Formation VMware Workspace ONE : Deploy and Manage

Public admis

  • Salarié en Poste
  • Demandeur d'emploi
  • Entreprise
  • Etudiant

Financements

Eligible CPF Votre OPCO Financement personnel

Objectifs de la formation

À l'issue de cette formation VMware Workspace ONE Déploiement, vous serez capable de :

  • Explain the general features and functionality enabled with Workspace ONE UEM
  • Summarize essential Workspace ONE administrative functions
  • Summarize and implement shared Workspace ONE integrations Explain the integration of Workspace ONE UEM with directory services
  • Explain and deploy Workspace ONE edge services
  • Onboard device endpoints into Workspace ONE UEM
  • Securely deploy configurations to UEM managed devices
  • Maintain environment and device fleet health
  • Deploy applications to UEM managed devices
  • Analyze a Workspace ONE UEM deployment
  • Explain the general features and functionality enabled with Workspace ONE Access
  • Integrate Workspace ONE UEM with Workspace ONE Access
  • Summarize and implement Workspace ONE Productivity services into the digital workspace environment.
  • Explain the methods for enabling mobile single sign-on for mobile endpoints managed within the digital workspace
  • Ready and configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce

PLB CONSULTANT


Informatique et Management
Voir la fiche entreprise

Tarif

A partir de 4 500,00 €

Durée 5 jours (35h)
Modes
  • Centre
  • Entreprise
  • Distance
Sessions
Lieux Partout en France

PLB CONSULTANT


Informatique et Management
Voir la fiche

Tarif

A partir de 4 500,00 €

Durée 5 jours (35h)
Modes
  • Centre
  • Entreprise
  • Distance
Sessions
Lieux Partout en France

Description

In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multi-platform endpoint management solution with Workspace ONE UEM.
Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint lifecycle.

After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM. Also, you learn how to apply the fundamental techniques for integrating Workspace ONE Access with Workspace ONE UEM to securely distribute business-critical applications from any device and configure access management controls.
Through a combination of hands-on labs, simulations, and interactive lectures, you configure Access, enterprise, and productivity integrations.

You’ll leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course will lay out the foundational principles of identity and access management.

Attention, ce cours est dispensé en langue anglaise uniquement !

Programme

Course Introduction

Introductions and course logistics
Course objectives

Platform Architecture

Summaries the features and functionality of Workspace ONE Unified Endpoint Management (UEM)
Outline the benefits of leveraging the Workspace ONE UEM
Recognize the Workspace ONE UEM architecture and infrastructure needs for various integrations

Administration

Explain the features and functions of Workspace ONE Hub Services
Summarize hierarchical management structure
Navigate and customize the Workspace ONE UEM Console
Outline account options and permissions

Integrations

Outline the process and needs to integrate with directory services
Explain certificate authentication and practical implementation with Workspace ONE
Explain email integration options and best practices
Summarize content access enabled with Workspace ONE UEM

Onboarding

Outline autodiscovery staging requirements and methods
Enroll an endpoint via the Workspace ONE Intelligent Hub app
Summarize platform onboarding options

Managing Endpoints

Explain the differences between device and user profiles
Describe policy management options for Windows 10 and macOS
Summarize the Freestyle Orchestrator feature
Outline the capabilities enabled by sensors and scripts
Formulate a use-case for product provisioning

Maintenance

Identify console tools that support maintenance
Analyze how to implement compliance policies can protect environmental security
Outline features and functions enabled by Workspace ONE Assist

Application Access and Security

Summarize public, internal, & purchased application management
Differentiate software distribution from traditional application management
Summarize application management capabilities of Workspace ONE UEM
Outline the benefits and features enabled by the Workspace ONE SDK

Intelligence and Automation

Outline the functionality enabled by Workspace ONE Intelligence
Summarize and deploy automation

Workspace ONE Access

Summarize the benefits of Workspace ONE Access
Outline the core features and functions enabled by Workspace ONE Access
Navigate the Workspace ONE Access Console
 Explain the functions of Directory Integration with Workspace ONE Access
Explain the various types of authentication protocols enabled by Workspace ONE Access

Connecting UEM and Access

Explain the rationale for integrating UEM and Access
Outline process of connecting UEM and Access
Examine workflow of integrations
Summarize the key features of an integrated solution
Review and troubleshoot the upgrade process for NSX-T Data Center environment

