Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Those who will provide container orchestration management in the AWS Cloud including: DevOps engineers Systems administrators Overview In this course, you will learn to: Review and examine containers, Kubernetes and Amazon EKS fundamentals and the impact of containers on workflows. Build an Amazon EKS cluster by selecting the correct compute resources to support worker nodes. Secure your environment with AWS Identity and Access Management (IAM) authentication by creating an Amazon EKS service role for your cluster Deploy an application on the cluster. Publish container images to ECR and secure access via IAM policy. Automate and deploy applications, examine automation tools and pipelines. Create a GitOps pipeline using WeaveFlux. Collect monitoring data through metrics, logs, tracing with AWS X-Ray and identify metrics for performance tuning. Review scenarios where bottlenecks require the best scaling approach using horizontal or vertical scaling. Assess the tradeoffs between efficiency, resiliency, and cost and impact for tuning one over the other. Describe and outline a holistic, iterative approach to optimizing your environment. Design for cost, efficiency, and resiliency. Configure the AWS networking services to support the cluster. Describe how EKS/Amazon Virtual Private Cloud (VPC) functions and simplifies inter-node communications. Describe the function of VPC Container Network Interface (CNI). Review the benefits of a service mesh. Upgrade your Kubernetes, Amazon EKS, and third party tools Amazon EKS makes it easy for you to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. In this course, you will learn container management and orchestration for Kubernetes using Amazon EKS. You will build an Amazon EKS cluster, configure the environment, deploy the cluster, and then add applications to your cluster. You will manage container images using Amazon Elastic Container Registry (ECR) and learn how to automate application deployment. You will deploy applications using CI/CD tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal/vertical scaling. You will learn how to design and manage a large container environment by designing for efficiency, cost, and resiliency. You will configure AWS networking services to support the cluster and learn how to secure your Amazon EKS environment. Module 0: Course Introduction Course preparation activities and agenda Module 1: Container Fundamentals Best practices for building applications Container fundamentals Components of a container Module 2: Kubernetes Fundamentals Container orchestration Kubernetes objects Kubernetes internals Preparing for Lab 1: Deploying Kubernetes Pods Module 3: Amazon EKS Fundamentals Introduction to Amazon EKS Amazon EKS control plane Amazon EKS data plane Fundamentals of Amazon EKS security Amazon EKS API Module 4: Building an Amazon EKS Cluster Configuring your environment Creating an Amazon EKS cluster Demo: Configuring and deploying clusters in the AWS Management Console Working with eksctl Preparing for Lab 2: Building an Amazon EKS Cluster Module 5: Deploying Applications to Your Amazon EKS Cluster Configuring Amazon Elastic Container Registry (Amazon ECR) Demo: Configuring Amazon ECR Deploying applications with Helm Demo: Deploying applications with Helm Continuous deployment in Amazon EKS GitOps and Amazon EKS Preparing for Lab 3: Deploying App Module 6: Configuring Observability in Amazon EKS Configuring observability in an Amazon EKS cluster Collecting metrics Using metrics for automatic scaling Managing logs Application tracing in Amazon EKS Gaining and applying insight from observability Preparing for Lab 4: Monitoring Amazon EKS Module 7: Balancing Efficiency, Resilience, and Cost Optimization in Amazon EKS The high level overview Designing for resilience Designing for cost optimization Designing for efficiency Module 8: Managing Networking in Amazon EKS Review: Networking in AWS Communicating in Amazon EKS Managing your IP space Deploying a service mesh Preparing for Lab 5: Exploring Amazon EKS Communication Module 9: Managing Authentication and Authorization in Amazon EKS Understanding the AWS shared responsibility model Authentication and authorization Managing IAM and RBAC Demo: Customizing RBAC roles Managing pod permissions using RBAC service accounts Module 10: Implementing Secure Workflows Securing cluster endpoint access Improving the security of your workflows Improving host and network security Managing secrets Preparing for Lab 6: Securing Amazon EKS Module 11: Managing Upgrades in Amazon EKS Planning for an upgrade Upgrading your Kubernetes version Amazon EKS platform versions Additional course details: Nexus Humans Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Running Containers on Amazon Elastic Kubernetes Service (Amazon EKS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Candidates for this exam are IT professionals who perform installation, configuration, general local management and maintenance of Windows 10 core services. The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Overview After completing this course, learners should be able to: Prepare to install Windows 10. Install Windows 10. Configure Updates for Windows. Perform post-installation configuration