Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level XML training course, designed for those needing an introduction to concepts and technologies associated with XML and its related recommendations. Previous experience or knowledge of HTML is helpful but not essential. Overview This course is an intensive, hands-on introduction to XML, XPath, and XSLT. The course is a balanced mixture of theory and practical labs designed to take students from the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with the fundamentals of XML, including coverage of DTDs and XML Schema. It then moves on to the XPath and XSLT standards, and how to use them to transform XML documents into other documents such as HTML documents or other XML documents. This course provides indoctrination in the practical use of W3C standards (including XSL and XML Schema) and of implementing tools and technologies. This course is programming language independent, making it useful for Java, .NET, C++, and any other programming orientation. Graduates will hit the ground running, applying XML to projects at both an architectural as well as a line by line coding level. We can easily adapt this course to industry and client specific needs.In addition to valuable knowledge and working examples, students receive a copy of the 'Xtensil' product. This unique software was developed to assist in implementing, testing, and fielding XML applications. Xtensil is used as both a teaching aid and a straightforward, basic, fully functional XML toolkit that students can use on Windows and Linux platforms. Working in a hands-on learning environment student will learn to: Write well-formed XML documents Model business requirements using XML Handle XML reserved characters Validate an XML document with a DTD and with a Schema Centralize data and markup definition with entities Create DTDs and Schemas using XML tools Generate XML documents from databases Write XSL templates to transform XML documents into HTML Integrate XML, XSL and the DOM to implement a complete solution The Extensible Markup Language (XML) is a standard that is enabling a revolution in web applications and business to business interactions. XML is the basis for Wireless Markup Language (WML), Voice Markup Language (VoiceML), Simple Object Access Protocol (SOAP), Web Services, and numerous industry initiatives such as ACORD (insurance), PXML (proposal/RFP) and OTA (travel). Introduction to XML is a three-day, hands-on course geared for software developers who need to understand what XML is and how to use in with today's systems and architectures. This course covers the topics from tags to architectures. The course is a balanced mixture of theory and practical labs designed to take students from a quick review of the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with a quick review of the fundamentals of XML before covering XML Schema in detail. It then moves on to the XPath and XSLT covering advanced topics in both. Finally, XML and Web Services security mechanisms and issues are addressed. XML Content Introduction to XML XML Mechanics XML Structure Namespaces Structure Using Schemas XML Formatting CSS and Rendering XML XSL Transformations XSLT and XPath XPath 2.0 and XSLT 2.0 Overview XSL FO (Formatting Objects) Applying XML XML Interoperability XML Performance Improvements Web Services Overview XML Applications Additional course details: Nexus Humans Introduction to XML (TT4300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to XML (TT4300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for network professionals who need to learn the techniques to implement, configure, monitor, and support Service Provider VPN solutions based on MPLS backbones. Network administrators Network engineers Network supervisors Network managers Network Operations Center (NOC) personnel Network designers Network architects Channel partners Overview After taking this course, you should be able to: Describe VPN concepts and operation in a Service Provider environment Implement Layer 3 MPLS VPN operations in a Service Provider environment Implement Layer 3 Inter-domain MPLS VPN services traversing multiple Service Providers Implement Layer 3 Multicast MPLS VPN operations in a Service Provider environment Troubleshoot typical issues in Layer 3 MPLS VPN environments Implement Layer 2 VPN operations in a Service Provider environment Troubleshoot Layer 2 VPN issues in a Service Provider network Implement MPLS VPN solutions for IPv6 environments Troubleshoot MPLS VPN solutions for IPv6 environments The Implementing Cisco Service Provider VPN Services (SPVI) 5-day course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification.This course prepares you for the 300-515 Implementing