• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37729 Success courses

Cisco ASA Essentials (ASAE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover

Cisco ASA Essentials (ASAE)
Delivered OnlineFlexible Dates
Price on Enquiry

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches using Junos ELS. Overview After successfully completing this course, you should be able to: Restrict traffic flow within a VLAN. Manage dynamic VLAN registration. Tunnel Layer 2 traffic through Ethernet networks. Review the purpose and operations of a spanning tree. Implement multiple spanning-tree instances in a network. Implement one or more spanning-tree instances for a VLAN. List the benefits of implementing end-user authentication. Explain the operations of various access control features. Configure and monitor various access control features. Describe processing considerations when multiple authentication and access control features are enabled. Describe some common IP telephony deployment scenarios. Describe features that facilitate IP telephony deployments. Configure and monitor features used in IP telephony deployments. Explain the purpose and basic operations of CoS. Describe CoS features used in Layer 2 networks. Configure and monitor CoS in a Layer 2 network. Describe a basic troubleshooting method. List common issues that disrupt network operations. Identify tools used in network troubleshooting. Use available tools to resolve network issues. This two-day course provides detailed coverage of virtual LAN (VLAN) operations. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention

AJEX - Advanced Junos Enterprise Switching Using Enhanced Layer 2 Software
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Configure and Administer a Salesforce CPQ Solution (CPQ301)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This class is ideal for experienced Salesforce Administrators, business analysts, and implementation specialists looking to gain a greater technical understanding of Salesforce CPQ Administration. It's also designed for experienced administrators, solution architects, implementation consultants, and developers looking to understand the full capabilities of Salesforce CPQ in order to formulate solutions for their business. This class is also a great foundation builder for anyone looking to earn the Salesforce CPQ Specialist credential. Overview When you complete this course, you'll be able to: Set Up Products, Bundles, and Product Rules Build Price Rules to Automatically Populate Field Values While Quoting or Configuring a Bundle Set Up Appropriate System Discounts and Pricing Methods Configure Dynamic Output Document Generation Manage Subscription Products (Including the Processes for Renewing and/or Amending Them) Formulate Sound Solutions to Common CPQ Business Requirements Make Significant Progress in Preparing for the Salesforce Certified CPQ Specialist Exam Discover how to configure an end-to-end Salesforce CPQ solution with out-of-the-box functionality. In this 5-day class, our CPQ experts will give you an in-depth look at Salesforce CPQ and its applications. You?ll learn how to set up and manage products, configure discount and pricing methods, create and manage subscriptions, and formulate solutions to meet common CPQ business requirements so you can successfully implement a Salesforce CPQ solution for your company. Course Introduction Review Course Objectives Set Learner Expectations Review Housekeeping Rules Explore Additional Course Resources Review Exam Quick Facts Introduction to CPQ Understand the Business Case for CPQ Watch an End-to-End Solution Demo Build a Quote Object Model Foundations Get Familiar with Products, Price Books, and Price Book Entries Review Product Fields Integral to Basic Salesforce CPQ Functionality Product Selection Modify Out-of-the-Box Button Behavior for Product Selection Review Guided Selling Bundle Configuration Define and Build Product Bundles Enforce Business Logic with Product Features Option Selection Guidelines Enforce Business Logic with Option Constraints Product Rules Define Product Rules Enforce Business Logic with Product Rules (Including Validation Rules, Alert Rules, Selection Rules, and Dynamic Bundles) Build Product Rules Using Supporting Objects (Including Error Conditions, Product Actions, Summary Variables, Configuration Rules, and Configuration Attributes) Pricing Methods Discover Pricing Waterfall Default Flows Review List Pricing, Cost Plus Markup, and Block Pricing Use Contracted Pricing for Negotiated Prices Subscription Pricing Configure Subscription and Proration Pricing Methods Understand How Subscription Pricing Methods Affect List and Regular Price Discounting Compare Discounting Strategies Build a Discount Schedule Price Rules Set Values for Quote and Quote Line Fields Declaratively Review CPQ Advanced Quote Calculator Calculation Events and Conditions Understand Price Action Sources (Including Static Values, Summary Variables, Formulas, and Lookup Tables) Create Lookup Queries to Outsource Evaluation to a Lookup Object Advanced Approvals Compare and Contrast the Advanced Approval Package Versus Native Approvals Define Approvers, Approval Chains, Approval Variables, and Approval Rules to Meet Specific Business Requirements Quote Templates Generate Dynamic Output Documents Create Conditional Template Content Localization and Multicurrency Make Accommodations for Localization Define Localization and How It Works in CPQ Orders Review Business Purposes of an Order Define the Data Model for Orders Define Data Requirements to Generate Orders Contracts, Renewals, and Amendments Generate New Contracts to Manage Active Subscriptions Related to an Account Review Amendment and Renewal Processes Review Renewal Pricing Methods Capstone Class Project: Troubleshoot Common Scenarios in Salesforce CPQ Design a Solution

