A unique Zoom Motivational-Networking Group meets every Wednesday from 1-15 pm (BST). Each week I have a different theme. It is based on my Monday morning Blog. Three questions are talked through in breakout rooms on Wednesday at 1-15 pm Motivational-Networking Group. It works and works very well because it brings together people from around the world who are able to talk about their businesses and what they do and would like to accomplish in their lives. Many different problems are raised during the meetings by the people in the group but mainly it helps others on their business journey. Couple this with Gurugeoffrey’s Motivational talking by imparting his 50-plus years of business knowledge, lecturing, workshops, after-dinner talks and all this with his anecdotal experiences.
Have you ever wondered about the driving force behind some of the UK's most successful individuals? The answer often lies in their commitment to continuous personal growth and the guidance they receive through life coaching. Dive into our comprehensive Coaching: Personal Development and Life Coaching bundle, designed to transform your self-improvement and development coaching approach. In this Coaching: Personal Development and Life Coaching course bundle, you'll be immersed in eight meticulously crafted modules: "Personal Development Coach with Positive Psychology Training", "Life Coaching | Online Course", "Career Coaching Level 3", "Level 3 Coaching & Mentoring Course", "Train the Trainer - Part 1", "Train the Trainer - Part 2", "Networking Skills for Personal Success", and "The Power of Change". These courses have been sculpted to empower you with the theoretical knowledge essential for a holistic understanding of life coaching and personal development. This Coaching: Personal Development and Life Coaching bundle is tailored for individuals eager to embark on a journey towards self-realisation and those keen on guiding others on the same path. By interweaving the principles of positive psychology, mentoring, and the transformative power of change, this compilation aims to equip learners with a profound grasp of life coaching's core concepts and methodologies. The eight courses in the bundle are: Course 1: Personal Development Coach with Positive Psychology Training Course 2: Life Coaching | Online Course Course 3: Career Coaching Level 3 Course 4: Level 3 Coaching & Mentoring Course Course 5: Train the Trainer - Part 1 Course 6: Train the Trainer - Part 2 Course 7: Networking Skills for Personal Success Course 8: The Power of Change Learning Outcomes: Gain a comprehensive understanding of the principles underpinning personal development and life coaching. Acquire theoretical knowledge about career coaching and mentoring. Understand the significance of positive psychology in coaching. Develop an insight into effective networking for personal success. Learn the intricacies of training individuals and groups. Recognise and harness the transformative power of change in life coaching scenarios. Personal Development Coach with Positive Psychology Training & Life Coaching | Online Course: Delve deep into the realm of personal development and discover how positive psychology can drastically transform life coaching techniques. Learn to incorporate happiness, motivation, and resilience theories into your coaching practices. Career Coaching Level 3 & Level 3 Coaching & Mentoring Course: Navigate the intricacies of career development and mentoring with ease. Equip yourself with the theoretical frameworks to assist clients in career planning, goal setting, and establishing professional relationships. Train the Trainer - Part 1 & Part 2: Master the art of imparting knowledge. Understand how training dynamics work and how best to present theoretical concepts to varied audiences, ensuring optimal understanding and retention. Networking Skills for Personal Success & The Power of Change: Empower yourself with the skills to establish and maintain professional relationships. Comprehend the ever-evolving nature of change and how it can be harnessed in life coaching scenarios for maximum personal and professional growth. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring life coaches aiming to deepen their theoretical knowledge. Professionals in the field of personal development and mentoring. Individuals interested in self-improvement and self-awareness. Corporate trainers looking to enhance their delivery methodologies. Anyone keen on understanding the dynamics of change and networking. Requirements Without any formal requirements, you can delightfully enrol in this course. Career path Life Coach Personal Development Trainer Career Coach Corporate Trainer Networking Consultant Change Management Consultant Mentor in Educational Institutions Certificates CPD Certificate Of Completion Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript: £9.99
Docker for engineers training course description Docker is the container platform of choice. This course covers how to use Docker to package your applications with all of their dependencies and then test, deploy, scale and support your containers. Hands on sessions follow all the major sessions. What will you learn Work with Docker images, containers and command line tools. Deploy and test Docker containers. Debug Docker containers. Describe Docker networking, deployment tools, orchestration and security. Docker for engineers training course details Who will benefit: Anyone working with Docker. Prerequisites: Introduction to virtualization. Duration 2 days Docker for engineers training course contents Introduction The birth of Docker, the promise of Docker, what Docker isn't. Docker at a glance Process simplification, broad support and adoption, architecture, getting the most from Docker, the Docker workflow. Installing Docker Important terminology, Docker client, Docker server, test the setup. Working with Docker images Anatomy of a Dockerfile, building an image, running your image, custom base images, storing images. Working with Docker containers What are containers? creating a container, starting a container, auto-restarting a container, stopping a container, killing a container, pausing and unpausing a container, cleaning up containers and images, next steps. Exploring Docker Printing the Docker version, server information, downloading image updates, inspecting a container, getting inside a running container, exploring the shell, returning a result, docker logs, monitoring Docker, exploration. The path to production containers Deploying, testing containers. Debugging containers Process output, process inspection, controlling processes, network inspection, image history, inspecting a container, filesystem inspection, moving along. Docker at scale Docker swarm, centurion, amazon EC2 container service. Advanced topics Pluggable backends, containers in detail, security, networking. Designing your production container platform The twelve-factor app, the reactive manifesto. Conclusion The challenges, the Docker workflow, minimizing deployment artifacts, optimizing storage and retrieval, the payoff, the final word.