Cisco© Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist - Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP© Service Provider certification.This course will help you:Gain valuable skills in reinforcing MPLS VPN fundamental concepts, benefits, and classificationsLearn to configure optional paths for traffic to avoid network congestionPrepare to take the 300-515 SPVI exam Introducing VPN Services VPN Fundamentals MPLS VPN Control Plane Operation Troubleshooting MPLS VPN Underlay Troubleshoot Core Interior Gateway Protocol (IGP) Troubleshoot Border Gateway Protocol (BGP) Implementing Layer 3 MPLS VPNs Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNs Implementing Layer 3 Interdomain MPLS VPNs Inter-Autonomous System (AS) for Layer 3 MPLS VPNs Content Security and Control (CSC) for Layer 3 MPLS VPNs Implementing Layer 3 Multicast MPLS VPNs Multicast VPN (MVPN) Fundamentals Implement Intranet MVPN Troubleshooting Intra-AS Layer 3 VPNs Troubleshoot PE-CE Connectivity Troubleshoot PE-to-Route Reflecto Implementing Layer 2 VPNs Layer 2 Service Architecture and Carrier Ethernet Services Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree Solutions Troubleshooting Layer 2 VPNs Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) Solutions Implementing Layer 3 IPv6 MPLS VPNs Classical Solutions for Deploying IPv6 over IPv4 Environments Using 6VPE to Deploy IPv6 Connectivity over MPLS Environment Troubleshooting Layer 3 IPv6 MPLS VPNs Troubleshooting PE-to-PE Connectivity Additional course details: Nexus Humans Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Service Provider VPN Services 1.0 (SPVI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for System administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Describe VMware Carbon Black Cloud platform Describe data flows on VMware Carbon Black Cloud Create and edit a custom role in VMware Carbon Black Cloud Recognize the impact of a user role on a console user Describe the VMware Carbon Black Cloud sensor resource usage Explain sensor usage in VMware Carbon Black Cloud Identify configuration settings for endpoints in sensor policy settings Determine requirements for initial deployment of sensors Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Recognize the deployment process for VMware Carbon Black Cloud Workload⢠Identify eligible workloads in a VMware vSphere environment Describe VMware Carbon Black Cloud sensor deployment Manage VMware vSphere workloads Identify sensor status in RepCLI This two-day hands-on training course provides you with the knowledge, skills, and tools to achieve competency in planning and deploying VMware Carbon Black Cloud in your environment. This course explains the VMware Carbon Black Cloud components, managing users and roles in VMware Carbon Black Cloud, configuring policies to support sensor deployment and management, and presents methods for deploying sensors across endpoints and workloads. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Carbon Black Cloud Describe the VMware Carbon Black Cloud platform Describe VMware Carbon Black Cloud operating systems requirements Identify interesting files according to VMware Carbon Black Cloud Identify events collected Describe data flows Managing VMware Carbon Black Cloud Roles and Users Describe the use of roles in VMware Carbon Black Cloud Describe RBAC capabilities Create and edit a custom role Manage new console users Recognize the impact of a user role on a console user Describe authentication mechanisms VMware Carbon Black Cloud Sensors Describe the VMware Carbon Black Cloud sensor resource usage List the supported operating systems for VMware Carbon Black Cloud sensors Explain sensor usage in VMware Carbon Black Cloud Preparing for Deployment Identify configuration settings for endpoints in sensor policy settings Organize sensors using sensor groups to assign the desired policy based on specific criteria Compare VDI sensor settings as compared to traditional endpoint sensor settings Determine requirements for the initial deployment of sensors Evaluate the policy impact on sensors Identify best practices for deploying sensors Installing Sensors Describe how to send an installation request Recognize the features and limitations of an installation code and company code Recognize the process for successfully completing an attended installation Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Generate logs with unattended installations Generate sensor logs Check network connectivity for sensor installation Deploying Workloads Recognize the deployment process for VMware Carbon Black Cloud Workload Identify eligible workloads in a vSphere environment Recognize how to enable the VMware Carbon Black Cloud sensor on a VM workload Managing Sensors Describe