• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3037 TEC courses in Cardiff delivered Live Online

CompTIA Server+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals such as PC, desktop, and help desk technicians who have experience supporting PC hardware who wish to make the transition to become server hardware and support specialists. This course is also designed for existing server managers who are preparing to take the CompTIA Server+ Exam SKO-005. Overview Upon successful completion of this course, you will be able to perform the duties of a server administrator. In this course, you will: - Manage server hardware. - Install server hardware and operating systems. - Configure networking hardware and protocols. - Perform basic server configuration tasks. - Create a virtual server environment. - Administer servers. - Implement server storage solutions. - Secure the server. - Plan and test disaster recovery. - Troubleshoot server issues. This course can also benefit you if you are preparing to take the CompTIA Server+ examination (Exam SK0-004). This course builds on existing professional experience with personal computer hardware support to present the next tier of skills & concepts students will use on the job when administering any type of network server. 1 - Outline Lesson 1: Understanding Server Administration Concepts Lesson 2: Understanding Virtualization and Cloud Computing Lesson 3: Understanding Physical and Network Security Concepts Lesson 4: Managing Physical Assets Lesson 5: Managing Server Hardware Lesson 6: Configuring Storage Management Lesson 7: Installing and Configuring an Operating System Lesson 8: Troubleshooting OS, Application, and Network Configurations Lesson 9: Managing Post-Installation Administrative Tasks Lesson 10: Managing Data Security Lesson 11: Managing Service and Data Availability Lesson 12: Decommissioning Servers Additional course details: Nexus Humans CompTIA Server Plus Certification (Exam SKO-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Server Plus Certification (Exam SKO-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Server+
Delivered OnlineFlexible Dates
£2,475

CompTIA Project+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Individuals in various job roles who are involved in leading, managing, and participating in small to medium scale projects. Overview Upon successful completion of this course, students will be able to: Identify the fundamentals of project management. Perform the pre-project setup. Initiate a project. Plan project strategies. Develop project schedules. Plan project staffing, communication, and quality. Plan project risk management. Plan project costs. Plan project procurements. Plan for change management and transitions. Manage project execution. Manage project procurement. Control project performance. Monitor and control the triple constraints. Monitor project risks and procurements. Perform the project closure processes. In this course, students will apply recognized practices of project management and understand a project?s life cycle and roles and skills necessary to effectively initiate, plan, execute, monitor and control, and close a project. 1 - Exploring Project Management Fundamentals Examine the Basics of Project Management Describe the Project Life Cycle Examine Organizational Influences on Project Management 2 - Performing the Pre-Project Setup Create a Project Concept Definition Statement Examine Project Selection Determine Strategic and Operational Relevance Perform Project Feasibility Determine Technical Requirements 3 - Initiating a Project Prepare a Project Statement of Work Create a Project Charter Identify Project Stakeholders 4 - Planning Project Strategy Identify Elements of the Project Management Plan and Subsidiary Plans Determine Stakeholder Needs Create a Scope Statement Develop a Work Breakdown Structure 5 - Developing the Project Schedule Create an Activity List Create a Project Schedule Network Diagram Identify Resources Estimate Time Develop a Project Schedule Identify the Critical Path Optimize the Project Schedule Create a Schedule Baseline 6 - Planning Human Resources, Communication, and Quality Create a Human Resource Plan Create a Communications Management Plan Create a Quality Management Plan 7 - Planning Project Risk Management Examine a Risk Management Plan Identify Project Risks and Triggers Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Develop a Risk Response Plan 8 - Planning Project Costs Estimate Project Costs Estimate the Cost Baseline Reconcile Funding and Costs 9 - Planning Project Procurements Plan Project Procurements Prepare a Procurement Statement of Work Prepare a Procurement Document 10 - Planning for Change Management and Transitions Develop an Integrated Change Control System Develop a Transition Plan 11 - Managing Project Execution Direct Project Execution Execute a Quality Assurance Plan Assemble a Project Team Develop a Project Team Manage a Project Team Distribute Project Information Manage Stakeholder Relationships and Expectations 12 - Managing Project Procurement Obtain Responses from Sellers Determine Project Sellers 13 - Control Project Performance Monitor and Control Project Work Manage Project Changes Report on Project Performance 14 - Monitor and Control the Triple Constraints Control Project Scope Control Project Schedule Control Project Costs Manage Project Quality 15 - Monitoring Project Risks and Procurements Control Project Risks Managing Vendors and Procurements 16 - Performing the Project Closure Processes Deliver the Final Product Close Project Procurements Conduct a Closeout Meeting Close a Project Additional course details: Nexus Humans CompTIA Project Plus Certification (Exam PK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Project Plus Certification (Exam PK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Project+
Delivered OnlineFlexible Dates
£2,475

