• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

31867 Courses

Architecting Hybrid Cloud Infrastructure with Anthos

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation

Architecting Hybrid Cloud Infrastructure with Anthos
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX-T Data Center: Design [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and VMware NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX-T Data Center requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX-T Data Center Design logical switching and routing Recognize NSX-T Data Center security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX-T Data Center infrastructure across multiple sites Describe the factors that drive performance in NSX-T Data Center This five-day course provides comprehensive training on considerations and practices to design a VMware NSX-T? Data Center environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of NSX-T Data Center offered in release 3.2, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX-T Data Center architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives Design Concepts Identify design terms Describe framework and project methodology Describe VMware Validated Design? Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX-T Data Center architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile, VMware vSphere© Network I/O Control profile, and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe NSX-T Data Center single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX-T Data Center Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX-T Data Center security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX-T Data Center Describe stateful and stateless NSX-T Data Center NAT Identify benefits of NSX-T Data Center DHCP Identify benefits of metadata proxy Describe IPSec VPN and L2 VPN Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Describe a typical design for a KVM compute hypervisor with two pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX-T Data Center multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare Federation disaster recovery designs NSX Optimization Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available N-VDS enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes

VMware NSX-T Data Center: Design [V3.2]
Delivered OnlineFlexible Dates
Price on Enquiry

Adobe Captivate 2019 - Beyond The Essentials

By Nexus Human

Duration 2 Days 12 CPD hours Overview - You will learn advanced Adobe Captivate concepts. - You will learn to create highly interactive software simulation and to control the text that appears in the recording?s text captions by editing Captivates text capture templates. - You will create responsive lessons (using Fluid Boxes and Breakpoints) that automatically reflow to fit just about any kind of display including desktops, laptops, tablets, and smart phones. - Learn new features that Captivate now supports; such as, Virtual Reality with 360-degree images and videos along with interactive videos. - Fine-tune your Captivate production skills by leveraging object styles, master slides, themes, and advanced actions. - Engage your learners by adding variables, widgets, and learner interactions (including drag and drop) to your eLearning. - Learn to create object styles, apply them globally, and import and export them. Knock large projects down to size by learning to create branch groups. - Create branching scenarios that allow learners to plot their own path through your course. - You will also learn to create templates. - Ensure your eLearning can be used by people with disabilities by adding such 508-compliant features as accessibility text, keyboard shortcuts, and closed captions. - Enable Captivates reporting features and, along the way, learn about Learning Management Systems, SCORM, SCOs, Manifests, and content packages. A course that teaches the higher-end, more advanced functionality of Adobe Captivate 2019. 1 - INTERACTIVE SOFTWARE SIMULATIONS AND CAPTION PRE-EDITING Rehearse a Script Set Recording Preferences Record a Simulation Edit a Text Capture Template 2 - OBJECT STYLES, PROJECT SHARING, AND BRANCHING Create a New Style Apply an Object Style Globally Export and Import an Object Style Name a Slide Copy/Paste Project Assets Use Buttons to Create a Branch Explore the Branching View Create a Branch Group 3 - VARIABLES AND WIDGETS Add Project Information Insert a System Variable Edit a System Variable Create a User Variable Use a Variable to Gather Learner Data Insert and Format a Widget 4 - INTERACTIVE VIDEOS AND VIRTUAL REALITY Insert an Interactive Video Add Bookmarks Add Slide Overlays Create a Virtual Reality Project Add a Text Hotspot Add an Audio Hotspot Add a Quiz to a Virtual Reality Project 5 - INTERACTIONS Insert a Process Circle Create a Basic Drag and Drop Interaction Manage Drag and Drop Buttons and Write Captions Create a ?Trick? Retry Slide Explore an Advanced Drag and Drop Project Create an Advanced Drag and Drop Interaction Change the States of a Smart Shape Use States to Swap Images 6 - ACCESSIBLE ELEARNING Set Document Information Enable Accessibility Add Accessibility Text to Slides Import Slide Audio Add Shortcut Keys Add Closed Captions Set a Tab Order 7 - ADVANCED ACTIONS Use a Completed Action Name Objects Create a Mask Control Object Visibility Create a Standard Advanced Action, Attach an Action to a Button Group Timeline Objects Create a Variable Create a Conditional Action Create Decision Blocks 8 - PROJECT TEMPLATES AND MASTER SLIDES Work with the Main Master Slide Work with Content Masters Apply a Master to Filmstrip Slides Edit a Master Apply a Theme Create a Custom Theme Review a Template Create a Project Based on a Template Create a Project Template 9 - RESPONSIVE PROJECTS Customize Breakpoints Save a Standard Project As Responsive Insert and Name Fluid Boxes Resize Fluid Boxes Add Content to Fluid Boxes Switch Modes Use the Position Inspector Modify a Single Breakpoint Exclude from View Add a New Breakpoint Position and Link Objects Edit Breakpoint Object Styles 10 - REPORTING RESULTS Set Quiz Reporting Options Create a Manifest File Report a Button Interaction Adjust Slide Object Interaction Preview in SCORM Cloud Publish a Content Package Create an Inquisiq LMS Account Create an LMS Course Attach a Lesson to a Course Test an eLearning Course Additional course details: Nexus Humans Adobe Captivate 2019 - Beyond The Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Adobe Captivate 2019 - Beyond The Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Adobe Captivate 2019 - Beyond The Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX: Design [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX Design logical switching and routing Recognize NSX security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX infrastructure across multiple sites Describe the factors that drive performance in NSX This five-day course provides comprehensive training on considerations and practices to design a VMware NSX© environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer?s business needs. Course Introduction Introduction and course logistics Course objectives NSX Design Concepts Identify design terms Describe framework and project methodology Describe the role of VMware Cloud Foundation? in NSX design Identify customers? requirements, assumptions, constraints, and risks Explain the conceptual design Explain the logical design Explain the physical design NSX Architecture and Components Recognize the main elements in the NSX architecture Describe the NSX management cluster and the management plane Identify the functions and components of management, control, and data planes Describe the NSX Manager sizing options Recognize the justification and implication of NSX Manager cluster design decisions Identify the NSX management cluster design options NSX Edge Design Explain the leading practices for edge design Describe the NSX Edge VM reference designs Describe the bare-metal NSX Edge reference designs Explain the leading practices for edge cluster design Explain the effect of stateful services placement Explain the growth patterns for edge clusters Identify design considerations when using L2 bridging services NSX Logical Switching Design Describe concepts and terminology in logical switching Identify segment and transport zone design considerations Identify virtual switch design considerations Identify uplink profile and transport node profile design considerations Identify Geneve tunneling design considerations Identify BUM replication mode design considerations NSX Logical Routing Design Explain the function and features of logical routing Describe the NSX single-tier and multitier routing architectures Identify guidelines when selecting a routing topology Describe the BGP and OSPF routing protocol configuration options Explain gateway high availability modes of operation and failure detection mechanisms Identify how multitier architectures provide control over stateful service location Identify EVPN requirements and design considerations Identify VRF Lite requirements and considerations Identify the typical NSX scalable architectures NSX Security Design Identify different security features available in NSX Describe the advantages of an NSX Distributed Firewall Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall Determine a security policy methodology Recognize the NSX security best practices NSX Network Services Identify the stateful services available in different edge cluster high availability modes Describe failover detection mechanisms Compare NSX NAT solutions Explain how to select DHCP and DNS services Compare policy-based and route-based IPSec VPN Describe an L2 VPN topology that can be used to interconnect data centers Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX Physical Infrastructure Design Identify the components of a switch fabric design Assess Layer 2 and Layer 3 switch fabric design implications Review guidelines when designing top-of-rack switches Review options for connecting transport hosts to the switch fabric Describe typical designs for VMware ESXi? compute hypervisors with two pNICs Describe typical designs for ESXi compute hypervisors with four or more pNICs Differentiate dedicated and collapsed cluster approaches to SDDC design NSX Multilocation Design Explain scale considerations in an NSX multisite design Describe the main components of the NSX Federation architecture Describe the stretched networking capability in Federation Describe stretched security use cases in Federation Compare the Federation disaster recovery designs NSX Optimization and DPU-Based Acceleration Describe Geneve Offload Describe the benefits of Receive Side Scaling and Geneve Rx Filters Explain the benefits of SSL Offload Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput Explain the available enhanced datapath modes and use cases List the key performance factors for compute nodes and NSX Edge nodes Describe DPU-Based Acceleration Define the NSX features supported by DPUs Describe the hardware and networking configurations supported with DPUs

VMware NSX: Design [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Meeting Server Advanced (COLLAB350)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Channel partners and reseller engineers installing, configuring, and maintaining scalable and resilient deployments of Cisco Meeting Server Channel partners and reseller engineers providing presales support for scalable and resilient Cisco Meeting Server deployments Customer engineers supporting scalable and resilient Cisco Meeting Server deployments Overview Upon completion of this course, the learner should be able to meet the following objectives: Cisco Meeting Server API commands Scalable and resilient deployments Customization Recording In this 3-day course Cisco Meeting Server Advanced (COLLAB350), you will learn advanced techniques in installing, troubleshooting, and maintaining a single server and single server split deployment of Cisco Meeting Servers. The recently purchased Acano collaboration hardware and software includes video and audio-bridging technology that allows customers to connect video systems from multiple vendors across both cloud and hybrid environments. Cisco has incorporated Acano collaboration technologies into the new Meeting Server tool. Module 1: Reviewing Cisco Meeting Server Intermediate Component parts of a Cisco Meeting Solution Configuration steps for a Cisco Meeting Solution Module 2: APIs Purpose of APIs Benefits of APIs Types of APIs Function of the GET, POST, PUT, and DELETE commands Module 3: Configuring Software with an API How a user can interact with software using an API Download and install Chrome Postman Other API software Download the Cisco Meeting Server API guide Module 4: Configuring Spaces with the Cisco Meeting Server API Cisco Meeting Server API structure Use Chrome Postman for information on calls and spaces with the GET command Use Chrome Postman to post a new call space with the POST command Use Chrome Postman to place changes in a space, including adding a member, with the PUT command Use Chrome Postman to delete a space with the DELETE command Module 5: Customization Configuration Create and modify a user profile and assign users Create and modify a dual-tone multifrequency (DTMF) profile and apply to a user profile Modify the interactive voice response (IVR), color scheme, and background Module 6: Planning a Resilient and Scalable Cisco Meeting Server Deployment Resilient server solutions Scalable server solutions Geographically dispersed configurations and GeoDNS Domain Name System (DNS) records required for a resilient and scalable solution Certificate requirements for a resilient and scalable solution Module 7: Configuring a Database Cluster Relationship between cluster master and cluster slaves in a database cluster Certificate requirements for a secure database cluster Configure the certificates for a database cluster Configure a database cluster Module 8: Configuring a Call Bridge Cluster Relationship between the Call Bridge and the Database How cross-cluster spaces behave Configure certificates for Call Bridge clustering Storage of configuration when entering with the API and the individual web interfaces for Lightweight Directory Access Protocol (LDAP) and Call Bridge clustering Configure a Call Bridge Cluster Connect XMPP server to multiple Call Bridges Module 9: Configuring Load Balancers and Trunks Relationship between the XMPP server, Trunk and Load Balancer Configure certificates for multiple trunks and load balancers Configure multiple Trunks to multiple Load Balancers Module 10: Configuring Multiple Web Bridges Relationship between multiple Web Bridges and Call Bridges Internal and external DNS records support for both internal and external Web Bridges Configure certificates for multiple Web Bridges Configure multiple Web bridges Connect multiple Call Bridges to multiple Web Bridges Module 11: Configuring Multiple TURN Servers Relationship between multiple TURN servers and multiple Call Bridges Configure certificates for multiple TURN servers Configure multiple TURN servers Connect multiple Call Bridges to multiple TURN servers Module 12: Configuring Multiple Recorders Features of the recording capability Software, hardware, and licensing requirements for recording DNS records Configure the Recorder Relationship between multiple Recorders and multiple Call Bridges Configure a Call Bridge to use a Recorder Configure certificates for multiple Recorders servers Configure multiple Recorder servers Connect multiple Call Bridges to multiple Recorder servers Module 13: Integrating with a Resilient and Scalable Cisco Meeting Server Deployment Integration with Cisco TelePresence Video Communication Server (VCS) or Cisco Unified Communications Manager and multiple Call Bridges Integration with Cisco Expressway technology and multiple Call Bridges Integration with Microsoft Skype for Business and multiple Call Bridges Integration with Cisco TelePresence Management Suite and multiple Call Bridges Module 14: Deploying an H.323 Gateway Cisco preferred architecture for H.323 and Session Initiation Protocol (SIP) interoperability Functionality of the Cisco Meeting Server H.323 gateway Configuration the Cisco Meeting Server H.323 gateway Module 15: Multitenancy Options Purpose of the multitenancy capabilities Options for multitenancy capabilities on the Cisco Meeting Server Module 16: Customization Options Options available to customize Cisco Meeting Apps License keys required for customization Web Server requirements for customization Options available to customize recorded messaging Customization options available for invitation text

Cisco Meeting Server Advanced (COLLAB350)
Delivered OnlineFlexible Dates
Price on Enquiry

55301 Mastering Microsoft Project 2019

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for both novice and experienced project managers, managers, schedulers, and other project stake holders who need to incorporate the discipline of project management with Microsoft Project 2019. Overview Understand the discipline of project management as it applies to using Microsoft Project 2019. Create a Work Breakdown Structure. Identify Task Types & Relationships. Define Resources within Project. Make Work Package Estimates. Create an Initial Schedule. Create a Resource Leveled Schedule. Create Projects from templates, Excel files. Create Global templates. Create formulas and graphical indicators. The steps to record a macro. Format Output and Print Reports. Integrate Multiple Projects. Set up a Project with a Calendar, Start date, and scheduling method. Understand Manually Schedule vs. Auto Schedule. Manage multiple projects. Be able to create a master project list with shared resources. This three-day instructor-led course is intended for individuals who are interested in expanding their knowledge base and technical skills about Microsoft Project. The course begins with the basic concepts and leads students through all the functions they?ll need to plan and manage a small to medium-size project, including how to level resources and capture both cost and schedule progress. 1 - Introduction to Microsoft Project Describe how Project relates to the discipline of Project management. Learn what the new features are in Project 2019. Navigate to the primary views available using the Ribbon. Choose Views that display task, resource, or assignment information. Select table within views to change the information that is available to see and edit. Relate the features of Project to the 5 steps for building a plan in Project. Learn new accessibility features in Project 2 - A Quick and Easy Overview of Managing with Project Create a new project and prepare it for data entry. Enter project tasks. Sequence the tasks. Define resources. Estimate Task duration and assign resources. Baseline the project. Track project progress. 3 - Setting Up a Project Use multiple methods to create a new project from an Excel file and a SharePoint Tasks list. Establish one or more calendars to constrain resource availability. Configure Project to calculate the schedule from the Start Date forward, or from the Finish Date backward. 4 - Manually Schedule vs. Auto Schedule Students practice switching tasks between Manually Schedule and Auto Schedule modes. By switching modes, students learn the impact made on the project schedule and the individual tasks. 5 - Creating a Work Breakdown Structure Build and use summary and subordinate tasks. Understand and use milestones. Develop WBS Outlines. Assign completion criteria. Evaluate the WBS. Understand and use WBS templates. 6 - Identifying Task Relationships Understand the different types of task relationships. Understand and use various methods to create relationships. Determine and display task sequence. Understand and use lag, lead, and delay. Understand the new feature of Task Paths. 7 - Defining Resources within Project Define resource types. Define individual resources that will be used on the project. Record the cost (s) of using each type of resource. Record the limit of availability for each type of resource by establishing a resource calendar and defining the maximum units of that resource. 8 - Making Work Package Estimates Enter estimates for duration and costs for each task. Distinguish between task types and describe when each is appropriate. Describe the relationship between work, units, and duration. Describe the way Effort Driven scheduling is affected by work, units, and duration. Assign tasks to resources using the Team Planner view. 9 - Creating an Initial Schedule Calculate float and identify a project?s critical path. Understand and identify task constraints. Create milestones. Use the Task Inspector to troubleshoot the initial schedule. 10 - Create a Resource Leveled Schedule Adjust a project schedule to account for limited people and other resources. View the overall cost and schedule of a project. Identify resources that have been overallocated for a project schedule. Use multiple ways to adjust tasks and assignments to remove over allocation for any resource. 11 - Managing the Project Learn how to set a baseline. Lean how to enter and track project performance data. Learn how to apply different tracking methods. Learn how to perform a variance analysis on a project. Learn how to Reschedule Work Learn how to inactivate tasks Learn how to synch projects to SharePoint 12 - Formatting Output and Printing Reports Print Views Formats Sorting Filtering Grouping Custom Fields Reporting Other File Formats 13 - Managing Multiple Projects Learn how to use common resources among multiple projects. Learn how to link tasks between multiple projects. Learn how to create a consolidated view of multiple projects. 14 - Advanced Topics Learn how to customize the Ribbon and the Quick Access Toolbar. Learn how to customize WBS numbering. Learn the concepts of Formulas and Graphical indicators. Learn the purpose of the Global template and Organizer. Learn how to record a Macro.

55301 Mastering Microsoft Project 2019
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Data Loss Prevention 14.0 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone responsible for conf iguring, maintaining, and troubleshooting Symantec Data Loss Prevention. Additionally, this course is intended for technical users responsible for creating and maintaining Symantec Data Loss Prevention policies and the incident response structure. Overview At the completion of the course, you will be able to: Enforce server, detection servers, and DLP Agents as well as reporting, workflow, incident response management, policy management and detection, response management, user and role administration, directory integration, and filtering. This course is designed to provide you with the fundamental know ledge to configure and administer the Symantec Data Loss Prevention Enforce platform. Introduction to Symantec Data Loss Prevention Symantec Data Loss Prevention overview Symantec Data Loss Prevention architecture Navigation and Reporting Navigating the user interface Reporting and analysis Report navigation, preferences, and features Report filters Report commands Incident snapshot Incident Data Access Hands-on labs: Become familiar with navigation and tools in the user interface. Create, filter, summarize, customize, and distribute reports. Create users, roles, and attributes. Incident Remediation and Workflow Incident remediation and w orkf low Managing users and attributes Custom attribute lookup User Risk Summary Hands-on labs: Remediate incidents and configure a user?s reporting preferences Policy Management Policy overview Creating policy groups Using policy templates Building policies Policy development best practices Hands-on labs: Use policy templates and policy builder to configure and apply new policies Response Rule Management Response rule overview Configuring Automated Response rules Configuring Smart Response rules Response rule best practices Hands-On Labs: Create and use Automated and Smart Response rules Described Content Matching DCM detection methods Hands-on labs: Create policies that include DCM and then use those policies to capture incidents Exact Data Matching and Directory Group Matching Exact data matching (EDM) Advanced EDM Directory group matching (DGM) Hands-on labs: Create policies that include EDM and DGM, and then use those policies to capture incident Indexed Document Matching Indexed document matching (IDM) Hands-on labs: Create policies that include IDM rules and then use those policies to capture incidents Vector Machine Learning Vector Machine Learning (VML) Hands-on labs: Create a VML profile, import document sets, and create a VML policy Network Monitor Review of Network Monitor Protocols Traffic filtering Network Monitor best practices Hands-On Labs: Apply IP and L7 filters Network Prevent Network Prevent overview Introduction to Network Prevent (Email) Introduction to Network Prevent (Web) Hands-On Labs: Configure Network Prevent (E-mail) response rules, incorporate them into policies, and use the policies to capture incidents Mobile Email Monitor and Mobile Prevent Introduction to Mobile Email Monitor Mobile Prevent overview Configuration VPN configuration Policy and Response Rule Creation Reporting and Remediation Troubleshooting Network Discover and Network Protect Network Discover and Network Protect overview Configuring Discover targets Configuring Box cloud targets Protecting data Auto-discovery of servers and shares Running and managing scans Reports and remediation Network Discover and Network Protect best practices Hands-on labs: Create and run a filesystem target using various response rules, including quarantining Endpoint Prevent Endpoint Prevent overview Detection capabilities at the Endpoint Configuring Endpoint Prevent Creating Endpoint response rules Viewing Endpoint Prevent incidents Endpoint Prevent best practices Managing DLP Agents Hands-on labs: Create Agent Groups and Endpoint response rules, monitor and block Endpoint actions, view Endpoint incidents, and use the Enforce console to manage DLP Agents Endpoint Discover Endpoint Discover overview Creating and running Endpoint Discover targets Using Endpoint Discover reports and reporting features Hands-on labs: Create Endpoint Discover targets, run Endpoint Discover targets, and view Endpoint Discover incidents Enterprise Enablement Preparing for risk reduction Risk reduction DLP Maturity model System Administration Server administration Language support Incident Delete Credential management Troubleshooting Diagnostic tools Troubleshooting scenario Getting support Hands-on labs: Interpret event reports and traffic reports, configure alerts, and use the Log Collection and Configuration tool Additional course details: Nexus Humans Symantec Data Loss Prevention 14.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Data Loss Prevention 14.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Data Loss Prevention 14.0 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

0G53BG IBM SPSS Statistics Essentials (V26)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for New users of IBM SPSS Statistics Users who want to refresh their knowledge about IBM SPSS Statistics Anyone who is considering purchasing IBM SPSS Statistics Overview Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables. Introduction to IBM SPSS Statistics Review basic concepts in IBM SPSS Statistics Identify the steps in the research process Review basic analyses Use Help Reading data and defining metadata Overview of data sources Read from text files Read data from Microsoft Excel Read data from databases Define variable properties Selecting cases for analyses Select cases for analyses Run analyses for groups Apply report authoring styles Transforming variables Compute variables Recode values of categorical and scale variables Create a numeric variable from a string variable Using functions to transform variables Use statistical functions Use logical functions Use missing value functions Use conversion functions Use system variables Use the Date and Time Wizard Setting the unit of analysis Remove duplicate cases Create aggregate datasets Restructure datasets Merging data files Add cases from one dataset to another Add variables from one dataset to another Enrich a dataset with aggregated information Summarizing individual variables Define levels of measurement Summarizing categorical variables Summarizing scale variables Describing the relationship between variables Choose the appropriate procedure Summarize the relationship between categorical variables Summarize the relationship between a scale and a categorical variable Creating presentation ready tables with Custom Tables Identify table layouts Create tables for variables with shared categories Create tables for multiple response questions Customizing pivot tables Perform Automated Output Modification Customize pivot tables Use table templates Export pivot tables to other applications Working with syntax Use syntax to automate analyses Create, edit, and run syntax Shortcuts in the Syntax Editor Controlling the IBM SPSS Statistics environment Set options for output Set options for variables display Set options for default working folders Additional course details: Nexus Humans 0G53BG IBM SPSS Statistics Essentials (V26) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 0G53BG IBM SPSS Statistics Essentials (V26) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

0G53BG IBM SPSS Statistics Essentials (V26)
Delivered OnlineFlexible Dates
Price on Enquiry