• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

27732 TEC courses

VMware Migration from VMware NSX for vSphere to NSX-T

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system administrators and network administrators Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Contrast NSX-T Data Center and NSX Data Center for vSphere architectures Understand the networking and security features of NSX-T Data Center Compare end-to-end and lift-and-shift migration approaches Identify common fixed network topologies supported in end-to-end migrations Perform end-to-end migrations for fixed and user-defined topologies Describe other migration modes supported by the migration coordinator Describe lift-and-shift migration techniques Troubleshoot common problems with end-to-end and lift-and-shift migrations Describe the steps to perform a cross-vCenter NSX to NSX Federation migration This three-day, hands-on training course provides you with the skills, techniques, and tools required to successfully migrate your current VMware NSX© Data Center for vSphere© environment to VMware NSX-T? Data Center. You will learn to choose between different migration approaches and how to perform the type of migration that best suits your current environment. In addition, you are presented with common migration problems and resolutions. Course Introduction Introduction and course logistics Course objectives Introduction to NSX-T Data Center Describe the motivation for migrating to NSX-T Data Center Contrast NSX-T Data Center and NSX Data Center for vSphere architectures Describe the logical switching components in NSX-T Data Center Describe the components and functions of NSX-T Data Center logical routing Describe the security features of NSX-T Data Center Explain the implementation of networking services in NSX-T Data Center Migration Approaches Describe the end-to-end migration approach Describe the lift-and-shift migration approach Compare the migration approaches Determine the best migration strategy based on customer requirements Fixed Topologies for Migration Identify the NSX Data Center for vSphere fixed network topologies that can be migrated to NSX-T Data Center without a user-defined topology Explain how network and security objects from the fixed topologies are translated from NSX Data Centerfor vSphere to NSX-T Data Center End-to-End Migration Describe the prerequisites for end-to-end migration Prepare the NSX Data Center for vSphere environment for migration Prepare the NSX-T Data Center environment for migration Migrate the NSX Data Center for vSphere environment with the migration coordinator using a fixed topology Migrate the NSX Data Center for vSphere environment with the migration coordinator using a user-defined topology Perform postmigration tasks Other Migration Modes Describe the steps to migrate NSX Data Center for vSphere when integrated with VMware vRealize Automation Describe the Edge Cutover migration mode Describe the Distributed Firewall migration mode Describe the Distributed Firewall, Host, and Workload migration mode Describe the vSphere Networking migration feature Lift-and-Shift Migration Describe the prerequisites for lift-and-shift migrations Configure L2 bridging in preparation for lift-and-shift migrations Migrate the network and security configuration Migrate workloads Describe the DFW-only migration mode Troubleshooting Migrations Troubleshoot migration problems Identify the log files used in troubleshooting Identify and resolve common issues related to migrations. Cross-vCenter NSX to NSX Federation Migration Contrast cross-vCenter NSX and NSX Federation architectures Describe the steps for a multisite migration Demonstrate how to perform a cross-vCenter NSX to NSX Federation migration Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Migration from VMware NSX for vSphere to NSX-T training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Migration from VMware NSX for vSphere to NSX-T course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Migration from VMware NSX for vSphere to NSX-T
Delivered OnlineFlexible Dates
Price on Enquiry

