• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1126 Systems courses delivered Live Online

VMware SD-WAN for Service Providers [V4.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Service providers who are designing or using VMware SD-WAN solutions or managing SD-WAN networks for customers Service providers looking to deliver a managed hybrid WAN with MPLS service Service providers transforming their MPLS networks for direct access to cloud services and increased network agility Overview By the end of the course, you should be able to meet the following objectives: Describe how VMware SASE™ solves security challenges for distributed enterprises Identify where VMware SD-WAN fits in the VMware SASE framework Describe the process for validating the installation of VMware SD-WAN Orchestrator and Gateway in a service provider environment Describe the features for monitoring and maintaining a VMware SD-WAN installation Evaluate the security features and certificate operations for managing a VMware SD-WAN installation Describe VMware SD-WAN Edge licensing and license types Describe the features of VMware Edge Network Intelligence™ Recognize VMware SD-WAN network monitoring tools for generating reports, events, and alerts Recognize the remote diagnostic actions available on VMware SD-WAN Orchestrator Troubleshoot VMware SD-WAN Orchestrator and Gateway common issues This three-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware SD-WAN? environment for service providers.In this course, you focus on deploying and managing VMware SD-WAN for a service provider, including troubleshooting common issues. Course Introduction Introductions and course logistics Course objectives VMware SD-WAN Installation for Service Providers Describe security challenges for distributed enterprises Describe the VMware SASE solution for securing distributed enterprises Describe VMware deployment models for service providers Explain how VMware SD-WAN can help to transform MPLS networks to service-ready networks Identify resource requirements for installing VMware SD-WAN Orchestrator and Gateways Describe the procedure for installing VMware SD-WAN Orchestrator Describe the process for provisioning VMware SD-WAN Orchestrator Identify the external service dependencies for VMware SD-WAN Orchestrator Recognize disaster recovery options for SD-WAN Orchestrator Describe the disaster recovery workflow for VMware SD-WAN Orchestrator Identify the requirements for installing VMware SD-WAN Gateway instances Describe the procedure for installing VMware SD-WAN Gateway instances Describe the procedure for installing VMware SD-WAN Gateway instances on ESXi hosts identify Data Plane Development Kit support for gateway performance Describe the VMware SD-WAN Gateway deployment modes for service providers Configure a VMware SD-WAN Gateway for a service provider Assign a VMware SD-WAN Gateway for a service provider VMware SD-WAN Monitoring and Maintenance Describe VMware SD-WAN Orchestrator system health-monitoring features Describe VMware SD-WAN Orchestrator process-monitoring features Describe VMware SD-WAN Orchestrator storage-monitoring features Describe VMware SD-WAN Orchestrator database-monitoring features Describe the VMware SD-WAN Orchestrator upgrade process Describe the VMware SD-WAN Orchestrator backup and data archival processes Describe the VMware SD-WAN Orchestrator process to expand database disks Describe the VMware SD-WAN Orchestrator system metrics for monitoring Describe how systems metrics are collected for monitoring VMware SD-WAN Orchestrator Describe VMware SD-WAN Gateway additions and removals Describe the VMware SD-WAN Gateway upgrade process Describe the VMware SD-WAN Gateway validation process VMware SD-WAN Security and Edge Licensing Describe the VMware SD-WAN PKI security infrastructure Recognize VMware SD-WAN PKI authentication modes Describe VMware SD-WAN certificate operations Describe the VMware SD-WAN PKI certificate authentication configuration Describe the VMware SD-WAN PKI configuration process Compare operator and partner logins Describe the VMware SD-WAN self-signed certificate authority process Describe VMware SD-WAN certificate authority renewal and revocation Describe the VMware SD-WAN intermediate certificate authority Describe the VMware SD-WAN certificate chain of trust Describe the VMware SD-WAN Edge licensing and license types Assign and view the VMware SD-WAN Edge licenses and reports VMware SD-WAN Reporting and Diagnostics Describe the VMware SD-WAN network monitoring tools Describe the VMware SD-WAN network visibility options and controls Identify the VMware SD-WAN Orchestrator reporting features Describe and analyze VMware SD-WAN Orchestrator events View enterprise reports by operator, partner, and administrator View historical network insights and real-time reports on path visibility Describe common VMware SD-WAN alerts Describe the VMware SD-WAN heart mechanism for alerts Configure VMware SD-WAN alerts Analyze common VMware SD-WAN alerts Use standard networking tools for monitoring VMware SD-WAN Describe remote diagnostic actions available on VMware SD-WAN Orchestrator Use the remote diagnostics tools on VMware SD-WAN Orchestrator Generate remote diagnostics bundles and packet captures VMware SD-WAN Orchestrator and Gateway Troubleshooting Recognize the basic sanity checks to troubleshoot VMware SD-WAN Orchestrator Create diagnostic bundles to enable support to troubleshoot VMware SD-WAN Orchestrator Recognize the basic checks to troubleshoot VMware SD-WAN Orchestrator Troubleshoot common VMware SD-WAN Orchestrator performance issues Describe the tools available to troubleshoot VMware SD-WAN Gateway Analyze sample outputs for debugging a VMware SD-WAN Gateway issue Use Data Plane Development Kit to improve VMware SD-WAN Gateway performance VMware SD-WAN Orchestrator and Gateway Commands Recognize when and how to use VMware SD-WAN Orchestrator database-monitoring commands Recognize when and how to use the VMware SD-WAN Gateway process-monitoring commands