CompTIA Linux+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals whose primary job responsibility is the management of servers and other devices running the Linux operating system. A typical student in this course should have at least nine months of hands-on Linux experience and at least one and a half years of IT experience in other computing environments. The target student should wish to expand their skillset to support their career in Linux system administration and operation. This course is also designed for students who are seeking the CompTIA Linux+ certification and who want to prepare for Exam XK0-005. The Linux+ certification can validate the student's understanding and skill in configuring, monitoring, and supporting Linux systems. Overview In this course, you will configure, operate, and troubleshoot Linux systems. You will: - Perform basic Linux tasks. - Manage users and groups. - Manage permissions and ownership. - Manage storage. - Manage files and directories. - Manage kernel modules. - Manage the Linux boot process. - Manage system components. - Manage devices. - Manage networking. - Manage packages and software. - Secure Linux systems. - Write and execute Bash shell scripts. - Automate tasks. - Plan and perform a Linux installation. The Official CompTIA© Linux+© courseware builds on your existing experience with systems operations and administration to provide you with the knowledge and skills required to configure, manage, operate, and troubleshoot a Linux environment by using security best practices, scripting, and automation. This course will also prepare you for the Exam XKO-005. 1 - PERFORMING BASIC LINUX TASKS Identify the History and Development of Linux Enter Shell Commands Get Help Using Linux 2 - MANAGING USERS AND GROUPS Assume Superuser Privileges Create, Modify, and Delete Users Create, Modify, and Delete Groups Query Users and Groups Configure Account Profiles 3 - MANAGING PERMISSIONS AND OWNERSHIP Modify File and Directory Permissions Modify File and Directory Ownership Configure Special Permissions and Attributes Troubleshoot Permissions Issues 4 - MANAGING STORAGE Create Partitions Manage Logical Volumes Mount File Systems Manage File Systems Navigate the Linux Directory Structure Troubleshoot Storage Issues 5 - MANAGING FILES AND DIRECTORIES Create and Edit Text Files Search for Files Perform Operations on Files and Directories Process Text Files Manipulate File Output 6 - MANAGING KERNEL MODULES Explore the Linux Kernel Install and Configure Kernel Modules Monitor Kernel Modules 7 - MANAGING THE LINUX BOOT PROCESS Configure Linux Boot Components Configure GRUB 2 8 - MANAGING SYSTEM COMPONENTS Configure Localization Options Configure GUIs Manage Services Troubleshoot Process Issues Troubleshoot CPU and Memory Issues 9 - MANAGING DEVICES Identify the Types of Linux Devices Configure Devices Monitor Devices Troubleshoot Hardware Issues 10 - MANAGING NETWORKING Identify TCP/IP Fundamentals Identify Linux Server Roles Connect to a Network Configure DHCP and DNS Client Services Configure Cloud and Virtualization Technologies Troubleshoot Networking Issues 11 - MANAGING PACKAGES AND SOFTWARE Identify Package Managers Manage RPM Packages with YUM Manage Debian Packages with APT Configure Repositories Acquire Software Build Software from Source Code Troubleshoot Software Dependency Issues 12 - SECURING LINUX SYSTEMS Implement Cybersecurity Best Practices Implement Identity and Access Management Methods Configure SELinux or AppArmor Configure Firewalls Implement Logging Services Back Up, Restore, and Verify Data 13 - WORKING WITH BASH SCRIPTS Customize the Bash Shell Environment Identify Scripting and Programming Fundamentals Write and Execute a Simple Bash Script Incorporate Control Statements in Bash Scripts 14 - AUTOMATING TASKS Schedule Jobs Implement Version Control Using Git Identify Orchestration Concepts 15 - INSTALLING LINUX Prepare for Linux Installation Perform the Installation Additional course details: Nexus Humans CompTIA Linux Plus Certification (Exam XK0-005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Linux Plus Certification (Exam XK0-005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Linux+
Delivered OnlineFlexible Dates
£2,475