Duration 5 Days 30 CPD hours This course is intended for The Microsoft Technology Associate (MTA) is Microsoft?s newest suite of technology certification exams that validate fundamental knowledge needed to begin building a career using Microsoft technologies. This program provides an appropriate entry point to a future career in technology and assumes some hands-on experience or training but does not assume on-the-job experience. Overview This five-day Training 2-Pack helps you prepare for Microsoft Technology Associate Exams 98-366 and 98-367, and build an understanding of these topics: Network Infrastructures, Network Hardware, Protocols and Services, Security Layers, Operating System Security, Network Security, Security Software. These courses leverage the same content as found in the Microsoft Official Academic Courses (MOAC) for these exams. Understand Network InfrastructuresUnderstand Network HardwareUnderstand Protocols and ServicesUnderstand Security LayersUnderstand Operating System SecurityUnderstand Network SecurityUnderstand Security Software UNDERSTANDING LOCAL AREA NETWORKINGDEFINING NETWORKS WITH THE OSI MODELUNDERSTANDING WIRED AND WIRELESS NETWORKSUNDERSTANDING INTERNET PROTOCOLIMPLEMENTING TCP/IP IN THE COMMAND LINEWORKING WITH NETWORKING SERVICESUNDERSTANDING WIDE AREA NETWORKSDEFINING NETWORK INFRASTRUCTURES AND NETWORK SECURITYUNDERSTANDING SECURITY LAYERSAUTHENTICATION, AUTHORIZATION, AND ACCOUNTINGUNDERSTANDING SECURITY POLICYUNDERSTANDING NETWORK SECURITYPROTECTING THE SERVER AND CLIENT
Network automation course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network automation course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Network automation course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/ or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles Configuration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Scripting versus application development, Python interactive mode, Python scripts, Python 2.7 vs Python 3. A simple Python script. Variables, loops, control statements, operators. PEP style guide. Python IDEs. Hands on Simple Python programs. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install, Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. PyEZ Juniper, NETCONF, installing PyEZ, a first pyEZ script, pyEZ configuration management. Hands on Juniper configuration management with pyEZ. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.
