• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37408 RES courses delivered Online

VMware vSphere: Operate, Scale and Secure [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority

VMware vSphere: Operate, Scale and Secure [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Red Hat Enterprise Linux Diagnostics and Troubleshooting course is aimed at senior system administrators who wish to learn more about troubleshooting. Overview As a result of attending this course, students should be able to analyze the operational state of computer systems and identify potential issues. When problems appear, students will be able to successfully resolve the issue, returning it to a secure and stable working condition. Students should be able to demonstrate the following skills: Diagnostic and analysis procedures Preventive maintenance planning and implementation System recovery using proven tools and techniques This course enriches your skills by providing the tools and techniques that you need to successfully diagnose, and fix, a variety of potential issues. You will work through hands-on problems in various subsystems to diagnose and fix common issues.You will learn develop the skills to apply the scientific method to a structured form of troubleshooting. You will then apply this approach in troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course, you will be empowered to complete various comprehensive review labs to test your skills.This course covers the same material as RH342, but includes the Red Hat Certified Specialist in Linux Diagnostics and Troubleshooting exam (EX342) Introduction to troubleshooting Describe a generalized strategy for troubleshooting. Take proactive steps to prevent small issues Prevent small issues from becoming large problems by employing proactive system administration techniques. Troubleshoot boot issues Identify and resolve issues that can affect a system's ability to boot. Identify hardware issues Identify hardware problems that can affect a system?s ability to operate. Troubleshoot storage issues Identify and fix issues related to storage. Troubleshoot RPM issues Identify and fix problems in, and using, the package management subsystem. Troubleshoot network issues Identify and resolve network connectivity issues. Troubleshoot application issues Debug application issues. Deal with security issues Identify and fix issues related to security subsystems. Troubleshoot kernel issues Identify kernel issues and assist Red Hat Support in resolving kernel issues. Red Hat Enterprise Linux Diagnostics and Troubleshooting comprehensive review Practice and demonstrate knowledge and skills learned in Red Hat Enterprise Linux Diagnostics and Troubleshooting. Additional course details: Nexus Humans Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Linux Diagnostics and Troubleshooting with Exam (RH343)
Delivered OnlineFlexible Dates
Price on Enquiry

WM156G IBM MQ V9.1 System Administration (using Windows for labs)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who require the skills to administer IBM MQ. Overview After completing this course, you should be able to: Describe the IBM MQ deployment options Create and manage queue managers, queues, and channels Use the IBM MQ sample programs and utilities to test the IBM MQ network Configure distributed queuing Configure MQ client connections to a queue manager Define and administer a queue manager cluster Administer Java Message Service (JMS) in MQ Implement basic queue manager restart and recovery procedures Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network Manage IBM MQ security Monitor the activities and performance of an IBM MQ system This course is also available as self-paced virtual (e-learning) course IBM MQ V9.1 System Administration (ZM156G). This option does not require any travel.This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the instructor-led lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance. Introducing IBM MQ Exercise Getting started with IBM MQ Working with IBM MQ administration tools Exercise Working with IBM MQ administration tools Configuring distributed queuing Exercise Implementing distributed queuing Managing clients and client connections Exercise Connecting an IBM MQ client Advanced IBM MQ client features Working with queue manager clusters Exercise Implementing a basic cluster Publish/subscribe messaging Exercise Configuring publish/subscribe message queuing Implementing basic security in IBM MQ Exercise Controlling access to IBM MQ Securing IBM MQ channels with TLS Exercise Securing channels with TLS Authenticating channels and connections Exercise Implementing connection authentication Supporting JMS with IBM MQ Diagnosing problems Running an IBM MQ trace Backing up and restoring IBM MQ messages and object definitions Using a media image to restore a queue Backing up and restoring IBM MQ object definitions High availability Monitoring and configuring IBM MQ for performance Monitoring IBM MQ for performance Monitoring resources with the IBM MQ Console Additional course details: Nexus Humans WM156G IBM MQ V9.1 System Administration (using Windows for labs) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM156G IBM MQ V9.1 System Administration (using Windows for labs) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM156G IBM MQ V9.1 System Administration (using Windows for labs)
Delivered OnlineFlexible Dates
Price on Enquiry

