Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and system integrators Consultants responsible for designing, implementing, and customizing vRealize Operations Overview By the end of the course, you should be able to meet the following objectives: List the vRealize Operations use cases Identify features and benefits of vRealize Operations Determine the vRealize Operations cluster that meets your monitoring requirements Deploy and configure a vRealize Operations cluster Use interface features to assess and troubleshoot operational problems Describe vRealize Operations certificates Create policies to meet the operational needs of your environment Recognize effective ways to optimize performance, capacity, and cost in data centers Troubleshoot and manage problems using workbench, alerts, and predefined dashboards Manage configurations Configure application monitoring using VMware vRealize Operations Cloud Appliance⢠Create custom symptoms and alert definitions, reports, and views Create various custom dashboards using the dashboard creation canvas Configure widgets and widget interactions for dashboards Create super metrics Set up users and user groups for controlled access to your environment Extend the capabilities of vRealize Operations by adding management packs and configuring solutions Monitor the health of the vRealize Operations cluster by using self-monitoring dashboards This course provides you with the knowledge and skills to deploy a VMware vRealize Operations cluster that meets the monitoring requirements of your environment.This course includes advanced capabilities such as customizing alerts, views, reports, and dashboards and explains the deployment and architecture in vRealize Operations. This course explains application monitoring, certificates, policies, capacity and cost concepts, and workload optimization with real-world use cases. This course covers troubleshooting using the workbench, alerts, and predefined dashboards, and how to manage compliance and configurations. This course also covers several management packs. Course Introduction Introduction and course logistics Course objectives Introduction to vRealize Operations List the vRealize Operations use cases Access the vRealize Operations User Interface (UI) vRealize Operations Architecture Identify the functions of components in a vRealize Operations node Identify the types of nodes and their role in a vRealize Operations cluster Outline how high availability is achieved in vRealize Operations List the components required to enable Continuous Availability (CA) Deploying vRealize Operations Design and size a vRealize Operations cluster Deploy a vRealize Operations node Install a vRealize Operations instance Describe different vRealize Operations deployment scenarios vRealize Operations Concepts Identify product UI components Create and use tags to group objects Use a custom group to group objects vRealize Operations Policies and Certificate Management Describe vRealize Operations certificates Create policies for various types of workloads Explain how policy inheritance works Capacity Optimization Define capacity planning terms Explain capacity planning models Assess the overall capacity of a data center and identify optimization recommendations What-If Scenarios and Costing in vRealize Operations Run what-if scenarios for adding workloads to a data center Discuss the types of cost drivers in vRealize Operations Assess the cost of your data center inventory Performance Optimization Introduction to performance optimization Define the business and operational intentions for a data center Automate the process of optimizing and balancing workloads in data centers Report the results of optimization potential Troubleshooting and Managing Configurations Describe the troubleshooting workbench Recognize how to troubleshoot problems by monitoring alerts Use step-by-step workflows to troubleshoot different vSphere objects Assess your environment?s compliance to standards View the configurations of vSphere objects in your environment Operating System and Application Monitoring Describe native service discovery and application monitoring features Configure application monitoring Monitor operating systems and applications by using VMware vRealize© Operations Cloud Appliance? Custom Alerts Create symptom definitions Create recommendations, actions, and notifications Create alert definitions that monitor resource demand in hosts and VMs Build and use custom views in your environment Custom Views and Reports Build and use custom views in your environment Create custom reports for presenting data about your environment Custom Dashboards Create dashboards that use predefined and custom widgets Configure widgets to interact with other widgets and other dashboards Configure the Scoreboard widget to use a metric configuration file Manage dashboards by grouping dashboards and sharing dashboards with users Super Metrics Recognize different types of super metrics Create super metrics and associate them with objects Enable super metrics in policies User Access Control Recognize how users are authorized to access objects Determine privilege priorities when a user has multiple privileges Import users and user groups from an LDAP source Extending and managing a vRealize Operations Deployment Identify available management packs in the VMware Marketplace? Monitor the health of a vRealize Operations cluster Generate a support bundle View vRealize Operations logs and audit reports Perform vRealize Operations cluster management tasks Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vRealize Operations: Install, Configure, Manage [V8.6] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vRealize Operations: Install, Configure, Manage [V8.6] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Want to know the secrets to network hacking? Do you dream of becoming the ultimate script kiddie? If you want to become an ethical hacker, this advanced computer hacking course will teach you how to break into computer systems and networks to gain access to Wi-Fi passwords and much more. This network hacking course will train you how to identify and exploit weaknesses in computer systems and networks, helping you to outsmart computer security and gain unauthorized access to a computer's system. You'll learn essential password cracking techniques and how to create Trojan horse viruses and other malicious codes. You'll also familiarise with hacking operating systems and different types of attacks. Additionally, you'll be trained on how to run attacks on HTTPS websites and write your own Python scripts to implement custom MITM attacks. This advanced network hacking course is ideal for students who are already familiar with the basics of network hacking. Topics include captive portals, WEP cracking, WPA/WPA2 cracking, evil twin attacks and post-connection attacks, What you'll learn Learn how to write custom scripts to gather important hacking information Discover the secrets of how to unlock WPS on routers, even if they're locked Understand how wireless phishing works and how to create fake captive portals Uncover the names of hidden networks and discover how to connect to them Learn how to replace downloaded files from a network with trojans Discover how to create trojans and combine any file in any format with an evil file Familiarise with common types of cybersecurity attacks and hacking techniques Understand how to exploit the WPS feature and hack Wi-Fi passwords Requirements Computer with a minimum of 4GB ram/memory Operating System: Windows / OS X / Linux Finished the networks section of my general ethical hacking course OR Finished my network hacking course. For the wifi cracking ONLY - Wireless adapter that supports monitor mode (more info provided in the course). Who this course is for: People who want to take their network hacking skills to the next level. People who want to have a better understanding of the subject and enhance their skills. People who want to be able to run attacks manually & write their own MITM scripts. Introduction Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam FREE 00:07:00 Course Overview FREE 00:05:00 Back To Basics/Pre-Connection Attacks Pre-connection Attacks Overview 00:02:00 Spoofing Mac Address Manually 00:03:00 Targeting 5 GHz Networks 00:07:00 Deauthenticating a Client From Protected WiFi Networks 00:07:00 Deauthenticating Multiple Clients From Protected WiFi Networks 00:08:00 Deauthenticating All Clients From Protected WiFi Network 00:06:00 Gaining Access Gaining Access Overview 00:02:00 Discovering Names of Hidden Networks 00:08:00 Connecting To Hidden Networks 00:05:00 Bypassing Mac Filtering (Blacklists & Whitelists) 00:09:00 Cracking SKA WEP Network 00:09:00 Securing Systems From The Above Attacks 00:03:00 Gaining Access - Captive Portals Sniffing Captive Portal Login Information In Monitor Mode 00:10:00 Sniffing Captive Portal Login Information Using ARP Spoofing 00:09:00 Creating a Fake Captive Portal - Introduction 00:04:00 Creating Login Page - Cloning a Login Page 00:07:00 Creating Login Page - Fixing Relative Links 00:07:00 Creating Login Page - Adding Form Tag 00:08:00 Creating Login Page - Adding Submit Button 00:07:00 Preparing Computer To Run Fake Captive Portal 00:08:00 Starting The Fake Captive Portal 00:12:00 Redirecting Requests To Captive Portal Login Page 00:12:00 Generating Fake SSL Certificate 00:06:00 Enabling SSL/HTTPS On Webserver 00:08:00 Sniffing & Analysing Login Credentials 00:06:00 Gaining Access - WPA/WPA2 Cracking - Exploiting WPS Exploiting WPS - Introduction 00:02:00 Bypassing 'Failed to associate' Issue 00:08:00 Bypassing 0x3 and 0x4 Errors 00:08:00 WPS Lock - What Is It & How To Bypass It 00:07:00 Unlocking WPS 00:09:00 Gaining Access - WPA/WPA2 Cracking - Advanced Wordlist Attack Advanced Wordlist Attacks - Introduction 00:02:00 Saving Aircrack-ng Cracking Progress 00:10:00 Using Huge Wordlists With Aircrack-ng Without Wasting Storage 00:08:00 Saving Cracking Progress When Using Huge Wordlists Without Wasting Storage 00:10:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 1 00:07:00 Cracking WPA/WPA2 Much Faster Using GPU - Part 2 00:11:00 Gaining Access - WPA/WPA Cracking - Evil Twin Attack What is It & How it Works 00:07:00 Installing Needed Software 00:08:00 Stealing WPA/WPA2 Key Using Evil Twin Attack Without Guessing 00:10:00 Debugging & Fixing Login Interface 00:12:00 Gaining Access - WPA/WPA2 Cracking - WPA/WPA2 Enterprise What is WPA/WPA2 Enterprise & How it Works 00:05:00 How To Hack WPA/WPA2 Enterprise 00:07:00 Stealing Login Credentials 00:08:00 Cracking Login Credentials 00:07:00 Securing Systems From The Above Gaining Access Attacks 00:05:00 Post Connection Attacks Post Connection Attacks Overview 00:04:00 Ettercap - Basic Overview 00:07:00 Ettercap - ARP Spoofing & Sniffing Sensitive Data Such As Usernames & Passwords 00:10:00 Setting Up SSLstrip Manually To Bypass HTTPS & Sniff Data From HTTPS Websites 00:13:00 Automatically ARP Poisoning New Clients 00:07:00 DNS Spoofing Using Ettercap 00:06:00 Bypassing Router-Side Security & Poisoning Target Without Triggering Alarms 00:09:00 Post Connection Attacks - Analysing Data Flows & Running Custom Attacks MITMproxy - What is It & How To Install It 00:04:00 Using MITMproxy In Explicit Mode 00:07:00 Analysing (Filtering & Highlighting) Flows 00:05:00 Intercepting Network Flows 00:05:00 Modifying Responses & Injecting Javascript Manually 00:09:00 Intercepting & Modifying Responses In Transparent Mode 00:08:00 Editing Responses & Injecting BeEF's Code On The Fly 00:09:00 Editing Responses Automatically Based On Regex 00:09:00 Stealing Login Info Using Fake Login Promo 00:07:00 [Bonus] - Hacking Windows 10 Using A Fake Update 00:05:00 Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks What Do Mean By MITM Scripts? 