• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

47454 Ski courses

VMware vSphere: Operate, Scale and Secure [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage a VMware Tools Repository Configure vSphere Replication and recover replicated VMs Manage VM resource usage with resource pools Configure and manage vSphere networking and storage for a large and sophisticated enterprise Configure vCenter High Availability Use host profiles to manage VMware ESXi host compliance Use the vSphere Client to manage certificates Monitor the vCenter, ESXi, and VMs performance in the vSphere client Secure vCenter, ESXi, and VMs in your vSphere environment Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs Use Identity Federation to configure the vCenter to use external identity sources This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. Course Introduction Introductions and course logistics Course objectives Virtual Machine Operations Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs Identify the components in the vSphere Replication architecture Deploy and configure vSphere Replication Recover replicated VMs vSphere Cluster Operations Create and manage resource pools in a cluster Describe how scalable shares work Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Discuss vSphere support for NVMe and iSER technologies Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control vCenter and ESXi Operations Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Use host profiles to manage ESXi configuration compliance Use the vSphere client to manage vSphere certificates vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro vSphere Security and Access Control Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe identity federation and recognize its use cases Configure identity federation to allow vCenter to use an external identity provider vSphere Trusted Environments and VM Encryption Configure ESXi Host Access and Authentication Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs List VM encryption events and alarms Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority

VMware vSphere: Operate, Scale and Secure [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Logging, Monitoring and Observability in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following customer job roles: Cloud architects, administrators, and SysOps personnel Cloud developers and DevOps personnel Overview This course teaches participants the following skills: Plan and implement a well-architected logging and monitoring infrastructure Define Service Level Indicators (SLIs) and Service Level Objectives (SLOs) Create effective monitoring dashboards and alerts Monitor, troubleshoot, and improve Google Cloud infrastructure Analyze and export Google Cloud audit logs Find production code defects, identify bottlenecks, and improve performance Optimize monitoring costs This course teaches you techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud. Guided by the principles of Site Reliability Engineering (SRE), and using a combination of presentations, demos, hands-on labs, and real-world case studies, attendees gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, tracing application performance bottlenecks, and profiling CPU and memory usage. Introduction to Google Cloud Monitoring Tools Understand the purpose and capabilities of Google Cloud operations-focused components: Logging, Monitoring, Error Reporting, and Service Monitoring Understand the purpose and capabilities of Google Cloud application performance management focused components: Debugger, Trace, and Profiler Avoiding Customer Pain Construct a monitoring base on the four golden signals: latency, traffic, errors, and saturation Measure customer pain with SLIs Define critical performance measures Create and use SLOs and SLAs Achieve developer and operation harmony with error budgets Alerting Policies Develop alerting strategies Define alerting policies Add notification channels Identify types of alerts and common uses for each Construct and alert on resource groups Manage alerting policies programmatically Monitoring Critical Systems Choose best practice monitoring project architectures Differentiate Cloud IAM roles for monitoring Use the default dashboards appropriately Build custom dashboards to show resource consumption and application load Define uptime checks to track aliveness and latency Configuring Google Cloud Services for Observability Integrate logging and monitoring agents into Compute Engine VMs and images Enable and utilize Kubernetes Monitoring Extend and clarify Kubernetes monitoring with Prometheus Expose custom metrics through code, and with the help of OpenCensus Advanced Logging and Analysis Identify and choose among resource tagging approaches Define log sinks (inclusion filters) and exclusion filters Create metrics based on logs Define custom metrics Link application errors to Logging using Error Reporting Export logs to BigQuery Monitoring Network Security and Audit Logs Collect and analyze VPC Flow logs and Firewall Rules logs Enable and monitor Packet Mirroring Explain the capabilities of Network Intelligence Center Use Admin Activity audit logs to track changes to the configuration or metadata of resources Use Data Access audit logs to track accesses or changes to user-provided resource data Use System Event audit logs to track GCP administrative actions Managing Incidents Define incident management roles and communication channels Mitigate incident impact Troubleshoot root causes Resolve incidents Document incidents in a post-mortem process Investigating Application Performance Issues Debug production code to correct code defects Trace latency through layers of service interaction to eliminate performance bottlenecks Profile and identify resource-intensive functions in an application Optimizing the Costs of Monitoring Analyze resource utilization cust for monitoring related components within Google Cloud Implement best practices for controlling the cost of monitoring within Google Cloud

Logging, Monitoring and Observability in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting

Cisco Securing Networks with Cisco Firepower Next Generation Firewall v1.0 (SSNGFW)
Delivered OnlineFlexible Dates
Price on Enquiry

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match features Learn how to perform network monitoring functions and troubleshooting AR-AMF teaches knowledge, skills & practical exp. to set up & config a basic AR WLAN utilizing OS 8.X architecture & features.using lecture & labs,AR-AMF provides tech. & hands-on exp. of config. a single Mobility Master with 1 controller & AP WLAN WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Master Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join MC with MM Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Master GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores the new OS 8.X Airmatch to calibrate the network How Client Match and Client Insight match steers clients to better Aps Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the MM dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP issues

AR-AMF: Aruba Mobility Fundamentals (Delivered by Fast Lane)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Developed for experienced IT Professionals working with Citrix Virtual Apps and Desktops 7.1x. Potential students include administrators, engineers, and architects responsible for the end user workspace, provisioning services environment, and overall health and performance of the solution. Overview How to configure Workspace Environment Management to improve the end user environment and virtual resource consumption Understand Zones in Citrix Virtual Apps and Desktops 7.1x and how to account for user and desktop locations and optimal connection and registration How to build and manage App Layers to minimize image sprawl with Citrix Virtual Apps and Desktops 7.1x Understand and configure HDX channels and protocols for improved performance delivering multimedia and data over network connections Get more value out of your Citrix Virtual Apps and Desktops 7.1x investment through the use of Workspace Environment Management, Provisioning Services, Application Layering, and advanced features. Students leave this course with a good understanding of how to manage more complex solutions such as multizone environments spanning multiple locations with configurations around StoreFront, the Delivery Controllers, and HDX. Students will gain the skills to improve logon times, user personalization, and resource performance through Workspace Environment Management. Also, learn to optimize management of your app and desktop images by building and combining App Layers. End the course by learning to install, configure, and manage Provisioning Services in accordance with leading practices.This course includes a voucher to take the related exam (1Y0-311 Citrix XenApp and XenDesktop 7.15 Advanced Administration) and earn your Citrix Certified Professional - Virtualization (CCP-V) certification. Implementing Redundancy and Scalability StoreFront and Citrix Gateway Site Infrastructure Machines Running the Virtual Delivery Agent Managing a Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones Managing StoreFront Store Subscriptions in a Multi- Location Environment StoreFront and Citrix ADC Branding Implementing Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Implementing Advanced Authentication Methods Multi-factor Authentication - RADIUS & OTP Multi-factor Authentication - Smart Card Authentication Federated Authentication - ADFS, SAML, and FAS Improving App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Securing Machines Running the Virtual Delivery Agent TLS to VDA Encryption GPOs and Citrix Policies Image Management Introduction to Troubleshooting Troubleshooting Methodology Process (Standard Slide) Resource Tools and Utilities Introduction to PowerShell Troubleshooting Access Issues Troubleshooting StoreFront Troubleshooting Citrix Gateway Troubleshooting Delivery Controller Issues Validating FMA Services Troubleshooting VDA Registration Issues Troubleshooting VDA Registration Troubleshooting HDX Connection Issues Troubleshooting HDX Connections Introduction to App Layering App Layering Introduction Architecture and How it Works Creating an OS Layer The OS Layer Creating a Platform Layer The Platform Layer Creating App Layers The App Layers Creating Elastic App and User Layers Elastic App Layering User Layers Deploying a Layered Image using Citrix Virtual Apps and Desktops Using Templates in App Layering Using Layered Images in a Citrix Virtual Apps and Desktops Site Exploring Layer Priority Layer Priority Maintaining an App Layering Environment Updating Layers Maintaining and Updating the App Layering Environment Common App Layering Considerations and Additional Resources Introduction to Workspace Environment Management (WEM) Workspace Environment Management (WEM) Introduction WEM Administration Using WEM to Centralize Managing User Resources with WEM Managing Profiles with WEM Managing Endpoints with the WEM Transformer Feature Using WEM for Performance Optimization Optimizing Machine Performance with WEM Optimizing User Experience with WEM Using WEM to Secure Environments WEM Environments Migrating and Upgrading WEM Migrating to WEM Upgrading a WEM Deployment WEM Multi-Location Considerations

CWS-315 Citrix Virtual Apps and Desktops 7 Advanced Administration
Delivered OnlineFlexible Dates
Price on Enquiry

