• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

153 Powershell courses

CEH: Learn Ethical Hacking From A-Z: Beginner To Expert

4.5(3)

By Studyhub UK

Welcome to the Learn Ethical Hacking From A-Z: Beginner To Expert course! This practical course was designed for beginners or those with no prior experience or knowledge in hacking or cybersecurity. The goal of this course is to teach you not only what and how hackers do but also how to hack systems like a pro and win the cat-and-mouse game by securing systems like a professional security expert.   We take you from the beginnings of ethical hacking to mastery by combining practical work with good theoretical training, providing you with the training you need to hack and secure against a hack. While theory is important, we recognise that it can sometimes be boring and uninspiring. As a result, this course is jam-packed with examples that you can use, making the lessons more fun and engaging.    This practical approach begins with a lesson on Networking Basics and how to install the necessary software (Windows, Linux, and Mac OSX) before diving right into hacking. Throughout, you will examine and exploit many systems ranging from simple websites to large networks, as well as hacking servers and clients. In addition to hacking, you'll learn how to execute effective penetration testing procedures.   This approach provides you with the fundamental knowledge required not only to hack any given system but also to secure it, with each lesson covering both sides of the coin. It's a complete course, so you won't have to look elsewhere to learn. Don't waste any more time. Enrol today and be on your way to becoming a hacking expert.   Learning Outcomes: Upon completion of the Learn Ethical Hacking From A-Z course, you will be able to: Understand the fundamentals of ethical hacking and its applications. Build a secure hacking lab for practical experimentation and learning. Master essential networking concepts for effective penetration testing. Develop proficiency in Linux, Python, Bash, and PowerShell for hacking tasks. Learn techniques to remain anonymous and protect your online identity. Gain expertise in hacking into WIFI networks and securing them. Conduct passive and active reconnaissance for effective information gathering. Acquire skills in website and web application hacking for vulnerability assessment.   Who is this course for: This Learn Ethical Hacking From A-Z course is perfect for: Tech enthusiasts eager to expand their knowledge in ethical hacking. Individuals aspiring to start a career in cybersecurity and ethical hacking. IT professionals seeking to enhance their skill set in cybersecurity. Students pursuing computer science or related fields interested in ethical hacking. Security professionals looking to broaden their expertise in penetration testing.   Why buy this Learn Ethical Hacking From A-Z course? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one-to-one assistance when needed Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript immediately Easily learn the skills and knowledge from the comfort of your home   Career Path: Our Learn Ethical Hacking From A-Z course will prepare you for a range of careers, including: Junior Penetration Tester: £25,000 - £50,000 Annually Ethical Hacker: £40,000 - £100,000 Annually Security Consultant: £50,000 - £90,000 Annually Security Engineer: £60,000 - £110,000 Annually Senior Penetration Tester: £70,000 - £120,000 Annually Chief Information Security Officer (CISO): £100,000 - £180,000 Annually   Certification After studying the course materials of the Learn Ethical Hacking From A-Z: Beginner To Expert course, there will be a written assignment test which you can take either during or at the end of the course. After passing the test, you will have a range of certification options. A CPD Accredited PDF Certificate costs £4.99, while a CPD Accredited Hardcopy Certificate is £8.00. We also offer transcript services. A PDF Transcript costs £4.99, and a Hardcopy Transcript is £9.99. Select according to your needs, and we assure timely delivery of your chosen certificate.   Requirements This professionally designed Learn Ethical Hacking From A-Z: Beginner To Expert course does not require you to have any prior qualifications or experience. It is open to everyone, and you can access the course from anywhere at any time. Just enrol and start learning!

CEH: Learn Ethical Hacking From A-Z: Beginner To Expert
Delivered Online On Demand11 hours 51 minutes
£10.99

AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students for AZ-600: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub are interested in becoming Azure Stack Hub operators who provide cloud services to end users or customers from within their own datacenter using Azure Stack Hub. Azure Stack Hub operators responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Stack Hub infrastructure. They also offer hybrid cloud resources and requested services and manage infrastructure as a service (IaaS) and platform as a service (PaaS). Overview Prepare for Azure Stack Hub deployment Manage infrastructure certificates for Azure Stack Hub Manage Azure Stack Hub registration Configure an Azure Stack Hub home directory Provision a service principal for Azure Stack Hub Recommend a business continuity disaster recovery (BCDR) strategy Manage Azure Stack Hub by using privileged endpoints Manage Azure Stack Hub Marketplace Offer App Services and Event Hub resource providers Manage usage and billing This course teaches Azure administrators and Azure Stack Hub operators how to plan, deploy, package, update, and maintain the Azure Stack Hub infrastructure. Lessons include deploying Azure Stack Hub, managing the Azure Stack Hub Marketplace, offering App Services and Event Hub resource providers, managing Azure Stack Hub registration, and maintaining system health. Overview of Azure Stack Hub Azure Stack Hub Datacenter integration Azure Stack Hub PowerShell Module review questions Provide Services Manage Azure Stack Hub Marketplace Offer an App Services resource provider Offer an Event Hubs resource provider Offer services Manage usage and billing Module review questions Implement Data Center Integration Prepare for Azure Stack Hub deployment Manage Azure Stack Hub registration Module review questions Manage Identity and Access for Azure Stack Hub Manage multi-tenancy Manage access Module review questions Manage the Azure Stack Hub Infrastructure Manage system health Azure Monitor on Azure Stack Hub Plan and configure business continuity and disaster recovery Manage capacity Update infrastructure Manage Azure Stack Hub by using privileged endpoints Module review questions Additional course details: Nexus Humans AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-600T00 Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Hub
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Data Center Automation with vRealize Orchestrator and vSphere PowerCLI

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced vSphere administrators who want to use available tools to automate day-to-day tasks. Overview By the end of the course, you should be able to meet the following objectives:Describe the features and benefits of automation in a vSphere environmentUnderstand the role of the vSphere Web services API in automationUse the Managed Object Browser to view the structure of the vSphere Web services API and theVMware vCenter Server? inventoryUse vSphere PowerCLI to deploy and manage virtual machines and virtual infrastructureRun and manage vRealize Orchestrator workflows from the libraryDesign, develop, and run custom, reusable vRealize Orchestrator workflowsIncorporate JavaScript into vRealize Orchestrator workflowsSelect the appropriate tool for automating tasks in vCenter Server This course equips experienced administrators with the knowledge to use the automation tools that all vSphere customers have access to. Students learn how to automate administration tasks with VMware vSphere© PowerCLI? and VMware vRealize© Orchestrator?. Course Introduction Introductions and course logistics Course objectives Automation in vSphere Identify the features and the advantages of automation List the tools used to automate vCenter Server tasks vSphere API Identify the function of an API Recognize the components of VMware vSphere© API Understand how an API is consumed View objects and invoke methods with the Managed Object Browser vSphere PowerCLI Basics Connect vSphere PowerCLI to vCenter Server systems and VMware ESXi? hosts Understand vSphere PowerCLI concepts Use vSphere PowerCLI cmdlets Deploy and manage virtual infrastructure Advanced vSphere PowerCLI and the vSphere API Explore the vSphere object model Capture code with Onyx Use vSphere API documentation to analyze vCenter Server actions View objects with the Get-View cmdlet vSphere PowerCLI Use Cases Manage host networking Create a distributed switch Migrate hosts Create reports vRealize Orchestrator Basics Identify workflow components Run and manage library workflows Edit a workflow Build and schedule a simple workflow Debug a workflow vRealize Orchestrator Advanced Identify and use advanced vRealize Orchestrator workflow elements Implement vRealize Orchestrator workflow nesting Use variable types in a workflow Use JavaScript to create complex workflows Incorporate an Oynx script in a workflow vRealize Orchestrator Use Cases Create automation workflows that map to real-world scenarios Create reporting workflows that map to real-world scenarios Create migration workflows that map to real-world scenarios Create provisioning workflows that map to real-world scenarios vRealize Orchestrator PowerCLI Plug-In Invoke external scripts and pass workflow parameters as script inputs Generate new vRealize Orchestrator actions from Windows PowerShell and vSphere PowerCLI scripts and cmdlets Browse snap-ins and their associated cmdlets in the vRealize Orchestrator workflow editor vRealize Orchestrator Integration Understand the connectivity options for vRealize Orchestrator Differentiate between north-facing and south facing APIs List the APIs and their use cases Run a workflow through a REST call Guest Operations with vRealize Orchestrator and vSphere PowerCLI Use the most appropriate tools to perform guest operations Software Development Process & Tools Understand the software development lifecycle Understand version control system tools Map the correct tools to vRealize Orchestrator and vSphere PowerCLI

