• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27953 OV courses delivered Online

VMware Horizon 8: Virtual Desktop Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system operators, administrators, and integrators responsible for managing and maintaining VMware Horizon solutions Overview By the end of the course, you should be able to meet the following objectives: Implement a structured approach to troubleshooting Resolve common issues that occur in a VMware Horizon environment Troubleshoot issues with linked and instant clones Configure the Windows client Identify the correct log level for gathering logs Optimize protocols for best end-user experience This two-day course builds your skills in resolving common issues that occur in a VMware Horizon© environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators. Course Introduction Introductions and course logistics Course objectives Overview of Virtual Desktop Troubleshooting Structured approach to troubleshooting configuration and operational problems Applying troubleshooting methods Documenting the steps to resolving the problem Command-Line Tools and Backup Options Using command-line tools Backing-up and restoring VMware Horizon databases Troubleshooting Horizon Linked Clone Desktops Describe the components that make up a VMware Horizon desktop Explain how the View Agent Direct-Connection plug-In is useful for diagnosing problems Highlight the best practice for optimizing a VMware Horizon desktop Troubleshoot common problems with VMware Horizon desktops Troubleshooting Instant Clone Discuss how instant clones are created Discuss what gets logged when an instant clone is created Discuss the keywords to look for in the logs when troubleshooting instant clones Discuss how to troubleshoot problems with instant clones Windows Client Correctly configure the Windows Client Identify the correct log level for gathering logs Enable the required SSL configuration level for the environment Ports and Protocols Discuss the key ports on a Horizon Environment Discuss protocols used in the Horizon Environment Understand the benefit of optimizing Blast Become familiar with the optimization features for Blast Implement GPO changes for Blast Become familiar with the causes for Black Screens Discuss how to troubleshoot Black Screen problems Identify problems encountered when applying GPOs Discuss how to troubleshoot GPO-related problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Horizon 8: Virtual Desktop Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Horizon 8: Virtual Desktop Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Horizon 8: Virtual Desktop Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft Office Word 2021: Part 1

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for students who want to learn basic Word 2021 skills, such as creating, editing, and formatting documents; inserting simple tables and creating lists; and employing a variety of techniques for improving the appearance and accuracy of document content. Overview In this course, you will learn fundamental Word skills. You will: Navigate and perform common tasks in Word, such as opening, viewing, editing, saving, and printing documents, and configuring the application. Format text and paragraphs. Perform repetitive operations efficiently using tools such as Find and Replace, Format Painter, and Styles. Enhance lists by sorting, renumbering, and customizing list styles. Create and format tables. Insert graphic objects into a document, including symbols, special characters, illustrations, pictures, and clip art. Format the overall appearance of a page through page borders and colors, watermarks, headers and footers, and page layout. Use Word features to help identify and correct problems with spelling, grammar, readability, and accessibility. These days, most people take electronic word processing for granted. While we may still write out our grocery lists with pen and paper, we expect to use a computer to create the majority of our documents. It's impossible to avoid word-processing software in many areas of the business world. Managers, lawyers, clerks, reporters, and editors rely on this software to do their jobs. Whether you are an executive secretary or a website designer, you'll need to know the ins and outs of electronic word processing. Microsoft© Word 2021 is designed to help you move smoothly through the task of creating professional-looking documents. Its rich features and powerful tools can make your work easy, and even fun. In this course, you'll learn how to use Word 2021 to create and edit simple documents; format documents; add tables and lists; add design elements and layout options; and proof documents. This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Word Associate (Office 365 and Office 2021): Exam MO-100 and Word Expert (Office 365 and Office 2021): Exam MO-101 certifications. Getting Started with Word 2021 Topic A: Navigate in Microsoft Word Topic B: Create and Save Word Documents Topic C: Manage Your Workspace Topic D: Edit Documents Topic E: Preview and Print Documents Topic F: Customize the Word Environment Formatting Text and Paragraphs Topic A: Apply Character Formatting Topic B: Control Paragraph Layout Topic C: Align Text Using Tabs Topic D: Display Text in Bulleted or Numbered Lists Topic E: Apply Borders and Shading Working More Efficiently Topic A: Make Repetitive Edits Topic B: Apply Repetitive Formatting Topic C: Use Styles to Streamline Repetitive Formatting Tasks Managing Lists Topic A: Sort a List Topic B: Format a List Adding Tables Topic A: Insert a Table Topic B: Modify a Table Topic C: Format a Table Topic D: Convert Text to a Table Inserting Graphic Objects Topic A: Insert Symbols and Special Characters Topic B: Add Images to a Document Controlling Page Appearance Topic A: Apply a Page Border and Color Topic B: Add Headers and Footers Topic C: Control Page Layout Topic D: Add a Watermark Preparing to Publish a Document Topic A: Check Spelling, Grammar, and Readability Topic B: Use Research Tools Topic C: Check Accessibility Topic D: Save a Document to Other Formats