VoIP training course description Convergence of voice and data is now a common place mainstream technology. Our Voice Over IP course investigates the characteristics of voice transmission and then studies the impact on IP networks. Practical sessions with soft phones, hard phones and gateways allow the students to see all aspects of VoIP. Network analysers are used to study packets on the wire. What will you learn Describe the issues of voice and data convergence. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate VoIP technologies. Design data networks, which will support voice. VoIP training course details Who will benefit: Anyone working in the field of networking or telecommunications. Prerequisites: TCP/IP foundation for engineers Intro to data communications & networking Duration 3 days VoIP training course contents What is VoIP Voice over IP, brief review of IP, brief review of telephones and voice. Configuring IP softphones What are softphones? Downloading, installing. Hands on Building the base IP network, a simple VoIP call with softphones, Internet telephony. Addressing E164, FQDN, IP addresses, URIs, DNS, SIP addressing, H.323 addressing. VoIP issues Bandwidth, Delay, Jitter, digitising voice, digitisation steps, coding, quality issues, MOS, voice compression, silence suppression, packetising voice, prioritising voice, jitter buffers. Hands on Simple packet analysis. Architectures Desktop, backbone, gateway, hard phones, PoE, integrating phones and PCs, carriers, Softswitches. Hands on Integrating Softphones, hard phones and analog phones. IP performance and QoS ITU delay recommendations, IP DSCP field, DiffServ, IP precedence, queuing strategies; FIFO, WFQ, custom, priority, RED, LLQ. VoIP protocol stack RTP, RTCP, mixers and translators, RSVP. Bandwidth, Erlang models, link layer overhead. Hands on Calculating VoIP bandwidth, analysing RTP packets. ITU Recommendation H.323 Architecture, protocols, terminals, Call setup, Gatekeepers, gateway discovery, H.323 registration with a gatekeeper. Hands on PC to PC using H.323. IETF - Session Initiation Protocol What is SIP? SIP protocol stack, SDP, Sip architecture, SIP messages, Initial SIP phone startup, SIP servers, proxy server, redirect server. Hands on PC to PC using SIP. Carrier networks Signalling systems, SS7, media gateways, Media gateway controllers, signalling gateways, MGCP, Megaco, SIGTRAN. Hands on PSTN interworking. Video over IP Video components, digital video, pictures and audio, video codecs, issues and solutions, video conferencing, multipoint video conferencing, video protocol stack. Appendix 1: Multicasting. Appendix 2: Voice/data integration without IP.
Introducing the 'Python Programming Bible | Networking, GUI, Email, XML, CGI' - your comprehensive, all-in-one resource for mastering Python! Are you an aspiring developer looking to dive into the ocean of Python programming or a seasoned coder seeking to level up your Python game? Look no further! Our course is expertly designed to take you from the basics to the complexities of Python, including Networking, GUI, Email, XML, and CGI. If you've ever dreamt of not just learning Python but truly mastering it, this is the course for you. This program is designed to provide a solid foundation and sharpen your skills in one of the most in-demand programming languages, while also introducing you to its many applications. This course starts with the basics of Python, providing a gentle yet thorough introduction and setup that caters to beginners as well as those looking to refresh their Python knowledge. As we study deeper into the heart of Python, we dive into objects, classes, and the power of regular expressions. But it doesn't stop there! You'll also become comfortable with concepts like CGI programming, which is an important building block for creating dynamic web pages. Navigating from core programming, we transition into the intricacies of managing databases and executing multithreading in Python. You'll gain the confidence to handle complex data management tasks, understand how Python interacts with databases, and efficiently manages multiple tasks simultaneously. The XML section allows you to get hands-on with parsing, data extraction, and manipulation, while the GUI section unveils the art of creating beautiful, user-friendly interfaces using Python. The course is enriched with a diverse set of resources, including real-world projects, quizzes, and interactive coding exercises. This is more than just a course, it's your passport to a new realm of opportunities, unlocking a world where Python programming is your strength, not just a skill. So whether you're a student aiming to get a head start on your peers, a professional looking to diversify your skills, or an enthusiast wanting to dive deeper into the Python universe, the Python Programming Bible is the starting point for your journey to becoming a Python expert. Enrol today and step into a future of endless opportunities with Python! Learning Outcomes: Upon completion of the Python Programming Bible course, you should be able to: Understand and implement Python basics and advanced concepts. Build object-oriented programs with Python. Utilise regular expressions for pattern-matching tasks. Develop dynamic web pages using CGI programming. Interact with databases efficiently using Python. Apply multithreading for better utilisation