• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

43043 RES courses

PMI Authorized Certified Associate in Project Management (CAPM) - 7th Edition

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for people who have on the job experience doing project management activities and running projects, regardless of their job title. It is for those who wish to become certified project managers, or those that want to build or reinforce a foundation in project management. This course is ideal for a person who wants to grow and formalize their project management skills on an industry neutral, global standard, the Project Management Institute. Overview After completing this course, students will be able to: Demonstrate an understanding of the various project life cycles and processes. Distinguish between predictive and adaptive approaches. Demonstrate an understanding of project management planning. Demonstrate an understanding of project roles and responsibilities. Explain the importance of the role the project manager plays. Determine how to follow and execute and respond to planned strategies or frameworks (e.g., communication, risks, etc.). Demonstrate an understanding of common problem-solving tools and techniques. Identify the suitability of a predictive, plan-based approach for the organizational structure (e.g., virtual, colocation, matrix structure, hierarchical, etc.). Determine and give examples of the activities within each process. Demonstrate an understanding of a project management plan schedule. Determine how to document project controls of predictive, plan-based projects. Explain when it is appropriate and sustainable to use an adaptive approach for the organizational structure. Compare the pros and cons of adaptive and predictive, plan-based projects. Identify the suitability of adaptive approaches for the organizational structure (e.g., virtual, colocation, matrix structure, hierarchical, etc.). Identify organizational process assets and environmental factors that facilitate the use of adaptive approaches. Determine how to plan project iterations. Determine how to document project controls for an adaptive project. Distinguish between the components of different adaptive methodologies (e.g., Scrum, Extreme Programming (XP), Scaled Adaptive Framework (SAFe), Kanban, etc.). Determine how to prepare and execute task management steps. Demonstrate an understanding of business analysis (BA) roles and responsibilities. Demonstrate the importance of communication for a business analyst between various teams and stakeholders. Determine how to gather requirements and using the best approach for a situation. Explain the application of a product roadmap. Determine how project methodologies influence business analysis processes. Validate requirements through product delivery. Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks. Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks.

PMI Authorized Certified Associate in Project Management (CAPM) - 7th Edition
Delivered OnlineFlexible Dates
Price on Enquiry

Beginning ASP.NET

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is aimed at developers who want to build web applications using ASP.NET Core or developers who want to make a career building web applications using Microsoft technology. In the web world, the ability to build robust web applications is key. With the knowledge about ASP.NET Core MVC (that makes use of the Model-View-Controller architecture) that you will take away from this course, you will be prepared to meet this need. In today's age, it's important for you as a developer to possess the ability to separate the programming and business logic. This course covering ASP.NET Core 2 will help you develop this skillset. Setting the Stage Introduction to Web Applications Creating ASP.NET Core application Controllers Role of the Controller in ASP.NET MVC Applications Introduction to Routing Our First Controller Implementing our own IActionResult Adding Views Adding Models Passing Data from the Controller to the View Filters Writing a Custom Filter Views The View Engine and the Razor View Engine Working with Layout Generating HTML Partial View View Components Tag Helpers Models Introduction to Models Model Binding The Entity Framework Using the Entity Framework in ASP.NET MVC applications Database Migration Validation Introduction to Validation Client-Side and Server-Side Validation Server-side Validation Client-side Validation Implementation Routing Convention-Based Routing Attribute-Based Routing Route Attribute at the Controller Level Passing Routing Values in HTTP Action Verbs in the Controller Route Constraints Rest Buy Designing Rest Buy Creating the Entities for the Application Creating EF Context and Migration Adding Features, Testing, and Deployment Adding the Registration Feature Creating a Unit Test Upgrading Our Application to Bootstrap 4 Deploying Rest Buy to Azure Additional course details: Nexus Humans Beginning ASP.NET training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Beginning ASP.NET course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Beginning ASP.NET
Delivered OnlineFlexible Dates
Price on Enquiry

