Want to know more about Nutanix Flow? Have you been thinking about getting training and/or a certification but don’t know where to start? Look no further! Look no further. Here is your complete guide to Nutanix Flow training resources available through Nutanix University.
Now more than ever, network security is top of mind for every IT professional. Rapid infrastructure changes from legacy systems, to virtualized, to cloud-native have created additional layers of complexity and risk.
With Flow, you can quickly deploy a powerful software-defined security solution without additional complexity or management overhead. Want to learn how? Take advantage of these great resources so that you’re using Flow to its fullest potential!
Complete Nutanix Flow Training Courses
In this free online course, we will give you an introduction into the foundations of Flow that will give you the jump start you need to succeed!
Learn about the need for security and governance in an enterprise and the Nutanix products that facilitate this.
Watch Nutanix Flow Demos
Here you can find a playlist of all our demos on Flow to see it live in action.
Our top recommendations:
To stay up to date on the latest videos and Nutanix Flow tips and demos, make sure to subscribe to the Nutanix University Youtube channel by clicking the “Subscribe” button on the page.
Review Nutanix Flow Configuration and Administration Guides
This tech note is intended for architects and administrators who are responsible for VM networking and security. You’ll learn about Nutanix Flow microsegmentation and visualization, plus creating and managing categories and security policies.
This guide describes how to use Prism Central and how you can monitor and manage entities across Nutanix clusters through a web console called Prism Central.
Download this best practice guide to learn more about Nutanix Flow, including design concepts for categories and security policies, how to configure Flow for Citrix Virtual Apps and Desktops, and logging and auditing.
Read our Nutanix Flow eBook
Learn how application-centric security can shift the focus away from VMs and their network identity to applications and simplify policy administration and management. Also learn how it can prioritize datasets and mitigate the constantly growing number of security risks businesses face today.
Access Additional Nutanix Resources
A detailed narrative of the Nutanix architecture, how the software and features work and how to leverage it for maximum performance.
Build your clouds your way in a few clicks. Instantly complete all your IT tasks on a unified cloud platform with Nutanix. Try it today.
This article was written by Karlie Beil, Customer Marketing Specialist.
© 2021 Nutanix, Inc. All rights reserved. Nutanix, the Nutanix logo and all Nutanix product, feature and service names mentioned herein are registered trademarks or trademarks of Nutanix, Inc. in the United States and other countries. Other brand names mentioned herein are for identification purposes only and may be the trademarks of their respective holder(s). This post may contain links to external websites that are not part of Nutanix.com. Nutanix does not control these sites and disclaims all responsibility for the content or accuracy of any external site. Our decision to link to an external site should not be considered an endorsement of any content on such a site. This post may contain express and implied forward-looking statements, which are not historical facts and are instead based on our current expectations, estimates and beliefs. The accuracy of such statements involves risks and uncertainties and depends upon future events, including those that may be beyond our control, and actual results may differ materially and adversely from those anticipated or implied by such statements. Any forward-looking statements included herein speak only as of the date hereof and, except as required by law, we assume no obligation to update or otherwise revise any of such forward-looking statements to reflect subsequent events or circumstances.