VMware Carbon Black Cloud sensor deployment Explain the differences in sensor status Describe sensor update capabilities Explain sensor actions Manage vSphere workloads Post-deployment Validation Describe the process of a sensor background scan Recognize a properly registered sensor installation Identify sensor status in RepCLI Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud: Plan and Deploy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud: Plan and Deploy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows - IT Staff and Managers - Network and systems personnel and engineers - Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics Overview Upon completing this course, the student will be able to meet these objectives: Students will be able to Deploy and Manage a Meraki Network using the Meraki Dashboard - Deploy, Manage, Monitor and Troubleshoot Meraki MS Switches - Deploy, Manage, Monitor and Troubleshoot Meraki MR Wireless Access Points - Deploy, Manage, Monitor and Troubleshoot Meraki MX Firewall Appliances - Deploy, Manage, Monitor and Troubleshoot Meraki MV IP Video Cameras - Deploy, Manage, Monitor and Troubleshoot Meraki MC Phones - Deploy, Manage, Monitor and Troubleshoot Meraki Systems Manager - Deploy, Manage, Monitor and Troubleshoot Meraki SDWAN This course familiarizes individuals with networking concepts and demonstrates how to effectively use Meraki products to build a comprehensive network Cisco/Meraki Product Line Introduction MS - Switching MR - Wireless LAN MX - Security MV ? Camera MC - Voice SD-WAN Cisco/Meraki Cloud Management Introduction to cloud management The dashboard and navigation Organizations & Networks ? what is the difference and how to use them System-wide parameters (organization parameters) Cisco/Meraki Dashboard Administration Creating and implementing maps Summary Report and Auto Generation Reports Adding administrators and tweaking security levels Using Tags and Configuring Alerting (SNMP, email) Adding admins, configuring reports, and alerts Firmware Management Configuring Authentication Lab 1 Lab 2 Configuring external authentication Configuring Group Policies Device Replacement Location Analytics Other advanced analytics Cisco/Meraki Switching Review switching basics Review Meraki L2 Switch Models Configuring Meraki Switches Troubleshooting / Diagnostics Lab 3 Cisco/Meraki Routing Review routing basic (IP Addresses, Networks and Masks, OSPF, etc.) Review Meraki L3 switch Models Configuring Meraki Switches for Routing Lab 4 Cisco/Meraki Wireless Review Wireless Basics Meraki Wireless Product Review Performing a Site Survey Configuring Access Points Lab 5 Cisco/Meraki Firewalls/Security Review firewall basics Meraki Firewall Model Review Configuring a Meraki Firewall Lab 6 IP Cameras MV21 vs MV71 Installing Cameras Adding Cameras to the Dashboard Managing MV Cameras Troubleshooting Cameras Lab 7 Meraki Communications QOS Voice Security Deploying Meraki MC74 Phones Deploying Cisco IP Phones to CUCM Deploying Voice Features End User Lab 8 Meraki Systems Manager Controlling Wireless Device Policies Enrolling Devices Apps Profiles Tags Security Policies Geofencing Policies Lab 9 Meraki SDWAN What is SD-WAN? Concentrator Mode VPN Topology Split Tunnel Full Tunnel Hub and Spoke VPN Mesh Datacenter Redundancy (DC-DC Failover) Warm Spare (High Availability) for VPN concentrators Connection Monitor Dual-Active VPN uplinks Policy-based Routing Dynamic Path Selection SD-WAN Objectives Example Topology High Level Traffic Flow SD-WAN Technologies Deploying a one-armed concentrator Dashboard Configuration Other Datacenter Configuration MX IP Assignment Upstream Considerations Datacenter Redundancy (DC-DC Failover) High-level architecture Failover Times Datacenter Deployment Branch Deployment Lab 10 Meraki Support Getting support for Meraki Finding the Right Documentation Posting in the Community Troubleshooting Meraki Connectivity Issues Resetting Devices. Additional course details: Nexus Humans Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Implementing and Configuring Meraki Technologies v1.0 (ICMT - CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of BIG-IP Access Policy Manager Overview This course provides the skills to create and manage BIG-IP APM system. This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons. In lesson one, you learn how to configure BIG-IP APM to provide Active Directory-based authentication for a load-balanced pool of web servers. In lesson two, you learn how to create a policy that provides an SSL VPN (Network Access) resource to users, but only when they log into BIG-IP APM using a corporate-issued PC. Finally, lesson three builds on the first two lessons to create a policy that provides a dynamic landing page with both SSL VPN as well as an OWA (Portal Access) resource, but only to users with special authorization. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Configuring Web Application Access Review of BIG-IP LTM Introduction to the Access Policy Web Access Application Configuration Overview Web Application Access Configuration in Detail Exploring the Access Policy Navigating the Access Policy Managing BIG-IP APM BIG-IP APM Sessions and Access Licenses Session Variables and sessiondump Session Cookies Access Policy General Purpose Agents List Using Authentication Introduction to Access Policy Authentication Active Directory AAA Server RADIUS One-Time Password Local User Database Understanding Assignment Agents List of Assignment Agents Configuring Portal Access Introduction to Portal Access Portal Access Configuration Overview Portal Access Configuration Portal Access in Action Configuring Network Access Concurrent User Licensing VPN Concepts Network Access Configuration Overview Network Access Configuration Network Access in Action Deploying Macros Access Policy Macros Configuring Macros An Access Policy is a Flowchart Access Policy Logon Agents Configuring Logon Agents Exploring Client-Side Checks Client-Side Endpoint Security Exploring Server-Side Checks Server-Side Endpoint Security Agents List Server-Side and Client-Side Checks Differences Using Authorization Active Directory Query Active Directory Nested Groups Configuration in Detail Configuring AppTunnels Application Access Remote Desktop Network Access Optimized Tunnels Landing Page Bookmarks Deploying Access Control Lists Introduction to Access Control Lists Configuration Overview Dynamic ACLs Portal Access ACLs Signing On with SSO Remote Desktop Single Sign-On Portal Access Single Sign-On Using iRules iRules Introduction Basic TCL Syntax iRules and Advanced Access Policy Rules Customizing BIG-IP APM Customization Overview BIG-IP Edge Client Advanced Edit Mode Customization Landing Page Sections Deploying SAML SAML Conceptual Overview SAML Configuration Overview Exploring Webtops and Wizards Webtops Wizards Using BIG-IP Edge Client BIG-IP Edge Client for Windows Installation BIG-IP Edge Client in Action Lesson Configuration Project Additional Training and Certification Getting Started Series Web-Based Training F5 Instructor Led Training Curriculum F5 Professional Certification Program F5 Instructor Led Training Curriculum F5 Professional Certification Program Additional course details: Nexus Humans F5 Configuring BIG-IP APM - Access Policy Manager v13.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Configuring BIG-IP APM - Access Policy Manager v13.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2.5 Days 15 CPD hours This course is intended for This course is intended for those with a basic understanding of Tableau who want to pursue mastery of the advanced features. Overview The goal of this course is to present essential Tableau concepts and its advanced functionalities to help better prepare and analyze data. This course will use Tableau Hyper, Tableau Prep and more. Getting Up to Speed ? a Review of the Basics Connecting Tableau to your data Connecting to Tableau Server Connecting to saved data sources Measure Names and Measure Values Three essential Tableau concepts Exporting data to other devices Summary All About Data ? Getting Your Data Ready Data mining and knowledge discovery process models CRISP?DM All About Data ? Joins, Blends, and Data Structures All About Data - Joins, Blends, and Data Structures Introduction to joins Introduction to complex joins Exercise: observing join culling Introduction to join calculations Introduction to spatial joins Introduction to unions Understanding data blending Order of operations No dimensions from a secondary source Introduction to scaffolding Introduction to data structures Exercise: adjusting the data structure for different questions Summary Table Calculations Table Calculations A definition and two questions Introduction to functions Directional and non-directional table calculations Application of functions Summary Level of Detail Calculations Level of Detail Calculations Building playgrounds Playground I: FIXED and EXCLUDE Playground II: INCLUDE Practical application Exercise: practical FIXED Exercise: practical INCLUDE Exercise: practical EXCLUDE Summary Beyond the Basic Chart Types Beyond the Basic Chart Types Improving popular visualizations Custom background images Tableau extensions Summary Mapping Mapping Extending Tableau's mapping capabilities without leaving Tableau Extending Tableau mapping with other technology Exercise: connecting to a WMS server Exploring the TMS file Exploring Mapbox Accessing different maps with a dashboard Creating custom polygons Converting