Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.
Asbestos Awareness training is a legal requirement for any worker who may encounter asbestos during their work. Modules will provide relevant and detailed knowledge about the dangers of asbestos, the products that contain asbestos, what it looks like, where it may have been used and the practical steps that can be taken to reduce their risk of exposure. In addition to common mandatory modules, learners will also choose a selection of modules relevant to their occupational pathway.
Leadership is about 'getting stuff done'. This course concentrates on just that. In a complicated world, it helps leaders to ensure that the right stuff gets done at the right time and in the right way.
Lean Six Sigma Black Belt Certification Program: In-House Training This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)
Duration 5 Days 30 CPD hours This course is intended for DevelopersConsultants Overview Explore SAP Gateway architecture and deployment optionsPerform OData queries and operations with SAP GatewayDefine data model and implement CRUD operationsExtend SAP Gateway services and build new ones with CDS ViewsConfigure routing, multiple origin, and SAP Workflow supportImplement advanced OData operations and introduce OData V4Handle security and consume OData services using SAP Web IDE Students will explore SAP Gateway architecture and deployment options. SAP Gateway Overview SAP Gateway Architecture SAP Gateway Deployment Options OData Overview OData and REST OData Operations OData Queries Consuming OData using SAP Web IDE SAP Gateway Service Implementation Defining a Data Model Implementing Read Operations Implementing Navigation Implementing Query Options Implementing Change Operations SAP Gateway Service Generation RFC/BOR Generator Search Help Generator SAP Gateway Service Redefinition Redefining a Data Service Redefining a Gateway Service SAP Gateway and CDS Views SAP Fiori Programming Model CDS/SADL Generator Data Source Reference CDS View Annotations SAP Gateway Hub Functionalities Multiple Back-End Systems Support Configuring Routing Capabilities Multiple Origin Composition SAP Workflow Support Advanced OData Options Implementing Function Imports Implementing Expand Operations Implementing Deep Insert Operations Handling ETags Batch Requests Media Links Offline Support Server Side Caching SAP Gateway Security Authentication Data Security SAP Gateway OData V4 Support OData V4 Implementation OData V4 Publishing
Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Telco Cloud Infrastructure⢠architecture Describe the VMware Cloud Director architecture List the infrastructure requirements of ETSI NFV Describe the VMware Cloud Director architecture as Virtualized Infrastructure Manager (VIM) Describe the options associated with VMware cloud providers Explain how organizations are supported in VMware Cloud Director Describe the security model in VMware Cloud Director Configure key networking elements of VMware Cloud Director Manage and monitor resources in VMware Cloud Director Enumerate troubleshooting concepts and Day 2 operations using VMware Cloud Director This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud Infrastructure environment. In this course, you are introduced to VMware Cloud Director? as a virtualized infrastructure manager. You will examine ETSI NFV requirements, deployment options, and procedures. You will also deploy virtualized network functions and understand their detailed configuration settings. You will learn how to support organizations as well as set up networking and security using hands-on lab exercises.In addition, you are presented with various types of technical problems in VMware Cloud Director, which you will identify, analyze, and solve through a systematic troubleshooting process. Course Introduction Introductions and course logistics Course objectives Day 0 Operations: VMware Telco Cloud Infrastructure Installation Describe the challenges of the telco cloud Describe the key functions of the telco cloud List the benefits of the VMware Cloud Director based VMware Telco Cloud Infrastructure Describe the VMware Telco Cloud Infrastructure architecture Describe the role of VMware Cloud Director in the VMware Telco Cloud Infrastructure architecture List the VMware Telco Cloud Infrastructure deployment options Describe the VMware Cloud Director architecture List the key VMware components that are part of VMware Cloud Director Describe the key use cases for the VMware Cloud Director based VMware Telco Cloud Infrastructure Day 0 Operations: ETSI NFV Requirements for Cloud Platforms Compare physical and virtual infrastructures List the benefits and challenges of physical infrastructure Describe the types of virtual infrastructure Describe the advantages and components of the NFV infrastructure (NFVI) Explain the role of network virtualization in the NFVI List the requirements of NFVI for VMware Cloud Director Describe the networking options of VMware Cloud Director Describe the key networking use cases Describe requirements