• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

18444 Step courses

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering Collaboration Environments (CLACE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Administrator IT support personnel Helpdesk support staff The secondary audience for this course is as follows: Network Engineering Staff Overview Upon completing this course, the learner can meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) system and its environment Configure CUCM to support IP Phones Configure Cisco Unified Communications Manager and IM&Presence to support Cisco Jabber soft client. Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Demonstrate the use of Self Care Portal functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Define the capabilities of and demonstrate the Bulk Administration Tool Define the SMART Licensing model for Cisco Unified Communications Demonstrate the use of the Unified Reporting tool Demonstrate the use of the Dialed Number Analyzer Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system Describe the components that are required for user call processing by Cisco Unity Connection Implement the various features and options that are available to users in Cisco Unity Connection Explore Cisco Unity Connection version features and functions Use the various applications, tools, and reports that are available in Cisco Unity Connection Administering Collaboration Environments (CLACE) is an instructor-led course presented by Skyline-ATS to system administrators and customers involved with the Cisco Unified Communications Manager and Cisco Unity Connection product's day-to-day operation. The CLACE course is the replacement for the CMA / UCA courses. CLACE is a lab-intensive course. The primary focus is learning by performing the configuration tasks. The amount of theory is limited to allow more time for discovery exercises. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan, and implementing Features. The course also covers Jabber administration and Cisco Unity Connection administration features, options, and configuration settings. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the CUCM and CUC software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x of the applications. The concepts and the lab tasks are the same for most of the software versions. Define Collaboration Technology and Benefits Define Collaboration Benefits Describe On-Premise, Cloud, and Hybrid Deployments Describe On-Premise Collaboration Deployments Describe Cisco's Collaboration Endpoints Describe Cisco Collaboration On-Premise Edge Solutions Describe Cisco's Collaboration On-Premise Conferencing Solutions Describe Cisco Cloud Services Administering Initial Parameters for Cisco Unified Communications Manager Understand the On-Premise Collaboration Deployment Models Describe The Cisco Unified CM Cluster Services Define Network requirements for Collaboration Define Network Services for Collaboration Navigate Cisco Unified CM Discovery 1: Configure Cisco Unified Communications Manager Initial Parameters Explore Cisco Unified CM Groups Discovery 2: Configure the Cisco UCM Core Systems Settings Exploring Endpoints and the Registration Process Identify Cisco Endpoint Solutions Explore the Boot up Process of an Endpoint Describe Power Over Ethernet Discovery 3: Configure an Access Switch for an Endpoint Describe IP Network Settings Discovery 4: Deploy an IP Phone Through Auto and Manual Registration Discovery 5: Administer Endpoints in Cisco Unified Communications Manager Managing Users in Cisco Unified Communications Manager Analyze Cisco UCM Users Types and Settings Describe Methods for Authenticating Cisco UCM Users Discovery 6: Create Local User Accounts Discovery 7: Adding Users in Cisco Unified Communications Manager Describing a Basic Dial Plan Describe the Concepts of a Dial Plan and Call Routing Describe Elements of Call Routing Explore Digit Manipulation and Translation Patterns Discovery 8: Create a Basic Dial Plan Describing Class of Service Explore the Concepts of Class of Control Discovery 9: Explore Partitions and Calling Search Spaces Discovery 10: Explore Private Line Automatic Ringdown (PLAR) Enabling Endpoints and Features Configure a Cisco Jabber Endpoint in Cisco UCM Discovery 11: Implementing Common Endpoint Features (Configuring Hunt Groups and Call Coverage) Explore Mobility Discovery 12: Implement Mobility Implementing Media Resources in Cisco Unified Communications Manager Media Resource Overview Media Resource Selection and Access Control Audio and Video Conference Bridge Devices Audio and Video Conference Bridge Integration Options Discovery 13: Configuring Media Resources Reporting and Maintenance Explore the Troubleshooting Process Describe Reporting and Maintenance Tools Describe the Cisco Real-Time Monitoring Tool Discovery 14: Use Reporting and maintenance Tools Describing Cisco Instant Messaging and Presence Describe Cisco IM and Presence Features and Architecture Clustering Describe Cisco IM and Presence Components and Communication Flows Enabling Jabber Cisco Jabber Deployment Modes Discovery 15: Deploy an On-Premise Cisco Jabber Client for Windows Configure Unity Connection Integration Overview of Cisco Unity Connection Integration SIP Integration Typical Integration Mistakes Integration Considerations Discovery 16: Configure the integration between Cisco Unity Connection and Cisco UCM Discovery 17: Configure Voicemail Users Configuring Cisco Unity Connection Call Handlers Call handler Overview System Call Handler Caller Input Operator Call Handler Goodbye Call Handler Directory Handler Interview Handler Troubleshooting Cisco Unity Connection Overview of Cisco Unity Connection Troubleshooting Options Integration Troubleshooting Tools Cisco Real-Time Monitoring Tool Discovery 18: Troubleshoot Cisco Unity Connection Additional course details: Nexus Humans Cisco Administering Collaboration Environments (CLACE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Collaboration Environments (CLACE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Administering Collaboration Environments (CLACE)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System architects and system administrators Overview By the end of the course, you should be able to meet the following objectives: Plan