Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures, Providing operational support, Managing systems for monitoring system performance and availability, Writing and deploying scripts for task automation and system administration. Overview #NAME? Red Hat System Administration I (RH124) equips you with Linux© administration "survival skills" by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts and enterprise-level tools, starting you on your journey toward becoming a full-time Linux system administrator. This path continues with the follow-on course, Red Hat System Administration II (RH134). 1 - Getting Started with the GNOME Graphical Desktop Get started with GNOME and edit text files with gedit 2 - Manage Files Graphically with Nautilus Manage files graphically and access remote systems with Nautilus 3 - Get Help in a Graphical Environment Access documentation, both locally and online 4 - Configure Local Services Configure the date and time and configure a printer 5 - Manage Physical Storage Understand basic disk concepts and manage system disks 6 - Manage Logical Volumes Understand logical volume concepts and manage logical volumes 7 - Monitor System Resources Manage memory and CPU utilization 8 - Manage System Software Manage system software locally and using Red Hat Network (RHN) 9 - Get Started with Bash Understand basic shell concepts, execute simple commands, and use basic job control techniques 10 - Get Help in a Textual Environment Use man and info pages and find documentation in /usr/share/doc 11 - Establish Network Connectivity Understand basic network concepts; configure, manage, and test network settings 12 - Administer Users and Groups Manage users and groups 13 - Manage Files from the Command Line Understand Linux filesystem hierarchy; manage files from the command line 14 - Secure Linux File Access Understand Linux file access mechanisms; manage file access from the GUI and the command line 15 - Administer Remote Systems Share and connect to a desktop; use SSH and rsync 16 - Configure General Services Manage services; configure SSH and remote desktops 17 - Manage Physical Storage II Manage filesystem attributes and swap space 18 - Install Linux Graphically Install Red Hat Enterprise Linux and configure the system with firstboot 19 - Manage Virtual Machines Understand basic virtualization concepts; install and manage virtual machines 20 - Control the Boot Process Understand runlevels and manage GRUB 21 - Deploy File Sharing Services Deploy an FTP server and a web server 22 - Secure Network Services Manage a firewall; understand SELinux concepts and manage SELinux 23 - Comprehensive Review Get a hands-on review of the concepts covered throughout the course
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, Business Process Owners/Team Leads/Power Users, Program/Project Managers, and Users. In this course, students become familiar with options for optimizing and simplifying purchasing processes and their prerequisites. Students will also learn about additional, special functions and customizing settings. Purchasing Master Data Creating Material Master Records for Purchasing Creating Vendor Master Records for Purchasing Using Partner Functions in Purchasing Sources of Supply and Conditions Analyzing Price Determination Basics Creating Purchasing Info Records Creating Special Info Records Using Special Functions in Info Records Creating Central Contracts Creating Contracts for Material Groups Creating Scheduling Agreements Without Release Documentation Creating Scheduling Agreements with Release Documentation Source Determination Controlling Source Determination with Source Lists Maintaining Source Lists Controlling Source Determination with Quota Arrangements Executing the Planning Run with Quota Arrangements Identifying Additional Aspects of Source Determination Blocking Sources of Supply Creating Purchase Orders with Source Determination Optimized Purchasing Processing Unassigned Purchase Requisitions Processing Assigned Purchase Requisitions Monitoring Purchase Orders Assessing the Buyer Role Document Release Procedure Releasing Purchasing Documents Converting Released Purchase Requisitions Configuring Release Procedures in Customizing Creating Release Procedures Specific Procurement Processes Creating Invoices Using Invoice Plans Creating Blanket Purchase Orders Deploying Subcontracting Purchasing with Manufacturer Part Numbers Deploying Additional Special Procurement Processes Vendor Evaluation Evaluating Vendors Setting Up Vendor Evaluation Purchasing Document Types Customizing Document Types in Purchasing Setting Up Field Selection in Purchasing Documents Deploying Version Management in Purchasing Analyzing Special Aspects in Customizing Defining Function Authorizations for Buyers Integrated Procurement Scenarios Purchasing with SRM and Catalogs Integrating SAP Components Additional course details: Nexus Humans SCM520 SAP Purchasing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM520 SAP Purchasing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks ScreenOS firewall products. Overview After successfully completing this course, you should be able to:Explain the Juniper Networks security architecture.Configure administrative access and options.Back up and restore configuration and ScreenOS files.Configure a ScreenOS device in transparent, route, Network Address Translation (NAT), and IP version 6 (IPv6) modes.Discuss the applications of multiple virtual routers.Configure the Juniper Networks firewall to permit and deny traffic based on user defined policies.Configure advanced policy