Duration 3 Days 18 CPD hours This course is intended for This course is appropriate for anyone needing to interface with an Oracle database or those needing a general understanding of Oracle database functionality. That would include end users, business analysts, application developers and database administrators. Overview Working in a hands-on learning environment led by our expert pracitioner you'll learn how to: Add Data, Retrieve, Sort and Organize a SQL Database Combine Data, Set Operators and Subqueries Manipulate Data and Data Definition Languages in SQL Work with Data Dictionary Views and Create Sequences, Indexes and Views Use Database Objects and Subqueries Perform Data and access control Perform other Advanced Level Database operations. Oracle 19C SQL Programming Fundamentals Is a three-day, hands-on course designed to equip you with the fundamental skills needed to set up, run and manage SQL databases using Oracle Database Technology. You will also be discovering all the tools and concepts required to organize data efficiently. Our engaging instructors and mentors are highly-experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment, guided by our expert team, attendees will develop a practical approach to Oracle Database Technology. Throughout the course, you will learn the key elements of a database, and the way Oracle systems facilitate their induction in the system. You?ll also learn the tools and strategies you can implement to store, retrieve, compare and organize data according to your requirements. You?ll also explore the process of creating simple to complex reports from existing data. By the end of this course, you will also have hands-on knowledge of SQL systems that are required to proceed to other advanced to professional programs. Adding Data, Retrieving, Sorting and Organizing a SQL Database The building blocks of a database. How to add data to the database. The process of retrieving data using SQL functions. Multiple methods of sorting and organizing data. Using SQL functions to get the required simple to complex output. Various strategies for using functions and conditions to organize data. Combining Data, Set Operators And Subqueries Consolidating data using multiple functions and group operators. Fetching intelligent data reports using simple functions. Fetching data from multiple sources in the tables. Using Subqueries to compile data as required. Using Set operators to create smart data reports. Data Manipulation and Data Definition Languages in SQL Describing and managing data transaction using Data Definition Language. Categorize and review data tables using Data Definition Language. Data Dictionary Views and Creating Sequences, Indexes and Views How to manage and query Data Dictionary Views. The process of creating and using Sequences. How to create various types of Synonyms and Indexes. Creating simple and complex views and retrieving data. Understanding and using Database Objects and Subqueries Core concept and application of Schema Objects. Fetching required data with Subqueries. Using Subqueries to organize Data in SQL. Data and access control Assigning and revoking data access. Managing data access control according to user levels. Performing Advanced Level Database operations. Using advanced functions and performing data queries. Creating and managing time zone-based databases.
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Overview Upon completing this course, students will be able to meet these objectives: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers. Compare and contrast the various hardware and software switching mechanisms and operation, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts. Troubleshoot layer 2 connectivity using VLANs, trunking. Implementation of redundant switched networks using spanning tree protocol. Troubleshooting link aggregation using Etherchannel. Describe the features, metrics, and path selection concepts of EIGRP. Implementation and optimization of OSPFv2 and OSPFv3, including adjacencies, packet types, and areas, summarization and route filtering for IPv4 and IPv6. Implementing EBGP interdomain routing, path selection and single and dual-homed networking. Implementing network redundacy using protocols like HSRP and VRRP. Implementing internet connectivity within Enterprise using static and dynamic NAT. Describe the virtualization technology of servers, switches, and the various network devices and components. Implementing overlay technologies like VRF, GRE, VPN and LISP. Describe the components and concepts of wireless networking including RF, antenna characteristics, and define the specific wireless standards. Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture. Describe wireless roaming and location services. Describe how APs communicate with WLCs to obtain software, configurations, and centralized management. Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various tools available. Troubleshooting Enterprise networks using services like NTP, SNMP , Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager. Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You?ll learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN Course Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus Lan Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols And Techniques Understanding Virtual Private Networks And Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming And Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Duration 3 Days 18 CPD hours This course is intended for This course is most suited for IT professionals who have a need to understand the current requirements and core competences for managing IT in mission-critical environments. Overview After completion of the course the participant will be able to: 1. Provide guidance and implementation for IT strategy as set by senior IT and business management 2. Select and manage staff, implement training programs, career plan development and job rotation programs 3. Select, evaluate and negotiate vendors using RFI, RFP and