VMware Data Center Automation with vRealize Orchestrator and vSphere PowerCLI
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA PenTest+ (Ethical Hacking)

5.0(10)

By Apex Learning

Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00

CompTIA PenTest+ (Ethical Hacking)
Delivered Online On Demand10 hours 48 minutes
£12

Windows 10 Pro Complete Training

5.0(10)

By Apex Learning

Overview This comprehensive course on Windows 10 Pro Complete Training will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Windows 10 Pro Complete Training comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test, which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Windows 10 Pro Complete Training. It is available to all students, of all academic backgrounds. Requirements Our Windows 10 Pro Complete Training is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 43 lectures • 04:21:00 total length •Course Overview: 00:05:00 •Easily download ISO Images: 00:10:00 •Lab - Creating a Virtual Install of Windows 10 Pro Using VirtualBox: 00:16:00 •Lab - Create Virtual Install of Server 2016 Full GUI Using VirtualBox: 00:13:00 •Taking a Snapshot of Your Current configuration: 00:04:00 •Perform a Windows 10 Upgrade for Free: 00:09:00 •Preparing Your Network for Active Directory: 00:10:00 •Lab - Prepare Server 2016 for Promotion to a Domain Controller: 00:10:00 •Lab - Promote Server 2016 to a Domain Controller: 00:09:00 •Lab - Join a Windows 10 Workstation to a Microsoft Domain: 00:15:00 •Installing WDS on a Windows Server Using VirtualBox: 00:18:00 •Deploy a Windows 10 Client Using WDS: 00:09:00 •lab - Create an Unattended Install of Windows 10 Pro: 00:17:00 •Turn the Windows 10 Firewall Off or On: 00:01:00 •Allow an app through the Windows 10 firewall: 00:05:00 •Add a rule or port to a Windows 10 firewall: 00:05:00 •Allow PING for Windows 10: 00:04:00 •Disable the UAC User Account Control in Windows 10: 00:02:00 •Using netsh to Manage the Windows Firewall: 00:05:00 •Using Powershell to Gather Firewall Information: 00:04:00 •Change your IP address in Windows 10: 00:05:00 •Add a second IP address in Windows 10: 00:09:00 •Enable System Restore on Windows 10: 00:03:00 •Create a System Restore point on Windows 10: 00:02:00 •Recover using System Restore on Windows 10: 00:04:00 •Fix TCPIP Corruption in Windows 10 Using Netsh: 00:02:00 •Repair Windows 10 with System File Checker (SFC): 00:03:00 •Repair Windows 10 System files offline Using SFC: 00:04:00 •Use ReadyBoost to Speed up Windows 10: 00:05:00 •Reset Your Network Adapter: 00:06:00 •Lab - Troubleshooting Internet Connectivity: 00:16:00 •NSLookup: 00:05:00 •Windows Reliability Monitor: 00:04:00 •Disable the Lock Screen on Windows 10: 00:03:00 •Disable Superfetch via Windows Services: 00:03:00 •Disable Screen Saver in Windows 10 using REGEDIT: 00:02:00 •Disable Windows 10 Automatic Logoff For Inactivity: 00:02:00 •Overview of the Windows 10 Shutdown and Restart buttons: 00:01:00 •Rename your Windows 10 computer: 00:01:00 •Change the date and time in Windows 10: 00:03:00 •Create a new local user in Windows 10: 00:04:00 •Rearm the 30-day evaluation Period for Windows 10 Pro: 00:03:00 •Assignment - Windows 10 Pro Complete Training: 00:00:00