options.Identify and configure network designs for various types of network address translation.Configure policy-based and route-based VPN tunnels. This course is the first in the ScreenOS curriculum. It is a course that focuses on configuration of the ScreenOS firewall/virtual private network (VPN) products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/VPN products in a wide range of installations. Chapter 1: Course IntroductionChapter 2: ScreenOS Concepts, Terminology, and PlatformsChapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Chapter 5: Layer 3 Operations Lab 3: Layer 3 Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Chapter 9: VPN ConceptsChapter 10: Policy-Based VPNs Lab 7: Policy-Based VPNs Chapter 11: Route-Based VPNs Lab 8: Route-Based VPNs Chapter 12: IPv6 Lab 9: IPv6 Appendix A: Additional FeaturesAppendix B: Transparent Mode Lab 10: Transparent Mode (Optional) Additional course details: Nexus Humans Configuring Juniper Networks Firewall/IPSec VPN Products training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Configuring Juniper Networks Firewall/IPSec VPN Products course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This class is designed for persons who are new to the z/OS platforms but have a technical background in information technology. It is intended for those who require an in-depth understanding of z/OS. Overview Describe the system initialization process of the z/OS operating systemsState the differences between an address space, data space, and hyperspaceDescribe the process of translating a virtual address to a real addressExplain the difference between paging and swappingDefine a z/OS taskDescribe dispatching, interrupt processing, supervisor calls, cross memory services, and serializationDescribe the purpose of the Job Entry Subsystem (JES)Illustrate the flow of a job through the z/OS environmentDescribe the allocation process for data sets in the z/OS environmentsIllustrate how an I/O request is processed in a z/OS environmentDescribe how workload management is accomplished in a z/OS environmentExplain the z/OS recovery processes and list available Problem Determination ToolsDescribe z/OS storage management conceptsDescribe the UNIX System Services functions provided in the z/OS environmentsExplain the network topologies and protocol support provided in z/OSDescribe system security and network security for a z/OS environmentCreate a high-level plan for the installation and configuration of a z/OS environment This classroom course introduces the base elements, optional features, and servers that are provided in z/OS. It focuses on the system service facilities that are provided by the z/OS Base Control Program (BCP). Day 1 Unit 1: z/OS overview Including welcome and course overview Unit 2: Storage management Day 2 Unit 3: Managing work Unit 4: Input/output processing Day 3 Unit 4: Input/output processing (continued) Unit 5: Data management Unit 6: Job management Day 4 Unit 7: IPL and system initialization Unit 8: Termination and recovery analysis Unit 9: Installing and configuring Day 5 Unit 10: Communicating Unit 11: Security in z/OS Including end-of-course summary Additional course details: Nexus Humans ES15 IBM z/OS Facilities training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES15 IBM z/OS Facilities course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for experienced Integration Specialists and Senior-Level Developers with experience in application development, messaging middleware applications, and transport protocols such as HTTP and FTP. Overview Describe the features and uses of the IBM Integration BusDevelop, deploy, and test message flow applicationsGenerate message flow applications from predefined patternsUse IBM Integration Bus problem determination aids to diagnose and solve development and runtime errorsDescribe the function and appropriate use of IBM Integration Bus processing nodesWrite basic Extended Structured Query Language and Java programs to transform dataUse the IBM Graphical Data Mapping editor to transform dataDefine, use, and test simple XML and Data Format Description Language (DFDL) data modelsDescribe supported transport protocols and how to call them in message flows This course teaches you how to use IBM Integration Bus to develop, deploy, and support message flow applications. Students will learn how to construct applications to transport and transform data. Course Outline Course introduction Introduction to IBM Integration Bus Application development fundamentals Exercise: Importing and testing a message flow Creating message flow applications Exercise: Creating a message flow application Connecting to IBM MQ Exercise: Connecting to IBM MQ Controlling the flow of messages Exercise: Adding flow control to a message flow application Modeling the data Exercise: Creating a DFDL model Processing file data Exercise: Processing file data Using problem determination tools and help resources Exercise: Using problem determination tools Exercise: Implementing explicit error handling Mapping messages with the Graphical Data Mapping editor Referencing a database in a message flow application Exercise: Referencing a database in a map Using Compute nodes to transform messages Exercise: Transforming data by using the Compute and JavaCompute nodes Processing JMS, HTTP, and web service messages Preparing for production Exercise: Creating a runtime-aware message flow Course summary Additional course details: Nexus Humans WM666 IBM Integration Bus V10 Application Development I training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM666 