Migrating to AWS

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Solutions architects, Software engineers, Operations leads, and IT project managers. Overview Recognize the common business and technical drivers for migrating to the cloud Summarize the three phases of a migration and associated objectives, tasks, and stakeholders for each Describe AWS architecture, tools, and migration best practices Distinguish between the various cloud migration strategies and when each is most appropriate Determine an organization?s application migration readiness Discover a portfolio and gather data necessary for migration Plan and design an application migration strategy Perform and validate application migration to the cloud Optimize applications and operations after migrating to the cloud This course is for individuals who seek an understanding of how to plan and migrate existing workloads to the AWS Cloud. You will learn about various cloud migration strategies and how to apply each step of the migration process, including portfolio discovery, application migration planning and design, conducting a migration, and post-migration validation and application optimization. Hands-on labs reinforce learning, and each lab is designed to provide you with the understanding and foundation necessary to complete migration tasks in your organization. Prerequisites We recommend that attendees of this course have: Familiarity with enterprise IT infrastructure (hardware and software) Completed the AWS Technical Essentials or Architecting on AWS training 1 - What Is a Cloud Migration? Summarize the drivers and desired outcomes of a cloud migration Identify the elements of a successful migration journey Describe the three-phase AWS migration process 2 - Assessing Migration Readiness Summarize the activities and goals of the assess phase Evaluate tools for assessing your organization?s cloud readiness Describe Migration Readiness Assessments (MRAs) and their importance 3 - Preparing for a Migration and Understanding Related Workstreams Summarize the mobilize phase of the process Discuss the eight unique migration-related workstreams 4 - Discovering Landing Zones and Their Benefits Explain the function of a landing zone Discuss best practices for creating a custom landing zone Describe how you would use AWS Control Tower to create a landing zone 5 - Building a Landing Zone Summarize the process of building a landing zone Determine the best multi-account structure, governance policies, and connectivity plan for a landing zone 6 - Discovering the Portfolio and Understanding Migration Strategies Explain the activities of the detailed portfolio discovery workstream Describe how to assess an application?s migration readiness Summarize the seven migration strategies 7 - Understanding and Choosing Portfolio Discovery Tools Summarize the various discovery tools available Distinguish which tools are best to use based on scenario 8 - Planning and Designing a Migration Describe the planning and design process Summarize how to set up a migration factory Choose and finalize an application migration strategy 9 - Performing the Migration to AWS Explain the server migration process Discuss the various migration automation and governance tools available Evaluate server migration tools for compatibility with your environment 10 - Understanding Database and Data Migration Services Summarize the significance of database and data migration Discuss the various data migration tools available 11 - Understanding Additional Migration Support Options Discuss additional migration support options Summarize AWS Managed Services and AWS Marketplace Describe SAP on AWS and services offered for Windows 12 - Integrating, Validating, and Cutting Over Applications Discuss the process and benefits of integrating, validating, and cutting over applications 13 - Modernizing and Optimizing an Application Migration Identify post-migration opportunities for modernization and optimization Understand cost and security optimization processes Explore tools available to support these processes 14 - Understanding Operations Tools, Integration Testing, and Automation Summarize operations in the cloud Discuss four functions of operations and their domains Review operations automation and relevant support tools 15 - Migration Best Practices Course review and key takeaways Summarize and reinforce AWS best practices for migrating Additional