Salesforce Configure and Administer a Salesforce CPQ Solution (CPQ301)
Delivered OnlineFlexible Dates
Price on Enquiry

E2E200 -SAP Change Control Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Change Managers: Responsible for documentation, approval and change processes System Landscape Architects: Responsible for the design of the transport landscape topology System Administrators: Responsible for executing transports Development Managers: Responsible for performing development changes Application Manager: Responsible for approving and performing changes in an application Support Manager and members of the customer's SAP competence center: Responsible for Reporting and Diagnostics capabilities Partners and System Integrators Overview This course will prepare you to: Describe the concept and methods of E2E Change Control Management. Leverage the SAP Solution Manager 7.2 as application platform for E2E Change Control Management. In this course you will learn how change control management coordinates changes that are introduced into a software landscape so that the changes do not conflict with each other and how to make sure the changes are executed without disrupting ongoing business. This results in improved quality of the software landscape, higher availability of IT solutions, and lower total cost of ownership. Also important, change control management ensures that the changes introduced remain transparent, traceable and are made available for reporting and change analysis. Becoming adept at change control management requires skill in the efficient use of standardized methods and procedures. In this ?how to use? training, SAP imparts best-in-class knowledge of solution operations. The End-to-End Change Control Management course introduces participants to what change control management is and the standard tools used to accomplish it, tools provided by SAP Solution Manager. Introduction to E2E Change Control Management Explain the scope of End-to-End Change Control Management Explain the role of SAP Solution Manager to manage changes in your solution landscape Enhanced Change and Transport System Explain how the Enhanced Change and Transport System (CTS+) works Understand the basic concepts of Enterprise Portal and how it is supported by CTS+ Describe the best practices for the setup and usage of CTS+ in different scenarios Configuration Validation Understand the concepts and architecture of E2E Change Diagnostics Find current configuration information with the Change Reporting tool Find recent changes in the solution landscape with the E2E Change Analysis tool Compare multiple systems with the Configuration Validation tool Create targets, use operators and run validation reports Know how to use predefined reports in the report directory Transport and Execution Analysis Service and Transport and Execution Analysis Service for Projects Know how to run and use this self-check services within SAP Solution Manager Understand how to interpret the software change management KPIïs that are collected for your landscape Software Change Strategy Understand the limitations of a three-system landscape Understand the benefits of bundling changes in cycles and synchronized releases Transport Management with SAP Solution Manager Understand the change control landscape concept for transport management in SAP Solution Manager 7.2 Understand the usage of critical objects, cross system object locking and downgrade protection Know how to use retrofit in a dual landscape Understand the features of cCTS, which can be used for Quality Gate Management and Change Request Management parallel to CTS. Quality Gate Management Explain the concept of Solution Transports and Track Synchronization Setup and use Quality Gate Scenario as a central Transport Management Tool Create and release transport requests centrally in SAP Solution Manager for ABAP and Non-ABAP environments Know how to work within the Quality Gate Scenario Change Request Management Understand the different use cases for Change Request Management Describe the various elements of Change Request Management as part of SAP Solution Manager Understand SAP?s best practices for transport management which are implemented in Change Request Management Know how to work with Change Request Management Release Management Learn how to manage Release Management with SAP Solution Manager Understand how to manage the successful deployment of all related changes into the productive environment.