VMware SD-WAN for Service Providers [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Fast Track [V8]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Install and configure ESXi hosts Deploy and configure vCenter Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users Configure vCenter High Availability Create and configure virtual networks using vSphere standard switches and distributed switches Create and configure datastores using storage technologies supported by vSphere Use the vSphere Client to create virtual machines, templates, clones, and snapshots Configure and manage a VMware Tools Repository Create content libraries for managing templates and deploying virtual machines Manage virtual machine resource use Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion Create and configure a vSphere cluster that is enabled with vSphere High Availability and vSphere Distributed Resource Scheduler Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use host profiles to manage VMware ESXi host compliance Monitor the vCenter, ESXi, and VMs performance in the vSphere client This five-day, extended hour course takes you from introductory to advanced VMware vSphere© 8 management skills. Building on the installation and configuration content from our best-selling course, you will also develop advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will install, configure, and manage vSphere 7. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 8, which includes VMware ESXi? 8 and VMware vCenter Server© 8. Course Introduction Introductions and course logistics Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts Describe how vSphere fits in the software-defined data center and the cloud infrastructure Recognize the user interfaces for accessing vSphere Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Install an ESXi host vCenter Management Recognize ESXi hosts communication with vCenter Deploy vCenter Server Appliance Configure vCenter settings Use the vSphere Client to add and manage license keys Create and organize vCenter inventory objects Recognize the rules for applying vCenter permissions View vSphere tasks and events Create a vCenter backup schedule Recognize the importance of vCenter High Availability Explain how vCenter High Availability works Deploying Virtual Machines Create and provision VMs Explain the importance of VMware Tools Identify the files that make up a VM Recognize the components of a VM Navigate the vSphere Client and examine VM settings and options Modify VMs by dynamically increasing resources Create VM templates and deploy VMs from them Clone VMs Create customization specifications for guest operating systems Create local, published, and subscribed content libraries Deploy VMs from content libraries Manage multiple versions of VM templates in content libraries Configure and Manage vSphere Networking Configure and view standard switch configurations Configure and view distributed switch configurations Recognize the difference between standard switches and distributed switches Explain how to set networking policies on standard and distributed switches Configure and Manage vSphere Storage Recognize vSphere storage technologies Identify types of vSphere datastores Describe Fibre Channel components and addressing Describe iSCSI components and addressing Configure iSCSI storage on ESXi Create and manage VMFS datastores Configure and manage NFS datastores Discuss vSphere support for NVMe and iSER technologies Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances Migrate VMs using vSphere vMotion Describe the role of Enhanced vMotion Compatibility in migrations Migrate VMs using vSphere Storage vMotion Take a snapshot of a VM Manage, consolidate, and delete snapshots Describe CPU and memory concepts in relation to a virtualized environment Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Recognize the role of a VMware Tools Repository Configure a VMware Tools Repository Recognize the backup and restore solution for VMs vSphere Monitoring Monitor the key factors that can affect a virtual machine's performance Describe the factors that influence vCenter performance Use vCenter tools to monitor resource use Create custom alarms in vCenter Describe the benefits and capabilities of VMware Skyline Recognize uses for Skyline Advisor Pro Deploying and Configuring vSphere Cluster Use Cluster Quickstart to enable vSphere cluster services and configure the cluster View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster Recognize use cases for vSphere DRS settings Monitor a vSphere DRS cluster Describe how vSphere HA responds to different types of failures Identify options for configuring network redundancy in a vSphere HA cluster Recognize the use cases for various vSphere HA settings Configure a cluster enabled for vSphere DRS and vSphere HA Recognize when to use vSphere Fault Tolerance Describe the function of the vCLS Recognize operations that might disrupt the healthy functioning of vCLS VMs ESXi Operations Use host profiles to manage ESXi configuration compliance Recognize the benefits of using configuration profiles Managing the vSphere Lifecycle Generate vCenter interoperability reports Recognize features of vSphere Lifecycle Manager Describe ESXi images and image depots Enable vSphere Lifecycle Manager in a vSphere cluster Validate ESXi host compliance against a cluster image and remediate ESXi hosts using vSphere Lifecycle Manager Describe vSphere Lifecycle Manager automatic recommendations Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware Network Operations Configure and manage vSphere distributed switches Describe how VMware vSphere Network I/O Control enhances performance Define vSphere Distributed Services Engine Describe the use cases and benefits of vSphere Distributed Services Engine Storage Operations Describe the architecture and requirements of vSAN configuration Describe storage policy-based management Recognize components in the vSphere Virtual Volumes architecture Configure Storage I/O Control