a deployment for VMware Cloud Foundation Understand VMware Cloud Foundation and supporting architecture Configure VMware Cloud Foundation for VMware Cloud Connectivity Understand the VMware Cloud Foundation subscription licensing model Perform Day-Zero tasks Perform VMware Cloud Foundation platform onboarding Manage user credentials in VMware Cloud Foundation Configure NSX networking in VMware Cloud Foundation Deploy and manage Workload Domains Deploy vSphere with Tanzu on VMware Cloud Foundation Understand and implement storage solutions and related policies Perform maintenance tasks for the VMware Cloud Foundation platform Manage certificates for VMware Cloud Foundation and connected technologies Manage the lifecycle for VMware Cloud Foundation Engage with VMware Cloud Foundation Technical Support This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment. Course Introduction Introductions and course logistics Course objectives VMware cloud foundation overview Describe the VMware Cloud Foundation solution Describe VMware Cloud Foundation architecture Identify VMware Cloud Foundation components Describe the VMware Cloud Foundation topology VMware Cloud Foundation+ and VMware Cloud Connectivity Describe the VMware Cloud Foundation+ architecture Identify the pre-requisites for VMware Cloud Foundation+ Describe VMware Cloud Foundation+ value added features Configure subscription-based licensing parameters Describe the vCenter Cloud Gateway functionality Identify the vCenter Cloud Gateway components Describe the vCenter Cloud Gateway architecture Connect the vCenter Cloud Gateway to VMware Cloud Describe the VMware Cloud platform Describe the VMware vSphere+ services used in VMware Cloud Foundation+ Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+ Day Zero Tasks Identify the requirements for deploying VMware Cloud Foundation Describe the VMware Cloud Foundation bring-up process Identify the information required for the Planning and Preparation Workbook Complete the Deployment Parameter Workbook Describe how VMware Cloud Builder automates the deployment process Identify the configuration validation process performed by VMware Cloud Builder Describe the deployment of the management domain Post-Deployment Operations Complete the Onboarding Wizard Understand VMware Cloud Foundation integration with VMware Single Sign-On Configure user access to VMware Cloud Foundation Describe the importance of user roles in vSphere Configure identity sources for VMware Cloud Foundation Perform the SDDC Manager backup and restore process Identify steps in the NSX backup and restore process Manage passwords in VMware Cloud Foundation Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components Manage and secure a primary password list Describe the process for rotating passwords not managed by VMware Cloud Foundation VMware Cloud Foundation Networking with NSX Describe network virtualization with NSX Recognize NSX operational planes Identify NSX components Describe logical switching Describe NSX Data Center deployment in VMware Cloud Foundation Explain how logical routing works in NSX Identify NSX Edge functions Describe data plane preparation for NSX Edge nodes in a workload domain Recognize Tier-0 and Tier-1 gateway topologies Define application virtual networks Describe management domain rack options List NSX Edge cluster requirements for vSphere with Tanzu Discuss NSX Edge cluster placement considerations Managing Workload Domains Define workload domains List the types of workload domains Identify workload domain prerequisites Understand the scalability limits for workload domains Identify use cases for multiple clusters in a workload domain Create network pools Size network pools Commission hosts with SDDC Manager Create workload domains Scale workload domains Decommission hosts from a workload domain Remove workload domains Describe distinctive design decisions for VMware Cloud Foundation components vSphere with Tanzu in VMware Cloud Foundation Explain vSphere with Tanzu Define the role of the Spherelet Describe the supervisor cluster control plane Create vSphere with Tanzu namespaces Describe the role of NSX networking components in vSphere with Tanzu Discuss vSphere with Tanzu networking topology Describe control plane VM management networking requirements Plan appropriate IP address ranges for pod, ingress, and egress networking Describe prerequisites for vSphere with Tanzu cluster compatibility Deploy vSphere with Kubernetes Create a vSphere namespace Configure limits and permissions for a vSphere namespace VMware Cloud Foundation Storage Management Identify storage use cases in VMware Cloud Foundation Determine the most appropriate storage option for a workload domain Describe different vSphere-native storage design options Identify vSAN architecture and components Describe vSAN requirements for the management and workload domains Configure deduplication and compression Discuss how to scale vSAN clusters in VMware Cloud Foundation Configure storage policies for vSAN Explain storage policy failure tolerance rules Identify a virtual machine storage policy compliance status Explain how vSAN storage policies protect VMware Cloud Foundation components Availability and Business Continuity Explain the importance of external service availability Describe availability options native to VMware vSphere Identify stretched cluster use cases Identify stretched cluster components Recognize stretched cluster requirements in VMware Cloud Foundation Prepare and deploy a vSAN stretched cluster using APIs VMware Cloud Foundation Certificate Management Learn the basics of public key infrastructure (PKI) Describe the purpose of certificate signing requests (CSRs) Describe available options in SDDC Manager for certificate authorities View certificates for VMware Cloud Foundation components Install and replace certificates for VMware Cloud Foundation components Configure the integrated Certificate Authorities in SDDC Manager Configure a certificate template in Microsoft Certificate Authority server Configure the OpenSSL certificate authority in SDDC Manager Install certificates issued by Microsoft, OpenSSL, and third-party certificate authorities VMware Cloud Foundation Lifecycle Management Describe VMware Cloud Foundation Life Cycle Management List the products managed by VMware Cloud Foundation Lifecycle management Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation Understand vSphere Lifecycle Manager features Understand how and when to use cluster images Describe the importance of Hardware Support Managers Describe the upgrade prerequisites Outline the upgrade precheck process Describe the order of upgrade for VMware Cloud Foundation components VMware Cloud Foundation Troubleshooting Use the SoS command-line tool to create log bundles, perform health checks, and check password validity List VMware Cloud Foundation services Identify VMware Cloud Foundation log files Use token IDs to troubleshoot failed workflows

