See how Insoft Services is responding to COVID-19

Fortinet case study





Current Vendor :


titleADCX – Data Center Fabric with EVPN and VXLAN
days5
seo_title
seo_dec
seo_tkey
categorydata-center-insoft-specials
vendorJuniper

techonogyJuniper
overviewThis five-day course is designed to provide in-depth instruction on IP fabric and EVPN-VXLAN data center design and configuration. Additionally, the course will cover other data center concepts, including basic and advanced data center design options, Data Center Interconnect (DCI), EVPN multicast enhancements, and an introduction to data center automation concepts. The course ends with a multi-site data center design lab. tudents will learn to configure and monitor these features on the Junos operating system running in a vQFX environment. Through demonstrations and hands-on labs, students will gain experience configuring, monitoring, troubleshooting, and analyzing the mentioned features of the Junos OS. This content is based on Junos OS Release 18.1R3-SX  
objective

After successfully completing this course, you should be able to:

  • Describe and configure an IP fabric.
  • Describe and configure an EVPN-VXLAN data center.
  • Describe and configure Centrally Routed Bridging (CRB) EVPN-VXLAN.
  • Describe and configure Edge Routed Bridging (ERB) EVPN-VXLAN.
  • Describe basic and advanced data center design concepts.
  • Describe and configure Data Center Interconnect.
  • Describe enhancements to multicast functionality in an EVPN-VXLAN.
  • Describe the role of multicloud data center controllers.

outline

Day 1

Chapter 1: Course Introduction

Chapter 2: Data Center Fundamentals Overview

  • Traditional Multitier Architecture Challenges
  • Next Generation Data Center Fabrics
  • Juniper Networks Data Center Platforms

 

Chapter 3: IP Fabrics

  • IP Fabric Overview
  • IP Fabric Routing
  • IP Fabric Scaling
  • IP Fabric Configuration
  • Lab 1: IP Fabric

 

Chapter 4: VXLAN Fundamentals

  • VXLAN Functions and Operations
  • VXLAN Implementation
  • VXLAN Gateways

 

Day 2

Chapter 5: EVPN Controlled VXLAN

  • Benefits of EVPN
  • VXLAN using EVPN Control Plane

 

Chapter 6: Configuring EVPN VXLAN

  • Configuring and Monitoring EVPN Signaling for VXLAN Routing
  • Lab 2: EVPN-VXLAN Routing

 

Day 3

Chapter 7: Basic Data Center Architectures

  • Basic Data Center Architecture
  • Base Design
  • Design Options and Modifications
  • Lab 3: EVPN-VXLAN Layer 3 Gateways

 

Chapter 8: Data Center Interconnect

  • DCI Overview
  • DCI Options for a VXLAN Overlay
  • EVPN Type 5 Routes
  • DCI Example

 

Day 4

Chapter 8: Data Center Interconnect

  • Lab 4: DCI

 

Chapter 9: Advanced Data Center Architectures

  • Advanced Data Center Architectures
  • Base Design

 

Chapter 10: EVPN Multicast

  • Multicast Overview
  • Multicast in an EVPN-VXLAN Environment

 

Chapter 11: Introduction to Multicloud Data Center

  • Data Center Evolution
  • Contrail Enterprise Multicloud Use

 

Day 5

Chapter 12: Comprehensive Data Center Lab

  • Data Center Architectures
  • Lab 5: Data Center Comprehensive Lab

 

Appendix A: Virtual Chassis Fabric

Appendix B: Virtual Chassis Fabric Management

Appendix C: Junos Fusion Data Center

Appendix D: Multichassis LAG

Appendix E: Troubleshooting MC-LAG

Appendix F: ZTP

Appendix G: In-Service Software Upgrade

Appendix H: Troubleshooting Basics

Appendix I: Data Center Devices


target_au

The primary audiences for this course are the following:

  • Data center implementation engineers
  • Data center design engineers

pre_req

The following are the prerequisites for this course:

  • Understanding of the OSI model;
  • Advanced routing knowledge—the Advanced Junos Enterprise Routing (AJER) course or equivalent knowledge;
  • Intermediate switching knowledge—the Junos Enterprise Switching Using Enhanced Layer 2 Software (JEX) or equivalent; and
  • Intermediate to advanced Junos CLI experience.

titleMIST – Juniper Mist AI-Driven Networks
days4
seo_title
seo_dec
seo_tkey
categorynetworking
vendorJuniper

techonogyEnterprise Networking
overviewThis four-day course is designed to provide students with the knowledge required to work with enterprise wireless technologies and Mist AI-driven Wi-Fi networks. Students will gain in-depth knowledge of Wi-Fi technologies, Mist technologies, and how to use and configure them. Through demonstrations and hands-on labs, students will gain experience with the features and functionality of Mist AI-driven Wi-Fi.
objective

After successfully completing this course, you should be able to:

  • Describe WLAN association and roaming.
  • Explain the wireless LAN life cycle.
  • Explain and configure Mist architecture.
  • Describe a wireless enterprise network.
  • Explain the purpose of Mist and key differentiators.
  • Describe wireless fundamentals.
  • Describe the basic features Mist.
  • Describe how to add new organizations and sites.
  • Navigate the Mist portal.
  • Describe the Mist AP deployment model.
  • Provide an overview of the Mist onboarding workflow.
  • Implement RF and configuration templates.
  • Configure wireless access policies.
  • Describe the EX Series switch deployment model.
  • Describe the workflow for onboarding an EX Series switch to a Wired Assurance deployment.
  • Describe labels and their use with Mist.
  • Use Mist intelligent analytics and Marvis.
  • Describe Real Time Location Sensor (RTLS) concepts and methods.
  • Describe Mist automation and scripting.
  • Instantiate a standalone NGFW site using CSO and SRX Series devices.
  • Describe Service Level Experience and its place in wireless networks.
  • Describe the client location service and use cases.
  • Describe the components of an enterprise WLAN.
  • Configure an enterprise grade WLAN.
  • Describe a sitemap, site survey, and their critical components.
  • Describe the subscriptions available for Mist.
  • Describe the monitoring features.
  • Generate reports.

outline

Day 1

Chapter 1: Course Introduction

Chapter 2: WiFi Basics

  • What Is Wi-Fi?
  • 802.11 PHYs
  • Frequency Bands
  • RF Basics
  • Modulation and Coding
  • Network Arbitration and Contention
  • WLAN Architectures
  • WLAN Association and Roaming
  • Network Contention
  • Wireless LAN Life Cycle
  • LAB 1: WLAN Testing

 

Day 2

Chapter 3: Mist Architecture and Initial Setup

  • Mist Architecture
  • Mist Account Organizations and Subscriptions
  • Configuration Objects
  • Organization Objects Versus Site Objects
  • Access Points Overview, Configuration, and Troubleshooting
  • LAB 2: Initial Setup
  • LAB 3: Remote Site

 

Chapter 4: WLANs

  • WLAN Concepts
  • Security Concepts
  • Mist WLANs
  • Policy (WxLAN)
  • Wireless Intrusion Detection and Prevention
  • LAB 4: WLANs
  • LAB 5: Multiple PSK

 

 

Day 3

Chapter 5: RTLS

  • Wireless Assurance
  • Events and Insights
  • Radio Resources Management (RRM)
  • Wired Assurance
  • LAB 6: SLE Troubleshooting

 

Chapter 6: AI and Marvis

  • Artificial Intelligence (AI) Reactive and Proactive Troubleshooting
  • Reactive and Proactive Troubleshooting
  • Marvis Language and Actions
  • LAB 7: Marvis

 

 

Day 4

Chapter 7: Real Time Location Sensor (RTLS)

  • Concepts and Methods
  • Wi-Fi Location
  • Virtual BLE
  • User Engagement
  • Asset Visibility

 

Chapter 8: Automation and Scripting Overview

  • Mist API Overview
  • Automation and Scripting Overview
  • LAB 8: RESTful API
  • LAB 9: WebSocket API

target_au

This course benefits individuals responsible for working with enterprise wireless networks and applying artificial intelligence to their activities.


pre_req

The following are the prerequisites for this course:

  • Basic TCP/IP skills
  • Basic knowledge of wireless (Wi-Fi) technologies is recommended.

titleIJAUT – Introduction to Junos Platform Automation and DevOps
days3
seo_title
seo_dec
seo_tkey
categorynetwork-automation
vendorJuniper

techonogyJuniper
overviewThis three-day course provides students with introductory knowledge of how to automate Junos using DevOps automation tools, protocols, and technologies. Students receive hands-on experience with tools and languages relevant to automating the Junos OS platform in a DevOps environment. The course includes an introduction to the basic DevOps practices, Junos APIs, and NETCONF. It then focuses on using Python, PyEZ, Ansible, and REST API to automate Junos. XML, JSON, and YAML are introduced as these languages facilitate Junos automation. Through demonstrations and hands-on labs, students will gain experience in automating the Junos operating system and device operations. This course uses Junos OS Release 18.1R1, Junos PyEZ 2.1, and Ansible 2.5.
objective

After successfully completing this course, you should be able to:

  • Describe the Junos operating system and its basic design architecture.
  • Explain traffic processing for transit and exception traffic.
  • Describe the Junos CLI and its features.
  • List and perform initial configuration tasks.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe DevOps principles and practices.
  • Explain how DevOps can benefit an IT organization.
  • List and describe the various APIs Junos provides for automation.
  • Discuss various frameworks, libraries and tools available to automate Junos devices.
  • Read Junos XML documents.
  • Use XPath to navigate a Junos XML document.
  • Use NETCONF and the XML API to issue RPCs.
  • Use NETCONF and the XML API to configure a Junos device.
  • Understand JSON syntax.
  • Understand YAML syntax.
  • Create JSON and YAML documents.
  • Perform Ansible installation.
  • Retrieve information from Junos devices using Ansible.
  • Use Ansible to configure Junos devices.
  • Create and execute simple Python scripts.
  • Use the Python interactive interpreter.
  • Install Junos PyEZ.
  • Use PyEZ to connect to Junos devices.
  • Use PyEZ to issue RPCs.
  • Use PyEZ to modify a Junos device configuration.
  • Use PyEZ to upgrade Junos devices.
  • Describe basic PyEZ exception handling.
  • Describe the capabilities of the Junos REST API.
  • Use the Junos REST API Explorer.
  • Issue Junos REST API RPCs.

outline

Day 1

Chapter 1: Course Introduction

Chapter 2: Introduction to Junos OS

  • Junos OS Basic Design Architecture
  • Traffic Processing
  • CLI Modes and Features
  • Initial Configuration Tasks
  • Interface Types and Configuration
  • Lab 1: Configuring a Device using Junos CLI

 

Chapter 3: Introduction to DevOps

  • Why DevOps?
  • The Benefits of DevOps
  • DevOps Goals and Best Practices

 

Chapter 4: The Junos Automation Stack

  • The Junos Automation Stack and DevOps
  • Junos XML API Overview
  • Junos REST API Overview
  • Junos JET API Overview
  • Review of Junos Automation Tools

 

Day 2

Chapter 5: Introduction to XML and XPath

  • Basic XML Syntax
  • The Junos XML Schema
  • Navigating the Junos XML Schema with XPath
  • Lab 2: Working with XML and XPath

 

Chapter 6: The XML API and NETCONF

  • NETCONF
  • The Junos XML API
  • Languages and Libraries Used to Automate the Junos XML API
  • Case Study
  • Lab 3: Using XML and NETCONF for Automation

 

Chapter 7: Introduction to JSON and YAML

  • The Need to Structure Data
  • JSON Basics
  • YAML Basics
  • Use of JSON and YAML in Junos Automation
  • Lab 4: Using JSON and YAML

 

Chapter 8: Introduction to Ansible

  • Ansible Architecture and Capabilities
  • Ansible Playbook Basics
  • Using Ansible to Retrieve Junos Status Information
  • Using Ansible to Retrieve and Modify Configuration Information
  • Case Study
  • Lab 5: Using Ansible to Automate Junos

 

Chapter 9: Introduction to Python

  • Basic Python Syntax
  • Python 2 vs. Python 3
  • Python Data Types and Variables
  • Python Sequences, Tuples, Sets, and Dictionaries
  • Python Libraries
  • The Python Interactive Interpreter
  • Case Study: Creating a Python Script to Solve a Problem
  • Lab 6: Using the Python Interpreter

 

Day 3

Chapter 10: Introduction to XML and XPath

  • Connecting to Junos Devices with PyEZ
  • Retrieving Junos Device Status and Configuration Handling
  • Modifying the Junos Configuration with PyEZ
  • Using PyEZ utilities to upgrade Junos software
  • Case Study
  • Lab 7: Using PyEZ to Manage Junos Devices

 

Chapter 11: The Junos REST API

  • Overview of the Junos REST API
  • Methods of Connecting to the Junos REST API
  • Configuring the Junos REST API
  • Using the Junos REST API Explorer
  • Using the Junos REST API to Retrieve Junos Configuration Data
  • Case Study
  • Lab 4: Using the REST API

target_au

This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.


pre_req

Basic understanding of the OSI model and the TCP/IP protocol suite;

Basic understanding of computer networking concepts


titleIJSEC – Introduction to Junos Security
days3
seo_title
seo_dec
seo_tkey
categoryjunos-security
vendorJuniper

techonogyJuniper
overview
This 3-day course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration.   The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application-level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies.   Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.   This course is based on Junos OS Release 19.1R1.6.

objective

After completing this course you should be able to:

  • Identify high-level security challenges in today’s networks
  • Identify products that are incorporated into the Juniper Connected Security solution
  • Explain the value of implementing security solutions
  • Explain how Juniper Connected Security solves the cyber security challenges of the future
  • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide
  • Explain traffic flows through the SRX Series devices
  • List the different security objects and how to create them
  • Describe interface types and perform basic interface configuration tasks
  • Describe the initial configuration for an SRX Series device
  • Explain security zones
  • Describe screens and their use
  • Explain address objects
  • Describe services and their use
  • Describe the purpose for security policies on an SRX Series device
  • Describe zone-based policies
  • Describe global policies and their use
  • Explain unified security policies
  • Configure unified security policies with the J-Web user interface
  • Describe IDP signatures
  • Configure an IDP policy using predefined templates with the J-Web user interface
  • Describe the use and configuration of the integrated user firewall feature
  • Describe the UTM security services
  • List the available UTM services on the SRX Series device
  • Configure UTM filtering on a security policy with the J-Web user interface
  • Explain Sky ATP’s use in security
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats
  • Describe NAT and why it is used
  • Explain source NAT and when to use it
  • Explain destination NAT and when to use it
  • Explain static NAT and its uses
  • Describe the operation and configuration the different types of NAT
  • Identify various types of VPNs
  • Describe IPsec VPNs and their functionality
  • Describe how IPsec VPNs are established
  • Describe IPsec traffic processing
  • Configure IPsec VPNs with the J-Web user interface
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface
  • Monitor IPsec VPNs with the J-Web user interface
  • Describe the J-Web monitoring features
  • Explain the J-Web reporting features
  • Describe the Sky Enterprise service and how it can save resources
  • Explain the functionality of Junos Space Security Director

outline

Juniper Security Concepts

  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security

Juniper Connected Security – SRX Series Devices

  • Connected Security
  • Interfaces
  • Initial Configuration
  • LAB 1: Initial Configuration

Security Objects

  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects
  • LAB 2: Creating Security Objects with J-Web

Security Policies

  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies
  • LAB 3: Creating Security Policies with J-Web

Security Services – IDP and User Firewall

  • IDP Security Services
  • Integrated User Firewall
  • LAB 4: Adding IDP and User Firewall Security Services to Security Policies

Security Services – UTM

  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam
  • LAB 5: Adding UTM Security Services to Security Policies

Juniper Connected Security – Sky ATP

  • Sky ATP Overview
  • Blocking Threats
  • Lab 6: Demonstrating Sky ATP

Network Address Translation

  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT
  • Lab 7: Implementing Network Address Translation

IPsec VPN Concepts

  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing

Site-to-Site VPNs

  • IPsec Configuration
  • IPsec Site-to-Site Tunnel
  • Lab 8: Implementing Site-to-Site IPsec VPNs

Monitoring and Reporting

  • J-Web monitoring options
  • J-Web Reporting options
  • Lab 9: Using Monitoring and Reporting

Appendices

  • Appendix A: SRX Series Hardware
  • Appendix B: Virtual SRX
  • Appendix C: CLI Primer
  • Appendix D: Sky Enterprise Services
  • Appendix E: Junos Space Security Director

target_au

Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.


pre_req

Attendees should meet the following prerequisites:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite

titleEMCC – Enterprise Multicloud Automation and Orchestration Using Contrail
days3
seo_title
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis three-day course is designed to provide knowledge of how to use Contrail Enterprise Multicloud in cloud networks. Through demonstrations and hands-on labs, students will gain experience in working with Contrail Enterprise Multicloud in Kubernetes, OpenShift, VMware vCenter, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) environments. Students will also learn how to secure cloud networks with Contrail Security, service chaining, and Juniper cSRX. This course is based on Contrail Release 2003. Enterprise Multicloud Automation and Orchestration Using Contrail (EMCC) is an advanced-level course
objective

After successfully completing this course, you should be able to:

  • Describe the benefits of Contrail Enterprise Multicloud.
  • Describe the use cases of Contrail Enterprise Multicloud.
  • Understand the Contrail Enterprise Multicloud architecture.
  • Explain Kubernetes architecture.
  • Explain how Contrail integrates with Kubernetes.
  • Understand how Contrail Security is used with Kubernetes.
  • List main deployment methods for Contrail with Kubernetes.
  • Explain Red Hat OpenShift architecture.
  • Explain how Contrail integrates with Red Hat OpenShift.
  • Understand how to launch OpenShift workloads and connect them over Contrail Virtual Networks.
  • Understand how Contrail Security is used with Red Hat OpenShift.
  • Explain vCenter architecture.
  • Understand vCenter integration with Contrail.
  • Describe how to connect vCenter workloads using Contrail virtual networks.
  • Describe how to use Contrail Security features to secure vCenter workloads.
  • Understand how VMware vRealize Orchestrator works with Contrail.
  • Explain the main AWS concepts.
  • Describe how to launch AWS workloads with Contrail Enterprise Multicloud .
  • Describe how to connect AWS workloads to private cloud over Contrail VNs.
  • Explain the main Azure concepts.
  • Describe how to launch Azure workloads with Contrail Enterprise Multicloud .
  • Describe how to connect Azure workloads to private cloud over Contrail VNs.
  • Explain the main GCP concepts.
  • Describe how to launch GCP workloads with Contrail Enterprise Multicloud .
  • Describe how to connect GCP workloads to private cloud over Contrail VNs.
  • Describe service chaining within Contrail.
  • Configure In-Network, In-Network-NAT, and Transparent service chains.
  • Understand route leaking, policies, and aggregation in service chains.
  • Understand the features of Juniper cSRX.
  • Configure cSRX service chains

outline

Chapter 1: Course Introduction

Chapter 2: Contrail Enterprise Multicloud Overview

  • CEM Overview
  • CEM Use Cases
  • CEM Architecture

 

Chapter 3: Using Contrail with Kubernetes

  • Kubernetes Architecture
  • Contrail Integration Overview
  • Service and Ingress
  • Workload Isolation
  • Using Contrail Security
  • Deploying Contrail with Kubernetes
  • Lab 1: Contrail and Kubernetes Integration

 

Chapter 4: Using Contrail with Red Hat OpenShift

  • Red Hat OpenShift Overview
  • OpenShift Architecture and Contrail Integration
  • Working with OpenShift and Contrail
  • Case Study
  • Lab 2: Contrail and OpenShift Integration

Chapter 5: Using Contrail with VMware vCenter

  • Overview of VMware vCenter and Contrail Integration
  • Using Contrail vCenter Fabric Manager Plugin
  • Using Contrail Virtual Machine
  • Instantiating vCenter Workloads over Contrail Virtual Networks
  • Securing vCenter Workloads with Contrail Security
  • Contrail and VMware vRealize Orchestrator
  • Lab 3: Contrail and vCenter Integration

 

Chapter 6: Private to Public Cloud Overlay Networking – AWS

  • AWS and Contrail Overview
  • Deploying Contrail Multicloud for AWS
  • Lab 4: Interconnecting Private Cloud Workloads to AWS Workloads

 

Chapter 7: Private to Public Cloud Overlay Networking – Azure

  • Azure and Contrail Overview
  • Deploying Contrail Multicloud for Azure
  • Lab 5: Interconnecting Private Cloud Workloads to Azure Workloads

Chapter 8: Private to Public Cloud Overlay Networking – GCP

  • Google Cloud Platform (GCP) Overview
  • Deploying Contrail Multicloud for GCP

 