VMware vSphere: Fast Track [V8]
Delivered OnlineFlexible Dates
Price on Enquiry

Comprehensive Training for Architects | Interior and Exterior Designers

By ATL Autocad Training London

Who is this course for? The Architecture and Interior Design course is ideal for individuals aiming to master both interior design and architecture. Guided by certified tutors from Autodesk and Adobe, students will gain comprehensive skills in these fields. Click here for more info: Website Duration: 40 hours.1-on-1 Training. In-Person or Live online. When can I book: 9 am - 7 pm (Choose your preferred day and time once a week). Flexible timing with advance booking Course Features: Compatibility: Our training courses are compatible with both Mac and Windows operating systems, ensuring accessibility for all users. Price Assurance: We guarantee the best value for your investment, ensuring competitive pricing for high-quality training. Personalized Training: Benefit from one-on-one training sessions tailored to your specific needs and skill level, ensuring a personalized learning experience. Flexible Scheduling: Enjoy the flexibility to choose your preferred training time and day. Sessions are available seven days a week, from Monday to Sunday, between 9 am and 8 pm, accommodating your busy schedule. Lifetime Support: Receive lifetime email and phone support, ensuring that you have access to assistance even after completing the course. Technical Assistance: Get help with configuring your computer for software installation, ensuring a smooth learning experience without technical hurdles. Referral Discounts: Earn special discounts when you refer a friend to our courses, making learning a rewarding experience for you and your network. Group Training Savings: Avail significant savings on group training courses, encouraging collaborative learning and making education more accessible for groups. When can you schedule this Training Course? Personalized training experience with our flexible 1-on-1 sessions. Design your own timetable by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 a.m. and 7 p.m. Alternatively, you can call 02077202581 to book over the phone. How long is the training? The course spans 40 hours, which you can divide over as many days as needed to fit your ideal schedule. What's the teaching method? Our sessions are 1-on-1, offered either in-person face to face or live online. You'll receive personalized attention, tailored content, a flexible learning pace, and individual support. Live online 1-on-1 sessions over Zoom are also an option. What will you learn? In this comprehensive training program, you'll gain proficiency in a thoughtfully curated selection of software tools. Option A: AutoCAD (13 hours) SketchUp (10 hours) Vray (6 hours) Photoshop (6 hours) InDesign (5 hours) Additionally, you'll receive free online portfolio design assistance, career growth guidance, and mock interviews to enhance your job market readiness. Option B: AutoCAD (10 hours) 3ds Max (17 hours) Vray (4 hours) Photoshop (5 hours) InDesign (4 hours) Certified trainers in AutoCAD, 3ds Max, SketchUp, and Adobe software will conduct this training program. It caters to beginners, intermediate, and advanced learners, focusing on core skills for creating 2D drawings, plans, sections, elevations, construction details, and 3D visualizations. Our experienced instructors will guide you through essential commands and methodologies for producing precise 2D and 3D drawings. We have developed these CAD courses, utilizing the expertise of our professionals to provide the most efficient and effective instruction. Upon completion, participants will: Master Software Tools: Excel in AutoCAD, SketchUp, Vray, Photoshop, and InDesign for digital