VMware Cloud Foundation: Plan, Manage and Operate [V5.0]
Delivered OnlineFlexible Dates
Price on Enquiry

AJER - Advanced Junos Enterprise Routing

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. Describe OSPF link metrics. Describe the various OSPF authentication methods. Explain the differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Configure OSPF multi-area adjacencies. Configure OSPF virtual links. Explain OSPF external reachability. List useful commands that are used to troubleshoot and verify OSPF. Isolate different OSPF issues. Describe BGP operations. Configure various BGP options. Explain the route selection process for BGP. Describe how to alter the route selection process. Explain the use of routing policies in BGP. Explain how BGP routes are processed. Describe the various BGP attributes and their use. Manipulate common BGP attributes. Review common BGP troubleshooting procedures. List common BGP troubleshooting commands. Identify issues with BGP peering. Explain reasons to use BGP in the Enterprise. Explain how ISP policies can influence external connectivity. Describe three common routing policies for external connectivity in the enterprise. Identify common commands for troubleshooting routing policy. Describe basic multicast terminology. Describe the multicast address space. Describe how RPF is used in a multicast network. Describe the basic functionality of IGMP. Describe the multicast service models and modes. Describe PIM-SM operation and configuration when using the ASM model. Describe PIM-SM operation and configuration when using the SSM model. Verify and troubleshoot multicast. Identify environments that may require a modified CoS implementation. Describe the various CoS components and their respective functions. Explain the CoS processing along with CoS defaults on SRX Series devices. Describe situations in which some CoS features are used in the enterprise. Describe the use of the Real-Time Performance Monitoring tool. Verify and troubleshoot CoS. Describe a traditional Campus network design. Understand the need for a new architectural design. Describe the five key concepts of the Evolved Core. Describe the benefits of a Layer 3-based Campus Networks. Describe Layer 2 tunneling. Explain VXLAN functionality. Describe VXLAN gateways. Describe EVPN features. Describe EVPN operations. This five-day course is designed to provide students with the tools required for implementing, monitoring, and troubleshooting Layer 3 components in an enterprise network. Chapter 1: Course Introduction Course Introduction Chapter 2: OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPFv3 Lab 1: Configuring and Monitoring OSPF Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization Chapter 4: Advanced OSPF Options OSPF Multi-Area Adjacencies Virtual Links External Reachability Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Options Chapter 5: Troubleshooting Troubleshooting LSDB Consistency Issues Case Study: Adjacency Issues Lab: Troubleshooting OSPF Chapter 6: BGP Review of BGP BGP Configuration Options BGP Operations BGP Path Selection and Options Lab: Implementing BGP Chapter 7: BGP Attributes and Policy Policy and BGP BGP Attributes Details and Manipulation of Common BGP Path Attributes Lab: BGP Attributes Chapter 8: Troubleshooting BGP BGP Troubleshooting BGP Case Study Lab: Troubleshooting BGP Chapter 9: Enterprise Routing Policies Enterprise BGP Core Network Design Enterprise External Network Deployment Lab: Implementing Enterprise Routing Policies Chapter 10: Troubleshooting Policies Routing Policy Structure Using RegEx Routing Policy Troubleshooting Case Study Lab: Troubleshooting Routing Policies Chapter 11: Introduction to Multicast Overview of Multicast Multicast Addressing RPF IGMP Lab: PIM-SM Chapter 12: Multicast Routing Protocols and SSM Overview of Multicast Routing Protocols PIM-SM Using the ASM Model PIM-SM Using the SSM Model Lab: Implementing PIM-SM Lab: Implementing SSM Chapter 13: Troubleshooting Multicast Multicast Troubleshooting Multicast Case Study Lab: Troubleshooting Multicast Chapter 14: Class of Service CoS Components Review and Case Study CoS Processing and CoS Defaults on the SRX Series Device Policing Virtual Channels Monitoring with Resource Performance Monitoring Lab 9: Implementing CoS Features in the Enterprise Chapter 15: Troubleshooting Class of Service CoS Troubleshooting CoS Case Study Lab: Troubleshooting Class of Service Chapter 16: Enterprise Architectures Traditional Enterprise Networks A New Architecture Key Concepts of the Evolved Core IP Fabric Campus Design Chapter 17: VXLAN Layer 2 Connectivity over a Layer 3 Network VXLAN Overview VXLAN Gateways Chapter 18: EVPN-VXLAN Overview of EVPN EVPN Operations EVPN and VXLAN Chapter 19: Configuring EVPN-VXLAN Configuring EVPN-VXLAN Spine Only network Add IP Fabric leaf nodes to a Spine Only design Configuring a new IP Fabric EVPN-VXLAN network Chapter 20: Migrating to an IP Fabric EVPN Routes Useful EVPN Commands Appendix A: BGP Route Reflection Route Reflection Operation Configuration and Routing Knowledge Lab: BGP Route Reflection (Optional) Appendix B: Troubleshooting IS-IS IS-IS Troubleshooting Lab: Troubleshooting IS-IS and Mixed Environments Additional course details: Nexus Humans AJER - Advanced Junos Enterprise Routing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJER - Advanced Junos Enterprise Routing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AJER - Advanced Junos Enterprise Routing
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC) 101

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrator Network administrator Technician DevOps Overview The Linux Professional Institute(LPI) is the go to certification body for vendor independent Linux certifications. This course covers fundamental Linuxskills such as file management and manipulation, text processing, command line use, package management,filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 101 exam with in classroomassessments and practice exams. This course prepares students to take the 101 exam of the LPI level 1 certification. Work on the Command Line LPI Objectives Covered Role of Command Shell Shells Gathering System Info Identifying the Shell Changing the Shell Shell Prompts Bash: Bourne-Again Shell Navigating the Filesystem Help from Commands and Documentation Getting Help Within the Graphical Desktop Getting Help with man & info Bash: Command Line History Bash: Command Editing Bash: Command Completion Shell and Environment Variables Key Environment Variables LAB TASKS Use Streams, Pipes, and Redirects LPI Objectives Covered File Redirection Piping Commands Together Filename Matching File Globbing and Wildcard Patterns Brace Expansion General Quoting Rules Nesting Commands Gotchas: Maximum Command Length LAB TASKS Manage File Permissions and Ownership LPI Objectives Covered Filesystem Hierarchy Standard Displaying Directory Contents Filesystem Structures Determining Disk Usage With df and du File Ownership Default Group Ownership File and Directory Permissions File Creation Permissions with umask Changing File Permissions SUID and SGID on files SGID and Sticky Bit on Directories User Private Group Scheme LAB TASKS Create, Delete, Find, and Display Files LPI Objectives Covered Directory Manipulation File Manipulation Deleting and Creating Files Physical Unix File Structure Filesystem Links File Extensions and Content Which and Type Where is Searching the Filesystem Alternate Search Method Manually Installed Shared Libraries LAB TASKS Work with Archives and Compression LPI Objectives Covered Archives with tar Archives with cpio The gzip Compression Utility The bzip2 Compression Utility The XZ Compression Utility The PKZIP Archiving/Compression format LAB TASKS Process Text Streams Using Filters LPI Objectives Covered Producing File Statistics The Streaming Editor Replacing Text Characters Text Sorting Duplicate Removal Utility Extracting Columns of Text Displaying Files Prepare Text for Display Previewing Files Displaying Binary Files Combining Files and Merging Text LAB TASKS Search Text Files Using Regular Expressions LPI Objectives Covered Searching Inside Files Regular Expression Overview Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis LAB TASKS Perform Basic File Editing Operations Using VI LPI Objectives Covered Text Editing vi and Vim Learning Vim Basic vi Intermediate vi LAB TASKS Create, Monitor, and Kill Processes LPI Objectives Covered What is a Process? Process Lifecycle Process States Viewing Processes Signals Tools to Send Signals Managing Processes Tuning Process Scheduling Job Control Overview Job Control Commands Nohup and Disown Uptime & w Persistent Shell Sessions with Screen Using screen Advanced Screen LAB TASKS Use RPM, YUM, and Debian Package Management LPI Objectives Covered Managing Software RPM Architecture Working With RPMs Querying and Verifying with RPM Installing Debian Packages Querying and Verifying with dpkg The alien Package Conversion Tool Managing Software Dependencies Using the Yum command yum downloader Configuring Yum The deselect & APT Frontends to dpkg Aptitude Configuring APT LAB TASKS Work with Partitions, Filesystem, and Disk Quotas LPI Objectives Covered Partition Considerations Logical Volume Management Filesystem Planning Partitioning Disks with fdisk & gdisk Resizing a GPT Partition with gdisk Partitioning Disks with parted Non-Interactive Disk Partitioning with sfdisk Filesystem Creation Filesystem Support Unix/Linux Filesystem Features Swap Selecting a Filesystem Filesystem Maintenance Mounting Filesystems Mounting Filesystems Managing an XFS Filesystem NFS SMB Filesystem Table (/etc/fstab) Configuring Disk Quotas Setting Quotas Viewing and Monitoring Quotas LAB TASKS Linux Boot Process LPI Objectives Covered Booting Linux on PCs GRUB 2 GRUB 2 Configuration GRUB Legacy Configuration Boot Parameters Uinit Linux Runlevels Aliases Systemd local-fs.target and sysinit.target Runlevel Implementation System Boot Method Overview Systemd System and Service Manager Modifying systemd services Systemd Targets Using systemd Shutdown and Reboot System Messaging Commands Controlling System Messaging LAB TASKS Determine and Configure Hardware Settings LPI Objectives Covered Managing Linux Device Files Hardware Discovery Tools Configuring New Hardware with hwinfo PC Architecture and Bus DMA & IRQ USB Devices USB Architecture Configuring Kernel Components and Modules Kernel Modules Handling Module Dependencies Configuring the Kernel via /proc/ LAB TASKS Linux Fundamentals Unix and its Design Principles FSF and GNU GPL ƒ?? General Public License The Linux Kernel Components of a Distribution Red Hat Linux Products SUSE Linux Products Debian Ubuntu Logging In got root? Switching User Contexts Gathering Login Session Info LAB TASKS Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC) 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC) 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification (LPIC) 101
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud Director: Install, Configure, Manage [v10.3]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Customers, cloud architects, systems engineers, data center administrators, and cloud administrators with experience in managed services or managing a service provider environment. Overview By the end of the course, you should be able to meet the following objectives: Deploy VMware Cloud Director Manage VMware Cloud Director to meet the service provider needs Create and manage VMware Cloud Director organizations and vApps to fulfill business needs Create and manage VMware Cloud Director catalogs Transfer virtual machine workloads from VMware vSphere into and out of VMware Cloud Director Configure networking for organizations and vApps with the help of VMware NSX-T Data Center Managing resources from the VMWare Cloud Director console and using VMware vRealize Operations Manager Enabling VM and Named Disk Encryption Creating VM sizing and placement policies