course details: Nexus Humans Migrating to AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Migrating to AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Migrating to AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 12c PL/SQL Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for individuals who are Application designers and database developers, database administrators and web server administrators. Overview Upon successful completion of this course, students will be able to work with Oracle database programming using the PL/SQL programming language. They will learn the syntax, structure and features of the language. In this course, students will learn the foundation for the programming series and the use of database-resident stored program units for Oracle 12c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Choosing a Database Programming Language What is Database Programming? PL?SQL Performance Advantages Integration wth Other Languages PL/SQL Language Fundamentals PL/SQL Program Structure LANGUAGE SYNTAX RULES EMBEDDING SQL WRITING READABLE CODE GENERATING DATABASE OUTPUT SQL*PLUS INPUT OF A PROGRAM BLOCK Declare Section About the Declare Section DECLARE PRIMITIVE TYPES DECLARATION OPTIONS NOT NULL CONSTANT DATA DICTIONARY INTEGRATION %TYPE DECLARE SIMPLE USER---DEFINED TYPES TYPE... TABLE TYPE... RECORD EXTENDED USER---DEFINED TYPES Begin Section About the Begin Section Manipulating Program Data Logic Control & Branching GOTO LOOP IF-THEN-ELSE CASE Exception Section ABOUT THE EXCEPTION SECTION ISOLATING THE SPECIFIC EXCEPTION PRAGMA EXCEPTION_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT &SELECT...INTO Beyond the Basics: Explicit Cursors ABOUT EXPLICIT CURSORS EXTENDED CURSOR TECHNIQUES FOR UPDATE OF Clause WHERE CURRENT OF Clause Using FOR?LOOP Cursors Beyond the Basics: Nested BlocksBeyond the Basics: Declared Subprograms USING DECLARED SUBPROGRAMS DECLARED PROCEDURE DECLARED FUNCTION Introducing Databse-Resident Program Units ABOUT DATABASE---RESIDENT PROGRAMS PHYSICAL STORAGE & EXECUTION TYPES OF STORED PROGRAM UNITS STORED PROGRAM UNIT ADVANTAGES MODULAR DESIGN PRINCIPLES Creating Stored Procedures & Functions STORED PROCEDURES & FUNCTIONS CREATE PROCEDURE / CREATE FUNCTION CREATING PROCEDURES & FUNCTIONS RAISE_SALARY() Procedure SALARY_VALID() Function THE PARAMETER SPECIFICATION DEFAULT Clause SYSTEM & OBJECT PRIVILEGES USING THE DEVELOPMENT TOOLS Executing Stored Procedures & Functions CALLING PROCEDURES & FUNCTIONS UNIT TESTING WITH EXECUTE ANONYMOUS BLOCK UNIT TESTING SPECIFYING A PARAMETER NOTATION SQL WORKSHEET UNIT TESTING CALLING FUNCTIONS FROM SQL Maintaining Stored Program Units RECOMPILING PROGRAMS Mass Recompilation Using UTL_RECOMP() DROPPING PROCEDURES & FUNCTIONS DROP PROCEDURE / FUNCTION DATA DICTIONARY METADATA Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies DEPENDENCY INTERNALS TRACKING DEPENDENCIES THE DEPENDENCY TRACKING UTILITY SQL DEVELOPER DEPENDENCY INFO DEPENDENCY STRATEGY CHECKLISTS Creating & Maintaining Packages ABOUT PACKAGES CREATING PACKAGES MAINTAINING PACKAGES PERFORMANCE CONSIDERATIONS Advanced Package Capabilities DEFINER & INVOKER RIGHTS WHITE LITS & ACCESSIBLE BY PERSISTENT GLOBAL OBJECTS DEFINING INITIALIZATION LOGIC OBJECT ORIENTATION SUPPORT Advanced Cursor Techniques USING CUSROS VARIABLES USING SYS_REFCURSOR USING CURSOR EXPRESSIONS Using System-Supplied Package DBMS_OUTPUT() UTL_FILE() FOPEN() EXAMPLE Database Trigger Concepts ABOUT DATABASE TRIGGERS DML EVENT TRIGGER SUB---TYPES DATABASE TRIGGER SCENARIO TRIGGER EXECUTION MECHANISMS TRIGGERS WITHIN SQL WORKSHEET Creating Database Triggers STATEMENT-LEVEL TRIGGERS Using RAISE_APPLICATION_ERROR() ROW---LEVEL TRIGGERS EXAMPLES OF TRIGGERS EMPLOYEE_SALARY_CHECK Example EMPLOYEE_JOURNAL Example BUDGET_EVENT Example INSTEAD OF TRIGGERS TRIGGERS WITHIN AN APPLICATION Maintaining Database Triggers CALL SYNTAX TRIGGER MAINTENANCE TASKS SHOW ERRORS TRIGGER DROP TRIGGER ALTER TRIGGER MULTIPLE TRIGGERS FOR A TABLE HANDLING MUTATING TABLE ISSUES Implementing System Event Triggers WHAT ARE SYSTEM EVENT TRIGGERS? DEFININGTHE SCOPE AVAILABLE SYSTEM EVENTS SYSTEM EVENT ATTRIBUTES Additional course details: Nexus Humans Oracle 12c PL/SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c PL/SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 12c PL/SQL Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Horizon 8: Troubleshooting Bootcamp

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for New or junior administrators and operators; system managers accountable for staffing and training Horizon operators and administrators. Experienced system operators, administrators, and integrators responsible for managing and maintaining VMware Horizon solutions Overview By the end of the course, you should be able to meet the following objectives: Implement a structured approach to troubleshooting Resolve common issues that occur in a VMware Horizon environment Troubleshoot issues with linked and instant clones Configure the Windows client Identify the correct log level for gathering logs Optimize protocols for best end-user experience Discuss Horizon Connection Server advanced configurations List troubleshooting techniques for Horizon Connection Server common issues Interpret Horizon 8 Connection Server logs Identify Unified Access Gateway configuration and certificate issues List troubleshooting steps for Unified Access Gateway common issues Describe BLAST configuration verification using logs and settings Describe BLAST optimization recommendations for different use cases Describe Horizon 8 Connections and how to troubleshoot related issues Describe Horizon 8 certificates List troubleshooting steps for common issues with Horizon 8 certificates Leverage Horizon infrastructure troubleshooting steps to resolve issues  This five-day course builds your skills in resolving common issues that occur in a VMware Horizon© environment. You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators and provides you with the advanced knowledge, skills, and abilities to troubleshoot VMware Horizon© 8 infrastructure related issues. This workshop teaches the required skill and competence for troubleshooting VMware Horizon© Connection Server?, VMware Unified Access Gateway?, protocols, connections, and certificates Course Introduction Introductions and course logistics Course objectives Overview of Virtual Desktop Troubleshooting Structured approach to troubleshooting configuration and operational problems Applying troubleshooting methods Documenting the steps to resolving the problem Command-Line Tools and Backup Options Using command-line tools Backing-up and restoring VMware Horizon databases Troubleshooting Horizon Linked Clone Desktops Only applicable for Horizon 7.x environments Describe the components that make up a VMware Horizon desktop Explain how the View Agent Direct-Connection plug-In is useful for diagnosing problems Highlight the best practice for optimizing a VMware Horizon desktop Troubleshoot common problems with VMware Horizon desktops Troubleshooting Instant Clones Discuss how instant clones are created Discuss what gets logged when an instant clone is created Discuss the keywords to look for in the logs when troubleshooting instant clones Discuss how to troubleshoot problems with instant clones Windows Client Correctly configure the Windows Client Identify the correct log level for gathering logs Enable the required SSL configuration level for the environment Ports and Protocols Discuss the key ports on a Horizon Environment Discuss protocols used in the Horizon Environment Understand the benefit of optimizing Blast Become familiar with the optimization features for Blast Implement GPO changes for Blast Become familiar with the causes for Black Screens Discuss how to troubleshoot Black Screen problems Identify problems encountered when applying GPOs Discuss how to troubleshoot GPO-related problems Horizon Connection Server Troubleshooting Discuss Horizon Connection Server general troubleshooting techniques Identity Horizon Connection Server common issues through logs Describe AD LDS replication Discuss Horizon Connection Server replication common issues Review and Interpret Horizon Connection Server logs Compare successful and unsuccessful logs from everyday infrastructure administration tasks Unified Access Gateway Troubleshooting List and identify common Unified Access Gateway deployment issues Monitor the Unified Access Gateway deployment to identify health and issues Identify and troubleshoot Unified Access Gateway certificate issues Monitor, test, and troubleshoot network problems Discuss general Unified Access Gateway troubleshooting processes BLAST Configuration Verification Discuss BLAST Codecs and Encoder Switch settings. Describe how to verify BLAST configuration using logs and settings BLAST Optimization List general BLAST optimization recommendations Summarize BLAST tuning recommendations that apply to WAN connections Summarize BLAST tuning recommendations that apply to work-from-home and home-office-to-cloud use cases Describe recommended tuning options to increase display protocol quality for all use cases and applications. VMware Horizon Connections Troubleshooting Explain Horizon connections Describe the role of Primary and Secondary protocols in Horizon connections Describe HTML client access connections Describe Horizon connections load balancing Describe timeout settings, supported health monitoring string, and suitable load balancer persistence values Identify troubleshooting steps for failing Horizon load balancer connections List troubleshooting steps for Horizon connections VMware Horizon Certificates Troubleshooting List Horizon certificate functions Describe Horizon certificates scenarios. Discuss potential challenges related to certificates in Horizon Describe the troubleshooting approach to Horizon certificate issues VMware Horizon Challenge Lab Leverage Horizon infrastructure troubleshooting steps to resolve issues

