Duration 5 Days 30 CPD hours This course is intended for System administrators System integrators Overview By the end of the course, you should be able to meet the following objectives: Introduce troubleshooting principles and procedures Practice Linux commands that aid in the troubleshooting process Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment Explain the purpose of key vSphere log files Identify networking problems based on reported symptoms, validate and troubleshoot the reported problem, identify the root cause and implement the appropriate resolution Analyze storage failure scenarios using a logical troubleshooting methodology, identify the root cause, and apply the appropriate resolution to resolve the problem Troubleshoot vSphere cluster failure scenarios and analyze possible causes Diagnose common VMware vSphere High Availability problems and provide solutions Identify and validate VMware ESXi⢠host and VMware vCenter Server problems, analyze failure scenarios, and select the correct resolution Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems Troubleshoot performance problems with vSphere components This five-day, hands-on training course provides you with the advanced knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere© 7.x environment. This workshop increases your skill and competence in using the command-line interface, VMware vSphere© Client?, log files, and other tools to analyze and solve problems Course Introduction Introductions and course logistics Course objectives Introduction to Troubleshooting Define the scope of troubleshooting Use a structured approach to solve configuration and operational problems Apply a troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency Troubleshooting Tools Use command-line tools (such as Linux commands, vSphere CLI, ESXCLI) to identify and troubleshoot vSphere problems Identify important vSphere log files and interpret the log file contents Troubleshooting Virtual Networking Analyze and resolve standard switch and distributed switch problems Analyze virtual machine connectivity problems and fix them Examine common management network connectivity problems and restore configurations Troubleshooting Storage Troubleshoot and resolve storage (iSCSI, NFS, and VMware vSphere© VMFS) connectivity and configuration problems Analyze and resolve common VM snapshot problems Identify multipathing-related problems, including common causes of permanent device loss (PDL) and all paths down (APD) events and resolve these problems Troubleshooting vSphere Clusters Identify and recover from problems related to vSphere HA Analyze and resolve VMware vSphere© vMotion© configuration and operational problems Analyze and resolve common VMware vSphere© Distributed Resource Scheduler? problems Troubleshooting Virtual Machines Identify possible causes and resolve virtual machine power-on problems Troubleshoot virtual machine connection state problems Resolve problems seen during VMware Tools? installations Troubleshooting vCenter Server and ESXi Analyze and fix problems with vCenter Server services Analyze and fix vCenter Server database problems Examine ESXi host and vCenter Server failure scenarios and resolve the problems
Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for IT professionals interested in understanding the capabilities of the MDS 9000 Series using Cisco DCNM. IT professionals seeking a deeper knowledge of SAN operations using both CLI and DCNM may take the alternative 4-day course, Configuring Cisco MDS 9000 Series Switches (DCMDS). Much of the hands-on work in DCNMS is also covered in DCMDS. This course is also designed for professionals in the following roles including: Consulting systems engineer Data center engineers Data center operators Data center network management engineers Storage network administrator Network administrator Network engineer Sales engineer Technical solutions architect Overview After taking this course, you should be able to: Describe Cisco DCNM SAN components, licensing, high availability, and security features Describe Cisco DCNM SAN reports, alerts, event forwarding, and troubleshooting tools, including Cisco DCNM SAN Insights and SAN Analytics features The Managing SAN Infrastructure with Cisco© Data Center Network Manager (DCNMS) v1.0 course provides product training that that teaches you to deploy, operate, and maintain the Cisco Data Center Network Manager (DCNM) SAN solutions. You will learn to configure, monitor, and troubleshoot Cisco storage networking infrastructure using Cisco DCNM. Cisco DCNM provides management, automation, visualization, and