Windows 10 Pro Complete Training
Delivered Online On Demand4 hours 21 minutes
£12

Diploma In Microsoft Azure 2017

4.7(160)

By Janets

Elevate your skills with the Diploma in Microsoft Azure 2017 – a comprehensive program offering in-depth insights and hands-on training in the latest cloud computing technologies. Master the intricacies of Microsoft Azure, stay ahead in the ever-evolving tech landscape, and unlock new career opportunities. Enroll now for a transformative learning experience that aligns with the cutting-edge advancements of 2017.

Diploma In Microsoft Azure 2017
Delivered Online On Demand3 weeks
£25

20742 Identity with Windows Server 2016

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to:Install and configure domain controllers.Manage objects in AD DS by using graphical tools and Windows PowerShell.Implement AD DS in complex environments.Implement AD DS sites, and configure and manage replication.Implement and manage Group Policy Objects (GPOs).Manage user settings by using GPOs.Secure AD DS and user accounts.Implement and manage a certificate authority (CA) hierarchy with AD CS.Deploy and manage certificates.Implement and administer AD FS.Implement and administer Active Directory Rights Management Services (AD RMS).Implement synchronization between AD DS and Azure AD.Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS

20742 Identity with Windows Server 2016
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Workspace ONE: UEM Troubleshooting [V22.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Workspace ONE administrators, account managers, solutions architects, solutions engineers, sales engineers, technical support engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Summarize the basic troubleshooting methodologies Outline common troubleshooting techniques in the Workspace ONE UEM console Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console Summarize common troubleshooting strategies for Workspace ONE UEM managed devices Outline common application management troubleshooting techniques in the Workspace ONE UEM console Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE Assist™ In this two-day course, you learn to investigate, analyze, and determine issues that might occur with all the different components of VMware Workspace ONE© UEM. Troubleshooting is the backbone of service maintenance and management. To effectively troubleshoot product issues, administrators must understand how product services communicate and function. This in turn helps optimize service and software health management. Course Introduction Introductions and course logistics Course objectives Fundamentals of Troubleshooting Workspace ONE UEM Outline software troubleshooting logic and support methods Summarize the main process flows for the Workspace ONE UEM components Explain the importance of Workspace ONE UEM process flows for troubleshooting Identify different Workspace ONE UEM log files Workspace ONE UEM Console Troubleshooting Outline the best practices for troubleshooting Workspace ONE UEM console issues Identify common group management and assignment-related issues Outline common issues for Workspace ONE UEM console roles and system settings Understand how analytic events can be used to identity platform errors Summarize the steps for collecting and analyzing Workspace ONE UEM console logs Integration Troubleshooting Outline the common enterprise integrations in Workspace ONE UEM Outline common troubleshooting techniques for the VMware AirWatch© Cloud Connector? Troubleshoot issues related to Directory Services integration Identify directory user and groups synchronization issues Troubleshoot issues related to certificate authority integration Explain VMware Workspace ONE© Access? integration and VMware Workspace ONE© Intelligent Hub troubleshooting techniques Endpoint Troubleshooting Compare the endpoint connection topologies in Workspace ONE UEM Outline useful tools and resources for endpoint troubleshooting Summarize the best practices for device enrollment troubleshooting Explain device connectivity troubleshooting techniques Understand how to identify and resolve profile-related issues Identify common compliance policy issues and potential root causes Applications Troubleshooting Explain the different scoping questions for troubleshooting applications Review application management configurations Summarize the general tools and resources for application troubleshooting Describe the general logic of troubleshooting public applications Understand internal application issues and potential causes Explain purchased application troubleshooting techniques Unified Access Gateway And Edge Services Troubleshooting Review Unified Access Gateway architecture and edge service workflows Understand Unified Access Gateway general configurations Explain how to utilize Unified Access Gateway related troubleshooting tools and resources Identify and resolve common issues for Content Gateway on Unified Access Gateway Summarize troubleshooting techniques for VMware Workspace ONE© Tunnel? on Unified Access Gateway Email Troubleshooting Review different email architecture and workflows Summarize common errors associated with email profiles Identify tools and resources for email troubleshooting Discuss troubleshooting techniques for VMware AirWatch© Secure Email Gateway? on Unified Access Gateway Outline PowerShell integration issues and techniques to address them Additional Troubleshooting Tools Describe how the Self-Service Portal helps administrators and empowers end-users to resolve issues Understand how Workspace ONE Assist can help endpoint troubleshooting