00:06:00 Capturing & Printing Requests/Responses 00:09:00 Filtering Flows & Extracting Useful Data 00:09:00 Using Conditions To Execute Code On Useful Flows 00:10:00 Generating Custom HTTP Responses 00:09:00 Testing Script Locally 00:09:00 Generating Trojans - Installing The Trojan Factory 00:06:00 Generating Trojans - Converting Any File (eg: mage) To a Trojan 00:10:00 Testing Script On Remote Computer To Replace Downloads With a Generic Trojan 00:07:00 Executing Bash Commands & Calling Trojan Factory From Our Script 00:09:00 Using Variables & More Complex Conditions 00:09:00 Converting Downloads To Trojans On The Fly 00:10:00 Configuring The Trojan Factory's MITMproxy Script 00:08:00 Using The Trojan Factory MITMproxy Script 00:08:00 Post-Connection Attacks - Doing All Of The Above On HTTPS Websites Bypassing HTTPS With MITMproxy 00:06:00 Replacing Downloads From HTTPS 00:05:00 Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites 00:06:00 Securing Systems From The Above Post Connection Attacks 00:06:00
Register on the Python Programming - Level 4 today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Python Programming - Level 4 is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Python Programming - Level 4 Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Python Programming - Level 4, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Unit 01: Introduction to Python Programming Module 01: Course Introduction 00:02:00 Unit 02: Getting Started with Python Module 01: Software Installation 00:02:00 Module 02: Hello World Program 00:06:00 Module 03: Input and Output 00:07:00 Module 04: Calculating Average of 5 Numbers 00:03:00 Unit 03: Conditional Branching with Python Module 01: If Loop In Python 00:06:00 Module 02: Program Using If Else part 1 00:03:00 Module 03: Program Using If Else part 2 00:08:00 Module 04: Program for Calculator 00:02:00 Module 05: Program Using For Loop 00:08:00 Module 06: For Table 00:05:00 Module 07: For loop and Mathematical Operator in Python 00:04:00 Module 08: Factorial of Number Using Python 00:06:00 Module 09: Program Using While 00:05:00 Module 10: While Loop Example 00:07:00 Module 11: Tasks for Practice 00:02:00 Unit 04: Importing external/internal library in python Module 01: Importing Library in Python 00:07:00 Unit 05: Project Rock Paper and Scissors Module 01: Rock Paper and Scissor Game 00:06:00 Unit 06: Strings Operation in Python Module 01: Program Using String part 1 00:05:00 Module 02: Program using String 2 00:06:00 Module 03: Program Using String 3 00:06:00 Module 04: Program Using String part 4 00:03:00 Unit 07: Date and time in Python Module 01: Use of Date and Time part 1 00:05:00 Module 02: Use of Date and Time part 2 00:05:00 Unit 08: File Handling, read and write using Python Module 01: File Handling Part 1 00:08:00 Module 02: File Handling Part 2 00:07:00 Unit 09: Data Storage Structures, Tuple, List and Dictionary Module 01: Tuple in Python Part 1 00:10:00 Module 02: Tuple in Python Part 2 00:07:00 Module 03: Using Lists part 1 00:07:00 Module 04: Using List part 2 00:12:00 Module 05: Using Lists part 3 00:06:00 Module 06: Using Lists part 4 00:08:00 Module 07: Using Lists part 5 00:02:00 Module 08: Use of Dictionary Part 1 00:04:00 Module 09: Use of Dictionary Part 2 00:05:00 Module 10: Use of Dictionary Part 3 00:08:00 Module 11: Use of Dictionary Part 4 00:07:00 Unit 10: Writing user functions in Python Module 01: Function in Python Part 1 00:06:00 Module 02: Function in Python Part 2 00:05:00 Module 03: Function in Python Part 3 00:04:00 Module 04: Function in Python Part 4 00:07:00 Module 05: Function in Python Part 5 00:08:00 Unit 11: Sending mail Module 01: Send Email 00:09:00 Unit 12: Import Tricks in Python Module 01: Import Study part 1 00:07:00 Module 02: Import Study part 2 00:03:00 Unit 13: Import Operating System and Platform Module 01: Importing OS 00:06:00 Module 02: Import Platform 00:05:00 Unit 14: Exceptions handling in python Module 01: Exception in Python part 1 00:11:00 Module 02: Exception in Python part 2 00:07:00 Module 03: Exception in Python part 3 00:05:00 Unit 15: Installing Packages and Scheduling In Python Module 01: Installing Packages using built in package manager 00:08:00 Module 02: Scheduler in Python 00:05:00 Unit 16: Data Base In Python using sqlite Module 01: Data Base 1 00:08:00 Module 02: Data Base 2 00:09:00 Module 03: Data Base 3 00:08:00 Module 04: Data base 4 00:07:00 Module 05: Data Base 5 00:06:00 Unit 17: Running Program from Command Prompt and jupyter Notebook Module 01: IDE_1 00:05:00 Module 02: IDE_2 00:07:00 Unit 18: Conclusion Module 01: Conclusion 00:02:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
Master the art of architectural drawing with this compact course. From floor plans to furniture placement, hatching to text insertion, learn essential skills for creating professional architectural drawings. Suitable for aspiring architects, designers, and drafters, this course empowers you to create stunning architectural designs with confidence and precision.