E2E200 -SAP Change Control Management
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 12c - PL/SQL Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Application designers and database developers, database administrators and web server administrators. Overview Upon successful completion of this course, students will be able to work with Oracle database programming using the PL/SQL programming language. They will learn the syntax, structure and features of the language. In this course, students will learn the foundation for the programming series and the use of database-resident stored program units for Oracle 12c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Choosing a Database Programming Language What is Database Programming? PL?SQL Performance Advantages Integration wth Other Languages PL/SQL Language Fundamentals PL/SQL Program Structure LANGUAGE SYNTAX RULES EMBEDDING SQL WRITING READABLE CODE GENERATING DATABASE OUTPUT SQL*PLUS INPUT OF A PROGRAM BLOCK Declare Section About the Declare Section DECLARE PRIMITIVE TYPES DECLARATION OPTIONS NOT NULL CONSTANT DATA DICTIONARY INTEGRATION %TYPE DECLARE SIMPLE USER---DEFINED TYPES TYPE... TABLE TYPE... RECORD EXTENDED USER---DEFINED TYPES Begin Section About the Begin Section Manipulating Program Data Logic Control & Branching GOTO LOOP IF-THEN-ELSE CASE Exception Section ABOUT THE EXCEPTION SECTION ISOLATING THE SPECIFIC EXCEPTION PRAGMA EXCEPTION_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT &SELECT...INTO Beyond the Basics: Explicit Cursors ABOUT EXPLICIT CURSORS EXTENDED CURSOR TECHNIQUES FOR UPDATE OF Clause WHERE CURRENT OF Clause Using FOR?LOOP Cursors Beyond the Basics: Nested BlocksBeyond the Basics: Declared Subprograms USING DECLARED SUBPROGRAMS DECLARED PROCEDURE DECLARED FUNCTION Introducing Databse-Resident Program Units ABOUT DATABASE---RESIDENT PROGRAMS PHYSICAL STORAGE & EXECUTION TYPES OF STORED PROGRAM UNITS STORED PROGRAM UNIT ADVANTAGES MODULAR DESIGN PRINCIPLES Creating Stored Procedures & Functions STORED PROCEDURES & FUNCTIONS CREATE PROCEDURE / CREATE FUNCTION CREATING PROCEDURES & FUNCTIONS RAISE_SALARY() Procedure SALARY_VALID() Function THE PARAMETER SPECIFICATION DEFAULT Clause SYSTEM & OBJECT PRIVILEGES USING THE DEVELOPMENT TOOLS Executing Stored Procedures & Functions CALLING PROCEDURES & FUNCTIONS UNIT TESTING WITH EXECUTE ANONYMOUS BLOCK UNIT TESTING SPECIFYING A PARAMETER NOTATION SQL WORKSHEET UNIT TESTING CALLING FUNCTIONS FROM SQL Maintaining Stored Program Units RECOMPILING PROGRAMS Mass Recompilation Using UTL_RECOMP() DROPPING PROCEDURES & FUNCTIONS DROP PROCEDURE / FUNCTION DATA DICTIONARY METADATA Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies DEPENDENCY INTERNALS TRACKING DEPENDENCIES THE DEPENDENCY TRACKING UTILITY SQL DEVELOPER DEPENDENCY INFO DEPENDENCY STRATEGY CHECKLISTS Creating & Maintaining Packages ABOUT PACKAGES CREATING PACKAGES MAINTAINING PACKAGES PERFORMANCE CONSIDERATIONS Advanced Package Capabilities DEFINER & INVOKER RIGHTS WHITE LITS & ACCESSIBLE BY PERSISTENT GLOBAL OBJECTS DEFINING INITIALIZATION LOGIC OBJECT ORIENTATION SUPPORT Advanced Cursor Techniques USING CUSROS VARIABLES USING SYS_REFCURSOR USING CURSOR EXPRESSIONS Using System-Supplied Package DBMS_OUTPUT() UTL_FILE() FOPEN() EXAMPLE Database Trigger Concepts ABOUT DATABASE TRIGGERS DML EVENT TRIGGER SUB---TYPES DATABASE TRIGGER SCENARIO TRIGGER EXECUTION MECHANISMS TRIGGERS WITHIN SQL WORKSHEET Creating Database Triggers STATEMENT-LEVEL TRIGGERS Using RAISE_APPLICATION_ERROR() ROW---LEVEL TRIGGERS EXAMPLES OF TRIGGERS EMPLOYEE_SALARY_CHECK Example EMPLOYEE_JOURNAL Example BUDGET_EVENT Example INSTEAD OF TRIGGERS TRIGGERS WITHIN AN APPLICATION Maintaining Database Triggers CALL SYNTAX TRIGGER MAINTENANCE TASKS SHOW ERRORS TRIGGER DROP TRIGGER ALTER TRIGGER MULTIPLE TRIGGERS FOR A TABLE HANDLING MUTATING TABLE ISSUES Implementing System Event Triggers WHAT ARE SYSTEM EVENT TRIGGERS? DEFININGTHE SCOPE AVAILABLE SYSTEM EVENTS SYSTEM EVENT ATTRIBUTES

Oracle 12c - PL/SQL Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

NIST Cyber Security Professional (NCSP) Practitioner

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.