IBM Integration Bus V10 Application Development I course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures Providing operational support Managing systems for monitoring system performance and availability Writing and deploying scripts for task automation and system administration Successful completion of Red Hat System Administration I (RH124) is recommended. Experienced Linux administrators seeking to accelerate their path toward becoming a Red Hat Certified System Administrator should start with the RHCSA Rapid Track course (RH199). Overview You should be able to demonstrate these skills: - Install Red Hat Enterprise Linux using Kickstart - Manage file systems and logical volumes - Manage scheduled jobs - Access network file systems - Manage SELinux - Control firewalls - Perform troubleshooting tasks Red Hat System Administration II (RH134) is designed as the second part of the Red Hat© Certified System Administrator (RHCSA©) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux© system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat© Enterprise Linux. Prerequisites Successful completion of Red Hat System Administration I (RH124) is recommended. 1 - Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart. 2 - Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. 3 - Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. 4 - Schedule future Linux tasks Schedule tasks to automatically execute in the future. 5 - Manage priority of Linux processes Influence the relative priorities at which Linux processes run. 6 - Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. 7 - Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. 8 - Connect to network-defined users and groups Configure systems to use central identity management services. 9 - Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. 10 - Manage logical volume management (LVM) storage Manage logical volumes from the command line. 11 - Access networked attached storage with network file system (NFS) Access (secure) NFS shares. 12 - Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. 13 - Control and troubleshoot the Red Hat Enterprise Linux boot process 14 - Limit network communication with firewall Configure a basic firewall. 15 - Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
Duration 5 Days 30 CPD hours This course is intended for Technology ConsultantSystem AdministratorSystem ArchitectHelp Desk / COE Support Overview Explain the architecture of SAP NetWeaver AS JavaStart and stop SAP NetWeaver AS JavaCarry out basic configurations for SAP NetWeaver AS JavaClassify network security conceptsSet up SSL encryption for SAP NetWeaver AS JavaExplain the architecture of the User Management EngineConfigure the User Management EngineCarry out user and authorization maintenanceUnderstand and change the standard logon procedure of SAP NetWeaver AS JavaMaintain destinations and the JCo RFC ProviderUnderstand the architecture and the tasks of the SAP NetWeaver Development InfrastructureExplain the process flow of the development process using the SAP NetWeaver Development InfrastructureSpecify the options for monitoring SAP NetWeaver AS JavaConnect SAP NetWeaver AS Java to a central Monitoring systemDisplay Monitoring and logging data using the SAP NetWeaver AdministratorImplement corrections for SAP NetWeaver AS Java In this course, students learn how to explain the architecture of SAP NetWeaver AS Java, carry out basic configurations for SAP NetWeaver AS Java, and much more. Fundamental Concepts of Java Describing the Fundamental Concepts of Java Describing the Architecture of the SAP NetWeaver Application Server (SAP NetWeaver AS) Outlining the Java Cluster Architecture Describing the Internal Structure of SAP NetWeaver AS for Java SAP NetWeavear AS for Java Start and Stop Procedures Starting and Stopping Procedures in SAP NetWeaver AS for Java Evaluating the Tools for Starting and Stopping an SAP System Evaluating Load Balancing Options in SAP NetWeaver AS for Java Operating the Java Startup and Control Framework Analyzing the Logs of Start and Stop Processes in SAP NetWeaver AS for Java Basic Configuration of SAP NetWeaver AS for Java Identifying the Administration Tools Used in Configuration Maintaining the Basic Configuration of SAP NetWeaver AS for Java with the Config Tool Configuring SAP NetWeaver AS for Java with SAP NetWeaver Administrator Configuring the Properties of the Central Services Instance Administering the Internet Communication Manager (ICM) Process Infrastructure Security Describing Network Security Setting Up the Secure Sockets Layer (SSL) User and Authorization Administration Configuring the SAP User Management Engine (UME) Maintaining Users and Groups Managing Java Authorization Administrating Special Principles Configuring the Logon Procedure in SAP NetWeaver AS for Java Java Connectors and Destinations Creating Connections to Other Systems Creating Connections to Other Systems with J2EE Connector Architecture (JCA) Change Management and Software Logistics Structuring the Java Development Approach Describing the Components of SAP NetWeaver Development Infrastructure Developing and Releasing Java Changes with SAP NetWeaver Development Infrastructure Transporting Java Developments Monitoring Monitoring SAP NetWeaver AS for Java Connecting to a Central Monitoring System (CEN) Configuring Availability Monitoring Configuring the Log and Trace Files Monitoring a System with SAP Solution Manager Software Maintenance Preparing for Software Maintenance Describing Java Support Packages, Stacks, and Patches Deploying Corrections with Software Update Manager (SUM) in SAP NetWeaver AS for Java Deploying Java Archives with Alternative Tools Outlining the Backup Strategy in SAP NetWeaver AS for Java