VMware Horizon 8: Troubleshooting Bootcamp
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain Security Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network

Blockchain Security Training
Delivered OnlineFlexible Dates
Price on Enquiry

Python With Data Science

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Audience: Data Scientists, Software Developers, IT Architects, and Technical Managers. Participants should have the general knowledge of statistics and programming Also familiar with Python Overview ? NumPy, pandas, Matplotlib, scikit-learn ? Python REPLs ? Jupyter Notebooks ? Data analytics life-cycle phases ? Data repairing and normalizing ? Data aggregation and grouping ? Data visualization ? Data science algorithms for supervised and unsupervised machine learning Covers theoretical and technical aspects of using Python in Applied Data Science projects and Data Logistics use cases. Python for Data Science ? Using Modules ? Listing Methods in a Module ? Creating Your Own Modules ? List Comprehension ? Dictionary Comprehension ? String Comprehension ? Python 2 vs Python 3 ? Sets (Python 3+) ? Python Idioms ? Python Data Science ?Ecosystem? ? NumPy ? NumPy Arrays ? NumPy Idioms ? pandas ? Data Wrangling with pandas' DataFrame ? SciPy ? Scikit-learn ? SciPy or scikit-learn? ? Matplotlib ? Python vs R ? Python on Apache Spark ? Python Dev Tools and REPLs ? Anaconda ? IPython ? Visual Studio Code ? Jupyter ? Jupyter Basic Commands ? Summary Applied Data Science ? What is Data Science? ? Data Science Ecosystem ? Data Mining vs. Data Science ? Business Analytics vs. Data Science ? Data Science, Machine Learning, AI? ? Who is a Data Scientist? ? Data Science Skill Sets Venn Diagram ? Data Scientists at Work ? Examples of Data Science Projects ? An Example of a Data Product ? Applied Data Science at Google ? Data Science Gotchas ? Summary Data Analytics Life-cycle Phases ? Big Data Analytics Pipeline ? Data Discovery Phase ? Data Harvesting Phase ? Data Priming Phase ? Data Logistics and Data Governance ? Exploratory Data Analysis ? Model Planning Phase ? Model Building Phase ? Communicating the Results ? Production Roll-out ? Summary Repairing and Normalizing Data ? Repairing and Normalizing Data ? Dealing with the Missing Data ? Sample Data Set ? Getting Info on Null Data ? Dropping a Column ? Interpolating Missing Data in pandas ? Replacing the Missing Values with the Mean Value ? Scaling (Normalizing) the Data ? Data Preprocessing with scikit-learn ? Scaling with the scale() Function ? The MinMaxScaler Object ? Summary Descriptive Statistics Computing Features in Python ? Descriptive Statistics ? Non-uniformity of a Probability Distribution ? Using NumPy for Calculating Descriptive Statistics Measures ? Finding Min and Max in NumPy ? Using pandas for Calculating Descriptive Statistics Measures ? Correlation ? Regression and Correlation ? Covariance ? Getting Pairwise Correlation and Covariance Measures ? Finding Min and Max in pandas DataFrame ? Summary Data Aggregation and Grouping ? Data Aggregation and Grouping ? Sample