troubleshooting across Cisco Nexus© and Cisco Multilayer Distributed Switching (MDS) solutions.You will learn how the DCNM serves as a Storage Area Network (SAN) solution for managing and troubleshooting Cisco storage architecture. Implementing Cisco DCNM SAN Cisco DCNM Solution Overview Implement Cisco DCNM SAN Integrate Cisco DCNM SAN with VMware vCenter Cisco DCNM SAN Licensing Monitoring and Troubleshooting SAN Infrastructure Using Cisco DCNM SAN Cisco DCNM SAN Alerts and Reports Dashboards in Cisco DCNM SAN SAN Troubleshooting with the Cisco DCNM SAN Analytics and Telemetry Streaming Additional course details: Nexus Humans Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for The audience for this course should have previous experience with functional or technical focus in Dynamics 365: Finance and Operations Applications. Primarily for those who are aspired to be and new to solution architect role Overview After completing this course, students will be able to: Understand the tasks expected to be completed by the solution architect for Dynamics implementation Complete the solution blueprint artifacts Know where to find technical information to address their customer's questions This course is developed for those aspired to be and new to the solution architect role. This course provides the technical information focusing on application architecture and technical skills to start their journey into this role. This course will not cover the industrial skills and delivery skills required for this role. The Architect Role The solution architect role Manage Interactions with FastTrack Get to know FastTrack Make the most of FastTrack templates Solution Blueprint Solution blueprint definition and components Project governance and timeline Solution architecture and organizational structure Working with business process catalog Define Environments, Tools, and Deployment Strategy Understand environment planning Application lifecycle management and deployment strategy Using LCS and Azure DevOps Determine Data Management Strategy Data management overview Develop data migration strategy Determine Integration and Interfaces Strategies Develop integration strategy Integration options Define Security Architecture Important security aspects Security framework Define security strategy Define Testing Strategy Testing strategy overview Testing planning and execution Define Performance Testing Strategy Prepare for performance topics Utilize performance testing tools Business Intelligence and Reporting Implement business intelligence and reporting Determine Licensing and Support Understand licensing estimation Understand support options Prepare for Go-Live Complete solution blueprint Prepare for go-live Class recap Additional course details: Nexus Humans MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-700T00 Microsoft Dynamics 365: Finance and Operations Apps Solution Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings
Duration 1 Days 6 CPD hours This course is intended for The course is designed for anyone desiring or requiring an understanding of how to manage cloud technologies as a business asset. This includes: IT Asset Managers Hardware Asset Managers Software Asset Managers Cloud Asset Managers Cloud Project Managers IT Managers IT Cloud Managers and Developers Cloud Vendor Managers IT Procurement IT Security Professionals Overview The student will learn the nuances of cloud assets and manage them from a financial, risk, compliance, and efficiency perspective. Upon completion of the course, the student will be able to: Understand the attributes of and requirements for managing cloud assets Define and develop cloud asset management processes Create cloud asset policies Develop and implement a communication plan for managing cloud assets Identify tool requirements to support the cloud asset type Develop cloud vendor contract requirements Understand and articulate individual and department responsibilities for the cloud asset management program Define requirements for managing cloud vendors Assess the organization's cloud asset management readiness This course takes an in-depth look at cloud assets. It defines how to manage these assets using best practical practices for the primary cloud architectures Software-as-a-Service, Platform-as-a-Service, and Infrastructure as-a-Service. What is Information Technology Asset Management? Why Cloud Solutions Need ITAM Introducing Cloud Services Vendor's Tools Cloud Vendor Management Communication Managing SaaS Acquire Phase Receive Phase Deploy Phase In-Use Phase Recover Phase Dispose Phase Example Vendor