Microsoft Office Word 2021: Part 1
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 2 ( v1.1)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for students who have a foundational working knowledge of PowerPoint, who wish to take advantage of the application's higher-level usability, security, collaboration, and distribution functionality. Overview In this course, you will use the advanced tools and features in PowerPoint to create and deliver engaging presentations.You will: Customize design templates. Add tables. Add charts. Work with media. Build advanced transitions and animations. Collaborate on a presentation. Customize the delivery of a presentation. Modify presentation navigation. Secure and distribute a presentation. Meetings, instruction, training, pitches; these are all a part of our daily lives. We are often called upon to deliver presentations with little notice, at multiple venues, and with varying requirements. And, some of these presentations include sensitive information that needs to be guarded. Given all the variables, it may seem an overwhelming task to deliver your content, on time, to all audiences, and to only those who need to see it. Oh, and by the way, you need to make it interesting, informative, and memorable. So, how do you do it? Without the help of a robust set of tools, it would be nearly impossible. But Microsoft© PowerPoint© provides you with a variety of such tools that can help you deliver content in nearly any situation, while saving time and effort. By taking advantage of these tools, you will be creating presentations that not only stand out from the crowd, but also don't consume all of your available time. Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will also enable you to access and effectively utilize many web-based resources provided with your Microsoft 365? subscription. Helpful notes throughout the material alert you to cases where the online version of the application may function differently from the primary, desktop version. This course may be a useful component in your preparation for the PowerPoint Associate (Microsoft 365 Apps and Office 2019): Exam MO-300 certification exam. Lesson 1: Customizing Design Templates Topic A: Modify Slide Masters and Slide Layouts Topic B: Modify the Notes Master and the Handout Master Topic C: Add Headers and Footers Lesson 2: Adding Tables Topic A: Create a Table Topic B: Format a Table Topic C: Insert a Table from Other Office Applications Lesson 3: Adding Charts Topic A: Create a Chart Topic B: Format a Chart Topic C: Insert a Chart from Microsoft Excel Lesson 4: Working with Media Topic A: Add Audio to a Presentation Topic B: Add Video to a Presentation Topic C: Add a Screen Recording Lesson 5: Building Advanced Transitions and Animations Topic A: Use the Morph Transition Topic B: Customize Animations Lesson 6: Collaborating on a Presentation Topic A: Review a Presentation Topic B: Co-author a Presentation Lesson 7: Customizing Presentation Delivery Topic A: Enhance a Live Presentation Topic B: Record a Presentation Topic C: Set Up a Slide Show Lesson 8: Modifying Presentation Navigation Topic A: Divide a Presentation into Sections Topic B: Add Links Topic C: Create a Custom Slide Show Lesson 9: Securing and Distributing a Presentation Topic A: Secure a Presentation Topic B: Create a Video or a CD

Microsoft PowerPoint for Office 365 (Desktop or Online) - Part 2 ( v1.1)
Delivered OnlineFlexible Dates
Price on Enquiry

CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Developed for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodologyAssess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deploymentApply advanced authentication and load balancing principles In this expert training course students will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, students will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare students for the Citrix Certified Expert in Networking (CCE-N) exam.This course includes a voucher to take the related exam (1Y0-440: Citrix Networking Assessment, Design, and Advanced Configuration) and earn your Citrix Certified Expert ? Networking (CCE-N) certification. Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirements User Segmentation Application Assessment Capabilities Assessment Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Advanced Load Distribution and Link Load balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new) Additional course details: Nexus Humans CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures: Security architects Cloud architects Network engineers and administrators System engineers and adminstrators Cloud security consumers Cloud application administrators IT managers Line of business managers Cisco integrators and partners Overview After taking this course, you should be able to: Describe public, private, and hybrid cloud models, concepts, and design Explain the concepts and components for securing cloud environments Describe Cisco security offerings for Amazon Web Services (AWS) Define methods to secure SaaS application usage The Introducing Cisco Cloud Consumer Security (SECICC) v1.0 course gives you a technical overview of basic concepts and components of the cloud, and the Cisco© solutions used to provide comprehensive security of your cloud-based environment. In this primarily lecture-based course, you?ll learn the basics from a cloud consumer perspective including securing cloud and Software as a Service (SaaS) application environments. This introductory course provides insights on using Cisco Stealthwatch? Cloud, Cisco CloudLock, Cisco Umbrella? and more to protect the user when using cloud-based applications. Introducing the Cloud Describe the Evolution of Cloud Computing Explain Cloud Service Models Explore Cloud Deployment Models Introducing Securing the Cloud Describe the Cisco Threat-Centric Approach to Network Security Describe Cloud Physical Environment Security Describe Cloud Network Infrastructure Security Explain Application Security Explore Cloud Management and API Security Describe Cisco Cloud-Based Security Solutions Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE) Describe Cisco CloudCenter for MultiCloud Management Describe Cisco Stealthwatch Describing Cloud Security Solutions Using AWS Identify AWS Security Offerings Identify Cisco Security Solutions in AWS Introducing Security in an SaaS Environment Describe SaaS Applications Describe SaaS Security Challenges Explain Cloud Access Security Broker Describe Cisco CloudLock Describe OAuth and OAuth Attacks Describe Cisco Advanced Malware Protection for Endpoints Describe Cisco Cloud Email Security Describe Cisco Umbrella Lab outline Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors Explore Cisco Security Solutions in AWS Marketplace Explore the Cisco CloudLock Dashboard and User Security Explore Cisco CloudLock Application and Data Security Explore Cisco Advanced Malware Protection (AMP) Endpoints Explore the Cisco Umbrella Roaming Client Additional course details: Nexus Humans Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introducing Cisco Cloud Consumer Security v1.0 (SECICC)
Delivered OnlineFlexible Dates
Price on Enquiry

BW362 SAP BW on SAP HANA

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Technology Consultants Overview Enables you to implement and maintain SAP BW powered by SAP HANA.Outlines advantages of the new SAP 'In-Memory' database foundation for SAP BW.Explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW.Introduces the new SAP architecture framework of LSA++ and provides guidelines on how to convert your existing EDW-architecture into this new concept.Explains native HANA modeling and how both, HANA information views as well as BW InfoProviders, can complement each other in so-called 'mixed scenarios'. In this course, students gain the knowledge to enable themselves to implement and maintain SAP BW powered by SAP HANA. The course explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW. Getting Started SAP HANA Basics SAP BW Basics SAP HANA BW Modeling Tools SAP HANA Native Modeling Migration to SAP BW on HANA Migration Strategies and Tools SAP BW Migration Cockpit BW on HANA Data Management Multi-Temperature Data Management Optimizing BW Data Management based on Dynamic Tiering and Non- Active Concept Optimizing BW Data Management based on Nearline-Storage Optimization Areas in BW on HANA HANA-Optimized Data Modeling: InfoCubes HANA-Optimized Data Modeling: Advanced DataStore-Objects HANA-Optimized Data Modeling: CompositeProviders HANA-Optimized Data Staging HANA-Optimized Analytic Manager HANA-Optimized Analysis Processes Modeling with SAPïs Reference Architecture LSA++ Review of Layered Scalable Architecture (LSA) From LSA to LSA++: Streamline Core Layers LSA++: Open Operational Data Store Layer (Open ODS Views) LSA++: Agile Data Mart & BW Workspace Layer Hybrid Modeling in Mixed Scenarios Generation of HANA-Views of BW InfoProviders Mixed Scenarios SAP HANA Live HANA-Optimized BI Content Data Provisioning into SAP HANA and SAP BW Overview of Data Provisioning Methods to SAP HANA SLT Replication into SAP HANA SLT Replication into SAP BW Operational Data Provisioning into SAP BW DB-Connect and Open Hub Destination Additional Enhancements of BW 7.40 InfoObject Enhancements Authorization Enhancements Process Chain Monitoring HANA-Optimized BW Search HANA-Optimized BW Planning Obsolete BW Object Types Mobile Enablement Enhancements SAP HANA vs. BW Accelerator Summary & Outlook New Transactions and BW on HANA Roadmap Additional course details: Nexus Humans BW362 SAP BW on SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BW362 SAP BW on SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BW362 SAP BW on SAP HANA
Delivered OnlineFlexible Dates
Price on Enquiry