VMware Workspace ONE: UEM Troubleshooting [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Developed for experienced IT Professionals working with Citrix Virtual Apps and Desktops 7.1x. Potential students include administrators, engineers, and architects responsible for the end user workspace, provisioning services environment, and overall health and performance of the solution. Overview How to configure Workspace Environment Management to improve the end user environment and virtual resource consumption Understand Zones in Citrix Virtual Apps and Desktops 7.1x and how to account for user and desktop locations and optimal connection and registration How to build and manage App Layers to minimize image sprawl with Citrix Virtual Apps and Desktops 7.1x Understand and configure HDX channels and protocols for improved performance delivering multimedia and data over network connections Get more value out of your Citrix Virtual Apps and Desktops 7.1x investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, and advanced features. Students leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. Students will gain the skills to improve logon times, user personalization, and resource performance through Workspace Environment Management. Also, learn to optimize management of your app and desktop images by building and combining App Layers. End the course by learning to install, configure, and manage Provisioning Services in accordance with leading practices.This course includes a voucher to take the related exam (1Y0-311 Citrix XenApp and XenDesktop 7.15 Advanced Administration) and earn your Citrix Certified Professional - Virtualization (CCP-V) certification. Implementing Redundancy and Scalability StoreFront and Citrix Gateway Site Infrastructure Machines Running the Virtual Delivery Agent Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones Managing StoreFront Store Subscriptions in a Multi- Location Environment StoreFront and Citrix ADC Branding Implementing Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Implementing Advanced Authentication Methods Multi-factor Authentication - RADIUS & OTP Multi-factor Authentication - Smart Card Authentication Federated Authentication - ADFS, SAML, and FAS Improving App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Securing Machines Running the Virtual Delivery Agent TLS to VDA Encryption GPOs and Citrix Policies Image Management Introduction to Troubleshooting Troubleshooting Methodology Process (Standard Slide) Resource Tools and Utilities Introduction to PowerShell Troubleshooting Access Issues Troubleshooting StoreFront Troubleshooting Citrix Gateway Troubleshooting Delivery Controller Issues Validating FMA Services Troubleshooting VDA Registration Issues Troubleshooting VDA Registration Troubleshooting HDX Connection Issues Troubleshooting HDX Connections Introduction to App Layering App Layering Introduction Architecture and How it Works Creating an OS Layer The OS Layer Creating a Platform Layer The Platform Layer Creating App Layers The App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimization Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Environments Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Windows Server 2016 Complete Video Training

4.3(43)