design. Advanced Design Skills: Create intricate 2D/3D designs, plans, and visualizations. Project Management: Manage layouts, plotting, and projects efficiently. Realistic Rendering: Produce lifelike visualizations using Vray. Creative Composition: Understand design principles for impactful creations. Portfolio Development: Create a professional online portfolio. Career Readiness: Prepare for job interviews and enhance resumes. Potential Jobs: Architect Interior/Exterior Designer CAD Technician Visualization Specialist Design Consultant Project Manager These skills open doors to varied roles in architecture and design, ensuring career growth and job readiness. Course Features: Compatibility: Our training courses are compatible with both Mac and Windows operating systems, ensuring accessibility for all users. Price Assurance: We guarantee the best value for your investment, ensuring competitive pricing for high-quality training. Personalized Training: Benefit from one-on-one training sessions tailored to your specific needs and skill level, ensuring a personalized learning experience. Flexible Scheduling: Enjoy the flexibility to choose your preferred training time and day. Sessions are available seven days a week, from Monday to Sunday, between 9 am and 8 pm, accommodating your busy schedule. Lifetime Support: Receive lifetime email and phone support, ensuring that you have access to assistance even after completing the course. Technical Assistance: Get help with configuring your computer for software installation, ensuring a smooth learning experience without technical hurdles. Referral Discounts: Earn special discounts when you refer a friend to our courses, making learning a rewarding experience for you and your network. Group Training Savings: Avail significant savings on group training courses, encouraging collaborative learning and making education more accessible for groups. When can you schedule this Training Course? Personalized training experience with our flexible 1-on-1 sessions. Design your own timetable by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 a.m. and 7 p.m. Alternatively, you can call 02077202581 to book over the phone. How long is the training? The course spans 40 hours, which you can divide over as many days as needed to fit your ideal schedule. What's the teaching method? Our sessions are 1-on-1, offered either in-person face to face or live online. You'll receive personalized attention, tailored content, a flexible learning pace, and individual support. Live online 1-on-1 sessions over Zoom are also an option. What will you learn? In this comprehensive training program, you'll gain proficiency in a thoughtfully curated selection of software tools. Option A: AutoCAD (13 hours) SketchUp (10 hours) Vray (6 hours) Photoshop (6 hours) InDesign (5 hours) Additionally, you'll receive free online portfolio design assistance, career growth guidance, and mock interviews to enhance your job market readiness. Option B: AutoCAD (10 hours) 3ds Max (17 hours) Vray (4 hours) Photoshop (5 hours) InDesign (4 hours) Certified trainers in AutoCAD, 3ds Max, SketchUp, and Adobe software will conduct this training program. It caters to beginners, intermediate, and advanced learners, focusing on core skills for creating 2D drawings, plans, sections, elevations, construction details, and 3D visualizations. Our experienced instructors will guide you through essential commands and methodologies for producing precise 2D and 3D drawings. We have developed these CAD courses, utilizing the expertise of our professionals to provide the most efficient and effective instruction.

Comprehensive Training for Architects | Interior and Exterior Designers
Delivered in London or OnlineFlexible Dates
£1,440