NIST Cyber Security Professional (NCSP) Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon 8: Troubleshooting Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for New or junior administrators and operators; system managers accountable for staffing and training Horizon operators and administrators. Experienced system operators, administrators, and integrators responsible for managing and maintaining VMware Horizon solutions Overview By the end of the course, you should be able to meet the following objectives: Implement a structured approach to troubleshooting Resolve common issues that occur in a VMware Horizon environment Troubleshoot issues with linked and instant clones Configure the Windows client Identify the correct log level for gathering logs Optimize protocols for best end-user experience Discuss Horizon Connection Server advanced configurations List troubleshooting techniques for Horizon Connection Server common issues Interpret Horizon 8 Connection Server logs Identify Unified Access Gateway configuration and certificate issues List troubleshooting steps for Unified Access Gateway common issues Describe BLAST configuration verification using logs and settings Describe BLAST optimization recommendations for different use cases Describe Horizon 8 Connections and how to troubleshoot related issues Describe Horizon 8 certificates List troubleshooting steps for common issues with Horizon 8 certificates Leverage Horizon infrastructure troubleshooting steps to resolve issues  This five-day course builds your skills in resolving common issues that occur in a VMware Horizon© environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators and provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon© 8 infrastructure related issues. This workshop teaches the required skill and competence for troubleshooting VMware Horizon© Connection Server?, VMware Unified Access Gateway?, protocols, connections, and certificates Course Introduction Introductions and course logistics Course objectives Overview of Virtual Desktop Troubleshooting Structured approach to troubleshooting configuration and operational problems Applying troubleshooting methods Documenting the steps to resolving the problem Command-Line Tools and Backup Options Using command-line tools Backing-up and restoring VMware Horizon databases Troubleshooting Horizon Linked Clone Desktops Only applicable for Horizon 7.x environments Describe the components that make up a VMware Horizon desktop Explain how the View Agent Direct-Connection plug-In is useful for diagnosing problems Highlight the best practice for optimizing a VMware Horizon desktop Troubleshoot common problems with VMware Horizon desktops Troubleshooting Instant Clones Discuss how instant clones are created Discuss what gets logged when an instant clone is created Discuss the keywords to look for in the logs when troubleshooting instant clones Discuss how to troubleshoot problems with instant clones Windows Client Correctly configure the Windows Client Identify the correct log level for gathering logs Enable the required SSL configuration level for the environment Ports and Protocols Discuss the key ports on a Horizon Environment Discuss protocols used in the Horizon Environment Understand the benefit of optimizing Blast Become familiar with the optimization features for Blast Implement GPO changes for Blast Become familiar with the causes for Black Screens Discuss how to troubleshoot Black Screen problems Identify problems encountered when applying GPOs Discuss how to troubleshoot GPO-related problems Horizon Connection Server Troubleshooting Discuss Horizon Connection Server general troubleshooting techniques Identity Horizon Connection Server common issues through logs Describe AD LDS replication Discuss Horizon Connection Server replication common issues Review and Interpret Horizon Connection Server logs Compare successful and unsuccessful logs from everyday infrastructure administration tasks Unified Access Gateway Troubleshooting List and identify common Unified Access Gateway deployment issues Monitor the Unified Access Gateway deployment to identify health and issues Identify and troubleshoot Unified Access Gateway certificate issues Monitor, test, and troubleshoot network problems Discuss general Unified Access Gateway troubleshooting processes BLAST Configuration Verification Discuss BLAST Codecs and Encoder Switch settings. Describe how to verify BLAST configuration using logs and settings BLAST Optimization List general BLAST optimization recommendations Summarize BLAST tuning recommendations that apply to WAN connections Summarize BLAST tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe recommended tuning options to increase display protocol quality for all use cases and applications. VMware Horizon Connections Troubleshooting Explain Horizon connections Describe the role of Primary and Secondary protocols in Horizon connections Describe HTML client access connections Describe Horizon connections load balancing Describe timeout settings, supported health monitoring string, and suitable load balancer persistence values Identify troubleshooting steps for failing Horizon load balancer connections List troubleshooting steps for Horizon connections VMware Horizon Certificates Troubleshooting List Horizon certificate functions Describe Horizon certificates scenarios. Discuss potential challenges related to certificates in Horizon Describe the troubleshooting approach to Horizon certificate issues VMware Horizon Challenge Lab Leverage Horizon infrastructure troubleshooting steps to resolve issues