Data Set ? The pandas.core.groupby.SeriesGroupBy Object ? Grouping by Two or More Columns ? Emulating the SQL's WHERE Clause ? The Pivot Tables ? Cross-Tabulation ? Summary Data Visualization with matplotlib ? Data Visualization ? What is matplotlib? ? Getting Started with matplotlib ? The Plotting Window ? The Figure Options ? The matplotlib.pyplot.plot() Function ? The matplotlib.pyplot.bar() Function ? The matplotlib.pyplot.pie () Function ? Subplots ? Using the matplotlib.gridspec.GridSpec Object ? The matplotlib.pyplot.subplot() Function ? Hands-on Exercise ? Figures ? Saving Figures to File ? Visualization with pandas ? Working with matplotlib in Jupyter Notebooks ? Summary Data Science and ML Algorithms in scikit-learn ? Data Science, Machine Learning, AI? ? Types of Machine Learning ? Terminology: Features and Observations ? Continuous and Categorical Features (Variables) ? Terminology: Axis ? The scikit-learn Package ? scikit-learn Estimators ? Models, Estimators, and Predictors ? Common Distance Metrics ? The Euclidean Metric ? The LIBSVM format ? Scaling of the Features ? The Curse of Dimensionality ? Supervised vs Unsupervised Machine Learning ? Supervised Machine Learning Algorithms ? Unsupervised Machine Learning Algorithms ? Choose the Right Algorithm ? Life-cycles of Machine Learning Development ? Data Split for Training and Test Data Sets ? Data Splitting in scikit-learn ? Hands-on Exercise ? Classification Examples ? Classifying with k-Nearest Neighbors (SL) ? k-Nearest Neighbors Algorithm ? k-Nearest Neighbors Algorithm ? The Error Rate ? Hands-on Exercise ? Dimensionality Reduction ? The Advantages of Dimensionality Reduction ? Principal component analysis (PCA) ? Hands-on Exercise ? Data Blending ? Decision Trees (SL) ? Decision Tree Terminology ? Decision Tree Classification in Context of Information Theory ? Information Entropy Defined ? The Shannon Entropy Formula ? The Simplified Decision Tree Algorithm ? Using Decision Trees ? Random Forests ? SVM ? Naive Bayes Classifier (SL) ? Naive Bayesian Probabilistic Model in a Nutshell ? Bayes Formula ? Classification of Documents with Naive Bayes ? Unsupervised Learning Type: Clustering ? Clustering Examples ? k-Means Clustering (UL) ? k-Means Clustering in a Nutshell ? k-Means Characteristics ? Regression Analysis ? Simple Linear Regression Model ? Linear vs Non-Linear Regression ? Linear Regression Illustration ? Major Underlying Assumptions for Regression Analysis ? Least-Squares Method (LSM) ? Locally Weighted Linear Regression ? Regression Models in Excel ? Multiple Regression Analysis ? Logistic Regression ? Regression vs Classification ? Time-Series Analysis ? Decomposing Time-Series ? Summary Lab Exercises Lab 1 - Learning the Lab Environment Lab 2 - Using Jupyter Notebook Lab 3 - Repairing and Normalizing Data Lab 4 - Computing Descriptive Statistics Lab 5 - Data Grouping and Aggregation Lab 6 - Data Visualization with matplotlib Lab 7 - Data Splitting Lab 8 - k-Nearest Neighbors Algorithm Lab 9 - The k-means Algorithm Lab 10 - The Random Forest Algorithm