55152AC Fundamentals of Active Directory

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for both novice and experienced IT professionals, Network Administrators new to Active Directory, Help Desk Personnel, Network Support Personal, Desktop Support Personal, Managers that oversee IT personnel, Developers that create products that interact with Active Directory and Exchange Administrators. Overview At Course Completion you will Understand the industry standards used in Active Directory and their importance. Recognize the functionality of Domain Controllers and Active Directory Replication mechanisms. Understand Forest, Domain and OU structure. Recognize and understand the role of Active Directory Sites. Skills needed to determine Domain Controller Server versions, Forest and Domain Functional levels. Describe authentication Mechanisms in Active Directory NTLM and Kerberos. Optimize and maintain Group Policy Objects (GPO) used in Active Directory. Understand the functioning of Active Directory Partitions and the Global Catalog. Fundamental understanding of using Active Directory with Cloud Services like Federation Services and Azure. This one-day instructor-led class is intended for IT professionals and IT managers who work with Active Directory or supervise IT professionals that work with Active Directory. Additionally, IT professionals that work with products that integrate with Active Directory such as Exchange can also benefit. In this course, students learn how and why Active Directory was developed by Microsoft, the fundamental architecture, basic design, management, as well as security and fundamentals for cloud integration with services like Azure. Module 1: Principles of Active Directory Development of Active Directory What is X.500 LDAP Active Directory Architecture NTLM and Kerberos Managing operating systems with GPOs, Workplace Join and InTune Active Directory Groups: Domain Local, Global and Universal Using and Managing Active Directory Domain Controllers Forest and Domain Functional Levels Introduction to Active Directory Partitions and the Global Catalog Basic Forest Structure and Design Basic Domain Structure and Design Basic OU Structure and Design Module 2: Fundamentals of WAN management with Active Directory Understanding AD Sites and WAN Traffic Management Basic AD Sites and Logon Traffic Introduction to AD Sites and Replication Traffic Bridgehead Servers and Site Link Objects Site Aware Applications Module 3: Introduction to Active Directory Group Policy Objects Introduction to Group Policy Administrative Templates Fundamental Concepts of GPO Scripts Introduction to Creating and Using GPOs Principles of Managing Multiple GPOs Block, Enforce and Inheritance GPOs and Active Directory Versions Introduction to Controlling and Installing Software with GPOs, SRP and App Locker Module 4: Principles of Active Directory Integration Active Directory and ?The Cloud? User Principle Names, Authentication and Active Directory Federated Services Conclusion, Additional Resources, Labs and Exercises Additional course details: Nexus Humans 55152AC Fundamentals of Active Directory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55152AC Fundamentals of Active Directory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55152AC Fundamentals of Active Directory
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Media Essentials for IT Business Decision Makers

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for Business Leaders, including managers/supervisors in the following roles: Developer Architect Video Operator Overview In this course, you will learn to: Articulate the essential terms and concepts fundamental to video compression and distribution Describe the four fundamental stages of video streaming workflows: ingest, process, store and deliver Explain the importance of security in the AWS Cloud and how it is applied in video streaming workflows Analyze video streaming workflow diagrams using AWS services, based on simple to complex use cases Describe some of the key variables that influence workflow decisions Recognize how other AWS services for compliance, storage, and compute, interact with AWS Media Services in video streaming workflows and the functions they perform Describe strategies to test or prototype workflows to mitigate risk and cost impacts and optimize video streaming workflows Use the AWS Management Console to build and run simple video streaming workflows for live and video-on-demand content Recognize the automation and data analytics available for Media Services when used with AWS AI and explore media-specific use cases for these services Identify the next steps in exploring migration to the cloud for one or more Media Services This course covers the media and cloud fundamentals that will empower you to develop a cloud migration strategy for media workflows in support of business goals. The course covers important concepts related to video processing and delivery, the variables that can impact migration decisions, and real-world examples of hybrid and cloud use cases for AWS Media Services. It also introduces security, artificial intelligence, and analytics concepts to help you consider how AWS Media Services fit into your overall cloud strategy. Module 1: Important video concepts Video Metrics Video Compression Video Distribution Major Protocols Used in Video Streaming Module 2: Anatomy of streaming workflows Ingest Process Store Deliver Module 3: Using AWS services in media workflows video-on-demand (VOD) Introduction to AWS Media Services Security Variables Impacting Workflow Design VOD Simple Use Cases VOD Advanced Use Cases Lab 1: Build and run a simple video streaming workflow for VOD content Module 4: Using AWS services in media workflows live streaming Challenges of Live Streaming Live Streaming Simple Use Cases Live Streaming Advanced Use Cases Lab 2: Build and run a simple video streaming workflow for live content Module 5: Optimizing Workflows Cost Considerations Mitigating Risk Monitoring and Automation Exploring Migration Options Additional course details: Nexus Humans AWS Media Essentials for IT Business Decision Makers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Media Essentials for IT Business Decision Makers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Media Essentials for IT Business Decision Makers
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Security Specialist (ECSS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Security Specialist (ECSS)
Delivered OnlineFlexible Dates
Price on Enquiry