VMware Horizon 8: Troubleshooting Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Implementing Aruba OS-CX Switching, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE's ArubaOS-CX switches. Overview After you successfully complete this course, expect to be able to: Use NetEdit to manage switch configurations Use the Network Analytics Engine (NAE) to implement scripting solutions to provide for proactive network management and monitoring Compare and contrast VSX, VSF, and backplane stacking Explain how VSX handles a split-brain scenario Implement and manage a VSX fabric Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on AOS-CX switches to select given traffic Apply static ACLs to interfaces to meet the needs of a particular scenario Examine an ACL configuration and determine the action taken on specific packets Deploy AOS-Switches in single-area and multi-area OSPF systems Use area definitions and summaries to create efficient and scalable multiple area designs Advertise routes to external networks in a variety of OSPF environments Promote fast, effective convergence during a variety of failover situations Use virtual links as required to establish non-direct connections to the backbone Implement OSFP authentication Establish and monitor BGP sessions between your routers and ISP routers Advertise an IP block to multiple ISP routers Configure a BGP router to advertise a default route in OSPF Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicast traffic within VLANs Describe the differences between IGMP and IGMP snooping Distinguish between PIM-DM and PIM-SM Implement PIM-DM and PIM-SM to route multicast traffic Implement Virtual Routing Forwarding (VRF) policies to contain and segregate routing information Create route maps to control routing policies Understand the use of user roles to control user access on AOS-CX switches Implement local user roles on AOS-CX switches and downloadable user roles using a ClearPass solution Implement 802.1X on AOS-CX switch ports Integrate AOS-CX switches with an Aruba ClearPass solution, which might apply dynamic role settings Implement RADIUS-based MAC Authentication (MAC-Auth) on AOS-CX switch ports Configure captive portal authentication on AOS-CX switches to integrate them with an Aruba ClearPass solution Combine multiple forms of authentication on a switch port that supports one or more simultaneous users Configure dynamic segmentation on AOS-CX switches This course teaches you the advanced skills necessary to implement and operate enterprise level Aruba campus switching solutions. You will build on the skills you learned at the Associate level to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. In this course, participants learn about ArubaOS-CX switch technologies including: securing port access with Aruba's dynamic segmentation, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Extension (VSX) and Aruba's Virtual Switching Framework (VSF). This course is approximately 50% lecture and 50% hands-on lab exercises. Introduction to Aruba Switching Switches overview Architectures NetEdit Overview Centralized configuration Switch groups/templates AOS-CX mobile App Network Analytics Engine (NAE) Overview Configuration Core NAE feature lab sflow, local mirror, remote mirror VSX VSF vs. VSX: access and Agg/core design Stacking review VSF and uni/multi packet forwarding Stack fragments / split brain VSX Overview: roles, control, data, management planes VSX components (ISL, Keepalive, VSX LAG, Active Gateway, Active-Forwarding, Link Delay) Split Brain scenario Upstream Connectively Options (ROP single VRF, SVIs with multiple VRF, VSX Lag SVIs with multiple VRFs) Upstream/Downstream unicast traffic flow (South-North and North-South) VSX Configuration: VSX and Active Gateway VSX firmware updates ACLs Overview: types, components MAC ACL, Standard ACL, Extended ACL, Classifier-based Policies Configuration: wildcard bits, logging, pacl, vacl, racl Advanced OSPF Review basic OSPF Multi area: setup and aggregation Area-Types Stub, Totally Stub, NSSA, Totally NSSA External routes OSPF tuning: costs, bfd, gr, auth, vrrp, virt link BGP Overview: i/e bgp, as numbers Best path selection Configuration: route announcement Route filtering to prevent transit as IGMP Overview Querier Snooping Unknown multicasts Multicast Routing: PIM Overview PIM DM 802.1X Authentication Overview: roles, requirements, coa, accounting Dynamic port configuration: avp, acl, qos, VLAN Port-based vs. user-based: examples Radius service tracking, critical VLAN MAC Authentication Overview: Use cases Radius-based MAC Auth Dynamic Segmentation Leverage dynamic segmentation features Configure tunneled-node on AOS-CX switches Describe when and how to configure PAPI enhanced security, high availability, and fallback switching for tunneled-node Quality of Service Overview VoQ (Virtual Output Queue) QOS: queueing, QOS marks, dot1p, dscp Trust levels QOS configuration: port, VLAN, policies Interaction with user roles Queue configuration Rate limiters LLDP-MED Additional Routing Technologies VRF - Management VRF PBR MDNS PIM SM Capitve Portal Authentication Overview of guest solutions Built-in web auth ClearPass redirect with CPPM