Essential Carrier Ethernet course

5.0(3)

By Systems & Network Training

Carrier Ethernet training course description Ethernet is now the interface of choice for nearly all networking. This comprehensive course looks at the ways carriers can provide this Ethernet interface for their WANs and MANs. The course assumes delegates already have a solid foundation in Ethernet switching and so concentrates on just the Ethernet technologies for Carrier Ethernet. What will you learn Describe the main Carrier Ethernet services. Evaluate transports for Carrier Ethernet. Explain how Ethernet can work over MPLS and SDH. Explain the Ethernet technologies used to enable Carrier Ethernet. Carrier Ethernet training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers. Duration 2 days Carrier Ethernet training course contents Introduction What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: IEEE, MEF, OIF, Ethernet Alliance. Carrier Ethernet Services E-line: EPL, EVPL. E-LAN: EP-LAN, EVP-LAN. E-Tree: EP-Tree, EVP-Tree. Ethernet Services attributes. Applications: Carrier Ethernet for businesses, Mobile backhaul. Multicasting. Service attributes Bandwidth profiles, bandwidth parameters, Class of Service, QoS, MTU, Protection mechanisms: STP, RSTP, MSTP, Link aggregation, G.8031, G.8032. Transporting Carrier Ethernet The main options. 'Pure' Ethernet, Ethernet over SDH, Ethernet over WDM, Ethernet over MPLS. Ethernet switching, addresses and MAC address tables. Carrier Ethernet access technologies. EFM. Ethernet over MPLS What is MPLS, MPLS-TE, MPLS-VPN, L2 VPNs, VPLS, VPWS. MPLS Fast Reroute. CET 'Pure' Ethernet, Provider bridging 802.1d, Provider Backbone Bridges 802.1ah. Traffic engineering 802.1Qay. Carrier Ethernet technologies 802.1ad VLAN stacking, 802.1AX Link aggregation. 802.1Q QoS. OAM Standards, layers, interworking

Essential Carrier Ethernet course
Delivered in Internationally or OnlineFlexible Dates
£2,477

LTE airside

5.0(3)

By Systems & Network Training

LTE Airside training course description This course provides a concise insight into the LTE airside. Key parts of the course are detailed looks at the air interface protocol stack, cell acquisition, transmission and reception of data and of he layer 1 procedures along with layer 2 procedures. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE Airside training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE Airside training course contents Introduction and review of LTE This section describes the requirements of LTE and key technical features, and reviews the system architecture. LTE Architecture, UE, E-UTRAN and EPC. Specifications. OFDMA, SC-FDMA and MIMO antennas This section describes the techniques used in the LTE air interface, notably orthogonal frequency division multiple access (OFDMA) and multiple input multiple output (MIMO) antennas. Communication techniques for fading multipath channels. OFDMA, FFT processing and cyclic prefix insertion. SC-FDMA in the LTE uplink. Multiple antenna techniques including transmit & receive diversity and spatial multiplexing. Introduction to the air interface This section covers the operation of the air interface, the channels that it uses, and the mapping to the time and frequency domains of OFDMA and SC-FDMA. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and physical signals. LTE spectrum allocation. Cell acquisition This is the first of three sections covering the air interface physical layer. Here, we cover mobile procedures to start low-level communications with the cell, and base station transmission of the corresponding information. Primary/secondary synchronisation signals. Downlink reference signals. The master information block. Physical control format indicator channel. Organisation and transmission of the system information. Data transmission and reception In this section, we cover procedures used for data transmission and reception on the shared channels, and describe in detail the individual steps. Data transmission and reception on the uplink and downlink. Scheduling commands and grants on the PDCCH. DL-SCH and UL-SCH. Physical channel processing of the PDSCH and PUSCH. Hybrid ARQ indicators on the PHICH. Uplink control information on the PUCCH. Uplink demodulation and sounding reference signals. Additional physical layer procedure This section concludes our discussion of the air interface physical layer, by discussing a number of procedures that support its operation. Transmission of the physical random access channel. Contention and non-contention based random access procedures. Discontinuous transmission in idle and connected modes. Uplink power control and timing advance. Air interface layer 2 This section describes the architecture and operation of layer 2 of the air interface protocol stack. MAC protocol, interactions with the physical layer, use for scheduling. RLC protocol, transparent, unacknowledged and acknowledged modes. PDCP, including header compression, security functions and recovery from handover.