Understand vApps and VM operations and actions In this five-day course, you focus on installing, configuring, and managing VMware Cloud Director 10.3. You learn about workload provisioning, the creation of organizations, virtual data centers (VDCs), catalog services that include predefined virtual machines, and on-demand VMware NSX-T Data Center networks.This course also covers interfacing VMware Cloud Director with other systems and the integration and use of VMware vRealize Orchestrator for VMware Cloud Director. You learn about different networks that a system administrator and an organization administrator can configure and use with virtual machines (VMs). This course also discusses how to monitor various VMware Cloud Director objects using VMware vRealize Operations. Course Introduction Introductions and course logistics Course objectives Software-Defined Data Center and VMware Validated Design Define Software Defined Datacenter (SDDC) Discuss VMware offerings for Cloud-Based Services Discuss the deployment options for VMware Cloud Director Discuss VMware Validated Design Recognize the design considerations when creating a cloud environment on the SDDC using VMWare Cloud Foundation vCloud Director Deployment and Configuration Discuss the deployment options for VMware Cloud Director Explain the two-stage deployment of VMware Cloud Director cells Discuss failover mechanisms (automatic and manual) with VMware Cloud Director cells Define switchover, promote, and fencing options of the VMware Cloud Director appliance Understand the VMware Cloud Director appliance enhancements VMware Cloud Director Provider Configuration Describe how the compute resources are provided to VMware Cloud Director Describe how storage is provided to VMware Cloud Director Configure and manage storage for Virtual Datacenters (VDCs) Briefly discuss network pools, external networks, and Tier-0 Gateways Showcase VMware Cloud Director integration with vCenter Server and NSX-T Data Center Describe VMware Cloud Director organizations Understand organization policies Explain how to access an organization using various portals Understand organization VDC Discuss what is Linked Clone and Fast Provisioning Understand the use cases of Allocation Models VMware Cloud Director User, Roles and Quota Management Discuss user-bundle Describe role-based access Explain custom roles and rights Describe and configure LDAP integration with Active Directory Discuss OIDC authentication methods Describe SAML identity provider VMware Cloud Director Virtual Machines and vApps Understand standalone VMs Discuss the VM managing operations Explain VM properties Discuss deployment methods of vApps Discuss the vApp managing operations Discuss the vApp lease policies Understand the vApps and VM actions Explain vApp and VM badges VMware Cloud Director Content Libraries Explain the purpose of catalogs and how to create a catalog organization Define catalog management and sharing catalogs inside and between organizations Explain medias in VMware Cloud Director and its usage Discuss vApp templates Understand vApp template operations Describe the purpose and usage of Open Virtualization Format (OVF) Discuss organization VDC templates VMware Cloud Director Networking Discuss organization VDC networks List the types of organization VDC networks Describe the edge gateway services Explore the services offered by the edge gateway Discuss sub-allocation IP pool and its use cases Discuss DHCP, NAT, load balancer, and firewall services on the edge gateway Discuss SNAT, DNAT, NO SNAT, and NO DNAT use cases Discuss vApp networks List the various types of vApp networks Discuss routed, isolated, and direct vApp networks Managing billing and reports of vCloud Director objects using Tenant vApp VMware Cloud Director Storage and Compute Describe named disks and shared named disks Demonstrate how to attach and detach a named disk and a shared named disk Describe methods of sharing the named disk Discuss the implications of deleting VMs that have an attached named disk Discuss how VMware Cloud Director VMs and disks are encrypted Explain the storage policy capabilities Demonstrate how VM sizing and placement policies are published Discuss vCenter server and VMware Cloud Director IOPS storage policies usage Discuss how to enable and use the storage IOPS limitation in VMware Cloud Director Describe the storage policy supported entities Extensibility and UI Additional Features Explain custom advisories, global search, guided tours, data exporter, keyboard shortcuts, and quick search Understand vcd-cli supported commands Discuss various vcd-cli tools VMware Cloud Director Resource Monitoring Identify log locations for VMware Cloud Director Manage vSphere and cloud resources from VMware Cloud Director Understand monitoring of objects from VMware Cloud Director portals Briefly introduce vRealize Operations Manager Integrate VMware Cloud Director with vRealize Operations Manager Configure VMware Cloud Director Management Pack Understand dashboard, metrics, alerts, alert definition, and reports Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud Director: Install, Configure, Manage [v10.3] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud Director: Install, Configure, Manage [v10.3] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Cloud Director: Install, Configure, Manage [v10.3]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators and network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the NSX Advanced Load Balancer architecture Describe the NSX Advanced Load Balancer components and main functions Explain the NSX Advanced Load Balancer key features and benefits Deploy and configure the NSX Advanced Load Balancer infrastructure within private or public clouds using Write and No Access Cloud Connectors Explain, deploy, and configure Service Engines Explain and configure local load balancing constructors such as virtual services, pools, health monitors, and related components Understand and modify application behavior through profiles, policies, and DataScripts Configure advanced services such as global server load balancing Describe how to use NSX Advanced Load Balancer REST API interfaces and related automation capabilities Describe and configure NSX Advanced Load Balancer application and infrastructure monitoring Gather relevant information and perform basic troubleshooting of applications that use built-in NSX Advanced Load Balancer tooling This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© Advanced Load Balancer? (Avi Networks) solution. This course covers key NSX Advanced Load Balancer (Avi Networks) features and functionality offered in the NSX Advanced Load Balancer 20.x release. Features include the overall infrastructure, virtual services and application components, global server load balancing, various cloud connectors, application troubleshooting, and solution monitoring. Hands-on labs provide access to a software-defined data center environment to reinforce the skills and concepts presented in the course. Course Introduction Introduction and course logistics Course objectives Introduction to NSX Advanced Load Balancer Introduce NSX Advanced Load Balancer Discuss NSX Advanced Load Balancer use cases and benefits Explain NSX Advanced Load Balancer architecture and components Explain the management, control, data, and consumption planes and their respective functions Virtual Services Configuration Concepts Explain Virtual Service components Explain Virtual Service types Explain and configure basic Virtual Service components such as Application Profiles, Network Profiles Profiles and Policies Explain and deep dive on Advanced Virtual Service creation Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog, and HTTP Explain and configure advanced application HTTP Profile options Deep dive on Network Profiles and Types Explain and configure SSL Profiles and Certificates Explain and Configure HTTP and DNS policies Pools Configuration Concepts Explain and deep dive on Pools configuration options Describe available Load Balancing algorithms Explain multiple Health Monitor types Explain multiple Persistence Profiles Explain and configure Pool Groups Modifying Application Behavior Design and apply application solutions leveraging application profiles Design and apply application solutions leveraging Network and HTTP Policies and DataScripts Explain DataScript fundamentals Explain and leverage NSX Advanced Load Balancer analytics to understand application behavior Describe and configure Client SSL Certificate Validation Describe and configure Virtual Service DDoS, Rate Limiting, and Throttling capabilities Modify Network Profiles properties such as TCP connection properties Design and apply application solutions leveraging Persistence Profiles NSX Advanced Load Balancer Infrastructure Architecture Deep dive on the management, control, data, and consumption planes and functions Describe Control Plane Clustering and High Availability Describe Controller Process Sharding Describe Controller Sizing Describe Service Engine CPU and NIC Architecture Explain Tenants Deep dive and configure properties of Service Engine Groups Explain Service Engine Group High Availability Modes Describe and configure Active/Standby High Availability Mode Describe and configure Elastic HA High Availability Mode (Active/Active, N+M) Explain Service Engine Failure Detection and Self-Healing Describe Service Engine as a Router Deep dive on Virtual Service scale out options, such as Layer 2 (Native), Layer 3 (BGP), and DNS-based Introduction to Cloud Connector Introduce Cloud Connectors Review Cloud Connector integration modes Introduce Cloud Connector types Install, Configure and Manage NSX Advanced Load Balancer in No-Access Cloud Explain No Access Cloud concepts Configure No Access Cloud integration Explain and Configure Linux Server Cloud Describe the Advanced Configuration options available in Bare-Metal (Linux Server Cloud) Install, Configure and Manage NSX Advanced Load Balancer in VMware Environment: Cloud Configuration Introduce VMware integration options Explain and configure VMware No Access Cloud Connector Explain and configure VMware Write Access Cloud Connector Describe VMware Write with NSX-V Access Cloud Connector Describe VMware NSX-T integration AWS Cloud Configuration Describe NSX Advanced Load Balancer Public Cloud integrations Explain and demonstrate AWS Public Cloud Integration DNS Foundations Review, discuss, and explain DNS fundamentals Describe NSX Advanced Load Balancer DNS and IPAM providers Global Server Load Balancing Introduce Global Server Load Balancing Concepts and Benefits Explain and configure NSX Advanced Load Balancer infrastructure Explain and configure DNS Virtual Service components Explain and configure GSLB Service Engine Group Describe and configure GSLB Sites Explain and configure basic GSLB Services to include pools and health monitors Describe GSLB Service Load Balancing algorithms Explain and configure Data and Control Plane-based Health Monitors Describe GSLB Health Monitor Proxy NSX Advanced Load Balancer: Troubleshooting Introduce Infrastructure and Application Troubleshooting Concepts Describe Control Plane and Data Plane-based Troubleshooting Explain Application Analytics and Logs Describe client logs analysis Explain Headers troubleshooting and Packet Capture mechanism Leverage CLI for detailed data plane troubleshooting Explain Service Engine Logs Explain Health Monitors troubleshooting Explain BGP session troubleshooting Describe Control Plane Troubleshooting, Clustering, and Cloud Connector issues Events and Alerts Describe NSX Advanced Load Balancer Events Describe and configure NSX Advanced Load Balancer Alerts Describe NSX Advanced Load Balancer monitoring capabilities, leveraging SNMP, Syslog, and Email Introduction to NSX Advanced Load Balancer Rest API Introduce NSX Advanced Load Balancer REST API interface Describe REST API Object Schema Explain and interact with REST API interface, leveraging browser and command line utility Explain Swagger-based API documentation Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX Advanced Load Balancer: Install, Configure, Manage [V20.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Cloud Director: Advanced Workshop [v10.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Customers, cloud architects, systems engineers, data center administrators, and cloud administrators with experience in managed services or managing a service provider environment Overview By the end of the course, you should be able to meet the following objectives: Describe the advanced architecture of a VMware Cloud Director environment Design Cloud Director Federation Explain use cases for CPOM Explain basic concepts of NSX-V and NSX-T design with VMware Cloud Director Discuss the integration of AVI Load Balancer Services Explain use of migration tools from NSX-V to NSX-T Data Center Explain the integration of Advanced Load Balancer with NSX Discuss the use cases for NSX Advanced Load Balancer Describe the architecture of VMware vCloud Availability for vCloud Director Discuss the use cases for migration with vCloud Availability Describe the architecture of vRealize Operations in a Service Provider Environment Explain the use cases for vRealize Operations Tenant App Explain VMware Cloud Director orchestration and extensibility Explain use cases for XaaS Integration Discuss UI customization for Service Provider and Tenants This five-day, hands-on training course provides you with the advanced knowledge, skills, and tools to design and utilize a cloud solution based on VMware Cloud Director?. Besides learning about an advanced cloud architecture, you learn about the integration of VMware Cloud Director with the products VMware Cloud Director Availability?, VMware vRealize© Orchestrator?, VMware vRealize© Operations? (including the Tenant App), VMware NSX-T© Data Center and VMware NSX© Advanced Load Balancer? (Avi Networks). This course covers the migration from VMware NSX© for vSphere© (NSX-V) to VMware NSX-T© Data Center in a VMware Cloud Director environment. You learn about how the NSX Advanced Load Balancer can be used and integrated in a service provider environment. Besides the advanced know-how of the vRealize Operations Tenant App and Cloud Availability, the course also discusses the extensibility and orchestration of workflows in Cloud Director. For all the topics covered in the class, intensive hands-on labs will be taken by the students to provide proper insights into all the products. Course Introduction Introductions and course logistics Course objectives Advanced VMware Cloud Director Architecture Explain the basic concepts and terminologies in a VMware Cloud Director environment Describe the basic architecture of a VMware Cloud Director environment Follow a proven process to design and deploy a cloud solution Gather and analyze business and application requirements Document design requirements, constraints, assumptions, and risks Use a systematic method to evaluate and document design decisions Explain the differences between conceptual, logical, and physical designs Describe the concepts of Provider SLAs Discuss the advantages of standardized and flexible cloud platforms Explain how you can use a building-block design approach with VMware products to architect a flexible but standardized cloud environment Impact on Monetization of service definitions Discuss the design and implications of a vSphere Design for the Cloud Platform Explain the use of Single vs. Stretched vs. Multi-Site deployments Design Cloud Director Federation Explain use cases for CPOM NSX for vSphere vs. NSX-T and Migration Describe the NSX Management cluster architecture, components, and communication channels Identify the workflows involved in configuring the NSX Management cluster Validate and troubleshoot the NSX Management cluster formation Explain basic concepts of NSX-V and NSX-T design with VMware Cloud Director Discuss the use cases for Edge Services Discuss the use cases for Distributed Network Services Discuss the features available in NSX-V vs. NSX-T Explain the integration of external networks (such as MPLS, DirectConnect) Explain the integration of 3rd party network services (NON-VMware Edge Services, WAF) Discuss the integration of AVI Load Balancer Services Discuss different migration scenarios Explain pre-requisites for migration from NSX-V to NSX-T Explain use of migration tools from NSX-V to NSX-T NSX Advanced Load Balancer Explain basic concepts of NSX Advanced Load Balancer Explain the integration of NSX Advanced Load Balancer with NSX Discuss the use cases for NSX Advanced Load Balancer VMware vCloud Availability Describe the architecture of VMware vCloud Availability for vCloud Director Explain the prerequisites of vCloud Availability for Cloud Director Discuss the implementation of vCloud Availability for Cloud Director Discuss the use cases for migration with vCloud Availability Explain setup of data seeds for vCloud Availability Discuss the use cases for Disaster Recover as a Service with vCloud Availability Explain connectivity for vCloud Availability to Cloud use cases Understand requirements for vCloud Availability OnPrem to Cloud failover and failback vRealize Operations Tenant App / Chargeback Describe the architecture of vRealize Operations in a Service Provider Describe the architecture of vRealize Operations Tenant App Explain the use cases for vRealize Operations Tenant App Explain use cases for vRealize Operations Manager in Service Provider environments Discuss vRealize Operations Manager Management Packs Explain advanced troubleshooting in service provider environments with vRealize Operations Manager Discuss architecture and integration of vRealize Operations Manager Tenant App Explain connectivity of the vRealize Operations Manager Tenant App Discuss user and role management of the vRealize Operations Manager Tenant App Describe billing policy definition in the vRealize Operations Manager Tenant App VMware Cloud Director Orchestration Explain VMware Cloud Director orchestration Explain vRealize Orchestrator use cases Describe the architecture of vRealize Orchestrator in a Service Provider environment Explain use cases for VMware Cloud Director blocking tasks Explain use cases for XaaS Integration Design workflows, objects Discuss UI customization for Service Provider and Tenants Explain integration of custom elements in VMware Cloud Director Explain use cases for Extensibility SDK Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Cloud Director: Advanced Workshop [v10.2] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Cloud Director: Advanced Workshop [v10.2] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Cloud Director: Advanced Workshop [v10.2]