Implementing Aruba OS-CX Switching, Rev. 20.21
Delivered OnlineFlexible Dates
Price on Enquiry

Understanding Microservices | A Technical Overview (TT7050)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This overview-level course is ideally suited for professionals seeking an introduction to microservices architecture and its application within a business context. Ideal attendee roles include software developers, system architects, technical managers, and IT professionals who are part of teams transitioning to a microservices approach. It's also an excellent starting point for non-technical roles such as product owners or business analysts who work closely with technical teams and want to better understand and become conversant in the language and principles of microservices. Overview This course combines engaging instructor-led presentations and useful demonstrations with engaging group activities. Throughout the course you'll explore: Understand the Basics of Microservices: Get to know the fundamental principles and characteristics of microservices and how they revolutionize traditional software development approaches. Explore the Design of Microservices: Gain an overview of how microservices are designed based on business requirements and what makes them unique in the software architecture world. Overview of Managing and Scaling Microservices: Get an introduction to how microservices are managed and scaled independently, and understand the significance of these features in your business operations. Familiarize with the Microservices Ecosystem: Learn about the typical patterns, best practices, and common pitfalls in the microservices world, setting a foundation for future learning and implementation. Introduction to Microservices in a Business Context: Acquire a basic understanding of how microservices can be aligned with specific business capabilities, and get a glimpse into how they can coexist with legacy systems in a business setting. Microservices have rapidly emerged as a popular architectural style, breaking down applications into small, independent services that can be developed, deployed, and scaled individually. Microservices offer a robust method to address a variety of projects, such as e-commerce platforms and content management systems, enhancing scalability and boosting productivity. This technology, when employed correctly, can greatly increase software delivery speed and system resilience, making it a crucial skill set for modern technology professionals.Understanding Microservices - A Technical Overview is a one-day course ideally suited for technical professionals seeking an introduction to microservices architecture and its application within a business context. Under the guidance of an industry expert, this engaging class combines lecture-style learning with lively demonstrations, case study review and group discussions.Throughout the course you?ll explore the principles and characteristics that define microservices, how to identify suitable projects for a microservices approach, the factors to consider when designing them, and the strategies to effectively manage and scale them within complex systems. You?ll also learn about the best practices, patterns, and anti-patterns, arming you with the knowledge to make the right architectural choices. This course also explores the real-world implementation of microservices in a business enterprise. We'll discuss how to align the application of microservices with your organization's specific business capabilities, and offer strategies for smoothly integrating this technology within existing legacy systems. Introduction to Microservices Understand what microservices are and their role in modern software development. Introduction to Microservices: what they are and why they matter. Monolithic vs Microservices: highlighting the shift and benefits. Key principles and characteristics of microservices. Identifying suitable applications for microservices transformation. Demo: Analyzing a sample application and identifying potential microservices Architecting and Managing Microservices Learn the basic strategies for scaling and managing microservices. Scaling Microservices: from a single service to hundreds. Key components of a microservices architecture. Introduction to resilience patterns: Circuit-Breakers and Bulkheads. Load management and provisioning in a microservices setup. Understanding the role of cloud services in microservices. Optional Demo: Illustrating how a microservice-based application scales in real-time Designing Microservices Learn the key aspects to consider when designing microservices. Defining microservice boundaries: Deciding the scope of a microservice. Communication patterns in microservices. Understanding Microservice endpoints. Exploring data stores and transaction boundaries in microservices. Overcoming challenges in Microservices design. Demo: Designing microservices for a hypothetical business requirement Implementing Microservices in a Business Enterprise Understand the process and considerations for implementing microservices in an enterprise context. Assessing enterprise readiness for microservices. Building the business case for microservices: strategic advantages and potential challenges. Aligning microservices with business capabilities. Organizational changes: Team structures and processes for microservices. Dealing with Legacy Systems: Strategies for microservices integration. Demo: Exploring a case study of successful microservices implementation in a business enterprise The Microservices Ecosystem Understand the key tools and best practices in the Microservices ecosystem. Understanding the typical Microservices Stack. Monitoring and Logging in Microservices. Introduction to Docker: Containerization of Microservices. Deployment strategies in a Microservices setup. Introduction to Orchestration in Microservices Demo: Containerizing and deploying a simple microservice Microservices Deployment Strategies Understand various ways to safely introduce changes in a microservices environment. The concept of Blue-Green Deployment: changing services without downtime. Canary Releases and Feature Toggles: slowly rolling out changes to users. Database changes in a microservices environment: keeping data consistent. Demo: Examining various deployment strategies Microservices Best Practices and DevOps Learn key strategies to ensure a smooth operation of your microservices setup. The DevOps culture in Microservices: collaboration for efficiency. Defining a Minimum Viable Product in a Microservices setup: building small, delivering fast. Dealing with data in a distributed setup: managing Data Islands. The importance of Continuous Integration/Continuous Delivery in a microservices setup. Governance: Keeping track of your services and their consumers. Demo: Visualizing a simple continuous delivery pipeline Microservices Patterns and Anti-Patterns Learn about common do's and don'ts when working with microservices. Understanding patterns that help with efficient microservices operation. Recognizing and avoiding anti-patterns that can hinder performance. Dealing with common challenges: dependencies between services, managing service boundaries. Demo: Examples of real-world patterns and anti-patterns Simple Overview of OAuth and OpenID for Microservices Introduction to OAuth and OpenID: What they are and why they matter in Microservices. The role of tokens in OAuth 2.0: How they help in securing communications. A simplified look at OpenID Connect: Linking identities across services. Demo