Best Practice in Portfolio Management in Upstream Oil and Gas

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 4 half-day Virtual Instructor Led Training (VILT) course presents the principles and best practices of portfolio management in the upstream (E&P) oil and gas industry. The VILT course is equally valuable for small independents, large integrated international companies and national oil companies. The VILT course consists of presentations, case studies, illustrative practical exercises and syndicate discussions. Particular emphasis is given to pragmatic portfolio management approaches and solutions which can be implemented swiftly without recourse to major investments in planning and portfolio management software. The VILT course will draw on examples from your expert course leader's 35+ years' experience in the oil and gas industry as an explorationist, upstream vice-president and management consultant. The VILT course handout will comprise softcopy slides used in the presentation and a softcopy workbook for the exercises. Participants will gain proficiency in portfolio management techniques, understand how and why to undertake this activity and be able to apply key concepts directly in the business of their teams / divisions. The VILT course will be presented over 4 half-days, using Microsoft Teams or Zoom and a proprietary set of VILT tools. Participants will be asked to complete a pre course questionnaire (PCQ) addressing their objectives and experience, and attend a session to familiarise themselves with VILT tools before course commencement.     Training Objectives To present the tools, concepts and principles of portfolio management To define the quantitative metrics which are used to describe projects in a portfolio To understand the benefits of portfolio management at different stages of the upstream business: in strategy development, opportunity screening, business development, drilling prospects, conducting appraisal of discoveries and developing fields To put portfolio management in the organisational context by describing the role of the portfolio management team and examining how value assurance (quality control) is best conducted on portfolio data for projects and assets To demonstrate how portfolio management contributes to improved business performance By the end of the VILT course, participants will understand: Key concepts and principles of portfolio management How to design a simple portfolio database and describe complex projects in a small number of objective metrics How to segment the portfolio into meaningful units How to use portfolio data in making business choices and decisions at the strategic and tactical levels The extent to which it is meaningful and reasonable to make comparisons across different portfolio segments How the portfolio management team can support the wider business in decision-making Target Audience This VILT course is specially designed for exploration and development geoscientists, E&P economists and finance staff, and E&P managers. Both technical and non-technical staff will benefit from the concepts presented. Companies are encouraged to send participants from different functions and seniority levels to gain great benefits especially those which would like to implement the concepts presented in this VILT course. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 4 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. The VILT course will be presented in an interactive workshop format that allows for discussion. Course Duration: 4 half-day sessions, 4 hours per session (16 hours in total). Trainer Your expert course leader draws on more than 35 years of experience managing, reviewing and directing projects in all aspects of the exploration business: from exploration business development (new ventures), through prospect maturation and drilling, to the appraisal of discoveries. He has more than 30 years' experience with Shell International, followed by 10 years consulting to NOCs in Asia Pacific, Africa and South America and independent oil companies in the United Kingdom, continental Europe and North America. Other than delivering industry training, he has worked on projects for oil & gas companies of all sizes, including independents, national oil companies and (super)-majors, private equity firms, hedge funds and investment banks, and leading management consulting firms. He is an alumnus of Cambridge University. He has M.A and Ph.D. degrees in geology and is a Fellow of the Geological Society of London as well as a respected speaker on management panels at international conferences. Professional Experience Management consultancy & executive education: Advice to investment banks, businesses and major consulting firms. Specialist expertise in upstream oil & gas, with in depth experience in exploration strategy, portfolio valuation and risk assessment. Leadership: Managed and led teams and departments ranging from 3 - 60 in size. Provided technical leadership to a cadre of 800 explorationists in Shell worldwide. Member of the 12-person VP team leading global exploration in Shell, a $3 bln p.a. business and recognised as the most effective and successful among its industry peers. Accountability & decision-making: Accountable for bottom-line results: in a range of successful exploration ventures with budgets ranging from $10's million to $100's million. Made, or contributed to, complex business decisions / investments, taking into account strategic, technical, commercial, organisational and political considerations. Corporate governance: Served as non-executive director on the Boards of the South Rub al Khali Company (oversight of gas exploration studies and drilling in Saudi Arabia) and SEAPOS B.V. (exploration deep-water drilling and facilities management). Technical & operations: Skilled in exploration opportunity evaluation, the technical de risking of prospects, portfolio analysis and managing the interface between exploration and well engineering activities. Unparalleled knowledge of the oil and gas basins of the world, and of different operating regimes and contractual structures, ranging from Alaska, Gulf of Mexico and Brazil, through to the Middle East, former Soviet Union, Far East and Australia. Safety: Following an unsatisfactory audit, became accountable for safety performance in Shell's exploration new ventures. Through personal advocacy and leadership of a small team, delivered pragmatic and effective HSE systems, tools and staff training / engagement and a dramatically improved safety record. R&D: Experience in the 3 key roles in R&D: scientific researcher, research manager, and 'customer' for R&D products. After re-defining Shell's exploration R&D strategy, led the re-structuring of the R&D organization, its interface with 'the business' and approaches to deployment and commercialization. Strategy: Accomplished at formulating competitive strategies in business, R&D and technology deployment, translating them into actionable tactics and results. Defined the exploration strategy of PDO (a Shell subsidiary in Oman) and latterly of Shell's global exploration programme. Professional education, behavioural/motivational coaching: Experienced in organisational re-design, change management, leadership education and talent development. Commercial skills: Personally negotiated drilling compensation claims, educational contracts and E&P contracts, with values of $5 million to $100+ million. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Best Practice in Portfolio Management in Upstream Oil and Gas
Delivered in Internationally or OnlineFlexible Dates
£1,960 to £3,699