Duration 1 Days 6 CPD hours This course is intended for The course is designed for anyone desiring or requiring an understanding of how to manage cloud technologies as a business asset. This includes: IT Asset Managers Hardware Asset Managers Software Asset Managers Cloud Asset Managers Cloud Project Managers IT Managers IT Cloud Managers and Developers Cloud Vendor Managers IT Procurement IT Security Professionals Overview The student will learn the nuances of cloud assets and manage them from a financial, risk, compliance, and efficiency perspective. Upon completion of the course, the student will be able to: Understand the attributes of and requirements for managing cloud assets Define and develop cloud asset management processes Create cloud asset policies Develop and implement a communication plan for managing cloud assets Identify tool requirements to support the cloud asset type Develop cloud vendor contract requirements Understand and articulate individual and department responsibilities for the cloud asset management program Define requirements for managing cloud vendors Assess the organization's cloud asset management readiness This course takes an in-depth look at cloud assets. It defines how to manage these assets using best practical practices for the primary cloud architectures Software-as-a-Service, Platform-as-a-Service, and Infrastructure as-a-Service. What is Information Technology Asset Management? Why Cloud Solutions Need ITAM Introducing Cloud Services Vendor's Tools Cloud Vendor Management Communication Managing SaaS Acquire Phase Receive Phase Deploy Phase In-Use Phase Recover Phase Dispose Phase Example Vendor Reports Terms and Conditions Vendor Scorecard Managing IaaS and PaaS ITAM Data Center Challenges, Before Virtualization ITAM Data Center Challenges, with Virtualization The Data Center Transformation The End-User ITAM Supporting Processes Acquire Phase Receive Phase Deploy Phase In-Use Phase Recover Phase Dispose Phase Software Asset Management Example Vendor Reports Terms and Conditions Vendor Scorecard Disaster Recovery PlanDisposal of Replaced IT AssetsCAM and the ITAM Hierarchy Additional course details: Nexus Humans The Definitive Guide to Cloud Asset Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the The Definitive Guide to Cloud Asset Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, network administrators, and system integrators responsible for designing and implementing networking solutions Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Discuss the SD-WAN architecture and platform deployment model options Identify and describe the SD-WAN solution components Explain the interaction between the SD-WAN Edge, Orchestrator, and Gateway components Describe the SD-WAN Software-Defined Networking (SDN) approach, traffic, and network flows Explore SD-WAN core features and evaluate how these dramatically improve operational automation Use SD-WAN features to perform simple, agile, and secure SD-WAN operations Simplify branch infrastructure by inserting network services on the branch edge, in the cloud, or in the regional and enterprise data centers This course provides you with the knowledge, skills, and tools to achieve competency in deploying and managing the VMware SD-WAN by VeloCloud environment. In this course, you are introduced to workflows of various software-defined WAN constructs along with several operational tools that help you deploy and manage VMware SD-WAN by VeloCloud. Course Introduction Introductions and course logistics Course objectives Introduction to VMware SD-WAN Solution Revisit the traditional WAN technology, WAN topologies and downsides Explain the challenges solved by Secure Access Service Edge (SASE) and use cases List the components of the VMware SASE? solution Describe the VMware SD-WAN solution and list its capabilities VMware SD-WAN Components and Architecture Understand the architecture of the VMware SD-WAN solution and list all its components Explain the function of VMware SD-WAN Edges, Hub, Gateways, controllers, and Orchestrator Explain how the components of the VMware SD-WAN solution interact with each other Using VMware SD-WAN Orchestrator Describe key attributes of the VMware SD-WAN Orchestrator List primary features of the VMware SD-WAN Orchestrator Navigate the main menus of the VMware SD-WAN Orchestrator portal Deploy and Configure VMware SD-WAN Understand the deployment process of VMware SD-WAN components like VMware SD-WAN Edges, Hubs, Gateways, and more Understand the workflow of the VMware SD-WAN configuration List the optional network services that are supported by VMware and the steps to configure the same Understand the profiles and their application in the VMware SD-WAN infrastructure Describe the VMware SD-WAN Edge activation process Path and Traffic Management List the routing options supported by VMware SD-WAN: Static, BGP, OSPF Understand the Dynamic Multipath Optimization (DMPO) feature and its advantages Explain the Quality of Service and its configuration to manage traffic Securing VMware SD-WAN Environment Explain various options available to secure VMware SD-WAN environments. Understand the firewall capabilities and configuration Monitoring, Maintenance, and Troubleshooting List and understand the various features available to monitor the VMware SD-WAN infrastructure List and understand the various options available to troubleshoot and investigate issues in VMware SD-WAN