Python With Data Science
Delivered OnlineFlexible Dates
Price on Enquiry

Kubernetes Bootcamp (CKAD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions

Kubernetes Bootcamp (CKAD)
Delivered OnlineFlexible Dates
Price on Enquiry

Adobe Premiere Pro

By Nexus Human

Duration 3 Days 18 CPD hours There are good reasons Adobe Premiere Pro is such a popular post-production video editing software application. It excels for a wide variety of uses; tapeless and DSLR footage; cross-platforms, open workflows for easy collaboration, powerful metadata features for greater editing and production efficiency, plus real-time 3D editing and Virtual Reality. This four-day course is ideal for beginners, as well as Final Cut Pro and Avid editors - or for anyone who is involved in a content creation environment. Adobe Premiere Interface Performing Nonlinear Editing in Premiere Pro Looking at the Standard Digital Video Workflow Enhancing the Workflow with Premiere Pro Expanding the Workflow Incorporating other Components into the Editing Workflow Adobe Creative Cloud Video Workflow Touring the Premiere Pro Workspace Looking at the Workspace Layout Customizing the Workspace Introducing Preferences Keyboard Shortcuts Moving, Backing up, and Syncing User Settings Setting up a Project Setting up a Sequence Setting up the Timeline Importing Media Importing Assets Working with ingest Options and Proxy Media Working with the Media Browser Importing Images Using Adobe Stock Customizing the Media Cache Recording a Voice-over Organizing Media Project Panel Working with Bins Monitoring Footage Modifying Clips Mastering the Essentials of Video Editing Using the Source Monitor Navigating the Timeline Essential Editing Commands Working with Clips and Markers Using Program Monitor Controls Setting the Playback Resolution Playing back VR Video Using Markers Using Sync Lock and Track Lock Finding Gaps in the Timeline Selecting Clips Moving Clips Extracting and Deleting Segments Adding Transitions Understanding Transitions Edit points and Handles Adding Video Transitions Using A/B mode to Fine-tune a Transition Adding Audio Transitions Performing Advanced Editing Techniques Performing Three or Four-point Editing Changing Playback Speed Replacing Clips and Footage Nesting Sequences Performing Regular Trimming Performing Advanced Trimming Trimming in the Program Monitor Putting Clips in Motion Adjusting the Motion Effect Changing Clip Position, Size, and Rotation Working with Keyframe Interpolation Using other Motion-related Effects Multi-camera Editing Following the Multi-camera Process Creating a Multi-camera Sequence Switching Multiple Cameras Finalizing Multi-camera Editing Editing and Mixing Audio Setting up the Interface to Work with Audio Examining Audio Characteristics Creating a Voice-over Scratch Track Adjusting Audio Volume Normalizing Audio Creating a Split Edit Adjusting Audio Levels for a Clip Sweetening Sound Sweetening Sound with Audio Effects Adjusting EQ Cleaning up Noisy Audio Fading Audio with Essential Sounds Adding Video Effects Working with Effects Master Clip Effects Masking and Tracking Visual Effects Keyframing Effects Effect Presets Frequently Used Effects Improving Clips with Color Correction and Grading Following a Color-oriented Workflow An overview of Color-oriented Effects Fixing Exposure Problems Fixing Color Balance Using Special Color Effects Creating a Look Exploring Compositing Techniques Understanding an Alpha Channel Making Compositing Part of Your Projects Working with the Opacity Effect Working with Alpha-channel Transparencies Color Keying a Green Screen Shot Using Mattes Creating Titles An Overview of Shapes & Type Loading in Graphics Using the Essentials Graphic Panel Browsing Templates Saving Templates Mastering Video Typography Essentials Creating Titles Stylizing Text Making Text Roll and Crawl Introducing Captions Managing Your Projects Using the File menu Using the Project Manager Performing the Final Project Management Steps Importing Projects or Sequences Managing Collaboration Using the Libraries Panel Managing Your Hard Drives Exporting Frames, Clips, and Sequences Overview of Export Options Exporting Single Frames Exporting a Master Copy Working with Adobe Media Encoder Uploading to Social Media Exchanging with Other Editing Applications Additional course details: Nexus Humans Adobe Premiere Pro training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Premiere Pro course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Adobe Premiere Pro
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere Install Configure Manage (Official VMware IT Academy version)

By Nexus Human

Duration 4.875 Days 29.25 CPD hours This course is intended for VMware vSphere: Install, Configure, Manage features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most otherVMware technologies in the software-defined data center. Overview Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Describe the benefits and capabilities of VMware Skyline Install and configure ESXi hosts Deploy and configure VMware vCenter Server Appliance™ Use VMware vSphere Client™ to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler ™ Discuss solutions for managing the vSphere life cycle Use VMware vSphere Lifecycle Manager™ to perform upgrades to ESXi hosts and virtual machines This is an official VMware IT Academy course with official courseware and labs. Course introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concepts Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Describe the ESXi host architecture Navigate the Direct Console User Interface (DCUI) to configure an ESXi host Recognize ESXi host user account best practices Install an ESXi host Use VMware Host Client? to configure ESXi host settings Describe how to proactively manage your vSphere environment using VMware Skyline Virtual Machines Create and provision a virtual machine Explain the importance of VMware Tools? Install VMware Tools Identify the files that make up a VM Recognize the components of a VM Recognize virtual devices supported by a VM Describe the benefits and use cases for containers Identify the parts of a container system vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use VMware vCenter Server© High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping, and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Recognize the components of a VMware vSAN? configuration Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Describe the Enhanced vMotion Compatibility feature Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Describe the benefits of VMware vSphere© Storage APIs ? Data Protection Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster Monitor a vSphere cluster configuration Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Describe the function of the vSphere© Cluster Service vSphere Lifecycle Management Recognize the importance of vCenter Server Update Planner Describe how VMware vSphere© Lifecycle Manager? works Describe how to update ESXi hosts using baselines Validate ESXi host compliance using a cluster image Describe how to upgrade VMware Tools and VM hardware Describe VMware vSphere© Lifecycle Manager? and VMware vSAN? integration

VMware vSphere Install Configure Manage (Official VMware IT Academy version)
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting Hybrid Cloud Infrastructure with Anthos

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation

Architecting Hybrid Cloud Infrastructure with Anthos
Delivered OnlineFlexible Dates
Price on Enquiry