E2E200 -SAP Change Control Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Change Managers: Responsible for documentation, approval and change processes System Landscape Architects: Responsible for the design of the transport landscape topology System Administrators: Responsible for executing transports Development Managers: Responsible for performing development changes Application Manager: Responsible for approving and performing changes in an application Support Manager and members of the customer's SAP competence center: Responsible for Reporting and Diagnostics capabilities Partners and System Integrators Overview This course will prepare you to: Describe the concept and methods of E2E Change Control Management. Leverage the SAP Solution Manager 7.2 as application platform for E2E Change Control Management. In this course you will learn how change control management coordinates changes that are introduced into a software landscape so that the changes do not conflict with each other and how to make sure the changes are executed without disrupting ongoing business. This results in improved quality of the software landscape, higher availability of IT solutions, and lower total cost of ownership. Also important, change control management ensures that the changes introduced remain transparent, traceable and are made available for reporting and change analysis. Becoming adept at change control management requires skill in the efficient use of standardized methods and procedures. In this ?how to use? training, SAP imparts best-in-class knowledge of solution operations. The End-to-End Change Control Management course introduces participants to what change control management is and the standard tools used to accomplish it, tools provided by SAP Solution Manager. Introduction to E2E Change Control Management Explain the scope of End-to-End Change Control Management Explain the role of SAP Solution Manager to manage changes in your solution landscape Enhanced Change and Transport System Explain how the Enhanced Change and Transport System (CTS+) works Understand the basic concepts of Enterprise Portal and how it is supported by CTS+ Describe the best practices for the setup and usage of CTS+ in different scenarios Configuration Validation Understand the concepts and architecture of E2E Change Diagnostics Find current configuration information with the Change Reporting tool Find recent changes in the solution landscape with the E2E Change Analysis tool Compare multiple systems with the Configuration Validation tool Create targets, use operators and run validation reports Know how to use predefined reports in the report directory Transport and Execution Analysis Service and Transport and Execution Analysis Service for Projects Know how to run and use this self-check services within SAP Solution Manager Understand how to interpret the software change management KPIïs that are collected for your landscape Software Change Strategy Understand the limitations of a three-system landscape Understand the benefits of bundling changes in cycles and synchronized releases Transport Management with SAP Solution Manager Understand the change control landscape concept for transport management in SAP Solution Manager 7.2 Understand the usage of critical objects, cross system object locking and downgrade protection Know how to use retrofit in a dual landscape Understand the features of cCTS, which can be used for Quality Gate Management and Change Request Management parallel to CTS. Quality Gate Management Explain the concept of Solution Transports and Track Synchronization Setup and use Quality Gate Scenario as a central Transport Management Tool Create and release transport requests centrally in SAP Solution Manager for ABAP and Non-ABAP environments Know how to work within the Quality Gate Scenario Change Request Management Understand the different use cases for Change Request Management Describe the various elements of Change Request Management as part of SAP Solution Manager Understand SAP?s best practices for transport management which are implemented in Change Request Management Know how to work with Change Request Management Release Management Learn how to manage Release Management with SAP Solution Manager Understand how to manage the successful deployment of all related changes into the productive environment.

E2E200 -SAP Change Control Management
Delivered OnlineFlexible Dates
Price on Enquiry

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Global Server Load Balancing Design and Deploy

