Duration 3.5 Days 21 CPD hours This course is intended for This course is for AWS Cloud Architects with expertise in designing and implementing solutions running on AWS who now want to design for Microsoft Azure. Overview After completing this course, students will be able to: Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects who have previously designed for Amazon Web Services how to translate business requirements into secure, scalable, and reliable solutions for Azure. Introduction to Azure Subscriptions and accounts Resource groups and templates in Azure Resource Manager Azure global infrastructure Azure regions Azure Availability Zones Comparison with AWS Implement Azure Active Directory Introduction to Azure Active Directory Domains and custom domains Safety features Guest users in Azure Active Directory Manage multiple directories Comparison with AWS Implement and manage hybrid identities Introduction to Azure AD Connect Comparison with AWS Implement virtual networking Azure Virtual Network and VNet peering VPN and ExpressRoute connections Comparison with AWS Implement VMs for Windows and Linux Configure high availability Comparison with AWS Implement load balancing and network security Implement Azure Load Balancer Implement an Azure Application Gateway Implement Azure Firewall Implement network security groups and application security groups Comparison with AWS Implement container-based applications Configure Azure Kubernetes Service Publish a solution on an Azure Container Instance Comparison with AWS Implement an application infrastructure Create an App Service plan Create and configure Azure App Service Configure networking for an App Service Introduction to Logic Apps and Azure Functions Comparison with AWS Implement storage accounts Azure Storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Comparison with AWS Implement NoSQL databases Introduction to Azure Cosmos DB Consistency Select appropriate CosmosDB APIs Set up replicas in CosmosDB Comparison with AWS DynamoDB Implement Azure SQL databases Configure Azure SQL database settings Implement Azure SQL Database managed instances Configure high availability for an Azure SQL database Comparison with AWS Implement cloud infrastructure monitoring Monitor security Monitor cost Configure a Log Analytics workspace Comparison with AWS Implement and manage Azure governance solutions Assign RBAC roles Configure management access to Azure Implement and configure an Azure Policy Comparison with AWS Manage security for applications Implement Azure Key Vault Implement and configure Azure AD Managed Identities Register and manage applications in Azure AD Comparison with AWS Migration, backup, and disaster recovery management Migrate workloads Implement Azure Backup for VMs Implement disaster recovery Comparison with AWS
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting
Duration 5 Days 30 CPD hours This course is intended for This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Overview Upon completing this course, students will be able to meet these objectives: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers. Compare and contrast the various hardware and software switching mechanisms and operation, while defining the TCAM and CAM, along with process switching, fast switching, and Cisco Express Forwarding concepts. Troubleshoot layer 2 connectivity using VLANs, trunking. Implementation of redundant switched networks using spanning tree protocol. Troubleshooting link aggregation using Etherchannel. Describe the features, metrics, and path selection concepts of EIGRP. Implementation and optimization of OSPFv2 and OSPFv3, including adjacencies, packet types, and areas, summarization and route filtering for IPv4 and IPv6. Implementing EBGP interdomain routing, path selection and single and dual-homed networking. Implementing network redundacy using protocols like HSRP and VRRP. Implementing internet connectivity within Enterprise using static and dynamic NAT. Describe the virtualization technology of servers, switches, and the various network devices and components. Implementing overlay technologies like VRF, GRE, VPN and LISP. Describe the components and concepts of wireless networking including RF, antenna characteristics, and define the specific wireless standards. Describe the various wireless deployment models available, include autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture. Describe wireless roaming and location services. Describe how APs communicate with WLCs to obtain software, configurations, and centralized management. Configure and verify EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various tools available. Troubleshooting Enterprise networks using services like NTP, SNMP , Cisco IOS IP SLAs, NetFlow and Cisco IOS Embedded Event Manager. Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You?ll learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN Course Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus Lan Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols And Techniques Understanding Virtual Private Networks And Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming And Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage
Duration 4 Days 24 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators Engineers requiring advanced configuration skills Cisco integrators and partners Overview After taking this course, you should understand: Data center challenges and cloud solutions Cisco UCS Director architecture Cisco UCS Director setup and configuration Cisco ACI Multitenancy in FlexPod Cisco ACI infrastructure Resource groups and service offerings Tenant onboarding Self-service provisioning Application containers The Designing and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course shows you how to use Cisco UCS© Director software to manage physical and virtual infrastructure elements, including Cisco Application Centric Infrastructure (Cisco ACI?). You will learn to use orchestration and automation functions of Cisco UCS Director to effectively manage infrastructure and automate IT processes. The course offers hands-on experience installing and configuring Cisco UCS Director software. You will also learn about features such as bare-metal provisioning; compute, network, and storage management; orchestration, including Application Policy Infrastructure Controller (APIC); Cisco UCS Director custom tasks, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Introducing Cisco Application Centric Infrastructure Understanding Cisco ACI Overview Understanding Cisco ACI Terms and Constructs Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Introducing Role-Based Access Control Explaining User Groups/Roles/Users Introducing Orchestration Understanding Orchestration Introducing Cisco UCS Director ACI Explaining Cisco UCS Director with ACI So Understanding Multitenancy with Cisco UCS Director ACI Explaining Multitenancy with Cisco UCS Director ACI Understanding Resource Groups and Service Offerings Introducing Advanced Tenant Onboarding Onboarding a Tenant Tagging Resources Introducing Application Containers Understanding Application Profiles Understanding Service Container Catalog Understanding Deployment Through Self-Service Portal Understanding Self-Service Provisioning Portal Understanding Service Request Understanding Virtual Data Center Understanding Policies Understanding vDC and Groups Use Case Additional course details: Nexus Humans CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CiscoDesigning and Deploying Cisco UCS Director with ACI (UCSDACI) v6.6 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Are you feeling confused with various free C# tutorials on OOP? Are you looking for a better approach to learn C# Object-Oriented Programming? Do you feel it is difficult to understand and apply the OOP concepts in C#? Are you seeking a helping hand to learn the object-oriented programming concepts in C# .NET? If you have answered yes to any of the questions above, then this course is for you.
Build the ultimate authentication boilerplate project with the MERN stack from scratch and deploy it to DigitalOcean cloud servers
Java Evenings Course. Basic Java syntax and principles of object-oriented programming. Our Style: Hands-on, Practical Course, Instructor-led Course. Level: From basics to fully functional. Who would benefit from the course: basics to Java, attend after work. Duration: one lesson of 2 hours per week for 6 weeks, from 6pm to 8pm.
Description: The 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 course provides all the essential topics and skills that you need to know for MCSA Windows Server. The course will upgrade your skills to MCSA Windows Server 2012. Throughout the course, you will learn how to install and configure servers, configure server roles, features and Hyper-V, install and administer Active Directory, configure network services and access, configure a network policy server infrastructure, and deploy, manage, and maintain servers. The course will also show you how to configure and manage Active Directory, group policy and high availability, configure file and storage solutions, implement business continuity and disaster recovery, configure network services, identity and access solutions. If you pass the exam, you will be qualified as a Microsoft Certified Solutions Associate (MCSA) in Windows Server 2012. The purpose of the course is to prepare you for the Exam. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Install and Configure Servers Install and Configure Servers FREE 00:17:00 Features with Windows Server 2012 00:11:00 Installing Windows 2012 Enterprise 00:09:00 Windows Server Installation 00:12:00 Introduction to Server Manager 00:07:00 Post Server Installation Tasks 00:11:00 Configure Server Roles and Features Configure Server Roles and Features 00:08:00 Add Roles Server Manager 00:16:00 Event Viewer 00:04:00 Best Practice Analyzer 00:06:00 Administrative Tools Available 00:08:00 Delegation of Domain Administration 00:09:00 Advanced Services 00:11:00 Introduction to PowerShell 00:16:00 Installing Server Core 00:07:00 PowerShell 00:11:00 Server Core Tools 00:16:00 Recover from Closing Command Prompt 00:01:00 Netsh-Firewall 00:04:00 Sconfig on Server Core 00:08:00 PowerShell Examples for User Management 00:12:00 Configure Hyper-V Configure Hyper-V 00:12:00 Enable Remote Management 00:05:00 Remote Desktop 00:08:00 Server Groups 00:01:00 Virtualization 00:17:00 Create a VM 00:07:00 Hyper-V Settings 00:03:00 Virtual Hard Disk 00:17:00 Managing VHD's 00:12:00 Virtual Networks 00:08:00 Hyper-V Network Settings33 00:06:00 Creating Network Adapters66 00:02:00 Considerations for VM Network Configuration 00:12:00 Install and Administer Active Directory Install and Administer Active Directory 00:48:00 Overview of