Chapter 9: Contrail Service Chains

  • Service Chaining Overview
  • Service Chain Configuration
  • Advanced Service Chain Operation
  • Lab 6: Creating Contrail Service Chains

 

Chapter 10: Service Chaining with cSRX

  • cSRX Overview
  • Multiple Interface Pods in Kubernetes
  • Service Chaining with cSRX
  • Lab 7: Creating Service Chains with cSRX

target_au

The primary audience for this course includes network engineers, administrators, support personnel, and reseller support personnel, responsible for working with Contrail-based networking solutions in data center and enterprise cloud environments.


pre_req

The prerequisites for this course are as follows:

  • TCP/IP networking knowledge
  • Working knowledge of cloud networks
  • Attended Cloud Automation Using Contrail (CAC) course

Recommended prerequisites:


titleJCF – Juniper Cloud Fundamentals
days3
seo_title
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis three-day course is designed to provide students with an understanding of cloud enabled networks, cloud service deployment concepts, and virtualized network platforms such as vSRX and vMX. This course provides a high level overview and understanding of the following concepts:
  • Cloud Network Underlays
  • Cloud Network Overlays
  • Cloud Design
  • Cloud Implementation Methods
  • Cloud Services
  • Juniper Networks Virtualized Platforms

objective
  • Describe network overlay and underlay concepts.
  • Describe private, public, and hybrid cloud architecture and implementation.
  • Describe the implementation of services in a cloud networking environment.
  • Describe the implementation and functions of the Juniper vSRX platform.
  • Describe the implementation and functions of the Juniper vMX platform.
  • Describe the implementation and functions of the Juniper NFX platform.
  • Describe the role of Juniper Networks virtualized platforms in public cloud offerings.
  • Describe the functionality and use of Juniper Networks Cloud Connector.
  • Describe the need for Software Defined Networking.
  • Describe basic SDN concepts.
  • Describe common types of SDN implementation.
  • Describe the main Network Function Virtualization components.
  • Describe cloud services monitoring.
  • Describe the functions of AppFormix in cloud services.
  • Describe SDN WAN concepts.
  • Describe the role, functions, and features of the NorthStar Controller.
  • Describe the role, functions, and features of WANDL/IP MPLS View.
  • Describe the role and functions a vCPE and uCPE components.
  • Describe the role and functions of Contrail Service Orchestration.
  • Describe Software Defined Secure Network concepts.
  • Describe methods to secure an SDN environment.

outline

Day1:

1.Course Introduction

2. Cloud Components:

  • Cloud Networking Definition
  • Cloud Architecture
  • XaaS 3 Virtualized Platforms
  • Juniper Networks Virtualized Platforms
  • Juniper Networks Virtualized Platforms in Public Clouds
  • Cloud Connector Lab: Deploying Juniper Networks Virtual Devices – vMX

3.Virtualized Platforms

  •  Juniper Networks Virtualized Platforms
  • Juniper Networks Virtualized Platforms in Public Clouds
  • Cloud Connector Lab: Deploying Juniper Networks Virtual Devices – vMX

Lab: Deploying Juniper Networks Virtual Devices – vMX

4. SDN Fundamentals:

  • The Need for SDN
  • SDN Explained
  • OpenFlow Based SDN
  • SDN as an Overlay
  • SDN via API
  • Applications of SDN

 Day2:

5. Network Function Virtualization:

  • Introduction to NFV
  • NFV Architecture
  • Examples of VNFs

Lab: Manually Deploying VNFs

 

 6.Orchestration and Automation

  • Managing a Cloud Infrastructure
  • OpenStack for Orchestration
  • Contrail/OpenContrail SDN Controller

NSX for SDN

 

 7.AppFormix:

  • Operations Management
  • AppFormix Operation and Use Cases

Lab: AppFormix

 

8.SD WAN Solutions:

  • SD WAN Concepts
  • NorthStar SD WAN Controller
  • NorthStar Controller Use Cases
  • WANDL IP/MPLSView

9.Cloud CPE:

  • Legacy Versus Cloud CPE Architecture
  • Cloud CPE with Contrail Service Orchestration

Lab: Cloud CPE (video demonstration)

 

10 Cloud Security :

  • Legacy Network Security
  • Cloud Security Concepts
  • SDSN Components Lab

Cloud Security using SkyATP


target_au

This course benefits individuals responsible for planning and coordinating cloud enabled networks and services in data center, private cloud, public cloud, hybrid cloud, service provider, and enterprise WAN environments.


pre_req

Students should have basic TCP/IP skills, a general understanding of data center environments, a general understanding of enterprise WAN environments, and a basic understanding of virtualization


titleIJSA – Implementing Juniper Networks Secure Analytics
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogy
overviewThis three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.   Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4. Implementing Juniper Networks Secure Analytics is an introductory-level course.
objective
  • After successfully completing this course, you should be able to:
  • Describe the JSA system and its basic functionality.
  • Describe the hardware used with the JSA system.
  • Identify the technology behind the JSA system.
  • Identify the JSA system’s primary design divisions—display versus detection, and events versus traffic.
  • Plan and prepare for a new installation.
  • Access the administration console.
  • Configure the network hierarchy.
  • Configure the automatic update process.
  • Access the Deployment Editor.
  • Describe the JSA system’s internal processes.
  • Describe event and flow source configuration.
  • List key features of the JSA architecture.
  • Describe the JSA system’s processing logic.
  • Interpret the correlation of flow and event data.
  • List the architectural component that provides each key function.
  • Describe Events and explain where they come from.
  • Access the Log Activity interface.
  • Execute Event searches.
  • Describe flows and their origin.
  • Configure the Network Activity interface.
  • Execute Flow searches.
  • Specify the JSA system’s Asset Management and Vulnerability Assessment functionality.
  • Access the Assets interface.
  • View Asset Profile data.
  • View Server Discovery.
  • Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).
  • Access vulnerability scanner configuration.
  • View vulnerability profiles.
  • Describe rules.
  • Configure rules.
  • Configure Building Blocks (BBs).
  • Explain how rules and flows work together.
  • Access the Offense Manager interface.
  • Understand Offense types.
  • Configure Offense actions.
  • Navigate the Offense interface.
  • Explain the Offense summary screen.
  • Search Offenses.
  • Use the JSA system’s Reporting functionality to produce graphs and reports.
  • Navigate the Reporting interface.
  • Configure Report Groups.
  • Demonstrate Report Branding.
  • View Report formats.
  • Identify the basic information on maintaining and troubleshooting the JSA system.
  • Navigate the JSA dashboard.
  • List flow and event troubleshooting steps.
  • Access the Event Mapping Tool.
  • Configure Event Collection for Junos devices.
  • Configure Flow Collection for Junos devices.
  • Explain high availability (HA) functionality on a JSA device.

outline
  • Chapter 1: Course Introduction
  • Chapter 2: Product Overview
  • Overview of the JSA Series Device
  • Hardware
  • Collection
  • Operational Flow
  • Chapter 3: Initial Configuration
  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
  • Lab 1: Initial Configuration
  • Chapter 4: Architecture
  • Processing Log Activity
  • Processing Network Activity
  • JSA Deployment Options
  • Chapter 5: Log Activity
  • Log Activity Overview
  • Configuring Log Activity
  • Lab 2: Log Activity
  • Chapter 6: Network Activity
  • Network Activity Overview
  • Configuring Network Activity
  • Lab 3: Network Activity
  • Chapter 7: Assets and Vulnerability Assessment
  • Asset Interface
  • Vulnerability Assessment
  • Vulnerability Scanners
  • Lab 4: Assets and Vulnerability Assessment
  • Chapter 8: Rules
  • Rules
  • Configure Rules and Building Blocks
  • Lab 5: Rules
  • Chapter 9: Offense Manager
  • Offense Manager
  • Offense Manager Configuration
  • Offense Investigation
  • Lab 6: Configure the Offense Manager
  • Chapter 10: JSA Reporting
  • Reporting Functionality
  • Reporting Interface
  • Lab 7: Reporting
  • Chapter 11: Basic Tuning and Troubleshooting
  • Basic Tuning
  • Troubleshooting
  • Chapter 12: Configuring Junos Devices for Use with JSA
  • Collecting Junos Events
  • Collecting Junos Flows
  • Lab 8: Configuring Junos Devices for JSA
  • Appendix A: High Availability
  • High Availability
  • Configuring High Availability

 


target_au

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing the JSA system.

 


pre_req
  • This course assumes that students have basic networking knowledge and experience in the following areas:
  • Understanding of TCP/IP operation;
  • Understanding of network security concepts; and
  • Experience in network security administration.

titleCAC – Cloud Automation Using Contrail
days5
seo_title
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis five-day course is designed to provide students with the knowledge required to work with the Juniper Contrail software-defined networking (SDN) solution. Students will gain in-depth knowledge of how to use the Contrail Command user interface, Contrail Networking, Contrail’s fabric management and administration features, and Contrail Security, as well as AppFormix analytics features. Students will also learn to use APIs and the CLI to perform the Contrail configuration tasks. Through demonstrations and hands-on labs, students will gain experience with the features of Contrail and AppFormix. This course is based on Contrail Release 1912 and AppFormix 2.19.10. Cloud Automation Using Contrail is an intermediate-level course
objective

After successfully completing this course, you should be able to:

  • Explain the role of Contrail SDN Controller.
  • List available Contrail solutions.
  • Describe the purpose of an orchestrator.
  • Describe the basics of Kubernetes.
  • Identify the function of each of the main OpenStack Projects.
  • Describe the purpose of Contrail.
  • Explain how the versions of Contrail differ.
  • Discuss Contrail related solutions.
  • Describe the functions of the Contrail vRouter and Contrail Controller.
  • Explain the role of the control, configuration, and analytic nodes.
  • Configure and deploy virtual DNS and IPAMs.
  • Create virtual networks.
  • Create policies to control the flow of traffic.
  • Explain the routing behavior of an IP Fabric
  • Describe the steps to onboard a Brownfield IP Fabric.
  • Describe the steps to onboard a Greenfield IP Fabric.
  • Describe the various commands to troubleshoot the onboarding of an IP Fabric.
  • Explain the benefits of VXLAN in the data center.
  • Describe EVPN signaling for VXLAN.
  • Describe how CEM can bridge between a VM and a BMS.
  • Implement bridging between VMs and BMSs using VXLAN and EVPN signaling.
  • Describe EVPN signaling for VXLAN routing in the Spine.
  • Describe how to enable central routing using CEM.
  • Describe EVPN signaling for DCI.
  • Describe how to enable DCI using CEM.
  • Create physical gateways.
  • Describe architecture and capabilities of Contrail Security.
  • Configure main Contrail Security features.
  • Explain the benefits of AppFormix.
  • Explain the operation and use of AppFormix.
  • Explain how to setup and install AppFormix in different environments.
  • Explain the purpose and use of the different AppFormix features.
  • Understand the purpose of the Clusters feature.
  • Describe how to use the dashboard to examine the state of the network.
  • Understand the purpose and use of the Charts feature.
  • Explain the benefits of capacity planning.
  • Explain how to setup the chargeback functionality.
  • Explain how to use AppFormix charts.
  • Explain how to use AppFormix heat maps.
  • Describe the benefits of reports and service monitoring functionalities.
  • Explain the purpose and use of AppFormix alarms.
  • Explain the purpose and use of AppFormix Composite Alarms.
  • Explain the purpose of JTI.
  • Discuss native sensors.
  • Explain OpenConfig and gRPC sensors.
  • Describe best practices for JTI.
  • Explain how to use JTI with AppFormix.

outline

Chapter 1: Course Introduction

Chapter 2: SDN and Contrail

  • Review of SDN
  • Contrail Basics Contrail Advantages, Capabilities, and Features Contrail Products and Solutions Contrail Use Cases Contrail Command
  • Lab 1: Contrail Command Walkthrough

 

Chapter 3: Orchestration Fundamentals

  • Orchestrator Overview
  • Kubernetes Orchestrator
  • OpenStack Orchestrator
  • Lab 2: Instantiating Virtual Workloads

Chapter 4: Contrail Architecture Fundamentals

  • Contrail Architecture Overview
  • Contrail Management and Analytics
  • Contrail Control Plane Communications
  • Contrail Data Plane Communications
  • Basic Contrail Troubleshooting
  • Lab 3: Exploring and Troubleshooting the Contrail vRouter and SDN Controller

 

Chapter 5: Contrail Configuration

  • Contrail Configuration Methods
  • Configuring DNS and IPAM
  • Configuring the Metadata Service
  • Configuring Virtual Networks
  • Configuring Network Policies and Security Groups
  • Contrail Configuration API
  • Lab 4: Configuring Virtual Networks and Policies

 

Chapter 6: IP Fabric Automation

  • IP Fabric Review
  • Greenfield Fabric Automation
  • Brownfield Fabric Automation
  • Troubleshooting Fabric Automation
  • Lab 5: IP Fabric Automation

Chapter 7: VM to BMS Bridging

  • VXLAN Review
  • EVPN Signaling for BMS to BMS VXLAN Forwarding
  • Contrail VM to BMS Bridging<./li>
  • Server/Instance example
  • Virtual Port Groups
  • Lab 6: VM to BMS Bridging

 

Chapter 8: VXLAN Routing

  • EVPN Signaling for Central Routing
  • Central Routing Example
  • EVPN Signaling for Edge Routing
  • Edge Routing Example
  • Lab 7: VXLAN Routing

 

Chapter 9: Data Center Interconnect

  • DCI Overview
  • DCI Options for a VXLAN Overlay using Contrail Automation
  • DCI Example using Contrail Automation
  • Lab 8: Data Center Interconnect

Chapter 10: Interacting with External Networks

  • DC Gateway Use Case/LI>
  • Implementing a DC Gateway
  • Lab 9: DC Gateway

 

Chapter 11: Fabric Administration

  • Generic Device Operations/LI>
  • Hitless Fabric Upgrade
  • Lab 10: Fabric Administration

 

Chapter 12: Contrail Security

  • The Need for Contrail Security
  • Contrail Security Configuration
  • Monitoring and Visualization
  • Lab 11: Contrail Security

Chapter 13: AppFormix Overview

  • AppFormix Overview
  • AppFormix UI and General Settings AppFormix Features Overview: Clusters, Dashboard, Charts, Heat Map, Plan, Reports, Chargeback

 

Chapter 14: Alarms and Composite Alarms

  • Alarms
  • Alarms Case Study
  • Composite Alarms
  • Lab 12: Implementing AppFormix Features

 

Chapter 15: Junos Telemetry Interface

  • JTI Overview
  • Native Sensors for JTI
  • OpenConfig and gRPC Sensors for JTI
  • Lab 13: Implementing JTI with AppFormix

target_au

This course benefits individuals responsible for working with software-defined networking solutions in data center, service provider, and enterprise network environments.


pre_req

The prerequisites for this course are as follows:

  • Basic TCP/IP skills;
  • General understanding of data center virtualization;
  • Basic understanding of the Junos operating system;
  • Completion of the Data Center Fabric with EVPN and VXLAN (ADCX) course or equivalent knowledge; and
  • Completion of the Juniper Cloud Fundamentals (JCF) course; and
  • Basic knowledge of object-oriented programming and Python scripting is recommended.

Recommended prerequisites:


titleJND-DC – Juniper Networks Design – Data Center
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for data center design including data center architectures, data center interconnects, security considerations, virtualization, and data center operations.
objective

After successfully completing this course, you should be able to:

  • State high-level concepts about different data center architectures.
  • Identify features used to interconnect data centers.
  • Identify key high-level considerations about securing and monitoring a data center deployment.
  • Outline key high-level concepts when implementing different data center approaches.
  • Recommend data center cooling designs and considerations.
  • Explain device placement and cabling requirements.
  • Outline different data center use cases with basic architectures.
  • Describe a traditional multitier data center architecture.
  • Explain link aggregation and redundant trunk groups.
  • Explain multichassis link aggregation.
  • Summarize and discuss key concepts and components of a Virtual Chassis.
  • Summarize and discuss key concepts and components of a VCF.
  • Summarize and discuss key concepts and components of a QFabric System.
  • Summarize and discuss key concepts and components of Junos Fusion.
  • List the reasons for the shift to IP fabrics.
  • Summarize how to scale an IP fabric.
  • State the design considerations of a VXLAN overlay.
  • Define the term Data Center Interconnect.
  • List differences between the different Layer 2 and Layer 3 DCIs.
  • Summarize and discuss the benefits and use cases for EVPN.
  • Discuss the security requirements and design principles of the data center.
  • Identify the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.
  • Summarize and discuss the purpose of SDN.
  • Explain the function of Contrail.
  • Summarize and discuss the purpose of NFV.
  • Discuss the purpose and function of vSRX and vMX.
  • Discuss the importance of understanding the baseline behaviors in your data center.
  • List the characteristics of the Junos Space Network Management Platform and describe its deployment options.
  • Describe the importance of analytics.
  • Discuss automation in the data center.
  • Discuss the benefits of QoS and CoS.
  • State the benefits of a converged network.
  • Identify general aspects of data center migration.
  • Summarize and discuss best practices for migration planning.
  • Outline some common migration scenarios.
  • Summarize high availability design considerations in the data center.
  • Provide an overview of high availability offerings and solutions in the data center

outline

Chapter 1: Course Introduction

Chapter 2: Overview of Data Center Design

  • Initial Considerations
  • Architectures and Design considerations
  • Connecting Data Centers
  • Security and Operation
  • Implementation Considerations

Chapter 3: Initial Design Considerations

  • Physical Layout and Placement
  • Environmental Conditions
  • Cabling Options
  • Data Center Use Cases

Chapter 4: Traditional Data Center Architecture

  • Traditional Multi-tier Architecture
  • Link Aggregation and Redundant Trunk Groups
  • Multichassis Link Aggregation
  • Designing a Multi-tier Architecture Lab

Chapter 5: Ethernet Fabric Architectures

  • Virtual Chassis
  • Virtual Chassis Fabric
  • QFabric
  • Junos Fusion
  • Ethernet Fabric Design Considerations
  • Lab: Ethernet Fabric Architecture

Chapter 6: IP Fabric Architecture

  • The Shift To IP Fabrics
  •  IP Fabric Routing Design
  • IP Fabric Scaling
  • VXLAN
  • Lab: IP Fabric Architecture

Chapter 7: Data Center Interconnect

  • DCI Overview
  • Layer 2 DCI
  • EVPN Use Cases
  • Layer 3 DCI
  • Lab: Interconnecting Data Centers

Chapter 8: Securing the Data Center

  • Overview of Data Center Security
  • Security Elements
  • Simplifying Security in the Data Center
  • Advanced Data Center Security
  • Lab: Securing the Data Center

Chapter 9: SDN and Virtualization in the Data Center

  • Designing SDN in the Data Center
  • Using Contrail in the Data Center
  • Using NFV in the Data Center
  • Understanding How Contrail Works in the Data Center
  • Working in Virtual Environments in the Data Center
  • Lab: SDN and Virtualization

Chapter 10: Data Center Operation

  • Understanding baseline behaviors
  • Deploying Junos Space and JSA
  • Understanding analytics
  • Deploying automation in the data center
  • Lab: Data Center Operations

Chapter 11: Traffic Prioritization for Converged Networks

  • Understanding QoS, and CoS
  • Converging Networks
  • Lab: Prioritizing Data in the Data Center

Chapter 12: Migration Strategies

  • Migration Overview
  • Common Scenarios
  • Migration Case Study
  • Lab: Data Center Migration

Chapter 13: High Availability

  • Data Center High Availability Overview
  • Link Level and Physical Device Redundancy
  • Device-Level Redundancy

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of design for the data center


pre_req

The following are the prerequisites for this course:

  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Basic knowledge of hypervisors and load balancers.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

Recommended prerequisites:


titleJND-SEC – Juniper Networks Design Security
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for security design, including traditional and modern security principles such as security design specifics for campus and branch, enterprise wide area network (WAN), service provider WAN, and data center deployments. This course also includes design principles for security management, automation, and virtualization.JND-SEC is an intermediate-level course.
objective
  • After successfully completing this course, you should be able to:
  • Identify high level security challenges with different design architectures.
  • Explain the value of implementing security solutions in any network design.
  • Identify key factors in Juniper Networks security focus.
  • List and describe the security platforms and solutions offered by Juniper Networks.
  • Perform the steps necessary to identify customer security requirements.
  • Explain what is required to define the scope of the security design.
  • Identify the data required to perform a data analysis of the customer’s existing network and use that information in the design.
  • Describe traditional security practices used to secure a network.
  • Explain the added capabilities that next generation firewalls provide.
  • Explain the evolution of modern security models.
  • Describe intelligent networks.
  • Explain how Software-Defined Secure Networking improves security in network design.
  • Explain the need for centralized Security Management.
  • Describe what Junos Space Security Director can do to manage network security.
  • Describe the function of Juniper Secure Analytics in managing network security.
  • List the main components of the Juniper Automation Stack.
  • Explain Juniper Networks automation solutions.
  • Describe the benefits of automating security.
  • Describe how security works in a virtualized environment.
  • Explain the benefits of service chaining.
  • Describe Juniper Virtual SRX and Container SRX products.
  • Describe network virtualization with VMware NSX.
  • Describe the benefits of HA with security devices.
  • Discuss how to handle asymmetric traffic with security devices.
  • Describe different options for SRX chassis cluster deployments.
  • Describe the main security concerns for the campus and the branch networks.
  • Explain end-to-end security concepts.
  • Describe security functions at different network layers.
  • Explain network authentication and access control concepts.
  • Describe common campus and branch network security design examples.
  • Describe security considerations for the enterprise WAN.
  • Explain when to use IPsec and NAT in the enterprise WAN.
  • Explain virtual router applications for the enterprise WAN.
  • Discuss security best practices in the enterprise WAN.
  • Describe security in the service provider WAN.
  • Discuss security best practices for the service provider WAN.
  • Discuss the security requirements and design principles of the data center.
  • Describe the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.