LTE airside
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive IP CCTV for engineers

5.0(3)

By Systems & Network Training

IP CCTV training course description This hands on course covers the technologies used in IP CCTV systems. The focus is not on operating or cabling but more advanced configuration and troubleshooting. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install IP CCTV. Configure IP CCTV. Explain how IP CCTV protocols work. Troubleshoot IP CCTV. IP CCTV training course details Who will benefit: Technical staff working with IP CCTV. Prerequisites: None. Duration 2 days IP CCTV training course contents Introduction What is IP CCTV? Camera types, Video, Audio, two way audio, IP CCTV software. Hands on Installing IP CCTV. CCTV architecture Components, servers, storage, LANs, WANs. Centralised versus decentralised. Hands on Using IP CCTV. Ethernet What is Ethernet? Ethernet cabling, Inside versus outside, hubs, switches, PoE, VLANs. Hands on Ethernet connectivity. Wireless WiFi, other wireless solutions, 802.11, variations, frequencies, Access Points, bridges, repeaters. WEP, WPA, WPA2, Hands on WiFi Configuration Ways to configure, IP addresses, subnet mask, default gateway, DHCP, NAT, access from the Internet. Hands on CCTV configuration. How IP CCTV works TCP, UDP, IP, RTP, RTSP, SIP, PTZ, NTP, Wireshark. Port numbers. Hands on Using Wireshark to troubleshoot IP CCTV. Network issues with IP CCTV Bandwidth, video resolution, compressions, codecs, frame rates, audio. QoS. One way versus two way traffic. Hands on Analysing CCTV traffic. Security VPNs, Firewalls. Hands on CCTV through a firewall. Troubleshooting ping, tracert, arp, ipconfig, pathping, tracert. Cable issues, switch issues, WiFi issues.CCTV issues. Hands on CCTV troubleshooting. Miscellaneous Design issues, multicasting, gateways. DVR technology. Calculating storage requirements.

Definitive IP CCTV for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Essential EVPN

5.0(3)

By Systems & Network Training

Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.

Essential EVPN
Delivered in Internationally or OnlineFlexible Dates
£2,477

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-305T00 Designing Microsoft Azure Infrastructure Solutions
Delivered OnlineFlexible Dates
£2,380

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

STP alternatives

5.0(3)

By Systems & Network Training

STP alternatives training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores the technologies that can be used as an alternative to STP, including FabricPath, SPB and TRILL. What will you learn Explain how STP and RSTP work. Explain how TRILL works. Explain how SPB works. Explain how FabricPath works. STP alternatives training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day STP alternatives training course contents Introduction Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion, STP alternatives. STP 802.1D, how STP works, root bridge, convergence times, single path. RSTP 802.1w, Improvements, convergence times. Link aggregation 802.3ad, Multi system Link aggregation. IS-IS Concepts, Discovery, topology exchange, flooding. Changes for TRILL, FabricPath and SPB. FabricPath Overview, architecture, control plane protocols, DRAP, STP interactions, packet forwarding, configuration. TRILL Concepts, RBridge, TRILL frames, control plane, data plane, learning MAC addresses. SPB 802.1aq, Node ID, Backbone Edge Bridges, Backbone MAC address, customer MACs, I-SID, forwarding database.

STP alternatives
Delivered in Internationally or OnlineFlexible Dates
£2,477