tasks. Configure devices and drivers for Windows. Configure storage for Windows. Configure network settings in Windows. Configure remote management of Windows. Configure and manage applications in Windows. Configure Internet Explorer. Describe the methods for securing Windows 10. Configure account access and authentication. Configure file and folder permissions. Create security policies. Describe common threats and methods for mitigating against them. Use Windows troubleshooting and monitoring tools. Troubleshoot Windows installations. Troubleshoot application installation issues. Troubleshoot web browser settings. Troubleshoot Windows authentication. Troubleshoot hardware issues related to Windows machines. Develop an Operating System deployment and upgrade strategy. Understand the different methods of deployment. Understand on-premise and cloud-based solutions. Deploy and migrate desktops to Windows 10. Plan and configure Windows Update policies. Describe the benefits and capabilities of Azure AD. Manage users using Azure AD with Active Directory DS. Implement Windows Hello for Business. Configure conditional access rules based on compliance policies. Describe the various tools used to secure devices and data. Implement Windows Defender Advanced Threat Protection. This five day accelerated course will cover topics necessary to prepare attendees with the baseline knowledge to take the MD-100 and MD-101 exams for the Modern Desktop Administrator Associate certification. Installing Windows Introducing Windows 10 Installation Options Requirements for Windows Features Installation Process and Media Upgrading to Windows 10 Updating Windows Windows Servicing Model Updating Windows Applying Applications and Windows Updates Post-Instalation Configuration and Personalization Customize the Windows 10 UI Configure device specific settings such as power plans and mobile device options Use the Windows control panel and setting app to configure settings Describe using Windows PowerShell Configuring Peripherals and Drivers Managing Devices and Drivers Managing Printers Configuring Networking Configure IP Network Connectivity Implement Name Resolution Implement Wireless Network Connectivity Remote Access Overview Remote Management Configuring Storage Overview of storage options Using OneDrive Managing Disks, Partitions, and Volumes Maintaining Disks and Volumes Managing Storage Spaces Managing Apps in Windows 10 Providing Apps to Users Managing Universal Windows Apps The Windows Store Web browsers in Windows 10 Configuring Authorization and Authentication Using Security Settings to Mitigate Threats Configuring User Account Control Implementing Device Registration Authentication Configuring Data Access and Usage Overview of File Systems Configuring and Managing File Access Configuring and Managing Shared Folders Managing Security with Policies Configuring Advanced Management Tools Configuring Tenant Roles Managing Tenant Health and Services Supporting the Windows 10 Environment Troubleshooting Windows Troubleshooting Tools Troubleshooting the Windows OS Troubleshooting Windows Startup Troubleshooting Operating System Service Issues Troubleshooting Sign-In Issues Troubleshooting Files and Applications File Recovery in Windows 10 Application Troubleshooting Troubleshooting Hardware and Drivers Troubleshooting Device Driver Failures Overview of Hardware Troubleshooting Troubleshooting Physical Failures Planning an Operating System Deployment Strategy Overview of Windows as a service Windows 10 Deployment options Considerations for Windows 10 deployment Implementing Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Managing Updates for Windows 10 Implementing Windows 10 by using dynamic deployment Implementing Windows 10 by using Windows Autopilot Upgrading devices to Windows 10 Device Enrollment Device management options Manage Intune device enrollment and inventory Configuring Profiles Configuring device profiles Managing user profiles Monitoring devices Application Management Implement Mobile Application Management (MAM) Deploying and updating applications Administering applications Managing Authentication in Azure Ad MANAGING AUTHENTICATION IN AZURE AD Managing Devices and Device Policies Microsoft Intune Overview Managing devices with Intune Implement device compliance policies Managing Security Implement device data protection Managing Windows Defender ATP Managing Windows Defender in Windows 10 Additional course details: Nexus Humans Windows 10 Modern Desktop Administrator Associate Bootcamp training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Windows 10 Modern Desktop Administrator Associate Bootcamp course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours Overview What's New in This Guide? Automatic Payment Reminders for open customer invoices Ability to automatically include the PO# (purchase order number) to Invoice Emails Able to combine multiple emails which allows you to attach multiple sales or purchasing documents to a single email Quickly locate a company file using the new company file search feature Smart Help is an improved search experience that includes access to live experts through messaging and call back options This course covers all features that are in QuickBooks Pro and Premier 2020 and