Productivity Integration

Identify the functions enabled by the UAG
Outline the purpose of the SEG Edge Service
Explain the features enabled by the VMware Tunnel Edge Service
Summarize the capabilities enabled by the Content Gateway Edge Service

SAML 2.0 Authentication

Outline authentication methods supported by Workspace ONE Access
Summarize the main properties of SAML protocol
Summarize the SAML authentication workflow
Explain application SSO authentication workflow with SAML

Mobile Single-Sign On

Describe the concept of Mobile SSO (single sign-on) concept
Outline mobile SSO workflows

Prérequis

Aucun prérequis n'est nécessaire pour suivre cette formation VMware Workspace ONE Déploiement.

Public

Ce cours VMware Workspace ONE Déploiement s'adresse aux administrateurs, accounts managers, architectes de solution, ingénieurs et consultants Workspace ONE.

Ces formations pourraient vous intéresser

Objectifs de la formation

À l'issue de cette formation Fondamentaux Kaspersky Endpoint Security and Management, les participants auront acquis les connaissances et les compétences nécessaires pour :

  • Décrire les possibilités offertes par Kaspersky Endpoint Security pour Windows et de Kaspersky Security Center
  • Préparer et implémenter une solution de protection optimale de réseau Windows avec Kaspersky Endpoint Security et gérée à l'aide de Kaspersky Security Center
  • Administrer ce système
Tarif

Contacter l'organisme

Durée

3j / 21h

Modes
  • Centre
  • Entreprise
  • Distance

Objectifs de la formation

À l'issue de cette formation Check Point R81, vous aurez acquis les connaissances et compétences nécessaires pour :

  • Know how to perform periodic administrator tasks
  • Describe the basic functions of the Gaia operating system
  • Recognize SmartConsole features, functions, and tools
  • Understand how SmartConsole is used by administrators to give user access
  • Learn how Check Point security solutions and products work and how they protect networks
  • Understand licensing and contract requirements for Check Point security products
  • Describe the essential elements of a Security Policy
  • Understand the Check Point policy layer concept
  • Understand how to enable the Application Control and URL
  • Filtering software
  • Blades to block access to various applications
  • Describe how to configure manual and automatic NAT
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
  • Describe different Check Point Threat Prevention solutions for network attacks
  • Articulate how the Intrusion Prevention System is configured, maintained and tuned
  • Understand the Infinity Threat Prevention system
  • Knowledge about Check Point’s IoT Protect
Tarif

A partir de 3 000,00 €

Durée

3j / 21h

Modes
  • Centre
  • Entreprise
  • Distance

Objectifs de la formation

  • Pendant la formation, le formateur évalue la progression pédagogique des participants via des QCM, des mises en situation et des travaux pratiques. Les participants passent un test de positionnement avant et après la formation pour valider leurs compétences acquises.
Tarif

Contacter l'organisme

Durée

5 jours (35 heures)

Modes
  • Distance
  • Centre

Objectifs de la formation

  • Strengthen the knowledge on regulation changes, according to European directives on AML
  • Describe the type of customers base involved
  • Keep up to date knowledge on AML vigilance
  • Control procedures on suspicion report
  • Respect the evolution of the sanctions imposed by the authorities
  • Ascertain the designated persons' list regarding embargos and international sanctions
Tarif

A partir de 120,00 €

Durée

30 days

Modes
  • Entreprise

Formation Développeur .NET avec C#

Proposé par PLB CONSULTANT

Objectifs de la formation

  • Connaître la syntaxe et les concepts du langage C#
  • Travailler dans l'environnement Visual Studio
  • Utiliser le framework .NET, notamment les outils ADO.NET pour la gestion des données et Winforms pour les applications fenêtrées (menus, boîtes de dialogue, etc.)
  • Développer des applications et sites web avec ASP.NET
  • Accéder aux données avec ADO.NET et les services de données WCF
  • Assurer le traitement des données avec ADO.NET et LINQ
Tarif

A partir de 3 995,00 €

Durée

10j / 70h

Modes
  • Centre
  • Entreprise
  • Distance

Objectifs de la formation

You should be able to perform the following tasks :