shape files for Tableau Exercise: polygons for Texas Heatmaps Summary Tableau for Presentations Tableau for Presentations Getting the best images out of Tableau From Tableau to PowerPoint Embedding Tableau in PowerPoint Animating Tableau Story points and dashboards for Presentations Summary Visualization Best Practices and Dashboard Design Visualization Best Practices and Dashboard Design Visualization design theory Formatting rules Color rules Visualization type rules Compromises Keeping visualizations simple Dashboard design Dashboard layout Sheet selection Summary Advanced Analytics Advanced Analytics Self-service Analytics Use case ? Self-service Analytics Use case ? Geo-spatial Analytics Summary Improving Performance Improving Performance Understanding the performance-recording dashboard Exercise: exploring performance recording in Tableau desktop Performance-recording dashboard events Behind the scenes of the performance- recording dashboard Hardware and on-the-fly techniques Hardware considerations On-the-fly-techniques Single Data Source > Joining > Blending Three ways Tableau connects to data Using referential integrity when joining Advantages of blending Efficiently working with data sources Tuning data sources Working efficiently with large data sources Intelligent extracts Understanding the Tableau data extract Constructing an extract for optimal performance Exercise: summary aggregates for improved performance Optimizing extracts Exercise: materialized calculations Using filters wisely Extract filter performance Data source filter performance Context filters Dimension and measure filters Table-calculation filters Efficient calculations Boolean/Numbers > Date > String Additional performance considerations Avoid overcrowding a dashboard Fixing dashboard sizing Setting expectations Summary Additional course details: Nexus Humans Advanced Tableau training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Tableau course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise networks Overview By the end of the course, you should be able to meet the following objectives: Use the native tools available in NSX to identify and troubleshoot the problems. Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to identify and troubleshoot problems related to the NSX environment. Explain the NSX infrastructure components and the communications between them. Identify, analyze, and troubleshoot problems related to the management, control, and data planes in NSX. Identify, analyze, and troubleshoot problems related to infrastructure preparation and VMware NSX Edge deployments. Identify, analyze, and troubleshoot problems related to logical switching and logical routing. Identify, analyze, and troubleshoot network security problems related to the Distributed firewalls, Gateway firewalls, and Distributed IDS/IPS. Identify, analyze, and troubleshoot problems related to VPN and VMware NSX Advanced Load Balancer. Identify the components and packet flows involved in the NSX datapath and troubleshoot related problems. This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX infrastructure. This course introduces you to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your VMware NSX environment.In addition, various types of technical problems are presented to you, which you will identify, analyze, and solve through a systematic process. Course Introduction Introduction and course logistics Course objectives NSX Operations and Tools Explain and validate the native troubleshooting tools for NSX Configure syslog, IPFIX, and log collections for the NSX environment Integrate NSX with VMware Aria Operations for Logs and VMware Aria Operations for Networks Validate and review the API methods available to configure the NSX environment Troubleshooting the NSX Management Cluster Describe the NSX Management cluster architecture, components, and communication channels Identify the workflows involved in configuring the NSX Management cluster Validate and troubleshoot the NSX Management cluster formation Troubleshooting Infrastructure Preparation Describe the data plane architecture, components, and communication channels Explain and troubleshoot VMware ESXi transport node preparation issues Explain and troubleshoot NSX Edge deployment issues Troubleshooting Logical Switching Describe the architecture of logical switching List the modules and processes involved in configuring logical switching Explain the importance of VDS in transport nodes Review the architecture and workflows involved in attaching workloads to segments Identify and troubleshoot common logical switching issues Troubleshooting Logical Routing Review the architecture of logical routing Explain the workflows involved in the configuration of Tier-0 