Duration 5 Days 30 CPD hours This course is intended for Horizon Cloud Service on Microsoft Azure administrators, system integrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants. Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of Horizon Cloud Service on Microsoft Azure Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Discuss Horizon Cloud Service on Microsoft Azure networking concepts Discuss Horizon Cloud Service on Microsoft Azure AD requirements and integration best practices Determine steps and requirements to deploy or upgrade Horizon Cloud Service on Microsoft Azure Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits List the steps and considerations to take when setting up a primary VM to be used as an assignable image Identify how to access desktops and application from Horizon Cloud Service on Microsoft Azure Discuss and create Remote Desktop Session Host Farms Explain power management options in the RDSH farm Create VDI desktop assignments and entitlements Manage assignable images on Horizon Cloud Service on Microsoft Azure Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure Describe the integration of Dynamic Environment Manger with Horizon Cloud Service on Microsoft Azure Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler Discuss the usage of App Volumes for Horizon Cloud Service on Microsoft Azure Discuss the integration of Workspace ONE Access with Horizon Cloud Service on Microsoft Azure Interpret scalability considerations for Horizon Cloud Service on Microsoft Azure Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod's environment Apply troubleshooting techniques relevant to Horizon Cloud Service and Microsoft Azure Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure This five-day, hands-on training provides you with the knowledge, skills, and abilities to achieve competence in deploying and managing VMware Horizon© Cloud Service? on Microsoft Azure. This training increases your skills and competence in using the VMware Horizon© Cloud Administration Console and Microsoft Azure portal.Through a combination of hands-on labs and interactive lectures, you learn how to import and manage images for VDI and RDSH assignments. You also learn how to configure and use the Universal Broker function, VMware App Volumes?, Workspace ONE Access and VMware Dynamic Environment Manager? in the Horizon Cloud Service on Microsoft Azure deployment. Course Introduction Introduction and course logistics Course objectives Introduction to Horizon Cloud Service on Microsoft Azure Identify Horizon Cloud Service on Microsoft Azure features, benefits, and licensing options Interpret Horizon Cloud Service on Microsoft Azure architecture components to identify configuration prerequisite Interpret Horizon Cloud Service on Microsoft Azure deployment models Discuss the initial Microsoft Azure configurations required for the Horizon Cloud Service on Microsoft Azure deployment Microsoft Azure Networking Requirements Summarize Horizon Cloud connectivity considerations and tasks Discuss Horizon Cloud on Microsoft Azure networking concepts Identify ports required for local connections, remote connections, and endpoint operating system firewall rules Active Directory List the features and limitations of supported AD configurations Discuss Horizon Cloud Service on Microsoft Azure AD integration best practices Determine Horizon Cloud Service on Microsoft Azure AD requirements Deployment and Upgrades Determine steps and requirements to deploy Horizon Cloud Service on Microsoft Azure Discuss the features and benefits of using multiple tenant subnets for desktops and RDSH Discuss the features and benefits of using Internal and External UAG Recognize Horizon Cloud Service console controls that are available for administrators Identify Horizon Cloud upgrade features and benefits Creating Images Outline the process and choices to set up primary VMs Identify the configuration choices for importing primary VMs List steps to install the user software on the primary VM Identify steps to convert a configured primary VM to an assignable image Access Desktops and Applications Use Horizon Client to access desktops and remote applications Compare the remote display protocols that are available for Horizon Cloud Remote Desktop Session Host Farms List the steps and considerations to take when creating an RDSH farm List the actions that can be performed on farms listed on the console?s Farms page List the actions to assign an application to a user or group List the prerequisites and steps to create an RDSH session assignment VDI Desktops Compare a dedicated assignment to floating assignment Outline steps to create a VDI desktop assignment Explain the entitlement of desktops Managing Assignable Images Describe and manage assignable images Describe and Use Image management service for Horizon Cloud Service on Microsoft Azure VMware Dynamic Environment Manager Identify the VMware Dynamic Environment Manager functional areas and their benefits Prepare an infrastructure for VMware Dynamic Environment Manager Outline the steps that are required to install and configure Dynamic Environment Manager components Manage user personalization and application configurations using the Dynamic Environment Manager management console and application profiler App Volumes for Horizon Cloud Service on Microsoft Azure Explain how App Volumes works with Horizon Cloud Service on Microsoft Azure Identify the features and benefits of App Volumes in Horizon Cloud Service on Microsoft Azure Identify the interface elements of App Volumes in Horizon Cloud Service on Microsoft Azure Install and configure App Volumes in Horizon Cloud Service on Microsoft Azure Workspace ONE Access Describe the benefits of integrating VMware Horizon Cloud service with Workspace ONE Access. Describe how a user obtains access to an entitled virtual desktop or application from the Intelligent Hub catalog. Describe the importance of binding directory with Workspace ONE Access and setting up custom user attribute synchronization. Describe the importance of configuring the Remote App Access Client in Workspace ONE Access. Summarize the steps of configuring the Access settings in Horizon Cloud control panel. Access an entitled Horizon virtual desktop or application in the Intelligent Hub catalog. Scalability Considerations Discuss the Horizon Cloud Service on Microsoft Azure scalability cost and settings Describe the usage of Universal Broker in Horizon Cloud Service on Microsoft Azure Horizon Cloud Connector Describe the features and benefits of Horizon Cloud Connector List the prerequisites and requirements to connect a Horizon pod with Horizon Cloud Connector Determine the process of deploying, configuring, and paring Horizon Cloud Connector into your pod?s environment Troubleshooting Horizon Cloud Service on Microsoft Azure Discuss Horizon Cloud Service on Microsoft Azure troubleshooting basics Discuss Horizon Cloud Service troubleshooting basics Summarize the analytics and monitoring capabilities in Horizon Cloud Service on Microsoft Azure
