCREEN Options Configuration Chapter 4: Deep Inspection Deep Inspection Overview Attack Database Configuration Policy Configuration Logging and Monitoring Lab: Deep Inspection Configuration Chapter 5: Antivirus Antivirus Operations Antivirus Configuration?Kaspersky Antivirus Configuration?ICAP Verifying Operations Lab: Antivirus Configuration Chapter 6: Web Filtering Web-Filtering Options Web-Filtering Configuration Verifying Operations Lab: Configuring Web Filtering Chapter 7: Antispam Antispam Concepts Antispam Configuration Verifying Operations Lab: Antispam Configuration Additional course details: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Attack Prevention with Juniper Networks Firewalls
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Segment Routing on Cisco IOS XR (SEGRTE201)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Systems engineers Network engineers Field engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the key concepts of segment routing Implement and verify IGP segment routing Migrate an existing Multiprotocol Label Switching (MPLS) LDP-based network to segment routing Implement and verify TI-LFA segment routing Instantiate segment routing policies Instantiate multidomain segment routing policies Configure and verify BGP prefix segments and SR-based services The Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of Segment Routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement Topology-Independent Loop-Free Alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP). Introduction to Segment Routing Examining Unified Fabric Routing Exploring Segment Routing Concepts Examining Segment Types Examining the Segment Routing Global Block (SRGB) IGP Segment Routing Implementation and Verification Examining the IGP Control Plane Examining SRGB and IGP Interactions Examining Prefix and Adjacency SIDs Intermediate System to Intermediate System (IS-IS) Multilevel and Open Shortest Path First (OSPF) Multi-Area Configuring and Verifying IS-IS SR Operation Configuring and Verifying OSPF SR Operation Segment Routing and LDP Interworking SR and LDP Interworking Data Plane Mapping Server Function and Configuration Interworking Deployment Models Topology Independent ? Loop Free Alternate Examining Classic LFA Examining TI-LFA Fundamentals Implementing and Verifying TI-LFA for SR Traffic Implementing and Verifying SR TI-LFA for LDP Traffic TI-LFA and SR LDP Interworking Segment Routing Policies ? Traffic Engineering (SR-TE) Exploring SR Policies Introducing the Anycast and Binding SIDs Enabling and Verifying SR Policies Instantiating SR Policies Instantiating SR Policies using BGP Dynamic Multidomain SR Policies Configuring and Verifying a Path Computation Element (PCE) Configuring and Verifying BGP Link-State (LS) Configuring Multidomain SR Policies with a PCE Configuring Multidomain SR Policies with On Demand Next-Hop (ODN) Segment Routing?Based Services Examining the BGP Prefix-SID Operation Configuring and Verifying the BGP Prefix SID Examining Egress Peer Engineering Examining the BGP Prefix-SID Operation SR Flexible Algorithm and Performance Measurement (PM) Delay SR-Enabled VPNs

Cisco Implementing Segment Routing on Cisco IOS XR (SEGRTE201)
Delivered OnlineFlexible Dates
Price on Enquiry

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers Channel Partners System Engineers Overview By the end of this course, you will be able to: Describe how ONTAP 9 fits into NetApp?s Cloud and Data Fabric strategy Identify supported ONTAP platforms Define ONTAP cluster components Create a cluster Manage ONTAP administrators Configure and manage storage resources Configure and manage networking resources Describe a Storage Virtual Machine?s (SVM?s) role in NetApp?s storage architecture Create and configure an SVM Create and manage FlexVols Implement storage efficiency features Create protocol servers within an SVM Upgrade and revert ONTAP patches and releases Describe the levels on which ONTAP protects data Describe the ONTAP 9 data protection features Understand the various data mirroring relationships available with ONTAP 9 Configure and operate SnapMirror and SnapVault data replication Demonstrate Storage Virtual Machine data protection Explain the components and configuration involved with SyncMirror and MetroCluster Describe NDMP protocol operation, configuration and management Pre/Post Assessment The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager.Includes: ONTAP commands for software versions 8.3.x to 9.0 The ONTAP 9.0 Cluster Administration and Data Protection combo course uses lecture and hands-on exercises to teach basic administration and configuration of a cluster as well as the core backup and restore technologies found in ONTAP 9. The hands-on labs allow you to practice working with ONTAP features and manage your storage and network resources using the cluster shell and OnCommand System Manager. You will learn how to implement and manage SnapMirror, SnapVault, and SnapLock technology which are used to replicate and restore mission-critical data in the enterprise. The course also surveys real-world scenarios and use cases to teach you when to use each of the NetApp protection solutions. Backup and restore operations are taught using the command line and OnCommand System Manager. Includes: ONTAP commands for software versions 8.3.x to 9.0

NetApp ONTAP 9 Cluster Administration and Data Protection Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

JEX - Junos Enterprise Switching using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This two-day course provides students with intermediate switching knowledge and configuration examples using Junos Enhanced Layer 2 Software. Chapter 1: Course Introduction Course Introduction Chapter 2: Layer 2 Switching Ethernet Bridging Basics Terminology and Design Considerations Overview of Enterprise Switching Platforms Enabling and Monitoring Layer 2 Switching Operations Lab 1: Implementing Layer 2 Switching Chapter 3: Virtual Networks Overview of VLANs Configuring and Monitoring VLANs Voice VLAN Native VLAN Routed VLAN Interfaces Lab 2: Implementing Virtual Networks Chapter 4: Routing Instances Routing Instances Overview Configuring and Monitoring Virtual Switches Chapter 5: Spanning Tree Spanning Tree Protocol Rapid Spanning Tree Protocol Configuring and Monitoring STP and RSTP Protection Features: BPDU Protection Protection Features: Loop Protection Protection Features: Root Protection Lab 3: Implementing Spanning Tree Chapter 6: Port Security MAC Limiting Persistent MAC Learning DHCP Snooping Dynamic ARP Inspection (DAI) IP Source Guard Lab 4: Implementing Port Security Chapter 7: Device Security and Firewall Filters Storm Control Firewall Filters Lab 5: Implementing Storm Control and Firewall Filters Chapter 8: Virtual Chassis Overview of Virtual Chassis Configuring and Monitoring a Virtual Chassis Lab 6: Implementing a Virtual Chassis System Chapter 9: High Availability Features Overview of High Availability Networks Link Aggregation Groups Redundant Trunk Groups Graceful Routing Engine Switchover (GRES) Nonstop Active Routing (NSR) Nonstop Bridging (NSB) Lab 7: Implementing High Availability Features

JEX - Junos Enterprise Switching using Enhanced Layer 2 Software
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Discover Salesforce Fundamentals to Support Your Business (BSX101)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is ideal for business users - the people who need to learn what's possible with Salesforce functionality across the suite of products, but aren't necessarily responsible for managing the application. If you're a customer service manager, business executive, business operations manager, sales operations manager, or any other operations, management, or process analysis 'super user,' this class is just what you need to better understand the business value of the Salesforce Platform. Overview Describe the primary business value of each major Salesforce Cloud. Manage users and data. Manage basic org configuration. Create email templates. Create reports and dashboards. Apply and champion Chatter. Understand the Salesforce implementation and maintenance lifecycle. Extend Salesforce functionality beyond basic configuration. Explore what?s possible with Salesforce. In this 3-day class, our Salesforce experts will walk you through the Salesforce Platform, its specific applications, and their business values and benefits. Familiarize yourself with Salesforce Cloud, and learn about platform features and processes to more effectively support day-to-day Salesforce operations within your organization. Through interactive lectures, discussions, and hands-on exercises, you?ll recognize the core elements of the implementation lifecycle, the key considerations to drive user adoption, and the important components of ongoing management of your Salesforce environment. Introduction Understand How Salesforce Works Explore Salesforce Applications Review Salesforce Organization Data Access and Security Control Org Access Manage Who Views and Modifies Objects Unlock Access to Records Share Access to Records Lock Down Individual Fields User Management and Troubleshooting Create New Users Troubleshoot Login, Record Access, and Field Visibility Issues Salesforce Customizations Think About Your Implementation Explore Custom Fields, Picklists, Page Layouts, and Record Types Create Email Templates Business Processes Automation Review Validation Rules Review Assignment and Escalation Rules Review Web-to-Lead and Entitlements Review Lightning Process Builder and Workflow Review Approval Processes and Visual Workflow Reports Explore the Reports Tab, Folders, and Formats Explore the Report Builder Summarize Your Data Dashboards and Data Insights Get More Insight from Your Data Visualize Your Data with Dashboards Create Your Analytics Strategy Everyday Salesforce Collaborate with Chatter, Groups, and Communities Share Feedback with Chatter Answers and Ideas Go Mobile with Salesforce1 Make Salesforce Part of Your Day Data Management Create a Data Migration Strategy Ensure Data Quality Extending Salesforce Drive a Salesforce Implementation Customize Salesforce Using Custom Objects, Apps, and the Salesforce AppExchange Build It Yourself Wrap-up and Certification Review the Certification Process and Resources

Salesforce Discover Salesforce Fundamentals to Support Your Business (BSX101)
Delivered OnlineFlexible Dates
Price on Enquiry