and Tier-1 gateways Explain the high availability modes and validate logical router placements Identify and troubleshoot common logical routing issues using both BGP and OSPF Troubleshooting Security Review the architecture of the Distributed Firewall Explain the workflows involved in configuring the Distributed Firewall Review the architecture of the Gateway Firewall Explain the workflows involved in configuring the Gateway Firewall Identify and troubleshoot common Distributed firewall and Gateway Firewall issues Review the architecture and workflows involved in configuring Distributed IDS/IPS Identify and troubleshoot common Distributed IDS/IPS problems. Troubleshooting Services Review the NSX Advanced Load Balancer architecture and components Identify and troubleshoot common NSX Advanced Load Balancer issues Review the IPsec and L2 VPN architecture and components Identify and troubleshoot common IPsec and L2 VPN issues Datapath Walkthrough Verify and validate the path of the packet on the NSX datapath Identify and perform packet captures at various points in the datapath Use NSX CLI and native hypervisor commands to retrieve configurations involved in the NSX datapath Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX: Troubleshooting and Operations [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX: Troubleshooting and Operations [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network design engineers Network engineers System administrators Overview After taking this course, you should be able to: Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise network Design Open Shortest Path First (OSPF) internal routing for the enterprise network Design Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise network Design a network based on customer requirements Design Border Gateway Protocol (BGP) routing for the enterprise network Describe the different types and uses of Multiprotocol BGP (MP-BGP) address families Describe BGP load sharing Design a BGP network based on customer requirements Decide where the L2/L3 boundary will be in your Campus network and make design decisions Describe Layer 2 design considerations for Enterprise Campus networks Design a LAN network based on customer requirements Describe Layer 3 design considerations in an Enterprise Campus network Examine Cisco SD-Access fundamental concepts Describe Cisco SD-Access Fabric Design Design a Software-Defined Access (SD-Access) Campus Fabric based on customer requirements Design service provider-managed VPNs Design enterprise-managed VPNs Design a resilient WAN Design a resilient WAN network based on customer requirements Examine the Cisco SD-WAN architecture Describe Cisco SD-WAN deployment options Design Cisco SD-WAN redundancy Explain the basic principles of QoS Design Quality of Service (QoS) for the WAN Design QoS for enterprise network based on customer requirements Explain the basic principles of multicast Designing rendezvous point distribution solutions Describe high-level considerations when doing IP addressing design Create an IPv6 addressing plan Plan an IPv6 deployment in an existing enterprise IPv4 network Describe the challenges that you might encounter when transitioning to IPv6 Design an IPv6 addressing plan based on customer requirements Describe Network APIs and protocols Describe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF) The Designing Cisco Enterprise Networks (ENSLD) v1.1 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on the topics covered in the Implementing and Operating Cisco© Enterprise Network Core Technologies (ENCOR) v1.0 course.This course also helps you prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam which is part of the CCNP© Enterprise and Cisco Certified Specialist - Enterprise Design certifications. Course Outline Designing EIGRP Routing Designing OSPF Routing Designing IS-IS Routing Design Case Study Activity: Designing Enterprise Connectivity Designing BGP Routing and Redundancy Understanding BGP Address Families and Attributes Design Case Study Activity: Designing an Enterprise Network with BGP Internet Connectivity Designing the Enterprise Campus LAN Designing Layer 2 Campus Design Case Study Activity: Designing an Enterprise Campus LAN Designing Layer 3 Campus Discovering the Cisco SD-Access Architecture Exploring Cisco SD-Access Fabric Design Exploring Cisco SD-Access Site Design Strategy and Considerations Design Case Study Activity: Designing Cisco SD-Access in the Enterprise Designing Service Provider-Managed VPNs Designing Enterprise-Managed VPNs Designing WAN Resiliency Design Case Study Activity: Designing Resilient Enterprise WAN Examining Cisco SD-WAN Architectures Examining Cisco SD-WAN Deployment Design Considerations Designing Cisco