of resources. Process and manipulate data using XML in Python. Design and create user-friendly GUIs with Python. Who is this course for? This Python Programming Bible course is ideal for the following: Beginners aiming to learn Python from scratch. Professionals looking to broaden their programming skills. Students pursuing a degree in Computer Science. Web developers looking to integrate Python into their toolkit. Data enthusiasts aiming to handle data with Python. Career Path: This Python Programming Bible course will help you to develop your knowledge and skills to pursue different careers, such as: Python Developer: (£35,000 - £70,000). Data Analyst: (£27,000 - £55,000). Web Developer: (£24,000 - £60,000). Data Scientist: (£45,000 - £90,000). Machine Learning Engineer: (£50,000 - £90,000). Software Developer: (£30,000 - £70,000). Certification After studying the course materials of the Python Programming Bible | Networking, GUI, Email, XML, CGI there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Prerequisites This Python Programming Bible | Networking, GUI, Email, XML, CGI does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Python Programming Bible | Networking, GUI, Email, XML, CGI was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Course Curriculum Section 01: Introduction & Setup Introduction 00:02:00 Setup on Mac OS X 00:03:00 Setup On Linux/Ubuntu 00:03:00 Setup On Windows 00:03:00 Run Code Online 00:03:00 Section 02: Basics Comments 00:02:00 Variables & Variable Types 00:05:00 Lists 00:04:00 Tuples 00:03:00 Dictionary 00:06:00 Data Type Conversion 00:02:00 Arithmetic Operators 00:05:00 Comparison Operators 00:03:00 Assignment Operators 00:03:00 Bitwise Operators 00:10:00 Logical Operators 00:07:00 Membership Operators 00:02:00 Identity Operators 00:02:00 Operator Precedence 00:03:00 Decision Making 00:09:00 Loops 00:06:00 Loop Control Statements 00:05:00 Numbers 00:05:00 Strings 00:12:00 Lists In Depth 00:05:00 Tuples In Depth 00:06:00 Dictionary In Depth 00:08:00 Date & Time 00:07:00 Functions 00:11:00 Modules 00:05:00 File Inputs & Outputs 00:13:00 Handling Exceptions 00:07:00 Section 03: Classes/Objects Simple Example 00:04:00 Creating Instance Objects 00:01:00 Accessing Attributes 00:04:00 Constructor New & Init Method 00:06:00 Destroying Objects 00:02:00 Class Inheritance 00:04:00 Overriding Methods 00:03:00 Overloading Methods 00:01:00 Overloading Operators 00:04:00 Data Hiding 00:03:00 Section 04: Regular Expressions Match Function 00:05:00 Search Function 00:02:00 Advanced Expressions 00:05:00 Search & Replace 00:03:00 Section 05: CGI Programming Basic CGI Programming 00:08:00 Get Method 00:06:00 Post Method 00:05:00 Cookies 00:05:00 Section 06: Database Setup Database 00:02:00 Connect To Database 00:05:00 Create Table 00:03:00 INSERT Operation 00:04:00 READ Operation 00:06:00 UPDATE Operation 00:02:00 DELETE Operation 00:02:00 Simple Network Example 00:04:00 Simple Client 00:04:00 Section 07: Multithreading Initiate a New Thread 00:07:00 Create Thread 00:06:00 Synchronise Threads 00:03:00 Multithreaded Priority Queue 00:09:00 Section 08: XML Parse an XML File 00:10:00 Section 09: GUI Introduction 00:02:00 Button Preview 00:03:00 Canvas 00:04:00 Checkbutton 00:02:00 Entry 00:02:00 Frame 00:04:00 Label 00:02:00 List Box 00:02:00 Menu button 00:03:00 Menu 00:08:00 Message 00:02:00 Radio button 00:05:00 Scale 00:03:00 Scrollbar 00:04:00 Text 00:03:00 Top-level 00:02:00 Spinbox 00:02:00 Paned Window 00:03:00 Message Box 00:02:00 Label Frame 00:02:00 Section 10: Resource Resource 00:00:00 Assignment Assignment - Python Programming Bible | Networking, GUI, Email, XML, CGI 00:00:00
CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.
Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble
This course bundle is ideal for anyone looking to establish their Cisco networking career. It consists of one Cisco Certified Network Associate (CCNA) certification, and two Cisco Certified Networking Professional (CCNP) certifications. Although there are no formal prerequisites to enrol on the CCNA certification course and sit for the exam, learners should have a good foundation knowledge in networking. The newly retooled CCNA covers a breadth of topics, including: Network fundamentals Network access IP connectivity IP services Security fundamentals Automation and programmability Achieving CCNA certification is the first step in preparing for a career in networking technologies. To earn your CCNA certification, you only need to pass one exam – which covers a broad range of fundamentals for IT careers, based on the latest networking technologies. The CCNP is the next level from the CCNA. As with the CCNA, there are no formal prerequisites to enrol on the CCNP certification course and sit for the exams. Learners taking a CCNP course generally have an in-depth knowledge of networking, as well as a good understanding of Cisco technologies. The typical certification path for most learners would begin with the CCNA, then progress onto the CCNP. Learners need to pass two exams (one core exam and one concentration exam) in order to gain a CCNP certification. This course bundle includes both exams. The core exam’s focus is based around implementing and operating Cisco enterprise network core technologies. The concentration exam’s focus for this particular bundle is around designing Cisco enterprise networks.