Register on the CompTIA A+ (220-1002) today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CompTIA A+ (220-1002) is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CompTIA A+ (220-1002) Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CompTIA A+ (220-1002), all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: All About the CompTIA A+ 2019 Core 2 Exam CompTIA A+ 2019 Core 2 (220-1002) Course Introduction 00:02:00 What is the CompTIA A+ 00:02:00 Why Get A+ Certified? 00:03:00 What is on the CompTIA A+ Core 2 (220-1002) Exam? 00:04:00 How to Pass the CompTIA A+ Exam 00:04:00 How to use this Video Course 00:03:00 Section 02: Safety and Professionalism Professional Communication Part 1 00:06:00 Professional Communication Part 2 00:07:00 Physical Safety 00:07:00 Section 03: The Visible Computer What is an Operating System? 00:09:00 Users and Super Users 00:05:00 Why Windows? 00:08:00 Windows Editions and Versions 00:12:00 Touring the macOS 00:06:00 Touring Linux 00:08:00 Section 04: CPUs 32-Bit vs. 64-Bit Processing 00:12:00 Section 05: RAM Virtual Memory 00:06:00 Section 06: Power Supply Power Protection 00:10:00 Section 07: Implementing Mass Storage Understanding Partitioning 00:04:00 MBR Partitioning 00:12:00 GPT Partitioning 00:09:00 Understanding File Systems 00:12:00 Popular File Systems 00:07:00 Formatting in Action 00:11:00 Dynamic Disks 00:09:00 Software RAID in Storage Spaces 00:10:00 Encrypting Mass Storage 00:09:00 Section 08: Building a PC Boot from Everything 00:12:00 Installing Windows 00:12:00 Post-Installation Tasks 00:12:00 Windows Installation options 00:07:00 Section 09: Windows under the Hood What is the Registry? 00:11:00 Processes 00:07:00 Services 00:04:00 Your Windows Toolset 00:08:00 Windows 7 Task Manager 00:09:00 Windows 10 Task Manager 00:06:00 Information and Configuration Tools 00:11:00 Performance Monitor 00:12:00 Event Viewer 00:07:00 Tools for Programmers 00:08:00 Section 10: Users, Groups, and Permissions Introduction to Users and Groups 00:06:00 Managing Users and Groups 00:12:00 NTFS Permissions 00:08:00 Linux and macOS Permissions 00:05:00 File Explorer 00:14:00 Sharing Resources 00:11:00 Security Policies 00:08:00 Section 11: Maintaining and Optimizing Operating Systems Patch Management 00:11:00 Working with Disks 00:06:00 Working with Applications 00:07:00 System Restore 00:05:00 Backing up Your Files 00:07:00 Task Scheduler 00:07:00 Section 12: Working with the Command-Line Interface Understanding the CLI 00:11:00 Navigating the CLI 00:14:00 Working with Folders 00:07:00 Working with Files 00:11:00 Working with Drives 00:13:00 Super Copy Commands 00:09:00 Advanced Windows Command Line 00:08:00 Advanced Linux Commands 00:13:00 Command-Line Permissions 00:08:00 Introduction to Scripting 00:10:00 Interpreted Languages 00:12:00 Section 13: Troubleshooting Operating Systems Windows Recovery Environment 00:05:00 Advanced Windows Startup Options 00:07:00 Troubleshooting Boot Problems 00:10:00 Troubleshooting at the GUI 00:11:00 Troubleshooting Applications 00:07:00 Kernel Panic 00:05:00 Section 14: Display Technologies Resolutions and Aspect Ratios 00:06:00 Multiple Monitors 00:05:00 Section 15: Essentials of Networking Network Card Troubleshooting 00:09:00 Section 16: Local Area Networking Working with Connections 00:09:00 Working with Workgroups 00:08:00 Working with Active Directory 00:14:00 Windows Sharing with Mac and LInux 00:07:00 Net Command 00:04:00 Firewall Configuration 00:11:00 Windows Firewall 00:08:00 Port Forwarding 00:07:00 Section 17: Wireless Networking Wireless Encryption 00:11:00 Enterprise Wireless 00:16:00 Section 18: The Internet Telnet and SSH 00:07:00 Remote Desktop Connections 00:06:00 The World Wide Web 00:09:00 Troubleshooting Internet Connections 00:07:00 Section 19: Portable Computing Power Management 00:11:00 Section 20: Care and Feeding of Mobile Devices Mobile Device Security 00:08:00 Mobile Security Troubleshooting 00:06:00 Mobile Device Troubleshooting 00:10:00 Section 21: Securing Computers Threats 00:10:00 Physical Security 00:08:00 Passwords and Authentication 00:14:00 Malware 00:14:00 Anti-Malware 00:11:00 Social Engineering 00:06:00 Licensing 00:10:00 Incident Response 00:05:00 Environmental Controls 00:06:00 Section 22: Operational Procedures Documents You Need to Know 00:09:00 Data You Need to Know 00:04:00 Change Management 00:06:00 The Zen of Backup 00:11:00 Recycling and Data Destruction 00:07:00
Description: Are thinking to improve your skills and knowledge on Windows system? Then you are welcome to join this course! Microsoft Internet Explorer 6,7,8 Training is a combined course and designed especially for your benefit. Microsoft Internet Explorer 6 is the sixth major revision of Internet Explorer for Windows operating systems. In the course, you will be introduced to Internet Explorer basics, the Internet Explorer interface, ways to access a website, printing from the web, working with data, set your options, security features and so much more. You will get the basic knowledge of Windows functions, and how to use the mouse and keyboard. Following that, Microsoft Internet Explorer 7 will help you to understand the basics of Internet Explorer, Internet Explorer interface and windows, toolbar, using tabs, searching the web, managing information and history, RSS feeds and much more. Windows Internet Explorer 8 is the latest version of Microsoft's broadly used Windows operating system. With the help of this course, you will get a complete overview of the new start screen, a comprehensive look at touch gesture, an introduction to the default applications and information on using the desktop and its uses. Learning Outcomes: Learn how to understand secure sites Get knowledge of accessing the protected sites Get to know the Internet Explorer's security features Learn to keep yourself safe Learn to manage the information Know of setting your options Learn of managing history Get additional components Commence with Internet Explorer 7 Learn to browse the Internet Know how to set up favourites Learn how to be safe as you are browsing Realise the advanced features Understanding the requirements of internet connection, different types of connections, and