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to MongoDB for DBAs (TTDB4680)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This introductory-level course is for experienced DBAs who will be working with MongoDB. In order to gain the most from this course you should have: Prior practical experience in Database Administration Experience working with Linux and be comfortable working with command line Overview This skills-focused course is approximately 50% hands-on. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will explore: The MongoDB Basic Architecture and Installation MongoDB administration User Management MongoDB security Indexes Backup & Recovery High Availability / Replication Diagnostics & Troubleshooting MongoDB is fast becoming the database of choice for big data applications, being one of the most popular and widely implemented NoSQL databases. Its scalability, robustness, and flexibility have made it extremely popular among business enterprises who use it to implement a variety of activities including social communications, analytics, content management, archiving and other activities. This has led to an increased demand for MongoDB administrators who have the skills to handle cross functional duties. Geared for experienced DBAs, MongoDB for DBAs is a three-day hands-on course that explores the concepts, architecture and pitfalls of managing a MongoDB installation. This course is targeted to the DBA who is familiar with the concepts and tasks of working with a Relational database and is not responsible for a NoSQL MongoDB database. You will learn the critical aspects of MongoDB and use it to solve data management challenges. You will learn to manage MongoDB effectively by gaining expertise in MongoDB administration tools, syntax, MongoDB installations, configurations, security, troubleshooting, backup, scaling and many other features. The focus of this course is on practical skills and applying the DBA existing database knowledge to a MongoDB installation. Introduction to MongoDB Basic Architecture and Installation Differentiate database categories Learn MongoDB design goals List MongoDB tools Describe JSON and BSON Understanding the basic concepts of a Database Database categories: What is NoSQL? Why NoSQL? Benefit over RDBMS Types of NoSQL Database, and NoSQL vs. SQL Comparison, ACID & Base Property CAP Theorem, implementing NoSQL and what is MongoDB? Graph Database Overview of MongoDB, Design Goals for MongoDB Server and Database, MongoDB tools Understanding the following: Collection, Documents and Key/Values, etc., Introduction to JSON and BSON documents Environment setup (live Handson) and using various MongoDB tools available in the MongoDB Package MongoDB Administration Take database backup and restore MongoDB© Export and import data from/ to a MongoDB© instance Check server status and DB status Monitor various resource utilization of a mongod instance Understand various optimization strategies Administration concepts in MongoDB Monitoring issues related to Database Monitoring at Server, Database, Collection level, and various Monitoring tools related to MongoDB Database Profiling, Locks, Memory Usage, No of connections, page fault etc., Backup and Recovery Methods for MongoDB Export and Import of Data to and from MongoDB Run time configuration of MongoDB Production notes/ best practices Data Managements in MongoDB (Capped Collections/ Expired data from TTL), TTL Collection Features GridFS Memory-Mapped Files Journaling Mechanics Storage Engines Power of 2-Sized Allocations No Padding Allocation Strategy Diagnosing Performance Issues Optimization Strategies for MongoDB Configure Tag Sets for Replica Set. Optimize Query Performance Monitoring Strategies for MongoDB . MongoDB Utilities MongoDB Commands MongoDB Management Service (MMS) Data Backup Strategies in MongoDB Copying Underlying Data Files Backup with MongoDump Fsync and Lock MongoDB Ops Manager Backup Software Security Strategies in MongoDB Authentication Implementation in MongoDB . Authentication in a Replica set Authentication on Sharded Clusters Authorization End-to-End Auditing for Compliance User Management Create a User Administrator. Add a User to a Database. Create/Assign User a Role. Verify/Modify a User Access/Privileges. Change a User?s Password MongoDB Security Knowing security concepts in MongoDB Understand how Authentication and Authorisation works Security Introduction Security Concepts Indexes Index Introduction, Index Concepts, Index Types Index Properties Index Creation and Indexing Reference Introduction to Aggregation Aggregation Approach to Aggregation sort Order Pipeline Operators and Indexes Text Indexes Aggregate Pipeline Stages Text Search MapReduce Index Creation Aggregation Operations Index Creation on Replica Set Remove, Modify, and Rebuild Indexes Listing Indexes Measure Index Use Control Index Use Index Use Reporting Geospatial Indexes MongoDB?s Geospatial Query Operators GeoWith Operator Backup & Recovery Import and Export MongoDB Data Restore and recovery of MongoDB(Including point in time Recovery) Restore a Replica Set from MongoDB Backups Recover Data after an Unexpected Shutdown Backup and Restore with Filesystem Snapshots Back Up and Restore with MongoDB Tools Backup and Restore Sharded Clusters High Availability (Replication ) Understand the concept of Replication in MongoDB© ? Create a production like Replica Set Introduction to Replication (High Availability), Concepts around Replication What is Replica Set and Master Slave Replication? Type of Replication in MongoDB How to setup a replicated cluster & managing replica sets etc., Master-Slave Replication Replica Set in MongoDB Automatic Failover Replica Set Members Write Concern Write Concern Levels Write Concern for a Replica Set Modify Default Write Concern Read Preference Read Preference Modes Blocking for Replication Tag Set Configure Tag Sets for Replica set. Replica Set Deployment Strategies . Replica Set Deployment Patterns Oplog File Replication State and Local Database, Replication Administration Diagnostics & Troubleshooting Troubleshoot slow queries Diagnose connectivity problems Understand diagnostic tools Learn common production issues Learn fixes and solutions. Additional course details: Nexus Humans Introduction to MongoDB for DBAs (TTDB4680) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to MongoDB for DBAs (TTDB4680) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to MongoDB for DBAs (TTDB4680)
Delivered OnlineFlexible Dates
Price on Enquiry