selection criteria 4. Provide guidance for developing, testing and implementing business applications 5. Manage and/or assist in IT project management 6. Design and implement service management processes for incident, problem and change management 7. Understand the need for business continuity and design the business continuity plan 8. Review and implement information security practices and controls 9. Assist and initiate risk management practices 10. Understand and select new technologies such as cloud computing, big data, Internet of Things and social media to support business change demands 11. Select strategies for information management 12. Measure and improve quality of IT services CITS is designed to teach the skills, knowledge and competencies required of the modern IT specialist working at the senior professional, team-leader, supervisor or management level in IT management. IT Strategy The need for Information Technology Enterprise architecture Service catalogue Service level management Sustainable development IT Organisation Personnel need Roles and responsibilities Sourcing Selection process Hiring staff Managing staff Career planning Training / job rotation Performance appraisal Staff departures Vendor Selection / Management The importance of vendors Vendor selection Request For Information (RFI) Request For Proposal (RFP) Proposal evaluation Vendor reference checks Contract negotiation Contract management Vendor management Re-compete vendors Project Management Methodologies Project organisation Starting up / initiating Planning / initiation a project Risk Quality Scope Work / Product Breakdown Structure PERT diagram / Gantt chart Cost Communication Application Management Software Development Life Cycle (SDLC) Software Quality Assurance (SQA) Requirements Development Testing Adoption (implementation) Maintenance Service Management Incident management Problem management Change management Business Continuity Management Standards and guidelines Objectives Context Interested parties Scope Roles and responsibilities Resources and competences Awareness and communication Documentation Business Impact Analysis Risk Management Guidelines Context establishment Identification Analysis Evaluation Treatment Communication Monitoring and control Information Security Management Standards Confidentiality Integrity Availability Controls types Guideline for controls selection Control categories Information security awareness Security incident response Information and Knowledge Management Information management Data management Information management - technologies Business intelligence Data management - technologies Best practices in data governance Pitfalls in data governance Business Change Management Business change Frameworks, models and techniques Needs identification Cloud computing Social media / digital marketing Big data Internet of Things (IoT) Quality Management Standards, guidelines and frameworks Objectives Activities Services review Customer feedback Customer survey Key Performance Indicators (KPI) Metrics Scorecards and reports Quality register Exam Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 1 Days 6 CPD hours This course is intended for The content is appropriate for test automation engineering roles, test manager roles, test lead roles, test architect roles, as well as developer roles. This course assumes you have a foundational understanding of testing and the purpose of automation. This course will be beneficial to anyone who is accountable for assessing, planning, designing, and implementing an integrated set of technology (testing infrastructure) that supports development, testing, and deployment. Overview Working in an interactive learning environment, led by our expert facilitator, attendees will learn to: Document the current state of test automation in your organization Define a custom test automation plan and architecture to fit their situation Create an initial implementation plan Identify initial key measures Develop a metrics dashboard for tracking the value of test automation Lay out a future strategy and roadmap to get there Introduction to Test Automation is a one-day, hands-on event designed to provide participants with the skills required to develop a custom test automation plan and architecture for their organization. Throughout the course, students will examine and work through various practical examples, learning how to create an integrated test automation plan and develop a test automation architecture. Participants will also learn about the possible real-world challenges they may face while trying to accomplish their goals, exploring the practical positive aspects of engaging their technical team, along with the possible frustrations of experiencing too much isolation between test automators and test designers. Getting Started Automation beginnings Software as a series of imperfect translations The Compelling Business Needs for Automation Automation the next opportunity Islands of Automation Getting products to market more quickly, at the right costs and quality Automation Challenges and Requirements Automation Challenges Test Automation Key Requirements Foundational material for your automation plan Templates Questions Examples Virtual Consulting included with this course Automation plan vision and strategy Vision, Strategy, Approach Example Defining your end in mind Deciding where to start Engaging Others Conducting a current state tools inventory Assessing your current state - tools and processes Tools inventory example and template Radar Chart as a means of presenting current state information Consider the best automation approach Waterfall vs. agile cycles of work Aligning tools with your methodologies Strategies for Automating The Test Automation Pyramid Developing your test automation architecture Blocks of automation capabilities Islands of Automation Integrated Tools Architecture Template Integrated Tools Architecture Examples Test automation architecture examples Examples of different test automation architectures and frameworks Selenium Key Test Automation Architecture Characteristics Acceptance test-driven and behavior-driven testing overview Test automation approaches FitNesse Cucumber Gherkin script overview Tool workflow Considerations for what to automate and when Categories of tests that might be automated We have many tool choices Key points in Test Tool Architecture Planning Piloting and Implementing automation Selecting and evaluating tools and rolling them out Selling Automation - qualitative questions Selling Automation - quantitative questions Measuring automation benefits Measures in technical terms Measures in business terms Measures of testing vs. measures of test automation Next Steps A few keys to success
Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Data Center engineers Cloud engineers System engineers Field engineers Implementation/operation/support/installation and upgrade specialists IT administrators Network engineers Cloud computing experts Security specialists Cisco integrators and partners Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe items to be aware of before installing a Cisco CSR 1000V, including virtual machine requirements for installing Cisco CSR 1000V, licensing options that are available with Cisco CSR 1000V, supported Cisco IOS XE technologies, and management options for Cisco CSR 1000V. Prepare for installation of Cisco CSR 1000V Series routers. Explain common Cisco IOS XE Command-Line Interface (CLI) commands and conventions that can make it easier to work in the CLI, and describe how you can get help with command syntax and command options. Describe the options you can use to activate the license for Cisco CSR 1000V and activate the license for each option. Troubleshoot issues with Cisco CSR 1000V licenses. Upgrade the Cisco IOS XE software for an existing Cisco CSR 1000V installation. Describe the Call Home feature and its benefits, configure the feature on the Cisco CSR 1000V, including the anonymous reporting option, and display the Call Home configuration. List the different Call Home events that trigger alerts and commands that are executed as a result of the alert. Troubleshoot Cisco CSR 1000V Virtual Machine (VM) issues. Rehost a Cisco CSR 1000V license to a new VM, whether the current Cisco CSR 1000V router is accessible or not. Describe the Virtual Extensible LAN (VXLAN) Layer 2 gateway feature and configure this feature on the Cisco CSR 1000V router. Deploy the Cisco CSR 1000V in a virtual private cloud using Microsoft Azure or Amazon Web Services (AWS). Describe common network operations that the Cisco CSR 1000V supports. Explore programmability support on Cisco CSR 1000V, including APIs, shells, and data models. The Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) course shows you how to deploy and operate Cisco© Cloud Services Router 1000V (CSR1000V) to provide comprehensive WAN gateway and network services functions including connectivity, routing, and security into virtual and cloud environments. Through expert instruction and hands-on labs, you will learn: Cisco CSR 1000V deployment options and requirements; hypervisor support, licensing models, features and programmability support; and how to implement, integrate, install, manage, and troubleshoot the deployment process and common operation issues.This class will help you:Learn how to use the CSR 1000V Series to extend your enterprise network to public and private cloudsGain hands-on practice acquiring skills in virtual and cloud-based technologies Course Outline Introducing Cisco CSR Product Overview Preparing for Installation Installing Cisco CSR 1000V in VMware Elastic Sky X (ESXi) Environments Booting Cisco CSR 1000V and Accessing the Console Using Cisco IOS XE Software Managing Cisco CSR 1000V Licenses Upgrading the Cisco IOS XE Software Mapping Cisco CSR 1000V Network Interfaces to Virtual Machine Network Interfaces Using GRUB Mode (Bootstrap Program) Configuring Call Home for Cisco CSR 1000V Configuring Virtual CPU (vCPU) Distribution Across Data, Control, and Service Planes Troubleshooting Cisco CSR 1000V Virtual Machine Issues Rehosting a Smart License Supporting the Cisco CSR 1000V Virtual Extensible LAN (VXLAN) Feature Deploying Cisco CSR 1000V in a Virtual Private Cloud Exploring Cisco CSR 1000V Operations Exploring Programmability on Cisco CSR 1000V
Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover
Duration 2 Days 12 CPD hours This course is intended for This course is relevant to anyone who needs to work with and understand data including: Business Analysts, Data Analysts, Reporting and BI professionals Marketing and Digital Marketing professionals Digital, Web, e-Commerce, Social media and Mobile channel professionals Business managers who need to interpret analytical output to inform managerial decisions Overview This course will cover the basic theory of data visualization along with practical skills for creating compelling visualizations, reports and dashboards from data using Tableau. Outcome: After attending this course delegates will understand - How to move from business questions to great data visualizations and beyond How to apply the fundamentals of data visualization to create informative charts How to choose the right visualization type for the job at hand How to design and develop basic dashboards in Tableau that people will love to use by doing the following: Reading data sources into Tableau Setting up the roles and data types for your analysis Creating new data fields using a range of calculation types Creating the following types of charts - cross tabs, pie and bar charts, geographic maps, dual axis and combo charts, heat maps, highlight tables, tree maps and scatter plots Creating Dashboards that delight using the all of the features available in Tableau. The use of analytics, statistics and data science in business has grown massively in recent years. Harnessing the power of data is opening actionable insights in diverse industries from banking to tourism. From Business Questions to Data Visualisation and Beyond The first