BA02 - Strategic Business Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with business analysts Overview Learn about the components of Strategic Business Analysis. Understand the importance of defining the business need correctly and pursuing a thorough analysis of the internal and external environments of the enterprise before choosing the solution. Shortcutting the pre-analysis work discussed in this course often results in delivering solutions that are misaligned to the enterprise strategy and to the expectations and needs of the business. Learn how to avoid the pitfall of jumping to a solution prior to a solid understanding of the opportunity or problem needing to be addressed. This course is aimed for experienced practitioners who desire a clear understanding of Strategic Business Analysis, who would like to understand what comprises this work, and the objectives for performing it. Foundational Concepts Components of business analysis Business analysis competencies IIBA/PMI and the goals of a professional association Purpose for having a BA standard Exercise: Review the case study Introduction to Strategy Analysis Definition and purpose of Strategy Analysis The timing of Strategy Analysis Identifying stakeholders and the business need Discussions: Strategy analysis in your organization, When business needs are not clearly defined, and Strategy Analysis and the business analyst Exercises: Describe Strategy Analysis, Identify Roles/Responsibilities, and Identify the business need Analyze the Current State environment The importance of analyzing Current State Understanding Business Architecture Techniques for analyzing Current State Define the Future State Future State description Assessing impacts to business architecture Determining Solution Scope Discussions: Managing expectations with stakeholders, Capturing current capabilities, and How to approach acquiring capabilities Assess Risks Identifying risks Risk Tolerance/Categories/risk responses The concept of positive risk Techniques for identifying risks Discussions: Who is responsible for identifying risks? Who captures positive risks today? Exercise: Identify Risks Define the Change Strategy Defining change strategy Components of change strategy Solution scope, enterprise readiness and change Techniques for defining a change strategy Developing a Business Case The purpose of a business case Business case components Building a convincing business case Determining the Recommended Solution Packaging the business case Reviewing the business case with stakeholders Discussions: Evaluating project proposals and anticipating questions for the business case review Exercise: Create a business case Additional Resources Helpful links for obtaining additional business analysis information Additional course details: Nexus Humans BA02 - Strategic Business Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA02 - Strategic Business Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA02 - Strategic Business Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS. Overview After successfully completing this course, you should be able to: Restrict traffic flow within a VLAN. Manage dynamic VLAN registration. Tunnel Layer 2 traffic through Ethernet networks. Review the purpose and operations of a spanning tree. Implement multiple spanning-tree instances in a network. Implement one or more spanning-tree instances for a VLAN. List the benefits of implementing end-user authentication. Explain the operations of various access control features. Configure and monitor various access control features. Describe processing considerations when multiple authentication and access control features are enabled. Describe some common IP telephony deployment scenarios. Describe features that facilitate IP telephony deployments. Configure and monitor features used in IP telephony deployments. Explain the purpose and basic operations of CoS. Describe CoS features used in Layer 2 networks. Configure and monitor CoS in a Layer 2 network. Describe a basic troubleshooting method. List common issues that disrupt network operations. Identify tools used in network troubleshooting. Use available tools to resolve network issues. This two-day course provides detailed coverage of virtual LAN (VLAN) operations. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Mission Control: Management and Operations 2024

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Administrators or application owners who are responsible for deploying and managing Kubernetes clusters and workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create and manage Kubernetes clusters Control access Create image registry, network, quota, security, custom and mutation policies Connect your on-premises vSphere with Tanzu Supervisor to VMware Tanzu Mission Control Create, manage, and back up VMware Tanzu Kubernetes Grid™ clusters Create and manage Amazon Elastic Kubernetes Service clusters Perform cluster inspections Manage packages in your clusters Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply image registry, network, security, quota, custom, and mutation policies to Kubernetes environments. It focuses on how to deploy, upgrade, back up, and monitor Kubernetes clusters on VMware vSphere© with VMware Tanzu©, and it also covers package management using the VMware Tanzu Mission Control catalog. Course Introduction Introduction and course logistics Course Objectives What Is VMware Tanzu Mission Control Describe VMware Tanzu Mission Control Describe vSphere with Tanzu Describe Tanzu Kubernetes Grid Describe VMware Tanzu© for Kubernetes Operations Explain how to request access to VMware Tanzu Mission Control Describe VMware Cloud? services Describe the VMware Cloud services catalog Explain how to access VMware Tanzu Mission Control Identify the components of VMware Tanzu Mission Control Explain the resource hierarchy of VMware Tanzu Mission Control Access, Users, and Groups Explain VMware Cloud services and enterprise federation Describe VMware Cloud services roles Explain multifactor authentication Describe the VMware Tanzu Mission Control UI List the components of the VMware Tanzu Mission Control UI Describe the VMware Tanzu CLI Describe the VMware Tanzu Mission Control API Cluster Lifecycle Management Outline the steps for registering a management cluster to VMware Tanzu Mission Control Discuss what a management cluster is Describe provisioners Explain the purpose of a cloud provider account Describe Amazon Elastic Kubernetes Service Describe Azure Kubernetes Service Workload Clusters Describe Tanzu Kubernetes Grid workload clusters Explain how to create a cluster Explain how to configure a cluster Describe Amazon Elastic Kubernetes Service workload clusters Describe Azure Kubernetes Service workload clusters Explain how to attach a Kubernetes cluster Explain how to verify the connections to the cluster Describe cluster health Policy Management Explain how access policies grant users access to different resources Describe the policy model Describe the available policy types Explain how image registry policies restrict from which image registries container images can be pulled Outline how network policies are applied to clusters Discuss how security policies control deployment of pods in a cluster Discuss how quota policies manage resource consumption in your clusters Discuss how custom policies implement specialized policies that govern your Kubernetes clusters Describe mutation policies Explain how Policy Insights reports VMware Tanzu Mission Control policy issues Control Catalog Describe the VMware Tanzu Mission Control catalog Explain how to install packages Describe cert-manager Explain Service Discovery and ExternalDNS Describe Multus CNI and Whereabouts Describe Fluent-Bit Explain Prometheus and Grafana Describe Harbor Describe Flux Describe Helm Describe Git repositories Tanzu Mission Control Day 2 Operations Describe data protection Describe cluster inspections Explain life cycle management Describe VMware Aria Operations? for Applications Discuss VMware Tanzu© Service Mesh? Advanced edition Describe VMware Aria Cost? powered by CloudHealth©