Configuring Juniper Networks Firewall/IPSec VPN Products

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. Chapter 1: Course IntroductionChapter 2: ScreenOS Concepts, Terminology, and PlatformsChapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Chapter 5: Layer 3 Operations Lab 3: Layer 3 Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Chapter 9: VPN ConceptsChapter 10: Policy-Based VPNs Lab 7: Policy-Based VPNs Chapter 11: Route-Based VPNs Lab 8: Route-Based VPNs Chapter 12: IPv6 Lab 9: IPv6 Appendix A: Additional FeaturesAppendix B: Transparent Mode Lab 10: Transparent Mode (Optional) Additional course details: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Configuring Juniper Networks Firewall/IPSec VPN Products
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat JBoss Application Administration II (AD348)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Experienced system administrators responsible for deploying and administering JBoss Enterprise Application Platform 6 in large-scale production environments. At least 2 years' experience as a JBoss Enterprise Application Platform administrator. Be a Red Hat Certified Specialist in Enterprise Application Server Administration on Enterprise Application Platform 6 (or later) or have equivalent experience . Overview Upon successful completion of this course, students will be able to provision and manage Red Hat JBoss Enterprise Application Platform 6 in large-scale production environments. This course empowers you to provision and manage Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) in large-scale production environments. Intended for experienced administrators, this course will help you gain a deeper understanding of how to work with JBoss EAP by taking a closer look at installation, clustering, deployments, scripting, management, messaging, and security with a view towards building on the skills established in the Red Hat JBoss Application Administration I (JB248) course. 1 - INSTALLATION Given the proper installation media, perform Red Hat© JBoss© Enterprise Application Platform 6 installations that are repeatable, upgradeable, and silent. 2 - CLUSTERING Demonstrate a proficient knowledge of clustering components, their configuration, and application to clustered architectures. 3 - DEPLOYMENT Deploy an application in various types of production environments. 4 - SCRIPTING Script various configuration and management scenarios using command line interface (CLI). 5 - MANAGEMENT Use various tools to monitor and manage JBoss Enterprise Application Platform. 6 - MESSAGING Learn how to manage supported messaging systems. 7 - SECURITY Configure security settings that include authentication, authorization, networking, and the management interfaces. 8 - OVERVIEW OF JBOSS OPERATIONS NETWORK Learn the functionality of JBoss Operations Network and its use cases. Also learn how to install a JBoss Operations Network server, an agent, and agent plug-ins. 9 - MONITORING RESOURCES Learn how to use JBoss Operations Network to monitor managed resources, including defining alerts, baselines, and notifications Additional course details: Nexus Humans Red Hat JBoss Application Administration II (AD348) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat JBoss Application Administration II (AD348) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat JBoss Application Administration II (AD348)
Delivered OnlineFlexible Dates
Price on Enquiry

Troubleshooting VMware vRealize Operations [V8.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System administrators tasked with maintaining a vRealize Operations cluster Overview By the end of the course, you should be able to meet the following objectives: Identify the vRealize Operations components affected in typical troubleshooting scenarios List the environmental and operational factors that can generate problems in vRealize Operations Use self-monitoring tools to assess and troubleshoot operational issues in vRealize Operations Access CLI-based tools to assess and troubleshoot operational issues in vRealize Operations Use the vRealize Operations API tool to retrieve cluster data and perform actions Retrieve and review log files associated with specific vRealize Operations components Use available tools to troubleshoot problem scenarios in vRealize Operations Identify the best practices to ensure a vRealize Operations instance remains in a healthy state Locate resources to help you troubleshoot vRealize Operations This two-day course gives VMware vRealize© Operations? administrators the skills to perform basic troubleshooting tasks. The course also gives administrators the skills to ensure that their vRealize Operations instance meets its use-case objectives of continuous performance optimization, app-aware intelligent remediation, and integrated compliance. Course Introduction Introduction and course logistics Course objectives Running a vRealize Operations Instance Identify the components of a vRealize Operations cluster Identify common problems that affect vRealize Operations List the environmental and operational factors that can affect vRealize Operations Identify the affected components vRealize Operations Troubleshooting Tools Use vRealize Operations self-monitoring tools to troubleshoot problems Use CLI tools to troubleshoot vRealize Operations problems Identify the log files used by individual vRealize Operations components Run commands to analyze vRealize Operations log files Use the vRealize Operations API tool vRealize Operations Troubleshooting Scenarios Use relevant tools to troubleshoot problem scenarios Maintaining vRealize Operations Use best practices to ensure the vRealize Operations cluster remains in a healthy state Back up and restore vRealize Operations Identify vRealize Operations troubleshooting resources Additional course details: Nexus Humans Troubleshooting VMware vRealize Operations [V8.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Troubleshooting VMware vRealize Operations [V8.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Troubleshooting VMware vRealize Operations [V8.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage Exploit and Malware Prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline Module 1 - Cortex XDR Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Management Console Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies Using Exceptions Module 9 - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Considerations Additional course details: Nexus Humans Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-030T00-A: Microsoft Azure technologies for AWS architects

By Nexus Human

Duration 3.5 Days 21 CPD hours This course is intended for This course is for AWS Cloud Architects with expertise in designing and implementing solutions running on AWS who now want to design for Microsoft Azure. Overview After completing this course, students will be able to: Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects who have previously designed for Amazon Web Services how to translate business requirements into secure, scalable, and reliable solutions for Azure. Introduction to Azure Subscriptions and accounts Resource groups and templates in Azure Resource Manager Azure global infrastructure Azure regions Azure Availability Zones Comparison with AWS Implement Azure Active Directory Introduction to Azure Active Directory Domains and custom domains Safety features Guest users in Azure Active Directory Manage multiple directories Comparison with AWS Implement and manage hybrid identities Introduction to Azure AD Connect Comparison with AWS Implement virtual networking Azure Virtual Network and VNet peering VPN and ExpressRoute connections Comparison with AWS Implement VMs for Windows and Linux Configure high availability Comparison with AWS Implement load balancing and network security Implement Azure Load Balancer Implement an Azure Application Gateway Implement Azure Firewall Implement network security groups and application security groups Comparison with AWS Implement container-based applications Configure Azure Kubernetes Service Publish a solution on an Azure Container Instance Comparison with AWS Implement an application infrastructure Create an App Service plan Create and configure Azure App Service Configure networking for an App Service Introduction to Logic Apps and Azure Functions Comparison with AWS Implement storage accounts Azure Storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Comparison with AWS Implement NoSQL databases Introduction to Azure Cosmos DB Consistency Select appropriate CosmosDB APIs Set up replicas in CosmosDB Comparison with AWS DynamoDB Implement Azure SQL databases Configure Azure SQL database settings Implement Azure SQL Database managed instances Configure high availability for an Azure SQL database Comparison with AWS Implement cloud infrastructure monitoring Monitor security Monitor cost Configure a Log Analytics workspace Comparison with AWS Implement and manage Azure governance solutions Assign RBAC roles Configure management access to Azure Implement and configure an Azure Policy Comparison with AWS Manage security for applications Implement Azure Key Vault Implement and configure Azure AD Managed Identities Register and manage applications in Azure AD Comparison with AWS Migration, backup, and disaster recovery management Migrate workloads Implement Azure Backup for VMs Implement disaster recovery Comparison with AWS