outline
  • Chapter 1: Course Introduction
  • Chapter 2:Security in Network Design
  • The Value of Security in Network Design
  • Juniper’s Security Focus
  • Chapter 3: Assessing Security in Network Design
  • Overview
  • Customer Security Requirements
  • Customer Scope
  • Data Analysis
  • Chapter 4: Traditional Security Architectures
  • Traditional Security Practices
  • NAT
  • IPsec VPNs
  • Next Generation Firewalls
  • Unified Threat Management
  • Lab: Designing a Traditional Security Architecture
  • Chapter 5: Modern Security Principles
  • Modern Security Model
  • Designing an Intelligent Network
  • Use Cases
  • Modularity in Security Design
  • Lab: Designing for Security Intelligence
  • Chapter 6: Managing Security
  • Security Management Challenges
  • Junos Space Security Director
  • Juniper Secure Analytics
  • Lab: Security Management
  • Chapter 7: Automating Security
  • Automating Security Introduction
  • Juniper Automation Stack
  • Juniper Automation Tools
  • Automating Security
  • Lab: Automating Security
  • Chapter 8: Virtualizing Security
  • Security in a Virtualized Environment
  • Virtual SRX
  • Security with SDN and NFV
  • Container SRX
  • Network Virtualization with VMware NSX
  • Lab: Virtualizing Security
  • Chapter 9: Providing High Availability in Security Design
  • Benefits of High Availability with Security Devices
  • Implementing Physical High Availability
  • Asymmetrical Traffic Handling
  • SRX Chassis Clustering
  • Lab: High Availability
  • Chapter 10: Securing the Campus and Branch
  • Campus and Branch Security: An Overview
  • Network Segmentation and Perimeter Security
  • Application-Level Security
  • Access Control and Authentication
  • Layer 2 Security Functions
  • Case Studies and Example Architectures
  • Lab: Designing for Campus and Branch Security
  • Chapter 11: Securing the Enterprise WAN
  • Security in the Enterprise WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures
  • Lab: Designing for Enterprise WAN Security
  • Chapter 12: Securing the Service Provider WAN
  • Security in the Service Provider WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures
  • Lab: Designing for Service Provider WAN Security
  • Chapter 13: Securing the Data Center
  • Overview of Data Center Security
  • Security Elements
  • Simplifying Security in the Data Center
  • Advanced Data Center Security
  • Lab: Securing the Data Center
  • Appendix A: Juniper Security Solutions
  • Security Products and Solutions

 


target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design


pre_req
  • The following are the prerequisites for this course:
  • Knowledge of network security concepts, including: Traditional and next-generation firewalls; IPsec VPNs; Network Address Translation (NAT); and Security intelligence.
  • Knowledge of Juniper Networks products and solutions.
  • Network automation and virtualization concepts.
  • Basic knowledge of hypervisors and high availability concepts.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

 

Recommended prerequisites:


titleJND-SP – Juniper Networks Design-Service Provider
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for Wide Area Network (WAN) design including WAN interconnects, security considerations, virtualization, and management/operations. This course covers both service provider and enterprise WAN design.
objective
  • Describe high level concepts about the different WAN architectures.
  • Identify key features used to interconnect WANs.
  • Describe key high level considerations about securing and monitoring a WAN deployment.
  • Outline high level concepts for implementing WANs.
  • Explain various methods of WAN connectivity.
  • Describe basic MPLS concepts as they are related to WANs.
  • Identify basic Ethernet concepts as they are related to WANs.
  • Describe key concepts of network availability.
  • Explain high availability features and protocols.
  • Describe the key aspects of class of service.
  • Describe how core WAN technologies are used to solve specific problems facing network designers.
  • Discuss core routing requirements.
  • Explain how to design a high performance MPLS WAN core.
  • Define CoS requirements for the WAN core.
  • Discuss BGP peering and path selection.
  • Design MPLS Layer 2 and Layer 3 services.
  • Design metro Ethernet networks.
  • Understand role of class of service in provider edge.
  • Describe Next-generation MVPNs.
  • Explain how enterprise WAN technologies are used to solve specific problems facing network designers.
  • Outline various solutions regarding campus and branch WANs.
  • Explain how data centers are interconnected through WANs.
  • Identify various solutions regarding data center WAN interconnection.
  • Describe the benefits and use cases for EVPN.
  • Describe security concepts regarding WANs.
  • Explain the differences between LAN security concepts and WAN security concepts.
  • Explain VPN-related concepts regarding WANs.
  • Describe methods to manage WANs.
  • Discuss key concepts related to WAN management.
  • Explain how virtualization and SDN can be leveraged in the WAN.
  • Describe various SDN products and how they are used in the WAN.
  • Describe MX, SRX, T, PTX, ACX, QFX, EX, and NFX Series devices and the basics of how they relate to WAN solutions

outline

Day 1

COURSE INTRODUCTION

Overview of WAN Design

  • WAN Design Overview
  • WAN Domains
  • Management, Operations, and Security
  • Implementation Considerations

WAN Connectivity

  • Public and Private
  • Service Provider
  • Enterprise

Network Availability and Traffic Prioritization

  • Network Availability
  • Class of Service

LAB: Network Availability and CoS Design

Day 2

Service Provider Core WAN

  • WAN Core Overview
  • Core Routing
  • MPLS Design
  • CoS Considerations

Lab : WAN Core Design

Day 3

Service Provider Edge WAN

  • Provider Edge

Lab: Service Provider Edge—VPN Design

Access and Aggregation Edge

  • Services
  • CoS Considerations
  • Multicast

Lab : Service Provider Edge—Services Design

Day 4

Enterprise WAN

  • Enterprise WAN Overview
  • WAN Topologies
  • Campus and Branch
  • CoS Considerations
  • Large Enterprise Designs

LAB: Enterprise WAN Design

Data Center WAN

  • WAN Overview
  • EVPN

LAB: Data Center WAN Design

WAN Security

  • Security Overview
  • WAN Versus LAN
  • Service Provider Core WAN Security
  • Service Provider Edge WAN Security
  • Enterprise WAN Security

LAB: Security Design

Day 5

WAN Management

  • Best Practices and Considerations
  • OoB Management Design
  • Junos Space
  • Juniper WAN Automation

LAB: WAN Management Design

WAN Virtualization and SDN

  • SDN Overview
  • NorthStar
  • Contrail
  • SD-WAN

LAB: SDN Design

WAN Device Portfolio

  • Platform and Junos Overview
  • MX Series
  • SRX Series
  • PTX and T Series
  • ACX Series
  • QFX Series
  • EX Series
  • NFX Series

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of WAN design.


pre_req
  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

titleNSE 4 – FortiGate v6.4 Bundle Training
days5
seo_titleNSE 4 - FortiGate v6.4 Bundle Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this 5 days course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. You will aldo learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics.

Product Versions

  • FortiOS 6.4
 

This FortiGate Bundle Training course help participants prepare for the NSE 4 certification exam.


objective

After completing this course, you should be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Identify the characteristics of the Fortinet Security Fabric
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Offer an SSL VPN for secure access to your private network
  • Collect and interpret log entries
  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load -balanced deployments
  • Configure SD-WAN to load balance traffic between multiple WAN links effectively
  • Inspect traffic transparently, forwarding as a Layer 2 device
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Deploy implicit and explicit proxy with firewall policies, authentication, and caching
  • Diagnose and correct common problems

outline

FortiGate Security:

  1. Introduction and Initial Configuration
  2. Security Fabric
  3. Firewall Policies
  4. Network Address Translation (NAT)
  5. Firewall Authentication
  6. Logging and Monitoring
  7. Certificate Operations
  8. Web Filtering
  9. Application Control
  10. Antivirus
  11. Intrusion Prevention and Denial of Service
  12. SSL VPN

FortiGate Infrastructure:

  1. Routing
  2. Software-Defined WAN (SD-WAN)
  3. Virtual Domains
  4. Layer 2 Switching
  5. IPsec VPN
  6. Fortinet Single Sign-On (FSSO)
  7. High Availability (HA)
  8. Web Proxy
  9. Diagnostics

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network

titleFortiGate Infrastructure v6.4 Training
days2
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this two-day course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics.
objective

After completing this course, you should be able to:

  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load -balanced deployments
  • Configure SD-WAN to load balance traffic between multiple WAN links effectively
  • Inspect traffic transparently, forwarding as a Layer 2 device
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Deploy implicit and explicit proxy with firewall policies, authentication, and caching
  • Diagnose and correct common problems

outline
  1. Routing
  2. Software-Defined WAN (SD-WAN)
  3. Virtual Domains
  4. Layer 2 Switching
  5. IPsec VPN
  6. Fortinet Single Sign-On (FSSO)
  7. High Availability (HA)
  8. Web Proxy
  9. Diagnostics

target_au

Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate appliances should attend this course.

This course assumes knowledge of basic FortiGate fundamentals. Participants should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network
  • Knowledge of the fundamentals of FortiGate, as presented in the FortiGate Security course

titleFortiGate Security v6.4 Training
days3
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this three-day course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
objective

After completing this course, you should be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Identify the characteristics of the Fortinet Security Fabric
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Offer an SSL VPN for secure access to your private network
  • Collect and interpret log entries

outline
  1. Introduction and Initial Configuration
  2. Security Fabric
  3. Firewall Policies
  4. Network Address Translation (NAT)
  5. Firewall Authentication
  6. Logging and Monitoring
  7. Certificate Operations
  8. Web Filtering
  9. Application Control
  10. Antivirus
  11. Intrusion Prevention and Denial of Service
  12. SSL VPN

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.

You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts

titleCompTIA A+ Certification
days5
seo_title
seo_dec
seo_tkey
categoryit-services-management-training
vendorComptia

techonogyIT Services Management
overviewCompTIA’s A+ Certification is the industry standard for validating the foundational skills needed by support technicians in today's digital world. A technical support professional does much more than fix a PC, they now have to understand how applications work across systems and be capable of solving problems that help to keep the business running smoothly. The CompTIA A+ Certification has recently been updated to reflect the growing focus on topics such cybersecurity, Prvacy, IoT, Scripting, Virtualisation and Cloud. This certification requires that you pass two exams: CompTIA A+ Core 1 Exam 220-1001 and Core 2 Exam 220-1002.
objective

After completing this course you should be able to:

  • Support basic IT infrastructure, including endpoint management, advanced device connectivity troubleshooting, and basic networking
  • Configure and support PC, mobile and IoT device hardware, including components, connectors and peripherals
  • Implement basic data backup and recovery methods and apply data storage and management best practices
  • Demonstrate baseline security skills for IT support professionals, including detecting and removing malware, addressing privacy concerns, physical security and device hardening
  • Configure device operating systems, including Windows, Mac, Linux, Chrome OS, Android and iOS and administer client-based as well as cloud-based (SaaS) software
  • Troubleshoot and problem solve core service and support challenges while applying best practices for documentation, change management, and the use of scripting in IT support

outline

Supporting Operating Systems

  • Identify Common Operating Systems
  • Troubleshooting Methodolgy
  • Use Windows Features and Tools
  • Manage Files in Windows
  • Manage Disks in Windows
  • Manage Devices in Windows

Installing and Configuring PC Components

  • Use Appropriate Safety Procedures
  • PC Components
  • Common Connection Interfaces
  • Install Peripheral Devices

Installing, Configuring and Troubleshooting Display and Multimedia Devices

  • Install and Configure Display Devices
  • Troubleshoot Display Devices
  • Install and Configure Multimedia Devices

Installing, Configuring and Troubleshooting Storage Devices

  • Install System Memory
  • Insall and Configure Mass Storage Devices
  • Install and Configure Removable Storage
  • Configure RAID
  • Troublshoot Storage Devices

Installing, Configuring and Troubleshooting Internal System Components

  • Install and Upgrade CPUs
  • Configure and Update BIOS/UEFI
  • Install Power SUpplies
  • Troubleshoot Internal System Components
  • Configure a Custom PC

Installing, Configuring and Maintaining Operating Systems

  • Configure and Use Linux
  • Configure and Use macOS
  • Install and Upgrade Operating Systems
  • Maintain OSs

Maintaining and Troubleshooting Microsoft Windows

  • Install and Manage Windows Applications
  • Manage Windows Performance
  • Troublshoot WIndows

Network Infrastructure Concepts

  • Wired Networks
  • Network Hardware Devices
  • Wireless Networks
  • Internet Connection Types
  • Network Configuration Concepts
  • Network Services

Configuring and Troubleshooting Networks

  • Configure Network Connection Settings
  • Install and Configure SOHO Networks
  • Configure SOHO Network Security
  • Configure Remote Access
  • Troubleshoot Network Connectons
  • Install and configure IoT Devices

Managing Users, Workstations and Shared Resources

  • Manage Users
  • Configure Shared Resources
  • Configure Active Directory Accounts and Policies

Implementing Client Virtualization and Cloud Computing

  • Configure Client-Side Virtualization
  • Cloud Computing Concepts

Security Concepts

  • Logical Security Concepts
  • Threat and Vulnerabilities
  • Physical Security Measures

Securing Workstations and Data

  • Implement Security Best Practices
  • Implement Data Protection Policies
  • Protect Data During Incident Response

Troubleshooting Workstation Security Issues

  • Detect, Remove and Prevent Malware
  • Troubleshoot Common Workstation Security Issues

Supporting and Troubleshooting Laptops

  • Use Laptop Features
  • Install and Configure Laptop Hardware
  • troublshoot Common Laptop Issues

Supporting and Troublshooting Mobile Devices

  • Mobile Device Types
  • Connect and Configure Mobile Device Accessories
  • Configure Mobile Device Network Connectivity
  • Support Mobile Apps
  • Secure Mobile Devices
  • Troublshoot Mobile Device Issues

Installing, Configuring and Troubleshooting Print Devices

  • Maintain Laser Printers
  • Maintain Inkjet Printers
  • Maintain Impact, Thermak and 3D Printers
  • Install and Configure Printers
  • Troubleshoot Print Device Issues
  • Install and Configure Imaging Devices

Implementing Operational Procedures

  • Environmental Impacts and Controls
  • Create and Maintain Documentation
  • Use Basic Change Management Best Practices
  • Implement Disaster Prevention and Recovery Methods
  • Basic Scripting Concepts
  • Professionalism and Communication

target_au
pre_req
  • Recognize the main components of a PC and different data media such as USB drives and DVD.
  • Start the computer and navigate the desktop.
  • Use Windows Explorer to create directories and subdirectories and manage files.
  • Use a web browser such as Internet Explorer to view websites.

titleSESA 3.1 – Securing Email with Cisco Email Security Appliance
days4
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications. This class will help you
  • Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
  • Gain leading-edge career skills focused on enterprise security
  • Earn 24 Cisco CE credits toward recertification
What to expect in the exam The 300-720 SESA exam certifies your knowledge of Cisco Email Security Appliance, including administration, spam control and anti-spam, message filters, data loss prevention, Lightweight Directory Access Protocol (LDAP), email authentication and encryption, and system quarantines and delivery methods. After you pass 300-720 SESA:
  • You earn the Cisco Certified Specialist - Email Content Security
  • You will have satisfied the concentration exam requirement for the new CCNP Security To complete your CCNP Security certification, pass the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam or its equivalent.
 

See other Cisco courses available


objective

After taking this course, you should be able to:

  • Describe and administer the Cisco Email Security Appliance (ESA)
  • Control sender and recipient domains
  • Control spam with Talos SenderBase and anti-spam
  • Use anti-virus and outbreak filters
  • Use mail policies
  • Use content filters
  • Use message filters to enforce email policies
  • Prevent data loss
  • Perform LDAP queries
  • Authenticate Simple Mail Transfer Protocol (SMTP) sessions
  • Authenticate email
  • Encrypt email
  • Use system quarantines and delivery methods
  • Perform centralized management using clusters
  • Test and troubleshoot

outline
  • Describing the Cisco Email Security Appliance
    • Cisco Email Security Appliance Overview
    • Technology Use Case
    • Cisco Email Security Appliance Data Sheet
    • SMTP Overview
    • Email Pipeline Overview
    • Installation Scenarios
    • Initial Cisco Email Security Appliance Configuration
    • Centralizing Services on a Cisco Content Security Management Appliance (SMA)
    • Release Notes for AsyncOS 11.x
  • Administering the Cisco Email Security Appliance
    • Distributing Administrative Tasks
    • System Administration
    • Managing and Monitoring Using the Command Line Interface (CLI)
    • Other Tasks in the GUI
    • Advanced Network Configuration
    • Using Email Security Monitor
    • Tracking Messages
    • Logging
  • Controlling Sender and Recipient Domains
    • Public and Private Listeners
    • Configuring the Gateway to Receive Email
    • Host Access Table Overview
    • Recipient Access Table Overview
    • Configuring Routing and Delivery Features
  • Controlling Spam with Talos SenderBase and Anti-Spam
    • SenderBase Overview
    • Anti-Spam
    • Managing Graymail
    • Protecting Against Malicious or Undesirable URLs
    • File Reputation Filtering and File Analysis
    • Bounce Verification
  • Using Anti-Virus and Outbreak Filters
    • Anti-Virus Scanning Overview
    • Sophos Anti-Virus Filtering
    • McAfee Anti-Virus Filtering
    • Configuring the Appliance to Scan for Viruses
    • Outbreak Filters
    • How the Outbreak Filters Feature Works
    • Managing Outbreak Filters
  • Using Mail Policies
    • Email Security Manager Overview
    • Mail Policies Overview
    • Handling Incoming and Outgoing Messages Differently
    • Matching Users to a Mail Policy
    • Message Splintering
    • Configuring Mail Policies
  • Using Content Filters
    • Content Filters Overview
    • Content Filter Conditions
    • Content Filter Actions
    • Filter Messages Based on Content
    • Text Resources Overview
    • Using and Testing the Content Dictionaries Filter Rules
    • Understanding Text Resources
    • Text Resource Management
    • Using Text Resources
  • Using Message Filters to Enforce Email Policies
    • Message Filters Overview
    • Components of a Message Filter
    • Message Filter Processing
    • Message Filter Rules
    • Message Filter Actions
    • Attachment Scanning
    • Examples of Attachment Scanning Message Filters
    • Using the CLI to Manage Message Filters
    • Message Filter Examples
    • Configuring Scan Behavior
  • Preventing Data Loss
    • Overview of the Data Loss Prevention (DLP) Scanning Process
    • Setting Up Data Loss Prevention
    • Policies for Data Loss Prevention
    • Message Actions
    • Updating the DLP Engine and Content Matching Classifiers
  • Using LDAP
    • Overview of LDAP
    • Working with LDAP
    • Using LDAP Queries
    • Authenticating End-Users of the Spam Quarantine
    • Configuring External LDAP Authentication for Users
    • Testing Servers and Queries
    • Using LDAP for Directory Harvest Attack Prevention
    • Spam Quarantine Alias Consolidation Queries
    • Validating Recipients Using an SMTP Server
  • SMTP Session Authentication
    • Configuring AsyncOS for SMTP Authentication
    • Authenticating SMTP Sessions Using Client Certificates
    • Checking the Validity of a Client Certificate
    • Authenticating User Using LDAP Directory
    • Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate
    • Establishing a TLS Connection from the Appliance
    • Updating a List of Revoked Certificates
  • Email Authentication
    • Email Authentication Overview
    • Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing
    • Verifying Incoming Messages Using DKIM
    • Overview of Sender Policy Framework (SPF) and SIDF Verification
    • Domain-based Message Authentication Reporting and Conformance (DMARC) Verification
    • Forged Email Detection
  • Email Encryption
    • Overview of Cisco Email Encryption
    • Encrypting Messages
    • Determining Which Messages to Encrypt
    • Inserting Encryption Headers into Messages
    • Encrypting Communication with Other Message Transfer Agents (MTAs)
    • Working with Certificates
    • Managing Lists of Certificate Authorities
    • Enabling TLS on a Listener’s Host Access Table (HAT)
    • Enabling TLS and Certificate Verification on Delivery
    • Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services
  • Using System Quarantines and Delivery Methods
    • Describing Quarantines
    • Spam Quarantine
    • Setting Up the Centralized Spam Quarantine
    • Using Safelists and Blocklists to Control Email Delivery Based on Sender
    • Configuring Spam Management Features for End Users
    • Managing Messages in the Spam Quarantine
    • Policy, Virus, and Outbreak Quarantines
    • Managing Policy, Virus, and Outbreak Quarantines
    • Working with Messages in Policy, Virus, or Outbreak Quarantines
    • Delivery Methods
  • Centralized Management Using Clusters
    • Overview of Centralized Management Using Clusters
    • Cluster Organization
    • Creating and Joining a Cluster
    • Managing Clusters
    • Cluster Communication
    • Loading a Configuration in Clustered Appliances
    • Best Practices
  • Testing and Troubleshooting
    • Debugging Mail Flow Using Test Messages: Trace
    • Using the Listener to Test the Appliance
    • Troubleshooting the Network
    • Troubleshooting the Listener
    • Troubleshooting Email Delivery
    • Troubleshooting Performance
    • Web Interface Appearance and Rendering Issues
    • Responding to Alerts
    • Troubleshooting Hardware Issues
    • Working with Technical Support
  • References
    • Model Specifications for Large Enterprises
    • Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch Offices
    • Cisco Email Security Appliance Model Specifications for Virtual Appliances
    • Packages and Licenses