VMware Tanzu Mission Control: Management and Operations 2024
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Sales engineers Account managers Networking engineers Technical and non-technical audiences Overview After taking this course, you should be able to: Understand the role that programmable infrastructure is having on the transition to the digital enterprise Describe Cisco DNA, its components and benefits, and explain a few use cases Describe the different technologies and solutions within the Cisco programmable infrastructure portfolio Describe Cisco DNA Center REST APIs Understand the functionality provided by Cisco WebEx Teams Describe Cisco CMX, services, and related APIs Describe the importance of DevOps culture within network operations in the shift to becoming a digital enterprise The Programming Use Cases for Cisco Digital Network Architecture (DNAPUC) v1.0 course highlights the shift toward the digital enterprise and examines the components, benefits, and use cases of Cisco Digital Network Architecture (Cisco DNA?) in an enterprise environment. You will learning about key platforms including Cisco© DNA Center, Cisco WebEx Teams?, Cisco Connected Mobile Experiences (CMX), and their related APIs. This course also covers open standards, tools, and network APIs that you can use to complement the Cisco DNA software portfolio, including Python, JavaScript Object Notation (JSON), Network Configuration Protocol (NETCONF), Representational State Transfer Configuration Protocol (RESTCONF), and Yet Another Next Generation (YANG). Understanding Programmable Infrastructure Digital Enterprise Four Pillars of Digitization Network Programmability and Automation What Should Be Automated? Quantifying Programmability and Automation for the Business Network Programmability and Automation Use Cases Introducing Cisco DNA Cisco DNA Overview Cisco DNA Components Benefits of Cisco DNA Cisco DNA Use Cases Describing Programmable Infrastructure Cisco Programmability Options Data Center Infrastructure Enterprise Network Programmability Streaming Telemetry Collaboration Management, Monitoring, and Analytics Describing Network APIs How APIs Enable Business Automation API Overview Data Encoding with JSON and XML RESTful APIs RESTCONF and NETCONF Overview Data Modeling with YANG Describing Cisco DNA Center APIs Cisco DNA Center Overview Cisco DNA Center Automation Enterprise Benefits Cisco DNA Center Applications and Use Cases Cisco DNA Center REST API Overview Case Study: Network Automation at Symantec Describing Cisco Collaboration APIs Cisco Webex Teams Overview Cisco Webex Teams Business Benefits Cisco Webex Teams API Overview Describing Cisco Mobility APIs Cisco CMX Overview Cisco CMX Programmability Business Benefits Cisco CMX Mobility Services API Overview Case Study: Victoria University and Cisco CMX Implementing DevOps Culture Within Network Operations Transition to DevOps CALMS Model (Culture, Automation, Lean, Measurement, Sharing) Role of Cisco Technology in the Transition to DevOps Additional course details: Nexus Humans Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC)
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Administering BIG-IP

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring

F5 Networks Administering BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

Kubernetes for App Developers

By Nexus Human

Duration 3 Days 18 CPD hours Overview In this course you?ll learn how to: Containerize and deploy a new Python script Configure the deployment with ConfigMaps, Secrets and SecurityContexts Understand multi-container pod design Configure probes for pod health Update and roll back an application Implement services and NetworkPolicies Use PersistentVolumeClaims for state persistence And more In this vendor agnostic course, you will use Python to build, monitor and troubleshoot scalable applications in Kubernetes. Introduction Objectives Who You Are The Linux Foundation Linux Foundation Training Preparing Your System Course Registration Labs Kubernetes Architecture What Is Kubernetes? Components of Kubernetes Challenges The Borg Heritage Kubernetes Architecture Terminology Master Node Minion (Worker) Nodes Pods Services Controllers Single IP per Pod Networking Setup CNI Network Configuration File Pod-to-Pod Communication Cloud Native Computing Foundation Resource Recommendations Labs Build Container Options Containerizing an Application Hosting a Local Repository Creating a Deployment Running Commands in a Container Multi-Container Pod readinessProbe livenessProbe Testing Labs Design Traditional Applications: Considerations Decoupled Resources Transience Flexible Framework Managing Resource Usage Multi-Container Pods Sidecar Container Adapter Container Ambassador Points to Ponder Labs Deployment Configuration Volumes Overview Introducing Volumes Volume Spec Volume Types Shared Volume Example Persistent Volumes and Claims Persistent Volume Persistent Volume Claim Dynamic Provisioning Secrets Using Secrets via Environment Variables Mounting Secrets as Volumes Portable Data with ConfigMaps Using ConfigMaps Deployment Configuration Status Scaling and Rolling Updates Deployment Rollbacks Jobs Labs Security Security Overview Accessing the API Authentication Authorization ABAC RBAC RBAC Process Overview Admission Controller Security Contexts Pod Security Policies Network Security Policies Network Security Policy Example Default Policy Example Labs Exposing Applications Service Types Services Diagram Service Update Pattern Accessing an Application with a Service Service without a Selector ClusterIP NodePort LoadBalancer ExternalName Ingress Resource Ingress Controller Labs Troubleshooting Troubleshotting Overview Basic Troubleshooting Steps Ongoing (Constant) Change Basic Troubleshooting Flow: Pods Basic Troubleshooting Flow: Node and Security Basic Troubleshooting Flow: Agents Monitoring Logging Tools Monitoring Applications System and Agent Logs Conformance Testing More Resource Labs Additional course details: Nexus Humans Kubernetes for App Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Kubernetes for App Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Kubernetes for App Developers
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Application Development I: Programming in Java EE with exam (AD184)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for Java developers who want to learn more about the specifications that comprise the world of Java Enterprise Edition (Java EE). Overview As a result of attending this course, you should be able to describe most of the specifications in Java EE 7 and create a component with each specification. You will be able to convert a Java SE program into a multi-tiered Java EE application. You should be able to demonstrate these skills: Describe the architecture of multi-tiered Java EE applications. Package Java EE applications and deploy to Red Hat JBoss Enterprise Application Platform with various tools. Create an Enterprise Java Bean instance. Manage the persistence of data using Java Persistence API. Create a web service using JAX-RS. Properly apply context scopes to beans and inject resources into Java Beans. Store and retrieve messages using the Java Messaging Service. Secure a Java EE application. Red Hat Application Development I: Programming in Java EE with exam (AD184) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). This course is based on Red Hat© Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183). In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application. Transition to multi-tiered applications Describe Java EE features and distinguish between Java EE and Java SE applications. Package and deploying applications to an application server Describe the architecture of a Java EE application server, package an application, and deploy the application to an EAP server. Create Enterprise Java Beans Develop Enterprise Java Beans, including message-driven beans. Manage persistence Create persistence entities with validations. Manage entity relationships Define and manage JPA entity relationships. Create REST services Create REST APIs using the JAX-RS specification. Implement Contexts and Dependency Injection Describe typical use cases for using CDI and successfully implement it in an application. Create messaging applications with JMS Create messaging clients that send and receive messages using the JMS API. Secure Java EE applications Use JAAS to secure a Java EE application. Comprehensive review of Red Hat JBoss Development I: Java EE Demonstrate proficiency of the knowledge and skills obtained during the course. Additional course details: Nexus Humans Red Hat Application Development I: Programming in Java EE with exam (AD184) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Application Development I: Programming in Java EE with exam (AD184) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Application Development I: Programming in Java EE with exam (AD184)
Delivered OnlineFlexible Dates
Price on Enquiry