VMware NSX-T Data Center for Intrinsic Security [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight™ for NSX™ and VMware vRealize Network Insight™ to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response

VMware NSX-T Data Center for Intrinsic Security [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Integrated Openstack: Install, Configure, Manage [V7]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Cloud architects, systems engineers, data center administrators, and cloud administrators with experience in a service provider or managed services environment. Overview By the end of the course, you should be able to meet the following objectives: Describe how VMware Integrated OpenStack fits into the VMware SDDC and its use cases List the deployment options and how to install VMware Integrated OpenStack Describe the architecture of VMware Integrated OpenStack and its components Configure tenancy and manage user authentication Integrate the OpenStack Neutron Networking service with VMware NSX-T™ Data Center networking platform Deploy and manage virtual machine instances Monitor VMware Integrated OpenStack with OpenStack monitoring services Design an auto-scale, multitier application using built-in automation tools Manage a VMware Integrated OpenStack control plane using Kubernetes Use the HTML5 Web UI and CLI commands to view and edit the configuration, monitor log files, and view database tables used by VMware Integrated OpenStack components This five-day course provides you with the skills to build a private cloud using VMware© Integrated OpenStack on a proven VMware SDDC. Through a combination of lecture and hands-on labs, this course builds your skills in installing, configuring, and managing VMware Integrated OpenStack. You learn how to offer IaaS and PaaS with advanced networking and security features to end users using VMware Integrated OpenStack. Course Introduction Introductions and course logistics Course objectives References and resources Introduction to VMware Integrated OpenStack Describe what an OpenStack is Describe the services that make up VMware Integrated OpenStack Describe what VMware Integrated OpenStack is Describe what is NFV and how does VIO fit in Understand the licensing model of VIO Understand the use cases of VMware Integrated OpenStack VMware Integrated OpenStack Deployment Understand the role of Kubernetes in the VIO control plane List the VMware Integrated OpenStack deployment models How to perform VIO high-availability deployment How to perform VIO compact installation Pre-requisites for installing VMware Integrated OpenStack How to use the HTML5 web UI / VIOCLI to check the deployment configurations and deployment running status Explain steps involved in patching VIO high availability setup VMware Integrated OpenStack Architecture List the VMs deployed after a VMware Integrated OpenStack high-availability installation Describe the overall architecture of the VIO HA setup List the VIO services running within Kubernetes pods Describe the role of each service Understand ssl certificates in VIO Keystone Authentication Understand keystone use cases and services List the features offered by keystone in VIO How to integrate keystone with LDAP List the configuration, view logs, and database tables related to keystone Glance Images Understand Glance use case and its services List the features offered by Glance in VIO Explain how to create flavors and images Describe how to set up metadata, for example SPBM storage policy List the custom resources/logs and database tables related to Glance Networking with Neutron Understand the Neutron use case and its services Integrate Neutron with NSX-T Data Center List the custom resources, logs, and database tables related to Neutron Managing Instances with Nova Understand Nova use cases and services Understand regions, availability zones, and host aggregates Understand the concept of tenant VDC Nova support for multiple vCenter instances How to deploy an instance using Nova How to resize an instance and view the console logs Configuration and logs related to Nova service Cinder Block Storage Understand Cinder use cases and services List the features offered by Cinder Adding a persistent volume to an instance Explain the Snapshot of a Cinder volume and attach it to another instance List the custom resources, log files, and database tables related to Cinder Monitoring with Ceilometer List the Telemetry use cases and services How to enable Ceilometer in VIO How to monitor the VIO environment using Ceilometer Configuration and log files related to Ceilometer service Automating with Heat Define Heat use cases templates and services Describe use cases of Heat Troubleshooting Concepts List common issues in VMware Integrated OpenStack Use troubleshooting tools Describe simple troubleshooting procedures List and explain Day-2 operations Advanced Features Describe Load Balancer as a Service (Octavia) Explain Firewall as a Service Describe Designate (DNS as a Service) Demonstrate automating scaling Describe selective vCPU pinning Explain SRIOV network redundancy support Describe network trunk services support Describe Live resize Describe hardware passthrough (GPU pass through) Describe external REST API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Integrated Openstack: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Integrated Openstack: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Integrated Openstack: Install, Configure, Manage [V7]
Delivered OnlineFlexible Dates
Price on Enquiry

