Inne Autoryzowane Szkolenia
DO180 Red Hat OpenShift I: Containers & Kubernetes
Length
Classroom: 3 days
Virtual training: 4 days
Overview
Learn to build and manage containers for deployment on a Kubernetes and Red Hat OpenShift cluster Red Hat OpenShift I: Containers & Kubernetes (DO180) helps you build core knowledge in managing containers through hands-on experience with containers, Kubernetes, and the Red Hat® OpenShift® Container Platform. These skills are needed for multiple roles, including developers, administrators, and site reliability engineers.
This course is based on Red Hat OpenShift Container Platform 4.5.
Course content summary
Understand container and OpenShift architecture.
Create containerized services.
Manage containers and container images.
Create custom container images.
Deploy containerized applications on Red Hat OpenShift.
Deploy multi-container applications.
Audience
Developers who wish to containerize software applications
Administrators who are new to container technology and container orchestration
Architects who are considering using container technologies in software architectures
Site reliability engineers who are considering using Kubernetes and Red Hat OpenShift
Prerequisites
Be able to use a Linux terminal session, issue operating system commands, and be familiar with shell scripting
Have experience with web application architectures and their corresponding technologies
Being a Red Hat Certified System Administrator (RHCSA®) is recommended, but not required
Course Outline
Introduce container technology
Describe how software can run in containers orchestrated by Red Hat OpenShift Container Platform.
Create containerized services
Provision a server using container technology.
Manage containers
Manipulate pre-built container images to create and manage containerized services.
Manage container images
Govern the life cycle of a container image from creation to deletion.
Create custom container images
Design and code a Docker file to build a custom container image.
Deploy containerized applications on Red Hat OpenShift
Use single container applications on Red Hat OpenShift Container Platform.
Deploy multi-container applications
Set up applications that are containerized using multiple container images.
Troubleshoot containerized applications
Regulate a containerized application deployed on Red Hat OpenShift.
Comprehensive review of curriculum
Demonstrate how to containerize a software application, test it with Podman, and deploy it on a Red Hat OpenShift cluster.
DO181 Red Hat OpenShift I: Containers & Kubernetes with exam
Length
Classroom: 3 days + exam
Virtual training: 4 days + exam
Overview
Learn to build and manage containers for deployment on a Kubernetes and Red Hat OpenShift cluster
DO181 Red Hat OpenShift I: Containers & Kubernetes with exam helps you build core knowledge in managing
containers through hands-on experience with containers, Kubernetes, and the Red Hat® OpenShift® Container Platform.
These skills are needed for multiple roles, including developers, administrators, and site reliability engineers.
This course is based on Red Hat OpenShift Container Platform 4.5. The EX180 Red Hat Certified Specialist in Containers
and Kubernetes exam is included.
Course content summary
Understand container and OpenShift architecture.
Create containerized services.
Manage containers and container images.
Create custom container images.
Deploy containerized applications on Red Hat OpenShift.
Deploy multi-container applications.
Audience
Developers who wish to containerize software applications
Administrators who are new to container technology and container orchestration
Architects who are considering using container technologies in software architectures
Site reliability engineers who are considering using Kubernetes and Red Hat OpenShift
Prerequisites
Be able to use a Linux terminal session, issue operating system commands, and be familiar with shell scripting
Have experience with web application architectures and their corresponding technologies
Being a Red Hat Certified System Administrator (RHCSA®) is recommended, but not required
Course Outline
Introduce container technology
Describe how software can run in containers orchestrated by Red Hat OpenShift Container Platform.
Create containerized services
Provision a server using container technology.
Manage containers
Manipulate pre-built container images to create and manage containerized services.
Manage container images
Govern the life cycle of a container image from creation to deletion.
Create custom container images
Design and code a Docker file to build a custom container image.
Deploy containerized applications on Red Hat OpenShift
Use single container applications on Red Hat OpenShift Container Platform.
Deploy multi-container applications
Set up applications that are containerized using multiple container images.
Troubleshoot containerized applications
Regulate a containerized application deployed on Red Hat OpenShift.
Comprehensive review of curriculum
Demonstrate how to containerize a software application, test it with Podman, and deploy it on a Red Hat OpenShift cluster.
DO288 Red Hat OpenShift Development II: Containerizing Applications (v4.5)
Length
Classroom: 3 days + exam
Virtual training: 4 days + exam
Overview
Hands-on training to boost developer productivity powered by Red Hat OpenShift
Red Hat OpenShift Development I: Containerizing Applications (DO288) enhances understanding of containers as a key technology for configuring and deploying applications and microservices. As the second course in the OpenShift development track, this offering will teach you how to design, build, and deploy containerized software applications to an OpenShift cluster.
Whether you’re writing container-native applications or migrating existing brownfield applications, you’ll learn how to boost developer productivity powered by Red Hat® OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.
This course is based on Red Hat OpenShift Container Platform 4.5.
Course content summary
Manager and trigger application builds.
Customize an existing source-to-image base image.
Create an OpenShift template.
Create health checks to monitor and improve application reliability.
Create and deploy a Jenkins pipeline for continuous integration and continuous deployment.
Create and deploy cloud-native application for OpenShift.
Audience
Enterprise application developers
Site reliability engineers
Prerequisites
Red Hat recommends these prerequisites:
Complete the DO180 Introduction to Containers, Kubernetes, and Red Hat OpenShift, or have equivalent knowledge
Being a Red Hat Certified System Administrator or having earned a higher certification is helpful for navigation and usage of the command line, but is not required
Course Outline
Deploy and manage applications on an OpenShift cluster
Deploy applications using various application packaging methods to an OpenShift cluster and manage their resources.
Design containerized applications for OpenShift
Select a containerization method for an application and create a container to run on an OpenShift cluster.
Publish enterprise container images
Create an enterprise registry and publish container images to it.
Manage building applications
Describe the OpenShift build process, in addition to triggering and managing builds.
Customize source-to-image builds
Customize an existing S2I base image and create a new one.
Create applications from OpenShift templates
Describe the elements of a template and create a multicontainer application template.
Manage application deployments
Monitor application health and implement various deployment methods for cloud-native applications.
Implement CI/CD pipelines in OpenShift
Create and deploy Jenkins pipelines to facilitate continuous integration and continuous deployment (CI/CD) with OpenShift.
Build cloud-native applications on OpenShift
Create and deploy cloud-native applications on OpenShift.
DO280 Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster
Length
Classroom: 3 days
Virtual training: 4 days
Overview
Create, configure, manage, and troubleshoot OpenShift clusters
DO280 Red Hat OpenShift Administration II: Operating a Production Kubernetes Cluster teaches you how to install
and administer the Red Hat® OpenShift® Container Platform. This hands-on, lab-based course shows you how to install, configure, and manage OpenShift clusters and deploy sample applications to further understand how developers will use the platform.
This course is based on Red Hat® Enterprise Linux® 8.0 and Openshift Container Platform 4.5.
OpenShift is a containerized application platform that allows enterprises to manage container deployments and scale their
applications using Kubernetes. OpenShift provides predefined application environments and builds upon Kubernetes to provide
support for DevOps principles such as reduced time to market, infrastructure-as-code, continuous integration (CI), and continuous delivery (CD).
Course summary
Describe the Red Hat OpenShift Container Platform cluster installation and update processes
Troubleshoot application deployments
Configure authentication using local users
Control access to projects using role-based access control (RBAC)
Configure service and container networking
Configure pod scheduling using labels and selectors
Limit compute resource usage
Scale a cluster
Monitor cluster events and alerts
Audience
This course is designed for system administrators, system architects, and developers who want to install and configure Red Hat OpenShift
Container Platform.
System and Software Architects interested in understanding features and functionality of an OpenShift cluster.
System Administrators interested in the initial establishment of a cluster.
Cluster Operators interested in the ongoing maintenance of a cluster.
Site Reliability Engineers interested in the ongoing maintenance and troubleshooting of a cluster.
Prerequisites
Become a Red Hat Certified System Administrator, or demonstrate equivalent Red Hat Enterprise Linux system administration experience
Complete the DO180 Red Hat OpenShift I: Containers & Kubernetes or demonstrate equivalent experience with containers, Kubernetes,
and OpenShift basics
Course Outline
Describe the Red Hat OpenShift Container Platform
Describe the architecture of the Red Hat OpenShift Container Platform (RHOCP).
Verify the health of a cluster
Describe OpenShift installation methods and verify the health of a newly installed cluster.
Configure authentication and authorization
Configure authentication with the HTPasswd identity provider and assign roles to users and groups.
Configure application security
Restrict permissions of applications using security context constraints and protect access credentials using secrets.
Configure OpenShift networking for applications
Troubleshoot OpenShift software-defined networking (SDN) and configure network policies.
Control pod scheduling
Control which nodes a pod runs on.
Describe cluster updates
Describe how to perform a cluster update
Manage a cluster with the web console
Manage a Red Hat OpenShift cluster using the web console.
RH 124 Red Hat System Administraton I
Czas trwania – 5 dni
Informacje o kursie
Pierwszy kurs w ścieżce rozwoju jest przeznaczony dla osób zaczynających pracę z systemem Red Hat Enterprise Linux. Kurs koncentruje się na zadaniach administracyjnych, które wykonuje się w codziennej pracy. Aktywnie angażując słuchacza na zadaniach praktycznych, dyskusjach oraz wielu innych formach aktywności podczas zajęć, szkolenie daje solidne podstawy do efektywnego zarządzania systemami klasy Enterprise. Omówione narzędzia GUI, jak i odpowiadające im polecenia linii komend pozwalają po ukończeniu szkolenia na wykonywanie takich czynności jak instalacja systemu operacyjnego, zarządzanie łącznością sieciową systemu, zarządzanie pamięciami masowymi czy proste zarządzanie bezpieczeństwem systemu.
Co warto wiedzieć przed szkoleniem?
Mile widziane doświadczenie w administracji systemami operacyjnymi
Zagadnienia
Dostęp do wiersza poleceń.
Logowanie do systemu Linux i realizacja prostych poleceń z użyciem powłoki.
Administrowanie plikami z wiersza poleceń.
Kopiowanie, przenoszenie, tworzenie, usuwanie i organizowanie plików z poziomu powłoki Bash.
Uzyskiwanie pomocy w Red Hat Enterprise Linux.
Rozwiązywanie problemów przy pomocy systemów pomocy online i narzędzi wsparcia Red Hat.
Tworzenie, przeglądanie i edycja plików tekstowych.
Tworzenie, przeglądanie i edycja plików tekstowych z wyjścia poleceń i w edytorze.
Zarządzanie lokalnymi użytkownikami i grupami Linux.
Zarządzanie lokalnymi użytkownikami i grupami Linux oraz zarządzanie lokalnymi politykami haseł.
Monitorowanie dostępu do plików z przy wykorzystaniu uprawnień systemu plików w Linux.
Nadawanie uprawnień do plików i intepretowania efektów różnych kombinacji uprawnień.
Kontrolowanie i zarządzanie procesami Linux.
Uzyskiwanie informacji o systemie i kontrola uruchomionych procesów.
Kontrolowanie usług i daemonów.
Zarządzanie i monitoring usług sieciowych i daemonów systemowych z użyciem systemd.
Konfiguracja i zabezpieczanie usługi OpenSSH.
Dostęp i zapewnienie bezpiecznego dostępu do wiesza poleceń w systemach zdalnych z wykorzystaniem OpenSSH.
Analiza i przechowywanie logów.
Lokalizowanie i dokładna interpretacja odpowiednich plików logów systemowych w celu rozwiązywania błędów.
Zarządzanie sieciami w Red Hat Enterprise Linux.
Konfiguracja podstawowa sieci Ipv4 w systemach Red Hat Enterprise Linux.
Gromadzenie plików i ich kopiowanie pomiędzy systemami.
Archiwizacja i kopiowanie spomiędzy różnymi systemami.
Instalacja i aktualizacja oprogramowania.
Pobieranie, instalacja, aktualizacja i zarządzanie pakietami od Red Hat i repozytoriami pakietów yum.
Dostęp do systemu plików Linux.
Dostęp i inspekcja istniejących systemów plików w systemie Red Hat Enterprise Linux.
Systemy wirtualne.
Tworzenie i użytkowanie maszyn wirtualnych z wykorzystaniem KVM i libvirt.
Powtórka
Ćwiczenia praktyczne. Sprawdzenie własnych umiejętności zdobytych na szkoleniu.
RH 134 Red Hat System Administration II
Czas trwania – 4 dni
Informacje o kursie
Red Hat System Administration II to szkolenie opracowane dla specjalistów IT, pracujących w pełnym wymiarze jako administratorzy systemów Red Hat Enterprise Linux. Uczestnicy biorą udział w aktywnościach zwiększających zaangażowanie, poprawiających zapamiętywanie oraz rozumienie często skomplikowanych mechanizmów. Opierając się na solidnych podstawach zdobytych na szkoleniu System Administration I, uczestnicy zagłębią się w detale narzędzi wykorzystywanych w codziennej administracji systemem. Pod koniec szkolenia, uczestnik będzie potrafił, zarządzać zaawansowanymi pamięciami masowymi, systemami plików, zarządzać oprogramowaniem czy kontrolą dostępu.
Co warto wiedzieć przed szkoleniem?
Uczestnictwo w kursie Red Hat System Administration I.
Poruszane tematy w przedmiotowym kursie wymagają od uczestnika wiedzy z kursu Red Hat System Administration I.
Zagadnienia
Automatyzacja instalacji przy wykorzystaniu Kickstart.
Automatyzacja instalacji systemów Red Hat Enterprise Linux przy użyciu Kickstart.
Wyrażenia regularne.
Izolacja i wyszukiwanie zawartości plików tekstowych z wykorzystaniem wyrażeń regularnych i narzędzia grep.
Tworzenie i edycja plików tekstowych w vim.
Edytor vim.
Harmonogram zadań w Linux.
Wytyczanie zadań w celu automatycznego wykonania w przyszłości.
Zarządzanie priorytetami procesów w Linux.
Oddziaływanie priorytetów na działanie procesów w Linux.
Monitoring dostępu do plików poprzez listy kontroli dostępu (ACL).
Zarządzanie bezpieczeństwem plików z wykorzystaniem list kontroli dostępu POSIX.
Zarządzanie SELinux.
Zarządzanie zachowaniem SELinux w celu zapewnienia bezpieczeństwa systemu.
Podłączenie do sieciowych usług zarządzania tożsamością.
Konfiguracja systemu w celu użycia usług zarządzania tożsamością.
Tworzenie dysków, partycji i systemów plików w Linux.
Zarządzanie prostymi partycjami i systemami plików.
Zarządzanie woluminami logicznymi (LVM).
Zarządzanie LVM z poziomu wiersza poleceń.
Dostęp do usług udostępniania plików w sieci z wykorzystaniem NFS.
Bezpieczny dostęp do udziałów NFS.
Dostęp do usług udostępniania plików w sieci z wykorzystaniem SMB.
Wykorzystanie autofs i wiersza poleceń do montowania/odmontowania udziałów SMB. 1
Kontrola i rozwiązywanie problemów związanych z procesem startu systemu Red Hat Enterprise Linux.
Ograniczenie komunikacji sieciowej z użyciem zapory sieciowej.
Konfiguracja podstawowej zapory sieciowej.
Powtórka.
Ćwiczenia praktyczne. Sprawdzenie własnych umiejętności zdobytych na szkoleniu.
RH 190 Red Hat Command Line Skills
Czas trwania 3 dni
Informacje o kursie
Red Hat Command Line Skills to szkolenie dla specjalistów IT, pragnących nauczyć się sprawnej i profesjonalnej obsługi systemu Red Hat Enterprise Linux wyłącznie z zastosowaniem powłoki wiersza poleceń (SHELL).
Na szkolenie nie są używane żadne narzędzia graficzne.
Co warto wiedzieć przed szkoleniem?
Pomocna będzie podstawowa umiejętność pracy w linii poleceń.
Zagadnienia
Dostęp do linii poleceń.
Lokalny i zdalny dostęp do linii poleceń. Zdobywanie uprawnień administracyjnych.
Zarządzanie plikami z linii poleceń.
Przeglądanie hierarchii systemu plików, używanie ścieżek dostępu, zarządzanie plikami i katalogami.
Uzyskiwanie pomocy w trybie tekstowym.
Dostęp do dokumentacji system Linux.
Średnio zaawansowane narzędzia linii poleceń.
Używanie twardych linków, archiwizacja i kompresja plików oraz wysyłanie ich do zdalnego systemu, używanie VIMa do edycji plików tekstowych.
Wyrażenia regularne, potoki i przekierowania I/O.
Używanie wyrażeń regularnych do wyszukiwania wzorców; przekierowywanie wyjścia danych oraz używanie potoków w celu łączenia poleceń.
Zarządzanie kontami użytkowników.
Zarządzenia lokalnymi kontami i grupami użytkowników. Zarządzanie hasłami.
Kontrola dostępu do plików.
Zarządzanie właścicielami oraz uprawnieniami do plików.
Zarządzanie procesami.
Zarządzenia harmonogramem procesów.
Instalowanie i zarządzanie oprogramowaniem.
Zarządzanie oprogramowaniem.
Zarządzenie zainstalowanymi usługami.
Graficzna instalacja systemu.
Instalacja stacji roboczej.
Zarządzenie wirtualnymi maszynami.
RH 200 RHCSA Rapid Track Course
Czas trwania – 5 dni
Informacje o kursie
RHCSA Rapid Track Course to szkolenie opracowane dla doświadczonych administratorów systemów Linux, pragnących pogłębić swoją wiedzę tak, aby przystąpić do egzaminu RHCSA. Techniki nauczania wykorzystane na kursie maksymalizują proces zapamiętywania oraz poznawania nowych pojęć.
Co warto wiedzieć przed szkoleniem?
Należy posiadać doświadczenie z administracją systemami Linux w pełnym wymiarze przez okres 1-3 lat.
Uczestnik szkolenia powinien posiadać podstawowe doświadczenie z minimalnym wsparciem w dokumentacji w:
System Linux,
Powłoka Bash, zarządzanie zadaniami (&, fg, bg, jobs), rozszerzenia powłoki, przekierowania we/wy, potoki,
Adresacja sieci IPv4 i podstawy routingu, TCP/UDP i porty,
Środowisko graficzne GNOME 3,
Edycja plików tekstowych z poziomu wiersza poleceń z użyciem programu vim lub innych,
Przeszukiwanie dokumentacji z użyciem man i info,
Koncepcja uprawnień do plików,
Proces interaktywnej instalacji systemu Red Hat Enteprise Linux,
Planowanie zadań z użyciem cron i at,
Narzędzia do archiwizacji i kompresji takie jak tar i zip,
Ścieżki względne i bezwzględne,
Wyszukiwanie plików z użyciem find i locate
Zagadnienia
Dostęp do wiersza poleceń.
Logowanie do systemu Linux i wykonanie prostych poleceń z użyciem powłoki.
Zarządzanie plikami z wiersza poleceń.
Kopiowanie, przenoszenie, tworzenie, usuwanie i organizowanie plików z poziomu powłoki Bash
Zarządzanie lokalnymi użytkownikami i grupami Linux.
Zarządzanie lokalnymi użytkownikami i grupami Linux oraz zarządzanie lokalnymi politykami haseł.
Kontrolowanie dostępu do plików z wykorzystaniem uprawnień systemu plików w Linux.
Ustawianie uprawnień do plików i intepretowania efektów różnych kombinacji uprawnień.
Zarządzanie SELinux.
Wykorzystanie SELinux do zarządzanie dostępem do plików oraz rozwiązywanie problemów z SELinux.
Monitorowanie i zarządzanie procesami Linux.
Uzyskiwanie informacji o systemie i kontrola uruchomionych procesów.
Instalacja i aktualizacja oprogramowania.
Pobieranie, instalacja, aktualizacja i zarządzanie pakietami od Red Hat i repozytoriami pakietów yum.
Kontrolowanie usług i daemonów.
Zarządzanie i monitoring usług sieciowych i daemonów systemowych z użyciem systemd.
Zarządzanie sieciami w Red Hat Enterprise Linux.
Konfiguracja podstawowa sieci Ipv4 w systemach Red Hat Enterprise Linux.
Analiza i przechowywanie logów.
Lokalizowanie i dokładna interpertacja odpowiednich plików logów systemowych w celu rozwiązywania błędów.
Zarządzanie pamięcią masową i systemami plików.
Tworzenie i użytkowanie partycji, woluminów logicznym, systemów plików i przestrzeni wymiany.
Harmonogram zadań.
Planowanie zadań z wykorzystaniem cron i systemd timer units.
Montowanie sieciowych systemów plików.
Dostęp do sieciowych serwerów plików z wykorzystaniem NFS i SMB.
Ograniczenie komunikacji sieciowej z użyciem Firewalld.
Konfiguracja podstawowej zapory sieciowej.
Wirtualizacja i Kickstart.
Zarządzanie maszynami wirtualnymi w KVM i instalacja z wykorzystaniem Kickstart.
JB348 Zaawansowane Administrowanie platformą aplikacyjną JBoss
Czas trwania – 4 dni
Informacje o kursie
Kurs przeznaczony jest dla doświadczonych administratorów systemów odpowiedzialnych za wdrażanie i administrowanie JBoss Enterprise Application Platform (EAP) w dużych środowiskach produkcyjnych. W ramach zajęć poruszamy tematy związane z klastrami, strojeniem wydajności i estymowaniem rezerw mocy obliczeniowej w instancjach JBoss EAP. Oprócz wiedzy dotyczącej bezpośrednio zaawansowanych aspektów administracji JBoss Operations Network, słuchacze zapoznawani są z zagadnieniami związanymi z identyfikacją wąskich gardeł przetwarzania oraz konfiguracją JVM dla większych obciążeń. Prezentowane są właściwe praktyki dotyczące np. równoważenia obciążenia i replikacji oraz sposoby uaktualniania działających instancji aplikacji.
Co warto wiedzieć przed szkoleniem?
Umiejętność administrowania serwerem JBoss na poziomie wiedzy dostarczanej w szkoleniu JB336 Administrowanie platformą aplikacyjną Jboss.
Zagadnienia
Installation
Given the proper installation media, perform Red Hat® JBoss® Enterprise Application Platform 6 installations that are repeatable, upgradeable, and silent.
Clustering
Demonstrate a proficient knowledge of clustering components, their configuration, and application to clustered architectures.
Deployment
Deploy an application in various types of production environments.
Scripting
Script various configuration and management scenarios using command line interface (CLI).
Management
Use various tools to monitor and manage JBoss Enterprise Application Platform.
Messaging
Learn how to manage supported messaging systems.
Security
Configure security settings that include authentication, authorization, networking, and the management interfaces.
Overview of JBoss Operations Network
Learn the functionality of JBoss Operations Network and its use cases. Also learn how to install a JBoss Operations Network server, an agent, and agent plug-ins.
Monitoring resources
Learn how to use JBoss Operations Network to monitor managed resources, including defining alerts, baselines, and notifications.
JB249 Administrowanie platforma aplikacyjna JBoss
Czas trwania 5 dni
Informacje o kursie
W ramach zajęć prezentujemy najlepsze praktyki w zakresie instalacji i konfiguracji JBoss Enterprise Application Platform 6, poprzez warsztaty praktyczne, prezentacje procedur i rozwiązywanie zbliżonych do rzeczywistych zadań, którym administrator powinien sprostać, aby skutecznie wdrażać i zarządzać aplikacjami na JBoss Enterprise Application Platform. Po ukończeniu tego kursu słuchacz powinien być przygotowany do zdawania egzaminu Certified JBoss Application Administrator (JBCAA).
Co warto wiedzieć przed szkoleniem?
Należy posiadać podstawowe doświadczenie w administracji systemem Microsoft Windows, UNIX lub Linux, a także rozumieć zagadnienia związane ze sprzętem i konfiguracją sieci w tychże systemach.
Nie jest wymagana wcześniejsza znajomość języka Java lub skryptów.
Zagadnienia
JBoss Enterprise Application Platform 6 w trybie autonomicznym i trybie domeny.
Konfiguracja domeny.
Wdrażanie aplikacji JBoss Enterprise Application Platform 6.
Konfiguracja podsystemu źródeł danych.
Konfiguracja Java Message Service (JMS) oraz HornetQ.
Konfiguracja podsystemu logowania zdarzeń.
Konfiguracja podsystemu dostępu z sieci.
Wdrożenia zabezpieczeń aplikacji w JBoss Enterprise Application Platform 6.
Migracja JBoss Enterprise Application Platform 5 aplikacje do JBoss Enterprise Application Platform 6.
Wprowadzenie do zagadnień klastrów JBoss Enterprise Application Platform 6.
VMware vSphere with Tanzu: Deploy and Manage [V7]
Length – 3 days
Overview
During this 3-day course, you focus on deploying and managing VMware vSphere® with Kubernetes.
You learn about how vSphere with Kubernetes can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a vSphere environment.
Audience
Experienced system administrators and system integrators responsible for designing and implementing vSphere with Kubernetes.
Prerequisites
This course requires completion the following courses:
•VMware vSphere: Install, Configure, Manage OR VMware vSphere: Optimize and Scale
AND
•VMware NSX-T Data Center: Install, Configure, Manage
Experience working at the command line is helpful.
This course requires that a student be able to perform the following tasks with no assistance or guidance
before enrolling in this course:
•Create VMware vCenter Server® objects, such as data centers and folders
•Create a virtual machine using a wizard or a template
•Modify a virtual machine’s hardware
•Migrate a virtual machine with VMware vSphere® vMotion®
•Migrate a virtual machine with VMware vSphere® Storage vMotion®
•Configure and manage a vSphere DRS cluster with resource pools
•Configure and manage a VMware vSphere® High Availability cluster
If you cannot perform all of these tasks, VMware recommends that you complete one
of the prerequisite courses before enrolling in VMware vSphere with Kubernetes: Deploy & Manage.
Objectives
By the end of the course, you should be able to meet the following objectives:
•Describe vSphere with Kubernetes and use cases in on-premises environments
•Deploy vSphere with Kubernetes
•Describe the VMware NSX® networking requirements for vSphere with Kubernetes.
•Create and manage vSphere with Kubernetes namespaces
•Deploy and run container applications on vSphere with Kubernetes
•Deploy and configure VMware Harbor
•Describe the VMware Tanzu™ Kubernetes Grid™ service
•Deploy a Tanzu Kubernetes Grid cluster
•Deploy and run container applications on a Tanzu Kubernetes Grid cluster
•Describe the vSphere with Kubernetes lifecycle
•Use logs and CLI commands to monitor and troubleshoot vSphere with Kubernetes
Course Outline
Course Introduction
•Introductions and course logistics
•Course objectives
Introduction to Containers and Kubernetes
•Describe virtual machines and containers
•Describe container hosts
•Describe container engines
•Describe Dockerfile
•Describe container images
•Describe image registry
•Describe the purpose and functionality of Kubernetes
•Describe YAML manifest files
•Explain pods
•Explain Replica Sets
•Explain services
•Explain deployments
•Explain network policies
Introduction to vSphere with Kubernetes
•Introduce the Cloud Native Computing Foundation
•Introduce the VMware Tanzu™ portfolio
•Describe the purpose and functionality of vSphere with Kubernetes
•Describe the capabilities of vSphere with Kubernetes
•Describe the components of vSphere with Kubernetes
•Contrast vSphere with Kubernetes to traditional Kubernetes
•Describe the requirements for vSphere with Kubernetes
•Describe the NSX components required for vSphere with Kubernetes
•Describe the network topology of vSphere with Kubernetes
•Explain the networking requirements of vSphere with Kubernetes
•Compare NSX networking objects with Kubernetes networking objects
•Describe the kubectl command line interface
vSphere with Kubernetes Core Services
•Explain the architecture of the vSphere with Kubernetes core services
•Describe the use cases of vSphere with Kubernetes
•Enable vSphere with Kubernetes
•Deploy Harbor Registry
•Describe a vSphere with Kubernetes namespace
•Describe resource quotas
•Explain authentication and authorization to vSphere with Kubernetes
•Create a namespace
•Use kubectl to interact with vSphere with Kubernetes
•Describe using kubectl pod deployment
•Explain scaling a pod deployment
•Explain deleting pods
•Use kubectl to deploy a pod
•Use kubectl to scale a pod
•Describe a Container Storage Interface
•Explain VM Storage Policies and Persistent Volumes
•Monitor Cloud Native Storage
•Create a Persistent Volume
•Describe the NSX Container Plugin
•Explain Supervisor Cluster Network Topology
•Explain Container Objects in NSX
•Describe Kubernetes Services
•Describe Kubernetes Network Policies
•Describe Harbor Image Registry
•Explain Harbor integration with vSphere with Kubernetes
•Enable Harbor
•Push container images to Harbor
•Deploy containers from Harbor
VMware Tanzu Kubernetes Grid service for vSphere
•Introduce Kubernetes Cluster API
•Explain Tanzu Kubernetes Grid service for vSphere
•Describe the use cases for Tanzu Kubernetes Grid clusters
•Describe enabling Tanzu Kubernetes Clusters
•Deploy a Tanzu Kubernetes Cluster
•Scale a Tanzu Kubernetes Cluster
•Explain the life cycle of Tanzu Kubernetes Clusters
•Deploy pods to a Tanzu Kubernetes Cluster
•Describe monitoring of Tanzu Kubernetes Clusters
Monitoring and Troubleshooting
•Describe the monitoring tools for vSphere with Kubernetes
•Describe the troubleshooting tools for vSphere with Kubernetes
•Describe VMware vRealize® Operations Manager™ integration
•Describe vCenter Server events
•Describe vSphere with Kubernetes events
•Describe gathering vSphere with Kubernetes support log bundles
vSphere with Kubernetes Life Cycle
•Introduce Kubernetes version
•Explain Kubernetes release cadence
•Describe vSphere with Kubernetes life cycle
•Describe NSX component life cycle
•Describe vSphere with Kubernetes Certificate Management
VMware Tanzu Kubernetes Grid: Install, Configure, Manage[V1.0]
Length – 2 days
Overview
During this two-day course, you focus on installing VMware TanzuTM Kubernetes GridTM on a VMware vSphere®
environment and then provisioning and managing Tanzu Kubernetes clusters.
Product Alignment
• VMware Tanzu Kubernetes Grid 1.0
Audience
VI administrators who are responsible for deploying and managing Tanzu Kubernetes clusters.
Prerequisites
Working knowledge of Kubernetes.
Objectives
By the end of the course, you should be able to meet the following objectives:
•Describe how Tanzu Kubernetes Grid fits in the VMware TanzuTM portfolio
•Describe the Tanzu Kubernetes Grid architecture
•Deploy management clusters
•Deploy Tanzu Kubernetes clusters
•Configure your Tanzu Kubernetes Grid instance for authentication, logging, and ingress
•Perform basic troubleshooting
Course Outline
Course Introduction
•Introductions and course logistics
•Course objectives
What Is VMware Tanzu Kubernetes Grid?
•Tanzu Kubernetes Grid in the VMware Tanzu portfolio
•Tanzu Kubernetes Grid concepts
•Tanzu Kubernetes Grid CLI
Management Cluster
•Preparing the vSphere environment
•Creating management clusters
•Managing management clusters
Tanzu Kubernetes Clusters
•Cluster API
•Deploying Tanzu Kubernetes clusters
•Tanzu Kubernetes cluster architecture
Configuring and Managing Tanzu Kubernetes Grid Instances
•Tanzu Kubernetes Grid extensions
•Logging
•Ingress control
•Authentication
Troubleshooting
•Crash recovery and diagnostics for Kubernetes
•Troubleshooting commands
VMware Horizon 7: Troubleshooting and Performance Optimization [V7.7]
Length – 5 days
Overview
During this five-day, hands-on training, you will gain the advanced knowledge, skills, methodology, and abilities to achieve competence introubleshooting the View component of VMware Horizon® 7. You will increase your skills and competence in using VMware and third-party toolsto analyze and solve problems associated with a View implementation. Thislab-intensive course provides you with a comprehensive environment to test your skills at identifying and solving a broad range of issue.
Prerequisites
This class requires understanding the concepts and topics presented in the following courses:
• VMware Horizon 7: Install, Configure, Manage
• VMware Data Center Virtualization FundamentalsExperience with working with View and VMware vSphere® is helpful
Audience
Experienced system administrators and system integrators responsible formaintaining the View component of VMware Horizon
Objectives
By the end of the course, you should be able to meet the following objectives:
• Use the Horizon Administrator Web client, log files, and VMware andthird-party tools to analyze, diagnose, and troubleshoot problems in a View environment
• Optimize the display protocol and the virtual desktop to ensure anoptimal end-user experience
• Identify infrastructure problems as they relate to View
• Discuss View installation problems and best practices
Course Outline
Course Introduction
Introductions and course logistics
Course objectives
Introduction to Troubleshooting
Discuss troubleshooting techniques
Describe methods for efficient troubleshooting in a consistent andrepeatable manner 1/2
Troubleshooting Tools
Understand how to use Horizon Administrator to troubleshoot Viewproblems
Understand how to use the command line to troubleshoot View problems
Understand how to use VMware and third-party tools to identify andtroubleshoot View problems
Interpret log files
Troubleshooting Virtual Desktops
Analyze, diagnose, and troubleshoot virtual desktop problems
Use VMware tools to optimize virtual desktops
Troubleshooting USB Connectivity and Printing
Discuss how View supports connecting USB devices to clients as well asprinting to local and remote printers
Analyze, diagnose, and troubleshoot USB connectivity and printing problems
Troubleshooting Display Protocols
Discuss the topology and architecture of display protocols in View
Analyze, diagnose, and troubleshoot Remote Desktop Protocol, BlastExtreme, HTML Access, and PCoIP problems
Optimize PCoIP and Blast Extreme for performance
Troubleshooting View Composer
Discuss the architecture, purpose, and benefits of View Composer
Analyze, diagnose, and troubleshoot View Composer problems
Troubleshooting Instant Clones
Discuss the architecture, purpose, and benefits of instant clones
Understand how to create and deploy instantclone desktop pools
Analyze, diagnose, and troubleshoot instantclone problems
Troubleshooting SSL Certificates
Discuss certificate authority and SSL certificates
Discuss the proper method to install and replace certificate authority andSSL certificates
Analyze, diagnose, and troubleshoot SSL certificate problems
Infrastructure
Discuss how a data center’s infrastructure can affect the performance ofa View environment
Discuss best practices for data center infrastructure for View
VMware vSphere: Install, Configure, Manage [V7]
Length – 5 days
Overview
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 7, which includes VMware ESXi™ 7 and VMware vCenter Server® 7. This course prepares you to administer a vSphere infrastructure for an organization of any size.
This course is the foundation for most of the other VMware technologies in the software-defined data center.
Product Alignment
• ESXi 7
• vCenter Server 7
Prerequisites
This course has the following prerequisites:
• System administration experience on Microsoft Windows or Linux operating systems
Audience
System administrators.
System engineer.
Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the software-defined data center (SDDC)
Explain the vSphere components and their function in the infrastructure
Install and configure VMware ESXi™ hosts
Deploy and configure VMware vCenter® Server Appliance™
Use VMware vSphere® Client™ to manage the vCenter Server inventory and the vCenter Server configuration
Manage, monitor, back up, and protect vCenter Server Appliance
Create virtual networks with vSphere standard switches
Describe the storage technologies supported by vSphere
Configure virtual storage using iSCSI and NFS storage
Create and manage VMware vSphere® VMFS datastores
Use the vSphere Client to create virtual machines, templates, clones, and snapshots
Create a content library and deploy virtual machines from templates in the library
Manage virtual machine resource use
Migrate virtual machines with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
Create and manage a vSphere cluster that is enabled with VMware vSphere® High Availability and VMware vSphere® Distributed Resource Scheduler™
Discuss solutions for managing the vSphere life cycle
Use VMware vSphere® Update Manager™ to apply patches and perform upgrades to ESXi hosts and virtual machines
Course Outline
Course Introduction
Introductions and course logistics
Course objectives
Introduction to vSphere and the Software-Defined Data Center
Explain basic virtualization concepts
Describe how vSphere fits into the software-defined data center and the cloud infrastructure
Explain how vSphere interacts with CPUs, memory, networks, and storage
Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts
Use VMware Host Client™ to access and manage ESXi host
Virtual Machines
Create and remove a virtual machine
Provision a virtual machine with virtual devices
Identify the files that make up a virtual machine
Explain the importance of VMware Tools™
vCenter Server
Describe the vCenter Server architecture
Discuss how ESXi hosts communicate with vCenter Server
Deploy and configure vCenter Server Appliance
Use the vSphere Client to manage the vCenter Server inventory
Add data center, organizational objects, and hosts to vCenter Server
Use roles and permissions to enable users to access objects in the vCenter Server inventory
Back up vCenter Server Appliance
Monitor vCenter Server tasks, events, and appliance health
Use vCenter Server High Availability to protect a vCenter Server Appliance
Configuring and Managing Virtual Networks
Create and manage standard switches
Describe the virtual switch connection types
Configure virtual switch security, traffic-shaping and load-balancing policies
Compare vSphere distributed switches and standard switches
Configuring and Managing Virtual Storage
Identify storage protocols and storage device types
Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
Create and manage VMFS and NFS datastores
Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage
Deploy virtual machines on a VMware vSAN™ datastore
Virtual Machine Management
Use templates and cloning to deploy new virtual machines
Modify and manage virtual machines
Create a content library and deploy virtual machines from templates in the library
Dynamically increase the size of a virtual disk
Use customization specification files to customize a new virtual machine
Perform vSphere vMotion and vSphere Storage vMotion migrations
Create and manage virtual machine snapshots
Examine the features and functions of VMware vSphere® Replication™
Resource Management and Monitoring
Discuss CPU and memory concepts in a virtualized environment
Describe what overcommitment of a resource means
Describe methods for optimizing CPU and memory usage
Use various tools to monitor resource use
Create and use alarms to report certain conditions or events
vSphere Cluster
Describe options for making a vSphere environment highly available
Explain the vSphere HA architecture
Configure and manage a vSphere HA cluster
Examine the features and functions of VMware vSphere® Fault Tolerance
Configure a vSphere cluster using ESXi Cluster Quickstart
Describe the functions of a vSphere DRS cluster
Create a vSphere DRS cluster
vSphere Lifecycle
Describe how VMware vSphere® Lifecycle Manager™ works
Use vSphere Lifecycle Manager to update ESXi hosts in a cluster
VMware vSphere: Optimize and Scale [V7]
Length – 5 days
Overview
This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere® 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect.
Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization.
Product Alignment
• ESXi 7
• vCenter Server 7
Prerequisites
You must complete one of the following prerequisites:
• Understanding of concepts presented in the VMware vSphere: Install, Configure, Manage [V7] course
• Equivalent knowledge and administration experience with ESXi and vCenter Server
Experience with working at the command line is highly recommended.
Audience
Experienced system administrators, system engineers, and system integrators
Objectives
By the end of the course, you should be able to meet the following objectives:
Configure and manage vSphere networking and storage for a large and sophisticated enterprise
Use VMware vSphere® Client™ to manage certificates
Use Identity Federation to configure VMware vCenter Server® to use Microsoft ADFS
Use VMware vSphere® Trust Authority™ to secure the infrastructure for encrypted VMs
Use host profiles to manage VMware ESXi™ host compliance
Create and manage a content library for deploying virtual machines
Manage VM resource usage with resource pools
Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts
Optimize the performance of ESXi and VMware vCenter Server®
Discuss the purpose and capabilities of VMware vSphere® with Kubernetes and how it fits into the VMwareTanzu™ portfolio
Course Outline
Course Introduction
Introductions and course logistics
Course objectives
Network Scalability
Configure and manage vSphere distributed switches
Describe how VMware vSphere® Network I/O Control enhances performance
Explain distributed switch features such as port mirroring and NetFlow
Storage Scalability
Explain why VMware vSphere® VMFS is a high-performance, scalable file system
Explain VMware vSphere® Storage APIs – Array Integration, VMware vSphere® API for Storage
Awareness™, and vSphere APIs for I/O Filtering
Configure and assign virtual machine storage policies
Create VMware vSAN™ storage policies
Configure VMware vSphere® Storage DRS™ and VMware vSphere® Storage I/O Control
Discuss vSphere support for NVMe and iSER
Host and Management Scalability
Use the vSphere Client to manage vSphere certificates
Describe identity federation and recognize its use cases
Configure identity federation
Describe the benefits and use cases of vSphere Trust Authority
Configure vSphere Trust Authority
Use host profiles to manage ESXi configuration compliance
Manage and update VM templates in content libraries
Create and manage resource pools in a cluster
CPU Optimization
Explain the CPU scheduler operation and other features that affect CPU performance
Explain NUMA and vNUMA support
Use esxtop to monitor key CPU performance metrics
Memory Optimization
Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when
memory is overcommitted
Use esxtop to monitor key memory performance metrics
Storage Optimization
Describe storage queue types and other factors that affect storage performance
Use esxtop to monitor key storage performance metrics
Network Optimization
Explain performance features of network adapters
Explain the performance features of vSphere networking
Use esxtop to monitor key network performance metrics
vCenter Server Performance Optimization
Describe the factors that influence vCenter Server performance
Use VMware vCenter® Server Appliance™ tools to monitor resource use
Introduction to vSphere with Kubernetes
Differentiate between containers and virtual machines
Identify the parts of a container system
Recognize the basic architecture of Kubernetes
Describe a basic Kubernetes workflow
Describe the purpose of vSphere with Kubernetes and how it fits into the VMware Tanzu portfolio
Explain the vSphere with Kubernetes supervisor cluster
Describe the Tanzu Kubernetes Grid service
VMware Site Recovery Manager: Install Configure Manage [V8.2]
Length – 2 dni
Overview
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.2. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager.
Prerequisites
This class requires completion of one of the following courses:
• VMware vSphere: Install, Configure, Manage [V6.x].
• VMware vSphere: Fast Track [V6.x].
• VMware vSphere: What’s New [V5.5 to V6x].
• VMware vSphere: Troubleshooting Workshop [V6.x].
Audience
VSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager.
Course Outline
Course Introduction
Outline the necessary information to effectively undertake this course
Identify resources for additional information
Overview and Architecture
Discuss Site Recovery Manager architecture
Examine disaster recovery options with Site Recovery Manager
Describe Site Recovery Manager integration with VMware vSphere® ClientTM
Discuss Site Recovery Manager features
Analyze Site Recovery Manager storage policies and integration options
Discuss how Site Recovery Manager supports several disaster recovery topologies
Identify use cases for Site Recovery Manager across various scenarios
Describe how VMware Site Recovery™ for VMware Cloud™ on AWS integrates with Site Recovery Manager
Deploy & Configure Site Recovery Manager
Identify the requirements to deploy Site Recovery Manager
Discuss the benefits of the Site Recovery Manager appliance
Explore vSphere deployment models
Deploy the Site Recovery Manager appliance
Navigate the Site Recovery Manager configuration user interface
Describe the process to register Site Recovery Manager with VMware vCenter Server®
Configure site pairing
Identify how to perform updates to the Site Recovery Manager appliance
Configuring Inventory Mappings
Outline the importance of inventory mappings
Examine configuration options for inventory mappings
Outline the importance of placeholders
Using Array-based Replication
Describe array-based replication
Discuss the role of the Storage Replication Adapter (SRA)
Explore the relationship between devices, consistency groups and datastore groups
Configure array pairs
vSphere Replication
Explore vSphere Replication architecture
Examine vSphere Replication functionality
Formulate use cases for vSphere Replication
Deploy a vSphere Replication appliance
Configure vSphere Replication appliance settings
Configure a vSphere Replication appliance connection
Deploy a vSphere Replication server
Register a vSphere Replication server
Replicating Virtual Machines with vSphere Replication
Configure vSphere Replication for virtual machines
Explain the importance of datastore mappings
Describe vSphere Replication recovery point objective scheduling
Describe the vSphere Replication disk transfer protocol
Building Protection Groups
Define protection group functionality
Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and storage profile protection groups
Create a protection group
Discuss protection group settings
Remove protection from a virtual machine
Create a storage profile protection group
Building Recovery Plans
Discuss recovery plan concepts
List recovery plan steps
Discuss network planning
Discuss customization options in recovery planning
Outline how to implement a recovery plan
Investigate recovery plan options
Testing and Running a Recovery Plan
Discuss use cases for Site Recovery Manager
Describe planned migration
Identify Site Recovery Manager workflows
Discuss the importance of VMware vSphere® VMFS resignaturing
Examine Site Recovery Manager integration with various vSphere technologies
Outline how to conduct a recovery plan test
Perform recovery plan test execution
Identify the effects on the storage layer during recovery steps
Explain a recovery plan execution in planned migration or disaster recovery mode
Understand storage layer changes for plan execution types
Identify the recovery steps for each execution type
Describe how to reprotect a data center
Examine failback steps
Monitoring and Troubleshooting
Discuss Site Recovery Manager alarms
Explore Site Recovery Manager history reports
Configuring advanced Site Recovery Manager settings
Describe how to modify logging levels
Explain how to collect log bundles
Identify key log locations
VMware vSphere: What’s New [V6.7 to V7]
Length – 3 dni
Overview
In this three-day, hands-on training course, you explore the new features and enhancements in VMware vCenter Server® 7 and VMware ESXi™ 7. Real-world use-case deployment scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere® 7.
This course is recommended for customers who want to deploy vSphere 7 in their existing vSphere environment.
Product Alignment
• ESXi 7
• vCenter Server 7
Prerequisites
This course requires completion of one the following courses or equivalent knowledge and administration experience with ESXi and vCenter Server:
• VMware vSphere: Install, Configure, Manage
• VMware vSphere: Optimize and Scale
• VMware vSphere: Fast Track
• VMware vSphere: Troubleshooting
The course material presumes that you can perform the following tasks with no assistance or guidance before enrolling in this course:
• Install and configure ESXi
• Install vCenter Server
• Create vCenter Server objects, such as data centers and folders
• Create and manage vCenter Server roles and permissions
• Create and modify a standard switch
• Create and modify a distributed switch
• Connect an ESXi host to NAS, iSCSI, or Fibre Channel storage
• Create a VMFS datastore
• Use a content library template to create a virtual machine
• Modify a virtual machine’s hardware
• Migrate a virtual machine with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
• Configure and manage a vSphere DRS cluster
• Configure and manage a VMware vSphere® High Availability cluster
• Use VMware vSphere® Update Manager™ to apply patches and perform upgrades to ESXi hosts and VMs
If you cannot complete these tasks, VMware recommends that you instead take the VMware vSphere: Install, Configure, Manage [V7] course.
The course material presumes that you can perform the following tasks with no assistance or guidance before enrolling in this course:
Install and configure ESX or ESXi.
Install vCenter Server.
Create vCenter Server objects, such as data centers and folders.
Create and manage vCenter Server roles and permissions.
Create and modify a standard switch.
Create and modify a distributed switch.
Connect an ESX/ESXi host to NAS, iSCSI, or Fibre Channel storage.
Create a VMware vSphere® VMFS datastore.
Enable vSphere vMotion on an ESX/ESXi host.
Use a wizard or a template to create a virtual machine.
Modify a virtual machine’s hardware.
Migrate a virtual machine with vSphere vMotion.
Migrate a virtual machine with VMware vSphere® Storage vMotion®.
Configure and manage a VMware vSphere® Distributed Resource Scheduler™ cluster with resource pools.
Configure and manage a VMware vSphere® High Availability cluster.
If you cannot complete all of these tasks, then VMware recommends that you instead take the VMware vSphere: Install, Configure, Manage [V6.7] course.
Audience
System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures
Objectives
By the end of the course, you should be able to meet the following objectives:
List and describe the importance of key features and enhancements in vSphere 6.7 update releases and
vSphere 7
Determine the proper upgrade path for a vCenter Server instance and upgrade VMware vCenter® Server
Appliance™ to version 7
Migrate a Windows vCenter Server system to vCenter Server Appliance 7
Manage and update VM templates located in content libraries
Use Identity Federation to configure vCenter Server to use Microsoft ADFS
Use the VMware vSphere® Client™ to manage certificates
Describe vCenter Server, VMware ESXi™, storage, network, virtual machine, and security enhancements in vSphere 7
Use VMware vSphere® Trust Authority™ to secure the infrastructure for encrypted VMs
Demonstrate the Quickstart feature of the ESXi cluster
Recognize improvements to VMware vSphere® Distributed Resource Scheduler™
Use vSphere Lifecycle Manager to manage vSphere deployments, updates, and configurations
Discuss the purpose and capabilities of VMware vSphere® with Kubernetes and how it fits into the VMwareTanzu™ portfolio
Course Outline
Course Introduction
Introductions and course logistics
Course objectives
Installation and Upgrade
Describe the new vCenter Server Appliance deployment model
Upgrade a vCenter Server Appliance instance to vCenter Server Appliance 7
Migrate a Windows vCenter Server instance to vCenter Server Appliance 7
Describe the enhancements to vCenter Server Appliance
Management Enhancements
Identify the scaling and performance improvements for vCenter Server Appliance
Describe the support provided for dynamic DNS
Recognize how to change the IP address or FQDN of vCenter Server
Describe prefix-based MAC address allocation
Perform a VM template in-place update in Content Library
Describe identity federation and recognize its use cases
Configure identity federation
Manage certificates using the vSphere Client
Identify VMware NSX-T™ logical switches and their properties in the vSphere Client
Explain the benefits of using VMware Skyline™ to proactively monitor your environment
ESXi Enhancements
Upgrade an ESXi host to version 7
List the enhancements introduced with ESXi 7
Describe new device support for ESXi hosts
Describe support for Precision Time Protocol
VM Enhancements
Discuss the new functionality, virtual devices, and VM maximums supported by VM compatibility version 17
Describe the enhancements to guest customization
Perform a vSphere vMotion migration of VMs with remote devices
Storage Enhancements
Describe the enhancements to NVMe support
Describe the enhancements to VMware Pluggable Storage Architecture
Describe the purpose of the High-Performance Plug-in
Describe the support for iSER
Recognize the changes made to the ESXi system storage layout
Describe the support for CAB deployment of WSFC in vSphere 6.7 and later
List the enhancements made to vSAN
Security Enhancements
Describe the enhancements to the VM encryption feature
Describe the enhancements to cloning, migration, and encryption operations
Describe the benefits and use cases of vSphere Trust Authority
Configure vSphere Trust Authority
Cluster Enhancements
Demonstrate the Quickstart feature of the ESXi cluster
Recognize improvements to vSphere DRS
Describe use cases for scalable shares
vSphere Lifecycle Management
Use vCenter Server Update Planner to run vCenter Server upgrade prechecks
Compare vSphere Lifecycle Manager to vSphere Update Manager
Manage and update ESXi hosts using vSphere Lifecycle Manager
Introduction to vSphere with Kubernetes
Differentiate between containers and virtual machines
Identify the parts of a container system
Recognize the basic architecture of Kubernetes
Describe a basic Kubernetes workflow
Describe the purpose of vSphere with Kubernetes and how it fits into the VMware Tanzu portfolio
Explain the vSphere with Kubernetes supervisor cluster
Describe the Tanzu Kubernetes grid service
VMware Horizon 7: Design Workshop [V7]
Length – 3 dni
Overview
This three-day course presents a methodology for designing a VMware Horizon® solution. The design methodology includes recommendations for the type of information and data that must be gathered and analyzed to make sound design decisions for client systems, desktop options, VMware vSphere® infrastructure, and VMware Horizon components. VMware best practices are presented for each phase of the design process. In this course, you apply your new knowledge by working with other participants to design a VMware Horizon solution for a real-world project.
Prerequisites
This course recommends the following skills and knowledge:
Virtualized desktop implementation experience.
Understanding of concepts presented in the VMware Horizon 7: Install, Configure, Manage [V7] course or equivalent experience.
Understanding of concepts presented in the VMware Data Center Virtualization Fundamentals course.
Audience
Experienced system administrators and system integrators responsible for designing and implementing VMware Horizon solutions.
Course Outline
Course Introduction
Introductions and course Logistics.
Course objectives.
Infrastructure Assessment
Define customer business objectives.
Gather and analyze business and application requirements.
Use a systematic methodology to evaluate and document design decisions.
VMware Horizon Design Identify the design process to build a VMware Horizon solution.
Identify the VMware Horizon reference architecture.
Outline the process to define a use case.
Determine use cases for a given business case study.
Outline the process to define service definitione.
VMware Horizon Block and Pod Design
Identify the components of a typical VMware Horizon block and pod.
Outline the relationships between VMware Horizon management block components.
Design a VMware Horizon desktop block and pod configuration for a given use case.
Configure cloud pod architecture for multisite pool access.
Pool and Desktop Configuration
List the key considerations for sizing hardware for a desktop virtual machine.
Identify key virtual desktop performance tuning and Windows optimizations and their effects on VMware Horizon performance.
Map use cases to VMware Horizon instances and VMware Horizon pools.
Design desktop pools for a given use case.
VMware Infrastructure Design
Identify factors and design decisions that determine the sizing for VMware ESXi™ hosts•.
Estimate and size CPU and memory requirements.
Determine cluster requirements for VMware vSphere® High Availability and VMware vSphere® Distributed Resource Scheduler™.
Outline the privileges that are required by an administrative user account.
Storage Design
Identify factors that determine the sizing for shared storage.
Determine storage-sizing formulas for clone disks.
Reduce storage requirements with instant clones.
Identify use cases and benefits of using View Storage Accelerator.
Identify use cases and benefits of using VMware vSAN™.
Network and Security Design
Identify the design decisions related to bandwidth use.
Identify use cases and benefits of using load balancing and traffic management.
Identify the best practices for avoiding network congestion.
Recognize the PCoIP and Blast Extreme optimization strategies.
Describe the design considerations for sizing network capacity.
Evaluate security features of the security server and VMware Unified Access Gateway™.
Compare the security server and Unified Access Gateway.
End-User Session Design
Configure Horizon Persona Management for end-user personalization.
Discuss the use of VMware User Environment Manager™ for personalizing desktops.
Identify VMware best practices for Active Directory containers, groups, and Group Policy.
object policies in a VMware Horizon solution. Identify VMware best practices for True SSO.
Identify client device characteristics and requirements.
Delivering and Managing Applications
Describe the importance of the application delivery mechanism.
Determine which VMware Horizon application tool should be used to accomplish which business objectives.
Design and create Remote Desktop Services farms and application pools.
VMware Horizon 7: Install, Configure, Manage [V7.10]
Length – 5 days
Overview
This five-day, hands-on course gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. This course builds your skills in installing, configuring, and managing VMware Horizon® 7 through a combination of lecture and hands-on labs. You will learn how to configure and deploy pools of virtual machines, how to manage access and security of the machines, and how to provide a customized desktop environment to end users.
Prerequisites
Customers attending this course should have, at a minimum, the following VMware infrastructure skills:
Use VMware vSphere® Web Client to view the state of virtual machines, datastores, and networks.
Open a virtual machine console on VMware vCenter Server® and access the guest operating system.
Create snapshots of virtual machines.
Configure guest customization specifications.
Modify virtual machine properties.
Convert a virtual machine into a template.
Deploy a virtual machine from a template.
Attendees should also have the following Microsoft Windows system administration experience:
Configure Active Directory services, including DNS, DHCP, and time synchronization.
Restrict users’ activities by implementing Group Policy objects.
Configure Windows systems to allow Remote Desktop Connections.
Build an ODBC connection to an SQL Server database.
Audience
Technical personnel who work in the IT departments of end-customer companies and people who are responsible for the delivery of remote or virtual desktop services.
Objectives
By the end of the course, you should be able to meet the following objectives:
Recognize the features and benefits of VMware Horizon.
Install and configure View Connection Server.
Create and optimize Windows VMs to create VMware Horizon desktops.
Describe the purpose of Horizon Agent.
Compare the remote display protocols that are available in VMware Horizon.
Configure and manage the Horizon Client systems and connect the client to a VMware Horizon desktop.
Configure, manage, and entitle automated pools of full VMs.
Configure, manage, and entitle pools of instant-clone desktops and linked-clone desktops.
Install and configure View Composer.
Outline the steps and benefits for using TLS CA signed certificates in VMware Horizon environments.
Use the role-based delegation to administer a VMware Horizon environment.
Configure secure access to VMware Horizon desktops.
Understand and create Remote Desktop Services (RDS) desktops and application pools.
Install and configure VMware App VolumesTM to deliver and manage applications.
Deploy VMware Dynamic Environment Manager for user and application management.
Install and configure a Just-in-Time Management Platform (JMP) server for managing JMP components.
Describe VMware Dynamic Environment ManagerTM Smart Policies.
Use the command-line tools available in View to back up and restore the required VMware Horizon databases.
Manage the performance and scalability of a VMware Horizon deployment.
Identify the benefits of the Cloud Pod Architecture feature for large-scale VMware Horizon deployments.
VMware Cloud Automation: Design and Deploy [v7.1]
Length – 5 days
Overview
This five-day course focuses on designing and deploying an enterprise cloud by using a distributed architecture deployment of VMware vRealize® Automation™. The lecture and labs concentrate on designing an enterprise cloud architecture and the effective implementation of a vRealize Automation distributed deployment according to VMware recommended best practices.
Prerequisites
This class requires understanding the concepts and topics presented in the following courses:
VMware vSphere: Install, Configure, Manage.
VMware vRealize Automation: Install, Configure, Manage.
Audience
Experienced system administrators, cloud administrators, system integrators, and deployment consultants.
Course Outline
Course Introduction
Introductions and course Logistics.
Course objectives.
Enterprise Design Principles
Create a design foundation for an enterprise cloud by identifying business requirements, typical business solutions, constraints, assumptions, and risks.
Create a conceptual design for an enterprise cloud.
Create a logical design for an enterprise cloud.
Use key enterprise design principles to create a vSphere infrastructure for the enterprise cloud.
Security Infrastructure
Design a certificate authority architecture.
Create certificate signing requests for your vRealize Automation servers.
Create certificates for your vRealize Automation servers.
Use the VMware hardened virtual appliance.
Use VMware Identity Manager™.
vRealize Automation Distributed Architecture
Design and deploy the vRealize Automation solution in a highly available, distributed architecture.
Use vRealize Orchestrator in external and internal clusters.
Use cloudutil.exe and skills to control which DEM servers are used with specific endpoints.
Describe the proper configuration of NSX load balancers for a highly available, distributed architecture.
Administration Role Architecture
Design either an expanded administration role architecture or a compressed administration role architecture for an enterprise cloud.
Tenants and Business Groups
Design an optimum tenant and business group architecture for your enterprise cloud, using either a single-tenant or a multitenant model.
Describe the use of vRealize CloudClient in a multitenancy context.
Cloud Resource Design
Design an enterprise cloud that is based on a multitiered architecture.
Design naming standards in vRealize Automation to support your tenant-and-business group architecture.
Use composite blueprints in an enterprise deployment.
Use data center location in an enterprise deployment to control where systems are provisioned.
Design a unified self-service catalog.
Design service entitlements in an enterprise deployment.
Design and use governance and approvals.
Extensibility and the Enterprise
Describe vCloud Air and elastic clouds.
Describe the role of vRealize Orchestrator in vRealize Automation extensibility.
Use IaaS extensibility and the vRealize Automation event broker system.
Extend vRealize Automation to an asset management system.
Extend vRealize Automation to an IP address management system.
Use NSX on-demand components.
Enterprise Management
Use VMware vRealize® Operations Manager™ and the vRealize Automation management pack.
Use vRealize Log Insight in vRealize Automation enterprise management.
Manage costs.
Manage resource use.
Replace expired security certificates.
VMware vRealize Automation: Install, Configure, Manage [V8]
Length – 5 days
Overview
During this five-day course, you focus on installing, configuring, and managing VMware vRealize Automation. You learn about how vRealize Automation can be used to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments.
The course covers how to manage both on-premise systems and cloud services. The course covers how vRealize Automation Service Broker can aggregate content in native formats from multiple clouds and platforms into a common catalog. This course also covers interfacing vRealize Automation with other systems using VMware vRealize Orchestrator and how to use vRealize Automation to manage Kubernetes systems and leverage systems like Ansible.
Prerequisites
This course requires that a student be able to perform the following tasks with no assistance or guidance before enrolling in this course:
• Create VMware vCenter Server objects, such as data centers and folders
• Create a virtual machine using a wizard or a template
• Modify a virtual machine’s hardware
• Migrate a virtual machine with VMware vSphere vMotion
• Migrate a virtual machine with VMware vSphere Storage vMotion
• Configure and manage a vSphere DRS cluster with resource pools
• Configure and manage a VMware vSphere High Availability cluster
If you cannot perform all of these tasks, VMware recommends that you complete one of the prerequisite courses before enrolling in VMware vRealize Automation: Install, Configure, Manage.
Audience
Experienced system administrators and system integrators responsible for designing and implementing vRealize Automation.
Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the vRealize Automation architecture and use cases in cloud environments
Manage vRealize Automation entities on VMware and third-party virtual and cloud infrastructures
Configure and manage Cloud Accounts, Projects, Flavor Mappings, Image Mappings, Network Profiles, Storage Profiles, Volumes, Tags, and Services
Create, modify, manage, and deploy Blueprints
Connect to a Kubernetes Cluster and manage images and deployments
Customize services with CloudConfig
Configure and manage the Service Broker
Configure and manage ABX actions, custom properties, event broker subscriptions, and vRealize Orchestrator workflows
Integrate with vRealize Orchestrator
Install vRealize Automation with Lifecycle Configuration Manager
Describe Cloud Automation Services (Cloud Assembly and Code Stream).
Use logs and CLI commands to monitor and troubleshoot vRealize Automation
CXD-252 Moving to the Citrix Virtual Apps and Desktops Service on Citrix Cloud with Microsoft Azure- CTX_CXD-252
Length – 5 days
Overview
Navigate the move from an on-premises environment into Citrix Cloud and learn to deploy resource locations onto Microsoft Azure. Learn the architecture, communications, and management of Citrix Cloud and the Citrix Virtual Apps and Desktops Service and then migrate existing infrastructure and settings into Citrix Cloud. If you are planning a move to Citrix Cloud or starting out anew, this course is a necessary step in enabling you with the right training and skills to understand, manage, and deliver successfully. Plan machine catalog and virtual machine design based in Microsoft’s public cloud and deploy those machines using Machine Creation Services. Learn to configure the access layer as a service within Citrix Cloud, as managed machines in your datacenter, or on the Azure platform.
Prerequisites
Experience deploying and managing XenApp and XenDesktop 7.x in on-premises environment.
Basic knowledge of the Microsoft Azure platform including:
- Virtual machine management
- Networking
- Storage
- Azure Resource Manager portals
Audience
Built for experienced IT Professionals familiar with Citrix Virtual Apps and Desktops 7.x in an on-premises environment moving to the Citrix Cloud and deploying their Citrix Virtual Apps and Desktops workloads on Microsoft Azure.
Course Outline
Module 1: Introduction to Citrix Cloud
What is Citrix Cloud.
Citrix Cloud Services.
Citrix Cloud Operation and Architecture.
Citrix Cloud Administration.
Module 2: Citrix Cloud Connectors
Cloud Connector Architecture.
Installing and configuring Citrix Cloud Connectors.
Securing Citrix Cloud Connectors.
Citrix Cloud with Multiple Domains.
Module 3: Introduction to the Citrix Virtual Apps and Desktops Service
Citrix Virtual Apps and Desktops Deployment Models.
Citrix Virtual Apps and Desktops Service with On-Premises Resources.
Configuring the Citrix Virtual Apps and Desktops Service.
Delivering Apps and Desktop to End-Users Using On-Premises Resources with MC.
Module 4: Managing the Citrix Virtual Apps and Desktops Service
Citrix Studio and Director.
Citrix Virtual Apps and Desktops Remote PowerShell SDK.
Managing Multiple Resource Locations.
Using PVS with the Citrix Virtual Apps and Desktops Services.
Module 5: Providing Access in Citrix Cloud
Selecting Between Workspace Experience and On-premises StoreFront.
Consideration for NetScaler Gateway Locations.
User Authentication.
Module 6: Operations and Support in Citrix Cloud
Citrix Smart Tools.
Cloud Connector Operations.
Monitoring your Environment.
Module 7: Public Cloud Considerations
General Public Cloud Considerations.
Microsoft Azure as a Citrix Cloud Resource Location (Lecture only).
Amazon Web Services as a Citrix Cloud Resource Location (Lecture only).
Module 8: On-Premises Migration to the Citrix Virtual Apps and Desktops Service
Citrix Cloud Migration Options and Considerations.
Migrating Machine Catalogs and Delivery Groups.
Migrating Policies and Settings.
Considerations for Migrating to a Public Cloud.
Module 9: Citrix Virtual Apps and Desktops on Azure Overview
Defining IAAS.
Citrix Virtual Apps and Desktops Azure Deployment Models.
Azure Fundamentals Review.
Azure Management.
Azure Locations.
Module 10: Citrix Virtual Apps and Desktops Integration with Azure Active Directory
Active Directory Basics.
Active Directory Usage.
Connecting On-premises Active Directory to Azure.
Azure Role Based Access Control.
Azure Locations.
Module 11: Connecting to Microsoft Azure
Azure Connectivity.
Cloud Connectors in Azure.
Creating Citrix Virtual Apps and Desktops Host Connections to Azure.
Module 12: Deploying Apps and Desktops using Machine Creation Services
Master Image Preparation.
Machine Creation Services in Azure.
Considerations for Deploying onto Azure.
Module 13: Providing Access to End Users
StoreFront Locations.
NetScaler Locations.
Multiple Citrix Virtual Apps and Desktops Zones in Azure Regions.
Module 14: Maintaining Infrastructure and VDAs in Microsoft Azure
Maintaining Infrastructure.
Maintaining Resources.
Power Management.
Module 15: Plan for a Successful POC
Planning your next steps.
CNS-220 Citrix ADC Essentials and Traffic Management- CTX_CNS-220
Length – 5 days
Overview
Build your NetScaler knowledge and skills by enrolling in this five-day course. It covers NetScaler essentials– platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB). You will learn about key NetScaler capabilities such as high availability, security and performance, and explore SSL offload, load balancing and monitoring. The traffic management curriculum will cover AppExpert policy engines, the Rewrite and Responder features, content switching, and Security Insight. The course is designed for IT professionals with little or no NetScaler experience.
Prerequisites
This course requires little to no previous experience with Citrix NetScaler; however, Citrix recommends completing the free NetScaler Introduction bundle at elearning.citrix.com
Audience
Built for IT Professionals working with NetScaler, with little to no previous NetScaler experience. Potential students include administrators, engineers, and architects interested in learning how to implement and manage NetScaler features using leading practices.
Course Outline
Module 1: Getting Started
Introduction to NetScaler
Feature and Platform Overview
Deployment Options
Architectural Overview
Setup and Management
Module 2: Basic Networking
Networking Topology
NetScaler Components
Routing
Access Control Lists
Module 3: NetScaler Platforms
NetScaler MPX
NetScaler VPX
NetScaler CPX
NetScaler SDX
Module 4: High Availability
NetScaler High Availability
High Availability Configuration
Managing High Availability
Troubleshooting High Availability
Module 5: Load Balancing
Load Balancing Overview
Load Balancing Methods and Monitors
Load Balancing Traffic Types
Load Balancing Protection
Load Balancing Troubleshooting
Module 6: SSL Offload
SSL Overview
SSL Configuration
SSL Offload
Troubleshooting SSL Offload
SSL Vulnerabilities and Protections
Module 7: Securing the NetScaler
Authentication, Authorization, and Auditing
Configuring External Authentication
Admin Partitions
Module 8: Troubleshooting
NetScaler Logging
Monitoring with SNMP
Reporting and Diagnostics
AppFlow Functions
NetScaler Management and Analytics System (MAS)
Troubleshooting
Module 9: Classic Policies
Policy Overview
Basics of Content Filtering
Module 10: Default Policies
Default Policy Overview
Default Expression Syntax
Policy Bindings
AppExpert Additional Features
Module 11: Rewrite, Responder, and URL Transformation
Rewrite Policies
Responder Policies
DNS Rewrite and Responder
URL Transformation
Module 12: Content Switching
Content Switching Overview
Content Switching Configuration
Module 13: Optimization
NetScaler Optimization Overview
HTTP Compression
Integrated Caching
Front-End Optimization
Module 14: Global Server Load Balancing
GSLB Overview
GSLB Architecture
Content-Switching GSLB
GSLB MEP and Monitoring
Customizing GSLB
Module 15: Clustering
NetScaler Clustering Overview
NetScaler Cluster Configuration
CNS-222 Citrix ADC Essentials and Citrix Gateway CTX_CNS-222
Length – 5 days
Overview
Expand your NetScaler knowledge and skills by enrolling in this five-day course. It covers NetScaler essentials, including secure load balancing, high availability and operations management, and also focuses on Unified Gateway, and NetScaler Gateway. You will learn to deliver secure remote access to apps and desktops integrating XenApp and XenDesktop with Unified Gateway and NetScaler Gateway. This course is best suited for IT professionals, with little or no previous NetScaler experience, who will be deploying or managing NetScaler, NetScaler Gateway or Unified Gateway environments.
Prerequisites
This course requires little to no previous experience with Citrix NetScaler; however, Citrix recommends completing the free NetScaler Introduction bundle at elearning.citrix.com.
Audience
Built for IT Professionals working with NetScaler, with little or no previous NetScaler experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage NetScaler, NetScaler Gateway, or Unified Gateway environments.
Course Outline
Module 1: Introduction to NetScaler
Feature and Platform Overview
Deployment Options
Architectural Overview
Setup and Management
Module 2: Networking Topologies
NetScaler Components
Routing
Access Control Lists
Module 3: NetScaler Platforms
NetScaler MPX
NetScaler VPX
NetScaler CPX
NetScaler SDX
Module 4: NetScaler High Availability
High Availability Configuration
Managing High Availability
Troubleshooting High Availability
Module 5: Load Balancing
Load Balancing Overview
Load Balancing Methods and Monitors
Load Balancing Traffic Types
Load Balancing Protection
Load Balancing Troubleshooting
Module 6: SSL Overview
SSL Configuration
SSL Offload
Troubleshooting SSL Offload
SSL Vulnerabilities and Protections
Module 7: Authentication, Authorization, and Auditing
NetScaler MPX
NetScaler VPX
NetScaler CPX
NetScaler SDX
Module 8: NetScaler Logging
Monitoring with SNMP
Reporting and Diagnostics
AppFlow Functions
NetScaler Management and Analytics System (MAS)
Troubleshooting
Module 9: Unified Gateway
Introduction to Unified Gateway
Advantages and Utilities of Unified Gateway
Unified Gateway Configuration
Module 10: AppExpert Expressions
Introduction to AppExpert Policies
Classic v. Default Policies
Explore NetScaler Gateway Policies
Policy Bind Points
Module 11: Authentication and Authorization
Authentication and Authorization
Multi-Factor Authentication
Authentication and Authorization Policies
Authentication Troubleshooting
Module 12: Managing Client Connections
Introduction to Client Connections
Session Policies and Profiles
Pre and Post Authentication Policies
NetScaler Gateway Deployment Options
Module 13: Integration for XenDesktop and XenApp Solutions
XenApp and XenDesktop Integration
NetScaler Gateway Integration
NetScaler WebFront
ICA Proxy
Clientless Access and Receiver
Access Fallback
SmartControl and SmartAcess for ICA
Module 14: Configuring Unified Gateway
Working with Apps on Unified Gateway
RDP Proxy
Portal Themes and EULA
Module 15: NetScaler Insight Center
Introduction to NetScaler Insight
Understanding AppFlow
Components for NetScaler Insight
HDX Insight and Gateway Insight
Microsoft
Przykładowe obszary szkoleń z zakresu Microsoft:
Microsoft Windows Server
Microsoft Azure
Microsoft MTA
Microsoft Windows 10
Microsoft PowerShell
Microsoft System Center Operations Manager
Microsoft System Center Configuration Manager
Microsoft Windows 7
Mcrosoft SharePoint
Microsoft Visual Studio
Microsoft Office 365
Szkolenia Officowe Autorskie
CompTIA Data+ (DAO-001)
Length – 5 days (40h)
Overview
The Official CompTIA Data+ (DA0-001) have been developed by CompTIA for the CompTIA Data+ candidate. Rigorously evaluated to validate coverage of the CompTIA Data+ (DA0-001) exam objectives. The OfficialCompTIA Data+ teaches learners the knowledge and skills required to transform business requirements in support of data-driven decisions by mining data, manipulating data, applying basic statistical methods, and analyzing complex data sets while adhering to governance and quality standards throughout the entire data lifecycle. In addition, it will help prepare candidates to take the CompTIA Data+ certification exam.
Objectives
Lesson 1: Identifying Basic Concepts of Data Schemas
Lesson 2: Understanding Different Data Systems
Lesson 3: Understanding Types and Characteristics of Data
Lesson 4: Comparing and Contrasting Different Data Structures, Formats, and Markup Languages
Lesson 5: Explaining Data Integration and Collection Methods
Lesson 6: Identifying Common Reasons for Cleansing and Profiling Data
Lesson 7: Executing Different Data Manipulation Techniques
Lesson 8: Explaining Common Techniques for Data Manipulation and Optimization
Lesson 9: Applying Descriptive Statistical Methods
Lesson 10: Describing Key Analysis Techniques
Lesson 11: Understanding the Use of Different Statistical Methods
Lesson 12: Using the Appropriate Type of Visualization
Lesson 13: Expressing Business Requirements in a Report Format
Lesson 14: Designing Components for Reports and Dashboards
Lesson 15: Distinguishing Different Report Types
Lesson 16: Summarizing the Importance of Data Governance
Lesson 17: Applying Quality Control to Data
Lesson 18: Explaining Master Data Management Concepts
CompTIA Strata IT Fundamentals
Czas trwania – 5 dni
Informacje o szkoleniu
Szkolenie daje wiedzę na temat podstaw technologii i sprzętu komputerowego, podstaw pracy w sieci oraz o typowych błędach i problemach z kompatybilnością, instalacji oraz funkcji oprogramowania, zagrożeń dla bezpieczeństwa i zapobiegania im, procedury „zielonej informatyki” a także konserwacji zapobiegawczej.
Co warto wiedzieć przed szkoleniem?
Brak wymagań wstępnych.
Zagadnienia
Wprowadzenie do certyfikacji CompTIA STRATA
Podstawy technologii i sprzętu komputerowego
Procesory
Pamięci
Dyski twarde
Karty graficzne
Karty sieciowe
Płyty główne
Sieci bezprzewodowe
Standardy
Bezpieczeństwo
Budowanie
Sieci Przewodowe
Technologie
Standardy
Wykorzystanie
VoIP
Streaming
Nośniki danych
Charakterystyka i funkcje urządzeń peryferyjnych
Typy złączy
D-SUB
DVI
HDMI
USB
PS/2
FireWire
Złącza sieciowe
PCMCIA
ExpressCard
Złącza zasilania
Rozwiązywanie problemów z typowymi błędami systemu
Instalacja oprogramowania i jego funkcje
Przeprowadzanie podstawowej instalacji, deinstalacji i upgrade’u oprogramowania
Tworzenie punktów przywracania system Windows
Aktualizacje aplikacji i systemów operacyjnych
Konfiguracja systemu operacyjnego
Zagadnienia związane z zarządzaniem folderami i plikami
Korzystanie z menu Start, Opcje folderów, Polityka kopii zapasowych
Struktury RAID
Monitor zasobów
Dzienniki zdarzeń
Narzędzia kompresji plików
Bezpieczeństwo
Identyfikacja ryzyka
Social Engineering
Wirusy
Tobaki
Konie trojańskie
Makro
Fałszywka
Phishing
Spyware
Adware
Malware
Backdoor
Exploit
Rootkit
Keylogger
dialery
Metody zapobiegania ryzykom
Edukacja użytkowników
Oprogramowanie antywirusowe
Certyfikaty i używanie SSL
Anti-spyware
Praktyki haseł
Metody kontroli dostępu
Zamek elektroniczny na kod PIN (hasło)
Czytnik kart zbliżeniowych
Green IT i czynności konserwacyjne
Działania przyjazne środowisku
Ograniczenie zużycia energii elektrycznej
Cloud Computing
Ekologiczna serwerownia
Energy
Konserwacja sprzętu komputerowego
Prawo autorskie
CompTIA A+
Length – 5 days (40 h)
CompTIA A+ is the industry standard for establishing a career in IT.
CompTIA A+ Core 1 + CompTIA A+ Core 2
I The Official CompTIA A+ Core 1
What’s included
Content mapped to Core 1 exam objectives (220-1001)
Hands-on Activities designed to put knowledge into practice
Videos developed exclusively for CompTIA by ITPro.TV
Practice questions that check for understanding
PowerPoint slides
Access to the CompTIA Learning Center
What you’ll learn
The Official CompTIA A+ Core 1 Student Guide has been developed by CompTIA for the CompTIA certification candidate.
Rigorously evaluated by third party subject matter experts to validate coverage of the Core 1 exam objectives.
The Official CompTIA A+ Core 1 Student Guide teaches the essential skills and information needed to troubleshoot
and problem solve, helps learners understand a wide variety of issues ranging from networking and operating systems
to mobile devices and security, and prepares candidates to take the CompTIA A+ certification exam (220-1001).
Table of Contents
Lesson 1: Installing and Configuring PC Components
Lesson 2: Installing, Configuring, and Troubleshooting Display and Multimedia Devices
Lesson 3: Installing, Configuring, and Troubleshooting Storage Devices
Lesson 4: Installing, Configuring, and Troubleshooting Internal System Components
Lesson 5: Network Infrastructure Concepts
Lesson 6: Configuring and Troubleshooting Networks
Lesson 7: Implementing Client Virtualization and Cloud Computing
Lesson 8: Supporting and Troubleshooting Laptops
Lesson 9: Supporting and Troubleshooting Mobile Devices
Lesson 10: Installing, Configuring, and Troubleshooting Print Devices
II The Official CompTIA A+ Core 2
What’s included
Content mapped to Core 2 exam objectives (220-1002)
Hands-on Activities designed to put knowledge into practice
Videos developed exclusively for CompTIA by ITPro.TV
Practice questions that check for understanding
PowerPoint slides
Access to the CompTIA Learning Center
What you’ll learn
The Official CompTIA A+ Core 2 Student Guide has been developed by CompTIA for the CompTIA certification candidate.
Rigorously evaluated by third party subject matter experts to validate coverage of the A+ Core 2 exam objectives, The Official CompTIA A+ Core 2 Student Guide teaches the essential skills and information needed to troubleshoot and problem solve, helps learners understand a wide variety of issues ranging from networking and operating systems to mobile devices and security, and prepares candidates to take the CompTIA A+ Core 2 certification exam (220-1002).
Table of Contents
Lesson 1: Supporting Operating Systems
Lesson 2: Installing, Configuring, and Maintaining Operating Systems
Lesson 3: Maintaining and Troubleshooting Microsoft Windows
Lesson 4: Configuring and Troubleshooting Networks
Lesson 5: Managing Users, Workstations, and Shared Resources
Lesson 6: Security Concepts
Lesson 7: Securing Workstations and Data
Lesson 8: Troubleshooting Workstation Security Issues
Lesson 9: Supporting and Troubleshooting Mobile Devices
Lesson 10: Implementing Operational Procedures
CompTIA CySA+ (CS0-002)
Length – 5 days (40 h)
Overview
The CySA+ Certification Course will teach you the fundamental principles of using threat and vulnerability analysis tools plus digital forensics tools.
It will prepare you to take the CompTIA CySA+ CS0-002 exam by providing 100% coverage of the objectives and content examples listed on the syllabus.
This is 5 day course, with all official guidelines.
Recomendation
To get the most out of the CompTIA CySA+ Course and be able to prepare for your exam you should have successfully
earned the CompTIA Network+ certification and CompTIA Security+ certification or have equivalent knowledge.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
- Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers),
- Understand TCP/IP addressing, core protocols, and troubleshooting tools,
- Identify network attack strategies and defenses,
- Know the technologies and uses of cryptographic standards and products,
- Identify network- and host-based security technologies and practices,
- Describe the standards and products used to enforce security on web and communications technologies.
Course Outline
Lesson 1: Explaining the Importance of Security Controls and Security Intelligence
Lesson 2: Utilizing Threat Data and Intelligence
Lesson 3: Analyzing Security Monitoring Data
Lesson 4: Collecting and Querying Security Monitoring Data
Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques
Lesson 6: Applying Incident Response Procedures
Lesson 7: Applying Risk Mitigation and Security Frameworks
Lesson 8: Performing Vulnerability Management
Lesson 9 Applying Security Solutions for Infrastructure Management
Lesson 10: Understanding Data Privacy and Protection
Lesson 11: Applying Security Solutions for Software Assurance
Lesson 12: Applying Security Solutions for Cloud and Automation
CompTIA Pentest+ (PT0-001)
Length – 5 days (40 h)
Overview
The Official CompTIA PenTest+ Course (PT0-001) has been developed by CompTIA with input from instructors across the world.
Rigorously evaluated by third party subject matter experts to validate coverage of the PenTest+ exam objectives,
The Official CompTIA PenTest+ Instructor Guide teaches the essential skills and information needed to troubleshoot and problem solve,
helps learners understand a wide variety of issues ranging from networking and operating systems to mobile devices and security,
and prepares candidates to take the CompTIA PenTest+ certification exam (PT0-001).
This is 5 day course, with all official guidelines.
Course Outline
Lesson 1: Planning and Scoping Penetration Tests
Lesson 2: Conducting Passive Reconnaissance
Lesson 3: Performing Non-Technical Tests
Lesson 4: Conducting Active Reconnaissance
Lesson 5: Analyzing Vulnerabilities
Lesson 6: Penetrating Networks
Lesson 7: Exploiting Host-Based Vulnerabilities
Lesson 8: Testing Applications
Lesson 9: Completing Post-Exploit Tasks
Lesson 10: Analyzing and Reporting Pen Test Results
CompTIA Security+ (SY0-601)
Length – 5 days (40h)
Overview
CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
This is 5 day course, with all official guidelines.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.
Regulators and government rely on ANSI accreditation, because it provides confidence and trust in the outputs of an accredited program.
Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
Course Outline
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
CompTIA Server+ (SK0-004)
Length – 5 days (40 h)
Overview
The Official CompTIA Server+ Instructor Course (SK0-004) has been developed by CompTIA with input from instructors across the world.
Rigorously evaluated by third party subject matter experts to validate coverage of the Server+ exam objectives,
The Official CompTIA Server+ Course teaches the essential skills and information needed to troubleshoot and problem solve,
helps learners understand a wide variety of issues ranging from networking and operating systems to mobile devices and security,
and prepares candidates to take the CompTIA Server+ certification exam (SK0-004).
This is 5 day course, with all official guidelines.
Zagadnienia
Lesson 1: Managing Server Hardware
Lesson 2: Installing a Server
Lesson 3: Configuring Networking
Lesson 4: Creating a Virtual Environment
Lesson 5: Performing Basic Server Configuration
Lesson 6: Administering the Server
Lesson 7: Implementing Storage Solutions
Lesson 8: Securing the Server
Lesson 9: Planning and Testing Disaster Recovery
Lesson 10: Troubleshooting Server Issues
CompTIA Network+ (N10-007)
Length – 5 days
Overview
The Official CompTIA Network+ Course (N10-007) has been developed by CompTIA with input from instructors across the world. Rigorously evaluated by third party subject matter experts to validate coverage of the Network+ exam objectives, The Official CompTIA Network+ Instructor Guide 2019 Update teaches the essential skills and information needed to troubleshoot and problem solve, helps learners understand a wide variety of issues ranging from networking and operating systems to mobile devices and security, and prepares candidates to take the CompTIA Network+ certification exam (N10-007).
This is 5 day course, with all official guidelines.
Objectives
Lesson 1: Explaining the OSI Model and TCP/IP Models
Lesson 2: Explaining Properties of Network Traffic
Lesson 3: Installing and Configuring Switched Networks
Lesson 4: Configuring IP Networks
Lesson 5: Installing and Configuring Routed Networks
Lesson 6: Configuring and Monitoring Ports and Protocols
Lesson 7: Explaining Network Applications and Storage Services
Lesson 8: Monitoring and Troubleshooting Networks
Lesson 9: Explaining Networking Attacks and Mitigations
Lesson 10: Installing and Configuring Security Devices
Lesson 11: Explaining Authentication and Access Controls
Lesson 12: Deploying and Troubleshooting Cabling Solutions
Lesson 13: Implementing and Troubleshooting Wireless Technologies
Lesson 14: Comparing and Contrasting WAN Technologies
Lesson 15: Using Remote Access Methods
Lesson 16: Identifying Site Policies and Best Practices