Domain Controllers 00:19:00 Best Practices - FSMO and GC 00:25:00 RODC 00:11:00 Install Domain Controllers 00:31:00 Active Directory Management Tools 00:20:00 Groups 00:39:00 Delegate Management of Active Directory Objects 00:11:00 Deploy, Manage, and Maintain Servers Deploy, Manage, and Maintain Servers 00:32:00 Types of Images 00:43:00 Unattended Installations 00:18:00 WSUS 00:40:00 Monitoring Servers 01:30:00 Configure Network Services and Access Configure Network Services and Access 00:40:00 How DNS Forwarding Works 00:21:00 Zone Transfers 00:24:00 DNS Caching 00:04:00 Configure a Network Policy Server Infrastructure Configure a Network Policy Server Infrastructure 00:46:00 VPN Access ss 00:37:00 Components of Network Policy 00:07:00 Direct Access Features 00:18:00 Troubleshooting Tools 00:29:00 Certificates 00:03:00 Configure and Manage Active Directory Configure and Manage Active Directory 01:02:00 Managed Service Accounts 00:16:00 Create Account Policies and User Rights Assignments 00:40:00 Maintain Active Directory Domain Services 00:42:00 Configure and Manage Group Policy Configure and Manage Group Policy 00:22:00 Windows Client Policy Processing 00:08:00 Starter GPO's 00:30:00 Group Policy Links 00:20:00 Other Group Policy Options 01:07:00 Configure and Manage High Availability Configure and Manage High Availability 00:36:00 Server 2012 Failover Clustering 00:19:00 Quorum Definitions 00:20:00 Multi-Site Failover Cluster 00:10:00 Management Tools 00:11:00 Configure File and Storage Solutions Configure File and Storage Solutions 00:17:00 Discretionary Access Control 00:10:00 Creating Claims 00:19:00 File Classification 00:34:00 iSCSI 00:35:00 Implement Business Continuity and Disaster Recovery Implement Business Continuity and Disaster Recovery 00:15:00 Backup Types 00:16:00 System Restore 00:26:00 Windows RE 00:17:00 Configure Network Services Configure Network Services 00:20:00 Super Scopes and Multinetting 00:21:00 DNS Solutions s 00:23:00 DNS Cache Locking 00:26:00 IPAM (IP Address Management) 00:13:00 IPAM Abilities s 00:10:00 GPO Provisioning 00:29:00 Configure Identity and Access Solutions Configure Identity and Access Solutions 00:13:00 Web Services 00:09:00 C AD FS Components 00:16:00 Mock Exam Mock Exam- 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 00:20:00 Final Exam Final Exam- 70-417 - Upgrading Your Skills to MCSA Windows Server 2012 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
With expert guidance and easy-to-understand narration, this course gets you up and running with the SwiftUI framework. You will learn how to use the SwiftUI framework, its tools, and its technology to build applications with ease.
Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring Security with hands-on experience and build secure Spring and Spring Boot applications. Overview By the end of the course, you should be able to meet the following objectives: Use Spring Security in Spring and Spring Boot applications Configure the Spring Security filter chain Protect HTTP endpoints with expression-based access control and the AuthorizationManager API Protect method execution Use different authentication mechanisms Handle passwords in an efficient way Integrate Spring Security with Junit 5 and MockMVC to test HTTP and method security Protect against common vulnerabilities and threats Understand what OAuth2 is Use and configure the Spring Authorization Server Implement a resource server and client This 2-day course offers hands-on experience with the major features of Spring Security, which includes configuration, authentication, authorization, password handling, testing, protecting against security threats, and the OAuth2 support to secure applications. On completion, participants will have a foundation for securing enterprise and microservices applications. Security Introduction Need for security Basic security concepts Common security vulnerabilities Spring Security Basics Introduction to Spring Security High-level architecture Overview of SecurityContext Spring Security with Spring Boot Customizing Authentication Building blocks for authentication Authentication mechanisms based on user name and password Other authentication mechanisms Authentication events Securing Web Applications Configuring authorization Using AccessDecisionsManager for authorization Using AuthorizationManager for authorization Bypassing security Method Security Method security architecture Declarative method security with annotations Security Testing Spring Security Testing Support Security mock annotations and meta-annotations Using MockMvc to test security Handling Passwords Password hashing Upgrading passwords (Optional) Protecting Against Common Vulnerabilities Hardening web applications with security headers Preventing cross-site request forgery Encrypting data in transit OAuth5 and OIDC Concepts Need for OAuth Overview of OAuth5 and OIDC OAuth5 grant types Types of tokens Spring Security OAuth5 support and OAuth5 login Spring Authorization Server Introduction to Authorization Server Spring Authorization Server endpoints Spring Authorization Server configuration Protecting and accessing resources with OAuth5 Resource server Using JWT tokens Using opaque tokens Configuring an OAuth5 client Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Spring Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Spring Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.