prepares you for the QuickBooks Certified User exam. This course combines all topics in the two 1 day courses ?Get Started with QuickBooks 2021 for Windows? and ?Keep Going with QuickBooks 2021 for Windows?. First-time QuickBooks users will learn the basic features of the software. Experienced QuickBooks users will quickly learn the new features and functionality of QuickBooks 2021. Getting Started Starting QuickBooks Setting QuickBooks Preferences Components of the QuickBooks Operating Environment Using QuickBooks Help Identifying Common Business Terms Exiting QuickBooks Setting Up a Company Creating a QuickBooks Company Using the Chart of Accounts Working with Lists Creating Company Lists Working with the Customers & Jobs List Working with the Employees List Working with the Vendors List Working with the Item List Working with Other Lists Managing Lists Setting Up Inventory Entering Inventory Ordering Inventory Receiving Inventory Paying for Inventory Manually Adjusting Inventory Selling Your Product Creating Product Invoices Applying Credit to Invoices Emailing Invoices Setting Price Levels Creating Sales Receipts Invoicing for Services Setting Up a Service Item Changing the Invoice Format Creating a Service Invoice Editing an Invoice Voiding an Invoice Deleting an Invoice Entering Statement Charges Creating Billing Statements Processing Payments Displaying the Open Invoices Report Using the Income Tracker Receiving Payments for Invoices Making Deposits Handling Bounced Checks Working with Bank Accounts Writing a QuickBooks Check Voiding a QuickBooks Check Using Bank Account Registers Entering a Handwritten Check Transferring Funds Between Accounts Reconciling Checking Accounts Entering and Paying Bills Handling Expenses Using QuickBooks for Accounts Payable Using the Bill Tracker Entering Bills Paying Bills Entering Vendor Credit Memorizing Transactions Entering a New Memorized Transaction Editing a Memorized Transaction Deleting a Memorized Transaction Grouping Memorized Transactions Using a Memorized Transaction Printing the Memorized Transaction List Customizing Forms Creating a Custom Template Modifying a Template Printing Forms Using Other QuickBooks Accounts Other QuickBooks Account Types Working with Credit Card Transactions Working with Fixed Assets Working with Long-Term Liability Accounts Using the Loan Manager Creating Reports Working with QuickReports Working with Preset Reports Sharing Reports Exporting Reports to Microsoft Excel Printing Reports Creating Graphs Creating QuickInsight Graphs Using QuickZoom with Graphs Working with the Sales Graph Customizing Graphs Printing Graphs Tracking and Paying Sales Tax Using Sales Tax in QuickBooks Setting Up Tax Rates and Agencies Indicating Who and What Gets Taxed Applying Tax to Each Sale Determining What You Owe Paying Your Tax Agencies Preparing Payroll with QuickBooks Using Payroll Tracking Setting Up for Payroll Setting Up Employee Payroll Information Setting Up a Payroll Schedule Writing a Payroll Check Printing Paycheck Stubs Tracking Your Tax Liabilities Paying Payroll Taxes Preparing Payroll Tax Forms Using the EasyStep Interview Using the EasyStep Interview Using Online Banking Setting Up an Internet Connection Setting Up Bank Feeds for Accounts Viewing, Downloading, and Adding Online Transactions Creating Online Payments Transferring Funds Online Canceling Online Payments Managing Company Files Using QuickBooks in Multi-user Mode Setting Up Users and Passwords Setting a Closing Date Sharing Files with an Accountant Updating QuickBooks Backing Up and Restoring a Company File Condensing a Company File Estimating, Time Tracking, and Job Costing Creating Job Estimates Creating an Invoice from an Estimate Displaying Reports for Estimates Updating the Job Status Tracking Time Displaying Reports for Time Tracking Tracking Vehicle Mileage Displaying Vehicle Mileage Reports Displaying Other Job Reports Writing Letters Using the Letters and Envelopes Wizard Customizing Letter Templates Additional course details: Nexus Humans Get Smart With QuickBooks 2021 for Windows training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Get Smart With QuickBooks 2021 for Windows course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Attendee roles might include: Software Developers/Programmers Data Scientists Machine Learning Engineers AI Researchers User Interface (UI) and User Experience (UX) Designers Technical Product Managers Technical Team Leads Overview Working in an interactive learning environment, led by our engaging AI expert you'll: Develop a strong foundational understanding of generative AI techniques and their applications in software development. Gain hands-on experience working with popular generative AI models, including Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and Transformer models. Master the use of leading AI libraries and frameworks, such as TensorFlow, Keras, and Hugging Face Transformers, for implementing generative AI models. Acquire the skills to design, train, optimize, and evaluate custom generative AI models tailored to specific software development tasks. Learn to fine-tune pre-trained generative AI models for targeted applications and deploy them effectively in various environments, including cloud-based services and on-premises servers. Understand and address the ethical, legal, and safety considerations of using generative AI, including mitigating biases and ensuring responsible AI-generated content. Prompt Engineering offers coders and software developers a competitive edge by empowering them to develop more effective and efficient AI-driven solutions in their projects. By harnessing the capabilities of cutting-edge AI models like GPT-4, coders can automate repetitive tasks, enhance natural language understanding, and even generate code suggestions, boosting productivity and creativity. In addition, mastering prompt engineering can contribute to improved job security, as professionals with these in-demand skills are highly sought after in the rapidly evolving tech landscape. Quick Start to Prompt Engineering for Coders and Software Developers is a one day course designed to get you quickly up and running with the prompting skills required to out AI to work for you in your development efforts. Guided by our AI expert, you?ll explore key topics such as text preprocessing, data cleansing, GPT-4 tokenization, input formatting, prompt design, and optimization, as well as ethical considerations in prompt engineering. In the hands-on labs you?ll explore tasks such as formatting inputs for GPT-4, designing and optimizing prompts for business applications, and implementing multi-turn conversations with AI. You?ll work with innovative tools like the OpenAI API, OpenAI Codex, and OpenAI Playground, enhancing your learning experience while preparing you for integrating prompt engineering into your professional toolkit. By the end of this immersive course, you?ll have the skills necessary to effectively use prompt engineering in your software development projects. You'll be able to design, optimize, and test prompts for various business tasks, integrate GPT-4 with other software platforms, and address ethical concerns in AI deployment. Generative AI represents an exhilarating frontier in artificial intelligence, specializing in the creation of new data instances, imitation of real data, and content generation. Its remarkable capabilities facilitate automated content creation, enriched user experiences, and groundbreaking solutions across diverse industries, ultimately fueling efficiency and transcending technological limits. By harnessing the power of generative AI, developers can craft dynamic content, produce code and documentation, refine user interfaces, and devise customized recommendations, empowering them to construct highly efficient and custom solutions for a wide range of applications. Designed for experienced programmers, Turbocharge Your Code! Generative AI Boot Camp for Developers is a three-day workshop-style course that teaches you the latest skills and tools required to master generative AI models, transforming the way you approach software development. In today's fast-paced technological landscape, generative AI has emerged as a game-changer, with leading companies like NVIDIA, OpenAI, and Google leveraging its capabilities to push the boundaries of innovation. By learning how to harness the power of generative models such as GANs, VAEs, and Transformer models, you will be able to generate code, documentation, and tests, enhance user interfaces, and create dynamic content that adapts to user needs. Our comprehensive curriculum covers everything from the fundamentals of generative AI to advanced techniques and ethical considerations, including hands-on labs where you will develop and deploy custom models using state-of-the-art AI tools and libraries like TensorFlow and Hugging Face Transformers. Throughout the course you'll focus on practical application and collaboration, building confidence with personalized guidance and real-time feedback from our expert live instructor. Upon completion, you will be equipped with the knowledge and experience necessary to develop and implement innovative generative AI models across various industries, improving existing products, creating new applications, and gaining highly-valuable skills in the rapidly advancing field of AI. Additional course details: Nexus Humans Turbocharge Your Code! Generative AI Boot Camp for Developers (TTAI2305) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Turbocharge Your Code! Generative AI Boot Camp for Developers (TTAI2305) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Cloud architects, systems engineers, data center administrators, and cloud administrators with experience in a service provider or managed services environment. Overview By the end of the course, you should be able to meet the following objectives: Describe how VMware Integrated OpenStack fits into the VMware SDDC and its use cases List the deployment options and how to install VMware Integrated OpenStack Describe the architecture of VMware Integrated OpenStack and its components Configure tenancy and manage user authentication Integrate the OpenStack Neutron Networking service with VMware NSX-T⢠Data Center networking platform Deploy and manage virtual machine instances Monitor VMware Integrated OpenStack with OpenStack monitoring services Design an auto-scale, multitier application using built-in automation tools Manage a VMware Integrated OpenStack control plane using Kubernetes Use the HTML5 