By John Academy

Description: Windows Server 2016 is a server operating system that is designed to handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions more efficiently. Developed by Microsoft, it is a part of the Windows NT family of operating systems. With the proper knowledge of Windows Server 2016, you can able to handle your office environment proficiently. The Windows Server 2016 Complete Video Training course is for you if you want to master the features and functions of Windows Server 2016. Apart from this, the bundled video course will help you to prepare for the various exam of Microsoft Windows Server 2016 MCSA certification. The course is divided into four sections where each section helps you with a specific exam and the practical use of Windows Server. The 70-740 Exam section teaches you the methods of installing Windows Server in Host and Compute Environments along with the other features such as storage. On the other hand, the 70-741 series teaches you how to do networking with Windows server including implementing Domain Name system, etc. Next, you will learn about the functionality of Windows Server in the 70-742 section that focuses on the Web Application proxy implementations, Microsoft Azure AD and Directory Synchronization, etc. Finally, in the 70-744 part, you will know how to secure your Windows server. In short, the Windows Server 2016 Complete Video Training course helps you to understand all the necessary information skills if you want to use Windows Server 2016. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Windows Server 2016 Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Windows Server 2016 Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installing Windows Servers in Host and Computer Environments Determining Windows Server 2016 Installation FREE 00:54:00 Installing Windows Server 2016 Core and Nano Editions 01:35:00 Managing Windows Installations with Windows PowerShell 00:01:00 Create, Manage, and Maintain Windows Images to Deploy 00:33:00 Implementing Local and Enterprise Storage Solutions Managing Disks and Volumes in Windows Server 2016 01:00:00 Implementing and Managing Storage Spaces 00:45:00 Configuring Data Deduplication 00:39:00 Understanding Various Types of Storage 00:15:00 Fibre Channel, iSCSI, and Fibre Channel over Ethernet 00:18:00 Understanding iSNS, DCB, and MPIO 00:09:00 Configuring File and Folder Sharing in Windows Server 2016 00:21:00 Implementing Hyper-V Virtualization Installing Hyper-V Virtualization 00:26:00 Configuring Storage and Networking on Hyper-V Hosts 00:38:00 Configuring and Managing Virtual Machines 00:34:00 Implementing Windows Containers Understanding Windows Server and Hyper-V Containers 00:17:00 Deploying Windows Server and Hyper-V Containers 00:08:00 Using Docker to Install, Configure, and Manage Containers 00:12:00 Implementing High Availability Overview of High Availability and Disaster Recovery 00:55:00 Implementing Network Load Balancing 00:25:00 Planning and Configuring Failover Clustering 01:10:00 Maintaining a Failover Cluster 00:15:00 Troubleshooting Failover Clustering 00:11:00 Integrating Failover Clustering and Hyper-V 00:23:00 Configuring Site Availability 00:12:00 Maintaining and Monitoring Server Environments Windows Server Update Services 00:33:00 Windows PowerShell Desired State Configuration (DSC) 00:10:00 Windows Server 2016 Monitoring Tools 00:43:00 Plan and Implement IPv4 and IPv6 Networks Plan and Implement IP Addressing Schemes for IPv4 Networks FREE 01:31:00 Configuring IPv4 Hosts 00:18:00 Managing and Troubleshooting IPv4 Connectivity 00:35:00 Implementing IPv6 for Network Hosts 00:20:00 Implementing IPv6 Transitioning and Coexistence 00:16:00 Installing and Configuring DHCP Overview of the DHCP Server Role 00:16:00 Managing and Troubleshooting DHCP 00:48:00 Installing and Configuring DNS Implementing DNS Servers 00:27:00 Creating and Configuring DNS Zones 00:52:00 Understanding Active Directory Integration 00:23:00 Configuring Advanced DNS Settings 00:41:00 Implementing and Managing IP Address Management Overview of IPAM 00:15:00 IPAM Deployment 00:49:00 Implementing Remote Access Remote Access Overview 00:27:00 Implementing the Web Application Proxy 00:08:00 Planning and Implementing VPNs 00:31:00 Overview of DirectAccess 00:21:00 Implementing DirectAccess 