Lab outline

  • Verify and Test the Cisco ESA Configuration
  • Perform Basic Administration
  • Advanced Malware in Attachments (Macro Detection)
  • Protect Against Malicious or Undesirable URLs Beneath Shortened URLs
  • Protect Against Malicious or Undesirable URLs Inside Attachments
  • Intelligently Handle Unscannable Messages
  • Leverage AMP Cloud Intelligence Via Pre-Classification Enhancement
  • Integrate Cisco ESA with AMP Console
  • Prevent Threats with Anti-Virus Protection
  • Applying Content and Outbreak Filters
  • Configure Attachment Scanning
  • Configure Outbound Data Loss Prevention
  • Integrate Cisco ESA with LDAP and Enable the LDAP to Accept Query
  • Domain Keys Identified Mail (DKIM)
  • Sender Policy Framework (SPF)
  • Forged Email Detection
  • Configure the Cisco SMA for Tracking and Reporting

target_au
  • Security engineers
  • Security administrators
  • Security architects
  • Operations engineers
  • Network engineers
  • Network administrators
  • Network or security technicians
  • Network managers
  • System designers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have one or more of the following basic technical competencies:

  • Cisco certification (Cisco CCENT® certification or higher)
  • Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
  • Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
  • Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], CompTIA (A+, Network+, Server+)

The knowledge and skills that a student must have before attending this course are:

  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
  • Experience with IP routing

Cisco learning offerings that contribute to recommended skills and knowledge:


titleUnderstanding Cisco Cybersecurity Operations Fundamentals (CBROPS) 1.0
days5
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course will help you:
  • Learn the fundamental skills, techniques, technologies, and the hands-on practice necessary to prevent and defend against cyberattacks as part of a SOC team
  • Prepare for the 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam which earns the Cisco Certified CyberOps Associate certification

objective

After taking this course, you should be able to:

  • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
  • Explain the data that is available to the network security analyst.
  • Describe the basic concepts and uses of cryptography.
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
  • Understand common endpoint security technologies.
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
  • Identify resources for hunting cyber threats.
  • Explain the need for event data normalization and event correlation.
  • Identify the common attack vectors.
  • Identify malicious activities.
  • Identify patterns of suspicious behaviors.
  • Conduct security incident investigations.
  • Explain the use of a typical playbook in the SOC.
  • Explain the use of SOC metrics to measure the effectiveness of the SOC.
  • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
  • Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
  • Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.

 


outline
  • Defining the Security Operations Center
  • Understanding Network Infrastructure and Network Security Monitoring Tools
  • Exploring Data Type Categories
  • Understanding Basic Cryptography Concepts
  • Understanding Common TCP/IP Attacks
  • Understanding Endpoint Security Technologies
  • Understanding Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
  • Understanding Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
  • Using a Playbook Model to Organize Security Monitoring
  • Understanding SOC Metrics
  • Understanding SOC Workflow and Automation
  • Describing Incident Response
  • Understanding the Use of VERIS
  • Understanding Windows Operating System Basics
  • Understanding Linux Operating System Basics

Lab outline

  • Use SIEM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Explore TCP/IP Attacks
  • Explore Endpoint Security
  • Investigate Hacker Methodology
  • Hunt Malicious Traffic
  • Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
  • Investigate Browser-Based Attacks
  • Analyze Suspicious Domain Name System (DNS) Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks
  • Explore the Windows Operating System
  • Explore the Linux Operating System

target_au

This course is designed for individuals seeking a role as an associate-level cybersecurity analyst, IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:

  • Students pursing a technical degree
  • Current IT professionals
  • Recent college graduates with a technical degree

pre_req

 

Before taking this course, you should have the following knowledge and skills:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows and Linux operating systems
  • Familiarity with basics of networking security concepts

The following Cisco course can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)

titleECS ExtremeWireless Cloud
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewExtremeWireless Cloud Training ECS course provides Extreme Networks customers and partners theoretical and practical hands-on training to give students a better understanding of Extreme Networks Cloud WiFi technologies. Students will also learn how to manage and orchestrate ExtremeWireless Cloud from within the ExtremeCloud IQ management platform.
objective
  • Have the ability to onboard devices and configure WLANS using the powerful cloud based solution that is ExtremeCloud IQ.
  • Gain basic wireless skills and be able to utilize the knowledge gained to deploy real world solutions.
  • Prepare students to take the Extreme Wireless Cloud ECS exam.

outline

Solution Overview

  • Global Data Centers
  • Regional Data Centers
  • ISO 27001
  • GDPR and Privacy
  • Private Cloud
  • Local Cloud
  • Wireless Hardware
  • Distributed Architecture
  • Understanding the evolution of distributed architecture
  • Distributed Control
  • Cooperative Control Protocols

 

ExtremeCloud IQ

  • Taking a first look at ExtremeCloud IQ
  • Logging in for the first time

 

WLAN Design Concepts

  • Coverage Design
  • Roaming
  • Layer 2 Retransmissions
  • Capacity Design
  • Airtime Consumption
  • Co-Channel Interference
  • Antennas

 

Device Discovery and Provisioning

  • Device Redirection Services and Auto-Discovery
  • Auto-discovery for on-premises
  • Management Protocols and Device Updates
  • Adding Devices into ExtremeCloud IQ

 

Guided Configuration and Object Management

  • Guided Configuration of Objects
  • Clone Tool

 

Monitoring Clients, Users and Client 360

  • Monitoring Clients
  • Monitoring Devices

 

User Profiles

  • Defining VLANs
  • Firewalls
  • Tunnelling
  • Rate Limiting
  • URL Filtering
  • Availability Schedule
  • Assignment Rules

 

Troubleshooting 802.1x

  • IEEE 802.1X with EAP
  • 802.1X Troubleshooting

 

Network 360

  • Monitor View
  • Device Health
  • Client Health
  • WiFi Health
  • Network Health
  • Services Health
  • Application Health
  • Security Health

 

Private Pre-Shared Key (PPSK)

  • Understanding PPSK
  • 802.1X/EAP
  • Mapping User Profiles to User Groups
  • User Groups
  • PPSK Credential storage
  • RadSec Proxies
  • Secure Access with Cloud PPSK
  • RadSec Troubleshooting

 

Radio Profiles

  • Showing Radio Profiles through a Lab

 

Device Templates

  • AP Device Templates
  • Radio Settings
  • Radio Usage
  • Mesh
  • Exclude Channels
  • Transmit Power Control

 

Software Defined Radio (SDR)

  • Dual Band APs
  • Dual 5GHz WLAN design
  • SDR Radio Profile

 

Cloud Config Groups and Classification Rules

  • Cloud Config Groups – What are they?
  • Classification Rules
  • Joining CCGs and Classification Rules

 

Classification Rules

  • VLAN Objects
  • Captive Web Portals
  • Time Zone Objects
  • Use Cases
  • Server Objects
  • AP Device Templates
  • SSIDs

 

Deployment Optimization

  • Management and Native VLANs
  • Using Trunked Ports and VLANs
  • AP and VLAN guidelines
  • Configuring rollback timer

 

ExtremeCloud IQ Diagnostic Tools

  • Device Diagnostic Tools
  • Ping
  • Points of Failure
  • VLAN Probe
  • Common CLI Commands

 

Dashboards

  • Network
  • Reports
  • Diagnostics
  • Inventory
  • Insights – Comparative Analysis
  • Insights – Proximity
  • Insights – Presence

 

ExtremeCloud IQ Administration

  • Communications
  • Account Management
  • Administrator Accounts
  • Internal Admin Accounts
  • External Admin Accounts
  • Role Based Access Control
  • Global Settings – Logs
  • Global Settings – Audit Logs

 

Firmware Updates

  • How to do firmware updates using ExtremeCloud IQ

 

ExtremeWireless Cloud Exam

  • What you need to know about the ExtremeWireless Cloud Exam

target_au
pre_req

Students should have a working knowledge of networking concepts and a basic understanding of WiFi technologies although prior experience of WLAN design and deployment is helpful.


titleECS ExtremeWireless Cloud Troubleshooting
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewDesigned for networking professionals responsible for supporting and troubleshooting wireless LAN networks. This course is an advanced level class building upon the student’s real working experiences with ExtremeWireless Cloud and ExtremeCloud IQ. Please read the pre-requisites before enrolling on the class as prior experience with ExtremeCloud IQ and ExtremeWireless Cloud is expected. The class is a fast paced, fault-based scenario lab which immerses the student in real life situations requiring fault diagnosis and remedial actions. It provides students with the information and skills necessary to troubleshoot common WLAN issues using ExtremeCloud IQ tools and networking solutions.
objective

This challenging course is a blend of theory and real-world troubleshooting scenarios.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Cloud installations and common wireless issues using the in-built tools and the Wireshark protocol analyzer.


outline
  • Troubleshooting Theory and Best practices
  • Opening a support case
  • Techdata File
  • Co-Operative Control Protocols
  • CAPWAP and Provisioning
  • RF Troubleshooting
  • Network Performance Troubleshooting
  • ExtremeWireless Cloud troubleshooting tools
  • Authentication and Roaming
  • Private Pre-shared Key

target_au
pre_req

To gain the maximum learning experience from this class, it is extremely important that attendees adhere to the following requirements prior to attending this course:

  • Have attend the ExtremeWireless Cloud training and hold the relevant ECS ExtremeWireless Cloud certification, or, to have been grandfathered from the Aerohive ACMA qualification onto ExtremeWireless Cloud ECS.
  • Possess significant working experience with Extreme/Aerohive products as well as wireless networking. Attendees need to be able to navigate and configure the current version of XIQ confidently with minimal or no instruction.
  • Have access to the internet to connect to XIQ for the virtual instructor-led classes or bring their own laptop to classroom based instructor-led classes.

titleECS Extreme NAC
days2
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorExtreme

techonogyEnterprise Networking
overviewExtremeNAC (A3) is Extreme’s Secure Access Management Solution with enterprise-grade features for onboarding, authentication, and network access control (NAC). This training class covers the essentials of deploying ExtremeNAC (A3). It provides the theoretical knowledge and hands-on experience that will enable you to successfully deploy, configure and maintain the ExtremeNAC (A3) solution.
objective

To deploy Extreme A3 Cloud Network Access Control to build unique workflows and requirements to fit unique environments. Integrate ExtremeNAC (A3) into third party systems, implement controls and checks to help ensure compliance to regulations and policies and be able to leverage custom workflows and alarms to proactively resolve network issues.


outline
  • What is ExtremeNAC (A3)?
  • Qualifying Questions
  • Product capabilities
  • Deployment Modes and Options
  • Enforcement
  • Guest Authentication and Registration
  • Radius and 802.1x
  • Active Directory Integration and Authentication
  • Self-Registration
  • Portal Modules and Modifications
  • PKI and Certificates

target_au
pre_req

A solid networking background. Working proficiency and experience with network security and understanding basic concepts behind Active Directory and Digital Certificates.


titleECS ExtremeWireless Core
days4
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overview  This class will give the students a good technical understanding of the ExtremeWireless CORE technologies. There will also be practical, hands-on-labs, where the students will get to setup and configure this type of technology to supplement the theoretical learning.
objective

This course is a blend of both theoretical and hands-on Lab experience.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Core.

 


outline

Solution Overview

  • ExtremeWireless Landscape
  • WiNG at a glance
  • What’s New In WiNG 7
  • 11ax Introduction
  • WPA3 Introduction
  • Dual Mode Capability
  • ExtremeWireless WiNG hardware overview
  • Configuration Model
  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration

 

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links

 

AP Adoption

  • Finding a controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption

 

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

 

Supported Deployments and Provisioning

  • Reference designs for single and central site/multi-site deployments
  • Scalability considerations
  • General best practices and common design mistakes

 

Clustering

  • Clustering overview
  • Clustering setup

 

Virtual Controller

  • VC overview
  • VC configuration

 

Initial Configuration

  • Initial device setup
  • Resetting APs to factory defaults
  • Configure management access settings via Management Policy

 

Software Management

  • Mixed mode
  • Image types
  • Software upgrade

 

Wireless LANs

  • WLAN configuration
  • WLAN forwarding modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy
  • QoS policies and mappings

 

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features

 

Integrated Services

  • DHCP server
  • Radius server
  • Role Based Access Control (RBAC)
  • IPsec VPN

 

Captive Portal

  • Hotspot deployment options and defining policies
  • Authentication methods used to verify user registrations
  • Enforcing authentication methods
  • User and device registration and notification methods

 

Security Features

  • Stateful L2+ Distributed Firewall features
  • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
  • Variations of Wireless IPS (WIPS)

 

Mesh Features

  • MeshConnex overview
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex

 

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Opening GTAC case

 

NSight

  • NSight overview
  • Using NSight for monitoring and troubleshooting

 

Extreme Guest

  • Extreme Guest overview and features

 

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

 

What’s new?

  • Recent firmware releases overview

target_au
pre_req

A thorough understanding of wireless networking, wired networking and associated protocols. Highly recommended to have completed the Extreme Wireless EDS class.


titleSAUI 1.0 – Implementing Automation for Cisco Security Solutions
days3
seo_title
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overview
objective

After taking this course, you should be able to:

  • Describe the overall architecture of the Cisco security solutions and how APIs help enable security
  • Know how to use Cisco Firepower APIs
  • Explain how pxGrid APIs function and their benefits
  • Demonstrate what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes
  • Describe the features and benefits of using Cisco Stealthwatch Cloud APIs
  • Learn how to use the Cisco Umbrella Investigate API
  • Explain the functionality provided by Cisco AMP and its APIs
  • Describe how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats

outline
  • Introducing Cisco Security APIs
  • Consuming Cisco Advanced Malware Protection APIs
  • Using Cisco ISE
  • Using Cisco pxGrid APIs
  • Using Cisco Threat Grid APIs
  • Investigating Cisco Umbrella Security Data Programmatically
  • Exploring Cisco Umbrella Reporting and Enforcement APIs
  • Automating Security with Cisco Firepower APIs
  • Operationalizing Cisco Stealthwatch and the API Capabilities
  • Using Cisco Stealthwatch Cloud APIs
  • Describing Cisco Security Management Appliance APIs

target_au

This course is designed primarily for professionals in job roles such as:

  • Network engineer
  • Systems engineer
  • Wireless engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network administrator
  • Wireless design engineer
  • Network manager
  • Sales engineer
  • Account manager

pre_req

Before enrolling in this course, you should have professional level knowledge in the following areas:

  • Basic programming language concepts
  • Basic understanding of virtualization
  • Ability to use Linux and Command Line Interface (CLI) tools, such as Secure Shell (SSH) and bash
  • CCNP level core networking knowledge
  • CCNP level security networking knowledge

The following Cisco courses can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Introducing Automation for Cisco Solutions (CSAU)
  • Programming Use Cases for Cisco Digital Network Architecture (DNAPUC)
  • Introducing Cisco Network Programmability (NPICNP)
  • Implementing and Operating Cisco Security Technologies (SCOR)

titleIntroducing Automation for Cisco Solutions (CSAU) 1.0
days2
seo_title
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overview
objective

This course will help you:

  • Gain an overview of the skills you need to become a next-generation engineer
  • Prepare to accelerate network automation in your organization
  • Increase collaboration across internal and external teams using version control systems

After taking this course, you should be able to:

  • Articulate the role network automation and programmability play in the context of end-to-end network management and operations
  • Define and differentiate between waterfall and agile software development methodologies
  • Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
  • Describe how DevOps principles, tools, and pipelines can be applied to network operations
  • Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
  • Understand and construct HTTP-based API calls to network devices
  • Articulate the differences among and common use cases for XML, JSON, YAML, and protobuf
  • Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs
  • Understand the role YANG plays in network automation
  • Understand that a number of tools exist to simplify working with YANG models
  • Describe the functionality of RESTCONF and NETCONF and the differences between them
  • Construct Ansible playbooks to configure network devices and retrieve operational state data from them
  • Build Jinja2 templates and YAML data structures to generate desired state

outline
  • Examining Network Management and Operations
  • Exploring Software Development Methodologies
  • Using Python for Network Automation
  • Describing NetDevOps: DevOps for Networking
  • Managing Automation Development Environments
  • Introducing HTTP Network APIs
  • Reviewing Data Formats and Data Encoding
  • Using Python Requests to Automate HTTP-Based APIs
  • Exploring YANG
  • Using YANG Tools
  • Automating Model-Driven APIs with Python
  • Introducing Ansible for Network Automation
  • Templating Configurations with Jinja2
  • Exploring Cisco Ansible Integrations
  • Introducing Multidomain Network Automation

target_au

This course is designed primarily for customer engineers and systems engineers in the following job roles:

  • Automation architect
  • Automation engineer
  • Consulting systems engineer
  • DevOps engineer
  • Network administrator
  • Network architect
  • Network consulting engineer
  • Network design engineer
  • Network engineer
  • Network operator
  • Network reliability engineer
  • Sales engineer
  • Site reliability engineer
  • Systems engineer
  • Technical solutions architect

This course would also be useful for network manager job roles such as:

  • Application developer
  • Collaboration developer
  • Collaboration solutions architect
  • IT director
  • Mobile developer
  • Network Operations Center (NOC) manager
  • Software architect
  • Web developer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Routing and switching including Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and basic configuration features such as interfaces, Simple Network Management Protocol (SNMP), and static routes
  • Fundamentals of Python data structures and programming constructs such as loops, conditionals, and classes, or the equivalent of 3–6 months of experience writing Python scripts
  • Basic Linux commands for navigating the file system and executing scripts
  • Knowledge of working with text editors

title(802.1X) 1.0 – Introduction to 802.1X Operations for Cisco Security Professionals
days3
seo_titleOperations for Cisco Security Professionals | Insoft Services
seo_decDuring Operations for Cisco Security Professionals Course you will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, and more.
seo_tkeyOperations for Cisco Security Professionals
categorysecurity-cls
vendorCisco

techonogySecurity
overviewThe Introduction to 802.1X Operations for Cisco Security Professionals Course shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch. See other courses available
objective

Upon completing this course, the learner should be able to meet these overall objectives:

  • Provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1X protocol and the ability to configure the Cisco Identity Services Engine (ISE) for 802.1X operation.
  • The course will introduce the architecture, components, and features of a Cisco TrustSec network designed around the IEEE 802.1X and RADIUS protocols.
  • The student will gain hands-on experience with configuring a network for 802.1X-based network services using the Cisco ISE, Cisco Catalyst switches, and Cisco wireless products.

outline
  • Describe Cisco TrustSec concepts
  • Describe IEEE 802.1X concepts, architecture, and requirements for deployment
  • Describe how the RADIUS authentication protocol is used for Cisco TrustSec
  • Configure Cisco ISE for 802.1X operation
  • Describe IEEE 802.1X supplicants for Microsoft, Apple, and Cisco
  • Configure IEEE 802.1X for a wired network
  • Configure IEEE 802.1X for a wireless network
  • Describe how to provide secure guest access in a Cisco TrustSec network
  • Build a high-level design of a Cisco TrustSec network using IEEE 802.1X.

target_au
  • Channel Partner / Reseller
  • Customer
  • Employee

pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • Cisco Certified Network Associate (CCNA).
  • Attendance of Securing Networks with Routers and Switches (SNRS) or equivalent knowledge.
  • Knowledge of Microsoft Windows Server 2008 Active Directory.
  • Knowledge of Cisco Wireless LAN Controllers and Lightweight Access Points.
  • Knowledge of basic command-line configuration of Cisco Catalyst switches.The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

titleCISA – Certified Information Systems Auditor
days4
seo_titleCISA Certified System Auditor Training Course | Insoft Services
seo_decIn this CISA Certified System Auditor course delegates will be exposed to the Five Domains of Information Security Auditing.
seo_tkeyCISA Certified System Auditor
categoryinformation-systems-security
vendor

techonogySecurity
overviewCISA Certified System Auditor is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security. During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing. These domains comprise the foundations of CISA and it is imperative that delegates grasp a complete understanding of these aspects in order to pass the CISA exam and use their certification within the workplace. Within each of these domains exists multiple topics, which when combined, provide a comprehensive overview of the domain of focus. Due to the breadth of information imparted with each topic over a period of just four days, this course is considered intensive and candidates must study hard to obtain the certification. The five domains are as follows:
  1. The Process of Auditing Information Systems
  2. Governance & Management of IT
  3. Information Systems Acquisition, Development, and Implementation
  4. Information Systems Operations, Maintenance, and Support
  5. Protection of Information Assets
  See other courses available  
objective

This CISA Certified System Auditor training course is not suitable for beginners. It is required that delegates possess at least five years of exposure in the field of Information Systems Auditing. With this information in mind, it is expected that CISA qualified candidates have an outstanding level of professional experience, commitment, and extensive knowledge of IS Auditing. Thus, a CISA qualification is likely to open many doors and propel certified individuals into a high ranking position within the enterprise.