of VMware Telco Cloud Automation? for networking Describe the storage options of VMware Cloud Director Describe the key storage use cases Day 1 Operations: Virtualized Infrastructure Manager (VIM) Configuration Explain basic concepts related to VMware Cloud Director Describe the components of the VMware Cloud Director architecture Describe the basic configuration of the VMware Cloud Director architecture Describe virtual data centers or VDCs Explain the role of organization VDCs Describe the relationship between provider VDCs and organization VDCs Describe resources in VMware Cloud Director List the key resource organization Create resource pools Describe how vSAN integrates with VMware Cloud Director Day 1 Operations: Configuring VMware Cloud Director Providers Describe how compute resources are provided to VMware Cloud Director Describe how storage resources are provided to VMware Cloud Director Describe provider VDC requirements and best practices List the requirements of creating VDCs Describe the VNF on-boarding process Create provider VDCs Day 1 Operations: Configuring VMware Cloud Director Organizations Describe VMware Cloud Director organizations Create VMware Cloud Director organizations Navigate through the VMware Cloud Director HTML5 provider portal Describe the VMware Cloud Director organization VDC Navigate through the tenant portal List use cases for a VMware Cloud Director organization VDC List the organization VDC allocation models Describe the types of resources that can be allocated Describe how resources are allocated for an organization Examine the function and requirements of network pools Describe the network types available in VMware Cloud Director (external, organization, and vApp) Create and manage organization VDC networks Describe catalogs Manage an organization?s catalog Populate, share, and publish catalogs Describe vApps Manage access to vApps and catalogs Modify the configuration of vApps and their virtual machines (VMs) Manage organization VDC networking Create affinity and anti-affinity rules Day 1 Operations: Configuring VMware Cloud Director Security Describe role-based access Create custom security roles Describe the directory services in VMware Cloud Director Describe the role of LDAP, SAML, SSL, Kerberos, and OAuth2 with VMware Cloud Director Explain the use of VMware Cloud Director with SSO Day 1 Operations: Configuring VMware Cloud Director Networking List networking options in VMware Cloud Director Describe key networking use cases in VMware Cloud Director Describe the use and placement of VMware NSX© Edge? services gateways in relation to VMware Cloud Director Review routing with the distributed logical router and edge services gateways in combination with VMware Cloud Director Describe firewall management in VMware Cloud Director with edge services gateways and the distributed firewall Describe an overview of VMware NSX-T? Data Center Explain the architecture of NSX-T Data Center Describe VMware Cloud Director supported features of NSX-T Data Center Describe the benefits and challenges of multisite networking List the requirements for multisite networking Describe the benefits and challenges of networking between VDCs List the requirements for networking between VDCs Configure cross-VDC networking Day 2 Operations: VMware Cloud Director Resource Management and Monitoring Identify the key resources that need to be managed with VMware Cloud Director List monitoring options with VMware Cloud Director Explain the resource management and monitoring architecture in VMware Cloud Director Monitor objects from the VMware Cloud Director portal Identify features of VMware vRealize© Operations Manager? Integrate VMware Cloud Director with vRealize Operations Manager Configure VMware vRealize© Operations Management Pack for VMware Cloud Director? Outline the monitoring features of vRealize Operations Manager in VMware Cloud Director Describe the purpose of the vRealize Operations Tenant App for VMware Cloud Director Integrate VMware Cloud Director with the Tenant App Configure the Tenant App for VMware Cloud Director Monitor objects with the Tenant App List the steps to monitor VMware Cloud Director environments with vRealize Operations Manager List the steps to monitor VMware Cloud Director environments with VMware vRealize© Log Insight? List the steps to review historical virtual machine metrics in VMware Cloud Director Examine VMware Cloud Director logs Day 2 Operations: VMware Cloud Director Troubleshooting Identify the features of the VMware Telco Cloud Automation dashboards List the components of the VMware Telco Cloud Automation dashboards Explain the features of fault management in VMware Telco Cloud Director Describe the use of fault management in VMware Cloud Director Describe the use of performance management in VMware Cloud Director Describe the use of logs in VMware Cloud Director Troubleshoot using VMware Cloud Director
Take your knowledge to the next level with EnergyEdge course on Layer of Protection Analysis (LOPA). Enroll now to advance your career.
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Why Choose Character Animation in 3ds Max Training Course? Click here for more info. Top character animation course in 3ds Max, this course provides an accessible learning experience. Learning character animation enables you to create your own short films. It's not just a means of income; it evolves into a passion. Duration: 20 hrs Method: 1-on-1, Personalized attention. Schedule: Tailor your own hours of your choice, available from Monday to Saturday between 9 am and 7 pm. Enroll in our exclusive "Character Animation Fundamentals in 3ds Max" course at London Design Training, guided by experienced tutors Sitwat Ali, Qasim Ali, and Jess. Gain in-depth insights into animating 3D characters, covering essential techniques like character rigging, pose creation, and seamless pose-to-pose animation. 3ds Max Character Animation Course Duration: 20 hours Course Overview: Master the art of character animation in 3ds Max with our comprehensive course. Ideal for beginners and those with some 3D modeling and animation experience, this course covers everything you need to know to bring characters to life. Course Outline: Introduction to Character Animation Explore animation principles Get familiar with 3ds Max animation tools Learn to create character rigs and manage the timeline Basic Animation Principles Understand keyframes and animation cycles Apply the 12 principles of animation Work with the graph editor and ease-in/out techniques Advanced Animation Techniques Utilize the reaction manager for complex animations Master non-linear animation methods Animate with inverse kinematics, custom controllers, expressions, and scripts Creating Characters Craft a character model with proper topology Create UV maps and apply textures Prepare characters for rigging Facial Animation Learn facial animation principles Create blend shapes and morph targets Master lip syncing techniques Body Animation Animate walk cycles and character motion Achieve believable character poses Implement character physics Advanced Character Animation Work with motion capture data Use CAT and Biped tools Understand motion blur and create special effects Render and output animations Character Animation Projects Bring all skills together in practical projects Create basic and complex character animations Course Requirements: Computer with 3ds Max installed Basic computer operations knowledge Passion for character animation Course Goals: Upon completion, you'll have a thorough grasp of character animation in 3ds Max, capable of creating realistic and sophisticated character animations using advanced techniques. You'll be equipped with the skills to continue honing your character animation abilities independently.
Duration 5 Days 30 CPD hours This course is intended for Telco cloud system administrators and telco network operations engineers Professionals who work with telco or enterprise and data center networks Designers and operations engineers who manage telco workloads Overview By the end of the course, you should be able to meet the following objectives: List VMware Telco Cloud Automation deployment options and procedures Describe the VMware Telco Cloud Automation infrastructure settings Configure Containers as a Service (CaaS) functionality Describe partner integration options and procedures Define zero-touch provisioning and describe infrastructure deployment Instantiate network services and network functions Describe the authorization model of VMware Telco Cloud Automation Define platform life cycle management (LCM) for VMware Telco Cloud Automation Enumerate troubleshooting concepts and day-two operations for VMware Telco Cloud Automation Describe the use of APIs within VMware Telco Cloud Automation List examples of how VMware Telco Cloud Automation can be used in a CICD environment This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware Telco Cloud AutomationTM environment. In this course, you are introduced to VMware Telco Cloud Automation infrastructure settings, deployment options, and procedures. You explore Containers as a Service and understand the workflow details of Partner Integration processes. You are introduced to zero-touch provisioning and its importance in VMware Telco Cloud Automation. You onboard and instantiate network functions and network services using hands-on lab exercises. Course Introduction Introductions and course logistics Course objectives VMware Telco Cloud Automation Installation Describe day-zero operations for VMware Telco Cloud Automation Describe the VMware Telco Cloud Automation architecture List the steps to perform VMware Telco Cloud Automation deployment List the steps to perform VMware Telco Cloud Automation control plane integration Describe VMware Telco Cloud Automation control plane scaling Describe the requirements on other applications such as VMware vRealize© Orchestrator? and Harbor Describe where, when, and how to use VMware Telco Cloud Automation tagging Day One Operations: Infrastructure Settings Describe the VMware Telco Cloud Automation infrastructure options Describe VMware Telco Cloud Automation infrastructure requirements Outline the role of virtual infrastructure and TCA Identify the benefits of public versus private infrastructure List the steps to integrate a VM-based virtual infrastructure List the steps to integrate a container-based virtual infrastructure Describe private infrastructure requirements Day One Operations: Containers as a Service Define Containers as a Service (CaaS) List the challenges of CNF deployment without automation Describe the Kubernetes and VMware Tanzu? Kubernetes Grid? architectures Describe supporting technologies like Cluster API List steps to create a Kubernetes cluster template Describe the process for deploying node pools and groups Describe cluster monitoring List CaaS scale options Day One Operations: Partner Integration Describe partner integration and the types of partners Describe Harbor and the various Harbor platforms List the steps to interface with a Harbor platform Compare and contrast specialized VNF managers (S-VNFMs) and generic VNF managers (G-VNFMs) Explain how to add an S-VNFM Define S-VNFM use cases Day One Operations: Zero Touch Provisioning and Infrastructure Deployment Describe zero-touch provisioning List the use cases of zero-touch provisioning List the benefits of zero-touch provisioning Describe the infrastructure requirements of zero-touch provisioning Describe the zero-touch provisioning domains List the steps to deploy an infrastructure using zero-touch provisioning Day One Operations: Network Functions ad Network Services Describe the roles of network services and network functions List the types of descriptors Describe the role of TOSCA Describe the role of onboarding List the steps to onboard network functions and network services Examine the results of the onboarding process List the steps to instantiate network functions and network services Examine the results of the instantiation process Day Two Operations: Authorization Model Explain the resources that can be accessed in vSphere Define the role of a VMware vCenter Server© system in credential management Describe the procedures to create, delete, and modify rules using vCenter Server Explain how to control and verify access to vSphere resources List roles in VMware Telco Cloud Automation Explain the tasks and list the levels of permissions needed in VMware Telco Cloud Automation List all the permissions and filters that can be implemented in VMware Telco Cloud Automation Summarize the role-based access control model of VMware Telco Cloud Automation Day Two Operations: Platform Life Cycle Management Explain the life cycle stages in VMware Telco Cloud Automation control plane Explain the life cycle stages in VMware Telco Cloud Automation Define an upgrade schedule Apply an upgrade schedule to manage life cycle management of the VMware Telco Cloud Automation control plane Apply an upgrade schedule to manage life cycle management of VMware Telco Cloud Automation Describe network function and network service life cycle management events Execute network function and network service healing Set up Network Function and Network Service monitoring Perform Network Function and Network Service termination Day Two Operations: Troubleshooting List the components of the VMware Telco Cloud Automation dashboard Explain the features of fault management in VMware Telco Cloud Automation Explain the features of performance management in VMware Telco Cloud Automation Describe the use of fault management of VMware Telco Cloud Automation for VNFs and CNFs Describe the use of performance management of VMware Telco Cloud Automation for VNFs and CNFs Troubleshoot using tcf_manager, app.log, and web.log Define the procedures to integrate VMware vRealize© Operations Manager? with VMware Telco Cloud Automation Usage of VMware vRealize© Operations? Day Two Operations: API Management Define the VMware Telco Cloud Automation API Explain the API architecture Describe VMware Telco Cloud Automation API use cases Explain how to configure an external REST API Describe how to request security tokens for implementation Explain how to implement commands through external systems using APIs Day Two Operations: Continuous Integration and Continuous Delivery Describe continuous integration and continuous delivery (CICD) List the benefits and challenges of CICD Describe how VMware Telco Cloud Automation can be used in a CICD environment Explore VMware Telco Cloud Automation CICD examples