Reports Terms and Conditions Vendor Scorecard Managing IaaS and PaaS ITAM Data Center Challenges, Before Virtualization ITAM Data Center Challenges, with Virtualization The Data Center Transformation The End-User ITAM Supporting Processes Acquire Phase Receive Phase Deploy Phase In-Use Phase Recover Phase Dispose Phase Software Asset Management Example Vendor Reports Terms and Conditions Vendor Scorecard Disaster Recovery PlanDisposal of Replaced IT AssetsCAM and the ITAM Hierarchy Additional course details: Nexus Humans The Definitive Guide to Cloud Asset Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the The Definitive Guide to Cloud Asset Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers. System and technical support engineers. Customers who are deploying and maintaining Cisco Unified CCE solution products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Understand CCE solutions, architecture, solution options, deployment models, integrated features and call flow options. Understand underlying Cisco Unified CCE processes, messaging and fault tolerance schemes. Install, upgrade and make basic configurations in Cisco Unified Communications Manager. Install, create databases, integrate, and upgrade all ICM components to include the ICM Router, Logger, Administration & Data Server, Peripheral Gateways, CTI Gateway and Cisco Finesse. Install, integrate, configure, and upgrade Cisco Unified CVP components to include the CVP Call Server, Voice XML Server, Media Server, Reporting Server and Cisco VVB. Install, upgrade, and make configurations for Cisco Unified Intelligence Center and Cisco Outbound Option Agent- and IVR-based campaigns. This course will provide the student with the underlying knowledge to understand deployment design solutions, requirements for deployment, and how to install and configure all major Cisco Unified CCE components. As a part of deployment activities, the student will understand how to install and integrate Intelligent Contact Manager (ICM) with Active Directory, how to install and integrate Cisco Unified CVP components using an IOS-based voice browser and Cisco Virtualized Voice Browser (Cisco VVB), how to install and integrate Cisco Finesse, how to install and integrate Cisco Unified Intelligence Center with Active Directory and associated Data Sources for reporting purposes, and how to install and configure Agent- and IVR-based Outbound Option dialing campaigns. And finally, the student will learn how to setup and use troubleshooting tools including RTMT, System CLI, Diagnostic Framework, and ICM command-line utilities to find status information and log files, and to track a call from the point of entry to the agent desktop. Cisco Unified Contact Center Enterprise Overview Lesson 1: Presenting Cisco Unified Contact Center Enterprise Lesson 2: Cisco Unified CCE Core Components Lesson 3: Cisco Unified CCE Options Lesson 4: Basic Call Flow Models Cisco Unified CCE Protocols, Processes and Services Lesson 1: Cisco Unified CM Lesson 2: Cisco Unified CCE/Intelligent Contact Manager Lesson 3: Cisco Unified CVP Installing Cisco Unified Communications Manager Lesson 1: Installation Prerequisites Lesson 2: Cisco Unified CM Installation Lesson 3: Post-installation Configurations Lesson 4: Creating Basic Infrastructure Lesson 5: Upgrading Cisco Unified CM Installing Intelligent Contact Manager Lesson 1: Installation Requirements Lesson 2: Pre-installation Tasks Lesson 3: Install the Main Installer Lesson 4: Install the Central Controller ?Lesson 5: Install the Administration and Data Server Lesson 6: Install the Peripheral Gateway Lesson 7: Install CTI Services Installing Cisco Unified CVP Lesson 1: Installation Prerequisites Lesson 2: Install the CVP Server Lesson 3: Configure Cisco Unified CVP Components Lesson 4: Upgrading Cisco Unified CVP Upgrade Path Installing and Configuring Cisco Unified CCE Options Lesson 1: Cisco Outbound Option Lesson 2: Cisco Unified Intelligence Center Supporting Cisco Unified CCE Lesson 1: Maintenance Activities Lesson 2: UCCE Troubleshooting Tools