SD-WAN Routing and High Availability Design Case Study Activity: Designing Resilient Enterprise Cisco SD-WAN Understanding QoS Designing LAN and WAN QoS Design Case Study Activity: Designing QoS in an Enterprise Network Exploring Multicast with Protocol-Independent Multicast-Sparse Mode (PIM-SM) Designing Rendezvous Point Distribution Solutions Designing an IPv4 Address Plan Exploring IPv6 Deploying IPv6 Design Case Study Activity: Designing an Enterprise IPv6 Network Introducing Network APIs and Protocols Exploring YANG, NETCONF, RESTCONF, and Model-Driven Telemetry Additional course details: Nexus Humans Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for information technology (IT) professionals who need to improve their expertise in Windows Server 2016 in the area of storage and compute functionality. Overview After completing this course, you will be able to: Configure and install Windows Server 2016 Manage Server Core, server upgrade and migration strategy Understand storage options Manage partition table formats Manage basic and dynamic disks, file systems Manage virtual hard disks, and drive hardware Manage disks and volumes Select and manage proper storage solutions for a specific scenario Storage Spaces and Data Deduplication implementation Configure and Manage Microsoft Hyper-V, virtual machines and Hyper-V containers Configure disaster recovery technologies Manage and Configure failover clustering for Hyper-V virtual machines Configure, plan and implement a Network Load Balancing (NLB) Work with deployment images This course is intended for information technology (IT) professionals who have basic knowledge of Windows Server. It is designed for professionals who have primary responsibility of managing storage and computing by using Windows Server 2016. Professionals who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.This course covers content that was in retired Microsoft Course 20740. Module 1: Installing, upgrading, and migrating servers and workloads Introducing Windows Server 2016 Preparing and installing Server Core Preparing for upgrades and migrations Migrating server roles and workloads Windows Server activation models Module 2: Configuring local storage Managing disks in Windows Server Managing volumes in Windows Server Module 3: Implementing enterprise storage solutions Overview of DAS, NAS, and SANs Comparing Fibre Channel, iSCSI, and Fibre Channel over Ethernet Understanding iSNS, DCB, and MPIO Configuring sharing in Windows Server 2016 Module 4: Implementing Storage Spaces and Data Deduplication Implementing Storage Spaces Managing Storage Spaces Implementing Data Deduplication Module 5: Installing and configuring Hyper-V and virtual machines Overview of Hyper-V Installing Hyper-V Configuring storage on Hyper-V host servers Configuring networking on Hyper-V host servers Configuring Hyper-V virtual machines Managing virtual machines Module 6: Deploying and managing Windows and Hyper-V containers Overview of containers in Windows Server 2016 Preparing for containers Installing, configuring, and managing containers by using Docker Module 7: Overview of high availability and disaster recovery Defining levels of availability Planning high availability and disaster recovery solutions with Hyper-V virtual machines Backing up and restoring by using Windows Server Backup High Availability with failover clustering in Windows Server 2016 Module 8: Implementing failover clustering Planning a failover cluster Creating and configuring a new failover cluster Maintaining a failover cluster Troubleshooting a failover cluster Implementing site high availability with stretch clustering Module 9: Implementing failover clustering with Windows Server 2016 Hyper-V Overview of yhe integration of Hyper-V Server 2016 with failover clustering Implementing Hyper-V VMs on failover clusters Key features for VMs in a clustered environment Module 10: Implementing Network Load Balancing Overview of NLB Configuring an NLB cluster Planning an NLB implementation Module 11: Creating and managing deployment images Introduction to deployment images Creating and managing deployment images by using MDT Virtual machine environments for different workloads Module 12: Managing, monitoring, and maintaining virtual machine installations WSUS overview and deployment options Update management process with WSUS Overview of Windows PowerShell DSC Overview of Windows Server 2016 monitoring tools Using Performance Monitor Monitoring event logs Additional course details: Nexus Humans 55324 Installation, Storage and Compute with Windows Server 2016 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55324 Installation, Storage and Compute with Windows Server 2016 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.