00:27:00 Installing and Configuring Branch Office Networking Configuring Networking for Branch Offices 00:39:00 Implementing Distributed File Systems 00:44:00 Implementing BranchCache 00:19:00 Implementing Advanced Networking Features Implementing Networking Features for High Performance 00:23:00 Implementing Hyper-V Advanced Networking Features 00:13:00 Introduction to Software-Defined Networking 00:10:00 Overview of Network Virtualization 00:06:00 Installing and Configuring Domain Controllers Overview of Active Directory Domain Services FREE 01:00:00 Overview of Domain Controllers 00:30:00 Deploying Domain Controllers 1 01:00:00 Managing Active Directory Objects Overview of AD DS Object Management 00:23:00 Managing User Accounts 01:07:00 Managing Groups 01:06:00 Managing Computer Accounts 00:20:00 Managing Organizational Units 00:41:00 Securing Active Directory Domain Services Securing Domain Controllers 00:33:00 Implementing Account Security 00:48:00 Auditing AD DS 00:26:00 Configuring Managed Service Accounts 00:14:00 Working with Complex AD DS Infrastructures Overview of Advanced AD DS Deployments 00:20:00 Deploying a Distributed AD DS Environment 00:45:00 Overview of AD DS Replication 00:12:00 Configuring AD DS Sites 00:38:00 Implementing Group Policy Overview of Group Policy 00:39:00 Creating and Configuring GPOs 00:56:00 Monitoring and Troubleshooting Group Policy 00:18:00 Security Management Using Group Policy 00:54:00 Managing User Environments 00:22:00 Understanding Microsoft Azure AD and Directory Synchronization Planning Directory Synchronization 00:24:00 Implementing Azure AD Connect 00:12:00 Managing Identities with Directory Synchronization 00:14:00 Monitoring and Recovering AD DS Monitoring AD DS 00:27:00 Database Management 00:07:00 Backup and Recovery in AD DS 00:21:00 Implementing Active Directory Certificate Services Overview of Public Key Infrastructure and AD CS 00:17:00 Deploying Certificate Authority Hierarchy 00:19:00 Administering Certificate Authorities 00:13:00 Deploying and Managing Certificates 00:26:00 Managing Revocation and Distribution 00:07:00 Configuring Certificate Recovery 00:08:00 Implementing Active Directory Federation Services (AD FS) Overview of AD FS 00:17:00 Planning and Deploying AD FS 00:35:00 Overview of Web Application Proxy 00:08:00 Implementing Active Directory Rights Management Services Overview of AD RMS 00:14:00 Deploying AD RMS 00:14:00 Protecting Content with AD RMS 00:09:00 Introduction to Attacks, Breaches, and Detection Understanding Types of Attacks FREE 00:33:00 Detecting Security Breaches 00:06:00 Using Sysinternals Tools 00:30:00 Protecting Users and Workstations User Rights and Privileges 01:28:00 Working with Computer and Service Accounts 00:19:00 Protecting User Credentials 00:20:00 Using Privileged Access Workstations 00:12:00 Managing Administrative Access Understanding and Deploying JEA 00:32:00 Using Enhanced Security Administrative Environments (ESAE) Forests 00:12:00 Using Microsoft Identity Manager 00:08:00 Using JIT Administration and PAM 00:16:00 Configuring Anti-Malware and Patch Management Configuring and Managing Windows Defender 00:18:00 Restricting Software 00:28:00 Using Device Guard 00:12:00 Patch Management with WSUS 00:29:00 Auditing and Advanced Threat Analytics Configuring Auditing for Windows Server 2016 00:21:00 Advanced Auditing and Management 00:42:00 Deploying and Configuring ATA 00:15:00 Deploying and Configuring Operations Management Suite 00:07:00 Securing the Infrastructure Secure the Virtualization Infrastructure 00:15:00 Deploying Security Baselines 00:20:00 Deploying Nano Server 00:08:00 Configuring Data Protection Planning and Implementing File Encryption 00:29:00 Planning and Implementing BitLocker 00:32:00 Advanced File Server Management Using File Server Resource Manager 00:58:00 Implementing Classification and File Management Tasks 00:16:00 Working with Dynamic Access Control 00:39:00 Securing the Network Infrastructure Using the Windows Firewall with Advanced Security 00:33:00 Datacenter Firewall 00:08:00 Utilizing IP Security 00:29:00 Configuring Advanced DNS Settings 00:42:00 Monitoring Network Traffic 00:09:00 Securing SMB Traffic 00:07:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Windows Server 2016 Complete Video Training
Delivered Online On Demand48 hours
£22