The five domains within the course are as follows:

  • The Process of Auditing Information Systems
  • Governance & Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance, and Support
  • Protection of Information Assets

outline

The course content surrounds the pivotal Five Domains. The information imparted within each domain is as follows:

Domain 1: Information Systems Audit Process:

  • Developing a risk-based IT audit strategy
  • Planning specific audits
  • Conducting audits to IS audit standards
  • Implementation of risk management and control practices

Domain 2: IT Governance and Management:

  • Effectiveness of IT Governance structure
  • IT organizational structure and human resources (personnel) management
  • Organisation’s IT policies, standards, and procedures
  • Adequacy of the Quality Management System
  • IT management and monitoring controls
  • IT resource investment
  • IT contracting strategies and policies
  • Management of organizations IT-related risks
  • Monitoring and assurance practices
  • Organization business continuity plan

Domain 3: Information Systems Acquisition, Development, and Implementation:

  • Business case development for IS acquisition, development, maintenance, and retirement
  • Project management practices and controls
  • Conducting reviews of project management practices
  • Controls for requirements, acquisition, development, and testing phases
  • Readiness for Information Systems
  • Project Plan Reviewing
  • Post Implementation System Reviews

Domain 4: Information Systems Operations, Maintenance, and Support:

  • Conduct periodic reviews of organizations objectives
  • Service level management
  • Third-party management practices
  • Operations and end-user procedures
  • Process of information systems maintenance
  • Data administration practices determine the integrity and optimization of databases
  • Use of capacity and performance monitoring tools and techniques
  • Problem and incident management practices
  • Change, configuration, and release management practices
  • Adequacy of backup and restore provisions
  • Organization’s disaster recovery plan in the event of a disaster

Domain 5: Protection of Information Assets:

  • Information security policies, standards and procedures
  • Design, implementing, monitoring of system and logical security controls
  • Design, implementing, monitoring of data classification processes and procedures
  • Design, implementing, monitoring of physical access and environmental controls
  • Processes and procedures to store, retrieve, transport and dispose of information assets

target_au

The CISA essential for professionals dealing with controlling, monitoring, and assessing an organization’s information technology and business systems. This includes:

  • IS/IT auditors/consultants
  • IT compliance managers
  • Chief Compliance Officers
  • Chief risk & privacy officers
  • Security heads/directors
  • Security managers/architects

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to learn CISA from this tutorial. However, to get the CISA certification you need to:

  • Pass the CISA examination
  • Submit an application for CISA certification
  • Adhere to the Code of Professional Ethics
  • Dedicate to the Continuing Professional Education Program
  • Compliance with the Information Systems Auditing Standards

The examination is open to all individuals who have an interest in information systems audit, control, and security. A minimum of 5 years of professional information systems auditing, control or security work experience is required for the CISA certification.


titleP3O Portfolio, Programme & Project Offices Practitioner
days2
seo_titleP3O Practitioner Training Course in the UK | Insoft Services
seo_decThe P3O Practitioner course will allow individuals to analyze, distinguish, review the success or failure of projects, and contribute to a successful P3O.
seo_tkeyP3O Practitioner Course
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive P3O Practitioner Course will cover the knowledge required to pass the P3O® Practitioner examination. The training course will allow individuals to analyze, distinguish, and review the success or failure of projects, with a full appreciation of differing principles and varying roles that contribute to a successful P3O®. This P3O® certification indicates that a candidate is a proficient Portfolio Manager and can be entrusted with making informed operational decisions.   See other courses available
objective

P3O Practitioner Course (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, P3O® helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • P3O Model and implementing/Re-energising a P3O
  • Essential tools and techniques
  • Crucial P3O Operations
  • Underpinning concepts of P3O and application to your business
  • Individual, collaborative, and integrated Working Methods
  • Enable regular practice and reliable project management
  • Risk analysis and for-seeing issues
  • Best Practice in P3O projects
  • Support structures development
  • Encouraging and using evidence-based decision making
  • Quality assurance
  • Roles of responsibility and clear delegation of tasks
  • Supporting Provision
  • Improving the financial aspects of projects
  • How to create a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Promote business transparency
  • Roles & responsibilities
  • Business case
  • Model customization

outline

Module 1 – Course Overview and introduction

Module 2 – Why Have a P3O?

Module 3 – Designing a P3O

Module 4 – Implementing and Re‐energising a P3O

Module 5 – Practitioner Examination Preparation

Module 6 – Group activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

 

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.

 


pre_req

The P3O Foundation certificate is required to take the P3O practitioner exam.


titleP3O Portfolio, Programme & Project Offices Foundation & Practitioner
days5
seo_titleP3O Foundation and Practitioner Certification | Insoft Services
seo_decThis comprehensive P3O Foundation and Practitioner Certification course will cover the knowledge required to pass the P3O Foundation and Practitioner exams.
seo_tkeyP3O Foundation and Practitioner Certification
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive P3O® course will cover the knowledge required to pass the P3O® Foundation and Practitioner examinations. P3O Foundation and Practitioner Certification training will allow individuals to analyze, distinguish, and review the success or failure of projects, with a full appreciation of differing principles and varying roles that contribute to a successful P3O®. This P3O® certification indicates that a candidate is a proficient Portfolio Manager and can be entrusted with making informed operational decisions.   See other courses available
objective

P3O® (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, P3O Foundation and Practitioner Certification helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • Essential P3O® operations, concepts and, application to your business
  • Individual, collaborative, and integrated working methods
  • P3O Model and implementing/Re-energising a P3O
  • Essential tools and techniques
  • Benefits of project management
  • Risk analysis and foreseeing issues
  • Best practice in P3O® projects
  • Support structures development
  • Encouraging and using evidence-based decision making
  • Quality assurance
  • Roles of responsibility and clear delegation of tasks
  • Supporting provision
  • Improving the financial aspects of projects
  • Creating a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Promote business transparency
  • Enable regular practice and reliable project management
  • Support structures development
  • Quality assurance
  • Supporting Provision
  • Business case
  • Model customization
  • P3MS summary
  • Functions and services

outline

Module 1 – Course Overview and introduction

Module 2 – Introduction to P3O

Module 3 – Why Have a P3O?

Module 4 – Designing a P3O

Module 5 – Implementing and Re‐energising a P3O

Module 6 – Operating a P3O

Module 7 – Practice foundation exams

Module 8 – Practitioner Examination Preparation

Module 9 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this course, however, in order to take the Practitioner exam the foundation certificate will be needed (this can be completed during the course).


titleP3O Portfolio, Programme & Project Offices Foundation
days3
seo_titleP3O Foundation Certification Course | Insoft Services
seo_decThis comprehensive course offers basic tools and techniques of P3O Foundation Certification, and educate them on the constituents of a successful P3O.
seo_tkeyP3O Foundation certification
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive course will equip candidates with the basic tools and techniques of P3O® (Portfolio, Programme and Project Offices), and educate them on the constituents of a successful P3O®. This certification enables individuals to contribute to an office or enterprise in a supporting role. P3O Foundation Certification is a valuable certification in the project management industry, showing that you have the knowledge to operate within a project office that follows the P3O® model. Once you have obtained your P3O® Foundation certification, you will be ready to proceed onto the P3O® Practitioner course.   See other courses available
objective

P3O® (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, the P3O Foundation certification helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • Essential P3O® operations and concepts
  • Individual, collaborative, and integrated working methods
  • Benefits of project management
  • Risk analysis and for-seeing issues
  • Best practice in P3O® projects
  • Support structures development
  • Encouraging evidence-based decision making
  • Quality assurance
  • Roles of responsibility and delegation of tasks
  • Supporting provision
  • Improving the financial aspects of projects
  • Creating a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Business transparency at the forefront

outline

Module 1 – Course Overview and introduction

Module 2 – Introduction to P3O

Module 3 – Why Have a P3O?

Module 4 – Designing a P3O

Module 5 – Implementing and Re‐energising a P3O

Module 6 – Operating a P3O

Module 7 – Practice foundation exams

Module 8 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs


pre_req

There are no prerequisites for this exam.


titleManaging Successful Programmes: 2011 (MSP) Practitioner
days2
seo_titleManaging Successful Programmes (MSP) Practitioner | Insoft Services
seo_dec(MSP) Managing Successful Programmes Practitioner represents good practice in programme management for successfully delivering transformational change.
seo_tkeyManaging Successful Programmes Practitioner
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognized as a key tool to enable organisations to deliver their strategy and manage that transformation. The Managing Successful Programmes Practitioner Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. The two-day MSP Practitioner course builds on the foundation level concepts through to advanced level understanding of the MSP framework. Following the course candidates will be able to understand the relationships between MSP Principles, MSP Governance Themes and MSP Transformational Flow, and can apply this understanding to a given programme scenario. Successful completion of the Practitioner examinations will give the delegate a recognised international qualification; understood and identified in the industry as a mark of quality for Programme Managers.   See other courses available
objective

The MSP framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

MSP defines programme management as ‘the action of carrying out the coordinated organisation, direction and implementation of a dossier and transformation activities to achieve outcomes and realise benefits of strategic importance to the business.’

As well as the guidance detailed within MSP, candidates will learn about the themes running throughout the MSP methodology. On completion of this courses candidates will be able to:

  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Identify additional value as a result of managing change as an MSP programme
  • Explain and apply each of the MSP principles, the governance themes and the transformational flow processes and their activities
  • Explain the relationship between the MSP principles, governance themes, the transformational flow, programme information (documents) and the MSP defined programme management roles
  • Produce and evaluate examples of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP practitioner concepts

Section 4 – MSP practitioner governance themes

Section 5 – Practitioner examination preparation

Section 6 – Group activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management.

The Managing Successful Programmes Practitioner would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their need.


pre_req

To and sit the Practitioner examination the Foundation certification is required. It is strongly recommended that candidates should have a good understanding of project and program management.


titleManaging Successful Programmes: 2011 (MSP) Foundation & Practitioner
days5
seo_titleManaging Successful Programmes (MSP) | Insoft Services
seo_decManaging Successful Programmes (MSP) provides an adaptable route map for programme management to facilitate the delivery of business transformation.
seo_tkeyManaging Successful Programmes (MSP)
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognised as a key tool to enable organizations to deliver their strategy and manage that transformation. The MSP Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. The five-day MSP Foundation & Practitioner course will take candidates from foundation level concepts through to advanced level understanding of the MSP framework. Following the course candidates will be able to understand the relationships between MSP Principles, MSP Governance Themes and MSP Transformational Flow, and can apply this understanding to a given programme scenario. Successful completion of the Foundation and Practitioner examinations will give the delegate a recognized international qualification; understood and identified in the industry as a mark of quality for Programme Managers.   See other courses available
objective

The Managing Successful Programmes (MSP) framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

MSP defines programme management as ‘the action of carrying out the coordinated organisation, direction and implementation of a dossier and transformation activities to achieve outcomes and realise benefits of strategic importance to the business.’

As well as the guidance detailed within MSP, candidates will learn about the themes running throughout the MSP methodology. On completion of this courses candidates will be able to:

  • Distinguish between projects and programmes
  • Identify the MSP defined types of programme and their characteristics
  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Explain the purpose and areas of focus of the defined roles
  • Identify additional value as a result of managing change as an MSP programme
  • Explain and apply each of the MSP principles, the governance themes and the transformational flow processes and their activities
  • Explain the relationship between the MSP principles, governance themes, the transformational flow, programme information (documents) and the MSP defined programme management roles
  • Produce and evaluate examples of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP governance themes

Section 4 – MSP transformational flow

Section 5 – MSP practitioner concepts

Section 6 – MSP practitioner governance themes

Section 7 – Practice foundation exams

Section 8 – Practitioner examination preparation

Section 9 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

This course leads to foundation certification in the initial stages of training. Assuming candidates pass their Foundation examination, there is no prerequisite to attending this course.

To complete the latter stage of training and sit the Practitioner examination the Foundation certification is required. It is strongly recommended that candidates should have a good understanding of project and program management.


titleManaging Successful Programmes: 2011 (MSP) Foundation
days3
seo_titleMSP Foundation Course - IT Training | Insoft Services
seo_decThe purpose of MSP Foundation Course is to ensure candidates have the knowledge and understanding of the core concepts of MSP guidance.
seo_tkeyMSP Foundation
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognised as a key tool to enable organizations to deliver their strategy and manage that transformation. The MSP Foundation Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. This three-day course leads to the MSP Foundation. This is a free-standing qualification, but is also part of the MSP Practitioner qualification scheme and provides candidates with a broad overview of the MSP Framework. The purpose of the MSP Foundation qualification is to ensure candidates have the knowledge and understanding of the core concepts of MSP guidance to interact effectively with those involved in the management of a programme or act as an informed member of a programme office, business change team or project delivery team working within an environment supporting MSP. This level is also a prerequisite for programme management professionals progressing toward the practitioner and advanced practitioner qualification, and those aspiring to become programme management professionals in the future.   See other courses available
objective

The MSP framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

On completion of this course, candidates will be able to:

  • Distinguish between projects and programmes
  • Identify the MSP defined types of programme and their characteristics
  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Explain the purpose and areas of focus of the defined roles
  • Explain the purpose of the seven MSP principles, the nine governance themes and the six transformational flow processes
  • Explain the purpose of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP governance themes

Section 4 – MSP transformational flow

Section 5 – Practice foundation exams

Section 6 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of Project or Programme Management.


titleChange Management Practitioner
days2
seo_titleChange Management Practitioner Certification Course | Insoft Services
seo_decChange Management Practitioner Certification is designed to help manage the impact of change and provide techniques to plan and implement transformations.
seo_tkeyChange Management Practitioner Certification
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Practitioner Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.

A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative – but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, the complexity of the change initiative, and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation.


outline

Change Impact

  • Levers for change
  • Levels of adoptions and critical mass
  • Reinforcing systems

Exam Preparation

  • Change Management Practitioner Exam Preparation
  • Change Management Practitioner Exam

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. This course would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The change management foundation certificate is required to sit the Practitioner level exam.


titleChange Management Foundation & Practitioner
days5
seo_titleChange Management Certification - IT Certification | Insoft Services
seo_decChange Management Certification, developed by APMG with GMI, provides an independent standard for professional knowledge for an effective change manager.
seo_tkeyChange Management Certification
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Foundation certification is to confirm that a candidate has sufficient knowledge and understanding of Change Management to work as an informal member of a team working on an organizational change initiative. The Foundation certification is also a pre-requisite for the APMG Practitioner certification.

The new syllabus samples a wide range of knowledge regarding the theory and practice of change management including:

  • Change and the individual
  • Change and the organization
  • Communication and stakeholder engagement and;
  • Change practice

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.

A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative – but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, the complexity of the change initiative, and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation.


outline

Change and the Organization

  • Drivers for change
  • Developing a vision
  • Culture and climate
  • Emergent change and life-cycle
  • Organizational metaphors
  • Models of change
  • Roles required for change

Stakeholders

  • Principles
  • Identification
  • Analysis
  • Influencing and listening
  • Emotion and demonstration
  • Communications
  • Cognitive biases
  • Remaining people-focused
  • Improving Communications
  • Communications channels
  • Collaboration
  • Communications Planning
  • Larger workshops

Change Impact

  • Assessing impact
  • McKinsey 7 S
  • Stakeholder impact assessment
  • Assessing change readiness
  • Large change – how to staff
  • Building a change team
  • Preparing for resistance
  • Building team effectiveness

Individual Change

  • Learning theory
  • Motivation
  • Change Curve
  • Personality differences

Change Impact

  • Levers for change
  • Levels of adoptions and critical mass
  • Reinforcing systems

Exam Preparation

  • Change Management Practitioner exam preparation
  • Change Management Practitioner exam

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Change Management Practitioner would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. The change management foundation certificate is required to sit for the practitioner level exam.


titleChange Management Foundation
days3
seo_titleChange Management Foundation Course | Insoft Services
seo_decChange Management Foundation Course provides professional knowledge that allows us to deal with change and the impact of change on organizations.
seo_tkeyChange Management Foundation Course
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. Change Management Foundation Course provides professional knowledge that allows us to deal with change and the impact of change on organizations. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Change Management Foundation course is to confirm that a candidate has sufficient knowledge and understanding of Change Management to work as an informal member of a team working on an organizational change initiative. The Foundation certification is also a pre-requisite for the APMG Practitioner certification.

The new syllabus samples a wide range of knowledge regarding the theory and practice of change management including:

  • Change and the individual
  • Change and the organization
  • Communication and stakeholder engagement and;
  • Change practice

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.


outline

Change and the Organization

  • Drivers for change
  • Developing a vision
  • Culture and climate
  • Emergent change and life-cycle
  • Organizational metaphors
  • Models of change
  • Roles required for change

Stakeholders

  • Principles
  • Identification
  • Analysis
  • Influencing and listening
  • Emotion and demonstration
  • Communications
  • Cognitive biases
  • Remaining people-focused
  • Improving Communications
  • Communications channels
  • Collaboration
  • Communications Planning
  • Larger workshops

Change Impact

  • Assessing impact
  • McKinsey 7 S
  • Stakeholder impact assessment
  • Assessing change readiness
  • Large change – how to staff
  • Building a change team
  • Preparing for resistance
  • Building team effectiveness

Individual Change

  • Learning theory
  • Motivation
  • Change Curve
  • Personality differences

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Change Management Practitioner would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices


titleAgilePM Practitioner
days2
seo_title
seo_decAgilePM Practitioner certification offers the core principles needed to facilitate a successful project, while allowing a degree of scope and agility.
seo_tkeyAgilePM Practitioner
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This two-day AgilePM Practitioner certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This two-day course leads to the AgilePM Practitioner certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including:

  • Understand how Agile Project Management projects are delivered to time, cost & quality
  • Understand when and why to select Agile Project Management
  • Plan and organize Agile Project Management projects
  • Successfully complete a project using the required Agile Life-cycle, Processes, Roles, Management Products and Practices/Techniques

outline

Module 1 – Course overview and introduction

Module 2– The DSDM team model

Module 3 – Lifecycle and products

Module 4 – People, teams and collaboration

Module 5 – DSDM techniques

Module 6 – Planning and control

Module 7 – Practitioner exam preparation

Module 8 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Practitioner would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Pre-requisites accepted to be eligible to take the Practitioner examination:

  • AgilePM Foundation Certificate (either 2010 or 2014 version), or
  • DSDM Atern Foundation Certificate, or
  • DSDM Advanced Practitioner Certificate

titleAgilePM Foundation & Practitioner
days5
seo_titleAgilePM Foundation and Practitioner Certification | Insoft Services
seo_decAgilePM Foundation and Practitioner certification provides practical understanding of the techniques used, roles and responsibilities in an Agile project.
seo_tkeyAgilePM Foundation and Practitioner
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This five-day AgilePM Foundation and Practitioner certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This five-day course leads to the AgilePM Foundation and Practitioner certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including:

  • Choosing the right Agile approach
  • Philosophy, Principles and Project Variables
  • Preparing for Success
  • The DSDM Process
  • The People – DSDM Roles and Responsibilities
  • The DSDM Products
  • Key Practices – MoSCoW and Timeboxing
  • Planning and Control throughout the Life-cycle
  • Facilitated Workshops
  • Modeling and Iterative Development
  • People, Teams and Interactions
  • Understand how Agile Project Management projects are delivered to time, cost & quality
  • Understand when and why to select Agile Project Management
  • Plan and organize Agile Project Management projects
  • Successfully complete a project using the required Agile Life-cycle, Processes, Roles, Management Products and Practices/Techniques

outline

Module 1 – Course overview and introduction

Module 2 – The DSDM approach

Module 3 – The DSDM team model

Module 4 – Lifecycle and products

Module 5 – People, teams and collaboration

Module 6 – Requirements and user stories

Module 7 – Workshops and prioritization

Module 8 – Timeboxing, iterative development and testing

Module 9 – Planning and control

Module 10 – Practitioner exam preparation

Module 11 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Practitioner would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for the foundation exam.