AZ-030T00-A: Microsoft Azure technologies for AWS architects
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Collaboration Foundations v1.1 (CLFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students preparing to take the CCNP Collaboration certification Network administrators Network engineers Systems engineers Overview After taking this course, you should be able to: - Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model - Configure and modify required parameters in Cisco Unified Communications Manager (CM) including service activation, enterprise parameters, CM groups, time settings, and device pool - Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM - Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup - Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP]) including the role/group, service profile, UC service, and credential policy - Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transforms, SIP Trunks, and SIP Route Patterns - Configure Class of Control on Cisco Unified CM to control which devices and lines have access to services - Configure Cisco Unified CM for Cisco Jabber and implement common endpoint features including call park, softkeys, shared lines, and pickup groups - Deploy a simple SIP dial plan on a Cisco Integrated Service Routers (ISR) gateway to enable access to the PSTN network - Manage Cisco UCM access to media resources available within Cisco UCM and Cisco ISR gateways - Describe tools for reporting and maintenance including Unified Reports, Cisco Real-Time Monitoring Tool (RTMT), Disaster Recovery System (DRS), and Call Detail Records (CDRs) within Cisco Unified CM - Describe additional considerations for deploying video endpoints in Cisco Unified CM - Describe the integration of Cisco Unity with Cisco Unified CM and the default call handler The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco© Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. The course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. Course Outline Exploring The Path To Collaboration Introducing Cisco Unified Communications Manager And Initial Parameters Xploring Endpoints And The Registration Process Exploring Codecs And Call Signaling Managing Users In Cisco Unified Communication Manager Describing A Basic Dial Plan Describing Class Of Service Enabling Endpoints And Features Describing The Cisco Isr As A Voice Gateway Exploring Cisco Unified Communication Manager Media Resources Reporting And Maintenance Exploring Additional Requirements For Video Endpoints Describing Cisco Unity Connection

Cisco Understanding Cisco Collaboration Foundations v1.1 (CLFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

DevOps Engineering Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the DevOps Engineering Foundation course are individuals involved in engineering and technical practices such as: DevOps Practice owners and process designers Developers, QA engineers and Managers who are interested in understanding how DevOps works. Employees and managers responsible for engineering or improving processes. Consultants guiding their clients through process improvement and DevOps initiatives. Anyone responsible for: Managing process-related requirements Ensuring the efficiency and effectiveness of processes Maximizing the value of processes Overview The learning objectives for DevOps Engineering Foundation include an understanding of: How to engineer DevOps solutions DevOps Technologies Applications Architectures Continuous Integration Continuous Testing Ephemeral Elastic Infrastructures Continuous Delivery and Deployment Metrics, Monitoring, Observability and Governance DevOps Humans Future Trends This course explains the many aspects of DevOps engineering that leaders and practitioners can execute upon. While DevOps Foundation provides an overview of DevOps, this course will provide a closer look at the implementation process from an engineering perspective. It is an in depth view of the major aspects of engineering DevOps. An engineering approach is critical to DevOps journeys. This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution. DevOps Engineering Introduction DevOps Foundations Principles and Practices Related Frameworks Performance and Benefits DevOps Technology Source and Artifacts Control CI/CD pipelines Tools and Toolchains Application Release Automation Value Stream Management Applications Architectures and Continuous Integration Application Architectures Containers Continuous integration Continuous Testing CT Tenets Test creation & TDD Test acceleration Test results Test management Test environment management Ephemeral Elastic Infrastructures Virtual and Cloud Configuration management Infra-as-code Containers Orchestration GitOps Continuous Delivery and Deployment Continuous Delivery and Deployment Release Automation Deployment Strategies Metrics, Monitoring, Observability, Governance DevOps Metrics Monitoring Observability Governance DevOps Engineering Humans Culture Team Topologies Continuous Learning Future DevOps Trends Additional course details: Nexus Humans DevOps Engineering Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DevOps Engineering Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DevOps Engineering Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Advanced Administration (BCCPP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution

Symantec ProxySG 6.6 Advanced Administration (BCCPP)
Delivered OnlineFlexible Dates
Price on Enquiry