  • Describe the features and applications of the Service Desk and Service Catalog
  • Explain the purpose and goals of request fulfillment, incident management, and problem management processes
  • Handle an issue from initial report to resolution using the Service Desk
  • Follow an offering from shopping to fulfillment using the Service Catalog
Tarif

A partir de 2 090,00 €

Durée

3j / 21h

Modes
  • Centre
  • Entreprise
  • Distance

Objectifs de la formation

  • Cette formation fait l'objet d'une évaluation formative.
Tarif

Contacter l'organisme

Durée

5 jours (35 heures)

Modes
  • Distance
  • Centre

Objectifs de la formation

  • Strengthen the knowledge on regulation changes following European directives on AML
  • Describe the type of customers base involved
  • Keep up to date knowledge on AML vigilance
  • Control procedures on suspicion report
  • Respect the evolution of the sanctions imposed by the authorities
  • Ascertain the designated persons' list regarding embargos and international sanctions
Tarif

A partir de 175,00 €

Durée

90 days

Modes
  • Entreprise

Objectifs de la formation

À l'issue de cette formation Check Point R81 CCSE, vous aurez acquis les connaissances et compétences nécessaires pour :

  • Provide an overview of the upgrade service and options available
  • Explain how to perform management upgrade and migration
  • Articulate the process using CPUSE features
  • Articulate the purpose and function of Management High Availability
  • Explain Primary vs Secondary, Active vs Standby and Synchronization
  • Explain disaster recovery steps in case the primary management server becomes unavailable
  • Provide overview of Central Deployment in SmartConsole
  • Articulate an understanding of Security Gateway cluster upgrade methods
  • Explain about Multi Version Cluster (MVC) upgrades
  • Discuss Gaia Commands and how they are used
  • Explain the main processes on s and s
  • Describe how to work with scripts and SmartTasks to configure ?automatic actions
  • Explain the Management Data Plane Separation (MDPS)
  • Explain kernel operations and traffic flow
  • Articulate Dynamic and Updatable Objects in Security Gateways
  • Explain the policy installation flow and files used
  • Describe the use of policy installation history
  • Explain concurrent and accelerated install policy
  • Describe an overview of APIs and ways to use and authenticate
  • Explain how to make changes in GAIA and management configuration
  • Explain how to install policy using API
  • Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance
  • Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance
  • Articulate how utilizing multiple traffic queues can make traffic handling more efficient
  • Discuss Site-to-Site VPN basics, deployment and communities
  • Describe how to analyze and interpret VPN tunnel traffic
  • Explain Link Selection and ISP Redundancy options
  • Explain tunnel management features
  • Discuss Check Point Remote Access solutions and how they differ from each other
  • Describe how client security can be provided by Remote Access
  • Explain authentication methods including machine authentication
  • Explain Multiple Entry Point (MEP)
  • Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections
  • Describe Mobile Access deployment options
  • Discuss various features in Mobile Access like Portals, Link
  • Translation, running Native Applications, Reverse Proxy and more
  • Explain basic concepts of Clustering and ClusterXL
  • Explain about Cluster Control Protocol (CCP) and synchronization
  • Describe advanced ClusterXL functions and modes like Load Sharing, Active-Active, VMAC mode etc
  • Discuss Cluster Correction Layer (CCL) to provide connection stickyness
  • Advanced Logs and Monitoring
  • Explain how to determine if the configuration is compliant with the best practices
  • Explain how to set action items to meet the compliance
  • Discuss how SmartEvent functions to identify critical security issues
  • Describe the components of SmartEvent and their deployment options
  • Discuss how SmartEvent can assist in reporting security threats
  • Explain how to customize event definitions and set an Event Policy
Tarif

A partir de 3 000,00 €

Durée

3j / 21h

Modes
  • Centre
  • Entreprise
  • Distance

Objectifs de la formation

À l'issue de cette formation ProxySG 7.3 Administration, vous aurez acquis les connaissances et compétences nécessaires pour :

  • Describe the major functions of the ProxySG as a secure web gateway
  • Understand how network security and administrative tasks are enhanced by integrating the ProxySG with the other members of the Symantec Secure Web Gateway family
Tarif

Contacter l'organisme

Durée

3j / 21h

Modes
  • Centre
  • Entreprise
  • Distance

Je cherche à faire...