Well Integrity (Basic and Advanced)

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This intensive 5 full-day has been designed as a separately bookable course comprising 3 days of Well Integrity (Basic) and 2 days of Advanced Well Integrity. The intensive 3 full-day course will equip the participants with a thorough knowledge of well integrity management and risk assessment in producing assets. Based on the regulatory requirements and using real examples and exercises from around the world, this represents best practice integrity management within the oil and gas industry. When to take action with a well is a critical decision, both from a safety and economic perspective. A consistent approach to decision-making provides certainty within the organisation, focusing effort, and spending wisely. The decision-making steps will be set out to ensure all critical aspects are captured consistently. Risk analysis approaches used by different organisations and examples of risk management and risk-ranking methods will be discussed. The 2 full-day course will deepen the participants' knowledge of well integrity management, and skills for designing, operating, and maintaining well equipment. The ultimate goal is to optimise productivity at the lowest Unit Operating Cost (UOC) and to maintain mechanical integrity throughout well life cycle. Well Integrity management is looked at in three distinct stages. The first stage is during the well design which includes material selection, engineering design, cement design, coating and inhibitors and cathodic protection. The second stage is monitoring the well during the life of the well, locating possible leaks and / or loss of metal. The last stage is to manage and control any well integrity issues using specialised products, services and techniques. Training Objectives 1. Well Integrity Training: Upon completion of this course, the participants will be able to: Define the building blocks of a successful well integrity management system Develop an approach to risk management, understand risk analysis and methods applied across the industry How do we 'Make Wells Safer', learn about emerging technologies for well integrity problem diagnosis and new techniques available to 'repair' the issues Execute the basic elements of well integrity management training for field operators Evaluate well design elements that enhance or hinder well integrity status definition during the operating phase of the well life-cycle Gain the demonstrable benefits of well integrity management from field experience Review cases studies and discuss them to enhance knowledge and take on board lessons learned 2. Advanced Well Integrity: Define well integrity well categorization based on compliance to the barrier policy outlined in the regulations and develop an approach to risk management Discuss well-completion design and construction to create a 'integer' well with the lowest life cycle maintenance cost from a WIM perspective Monitoring and surveillance of well integrity, focusing on barrier competence such as cementing and corrosion Investigate and manage well integrity issues, causes & potential solutions Understand repairs needed to address 'Loss of Well Operating Envelope' Gain an overview understanding of Well Suspension & Well Abandonment Discuss further case studies as well as conduct a post course test Target Audience Invaluable for production, operations, and integrity professionals involved in implementing & managing well integrity and seeking to improve performance. It is also essential for those who need to develop and implement such systems, or who have a general need to know and understand more about well integrity management. The course will also provide a fresh approach for senior professionals and managers. Designed for professionals in the oil and gas industry who are involved in the design, construction and operation of wells from the following disciplines: Production Maintenance Production Operations Drilling Engineering Safety engineering Well Intervention Well Integrity Engineering Asset Management Course Level Intermediate Advanced Trainer Gordon Duncan has over 40 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in well intervention and completions. After a number of years working for intervention service companies (completions, slickline & workovers), he joined Shell as a well service supervisor. He was responsible for the day-to-day supervision of all well intervention work on Shell's Persian/Arabian Gulf platforms. This included completion running, coil tubing, e-line, slickline, hydraulic workovers, well testing and stimulation operations. An office-based role as a senior well engineer followed. He was responsible for planning, programming and organising of all the well engineering and intervention work on a number of fields in the Middle East. He had a brief spell as a Site Representative for Santos in Australia before joining Petro-Canada as Completions Superintendent in Syria, then moved to Australia as Completions Operations Superintendent for Santos, before returning to Shell as Field Supervisor Completions and Well Interventions in Iraq where he carried out the first ever formal abandonment of a well in the Majnoon Field. While working on rotation, he regularly taught Completion Practices, Well Intervention, Well Integrity and Reporting & Planning courses all over the world. In 2014, he started to focus 100% on training and became the Technical Director for PetroEDGE. Since commencing delivering training courses in 2008, he has taught over 300 courses in 31 cities in 16 countries to in excess of 3,500 participants. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Well Integrity (Basic and Advanced)
Delivered in Internationally or OnlineFlexible Dates
£1,891 to £2,199

