Duration 2 Days 12 CPD hours This course is intended for This course is designed for all project managers and project team leaders. Overview At course completion, students will be able to identify, analyze, respond to, and control project risks. This course focuses on improving the project manager?s risk management expertise, from initial planning through project closure. Participants will apply all course principles to a work-related case study taken directly from their work environment. Risk Management Overview Risk Management Benefit and Uses Project Risk Management Project Management Life Cycle Initiating Process Group Initiating Process Group Overview Develop Project Charter Identify Stakeholders Project Selection Criteria ROI Analysis ROI Methods Risk Complexity Index Project Selection Planning Process Group Planning Process Group Overview Scope Risks Schedule Risks Resource Risks Plan Risk Management Identify Risks Delphi Technique Subject Matter Expert Input Brainstorming Fishbone Diagrams Process Analysis Five Whys Influence Diagrams Risk Breakdown Structure (RBS) Risk Register Perform Qualitative Risk Analysis Probability and Impact Assessment Probability and Impact Chart Perform Quantitative Risk Analysis Three point estimates PERT Triangular Distributions Outlier Considerations Geometric Mean Normal Distributions Methods Tornado Diagrams Expected Monetary Value (EMV) Monte Carlo Plan Risk Responses Risk Response Strategies Overall Project Risk Checklists Executing, Monitoring and Controlling Process Groups Executing Process Group Overview Monitoring and Controlling Process Group Overview Control Risks Project Monitoring Longer Projects Closing Process Group Closing Process Group Overview Close Project or Phase Risk Activities During Closing Process Group Post-Project Risk Assessment
Duration 3 Days 18 CPD hours This course is intended for This advanced course is designed for those individuals who are responsible for operating and managing the operation of an IBM i system. Overview Explain the concept of how LPAR works Explain the functions served by the HMC Explain how user versus resource security are implemented Explain the difference between group profiles and authorization lists Describe how adopted authority works Describe how work is managed on the system and the concepts of the performance tuning process on the system Explain how Management Central can be used to manage a single system or a network of System i servers Perform the steps to create a basic CL program using both the traditional (PDM and SEU) and the newer GUI (RSE and LPEX) application development tools Perform the steps to create a menu using SDA Provide some tips on how you can improve your operations This course is designed to enhance the skills of an IBM i System Operator. This course explains the concept of how LPAR works and discusses the functions provided by the HMC LPAR concepts and overview . Console options and HMC overview . IASP concepts and overview . Security concepts and overview . System values . User security (user and group profiles) . Resource security . Authorization lists and adopted authority . Management Central overview . Commands and tasks using Management Central . Inventory using Management Central . System values using Management Central . Other Management Central functions . Work management: Concepts and overview . Work management: Subsystem concepts and overview . Work management: Job processing concepts and interactive jobs . Work management: Job processing concepts of other job types . Work management: Submitting and tracking of batch jobs . Programming concepts . CL programming concepts . Using PDM and SEU to create a CL program . Starting and setting up RSE . Creating a CL program using RSE and LPEX Editor . Creating a menu using SDA . Tips for improved operation .
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Searching in the Configuration Manager console Using Windows PowerShell with Configuration Manager Using Configuration Manager Service Manager to manage components Monitoring site and component status Reviewing log files by using the Configuration Manager Trace tool Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. Describe the Configuration Manager architecture. Describe the management tools that you use to perform administrative functions for Configuration Manager. Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. Analyzing data using queries and reports Introduction to queries Configuring Microsoft SQL Server Reporting Services (SSRS) Lab : Creating and running queriesConfiguring boundaries and resource discovery Creating data queries Creating subselect queries Creating status message queries Lab : Configuring SSRS Configuring a reporting services point Creating a report by using Report Builder Create and configure data and status message queries. Configure and manage SSRS and the reporting services point. Preparing the management infrastructure to support PCs and mobile devices Configuring site boundaries and boundary groups Configuring resource discovery Configuring the Exchange Server Connector for mobile device management Configuring user and device collections Lab : Configuring boundaries and resource discovery Configuring boundaries, boundary groups, and fallback relationships Configuring Active Directory discovery methods Lab : Configuring user and device collections Creating a device collection Creating a user collection Configuring a maintenance window Configure boundaries and boundary groups. Configure resource discovery. Configure the Exchange Server connector mobile device management. Organize resources using device and user collections. Deploying and managing clients Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings in Configuration Manager Lab : Deploying the Microsoft System Center Configuration Manager client software Preparing the site for client installation Deploying the Configuration Manager client software by using client push installation Lab : Configuring and monitoring client status Configuring and monitoring client health status Lab : Managing client settings Configuring client settings Describe the requirements and considerations for installing the Configuration Manager client software. Deploy the Configuration Manager client software. Configure and monitor client status. Manage Configuration Manager client settings. Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Configuring and managing hardware inventory Lab : Configuring software metering Configuring software metering Lab : Configuring and managing Asset Intelligence Preparing the site for Asset Intelligence Configuring Asset Intelligence Monitoring license agreements by using Asset Intelligence Viewing Asset Intelligence reports Describe inventory collection. Configure and collect hardware and software inventory. Manage inventory collection. Configure software metering. Configure Asset Intelligence. Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Installing a new distribution point Managing content distribution Prepare the infrastructure for content management. Distribute and manage content on distribution points. Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Installing and configuring the Application Catalog roles Creating applications with requirements Deploying applications Lab : Managing application supersedence and removal Managing application supersedence Uninstalling the Excel Viewer application Lab : Deploying virtual applications by using Configuration Manager (Optional) Configuring support for App-V Deploying virtual applications Lab : Using Configuration Manager to deploy Windows Store apps Configuring support for sideloading Windows Store apps Configuring a Windows Store app Deploying Windows 10 apps to users Describe the application management features of Configuration Manager. Create applications. Deploy applications. Manage applications. Configure and deploy virtual applications. Configure and deploy Windows Store apps. Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Lab : Configuring the site for software updates Configuring and synchronizing the software update point Lab : Deploying and managing software updates Determining software update compliance Deploying software updates to clients Configuring automatic deployment rules Describe how the software updates feature integrates with Configuration Manager. Prepare the Configuration Manager site for software updates. Manage the evaluation and deployment of software updates. Configure automatic deployment rules. Monitor and troubleshoot software updates. Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Lab : Implementing Microsoft System Center Endpoint Protection Configuring the System Center Endpoint Protection point and client settings Configuring and deploying Endpoint Protection policies Monitoring Endpoint Protection Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. Configure, deploy, and manage Endpoint Protection policies. Managing compliance and secure data access Overview of Compliance Settings Configuring compliance sett
Duration 3 Days 18 CPD hours This course is intended for This course is for IT professionals who manage on-premises Windows Server environments and want to use Azure to manage server workloads and run their virtual workloads on Windows Server 2019. They also want to use existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. Overview Describe the Azure Stack portfolio, including Azure Stack HCI, Azure Stack Hub, and Azure Stack Edge Describe the Azure Stack HCI core technologies and management tools. Describe the process of a typical Azure Stack HCI implementation. Identify Azure Stack HCI hybrid capabilities. Implement, manage, and maintain workloads on Azure Stack HCI. Plan for and implement Azure Stack HCI Storage, including Storage QoS and Storage Replica. Plan for Azure Stack HCI Networking. Implement Software Defined Networks in Azure Stack HCI. This three-day course WS-013T00-A is intended primarily for IT Professionals who already have significant experience with managing an on-premises Windows Server environment. Its purpose is to cover advanced topics related to Windows Server software-defined datacenter, Azure Stack HCI, and other Azure Stack products. The course also describes the use of existing Microsoft System Center products to implement and manage software-defined datacenters with Windows Server 2019. This course is advanced and is designed for people that want to run their virtual workloads on Windows Server 2019 at medium-to-large scale using software-defined datacenter and hyper-converged principles. Introducing Azure Stack HCI Overview of Azure Stack HCI Overview of Azure Stack HCI technologies Overview of Azure Stack HCI management tools Overview of the Azure Stack HCI hybrid capabilities Operating and maintaining Azure Stack HCI Implementing and managing workloads on Azure Stack HCI Maintaining Azure Stack HCI Planning for and implementing Azure Stack HCI storage Overview of Azure Stack HCI Storage core technologies Planning for Storage Spaces Direct in Azure Stack HCI Implementing a Storage Spaces Direct-based hyper-converged infrastructure Managing Storage Spaces Direct in Azure Stack HCI Planning for and implementing Storage QoS Planning for and implementing Storage Replica Planning for and implementing Azure Stack HCI networking Overview of Azure Stack HCI core networking technologies Overview of network virtualization and Software-Defined Networking Planning for and implementing Switch Embedded Teaming Planning for and implementing Datacenter Firewall Planning for and implementing Software Load Balancing Planning for and implementing RAS Gateways
Duration 2 Days 12 CPD hours This course is intended for Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Install, Configure, and Implement Cisco Emergency Responder (Cisco ER). Configure CUCM for CER Configure Emergency Response Locations (ERLs) Configure Emergency Location Identification Numbers (ELINs) Configure PSAP calls and PSAP CallBack Configure Users and onsite Security Management This is a 2-day hands-on course, where students will Install, Deploy, and Configure Cisco Emergency Responder (Cisco ER) 12.5. Student will also integrate emergency communication system with Cisco Unified Communications Manager. Students will learn how Cisco ER automatically notifies and routes calls to the local public safety answering point (PSAP) operator. Students will configure emergency response locations (ERLs) and emergency location identification numbers (ELINs) in CER to properly route enhanced 911 (E911) calls. You will also examine CER disaster recovery and user management. Cisco Emergency Responder Overview PSAP/ Emergency Calling Overview National Emergency Number Association Legislation and Regulation Service Provider ALI Automatic Number Identification (ANI) Automatic Location Identification (ALI) NENA Emergency Response Location NENA Guidelines for ERLs NENA Emergency Location Identification Number (ELIN) E911 Preparation Cisco Emergency Call Handler Cisco Emergency Responder 11.x Enhancements License Management Emergency Responder Redundancy Clustering CER over the WAN Integration with UC Manager Intrado Architecture CER Wireless Features Overview Installing Cisco Emergency Responder Supported Hardware Platforms CER Virtual Server Requirements Deploy Cisco CER OVF/OVA Installation of CER CER CLI Interface Reset Application Administrator Password Add 2nd CER Server - Subscriber Upgrade VMware Tools on Cisco Emergency Responder Server CER Backup and Restore CER PLM Licensing Unified Communication Manager CER Configuration Cisco Unified Communications Manager Administrator Interfaces Cisco Unified Communications Manager Required Services for CER CUCM SNMP Settings Phone Partition and Calling Search Spaces Partitions for 911 Services CER CUCM Configuration for CTI Route Points and CTI Ports Configure CER Route Patterns for 911 and Security Personal Create Translation Patterns for ELINs Create Emergency Responder Cisco Unified Communications Manager User Location Awareness Overview Configure Wireless Endpoint Tracking Feature on UCM 11.5 Cisco Emergency Responder (CER) Configuration Emergency Responder Interface E.164 Dial Plan Support Cisco Emergency Responder Groups Setup CER Groups CER Telephony Settings for CER Cisco CER License Manager Cisco CER Email Settings Cisco CER - Add Subscriber Onsite Security Alerts for Security Personnel Pager Alert Configuration Configure Emergency Response Location (ERL) Configure Emergency Location Identification Number (ELIN) ERL Migration Tool Configure SNMP Configure Phone Tracking Configure LAN Switch Tracking Configuring IP Subnet-based ERLs Configuring Manual Phone Tracking Emergency Responder User Management Manage Onsite Alerts, ERLs, and ALI Data User and Security Logins CER - Web Alerts CER - ERL Audit Trail Export PS-ALI Records ERL Debug Tool
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MX Firewalls Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MX Firewalls. Students will also learn how to configure the Meraki Dashboard Students will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MX Security Benefits of a Cloud Managed Security Solution Threat Management Solution Advanced Security Licenses Reliable, Cost Effective Connectivity with Meraki SD-WAN Site-to-Site VPN (Auto VPN) High Availability and Path Redundancy Application-Aware Intelligent Path Control Traffic Monitoring and Analytics Integrating Active Directory Cisco Meraki MX Models and Features Configuring the Local Status Page Adding Appliance to Network Device Configuration Configuring the Warm Spare Feature Device Tags & Notes Configuring Addressing & VLANs DHCP Server Configuration and Options Meraki Firewall Configuration Meraki Site-to-Site VPN One Arm VPN Concentrator Configuration Meraki Client VPN Meraki Active Directory Integration Meraki Access Control Meraki Splash Page Configuration Configuring Access Policies Teleworker VPN/L3 Roaming
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: System Engineers System Administrators Architects Channel Partners Overview Upon completing this course, the learner should be able to meet these overall objectives: Describe Cisco Webex Teams Comprehend Cisco Webex Meetings Understand Cisco Webex Messaging Recognize Cisco Webex Teams Calling Appreciate Cisco Webex Teams Care Explain Cisco Webex teams Management and Administration Describe Cisco Webex Teams Service Availability, Ordering, and Support Understand Cisco Webex Teams Board Cisco Webex Teams is an app-centric, cloud-based service that provides a complete collaboration suite for teams to create, meet, message, call, care, whiteboard, and share, regardless of whether they?re together or apart?in one continuous work stream before, during, and after meetings. Being able to understand how this works and what the features are is the key focus of this 2-day course. NterOne?s Webex Teams Collaboration Workshop should be taken by students who have a working understanding of Cisco Collaboration Products. This Cisco Webex Teams Workshop enables learners to describe Cisco Webex Teams, comprehend Cisco Webex Teams Meetings, and grasp Cisco Webex Teams Messaging, among much more. This workshop is intended to be taken by system engineers, system administrators, architects, and channel partners. Learn more below. Cisco Webex Teams Overview What is Cisco Webex Teams Webex Teams Delivery Webex Teams Security Webex Teams Collaboration Webex Teams API Meetings Messaging Calling Cisco Webex Teams Spaces Cisco Webex Teams Hybrid Services Cisco Webex Teams Benefits Cisco Webex Team Meetings Basic Meetings Instant Messages Schedule Meetings Cisco Webex Teams Advanced Meetings Overview Webex Integration Personal Room Cisco Webex Teams Desk and Room Devices and the Cisco Smart Board Cisco Webex Teams Conferencing Cisco Webex Teams Board and Room Device Setup and Use Three ways to enable pairing Cisco WebEx Teams Messaging Cisco Webex Teams Messaging Overview Key Benefits of Cisco Webex Teams Messaging Cisco Webex Teams Messaging Features Cisco Webex teams (feature in the app) Use Cases Cisco Webex Teams Board Advanced Interactive Whiteboard No Network, Bluetooth needed Microphones Voice-Tracking Technology Webex Teams Board Application Suite Camera Webex Teams APIs Any Board, anywhere Messaging Setup Cisco Webex Teams Calling Overview Traditional Calling Features in Cisco Webex Teams Features and Benefits of Cisco Webex Teams Calling Benefits of Mobility and Collaboration Features of Cisco Webex Teams PSTN Calling Phone Support Use Cases Cisco Webex Teams Care Overview Embedding Experience Cisco Webex Teams Management and Administration Overview Cisco Cloud Collaboration Management Features and Benefits Management Security Portal Cisco Webex Teams Service Availability, Ordering, and Support Country Availability Language Support Ordering Support Cisco Capital
Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches running Junos ELS. Overview After successfully completing this course, you should be able to: List the benefits of implementing switched LANs. Describe transparent bridging concepts and operations. Describe terms and design considerations for switched LANs. List enterprise platforms that support Layer 2 switching. Configure interfaces for Layer 2 switching operations. Display and interpret the Ethernet switching table. Explain the concept of a VLAN. Describe access and trunk port modes. Configure and monitor VLANs. Describe voice VLAN and native VLAN concepts. Explain inter-VLAN routing operations. Configure and monitor inter-VLAN routing. Explain when a spanning tree is required. Describe STP and Rapid Spanning Tree Protocol (RSTP) operations. List some advantages of using RSTP over STP. Configure and monitor RSTP. Describe the bridge protocol data unit (BPDU), loop, and root protection features. Configure and monitor the BPDU, loop, and root protection features. List and describe various port security features. Configure and monitor port security features. Describe the storm control feature. Configure and monitor storm control. Describe firewall filter support for EX Series Ethernet Switches. Implement and monitor the effects of a firewall filter. List and describe some features that promote high availability. Configure and monitor high availability features. Describe the basic concepts and operational details of a virtual chassis. Implement a virtual chassis with multiple EX4300 switches. Explain the concepts of Ethernet Ring Protection Switching (ERPS). Configure and monitor ERPS. Explain the concepts of Multiple Spanning Tree Protocol (MSTP). Configure and monitor MSTP. This 4-day program includes an overview of protocol independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, switching concepts and operations, virtual LANs (VLANs), the Spanning Tree Protocol (STP), and more. Chapter 1: Course Introduction Course Introduction Chapter 2: Layer 2 Switching Ethernet Bridging Basics Terminology and Design Considerations Overview of Enterprise Switching Platforms Enabling and Monitoring Layer 2 Switching Operations Lab 1: Implementing Layer 2 Switching Chapter 3: Virtual Networks Overview of VLANs Configuring and Monitoring VLANs Voice VLAN Native VLAN Routed VLAN Interfaces Lab 2: Implementing Virtual Networks Chapter 4: Routing Instances Routing Instances Overview Configuring and Monitoring Virtual Switches Chapter 5: Spanning Tree Spanning Tree Protocol Rapid Spanning Tree Protocol Configuring and Monitoring STP and RSTP Protection Features: BPDU Protection Protection Features: Loop Protection Protection Features: Root Protection Lab 3: Implementing Spanning Tree Chapter 6: Port Security MAC Limiting Persistent MAC Learning DHCP Snooping Dynamic ARP Inspection (DAI) IP Source Guard Lab 4: Implementing Port Security Chapter 7: Device Security and Firewall Filters Storm Control Firewall Filters Lab 5: Implementing Storm Control and Firewall Filters Chapter 8: Virtual Chassis Overview of Virtual Chassis Configuring and Monitoring a Virtual Chassis Lab 6: Implementing a Virtual Chassis System Chapter 9: High Availability Features Overview of High Availability Networks Link Aggregation Groups Redundant Trunk Groups Graceful Routing Engine Switchover (GRES) Nonstop Active Routing (NSR) Nonstop Bridging (NSB) Lab 7: Implementing High Availability Features
Duration 2 Days 12 CPD hours This course is intended for This course is intended for Data Warehouse Administrator, Database Administrator, Database Designer, Support Engineer, and Technical Administrator. Overview Upon successful completion of this course, students will be able to Install Oracle Grid Infrastructure for a Standalone Server, Configure ASMLIB and create ASM disk groups, Apply the latest patch set updates to the Grid Infrastructure software, Install Oracle Database software, Use Oracle Restart to manage components, Prepare the Linux operating system for Oracle software installation, Upgrade Oracle Database, Create a container database, Install Oracle Grid Infrastructure for an Independent Server, Create an Oracle Database using DBCA, and Install the latest patch set updates to the Oracle database software. This Oracle Database: Deploy, Patch and Upgrade Workshop gives you detailed information to help you install Oracle Database software. In this course, you will be introduced to Oracle Database Cloud Service. Oracle Database Overview Oracle Database Introduction Oracle Database Architecture Overview Oracle Database Instance Configurations Oracle Database Memory Structures Process Structures Database Storage Architecture Logical and Physical Database Structures Container and Pluggable Database Overview Installing Oracle Grid Infrastructure for a Standalone Server Overview of Oracle Grid Infrastructure for a Standalone Server System Requirements for Oracle Grid Infrastructure Configuring Storage for Oracle Automatic Storage Management (ASM) Installing Oracle Grid Infrastructure for a Standalone Server Upgrading Oracle Grid Infrastructure for a Standalone Server Installing Oracle Database Software Planning Your Installation System Requirements for Oracle Database Preparing the Operating System Using 4 KB Sector Disks Setting Environment Variables Checking the System Requirements Using the Oracle Universal Installer (OUI) Performing a Silent Mode Installation Creating an Oracle Database by Using DBCA Planning the Database Storage Structure Choosing non-CDB or CDB Types of Databases (based on workload) Choosing the Appropriate Character Set Understanding How Character Sets are Used Setting the NLS_LANG Initialization Parameter Using the Database Configuration Assistant (DBCA) Using Oracle Restart Oracle Restart Overview Oracle Restart Process startup Controlling Oracle Restart Choosing the Correct SRVCTL Utility Oracle Restart Configuration Using the SRVCTL Utility Obtaining Help for the SRVCTL Utility Starting Components by Using the SRVCTL Utility Introduction to Upgrading to Oracle Database Upgrade Methods Data Migration Methods Supported Releases for Direct Upgrade Overview of Upgrade Process Performing a Rolling Upgrade Upgrading a CBD Preparing to Upgrade to Oracle Database Developing a Test Plan Performance Testing Requirements for Databases Using Oracle Label Security or Oracle Database Vault Requirement for Databases Using Oracle Warehouse Builder Using the Pre-Upgrade Information Tool Backing Up the Database Installing the Oracle Database Software Preparing the New Oracle Home Upgrading to Oracle Database Upgrading by Using the Database Upgrade Assistant (DBUA) Manually Upgrading to Oracle Database Migrating a non-CDB to a CDB Performing Post-Upgrade Tasks Migrating to Unified Auditing Performing Post-Upgrade Tasks Following a Manual Upgrade Migrating Data by Using Oracle Data Pump Data Pump Overview Migrating by Using Data Pump Importing by Using a Network Link
Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to: Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement and administer Active Directory Rights Management Services (AD RMS). Implement synchronization between AD DS and Azure AD. Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS