TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do. While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course. His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.
A large percentage of training is moving to the virtualized/remote lab environments. Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs. There were either network connectivity issues, or issues with the remote access software, or other problems. The whole training experience was very frustrating and not productive.
We keep our labs open to students if they would like after hours, or before hours access. Repeatedly going through a lab engrains that knowledge for later recall. Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port. There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration. These disaster scenarious requires hands-on physical access to hardware. Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.
Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.
Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Manage Identity
- Plan Desktop and Device Deployment
- Plan and Implement a Microsoft 365 Solution
- Configure Networking
- Configure Storage
- Manage Data Access and Protection
- Manage Remote Access
- Manage Apps
- Manage Updates and Recovery
Comments
Latest comments from students
Liked the class? Then let everyone know!
Here are all of our Microsoft Server Products related courses:
- TN-963: Windows Security Automation with PowerShell
- TN-5425: Networking with Windows Server 2016
- TN-5415: Installation, Storage, and Compute with Windows Server 2016
- TN-5202: Microsoft SharePoint 2010 and 2013: Workflows and Designing InfoPath Forms
- TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
- TN-323: SharePoint 2010 and 2013 for Project Management
- MS-6232: Implementing a Microsoft SQL Server Database
- MS-6231: Maintaining a Microsoft SQL Server Database
- MS-10231: Designing a Microsoft SharePoint 2010 and 2013 Infrastructure
- MS-10175: Developing & Customizing Applications for Microsoft SharePoint 2010 & 2013
- MS-10174: Configuring and Administering SharePoint 2010 and 2013
Course Overview:
Getting started with the Elastic Stack (ELK), optimizing search performance and building efficient clusters. Ingest and process data, writing complex search requests and response utilization, scaling of clusters up or down, managing indices in large clusters and multiple clusters, management of clusters and troubleshooting recommendations.
Attendees to TN-430: Elasticsearch Engineer (ELK) will receive TechNow approved course materials, expert instruction, and prepare you to take ELK exam.
Dates/Locations:
No Events
Duration: 5 Days
Course Outline:
Data Management
- Define an index that satisfies a given set of requirements
- Define and use an index template for a given pattern that satisfies a given set of requirements
- Define and use a dynamic template that satisfies a given set of requirements
- Define an Index Lifecycle Management policy for a time-series index
- Define an index template that creates a new data stream
Searching Data
-
Write and execute a search query for terms and/or phrases in one or more fields of an index
-
Write and execute a search query that is a Boolean combination of multiple queries and filters
-
Write an asynchronous search
-
Write and execute metric and bucket aggregations
-
Write and execute aggregations that contain sub-aggregations
-
Write and execute a query that searches across multiple clusters
-
Write and execute a search that utilizes a runtime field
Developing Search Applications
-
Highlight the search terms in the response of a query
-
Sort the results of a query by a given set of requirements
-
Implement pagination of the results of a search query
-
Define and use index aliases
-
Define and use a search template
Data Processing
-
Define a mapping that satisfies a given set of requirements
-
Define and use a custom analyzer that satisfies a given set of requirements
-
Define and use multi-fields with different data types and/or analyzers
-
Use the Reindex API and Update By Query API to reindex and/or update documents
-
Define and use an ingest pipeline that satisfies a given set of requirements, including the use of Painless to modify documents
-
Define runtime fields to retrieve custom values using Painless scripting
Cluster Management
-
Diagnose shard issues and repair a cluster’s health
-
Backup and restore a cluster and/or specific indices
-
Configure a snapshot to be searchable
-
Configure a cluster for cross-cluster search
-
Implement cross-cluster replication
Comments
Latest comments from students