CIEH Foundation (Level 2) Certificate in HACCP (1 Day)

5.0(43)

By Ask Sonia Limited

CIEH Level 2 Foundation HACCP certificate in manufacturing. Delivered online (Zoom) by a live tutor. Exam and Certificate fee included in the price.

CIEH Foundation (Level 2) Certificate in HACCP (1 Day)
Delivered OnlineFlexible Dates
£210

VMware Horizon 8: Virtual Desktop Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Operators, administrators, and architects responsible for the creation, maintenance, or delivery of remote and virtual desktop services. Overview By the end of the course, you should be able to meet the following objectives: Recognize the features and benefits of Horizon Use VMware vSphere to create VMs to be used as desktops for Horizon Create and optimize Windows VMs to create Horizon desktops Install and configure Horizon Agent on Horizon desktop Configure and manage the VMware Horizon Client™ systems and connect the client to a VMware Horizon desktop Configure, manage, and entitle desktop pools of full VMs Configure, manage, and entitle pools of instant-clone desktops Create and use Remote Desktop Services (RDS) desktops and application pools Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool Implement a structured approach to troubleshooting Resolve common issues that occur in a Horizon environment Troubleshoot issues with linked and instant clones Configure the Windows client Identify the correct log level for gathering logs Optimize protocols for the best end-user experience VMware Horizon© 8: Virtual Desktop Bootcamp is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management and VMware Horizon 8: Virtual Desktop Troubleshooting. This training combination gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build skills in configuring and managing VMware Horizon 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to resolve common issues that occur in a VMware Horizon environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Horizon Recognize the features and benefits of VMware Horizon Describe the conceptual and logical architecture of VMware Horizon Introduction to Use Case Define a use case for your virtual desktop and application infrastructure Convert customer requirements to use-case attributes vSphere for Horizon 8 Explain basic virtualization concepts Use VMware vSphere© Client? to access your vCenter Server system and VMware ESXi? hosts Create, provision, and remove a virtual machine VMware Horizon Desktops Create a Windows and a Linux virtual machine using vSphere Optimize and prepare Windows and Linux virtual machines to set up VMware Horizon desktop VMs VMware Horizon Agents Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines Create a gold master for Windows Horizon desktops VMware Horizon Pools Identify the steps to set up a template for desktop pool deployment List the steps to add desktops to the VMware Horizon© Connection Server? inventory Compare dedicated-assignment and floatingassignment pools Outline the steps to create an automated pool Define user entitlement Explain the hierarchy of global, pool-level, and userlevel policies VMware Horizon Client Options Describe the different clients and their benefits Access Horizon desktop using various Horizon clients and HTML Configure integrated printing, USB redirection, and the shared folders option Configure session collaboration and media optimization for Microsoft Teams Creating and Managing Instant-Clone Desktop Pools List the advantages of instant clones Explain the provisioning technology used for instant-clone desktop pools Set up an automated pool of instant clones Push updated images to instant-clone desktop pools Creating RDS Desktop and Application Pools Explain the difference between an RDS desktop pool and an automated pool Compare and contrast an RDS session host pool, a farm, and an application pool Create an RDS desktop pool and an application ool Access RDS desktops and application from Horizon Client Use the instant clone technology to automate the build-out of RDSH farms Configure load-balancing for RDSHs on a farm Monitoring VMware Horizon Monitor the status of the VMware Horizon components using the Horizon Administrator console dashboard Monitor desktop sessions using the HelpDesk tool Overview of Virtual Desktop Troubleshooting Structured approach to troubleshooting configuration and operational problems Applying troubleshooting methods

VMware Horizon 8: Virtual Desktop Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry