• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

489 Courses

Introduction to Linux Systems Administration (TTLX2220)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client

Introduction to Linux Systems Administration (TTLX2220)
Delivered OnlineFlexible Dates
Price on Enquiry

M207031 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Searching in the Configuration Manager console Using Windows PowerShell with Configuration Manager Using Configuration Manager Service Manager to manage components Monitoring site and component status Reviewing log files by using the Configuration Manager Trace tool Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. Describe the Configuration Manager architecture. Describe the management tools that you use to perform administrative functions for Configuration Manager. Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. Analyzing data using queries and reports Introduction to queries Configuring Microsoft SQL Server Reporting Services (SSRS) Lab : Creating and running queriesConfiguring boundaries and resource discovery Creating data queries Creating subselect queries Creating status message queries Lab : Configuring SSRS Configuring a reporting services point Creating a report by using Report Builder Create and configure data and status message queries. Configure and manage SSRS and the reporting services point. Preparing the management infrastructure to support PCs and mobile devices Configuring site boundaries and boundary groups Configuring resource discovery Configuring the Exchange Server Connector for mobile device management Configuring user and device collections Lab : Configuring boundaries and resource discovery Configuring boundaries, boundary groups, and fallback relationships Configuring Active Directory discovery methods Lab : Configuring user and device collections Creating a device collection Creating a user collection Configuring a maintenance window Configure boundaries and boundary groups. Configure resource discovery. Configure the Exchange Server connector mobile device management. Organize resources using device and user collections. Deploying and managing clients Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings in Configuration Manager Lab : Deploying the Microsoft System Center Configuration Manager client software Preparing the site for client installation Deploying the Configuration Manager client software by using client push installation Lab : Configuring and monitoring client status Configuring and monitoring client health status Lab : Managing client settings Configuring client settings Describe the requirements and considerations for installing the Configuration Manager client software. Deploy the Configuration Manager client software. Configure and monitor client status. Manage Configuration Manager client settings. Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Configuring and managing hardware inventory Lab : Configuring software metering Configuring software metering Lab : Configuring and managing Asset Intelligence Preparing the site for Asset Intelligence Configuring Asset Intelligence Monitoring license agreements by using Asset Intelligence Viewing Asset Intelligence reports Describe inventory collection. Configure and collect hardware and software inventory. Manage inventory collection. Configure software metering. Configure Asset Intelligence. Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Installing a new distribution point Managing content distribution Prepare the infrastructure for content management. Distribute and manage content on distribution points. Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Installing and configuring the Application Catalog roles Creating applications with requirements Deploying applications Lab : Managing application supersedence and removal Managing application supersedence Uninstalling the Excel Viewer application Lab : Deploying virtual applications by using Configuration Manager (Optional) Configuring support for App-V Deploying virtual applications Lab : Using Configuration Manager to deploy Windows Store apps Configuring support for sideloading Windows Store apps Configuring a Windows Store app Deploying Windows 10 apps to users Describe the application management features of Configuration Manager. Create applications. Deploy applications. Manage applications. Configure and deploy virtual applications. Configure and deploy Windows Store apps. Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Lab : Configuring the site for software updates Configuring and synchronizing the software update point Lab : Deploying and managing software updates Determining software update compliance Deploying software updates to clients Configuring automatic deployment rules Describe how the software updates feature integrates with Configuration Manager. Prepare the Configuration Manager site for software updates. Manage the evaluation and deployment of software updates. Configure automatic deployment rules. Monitor and troubleshoot software updates. Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Lab : Implementing Microsoft System Center Endpoint Protection Configuring the System Center Endpoint Protection point and client settings Configuring and deploying Endpoint Protection policies Monitoring Endpoint Protection Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. Configure, deploy, and manage Endpoint Protection policies. Managing compliance and secure data access Overview of Compliance Settings Configuring compliance sett

M207031 Administering System Center Configuration Manager
Delivered OnlineFlexible Dates
Price on Enquiry

IT Fundamentals Plus

By Nexus Human

Duration 2.5 Days 15 CPD hours This course is intended for This course is intended to help participants learn basic principles and techniques of providing PC, mobile, applications, and network support. Overview Upon successful completion of this course, students will have introductory knowledge of computer systems and mobile devices. In this course, students will identify and set up: computer hardware, software, networks, files, wireless devices and discuss safety. Identifying Computer Hardware Identify Types of Computing Devices Identify Internal Computer Components Common Computer Connector Types Identify Common Peripheral Devices Identifying Computer Software Compare Functions and Features of Common Operating Systems Identify Application Software Setting Up a Basic Workstation Connect Hardware Install and Configure Operating Systems Install and Configure Applications Configure Accessibility Options Configuring Network Access Network Connection Types Install and Configure a SOHO Router Network and Alternative Technologies Sharing and Storage Methods Working with Files, Folders, and Applications Create Files Navigate a File Structure Manage Files and Folders Compress and Extract Files Create Screen Captures Configuring and Using Wireless Devices Configuring Wireless Devices Use Wireless Devices Securing Computing Devices Identify Security Threats Apply Security Best Practices Perform Secure Web Browsing Supporting Computers and Users Environmental and Safety Concepts Back Up and Restore Data Manage Software Implement Basic Support Measures