Web UI and CLI commands to view and edit the configuration, monitor log files, and view database tables used by VMware Integrated OpenStack components This five-day course provides you with the skills to build a private cloud using VMware© Integrated OpenStack on a proven VMware SDDC. Through a combination of lecture and hands-on labs, this course builds your skills in installing, configuring, and managing VMware Integrated OpenStack. You learn how to offer IaaS and PaaS with advanced networking and security features to end users using VMware Integrated OpenStack. Course Introduction Introductions and course logistics Course objectives References and resources Introduction to VMware Integrated OpenStack Describe what an OpenStack is Describe the services that make up VMware Integrated OpenStack Describe what VMware Integrated OpenStack is Describe what is NFV and how does VIO fit in Understand the licensing model of VIO Understand the use cases of VMware Integrated OpenStack VMware Integrated OpenStack Deployment Understand the role of Kubernetes in the VIO control plane List the VMware Integrated OpenStack deployment models How to perform VIO high-availability deployment How to perform VIO compact installation Pre-requisites for installing VMware Integrated OpenStack How to use the HTML5 web UI / VIOCLI to check the deployment configurations and deployment running status Explain steps involved in patching VIO high availability setup VMware Integrated OpenStack Architecture List the VMs deployed after a VMware Integrated OpenStack high-availability installation Describe the overall architecture of the VIO HA setup List the VIO services running within Kubernetes pods Describe the role of each service Understand ssl certificates in VIO Keystone Authentication Understand keystone use cases and services List the features offered by keystone in VIO How to integrate keystone with LDAP List the configuration, view logs, and database tables related to keystone Glance Images Understand Glance use case and its services List the features offered by Glance in VIO Explain how to create flavors and images Describe how to set up metadata, for example SPBM storage policy List the custom resources/logs and database tables related to Glance Networking with Neutron Understand the Neutron use case and its services Integrate Neutron with NSX-T Data Center List the custom resources, logs, and database tables related to Neutron Managing Instances with Nova Understand Nova use cases and services Understand regions, availability zones, and host aggregates Understand the concept of tenant VDC Nova support for multiple vCenter instances How to deploy an instance using Nova How to resize an instance and view the console logs Configuration and logs related to Nova service Cinder Block Storage Understand Cinder use cases and services List the features offered by Cinder Adding a persistent volume to an instance Explain the Snapshot of a Cinder volume and attach it to another instance List the custom resources, log files, and database tables related to Cinder Monitoring with Ceilometer List the Telemetry use cases and services How to enable Ceilometer in VIO How to monitor the VIO environment using Ceilometer Configuration and log files related to Ceilometer service Automating with Heat Define Heat use cases templates and services Describe use cases of Heat Troubleshooting Concepts List common issues in VMware Integrated OpenStack Use troubleshooting tools Describe simple troubleshooting procedures List and explain Day-2 operations Advanced Features Describe Load Balancer as a Service (Octavia) Explain Firewall as a Service Describe Designate (DNS as a Service) Demonstrate automating scaling Describe selective vCPU pinning Explain SRIOV network redundancy support Describe network trunk services support Describe Live resize Describe hardware passthrough (GPU pass through) Describe external REST API Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Integrated Openstack: Install, Configure, Manage [V7] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Integrated Openstack: Install, Configure, Manage [V7] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Software Engineers Senior Software Engineers Java Developers DevOps Engineers Software Developers .NET Developers Systems Engineers Full Stack Developers Full Stack Java Developers Data Scientists Overview By the end of the course, you should be able to meet the following objectives: Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Install and configure VMware ESXi⢠hosts Deploy and configure VMware vCenter Server Appliance⢠Use VMware vSphere Client⢠to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler⢠Discuss solutions for managing the vSphere life cycle Use VMware vSphere Update Manager⢠to apply patches and perform upgrades to ESXi hosts and virtual machines This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere© 7, which includes VMware ESXi? 7 and VMware vCenter Server© 7. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most of the other VMware technologies in the software-defined data center Course Introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concept Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Use VMware Host Client? to access and manage ESXi host Virtual Machines Create and remove a virtual machine Provision a virtual machine with virtual devices Identify the files that make up a virtual machine Explain the importance of VMware Tools vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use the vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use vCenter Server High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Deploy virtual machines on a VMware vSAN? datastore Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Dynamically increase the size of a virtual disk Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Configure a vSphere cluster using ESXi Cluster Quickstart Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster vSphere Lifecycle Management Describe how VMware vSphere© Lifecycle Manager? works Use vSphere Lifecycle Manager to update ESXi hosts in a cluster Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Install, Configure, Manage [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Install, Configure, Manage [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances
Duration 5 Days 30 CPD hours This course is intended for This course is intended for those who provide site collection and site administration and are power users or IT professionals who are tasked with supporting or working within the SharePoint 2016 environment on premise and/or in Office 365. Overview After completing this course, students will be able to: - Design and implement a company portal structure using SharePoint 2016 objects including sites, libraries, lists and pages - Explain the role of security and permissions throughout SharePoint 2016 - Implement guidelines for consistency in building a company portal to aid in the day-to-day administration of content in SharePoint 2016 - Enhance the design and content of a company portal using SharePoint 2016 pages and web parts - Explain the importance of governance for the planning and managing future growth of the - SharePoint 2016 implementation - Identify options to integrate data from other systems such as Microsoft Office, as well as preserve existing data - Explain the role of social networking in SharePoint 2016 and its impact on collaboration This course is intended for power users and IT professionals who are tasked with working within the SharePoint 2016 environment and conduct site collection and site administration. Getting Started with SharePoint 2016 Exploring SharePoint 2016 Site Collection and Site Administrator Roles Defining SharePoint Terminology Navigating a SharePoint Site Interacting with the Ribbon Creating and Editing Basic Content What is Metadata? Versions of SharePoint Standard Enterprise O365 Building a Site Collection with Apps The Structure of SharePoint Creating a Site What does a site template come with? Defining SharePoint Apps Customizing Lists and Libraries Creating/Managing Lists and Libraries through SharePoint Designer Explaining Views on Lists and Libraries Creating Views in Lists and Libraries Modifying Navigation Turning Site Features On/Off Reorganizing a Site using Site Content and Structure feature Lab 1: Creating a Structured Company Portal Lab 2: Creating a List Using SharePoint Designer (Optional) Creating Consistency across Sites Defining Site Columns Defining Content Types Implementing a Taxonomy Using Templates to Promote Consistency Lab 1: Creating Site Columns and Content Types Lab 2: Implementing a Taxonomy Lab 3: Configuring the Content Organizer SharePoint Permissions Explaining Permissions and Security in SharePoint Creating SharePoint Groups Managing Permissions within SharePoint Sharing versus Traditional Security Sharing as different permission levels Lab 1: Managing Permissions in SharePoint Working with Pages and Web Parts Changing the Appearance of the Portal Editing a Page wiki web part Working with Web Parts and App Parts App Parts Content Search Web Part Relevant Documents Content query Table of Contents Pictures Web Part Connections Filter web parts Web parts with Targeting Audience Lab 1: Adding and Configuring Web Parts Lab 2: Connecting Web Parts Lab 3: Applying Themes to Your Company Portal Document and Records Management Basic Content Approval Versioning Check In/Out Holds Retention Policy Document ID Content Organizer Compliance Policy Center Site Template EDiscovery Records Center Lab 1: Working with Advanced Document Management Features Lab 2: Leveraging Records Management to Preserve Data Workflow Alerts Out of the Box Workflow Activating Workflow Features Approval Workflow Creating a Workflow in SharePoint Designer Lab 1: Creating an Approval Workflow from SharePoint Lab 2: Creating a Custom Workflow in SharePoint Designer (Optional) Office Integration Outlook Calendar Contacts Excel Word PowerPoint OneDrive for Business OneNote Access Lab 1: Importing and Exporting Excel Data with SharePoint Lab 2: Linking Outlook and SharePoint Creating Publishing Sites Why use a publishing site? Publishing Pages Enabling Web Content Management Managing the Structure of Web Content Navigating a Site Using Managed Metadata Lab 1: Creating a Rich Publishing Sit Lab 2: Configuring a Publishing Approval Process Lab 3: Implementing a Managed Navigation Site Bridging the Social Gap My Sites Configuring Social Features in SharePoint Posts, Tags and Mentions Creating a Community