step in any data analysis project is to move from a business question to data analysis and then on to a complete solution. This section will examine this conversion emphasizing: The use of data visualization to address a business need The data analytics process ? from business questions to developed dashboards Introduction to Tableau ? Part 1 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Introduction to Tableau ? Part 2 In this section, the main functionality of Tableau will be explained including: Selecting and loading your data Defining data item properties Create basic calculations including basic arithmetic calculations, custom aggregations and ratios, date math, and quick table calculations Creating basic visualizations Creating a basic dashboard Key Components of Good Data Visualisation and The Visualisation Zoo In this section the following topics will be covered: Colour theory Graphical perception & communication Choosing the right chart for the right job Data Exploration with Tableau Exploring data to answer business questions is one of the key uses of applying good data visualization techniques within Tableau. In this section we will apply the data visualization theory from the previous section within Tableau to uncover trends within the data to answer specific business questions. The types of charts that will be covered are: Cross Tabs Pie and bar charts Geographic maps Dual axis and combo charts with different mark types Heat maps Highlight tables Tree maps Scatter plots Introduction to Building Dashboards with Tableau In this section, we will implement the full process from business question to final basic dashboard in Tableau: Introduction to good dashboard design Building dashboards in Tableau
Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Conductor and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the AOS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Conductor with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and AOS8 to install and build a complete, secure controller network with multiple SSIDs. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Conductor Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join Mobility Controller with Mobility Conductor Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Conductor GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of AirWave's capabilities for monitoring and diagnosing client, WLAN and AP issues
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following customer job roles: Cloud architects, administrators, and SysOps personnel Cloud developers and DevOps personnel Overview This course teaches participants the following skills: Plan and implement a well-architected logging and monitoring infrastructure Define Service Level Indicators (SLIs) and Service Level Objectives (SLOs) Create effective monitoring dashboards and alerts Monitor, troubleshoot, and improve Google Cloud infrastructure Analyze and export Google Cloud audit logs Find production code defects, identify bottlenecks, and improve performance Optimize monitoring costs This course teaches you techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud. Guided by the principles of Site Reliability Engineering (SRE), and using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage. Introduction to Google Cloud Monitoring Tools Understand the purpose and capabilities of Google Cloud operations-focused components: Logging, Monitoring, Error Reporting, and Service Monitoring Understand the purpose and capabilities of Google Cloud application performance management focused components: Debugger, Trace, and Profiler Avoiding Customer Pain Construct a monitoring base on the four golden signals: latency, traffic, errors, and saturation Measure customer pain with SLIs Define critical performance measures Create and use SLOs and SLAs Achieve developer and operation harmony with error budgets Alerting Policies Develop alerting strategies Define alerting policies Add notification channels Identify types of alerts and common uses for each Construct and alert on resource groups Manage alerting policies programmatically Monitoring Critical Systems Choose best practice monitoring project architectures Differentiate Cloud IAM roles for monitoring Use the default dashboards appropriately Build custom dashboards to show resource consumption and application load Define uptime checks to track aliveness and latency Configuring Google Cloud Services for Observability Integrate logging and monitoring agents into Compute Engine VMs and images Enable and utilize Kubernetes Monitoring Extend and clarify Kubernetes monitoring with Prometheus Expose custom metrics through code, and with the help of OpenCensus Advanced Logging and Analysis Identify and choose among resource tagging approaches Define log sinks (inclusion filters) and exclusion filters Create metrics based on logs Define custom metrics Link application errors to Logging using Error Reporting Export logs to BigQuery Monitoring Network Security and Audit Logs Collect and analyze VPC Flow logs and Firewall Rules logs Enable and monitor Packet Mirroring Explain the capabilities of Network Intelligence Center Use Admin Activity audit logs to track changes to the configuration or metadata of resources Use Data Access audit logs to track accesses or changes to user-provided resource data Use System Event audit logs to track GCP administrative actions Managing Incidents Define incident management roles and communication channels Mitigate incident impact Troubleshoot root causes Resolve incidents Document incidents in a post-mortem process Investigating Application Performance Issues Debug production code to correct code defects Trace latency through layers of service interaction to eliminate performance bottlenecks Profile and identify resource-intensive functions in an application Optimizing the Costs of Monitoring Analyze resource utilization cust for monitoring related components within Google Cloud Implement best practices for controlling the cost of monitoring within Google Cloud