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network security engineers Network security architects ISE administrators Senior Security Operations Center (SOC) personnel responsible for Incidence Response Cisco integrators and partners Overview After taking this course, you should be able to: Describe the Cisco Identity Services Engine (ISE) Explain Cisco ISE deployment Describe Cisco ISE policy enforcement components Describe Cisco ISE policy configuration Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support Configure guest access Configure hotspots and guest portals Describe the Cisco ISE profiler services Describe profiling best practices and reporting Configure a Cisco ISE BYOD solution Configure endpoint compliance Configure client posture services Configure Cisco ISE device administration Describe Cisco ISE TrustSec configurations The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco© Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification Course Outline Introducing Cisco ISE Architecture Introducing Cisco ISE Deployment Introducing Cisco ISE Policy Enforcement Components Introducing Cisco ISE Policy Configuration Troubleshooting Cisco ISE Policy and Third-Party NAD Support Introducing Web Authentication and Guest Services Configuring Hotspots and Guest Portals Introducing the Cisco ISE Profiler Introducing Profiling Best Practices and Reporting Configuring Cisco ISE BYOD Introducing Cisco ISE Endpoint Compliance Services Configuring Client Posture Services and Compliance Working With Network Access Devices Exploring Cisco TrustSec Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v4.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced vSphere administrators who want to use available tools to automate day-to-day tasks. Overview By the end of the course, you should be able to meet the following objectives:Describe the features and benefits of automation in a vSphere environmentUnderstand the role of the vSphere Web services API in automationUse the Managed Object Browser to view the structure of the vSphere Web services API and theVMware vCenter Server? inventoryUse vSphere PowerCLI to deploy and manage virtual machines and virtual infrastructureRun and manage vRealize Orchestrator workflows from the libraryDesign, develop, and run custom, reusable vRealize Orchestrator workflowsIncorporate JavaScript into vRealize Orchestrator workflowsSelect the appropriate tool for automating tasks in vCenter Server This course equips experienced administrators with the knowledge to use the automation tools that all vSphere customers have access to. Students learn how to automate administration tasks with VMware vSphere© PowerCLI? and VMware vRealize© Orchestrator?. Course Introduction Introductions and course logistics Course objectives Automation in vSphere Identify the features and the advantages of automation List the tools used to automate vCenter Server tasks vSphere API Identify the function of an API Recognize the components of VMware vSphere© API Understand how an API is consumed View objects and invoke methods with the Managed Object Browser vSphere PowerCLI Basics Connect vSphere PowerCLI to vCenter Server systems and VMware ESXi? hosts Understand vSphere PowerCLI concepts Use vSphere PowerCLI cmdlets Deploy and manage virtual infrastructure Advanced vSphere PowerCLI and the vSphere API Explore the vSphere object model Capture code with Onyx Use vSphere API documentation to analyze vCenter Server actions View objects with the Get-View cmdlet vSphere PowerCLI Use Cases Manage host networking Create a distributed switch Migrate hosts Create reports vRealize Orchestrator Basics Identify workflow components Run and manage library workflows Edit a workflow Build and schedule a simple workflow Debug a workflow vRealize Orchestrator Advanced Identify and use advanced vRealize Orchestrator workflow elements Implement vRealize Orchestrator workflow nesting Use variable types in a workflow Use JavaScript to create complex workflows Incorporate an Oynx script in a workflow vRealize Orchestrator Use Cases Create automation workflows that map to real-world scenarios Create reporting workflows that map to real-world scenarios Create migration workflows that map to real-world scenarios Create provisioning workflows that map to real-world scenarios vRealize Orchestrator PowerCLI Plug-In Invoke external scripts and pass workflow parameters as script inputs Generate new vRealize Orchestrator actions from Windows PowerShell and vSphere PowerCLI scripts and cmdlets Browse snap-ins and their associated cmdlets in the vRealize Orchestrator workflow editor vRealize Orchestrator Integration Understand the connectivity options for vRealize Orchestrator Differentiate between north-facing and south facing APIs List the APIs and their use cases Run a workflow through a REST call Guest Operations with vRealize Orchestrator and vSphere PowerCLI Use the most appropriate tools to perform guest operations Software Development Process & Tools Understand the software development lifecycle Understand version control system tools Map the correct tools to vRealize Orchestrator and vSphere PowerCLI