Site Lab 1: Designing a Social Experience in SharePoint 2016 Lab 2: Creating a Community Site Finding Information Using Search Exploring the Search Features in SharePoint Configuring Search Settings Search Analytics Search Visibility Lab 1: Configuring an Advanced Search Center Planning a Company Portal Using SharePoint Defining SharePoint Governance Working with Information Architecture Implementing Site Hierarchies Discussing the Execution of Governance Site Collection Administrator Settings Exploring Settings for Site Collection Administrators Exploring Settings for Site Administrators Site Closure Policies Additional course details: Nexus Humans 55234 SharePoint 2016 Site Collections and Site Owner Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55234 SharePoint 2016 Site Collections and Site Owner Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Prepare for entry-level job roles in the high-demand area of data center environments Prepare for courses that support the Cisco Certified Network Professional Data Center certification exams Gain knowledge and hands-on skills through Cisco's unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software Overview After taking this course, you should be able to: Describe the foundations of data center networking Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools Describe Layer 3 first-hop redundancy Describe Cisco Fabric Extender (FEX) connectivity Describe Ethernet port channels and virtual port channel (VPCs) Introduce switch virtualization, machine virtualization, and network virtualization Compare storage connectivity options in the data center Describe Fibre Channel communication between the initiator server and the target storage Describe Fibre Channel zone types and their uses Describe N-Port Virtualization (NPV) and N-Port Identifier Virtualization (NPIV) Describe data center Ethernet enhancements that provide a lossless fabric Describe Fibre Channel over Ethernet FCoE Describe data center server connectivity Describe Cisco UCS Manager Describe the purpose and advantages of APIs Describe Cisco ACI Describe the basic concepts of cloud computing The Understanding Cisco Data Center Foundations (DCFNDU) v1.0 course helps you prepare for entry-level data center roles. In this course, you will learn the foundational knowledge and skills you need to configure Cisco© data center technologies including: networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS). This course also earns you 30 Continuing Education (CE) credits towards recertification. Describing the Data Center Network Architectures Cisco Data Center Architecture Overview Three-Tier Network: Core, Aggregation, and Access Spine-and-Leaf Network Two-Tier Storage Network Describing the Cisco Nexus Family and Cisco NX-OS Software Cisco Nexus Data Center Product Overview Cisco NX-OS Software Architecture Cisco NX-OS Software CLI Tools Cisco NX-OS Virtual Routing and Forwarding Describing Layer 3 First-Hop Redundancy Default Gateway Redundancy Hot Standby Router Protocol Virtual Router Redundancy Protocol Gateway Load Balancing Protocol Describing Cisco FEX Server Deployment Models Cisco FEX Technology Cisco FEX Traffic Forwarding Cisco Adapter FEX Describing Port Channels and VPCs Ethernet Port Channels Virtual Port Channels Supported VPC Topologies Describing Switch Virtualization Cisco Nexus Switch Basic Components Virtual Routing and Forwarding Cisco Nexus 7000 Virtual Device Contexts (VDCs) VDC Types VDC Resource Allocation VDC Management Describing Machine Virtualization Virtual Machines Hypervisor VM Manager Describing Network Virtualization Overlay Network Protocols Virtual Extensible LAN (VXLAN) Overlay VXLAN Border Gateway Protocol (BGP) Ethernet VPN (EVPN) Control Plane VXLAN Data Plane Cisco Nexus 1000VE Series Virtual Switch VMware vSphere Virtual Switches Introducing Basic Data Center Storage Concepts Storage Connectivity Options in the Data Center Fibre Channel Storage Networking Virtual Storage Area Network (VSAN) Configuration and Verification Describing Fibre Channel Communication Between the Initiator Server and the Target Storage Fibre Channel Layered Model Fabric Login (FLOGI) Process Fibre Channel Flow Control Describing Fibre Channel Zone Types and Their Uses Fibre Channel Zoning Zoning Configuration Zoning Management Describing Cisco NPV Mode and NPIV Cisco NPV Mode NPIV Mode Describing Data Center Ethernet Enhancements Institute of Electrical and Electronic Engineers (IEEE) Data Center Bridging Priority Flow Control Enhanced Transmission Selection Data Center Bridging Exchange (DCBX) Protocol Congestion Notification Describing FCoE Cisco Unified Fabric FCoE Architecture FCoE Initialization Protocol FCoE Adapters Describing Cisco UCS Components Physical Cisco UCS Components Cisco Fabric Interconnect Product Overview Cisco I/O Module (IOM) Product Overview Cisco UCS Mini Cisco Integrated Management Controller (IMC) Supervisor Cisco Intersight? Describing Cisco UCS Manager Cisco UCS Manager Overview Identity and Resource Pools for Hardware Abstraction Service Profiles and Service Profile Templates Cisco UCS Central Overview Cisco HyperFlex? Overview Using APIs Common Programmability Protocols and Methods How to Choose Models and Processes Describing Cisco ACI Cisco ACI Overview