Pre-requisites accepted to be eligible to take the Practitioner examination:

  • AgilePM Foundation Certificate (either 2010 or 2014 version), or
  • DSDM Atern Foundation Certificate, or
  • DSDM Advanced Practitioner Certificate

titleAgilePM Foundation
days3
seo_titleAgilePM Foundation Certification - IT Training | Insoft Services
seo_decThis three-day AgilePM Foundation certification provides the method with the core principles needed to facilitate a successful project.
seo_tkeyAgilePM Foundation
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This three-day AgilePM Foundation certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This two-day course leads to the AgilePM Foundation certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including

  • Choosing the right Agile approach
  • Philosophy, Principles and Project Variables
  • Preparing for Success
  • The DSDM Process
  • The People – DSDM Roles and Responsibilities
  • The DSDM Products
  • Key Practices – MoSCoW and Timeboxing
  • Planning and Control throughout the Life-cycle
  • Facilitated Workshops
  • Modeling and Iterative Development
  • People, Teams and Interactions
  • Agile PM Foundation Exam

outline

Module 1 – Course overview and introduction

Module 2 – The DSDM approach

Module 3 – The DSDM team model

Module 4 – Life-cycle and products

Module 5 – People, teams and collaboration

Module 6 – Requirements and user stories

Module 7 – Workshops and prioritization

Module 8 – Timeboxing, iterative development and testing

Module 9 – Planning and control

Module 10 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Foundation would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this exam.


titleSIAM Foundation (Service Integration and Management)
days3
seo_titleService Integration and Management (SIAM) - IT Training | Insoft Services
seo_decService Integration and Management (SIAM) is a methodology used to manage multiple service providers and to integrate them seamlessly into IT organization.
seo_tkeyService Integration and Management (SIAM)
categorysiam
vendorInsoft Specials

techonogyIT Services Management
overviewService Integration and Management (SIAM) creates an environment where IT professionals can effectively orchestrate the increasing array of business solutions and services, whether they are delivered internally, externally, or from the cloud. The BCS EXIN Foundation Certificate in SIAM® is the most relevant and practical resource for skills and knowledge development, aligning Service Management framework processes and enabling businesses of any size to effectively manage multi-sourcing. This includes outsourcing, SaaS, PaaS, and Cloud and benefits a very broad range of stakeholders. Organizations are recognizing an increasing need to implement a Service Integration and Management (SIAM) framework to help them better manage multiple suppliers and reduce service complexity, whilst improving efficiency, governance, and cost control. SIAM is a methodology used to manage multiple service providers and to integrate them seamlessly to provide a single business-facing IT organization.   See other courses available
objective

The EXIN BCS SIAM® Foundation tests a candidate’s knowledge and understanding of the terminology and the core principles. This certification covers themes such as potential benefits as well as the challenges and risks of implementing Service Integration and Management. The SIAM® certification also includes examples of implementation structures, governance, tooling and data considerations, and the common processes used in a SIAM ecosystem.

A candidate who successfully completes the EXIN BCS SIAM® Foundation knows how Service Integration and Management delivers business value and is able to contribute to the implementation and use of Service Integration and Management in an organization.


outline

Module 1 – Introduction to Service Integration and Management

Module 2 – SIAM implementation roadmap

Module 3 – SIAM and its relation to other management practices

Module 4 – SIAM roles and responsibilities

Module 5 – SIAM practices

Module 6 – Processes to support SIAM

Module 7 – SIAM challenges and risk


target_au

The certification will create clarity and consensus for anyone involved in service management that takes care of any combination of internal and external service providers.

This includes:

  • Consultants
  • Service managers
  • Project and program managers
  • Business relationship managers
  • Change and commercial managers
  • Solution Architects

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this exam.


titleSDI Service Desk & Support Manager
days4
seo_titleService Desk and Support Manager - IT Training | Insoft Services
seo_decService Desk & Support Manager qualification (SDM) ensures that candidates are provided with the knowledge, information, and tools to successfully pass the SDM exam.
seo_tkeyService Desk and Support Manager
categorysda
vendorAPMG

techonogyIT Services Management
overviewFunctioning effectively as a Service Desk & Support Manager requires a broad range of skills and abilities. These talents range from people-management abilities, relationship management, and logistical awareness to financial acumen and presentation skills. This course provides a thorough understanding of, and qualification in, Service Desk & Support Management. The course also investigates the management of support methodologies and technologies and the tools utilized within the Service Desk and support teams. This four-day course also covers issues such as Service Level Agreements, the benefits and pitfalls and the importance of metrics; the implementation of service management processes, and effective problem-solving techniques that a Service Desk Manager can utilize. The course is based upon the standards and objectives for SDI’s Service Desk & Support Manager qualification (SDM) and ensures that candidates are provided with the knowledge, information, and tools to successfully pass the SDM exam.   See other courses available
objective

After attendance on this course, candidates will recognize and understand the importance of understanding our customer’s expectations and perceptions, along with understanding the benefit of using SLAs effectively as a service quality improvement tool. Critically, candidates will learn about the importance of a reward and recognition strategy and identify some different methods of reward and recognition. Specifically, this course covers the following key Service Desk and Support Management Skills:

  • Course Overview and Introduction
  • The Strategic Role of Support
  • Essential Management Skills
  • Developing and Promoting the Service Desk
  • IT Service Management
  • Quality Assurance
  • Effective Management of Tools and Technology
  • Staff Recruitment, Retention, and Development
  • Leadership and Management
  • Professional Development

The SDI qualification is an open qualification standard that is independent of any other training curriculum. SDI is the administrator, facilitator, and arbitrator of the standards. The exams are independently administered and proctored.


outline

Module 1 – The strategic role of support

  • Role of the service desk
  • The activities of the service desk
  • Successful service desk characteristics
  • Vision and mission statements
  • Goof practice and best practice
  • Service desk and best practice
  • Business standards and Industry standards
  • Service ethics
  • Social responsibility

Module 2 – Essential Management Skills

  • Essential skills and competencies
  • Routine responsibilities
  • Strategic responsibilities
  • The importance of documentation
  • Business knowledge
  • Strategic alignment
  • Obtaining support to remove barriers and board approval
  • Commercial management
  • Financial management
  • Business cases
  • Organizational change management
  • Elements and characteristics of project management
  • Communication skills
  • Effective presentations
  • Negotiation

Module 3 – Developing and promoting the service desk

  • Effective working relationships
  • Personal networking
  • Building effective work relationships
  • Contributing to IT/Business objectives
  • Conducting assessments
  • Analysis techniques
  • Sourcing models
  • Outsourcing the service desk
  • Promoting the service desk
  • Managing stakeholders expectations

Module 4 – IT Service Management

  • Objectives of ITSM
  • IT Infrastructure Library (ITIL)
  • Incident Management
  • Request Fulfillment
  • Problem Management
  • IT Change Management
  • Release and Deployment Management
  • Service Asset and Configuration Management
  • Knowledge Management
  • Information Security Management
  • IT Service Continuity Management
  • Service Catalogue Management
  • Service Level Management

Module 5 – Quality assurance

  • Quality assurance program and practices
  • Customer feedback
  • Service desk bench-marking
  • Monitoring interactions
  • Monitoring benefits
  • Incident and request monitoring
  • Call monitoring
  • Support delivery model variables
  • CSF’s, KPI’s and metrics
  • Resource management

Module 6 – Efficient management of tools and technologies

  • Service desk infrastructure
  • Common service desk technologies
  • IT Service Management systems
  • Automatic Call Distribution (ACD)
  • Computer Telephony Integration (CTI)
  • Support tools and methodologies
  • Telephone support
  • Deskside support
  • Electronic support tools
  • IT self-service and self-help
  • Self-healing tools
  • Cloud computing
  • Social media
  • Social collaboration

Module 7 – Staff recruitment, retention and development

  • Recruitment
  • The interview process
  • Structured induction and training
  • Skills and knowledge
  • Retain staff
  • Measuring satisfaction and engagement
  • Staffing strategy
  • Common staffing pitfalls
  • Staffing models

Module 8 – Leadership and Management

  • Characteristics of effective management
  • Activates of effective management – Planning
  • Activates of effective management – Organization resources
  • Activates of effective management – Direct, control and co-ordinate
  • Characteristics of effective leadership
  • Motivations of effective leadership
  • Benefits of motivation and motivation factors
  • Maintaining a positive environment
  • Improving performance
  • Reward and recognition
  • Providing direction and focus
  • Teamwork
  • Friendly and supportive workplaces

Module 9 – Professional development

  • Professional development assessment
  • Professional development methods
  • Personal development
  • Coaching
  • Mentoring
  • Stress management

target_au

Although there is no mandatory requirement, ideally candidates should have at least three years of professional experience working at the supervisory level within a Service Desk or support team. This course is ideal for both new Service Desk and Support managers and those who are established but wish to understand the latest approach and techniques for Service Desk best practice. The SDI Service Desk & Support Manager course would suit candidates working in the following professions or areas:

  • Support Managers
  • Service Desk Managers
  • Client Managers
  • Desktop Managers
  • Customer Support Managers
  • Technical Support Managers
  • Service Center Managers

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this Service Desk & Support Analysts course, although it is recommended that candidates should have a good understanding of service desk activity and objectives.


titleSDI Service Desk & Support Analyst
days3
seo_titleService Desk and Support Analyst (SDA) - IT Training | Insoft Services
seo_decThe Service Desk & Support Analyst (SDA) is designed to prepare candidates to work within and manage customer support environments.
seo_tkeyService Desk and Support Analyst (SDA)
categorysda
vendorAPMG

techonogyIT Services Management
overviewThe Service Desk & Support Analyst (SDA) three-day course recognizes an individual’s knowledge of customer service competencies and certifies that they have the skills required to work in the support industry. An individual passing an SDI exam indicates that they understand the role of the service desk professional and the associated best practice for communications, customer service, teamwork, ethics, service desk processes, and terminology usage. The Guide has been written by leading industry experts and is part of the Service Desk Institute (SD) stream of courses. This training event is designed to prepare candidates to work within and manage customer support environments.   See other courses available
objective

The SDA course is focused on equipping support analysts with the skills essential to deliver excellent levels of customer service and support. The course also looks at support methodologies and technologies and the tools utilized within the Service Desk. It reviews issues such as Service Level Agreements, the benefits and pitfalls and the importance of metrics; the implementation of service management processes, and effective problem-solving techniques that a Service Desk Analyst can utilize. It is based upon the standards and objectives for SDI’s Service Desk & Support Analyst qualification and ensures that students are provided with the knowledge, information, and tools to take the SDA exam.

The core concepts covered in the SDA course are:

  • Roles and Responsibilities
  • Effective Communication
  • Customer Service Skills and Competencies
  • Determine the importance of effective cross-cultural communication
  • The Service Desk Environment
  • Process Management
  • Managing, Meeting and Maintaining Service Levels
  • Problem Solving
  • Develop a clear understanding of the support tools and technologies available to Service Desk Analysts

The SDI qualification is an open qualification standard that is independent of any other training curriculum. SDI is the administrator, facilitator, and arbitrator of the standards. The exams are independently administered and proctored.


outline

Module 1 – Roles and Responsibilities

  • Roles and responsibilities
  • Activities of the service desk
  • Expectation of customers
  • The role of service desk management
  • Service desk and support analyst roles
  • Personal professional development
  • The service desk and best practice
  • The organizations policies
  • Local and international legislation
  • Service commitments and ethics
  • Good service attitude, skills and knowledge
  • Quality and service expectations
  • The supportive workplace
  • Typical service desks

Module 2 – Relationship Management

  • Teamwork
  • Relationship management
  • Customer relationship techniques – Organization
  • Customer relationship techniques – Colleagues
  • Customer relationship techniques – Customers
  • Cultural awareness and sensitivity
  • Language barriers
  • Communication techniques
  • Obtaining language assistance

Module 3 – Effective communication skills and competencies

  • Elements of communication
  • Customer communication
  • Emotional intelligence
  • Communications protocols
  • Barriers to communications
  • Ineffective communication
  • Verbal skills
  • Adapting your communication style
  • Non-verbal communication
  • Listening skills
  • Activating listening
  • Written communication
  • Using questions effectively
  • Types of question types and use of them
  • Problem-solving
  • Creative thinking

Module 4 – Effective rapport and conflict management skills

  • Empathy
  • Common emotions and actions
  • Dealing with negative reactions
  • Signs of conflict and frustration
  • Your role in conflict resolution
  • Successful negotiation
  • Professional contact management
  • Interaction and call management
  • Standard telephone greetings
  • Focusing the customer attention
  • Unsupported products
  • Unprofessional call management
  • Silent time
  • Routing call handling procedures
  • Techniques to manage difficult situations
  • Disengaging calls professionally
  • Stress management
  • Time management techniques
  • Types of customer behavior
  • Confidence

Module 5 – Effective processes and IT Service Management

  • Process management
  • Importance of documentation
  • Why follow processes and procedures
  • Incident management
  • Request fulfillment
  • Problem management
  • IT change management
  • Service level management
  • Service catalog
  • Knowledge management
  • IT security management
  • Software license management
  • IT service continuity management

Module 6 – Quality assurance activities

  • Quality assurance
  • Interaction monitoring
  • Incident and request monitoring
  • Customer satisfaction surveys
  • Service desk metrics
  • Common service desk measurements

Module 7 – Service desk technologies and tools

  • Telephony systems
  • Technology for ITSM processes
  • Service desk internet technologies
  • Assisted service delivery models
  • Support delivery models
  • Telephone support
  • Remote support
  • Deskside support
  • Basic IT components
  • Automatic call distribution (ACD)
  • Computer telephony integration (CTI)
  • Self-service technology
  • Self-healing technology
  • Social media

target_au

Although there is no mandatory requirement, ideally candidates should have an awareness of working in a service or support department or team. The SDI Service Desk & Support Analyst course would suit candidates working in the following professions or areas:

  • Support Analysts
  • Service Desk Analysts
  • First-line Analysts
  • Second-line Analysts
  • Client Supports
  • Desktop Support Analysts
  • Customer Support Officers
  • Technical Support Analysts
  • Service Center Analysts

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this Service Desk & Support Analysts course, although it is recommended that candidates should have a good understanding of service desk activity and objectives.


titleEnterprise Architecture Foundation Training
days2
seo_titleTOGAF Enterprise Architecture Foundation - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Foundation helps utilize resources more efficiently and effectively, and realize a greater return on investment.
seo_tkeyTOGAF Enterprise Architecture Foundation
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This two-day course is intended as a foundational introduction to the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

The course examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 exam (foundation). During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • The basic concepts of Enterprise Architecture and TOGAF
  • The core concepts of TOGAF 9
  • The key terminology of TOGAF 9
  • The ADM cycle and the objectives of each phase, and how to adapt and scope the ADM
  • The concept of the Enterprise Continuum; its purpose and constituent parts
  • How each of the ADM phases contributes to the success of enterprise architecture
  • The ADM guidelines and techniques
  • How Architecture Governance contributes to the Architecture Development Cycle
  • The concepts of views and viewpoints and their role in communicating with stakeholders
  • The concept of building blocks
  • The key deliverables of the ADM cycle
  • The TOGAF reference models
  • The TOGAF certification program
  • Foundation Exam Preparation

outline

Module 1 – Course overview and introduction
Module 2 – TOGAF 9.1 Introduction and Core Concepts
Module 3 – The Enterprise Continuum and Tools
Module 4 – The Architecture Development Method (ADM)
Module 5 – Architecture Governance
Module 6 – ADM Guidelines and Techniques
Module 7 – TOGAF Reference Models
Module 8 – Group Activities and Buzz Exercises


target_au

The TOGAF Enterprise Architecture Foundation would suit candidates working in the following professions or areas:

  • Individuals who require a basic understanding of the TOGAF 9 framework
  • Professionals who are working in roles associated with an architecture project
  • Individuals responsible for planning, execution, development, delivery, and operation
  • Architects who are looking for a first introduction to TOGAF 9
  • Architects who want to achieve Level 2 certification

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this course, although it is recommended that candidates should have at least two years of professional experience working in Enterprise Architecture.


titleISO27001:2013 Information Security Practitioner
days2
seo_titleISO27001:2013 Information Security Practitioner Course | Insoft Services
seo_decISO27001:2013 Information Security Practitioner develops a deeper understanding of how to apply the standard for implementation, management and improvement.
seo_tkeyISO27001:2013 Information Security Practitioner
categoryit-services-management-training
vendorAPMG

techonogyIT Services Management
overviewISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. This two-day course expands on the foundational overview of this recently revised version of 2013. The ISO27001:2013 Information Security Practitioner training develops a deeper understanding of how to actually apply the standard for implementation, management, and improvement. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources.
  • ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Practitioner course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology
  • Apply your knowledge to business scenarios to enhance control of information
  • Establish a structured approach to information security management to secure information assets
  • Improve information security through the adoption of best practices
  • Understand how ISO/IEC 27001 provides a competitive differentiator when tendering for business contracts
  • Build a reputation with the secure management of confidential and sensitive information
  • Demonstrate compliance with an internationally recognized standard and the ability to satisfy customer security requirements

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – Practitioner examination preparation


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation and Practitioner would suit candidates working in the following professions or areas:

  • Both IT and business people will benefit from this course
  • Those requiring a basic understanding of the Information Security
  • IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • Anyone involved in or contributing to an on-going service improvement program
  • The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates are required to have attended an accredited training course and have successfully passed their foundation examination. It is strongly recommended that candidates should have a good understanding of security management.


titleISO27001:2013 Information Security Foundation
days3
seo_titleISO27001:2013 Information Security Foundation Course | Insoft Services
seo_decISO27001:2013 Information Security Foundation provides the basis for effective management of confidential information and application of information security controls.
seo_tkeyISO27001:2013 Information Security Foundation
categoryinformation-systems-security
vendorAPMG

techonogyIT Systems and Security
overviewThis three-day ISO27001:2013 Information Security Foundation course overviews the recently revised version of 2013. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources. ISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Foundation course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – ISMS implementation

Module 7 – ISMS audit and certification


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation would suit candidates working in the following professions or areas:

  • · Both IT and business people will benefit from this course
  • · Those requiring a basic understanding of the Information Security
  • · IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • · Anyone involved in or contributing to an on-going service improvement program
  • · The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite for attending this course. It is strongly recommended that candidates should have a good understanding of security management.


titleLean IT Leadership
days3
seo_title
seo_decLean IT Leadership shows how to establish and maintain a sustainable approach to long term improvement of value delivery from IT.
seo_tkeyLean IT Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation and Lean IT Leadership exam. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This three-day course leads to the Lean IT Leadership exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a deep understanding of what skills are needed and what it takes to be a Lean IT Leader, this includes:

  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organisation
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 2 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 3 – Helping Others to Develop

  • Definition of Genchi Genbutsu/ Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 4 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 5 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 6 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 7 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Kaizen
days3
seo_title
seo_decThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives.
seo_tkeyLean IT Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives. The course teaches students how to effectively use the Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) improvement model leveraging the Lean A3 problem identification and planning tool to complete a full improvement cycle. This certification course provides you with the knowledge, skills, and methodology required to identify, plan and implement incremental service and process improvements focused on improving the efficiency and effectiveness of any process or value stream. It also prepares you for the Lean IT Association Kaizen certification exam. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Kaizen level certification.   See other courses available
objective
outline

This three-day course leads to the Lean IT Kaizen certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to be a highly effective Lean Kaizen Lead.

During the course you will:

  • Understand Lean principles related specifically to leading a Kaizen event
  • Understand how to apply the Lean A3 tool to support continual improvement
  • Gain practical how-to knowledge of how to use of the Six Sigma DMAIC improvement model as a structured improvement methodology
  • Learn about improvement scoping and validation
  • Learn how to gain the voice of customer input and establish critical to quality requirements
  • Learn how to apply and use Value Stream Mapping (VSM) techniques to identify process waste and speed improvement opportunities
  • Understand how to use root cause analysis techniques to support problem analysis
  • Learn how to identify, select and use various improvement options
  • Understand how to establish effective controls
  • Understand how to establish methods to improve quality and mistake proof future process activities

target_au

The course is designed for IT practitioners interested in expanding their practical knowledge and skills to lead targeted Lean improvement initiatives focused on continual service improvement, including:

  • Managers tasked with department level process improvements
  • Business analysts
  • Project managers
  • Software developers
  • Quality assurance managers
  • IT Consultants
  • Any roles responsible for quality, efficiency and continual service improvement

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req
titleLean IT Foundation with Six Sigma Overview
days3
seo_titleLean IT Foundation with Six Sigma Overview | Insoft Services
seo_decLean IT Foundation with Six Sigma Overview course shows how to apply the Lean IT approach to address customer value requirements.
seo_tkeyLean IT Foundation with Six Sigma Overview
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation exam followed by an overview of Six Sigma. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.   See other courses available
objective

Lean IT Foundation with Six Sigma Overview is a three-day course that leads to the Lean IT Association foundation exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organisation
  • Lean IT Dimensions: Behaviour & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • High-level overview of Six Sigma

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behaviour & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviours
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Six Sigma

  • Meaning of Six Sigma
  • History of Six Sigma
  • Common roles in six sigma
  • Six Sigma methods
  • Six Sigma tools
  • Control charts
  • The Six Sigma organization
  • Process capability and measures

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of IT processes.


titleLean IT Foundation & Leadership
days5
seo_titleLean IT Foundation and Leadership - IT Training | Insoft Services
seo_decLean IT Foundation and Leadership provides practical appreciation of how to apply Lean IT Principles to specific business problems and pain points.
seo_tkeyLean IT Foundation and Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain both a foundational understanding of all the key parts of the Lean It approach and a more in-depth focus in IT Lean Leadership, this includes:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organization
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behavior & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviors
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 9 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 10 – Helping Others to Develop

  • Definition of Genchi Genbutsu/Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 11 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 12 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 13 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 14 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Foundation & Kaizen
days5
seo_titleLean IT Foundation and Kaizen - IT Training | Insoft Services
seo_decLean IT Foundation and Kaizen course will show how to implement and apply Kaizen improvement activities into the enterprise, use it for client initiatives.
seo_tkeyLean IT Foundation and Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewLean IT Foundation and Kaizen course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

Lean IT Foundation and Kaizen two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleLean IT Foundation
days2
seo_title
seo_decLean IT Foundation training is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.
seo_tkeyLean IT Foundation
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis two-day course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

This two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleEnterprise Architecture Foundation & Advanced Training
days4
seo_titleTOGAF Enterprise Architecture Training | Insoft Services
seo_decTOGAF Enterprise Architecture Training is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts.
seo_tkeyTOGAF Enterprise Architecture Training
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This four-day course is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Training examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 & 2 exams (foundation and certified). During the course delegates will get the opportunity to prepare for the exams and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • Course Introduction
  • TOGAF Basic Concepts
  • Architecture Governance
  • Architecture Views and Viewpoints
  • The ADM Phases
  • Building Blocks and the ADM
  • Key ADM Deliverables
  • ADM Guidelines and Techniques
  • The Architecture Development Method (ADM) – architecture process
  • Guidelines and techniques for using and adapting the ADM
  • The Architecture Content Framework – how to describe the architecture
  • The Enterprise Continuum – a classification system for architecture assets
  • TOGAF 9 Reference Models – the ‘building blocks’ of an Information System
  • Architectural Governance and Capability – governance, skills and maturity
  • Foundation & Certified Exam Preparation

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – The Enterprise Continuum and Core Concepts

Module 4 – The Architecture Development Method

Module 5 – Architecture Governance

Module 6 – ADM Guidelines and Techniques

Module 7 – TOGAF Reference Models

Module 8 – The ADM in Detail

Module 9 – Adapting the ADM Using Iterations and Levels

Module 10 – Security and the ADM

Module 11 – Service Orientated Architecture (SOA)

Module 12 – Architecture Content Framework (Metamodel)

Module 13 – Certified (Part 2) Examination Preparation

Module 14 – Group Activities and Buzz Exercices


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this taking the TOGAF Certified (Level 2) exam. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleEnterprise Architecture Advanced Training
days2
seo_titleTOGAF Enterprise Architecture Advanced - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Advanced training contains guidance on what to do to establish an architecture practice and use it for transformation.
seo_tkeyTOGAF Enterprise Architecture Advanced
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. Enterprise Architecture Advanced Training is a two-day course that is intended as an advanced exploration of the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Advanced training is designed as a follow-on course from the TOGAF Level 1 examination. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain an advanced understanding of all the key parts of the TOGAF Framework:

  • How to apply the ADM phases in the development of an enterprise architecture
  • How to apply Architecture Governance in the development of an enterprise architecture
  • How to apply the TOGAF Architecture Content Framework
  • How to apply the concept of Building Blocks
  • How to apply the Stakeholder Management Technique
  • How to apply the TOGAF Content Metamodel
  • How to apply TOGAF recommended techniques when developing an enterprise architecture
  • The TOGAF Technical Reference Model and how to customize it to meet an organizations needs
  • The Integrated Information Infrastructure Reference Model
  • The content of the key deliverables of the ADM cycle
  • How an enterprise architecture can be partitioned to meet the specific needs of an organization
  • The purpose of the Architecture Repository
  • How to apply iteration and different levels of architecture with the ADM
  • How to adapt the ADM for security
  • SOA as a style of architecture
  • The role of architecture maturity models in developing an enterprise architecture
  • The purpose of the Architecture Skills Framework and how to apply it within an organization

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – TOGAF Reference Models

Module 4 – The Architecture Development method in detail

Module 5 – Adapting the ADM Using Iterations and Levels

Module 6 – Security and the ADM

Module 7 – Service Orientated Architecture (SOA)

Module 8 – Architecture Content Framework (Metamodel)

Module 9 – Certified (Part 2) Examination Preparation

Module 10 – Group Activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleCOBIT 5 Foundation & NIST Cyber Security Framework
days5
seo_titleCOBIT 5 Foundation and NIST CyberSecurity Framework | Insoft Services
seo_decCOBIT 5 Foundation and NIST Cybersecurity Framework prepare candidates to manage cybersecurity in a structured way using the NIST Cybersecurity Framework.
seo_tkeyCOBIT 5 Foundation and NIST CyberSecurity
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThis 5-day COBIT 5 Foundation and Implementing NIST Cybersecurity Framework using COBIT® 5 course, builds from the foundation level of COBIT, what it is and what it does, to preparing candidates to manage cybersecurity in a controlled and structured way using the NIST Cybersecurity Framework. The second part of the course is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business
  • Introduction to the Cybersecurity Framework

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise End-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Critical Security Framework Structure

  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow
  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 7: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 8: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 9: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 10: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 11: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 12: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 13: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts, IT organizational management, and a basic knowledge of cybersecurity concepts.


titleCOBIT 5 & NIST Cybersecurity Framework
days2
seo_titleCOBIT 5 and NIST Cybersecurity Framework - IT Training | Insoft Services
seo_decCOBIT 5 and NIST Cybersecurity Framework provides knowledge and understanding of the CSF, its goals, and the ability to apply this information.
seo_tkeyCOBIT 5 and NIST Cybersecurity
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThis 2-day Implementing NIST Cybersecurity Framework using COBIT® 5 course, is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information. Delegates will also prepare for and sit an 80 minute, multiple-choice foundation Information is a key resource for all enterprises, and technology plays a significant role.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: Course Overview and Introduction

  • COBIT 5 Overview
  • The Five Principles of COBIT 5
  • The Goals Cascade
  • The Seven Enterprise Enablers
  • COBIT 5 Process Reference Model
  • Process Capability Levels
  • Executive Order 13636
  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow

Lesson 2: Critical Security Framework Structure

  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 3: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 4: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 5: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 6: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 7: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 8: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 9: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

The recommended prerequisites for this course are:

  • Completed COBIT 5 Foundation Course (for obtaining the CSF Implementation Enhanced Qualification)
  • Basic Knowledge of COBIT 5
  • Basic knowledge of cybersecurity concepts

titleCOBIT 5 Implementation
days3
seo_title
seo_decCOBIT 5 Implementation shows how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization.
seo_tkeyCOBIT 5 Implementation
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewGet a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 Implementation for different organizational scenarios. The course material is supported by practical exercises and case-based scenarios. Candidates learn how to apply the COBIT 5 continual improvement lifecycle approach to address requirements and establish and maintain a sustainable approach to governing and managing enterprise IT as “normal business practice."   See other courses available
objective

This course is designed as an advanced implementation guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are:

  •  How to analyze enterprise drivers
  • Seven Phase implementation Steps
  • Implementation challenges
  • Root causes and success factors in each phase
  • How to determine and assess current process capability
  • How to scope and plan improvements
  • Identify and avoid potential implementation pitfalls
  • Leverage the latest good practices

outline

Lesson 1: Introduction and Positioning GEIT

  • Understanding GEIT
  • Leveraging COBIT 5 & Integrated Frameworks, Standards and Good Practices
  • Recap of Principles
  • Recap of Enablers

Lesson 2: First Steps

  • Creating the Appropriate Environment
  • Recap of the Continual Lifecycle
  • Pain Points and Trigger Events
  • Stakeholder Involvement, Needs/ Enterprise Goals to be Mapped to Pain Points and Trigger Events
  • Key Success Factors

Lesson 3: Initiate the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 4: Define Problems and Opportunities

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 5: Plan and Execute the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 6: Realising the Benefits

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 7: Exam Preparation

  • Question Types
  • Practice Questions

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Implementation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Implementation Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Foundation and Assessor for Security
days5
seo_titleCOBIT 5 Foundation and Assessor for Security Training | Insoft Services
seo_decCOBIT 5 Foundation and Assessor for Security provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities.
seo_tkeyFoundation and Assessor for Security
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Foundation and Assessor for Security course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Foundation and Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How to use the self-assessment guide
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  •  The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Program
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 7: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 8: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 9: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 10: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 11: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 12: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 13 – Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Foundation and Assessor for Security course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Foundation and Assessor
days5
seo_titleCOBIT 5 Foundation and Assessor - IT Training | Insoft Services
seo_decThe COBIT 5 Foundation and Assessor course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities.
seo_tkeyCOBIT 5 Foundation and Assessor
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Foundation and Assessor course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Foundation and Assessor course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How to use the self-assessment guide
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 7: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  •  Assessment Class Selection
  • Self-Assessment

Lesson 8: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 9: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 10: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 11: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 12: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 13 – Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Foundation & Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organization management.


titleCOBIT 5 Foundation & Implementation
days5
seo_titleCOBIT 5 Foundation and Implementation - IT Training | Insoft Services
seo_decThe COBIT 5 Foundation and Implementation course explains the COBIT framework and supporting materials in a logical and example-driven approach.
seo_tkeyCOBIT 5 Foundation and Implementation
categorycobit
vendor

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT.  The COBIT 5 Foundation and Implementation course explains the COBIT framework and supporting materials in a logical and example-driven approach. Get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 for different organizational scenarios.   See other courses available
objective

The COBIT 5 Foundation and Implementation course is designed as an advanced course leading candidates from novice to implementation skilled professionals. The course will enable you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to analyze enterprise drivers
  • Implementation challenges, root causes and success factors
  • How to determine and assess current process capability
  • How to scope and plan improvements
  • Potential implementation pitfalls

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Introduction and Positioning GEIT

  • Understanding IT
  • Leveraging COBIT 5 & Integrated Frameworks, Standards and Good Practices
  • Recap of Principles
  • Recap of Enablers

Lesson 7: First Steps

  • Creating the Appropriate Environment
  • Recap of the Continual Lifecycle
  • Pain Points and Trigger Events
  • Stakeholder Involvement, Needs/ Enterprise Goals to be Mapped to Pain Points and Trigger Events
  • Key Success Factors

Lesson 8: Initiate the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 9: Define Problems and Opportunities

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 10: Plan and Execute the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 11: Realising the Benefits

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 12: Exam Preparation

  • Question types
  • Practice Questions

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment.

The COBIT 5 Foundation & Implementation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management. To be eligible to sit the Implementation examination, candidates must pass the Foundation examination taken during the course.


titleCOBIT 5 Foundation
days3
seo_title
seo_decCOBIT 5 Foundation course helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques.
seo_tkeyCOBIT 5 Foundation
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the drivers?
  • Phase 2 – Where are we now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What needs to be done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment.

The COBIT 5 Foundation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Awareness
days1
seo_title
seo_decCOBIT 5 Awareness will introduce COBIT 5 and how it works with existing frameworks, and discuss how to measure and assess processes using the framework.
seo_tkeyCOBIT 5 Awareness
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. This one-day COBIT 5 Awareness course will give you a flavor of what COBIT 5 is, and when used effectively can govern the use of your existing processes throughout your IT Enterprise. The course will introduce COBIT 5 and how it works with existing frameworks, discuss the COBIT 5 principles, highlight the COBIT 5 enablers, and discuss how you would measure and assess processes using the framework.   See other courses available
objective

This course is designed to provide a high-level overview of COBIT and enable delegates to understand how an integrated IT Governance framework might be utilized to achieve IT business integration, cost reductions, and increased productivity. The areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Introduction to Meeting Stakeholders Needs
  • Introduction to The Goals Cascade
  • Introduction to Covering an Enterprise Endo-to-end
  • Introduction to Single Integrated Framework
  • Introduction to Enabling a Holistic Approach
  • Introduction to Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

COBIT 5 Enabler Dimensions

  • Introduction to Enabler 1 – Principles, Policy and Frameworks
  • Introduction to Enabler 2 – Processes
  • Introduction to Enabler 3 – Organizational Structures
  • Introduction to Enabler 4 – Culture, Ethics and Behaviour
  • Introduction to Enabler 5 – Information
  • Introduction to Enabler 6 – Services, Infrastructure and Applications
  • Introduction to Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment.

The COBIT 5 Awareness course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this awareness course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Assessor for Security
days3
seo_titleCOBIT 5 Assessor for Security - IT Training | Insoft Services
seo_decThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model.
seo_tkeyCOBIT 5 Assessor for Security
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  •  How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  •  How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: Foundation Review

  • Process Capability Assessment
  • COBIT Assessment Program
  • Process Capability Program
  • Advantages of the ISO/IEC15504 Approach
  • Key Definitions
  • Process Reference Model
  • Assessing Process Capability
  • COBIT Process Assessment Attributes
  • Consequences of Capability Gaps

Lesson 2: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 3: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 4: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 5: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 6: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 7: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 8: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 9: Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Assessor Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Assessor
days3
seo_title
seo_decCOBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM).
seo_tkeyCOBIT 5 Assessor
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective
outline

Lesson 1: Foundation Review

  • Process Capability Assessment
  • COBIT Assessment Programme
  • Process Capability Program
  • Advantages of the ISO/IEC15504 Approach
  • Key Definitions
  • Process Reference Model
  • Assessing Process Capability
  • COBIT Process Assessment Attributes
  • Consequences of Capability Gaps

Lesson 2: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 3: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 4: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 5: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 6: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 7: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 8: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarise Results

Lesson 9: Exam Preparation

  •  Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Assessor Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleOWASP Top 10 Bootcamp
days2
seo_titleOWASP Top 10 Bootcamp - IT Training | Insoft Services
seo_decOWASP Top 10 Bootcamp course shows how to identify and exploit general vulnerabilities, and how to fix existing holes and prevent new ones from occurring.
seo_tkeyOWASP Top 10 Bootcamp
categoryweb-applications
vendorOWASP

techonogyOpen-Source
overviewIn OWASP Top 10 Bootcamp course you will learn about the most common security risks for web applications (OWASP Top 10). Find out how to identify and exploit general vulnerabilities in applications, and how to fix existing holes and prevent new ones from occurring.   See other courses available
objective

After successfully completing the OWASP Top 10 Bootcamp course, you will:

  • Recognize the causes behind and the consequences of common coding errors and mistakes
  • Understand the methods for discovery and exploitation of these issues
  • Understand the basic practices that help prevent the most common mistakes and lead to more secure software

outline

This training follows the structure of the OWASP Top 10 list of the most critical web application security risks. For each risk, it provides its description, common examples of vulnerabilities and ways the attackers can use to exploit them, and explains the potential consequences of a successful attack.

Basic guidance on how to avoid each risk is also provided, which is delivered in engaging, seminar-style lecture format with hands-on lab exercises for you to complete. This hands-on approach keeps you engaged and ensures the knowledge transfer of critical secure coding techniques.

Labs

The OWASP Top 10 Boot Camp features several hands-on labs, that includes:

  • Exploiting SQL injection
  • Attacking authentication
  • Cross-site scripting exploitation
  • Source code auditing
  • CMS identification
  • Attacking web services
  • Client-side attacks
  • Open-source analysis & Google hacking
  • Exploiting web application with w3a

target_au

OWASP Top 10 course applies to a broad audience. Primarily designed for professionals whose job function includes creating web applications, it will also be highly beneficial for other IT and information security professionals, as well as managers who want to know more about web application security risks and what they mean to an organization.


pre_req
titleOWASP Application Threat Modeling
days2
seo_titleOWASP Application Threat Modeling - IT Training | Insoft Services
seo_decThe OWASP Application Threat Modeling gives the best training possible and the templates to incorporate threat modeling best practices in the daily work.
seo_tkeyOWASP Application Threat Modeling
categorythreat-modeling
vendorOWASP

techonogyOpen-Source
overviewAs skilled and experienced professionals we know that there is a gap between academic knowledge of threat modeling and the real world. To close that gap, we developed practical use cases, based on real-world projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using the OWASP Application Threat Modeling methodology, we provide our students with the best training possible and the templates to incorporate threat modeling best practices in their daily work. Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on:
  • B2B web and mobile applications, sharing the same REST back-end
  • An IoT deployment with a gateway and a cloud-based update service
  • OAuth scenarios for an HR application
  • Privacy of a new face recognition system in an airport
  • Get into the defenders’ head, attacking a nuclear facility
  See other courses available
objective
outline

Day 1

  • Threat modelling introduction
  • Threat modelling in a secure development lifecycle
  • What is threat modelling?
  • Why perform threat modelling?
  • Threat modelling stages
  • Different threat modelling methodologies
  • Document a threat model
  • Diagrams –what are you building?
  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Sequence and state diagrams
  • Advanced diagrams
  • Hands-on: diagram B2B web and mobile applications, sharing the same REST backend
  • Identifying threats –what can go wrong?
  • STRIDE introduction
  • Spoofing threats
  • Tampering threats
  • Repudiation threats
  • Information disclosure threats
  • Denial of service threats
  • Elevation of privilege threats
  • Attack trees
  • Attack libraries
  • Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on-premise gateway and secure update service

Day 2

  • Addressing each threat
  • Mitigation patterns
  • Authentication: mitigating spoofing
  • Integrity: mitigating tampering
  • Non-repudiation: mitigating repudiation
  • Confidentiality: mitigating information disclosure
  • Availability: mitigating denial of service
  • Authorization: mitigating elevation of privilege
  • Specialist mitigations
  • Hands-on: threat mitigations OAuth scenarios for web and mobile applications

target_au

Threat modeling is a crucial technique to assure more secure software and systems. The OWASP Application Threat Modeling training will provide our students with the know-how, templates, and exercises to start threat modeling themselves. Key takeaways are:

  • becoming a better (security) professional
  • understanding the process and technique of threat modeling
  • knowing when and how to introduce and improve threat modeling

pre_req

Students should be familiar with basic knowledge of web and mobile applications, databases & Single sign-on (SSO) principles


titleWeb Hacking Check Point Certified PenTesting Expert
days2
seo_titleWeb Hacking Check Point Certified PenTesting Expert | Insoft Services
seo_decIn this Web Hacking Check Point PenTesting course you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing.
seo_tkeyWeb Hacking Check Point
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Web Hacking Check Point Certified PenTesting Expert course is an entry-level web application security testing training. This course works as a prerequisite for the Advanced Web Hacking course. In two days, you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing with a focus on web applications.   See other Check Point courses
objective
  • This curriculum introduces you to Web Application Hacking.
  • Practical focus
  • Learn how web application security flaws are found
  • Discover leading industry standards and approaches
  • Use this foundation to enhance your knowledge
  •  Prepare for more advanced web application topics

outline

Day 1

Information gathering, profiling and cross-site scripting

  • Understand HTTP protocol
  • Identify the attack surface
  • Username enumeration
  • Information disclosure
  • Issues with SSL / TLS
  • Cross-site scripting

Day 2

Injection, flaws, files and hacks

  • SQL injection
  • XXE attacks
  • OS code injection
  • Local/remote file include?
  • Cryptographic weakness
  • Business logic flaws
  • Insecure file uploads

target_au
  • System administrators
  • Web developers
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next level

pre_req

Before attending the Web Hacking Check Point Certified PenTesting Expert course, you should have:

  • Laptop with Windows Operating System installed (either natively or running in a VM)
  • Administrative access to perform tasks such as installing software, disabling antivirus etc..
  • Ethernet/wired network for this class (Or supported adapter).

titleInfrastructure Hacking Check Point Certified Pen Testing Expert
days2
seo_titleInfrastructure Hacking Check Point Certified PenTesting Expert | Insoft UK
seo_decThe Infrastructure Hacking Check Point Certified Pen Testing Expert course will give you what is necessary to start or formalise your pen testing career.
seo_tkeyInfrastructure Hacking Check Point
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Infrastructure Hacking Check Point Certified Pen Testing Expert course is an intermediate training designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.   See other Check Point courses
objective

This curriculum familiarizes you with hacking tools and techniques.