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators or network administrators, Network professionals who have experience working with VMware NSX Advanced Load Balancer and are responsible for designing or deploying Application Delivery Controllers solutions Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer components and main functions Describe NSX Advanced Load Balancer Global Server Load Balancing architecture Explain NSX Advanced Load Balancer key features and benefits Understand and apply a Global Server Load Balancing design framework Deploy and configure NSX Advanced Load Balancer Global Server Load Balancing infrastructure Explain and Configure Global Server Load Balancing Application components such as Global Server Load Balancing Service, Global Server Load Balancing Pools and Health Monitors with related components Gather relevant information and perform basic troubleshooting of Global Server Load Balancing applications leveraging built-in NSX Advanced Load Balancer tooling Describe and Configure NSX Advanced Load Balancer application and infrastructure monitoring This 3-day course prepares you to lead VMware NSX Advanced Load Balancer (Avi Networks) Global Server Load Balancing design and deployment projects by providing an understanding of general design processes, frameworks and configurations. You look at the design and deployment considerations for Global Server Load Balancing as part of an overall software-defined data center design. This course covers key NSX Advanced Load Balancer (Avi Networks) Global Server Load Balancing features and functionalities offered in the NSX Advanced Load Balancer 18.2 release. Access to a software-defined data center environment is provided through hands-on labs to reinforce the skills and concepts presented in the course. Course Introduction Introductions and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic virtual services components such as Application Profiles, Network Profiles, Pools and Health Monitors DNS Foundations Review, discuss and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing Introduce Global Server Load Balancing concepts and benefits Explain and configure NSX Advanced Load Balancer infrastructure Explain and configure DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB Sites Explain and configure basic GSLB Services, to include pools and health monitors Describe GSLB Service Load Balancing algorithms Explain and configure Data and Control Plane-based Health Monitors Describe GSLB Health Monitor Proxy Global Server Load Balancing Advanced Topics Explain and configure advanced GSLB service properties such as different type of pool members, Host Header and TLS SNI extensions handling within GSLB Health Monitors Describe EDNS Client Subnet Describe Geo-aware Global Server Load Balancing Design and configure Geo-aware Global Server Load Balancing Describe and leverage DNS Policies to customize client experience Explain and configure Topology-aware Global Server Load Balancing Explain and configure GSLB 3rd party sites Describe GSLB Health Monitor sharding Describe GSLB Service Engine sizing implications Troubleshooting NSX Advanced Load Balancer GSLB Solution Introduce Infrastructure and Application troubleshooting Concepts Describe Control Plane and Data Plane-based troubleshooting Describe GSLB Infrastructure troubleshooting Describe GSLB Services troubleshooting Explain Health Monitors troubleshooting Describe Geo-aware and Topology-based GSLB Services troubleshooting Explain Application Analytics and Logs Describe Client Logs analysis Leverage CLI for advanced data plane troubleshooting Monitoring NSX Advanced Load Balancer Solution Describe NSX Advanced Load Balancer Events Describe and configure NSX Advanced Load Balancer Alerts Describe NSX Advanced Load Balancer monitoring capabilities leveraging SNMP, Syslog and Email

VMware NSX Advanced Load Balancer: Global Server Load Balancing Design and Deploy
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Kubernetes Engine

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following participants: Cloud architects, administrators, and SysOps/DevOps personnel Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview This course teaches participants the following skills: Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Platform Understand how pod networking works in Kubernetes Engine Create and manage Kubernetes Engine clusters using the GCP Console and gcloud/ kubectl commands Launch, roll back and expose jobs in Kubernetes Manage access control using Kubernetes RBAC and Google Cloud IAM Managing pod security policies and network policies Using Secrets and ConfigMaps to isolate security credentials and configuration artifacts Understand GCP choices for managed storage services Monitor applications running in Kubernetes Engine This class introduces participants to deploying and managing containerized applications on Google Kubernetes Engine (GKE) and the other services provided by Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as pods, containers, deployments, and services; as well as networks and application services. This course also covers deploying practical solutions including security and access management, resource management, and resource monitoring. Introduction to Google Cloud Platform Use the Google Cloud Platform Console Use Cloud Shell Define cloud computing Identify GCPs compute services Understand regions and zones Understand the cloud resource hierarchy Administer your GCP resources Containers and Kubernetes in GCP Create a container using Cloud Build Store a container in Container Registry Understand the relationship between Kubernetes and Google Kubernetes Engine (GKE) Understand how to choose among GCP compute platforms Kubernetes Architecture Understand the architecture of Kubernetes: pods, namespaces Understand the control-plane components of Kubernetes Create container images using Google Cloud Build Store container images in Google Container Registry Create a Kubernetes Engine cluster Kubernetes Operations Work with the kubectl command Inspect the cluster and Pods View a Pods console output Sign in to a Pod interactively Deployments, Jobs, and Scaling Create and use Deployments Create and run Jobs and CronJobs Scale clusters manually and automatically Configure Node and Pod affinity Get software into your cluster with Helm charts and Kubernetes Marketplace GKE Networking Create Services to expose applications that are running within Pods Use load balancers to expose Services to external clients Create Ingress resources for HTTP(S) load balancing Leverage container-native load balancing to improve Pod load balancing Define Kubernetes network policies to allow and block traffic to pods Persistent Data and Storage Use Secrets to isolate security credentials Use ConfigMaps to isolate configuration artifacts Push out and roll back updates to Secrets and ConfigMaps Configure Persistent Storage Volumes for Kubernetes Pods Use StatefulSets to ensure that claims on persistent storage volumes persist across restarts Access Control and Security in Kubernetes and Kubernetes Engine Understand Kubernetes authentication and authorization Define Kubernetes RBAC roles and role bindings for accessing resources in namespaces Define Kubernetes RBAC cluster roles and cluster role bindings for accessing cluster-scoped resources Define Kubernetes pod security policies Understand the structure of GCP IAM Define IAM roles and policies for Kubernetes Engine cluster administration Logging and Monitoring Use Stackdriver to monitor and manage availability and performance Locate and inspect Kubernetes logs Create probes for wellness checks on live applications Using GCP Managed Storage Services from Kubernetes Applications Understand pros and cons for using a managed storage service versus self-managed containerized storage Enable applications running in GKE to access GCP storage services Understand use cases for Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Bigtable, Cloud Firestore, and Bigquery from within a Kubernetes application

Architecting with Google Kubernetes Engine
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Artificial Intelligence Practitioner CAIP (AIP-210)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The skills covered in this course converge on four areas-software development, IT operations, applied math and statistics, and business analysis. Target students for this course should be looking to build upon their knowledge of the data science process so that they can apply AI systems, particularly machine learning models, to business problems. So, the target student is likely a data science practitioner, software developer, or business analyst looking to expand their knowledge of machine learning algorithms and how they can help create intelligent decisionmaking products that bring value to the business. A typical student in this course should have several years of experience with computing technology, including some aptitude in computer programming. This course is also designed to assist students in preparing for the CertNexus Certified Artificial Intelligence (AI) Practitioner (Exam AIP-210) certification Overview In this course, you will develop AI solutions for business problems. You will: Solve a given business problem using AI and ML. Prepare data for use in machine learning. Train, evaluate, and tune a machine learning model. Build linear regression models. Build forecasting models. Build classification models using logistic regression and k -nearest neighbor. Build clustering models. Build classification and regression models using decision trees and random forests. Build classification and regression models using support-vector machines (SVMs). Build artificial neural networks for deep learning. Put machine learning models into operation using automated processes. Maintain machine learning pipelines and models while they are in production Artificial intelligence (AI) and machine learning (ML) have become essential parts of the toolset for many organizations. When used effectively, these tools provide actionable insights that drive critical decisions and enable organizations to create exciting, new, and innovative products and services. This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, all while following a methodical workflow for developing data-driven solutions. Solving Business Problems Using AI and ML Topic A: Identify AI and ML Solutions for Business Problems Topic B: Formulate a Machine Learning Problem Topic C: Select Approaches to Machine Learning Preparing Data Topic A: Collect Data Topic B: Transform Data Topic C: Engineer Features Topic D: Work with Unstructured Data Training, Evaluating, and Tuning a Machine Learning Model Topic A: Train a Machine Learning Model Topic B: Evaluate and Tune a Machine Learning Model Building Linear Regression Models Topic A: Build Regression Models Using Linear Algebra Topic B: Build Regularized Linear Regression Models Topic C: Build Iterative Linear Regression Models Building Forecasting Models Topic A: Build Univariate Time Series Models Topic B: Build Multivariate Time Series Models Building Classification Models Using Logistic Regression and k-Nearest Neighbor Topic A: Train Binary Classification Models Using Logistic Regression Topic B: Train Binary Classification Models Using k-Nearest Neighbor Topic C: Train Multi-Class Classification Models Topic D: Evaluate Classification Models Topic E: Tune Classification Models Building Clustering Models Topic A: Build k-Means Clustering Models Topic B: Build Hierarchical Clustering Models Building Decision Trees and Random Forests Topic A: Build Decision Tree Models Topic B: Build Random Forest Models Building Support-Vector Machines Topic A: Build SVM Models for Classification Topic B: Build SVM Models for Regression Building Artificial Neural Networks Topic A: Build Multi-Layer Perceptrons (MLP) Topic B: Build Convolutional Neural Networks (CNN) Topic C: Build Recurrent Neural Networks (RNN) Operationalizing Machine Learning Models Topic A: Deploy Machine Learning Models Topic B: Automate the Machine Learning Process with MLOps Topic C: Integrate Models into Machine Learning Systems Maintaining Machine Learning Operations Topic A: Secure Machine Learning Pipelines Topic B: Maintain Models in Production

CertNexus Certified Artificial Intelligence Practitioner CAIP (AIP-210)
Delivered OnlineFlexible Dates
Price on Enquiry