opening, setting up and closing Internet Explorer Get an overview of the user interface by using the command area, menu bar, explorer bar, search bar and status bar Discover the application window by learning how to minimize, maximize, restore, and manually resize the window; differences between full screen vs. normal mode; and using zoom feature Enabling, disabling and locking toolbars, along with customizing the command toolbar Get help from help menu, help file, using the table of contents, searching the help file, taking internet explorer tour and online support Learn how to use the navigation buttons, understand parts of web addresses, access your homepage, access websites using address bar and/or hyperlink, and opening page in a new window Opening and closing tabs, switching between tabs, access tabbed help, using tabbed thumbnails and tab list Search the web using search boxes, search engines, within a page, and get some general tips for searching and change the search options Copying text and pictures from the web, saving pictures and web pages, and sending page, link or picture using emails Examine the print preview, page setup, printing page or selection options Understand Favourites; opening, pinning and closing favourites centre; and accessing favourites without Internet Explorer Marking pages or multiple tabs, deleting, maintaining and accessing favourites Organise your favourites by renaming them, adding folders to favourites, and saving and moving them into the folders Understand and manage accelerators, use and get new ones Get to know what are web slices, and how to get, use and find them See the differences between secure and non-secure sites, learn about encryption, digital signatures, cookies, browser cache, and display options Protect your sites using passwords, form filling, learning about the Password Manager, and CAPTCHA Discover more about information bar, pop-up blocker, phishing filter, InPrivate browsing and filtering, and finally managing add-ons Get safety tips and learn about antiviral software, anti-spam software, and firewalls Import and export favourites and cookies Understand and open dialog boxes, set up your homepage, delete temporary internet files, setup parental filtering, automatically disconnect, and set internet explorer as default browser Manage browser history by understanding what it is, access history from address bar, manually delete history items, clear entire history, and set up history options Discover the meaning of RSS Feed, how to view it, subscribing and using feeds, changing feed properties and unsubscribing from feeds Explore HTML, JavaScript, and ActiveX; view and edit HTML source code, more plugins and add-ons, and reset options for internet explorer Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Microsoft Internet Explorer 6,7,8 Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Microsoft Internet Explorer 6,7,8 Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module : 1 DEFINITIONS 00:30:00 INTERNET EXPLORER BASICS 00:30:00 THE INTERNET EXPLORER INTERFACE 00:30:00 MORE ABOUT TOOLBARS 00:30:00 GETTING HELP 00:30:00 ACCESSING A WEB SITE 00:30:00 SEARCHING THE WEB 00:30:00 WORKING WITH DATA 00:30:00 PRINTING FROM THE WEB 00:30:00 FAVOURITE BASICS 00:30:00 CREATING AND USING FAVOURITES 00:30:00 ORGANIZING FAVOURITES 00:30:00 THE LINKS TOOLBAR 00:30:00 SECURE SITES 00:30:00 ACCESSING PROTECTED SITES 00:30:00 SECURITY FEATURES 00:30:00 KEEPING YOURSELF SAFE 00:30:00 MANAGING INFORMATION 00:30:00 SETTING YOUR OPTIONS, PART ONE 00:30:00 SETTING YOUR OPTIONS, PART TWO 00:30:00 MANAGING YOUR HISTORY 00:30:00 ADDITIONAL COMPONENTS 00:30:00 Module : 2 Definitions to Microsoft Internet Explorer 7 00:15:00 Internet Explorer Basics 00:15:00 The Internet Explorer Interface 00:15:00 The Internet Explorer Window 00:15:00 More About Toolbars 00:15:00 Getting Help 00:30:00 Access a Web Site 00:15:00 Using Tabs 00:15:00 Searching the Web 00:15:00 Working with Data 00:30:00 Printing from the Web 00:15:00 Favorite Basics 00:15:00 Creating and Using Favorites 00:15:00 Organizing Favorites 00:15:00 The Links Folder 00:15:00 Secure Sites 00:15:00 Accessing Protected Sites 00:15:00 Security Features 00:22:00 Keeping Yourself Safe 00:15:00 Managing Information 00:15:00 Setting Your Options 00:15:00 Managing Your History 00:15:00 RSS Feeds 00:15:00 Additional Components 00:15:00 Module : 3 Definitions 00:15:00 Internet Explorer Basics 00:30:00 The Internet Explorer Interface 01:00:00 The Internet Explorer Window 00:30:00 More about Toolbars 00:15:00 Getting Help 01:00:00 Accessing a Web Site 00:30:00 Using Tabs 00:30:00 Searching the Web 01:00:00 Working with Data 01:15:00 Printing from the Web 00:30:00 Favorite Basics 00:15:00 Creating and Using Favorites 00:30:00 Organizing Favorites 00:30:00 Accelerators 01:00:00 Web Slices 00:15:00 Secure Sites 00:15:00 Accessing Protected Sites 00:15:00 Security Features 01:00:00 Keeping Yourself Safe 00:15:00 Managing Information 00:30:00 Setting Your Options 01:00:00 Managing your History 00:30:00 RSS Feeds 00:30:00 Additional Components 00:30:00 Mock Exam Mock Exam- Microsoft Internet Explorer 6,7,8 Training 00:30:00 Final Exam Final Exam- Microsoft Internet Explorer 6,7,8 Training 00:30:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Welcome to 'Python Programming for Non Programmers Level 5,' a course specially designed for those new to the world of coding. This program starts with a comprehensive introduction to Python, a versatile programming language favored in numerous fields. Progressing to the second unit, participants will familiarize themselves with the initial steps of Python programming, setting a strong foundation for future learning. The course then advances to conditional branching in Python, an essential skill for logical problem-solving in coding. A highlight of this course is the practical project: building the game 'Rock Paper Scissors'. This engaging task not only consolidates learning but also adds a fun element to the process. The curriculum further includes critical topics like string operations, date and time functionalities, and the nuances of file handling in Python. Learners will navigate through the complexities of Python data structures-tuples, lists, and dictionaries-and learn to craft user functions, enhancing their coding capabilities. The course also covers email automation, ingenious import tactics, interfacing with operating systems, and handling exceptions with finesse. Furthermore, learners will get hands-on experience with package installation, scheduling tasks in Python, and managing databases using SQLite. The course wraps up