Multitier Applications in Cisco ACI Cisco ACI Features VXLAN in Cisco ACI Unicast Traffic in Cisco ACI Multicast Traffic in Cisco ACI Cisco ACI Programmability Common Programming Tools and Orchestration Options Describing Cloud Computing Cloud Computing Overview Cloud Deployment Models Cloud Computing Services Additional course details: Nexus Humans Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audiences for this course are the following: • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview After successfully completing this course, you should be able to: Identify security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain SRX Series session management. Explain Junos ALG functions and when to use them. Describe policy logging on the SRX series device. Explain security policy scheduling. Describe application security theory. Explain application signature usage in AppID. Describe the AppTrack service. Describe the AppFW service. Describe the AppQoS service. Configure security policies using the AppSecure suite of services. Explain unified security policies. Describe IPS signatures. Configure an IPS policy using pre-defined templates. Describe how to update the IPS attack object database. Describe IPS rules and rule bases. Configure custom attack objects. Describe Junos Space and Security Director. Configure policy management using Security Director. Describe Security Director objects. Explain the different licensing options for Sky ATP List Sky ATP's features and benefits. Configure Sky ATP profiles and enroll an SRX Series device. Configure file scanning on Sky ATP. Configure Sky ATP to scan email Configure GeoIP on Sky ATP. Describe the JATP features and benefits List the JATP device options. Explain the JATP architecture. List 3rd party support options for JATP. Explain JATP SmartCore analytics processes. Describe Policy Enforcer configuration options. Describe Policy Enforcer integration with Sky ATP. Configure Policy Enforcer to block lateral malware movement. Explain Juniper Secure Analytics features and benefits. Describe JSA log collection. Describe JSA network flow collection. Describe the JSA Offense Management workspace. Explain the JSA Risk Manager features. Configure JSA to collect network and log collection. Explain the features of JIMS. Describe JIMS integration into the current AD network. Describe the Sky Enterprise service and how it can save resources. Explain the Sky Enterprise monitoring service. Explain the vSRX Series device benefits. Describe use cases for the vSRX. Explain the cSRX Series device benefits. Describe use cases for the cSRX. Describe SSL Proxy Concepts. Explain Forward and Reverse Proxy and the limitations of each. Configure both Forward and Reverse Proxy. This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Chapter 1: Course Introduction Course Introduction Chapter 2: CLI Overview User Interface Options Command-Line Interface Initial Configuration Interface Configuration Lab 1: CLI Overview Chapter 3: Advanced Security Policy Session Management Junos ALGs Policy Scheduling Policy Logging Lab 2: Advanced Security Policy Chapter 4: Application Security Theory Application ID Application Signatures App Track App Firewall App QoS App QoE Chapter 5: Application Security Implementation AppTrack Implementation AppFW Implementation AppQos Implementation APBR Implementation Lab 3: Application Security Chapter 6: Intrusion Detection and Prevention IPS Overview IPS Policy Attack Objects IPS Configuration IPS Monitoring Lab 4: Implementing IPS Chapter 7: Security Director Overview Security Director Objects Security Director Policy Management Lab 5: Security Director Chapter 8: Sky ATP Implementation Architecture and Key Components Features and Benefits Configuration Compromised Hosts Command and Control File Scanning E-mail Scanning Geo IP Security Policy Integration Troubleshooting Lab 6: Sky ATP Implementation Chapter 9: Policy Enforcer Policy Enforcer Concepts Configuration Options Policy Enforcer Installation Lab 7: Policy Enforcer Chapter 10: JATP Overview Traffic Inspection Threat Detection Threat Analysis JATP Architecture Chapter 11: JATP Implementation Data Collectors Configure SmartCore Analytics Engine Log Ingestion Incident Management SRX Threat Prevention 3rd Party support for Threat Prevention Reporting Lab 8: JATP Chapter 12: Juniper Secure Analytics (JSA) JSA Overview Data Collection Log Analytics Threat Analytics Vulnerability Management Risk Management Lab 9: JSA Chapter 13: JIMS JIMS Overview JIMS Integration Lab 10: JIMS Chapter 14: vSRX and cSRX vSRX Overview vSRX Supported Features vSRX Use Cases cSRX Overview Lab 11: vSRX Installation Chapter 15: SSL Proxy SSL Proxy Overview SSL Concepts SSL Proxy Configurations Troubleshooting Lab 12: SSL Proxy Chapter 16: Cluster Concepts Chassis Cluster Concepts Chassis Cluster Operation Chapter 17: Chassis Cluster Implementation Chassis Cluster Configuration Chassis Cluster Advanced Options Lab 13: Chassis Cluster Implementation Chapter 18: Chassis Cluster Troubleshooting Chassis Cluster Case Studies Troubleshooting Examples Lab 14: Chassis Cluster Troubleshooting Additional course details: Nexus Humans JSEC - Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JSEC - Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.