IT Fundamentals Plus
Delivered OnlineFlexible Dates
Price on Enquiry

AN202 IBM Korn and Bash Shell Programming

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for support staff for AIX on POWER systems Overview After completing this course, you should be able to: - Distinguish Korn and bash shell specific features - Use utilities such as sed and awk to manipulate data - Understand system shell scripts such as /etc/shutdown - Write useful shell scripts to aid system administration This course will teach you how to use shell scripts and utilities for practical system administration of AIX (or other UNIX) operating systems. Basic shell conceptsFlow control in a shell ScriptFunctions and typesetShell features such as arithmetic and string handlingUsing regular expressionsUsing sed, awk and other AIX utilities

AN202 IBM Korn and Bash Shell Programming
Delivered OnlineFlexible Dates
Price on Enquiry

AN10 IBM AIX Basics

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface

AN10 IBM AIX Basics
Delivered OnlineFlexible Dates
Price on Enquiry

Querying Data with Microsoft SQL Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Database Administrators, Database Developers, BI professionals, and Business reporting users. Overview Upon successful completion of this course, students will be able to run Queries and retrieve results, perform conditional searches, and retrieve data from multiple tables. Before starting this course, make sure you meet at least one of the following prerequisites: Basic knowledge of the Microsoft Windows operating system and its core functionality. Basic working knowledge of Relational Databases. In this course, students will gain a good understanding of the Transact-SQL language. They will be able to create queries, sort, filter the data, execute procedures with T-SQL. Course Outline 1.Introduction to Microsoft SQL Server 2.Introduction to T-SQL Querying 3.Writing SELECT Queries 4.Querying Multiple Tables 5.Sorting and Filtering Data 6.Working with SQL Server Data Types 7.Using DML to Modify Data 8.Using Built-In Functions 9.Grouping and Aggregating Data 10.Using Subqueries 11.Using Table Expressions 12.Using Set Operators 13.Using Windows Ranking, Offset, and Aggregate Functions 14.Pivoting and Grouping Sets 15.Executing Stored Procedures 16.Programming with T-SQL

Querying Data with Microsoft SQL Server
Delivered OnlineFlexible Dates
Price on Enquiry

AN100 IBM AIX Basics

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface

AN100 IBM AIX Basics
Delivered OnlineFlexible Dates
Price on Enquiry

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools

SonicWALL Network Security Administrator For Sonic OS 7 - SNSA v7 - NA
Delivered OnlineFlexible Dates
Price on Enquiry

Mac Integration Basics 10.15

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users. Overview Organizations are increasingly integrating Mac computers into Windows or other standards-based network environments. This course gives both users and the IT professionals who support them the skills necessary to make integration easy. This two day Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. Directory Services Connect a Mac to an Active Directory server Share Files Connect to file servers. Turn on personal file sharing. Configure Collaborative Services Manage Internet Accounts preferences. Connect to an Exchange Server. Connect Mail to non-Windows servers. Add accounts in Mail, Contacts, and Calendars. Secure a Mac Built-In Security features. Create strong passwords. Use two-factor authentication. Set a firmware password. Lock a Mac screen. Create user accounts. Disable automatic login. Protect start-up disk files. Ensure that the apps you download are safe. Provide network security. Printing Connect to a local printer. Connect to, share, and print from network printers. Move and Back Up Content Move content. Back up content. Run Windows on a Mac Run Windows natively or virtually. Microsoft Office for macOS. Cross-platform apps. Cross-platform files. Troubleshooting How to best troubleshoot macOS. Questions & Answers

Mac Integration Basics 10.15
Delivered OnlineFlexible Dates
Price on Enquiry

H005G IBM Spectrum Scale Basic Administration for Linux and AIX

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This lecture and exercise-based course is for individuals who want to understand how to install, configure, and manage an IBM Spectrum Scale storage cluster. Overview After completing this course, you should be able to: Summarize the key features of IBM Spectrum Scale Describe IBM ESS and Spectrum Scale RAID Install IBM Spectrum Scale and configure a cluster Manage a cluster Implement information lifecycle management (ILM) Configure IBM Spectrum Scale high availability features Back up critical cluster data This course is intended for IT professionals tasked with administering an IBM Spectrum Scale storage cluster in environments running Linux and AIX nodes. The course includes information on installing, configuring, and monitoring an IBM Spectrum Scale cluster. Many Spectrum Scale features are described in lecture materials and then implemented in lab exercises. These features include: Storage management, high availability options, cluster management, and information lifecycle management (ILM) tools. Note: Although the lab environment is running the Linux operating system, the differences in Spectrum Scale compared with an AIX environment are minor. Therefore, the skills acquired during the course can be applied in both Linux and AIX environments. Welcome and course overview Unit 1 - IBM Spectrum Scale overview Exercise 1 - Cluster node preparation Unit 2 - Installation and cluster configuration Exercise 2 - Installation and cluster configuration Unit 3 - Cluster management Exercise 3 - Cluster management and configuration Unit 4 - Information Lifecycle Management (ILM) Exercise 4 - Storage pools, filesets, and policies Unit 5 - High availability and cluster data backups Exercise 5 - Replication and snapshots Course wrap-up and evaluation

H005G IBM Spectrum Scale Basic Administration for Linux and AIX
Delivered OnlineFlexible Dates
Price on Enquiry