Understanding Microservices | A Technical Overview  (TT7050)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 12c Administration I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for all Oracle Professionals. Specifically Database Administrators, Web Server Administrators, System Administrators, CIOs and other IT Management Professionals. Overview Upon successful completion of this course, students will be able to understand configuration for installation, configuration of a host system, using Oracle Restart framework, troubleshooting tips, how the database fits with other systems, internals of the database, database failures and other topics. In this course, students will focus on configuration on supported systems. Also how the database fits in with other systems. Oracle Database Architercture Overview The Database Instance Database Memory Structures Database Process Structures Database Storage Architecture Oracle Clusterware Configuring the Host for Standalone Installlation Host Configuration Overview Choosing a Database Host Choosing an Operating System Proprietary Unix vs Open-Source Linux Making the OS Selection Prepare an Oracle LINUX Installation Perform Oracle LINUX Installation Configure the LINUX Host Step 1 - Confirm General System Requirements Step 2 - Confirm The Operating System Platform Step 3 - Confirm LINUX Package Requirements Step 4 - Confirm Network Configuration Configure Host for Virtualization VM Technologies Configure Oracle Linux for Virtualization Step 1 - Download Linux Updates Step 2 - Check Linux Kernel Step 3 - Download Latest yum Configuration File Step 4 - Enable Oracle Linux Add-ons Step 5 - Install VirtualBox Oracle Optimal Flexible Architecture OFA Goals ORACLE_BASE ORACLE_HOME Database Files Multiple ORACLE_HOMEs Databse Software Upgrades Mutliple Oracle Software Installations GRID Infrastructure Configuration Configure the Linux Installation About ASM Devices Configure Linux Devices for ASM Partioning a Device Oracle ASMLib Configue MS Windows Devices GRID Infrastructure Installation Perform the Installation Download Unpack the Installation Package Launch the Installation Session The Installation Dialog Verify the Installation Operating System Confirmation Oracle Utilities Setup SQL*Plus Confirmation Using EM Cloud Control Troubleshooting Problems DATABASE Installation Configuraion Configure a Linux Installation System Groups & Users Configure Kernel Parameters Create the Physical Directories Configure MS Windows Installation Prerequisite Checks & Fixup Utility DATABASE Installation ABOUT THE INSTALLATION The Installation Tools About The Installation Dialog The Installation Session Log PERFORM INSTALLATION ON LINUX Download Unpack The Installation Files Set Environment Variables Launch The Installation SERVER CLASS INSTALLATION DIALOG More About The Global Database Name About Enterprise Manager Cloud Control Secure The New Database PERFORM INSTALLATION ON WINDOWS Launch The Installation POST---INSTALLATION CONFIGURATION Required Environment Variables Defining The Environment Variables About SSH VERIFY THE INSTALLATION SQL*PlusConfirmation Operating System Confirmation Firewall Configuration Accessing EM Database Express Creating Databses Using DBCA About DBCA DBCA Templates Are You Sure? DEFAULT CONFIGURATION DATABASE ADVANCED MODE DATABASE File Location Variables Database Vault and Label Security CONFIGURE AN EXISTING DATABASE DELETE A DATABASE MANAGE TEMPLATES MANUALLY CREATE A DATABASE The CREATE DATABASE Command Using Oracle Restart WHAT IS ORACLE RESTART? What Oracle Restart Does Is Oracle Restart Deprecated? Registering With Oracle Restart More About srvctl Terminal Session Configuration COMPONENT STATUS USING SRVCTL Database Status Grid Infrastructure Status Oracle Home Status CONFIGURATION USING SRVCTL Examining A Database Configuration Examining The Listener Configuration Examining The ASM Configuration Manual Registration ListenerConfiguration Modification Database ConfigurationModification STARTUP/SHUTDOWN USING SRVCTL Why Use srvctl? MANAGING ORACLE RESTART Obtaining Oracle Restart Status Start/Stop Oracle Restart Preparing for a Database Upgrade What is a Database Upgrade? Database Upgrade Methods Real World Database Upgrade Develop A Database Upgrade Plan ABOUT THE DATABASE VERSION Direct Upgrade The COMPATIBLE Database Parameter PRE-UPGRADE PREPARATIONS Oracle Warehouse Builder Oracle Label Security (OLS) Oracle Database Vault Locating The Older Database Installations THE PRE-UPGRADE INFORMATION TOOL Pre-Upgrade Information Tool Files Run The Pre---Upgrade Information Tool Examining The Pre---Upgrade Information Tool Results Upgrade to Oracle Databse 12c Launch DBUA Database Upgrade Dialog Post-Upgrade Tasks Post-Upgrade Checklist Enable Unified Auditing Migrate to Unified Auditing Database Parameter Changes Enable New Features Source Destination Specific Post-Upgrade Tasks Oracle Architecture: The Systems Infrastructure About Enterprise Architectures The Relational Database Legacy Computing Models The Multi-Tiered Computing Model Scaling Up Cloud-Based Deployment ORACLE INFRASTRUCTURE ECOSYSTEM USING ORACLE ENTERPRISE MANAGER More About EM Using EM Database Express Using EM Cloud Control Oracle Architecture: The Database Host The Database Server Stack PROCESSOR LAYER CPU Resources Memory Resources I/O & STORAGE PROCESSING OS LAYER PROCESSING MODES DATABASE SERVER VIRTUALIZATION STORAGE VIRTUALIZATION ORACLE DATABASE SERVER STACK ORACLE ENGINEERED SYSTEMS Oracle Exadata Database Platform Exalogic Cloud Machine Exalytics BI Machine Oracle Architecture: Princilples & Technology Concepts Grid Computing Principles Why Grid Computing? What Is Grid Computing? PARALLELIZATION PRINCIPLES Hardware Parallelization Grid Computing Devices Clustered Database Servers CLOUD COMPUTING PRINCIPLES Multi-Tenancy Oracle Architecture: The RDBMS Installation & the Database Instance The Database Server Software Database Versions & Releases Database Editions Using PRODUCT_COMPONENT_VERSION View The Core Database Components Using V$VERSION View Understanding The Database Version Number The COMPATIBLE Database Parameter DATABASE INSTANCE ELEMENTS Individual Elements Of A Database Instance Physical Database Elements An Operational Database installation DATABASE INSTANCE CONFIGURATIONS Single Instance Parameter Files & Instance Configuration MAX_STRING_SIZE Parameter Example Independent Instances Clustered Instances The Database Instance In A Multi-tenant Configuration RECONFIGURING A DATABASE INSTANCE Static Vs. Dynamic Parameters Dynamic Parameter Setting Parameter Setting Scope Parameter Setting Level Setting Upgrade Related Parameters DATABASE COMPONENTS Advanced Data Functionality Components Security Components High-Performance Components Administration Components Database F

Oracle 12c Administration I
Delivered OnlineFlexible Dates
Price on Enquiry