with insights on running Python programs via command prompt and Jupyter Notebook, ensuring learners are well-equipped for real-world applications. Learning Outcomes Acquire foundational knowledge and setup skills in Python programming. Master conditional branching for effective problem-solving in code. Complete a practical coding project to solidify Python skills. Learn essential Python operations, including string handling and file management. Explore and apply advanced Python concepts for real-world applications. Why choose this Python Programming for Non Programmers Level 5 course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Python Programming for Non Programmers Level 5 course for? Beginners eager to learn Python from scratch. Non-technical professionals desiring to add coding skills to their portfolio. Educators keen to integrate Python into their teaching methodologies. Businesspersons interested in understanding coding fundamentals for tech-based solutions. Enthusiasts exploring programming as a new hobby or career path. Career path Entry-Level Python Programmer: £25,000 - £40,000 Python-Enabled Data Analyst: £28,000 - £45,000 Python Automation Engineer: £30,000 - £50,000 Technical Support Analyst with Python Skills: £22,000 - £35,000 Python Web Developer: £26,000 - £42,000 Quality Assurance Analyst with Python Expertise: £24,000 - £38,000 Prerequisites This Python Programming for Non Programmers Level 5 does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Python Programming for Non Programmers Level 5 was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Unit 01: Introduction to Python Programming Section 01: Course Introduction 00:02:00 Unit 02: Getting Started with Python Section 01: Software Installation 00:02:00 Section 02: Hello World Program 00:06:00 Section 03: Input and Output 00:07:00 Section 04: Calculating Average of 5 Numbers 00:03:00 Unit 03: Conditional Branching with Python Section 01: If Loop In Python 00:06:00 Section 02: Program Using If Else part 1 00:03:00 Section 03: Program Using If Else part 2 00:08:00 Section 04: Program for Calculator 00:02:00 Section 05: Program Using For Loop 00:08:00 Section 06: For Table 00:05:00 Section 07: For loop and Mathematical Operator in Python 00:04:00 Section 08: Factorial of Number Using Python 00:06:00 Section 09: Program Using While 00:05:00 Section 10: While Loop Example 00:07:00 Section 11: Tasks for Practice 00:02:00 Unit 04: Importing external/internal library in python Section 01: Importing Library in Python 00:07:00 Unit 05: Project Rock Paper and Scissors Section 01: Rock Paper and Scissor Game 00:06:00 Unit 06: Strings Operation in Python Section 01: Program Using String part 1 00:05:00 Section 02: Program using String 2 00:06:00 Section 03: Program Using String 3 00:06:00 Section 04: Program Using String part 4 00:03:00 Unit 07: Date and time in Python Section 01: Use of Date and Time part 1 00:05:00 Section 02: Use of Date and Time part 2 00:05:00 Unit 08: File Handling, read and write using Python Section 01: File Handling Part 1 00:08:00 Section 02: File Handling Part 2 00:07:00 Unit 09: Data Storage Structures, Tuple, List and Dictionary Section 01: Tuple in Python Part 1 00:10:00 Section 02: Tuple in Python Part 2 00:07:00 Section 03: Using Lists part 1 00:07:00 Section 04: Using List part 2 00:12:00 Section 05: Using Lists part 3 00:06:00 Section 06: Using Lists part 4 00:08:00 Section 07: Using Lists part 5 00:02:00 Section 08: Use of Dictionary Part 1 00:04:00 Section 09: Use of Dictionary Part 2 00:05:00 Section 10: Use of Dictionary Part 3 00:08:00 Section 11: Use of Dictionary Part 4 00:07:00 Unit 10: Writing user functions in Python Section 01: Function in Python Part 1 00:06:00 Section 02: Function in Python Part 2 00:05:00 Section 03: Function in Python Part 3 00:04:00 Section 04: Function in Python Part 4 00:07:00 Section 05: Function in Python Part 5 00:08:00 Unit 11: Sending mail Section 01: Send Email 00:09:00 Unit 12: Import Tricks in Python Section 01: Import Study part 1 00:07:00 Section 02: Import Study part 2 00:03:00 Unit 13: Import Operating System and Platform Section 01: Importing OS 00:06:00 Section 02: Import Platform 00:05:00 Unit 14: Exceptions handling in python Section 01: Exception in Python part 1 00:11:00 Section 02: Exception in Python part 2 00:07:00 Section 03: Exception in Python part 3 00:05:00 Unit 15: Installing Packages and Scheduling In Python Section 01: Installing Packages using built in package manager 00:08:00 Section 02: Scheduler in Python 00:05:00 Unit 16: Data Base In Python using sqlite Section 01: Data Base 1 00:08:00 Section 02: Data Base 2 00:09:00 Section 03: Data Base 3 00:08:00 Section 04: Data base 4 00:07:00 Section 05: Data Base 5 00:06:00 Unit 17: Running Program from Command Prompt and jupyter Notebook Section 01: IDE_1 00:05:00 Section 02: IDE_2 00:07:00 Unit 18: Conclusion Section 01: Conclusion 00:02:00 Resources Resources - Diploma in Python Programming 00:00:00 Assignment Assignment - Diploma in Python Programming 00:00:00 Recommended Materials Workbook - Diploma in Python Programming 00:00:00
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for: ? System Administrators ? Patch Administrators ? SA Administrators ? Policy Setters ? IT Managers ? IT or Application Architects ? Data Center Managers ? Application Experts ? Operations Experts ? Deployment Specialists ? Application Deployment Manager Administrators ? QA Team Members and Managers ? Security Administrators ? Other technical personnel who are responsible for data center automation Overview After completing this course, you should be able to: ? Describe the Server Automation (SA) core architecture and key components of SA ? Integrate unmanaged servers into the SA managed environment and discover server information through SA ? Use the Operation System (OS) Provisioning feature of SA to automate the installation of OS onto servers ? Provision virtual servers and manage their server lifecycle through SA ? Create static and dynamic device groups to manage multiple servers as groups ? Manage packages as part of the software management feature in SA ? Use a policy-based management methodology to provision software and manage software updates ? Describe and use Application Deployment Manager (ADM) to manage an application lifecycle using SA ? Use the Application Configuration feature of SA to manage the values in configuration files on managed servers ? Manage patches on various OS platforms using a patch policy or software policy ? Use the Audit and Remediation feature of SA to ensure servers and applications are compliant with defined best practices or corporate policies ? Use the Compliance feature of SA to discover out-of-compliance servers in the managed environment and ensure that they are in compliance with corporate policies ? Use the Global Shell and Global File System (OGFS) features to explore and manage servers in an SA environment ? Create, manage, and execute scripts I SA to manage servers or server groups This five-day course provides the necessary foundation to manage the data center servers and application environment using HP Server Automation (SA) 10. The course covers the key components of SA and their functionality. Course Overview and Introduction to HP Server Automation ? Discuss the IT organization?s preference for automation ? Discuss the main features of HP SA ? Discuss the benefits of using SA ? Describe the distributed architecture of SA Exploring the Architecture and Interfaces ? Define an SA core ? Describe the functionality of each key component of SA ? Describe SA users ? Use the SA client to explore a managed server environment ? Describe the SA core architecture and key components ? Learn how to use the SA interfaces to explore the server environment Agent Functionality and Server Integration ? Differentiate the agent types ? Describe the SA agent functionality ? Specify the requirements for installing an SA agent onto an unmanaged server ? Install an agent onto an unmanaged server using the SA client and manual installation ? Troubleshoot agent installation and communication failures ? Explore the server inventory using the Device Explorer of the SA client ? Describe the Agent Tools feature within SA ? Integrate existing, unmanaged servers into the SA managed environment ? Summarize what server information is collected by the agent ? Explain the server module objects ? Explain agent extensions Provisioning Operating Systems (OS) Using OS Build Plans (OSBPs) ? Describe the Operating System (OS) provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Build Plan (OSBP) Dynamic Host Configuration Protocol (DHCP) Less or Static IP Provisioning ? Configure and run the Managed Boot Client(s) (MBC) ? Provision Operating Systems (OS) without using Dynamic Host Configuration Protocol (DHCP) (or by using Static IP) Managing Virtualization ? Describe the supported virtualization management features in SA ? Describe the process of provisioning virtual servers for VMware Enterprise Server Xi (VMware ESXi) and Solaris 10 ? Identify the relationship between the hypervisor and its virtual servers ? Manage the lifecycle of VMware Virtual Machines (VMs) ? Manage the lifecycle of Solaris zones ? Integrate with VMware Virtual Center using Virtualization Service (VS) Exploring Device Groups ? Explain device groups and their characteristics ? Describe the different types of device groups supported in SA ? Create static and dynamic device groups using the SA client Exploring Device Groups with Search Results ? Describe the different types of search in the SA client ? Discuss the process to save and retrieve search results ? Create device groups from search results ? Develop sample reports using advanced search Managing Packages ? Describe how to manage packages in SA ? Discuss the supported package types ? Explain how to organize the software library ? Import and export packages into the software repository ? Install and uninstall packages ? Manage Red Hat Package Manager (RPM) packages Software Management ? Describe the use of policy-based software management in SA ? Describe how to manage software policies in SA ? List the software management setup tasks ? Install and uninstall software using software policies ? Manage software updates using software policies Working with Application Deployment Manager (ADM) ? Describe the Application Deployment Manager (ADM) and its functions ? Manage the ADM ? Set permissions for ADM ? Define an application, a target, and a component ? Deploy an application ? Manage an Application Deployment job ? Describe the rollback and undeploy process ? Import and export Application Deployment data from SA Application Configuration Management ? Describe how application configurations are managed in SA ? Describe application configuration components ? Control values using an application configuration inheritance model ? Push application configuration values to servers Managing Patches ? Describe the patch management feature in SA ? View patch information ? Describe UNIX patch management tasks ? Install patches using patch policies on the Windows platform ? Identify Microsoft patch administration tasks ? Manage patches on Red Hat LINUX Working with Audits, Snapshots, and Remediation ? Describe the audit and remediation feature in SA ? Create and run audits ? Configure file audit rules ? Set audit rule exceptions ? View audit results and remediate the differences ? Describe how to use Business Service Automation Essentials (BSAE) Network to run compliance audits Enforcing Compliance ? Define server compliance concepts ? Describe the compliance management feature in SA ? Scan and view the compliance status of servers ? Remediate non-compliant servers Exploring Servers Using the Global Shell and Global File System ? Describe the Global Shell and Opsware Global File System (OGFS) features within SA ? Describe how Global Shell and OGFS features can be used to manage servers within the SA environment ? Describe how to navigate and filter data in the OGFS using the Global Shell ? Use the Remote Shell (ROSH) command to login to a managed server and execute shell scripts on a managed server ? Use the SA remote terminal feature to access and manage servers in the managed environment Scripting with SA ? Describe the script management and execution feature in SA ? Create scripts using the SA client ? Execute ad hoc or saved scripts ? View and download script results ? Describe PowerShell integration with SA ? Explain the Extensible Discovery server module ? Introduce Automation Platform eXtensions (APX) scripting Exploring Reports in SA ? Explain SA reports ? List the reports available in SA ? Generate an SA report ? Explain Business Service Automation (BSA) Essentials basics as a reporting tool OS Provisioning with OS Sequences ? Describe the OS Provisioning feature within SA ? Describe the process of provisioning an OS on a server ? Define and run an OS Sequence
Embark on a transformative DevOps journey! This comprehensive course equips you with skills in Ansible, Docker, GitLab, backups, and more. Master the art of self-hosting your infrastructure, streamlining deployments, and boosting efficiency. Launch your DevOps career today and unleash the endless possibilities!