  • Gain practical experience with tools that will serve you in the future
  • Learn tools and techniques to hack various components involved in infrastructure hacking
  • Develop a critical understanding of the concepts behind these

outline

Day 1

  • TCP/IP basics
  • The threat of port scanning
  • Target enumeration
  • Brute-forcing
  • Meta sploit basics
  • Hacking recent Unix vulnerabilities
  • Hacking databases
  • Hacking application servers
  • Password cracking

Day 2

  • Hacking third-party applications (WordPress, Joomla, Drupal)
  • Windows enumeration
  • Hacking recent Windows vulnerabilities
  • Hacking third-party software (Browser, PDF, Java)
  • Post-exploitation: dumping secrets
  • Hacking windows domains

target_au
  • System administrators
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next-level

pre_req

Before attending the Infrastructure Hacking Check Point Certified PenTesting Expert course, you must bring or have access to a laptop with admin/root access.


titleHacking 101 Check Point Certified PenTesting
days1
seo_titleHacking 101 Check Point Certified PenTesting Training | Insoft Services
seo_decThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing and Reverse Engineering.
seo_tkeyHacking 101
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing, by providing knowledge and skills in areas of network, system, network, web and applications hacking, as well as in Reverse Engineering.   See other Check Point courses
objective

Discover the world of Pen Testing Begin your journey with proven hacking techniques. The Hacking 101 Check Point Certified PenTesting course trains IT professionals in the skills of Pen Testing. You will become familiar with the risks and vulnerabilities of corporate networks.

You will learn hacking skills for:

  • Systems
  • Networks
  • Web
  • Applications
  • Reverse software engineering

outline
  • Pen Test Methodology
  • Website architecture
  • Attack vectors
  • SQL injection
  • XSS (Cross-site scripting)
  • Burp (Proxy tool)

Learn Hacking techniques for infrastructure devices and systems. These skills are critical for penetration testing and managing vulnerabilities in your environment. Students will become familiar with scanning, testing and hacking networks.

There are live demonstrations that feature a variety of defensive hacking techniques.


target_au

Students with a background in programming and networking.


pre_req

Students should bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks such as installing software, disabling antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported. Also, note that we will use an Ethernet/wired network for this class. If your laptop does not support this, please carry the correct adaptor to ensure you are able to connect to the wired network.


titleForcepoint Web Security System Engineer Course
days5
seo_titleForcepoint Web Security System Engineer Course | Insoft Services
seo_decDuring this five-day Forcepoint Web Security System Engineer course, you will gain core skills as a system engineer for handling Forcepoint Web Security.
seo_tkeyForcepoint Web Security System Engineer
categoryweb-security
vendorForcepoint

techonogySecurity
overviewDuring this five-day Forcepoint Web Security System Engineer classroom-based instructor-led course, students will gain an understanding of the core competencies and skills needed to practice as a system engineer handling Forcepoint Web Security. The core competencies are design and deployment, component implementation, troubleshooting, and debugging. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Web Security from concept creation to production.   See other Forcepoint courses
objective
  • Analyze key deployment considerations
  • Calculate sizing and performance tuning
  • Classify different deployment types
  • Install and configure Web Security with appliances
  • Assess how Web Security integrates with supported third-party solutions
  • Configure tweaks to tune and balance settings to respond to daily needs
  • Perform troubleshooting and debugging

outline

MODULE 1: DEPLOYMENT

  • Define key deployment considerations
  • Use best practices to review the system, hardware, and other pre-requirements for installation
  • Identify which services to install and how to distribute them across different devices
  • Prepare a Windows server for a Forcepoint installation
  • Identify the location of the installation logs for troubleshooting installation problems
  • Identify the features of Forcepoint Appliances
  • Describe the hardware specifications and architecture of Forcepoint Appliances
  • Identify the information needed for the initial configuration of an appliance
  • Locate and install hotfixes
  • Explain the principle differences between appliances running version 8.3 (or later)versus those running version 8.4 (or newer)
  • Describe configuring SNMP on an appliance
  • Define and discuss the methods of traffic redirection using a proxy including the pros and cons of each
  • Deploy and configure Explicit and Transparent Proxy
  • Demonstrate understanding of PAC files, WPAD, GPO enforcement of proxy settings
  • Compare Web Security component placement per network size
  • Apply guidelines related to component deployment, limits, ratios and supported configurations
  • Identify how Web Security integrates with third-party external services
  • Detail the full scope and deployment workflow for simple, medium, and advanced network deployments
  • List components and concepts used in sizing and performance tuning
  • Apply Web Security sizing information provided by Forcepoint Performance Engineering
  • Utilize the sizing guidelines to successfully provide deployment recommendations for small, medium, and large networks
  • Compare and contrast various deployment types based on real-world deployment examples
  • Describe Installation verification for a successful deployment
  • Identify the Web Security installation footprint
  • Describe methods of configuring the proxy for high availability
  • List the components needed for disaster recovery
  • Identify the disaster recovering guidelines and considerations

MODULE 2: CONFIGURATION

  • Distinguish key settings in the Security Manager infrastructure components
  • Install and use the Forcepoint Security Appliance Manager(FSAM)
  • Identify and analyze Filtering and Policy Enforcement components
  • Articulate the key features and functions in the proxy architecture
  • Describe the pros and cons of various user identification agents
  • Describe the functions of the User Service
  • Defend the need for domain admin rights
  • Compare XID agents with proxy authentication
  • Design and implement proxy authentication based on a customer’s network size and Directory Service options
  • Utilize best practices for managing encrypted traffic
  • Implement User Identification components in single and multi-domain environments
  • Evaluate the Logging and Reporting architecture

MODULE 3: TROUBLESHOOTING AND DEBUGGING

  • Identify Web Security configuration files, diagnostic tools, tuning parameters, and verbose logging
  • Describe the process of obtaining appliance root access
  • Demonstrate appliance CLI commands and operations
  • Utilize effective procedures for troubleshooting Security Manager components
  • Detail proxy tuning and debugging procedures
  • Identify proxy debugging tools and log files
  • Debug the ant_server
  • Troubleshoot proxy authentication
  • Troubleshoot IWA
  • Troubleshoot SSL decryption
  • Inspect User Service architecture, main configuration files, troubleshooting, and debugging parameters
  • Review Log Server and Log Database back-end configuration files, tuning parameters, and troubleshooting procedures

target_au
  • Channel Partners: Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support
  • Customers: Deployment Specialists, Implementation Specialists, System Engineers
  • Forcepoint: Sales Engineers, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint Web Administrator Course and certification
  • Intermediate knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint NGFW System Engineer Course
days5
seo_titleForcepoint NGFW System Engineer Course | Insoft Services
seo_decIn the Forcepoint NGFW System Engineer course you will learn how to install, configure, administer and support Forcepoint NGFW into the security ecosystem.
seo_tkeyForcepoint NGFW System Engineer
categoryngfw
vendorForcepoint

techonogySecurity
overviewThe Forcepoint NGFW System Engineer course combines five sessions where you will learn how to install, configure, administer, support and understand how Forcepoint NGFW fits into the security ecosystem. Through instruction, demonstrations, and hands-on lab practice exercises, you will understand the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments. You will then develop expertise in topics that include, but are not limited to, clustering the NGFW, creating security rules and policies, integrating the NGFW with other Forcepoint technologies, inbound and outbound traffic management, under-standing multi-link technology, configuring VPNs, traffic deep inspection, and controlling endpoint activity with the Endpoint Context Agent.   See other Forcepoint courses
objective
  • Describe the fundamentals of NGFW
  • Detail the Security Management Center (SMC)capabilities
  • Plan and deploy the SMC
  • Configure and deploy a single firewall
  • Configure and deploy a firewall cluster
  • Configure policies for distributed firewall management
  • Configure security policies and access control
  • Configure and utilize multiple internet connections
  • Define Policy-based and Route-based VPNs
  • Manage users and authentication
  • Create a Mobile VPN
  • Monitor user and endpoint activity
  • Perform traffic inspection and malware detection
  • Create custom network applications
  • Configure TLS decryption
  • Integrate the NGFW with Forcepoint cloud solutions

outline

SESSION 1

Module 1: System Architecture Overview

  • Articulate the NGFW System Architecture
  • Understand how to size a firewall and management environment
  • Understand Management and Log Server high availability
  • Become familiar with upgrading Management Server, Log Server, and engines
  • Articulate the Forcepoint NGFW license model

Module 2: Firewall/VPN Role and Single Firewall Deployment

  • Describe basic network defence strategies
  • Define the capabilities and key features of the NGFW
  • Understand and learn the process of defining and deploy a single firewall•Identify additional features of the NGFW

Module 3: Routing and Anti-spoofing

  • Configure static routing
  • Describe additional special routing capabilities of the NGFW
  • Configure Policy-Based routing•Summarize the origin and function of Anti-spoofing

Module 4: NGFW Policies

  • Describe different NGFW policy types
  • Define NGFW policy templates and policy structure
  • Identify the anatomy of a security policy and the objects used in policies
  • Employ NGFW interface options•Detail the process of policy installation and activation

SESSION 2

Module 5: Distributed System Configuration

  • Describe system communication in a distributed firewall environment
  • Identify locations and contact addresses in distributed systems
  • Describe system communication between management and engines
  • Configure Network Address Translation (NAT)
  • Analyze the of exchanging data between management and other security devices

Module 6: Firewall/VPN Role and Clustering Technology

  • Describe the firewall clustering architecture and theory
  • Configure a firewall cluster in the SMC (management)
  • Deploy a firewall appliance (physical and virtual)

Module 7: MSSP and Virtual Contexts

  • Describe the SMC Domain Architecture
  • Detail the function of the Web Portal Server
  • Define Virtual Contexts
  • Relate Master Engines and Virtual Engines
  • Relate clustering and performance
  • Review a configuration and deployment example of an MSSP architecture

SESSION 3

Module 8: Outbound Multi-Link Technology

  • Describe Outbound Traffic Management and its capabilities
  • Explain ISP link selection•Classify when to use a particular link selection method
  • Configure Outbound Multi-Link

Module 9: Site-to-Site VPNs

  • Define Forcepoint NGFW VPN capabilities
  • Define Forcepoint NGFW VPN terminology
  • Identify supported VPN topologies•Relate Multi-Link and VPNs
  • Configure a Policy-Based VPN
  • Investigate Route-Based VPNs and when to use them
  • Test VPN-related tools in the SMC
  • Design VPN Hub configuration

Module 10: Active Directory Integration

  • Define network user management
  • Integrate Active Directory with the SMC (management)
  • Categorize the role of NPS, RADIUS, and TACAC+ in the authentication process
  • Deploy Forcepoint User Identification
  • Configure and deploy the Endpoint Context Agent
  • Monitor network users

Module 11: VPN Client

  • Describe Mobile VPN connections
  • Distinguish IPSec and SSL VPN tunnelling
  • Configure an NGFW engine for Mobile VPN connections
  • Configure the VPN Client for an endpoint
  • Demonstrate tools for Mobile VPN troubleshooting

SESSION 4

Module 12: Traffic Inspection

  • Review connection control and the role of Deep Inspection
  • Differentiate between Services, Protocol Agents, and Proxy Modules
  • Configure a Sidewinder Proxy service
  • Establish Network Application Identification
  • Differentiate Network Applications and Client Applications

Module 13: Inspection Policies

  • Relate firewall and inspection policies
  • Illustrate the anatomy of Inspection Policies
  • Differentiate the predefined Inspection Policy templates
  • Define the concept of Situations•Define the function of the Inspection Rules tree
  • Fine-tune inspection policies
  • Analyze the role and function of Inspection Exception rules
  • Analyze the use and function of Blacklisting

Module 14: Malware Detection and File Filtering

  • Explain theprocess of Malware Detection
  • Illustrate the anatomy of a File Filtering Policy
  • Define the process of using File Reputation services
  • Configure built-in Anti-Malware scanning
  • Describe the role of Advance Malware Detection

SESSION 5

Module 15: NGFW Inspection Techniques

  • Define techniques used by the NGFW to identify threats
  • Detail the traffic inspection process
  • Explain the role of Advanced Evasion Techniques and the process of traffic normalization
  • Describe misuse detection with Fingerprints
  • Describe concept of Situations and their role in traffic inspection
  • Analyze Regular Expression syntax
  • Review examples of fingerprints

Module 16: TLS Inspection

  • Articulate the purpose of TLS inspection
  • Describe TLS inspection exceptions
  • Define the process of Server and Client-Side TLS inspection
  • Configure the TLS inspection

Module 17: NGFW in Layer 2 Roles and Multi-Layer Deployment

  • Identify NGFW Operating Roles
  • Define key features of the IPS and Layer 2 firewall roles
  • Understand the difference between the Firewall and IPS
  • Deploy an IPS and a Layer 2 firewall•Configure and deploy a multi-layer NGFW
  • Analyze the role of High Availability in multi-layer deployments

Module 18: Forcepoint Integration

  • Configure integration with Forcepoint Web Gateway
  • Detail how to integrate with Forcepoint Advanced Malware Detection
  • Describe Forcepoint CASB•Review the Malware Detection process
  • Understand information exchange using Syslog or other SIEM solutions

Module 19: Troubleshooting

  • Detail the NGFW packet inspection process
  • Review the troubleshooting process and learn troubleshooting tips
  • Define the role of sgInfo in troubleshooting
  • Explore how to troubleshooting with logs
  • Understand how to troubleshoot a VPN
  • Analyze the role of monitoring in troubleshooting
  • Troubleshoot the NGFW engine

target_au
  • End-User/Customers: System Administrators, Network Security Administrators, Network Engineers, IT staff
  • Channel Partners: Consultants, System Architects, Integrators and Planners who help customers with Forcepoint NGFW implementations

pre_req
  • Completion of the Forcepoint NGFW Administrator Course and certification.
  • General understanding of routing and firewall functionality

titleForcepoint Insider Threat System Engineer Course
days5
seo_titleForcepoint Insider Threat System Engineer Course | Insoft Services
seo_decIn the Forcepoint Insider Threat System Engineer course, you will gain an understanding of the key core competencies and skills needed to practice as a SE.
seo_tkeyForcepoint Insider Threat System Engineer
categorysystem-engineer
vendorForcepoint

techonogyIT Systems and Security
overviewIn the Forcepoint Insider Threat System Engineer five-days course, students will gain an understanding of the key core competencies and skills needed to practice as a System Engineer handling Forcepoint Insider Threat. The core competencies are design, deployment, integration, maintenance, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Insider Threat from concept creation to production.   See other Forcepoint courses
objective
  • Understand key deployment types.
  • Learn about sizing and performance considerations.
  • Understand how Insider Threat integrates with other Forcepoint products and third-party products.
  • Perform common maintenance activities to keep system performance high in fast-evolving real-world environments.
  • Troubleshoot and debug each major component.

outline

Day 1&2–Design and Deployment

1. Components and communication

  • Describe the responsibilities of each component
  • Understand protocols and ports used for communication between components

2. Planning

  • Identify and confirm key System Requirements
  • Provide sizing guidelines based on number of agents and policy weight
  • Accommodate for growth and redundancy specifications

3. Installation

  • Perform demos, POCs, and simple deployments
  • Perform intermediate appliance-based deployments
  • Perform advanced clustered deployments for large enterprises

4. Initial configuration

  • Complete global setup checklist
  • Complete Administration Workbench agent setup checklist
  • Complete Policy Workbench checklist

5. Phased rollout deployments

  • Implement best practices for initial rollout
  • Configure and Install Windows Agent
  • Configure and Install Mac OS X Agent

6. Tuning

  • Create, test, and tune advanced level policies to address a variety of customer’s insider threat concerns

7. Advanced Agent deployment

  • Complete roll out using remote Agent deployment solutions

8. Backup and Disaster Recovery

  • Set up backups and confirm them with a test recovery

9. Monitoring

  • Track deployed Agents using Administration Workbench
  • Run and review reports to preempt potential performance issues

Day 3–Integrations

1. Perform AP-DATA integration

  • Test and tune AP-DATA triggered policies

2. Set up group mapping via LDAP integration

3. Understand the capabilities of Convergence and Spotlight APIs

Day 4–Upgrades and Hotfixes

1. Server upgrades

  • Prepare deployment and database for hotfix
  • Install Hotfix
  • Reinitialize database and test deployment

2. Agent Bundle upgrades and compatibility packs

  • Upgrade using agent commands
  • Upgrade using remote install utility

3. Verification

  • Confirm HF and Agent Bundles perform as expected

Day 5–Troubleshooting and Debugging

1. Troubleshooting methodology

  • Correctly identify the root cause
  • Apply and confirm a solution

2. Perform critical server diagnostics

  • Enable and review verbose logging
  • Access appliance using debug account

3. Database diagnostics and maintenance

  • Administer Oracle databases using sqlplus
  • Manage database using Oracle Enterprise Manager (OEM)

4. Agent monitoring and troubleshooting

  • Run Agent Tool diagnostics locally and remotely
  • Use Agent Tool to test for configuration issues
  • Manage Agents remotely
  • Enable and view verbose logging

 


target_au
  • Channel Partners: Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support
  • Forcepoint: Sales Engineers, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint Insider ThreatAdministrator Course(Previously “SVIT Administrator”)
  • Basic understanding of computer systems and networking

titleForcepoint Email Security System Engineer Course
days5
seo_titleForcepoint Email Security System Engineer Course | Insoft Services
seo_decThe Forcepoint Email Security System Engineer course prepares engineers to manage SE development of Forcepoint Email Security.
seo_tkeyForcepoint Email Security
categoryemail-security
vendorForcepoint

techonogySecurity
overviewDuring the Forcepoint Email Security System Engineer hands-on instructor-led course, you will gain an understanding of the key core competencies and skills needed to practice as a System Engineer handling Forcepoint Email Security. The core competencies are deploymentplanning, installation, upgrading and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Email Security from concept creation to production. See other Forcepoint courses
objective
  • Propose an Email Security deployment solution by identifying the most suitable platform, components and configurations for a given set of requirements.
  • Successfully plan and execute an Email Security on-premises installation.
  • Identify and mitigate common environmental factors within a deployment that can affect filtering efficacy.
  • Planand execute an Email Security upgrade using the Migration Tool.
  • Perform troubleshooting steps and debugging to resolve common deployment issues.

outline

SESSION 1 –DEPLOYMENT OVERVIEW AND INSTALLATION

Module1: Email Security Components

  • Required components
  • Optional components
  • Appliance offerings

Module2: Deployment Platforms

  • On-premises platform
  • Hybrid platform
  • Email Security in the Azure platform

Module3: Appliance Management Interfaces

  • Command Line Interface (CLI)
  • Forcepoint Security Appliance Manager (FSAM)

Module4: Deployment Use Cases

  • Small and middle business
  • Large and enterprise business

Module5: Installation planning

  • Requirements
  • Pre-installation considerations

Module6: Email Security on-premises Installation

  • Virtual Appliance on-premises deployment
  • Installing Forcepoint Security Manager and Log Server

Module7: Email Security in Azure

  • Deployment process

SESSION 2 -ARCHITECTURE AND ENVIRONMENT

Module8: Clustering

  • Benefits of a configuration cluster
  • Clustering with Hybrid and Data Security
  • Clustering with PEMModule9: Load Distribution
  • Third-Party Load Balancer
  • Load balancing with DNS

Module10: Upstream MTA

  • Simultaneous Connections
  • True Source IP Detection

Module 11: Address rewriting

  • Rewrite the envelope sender address
  • Rewrite the display sender address

Module12: DKIM Signing

  • DKIM process
  • Configuring DMARK in Forcepoint Security Manager

SESSION 3 –UPGRADINGEMAIL SECURITY

Module13: Plan the upgrade

  • Review the documentation
  • Component upgrade order

Module14: Perform the upgrade

  • 8.3 Appliance architecture changes
  • Migration Tool
  • Migration Process
  • Virtual Appliance Hotfix
  • Forcepoint Security Manager upgrade 8.2 –8.5.0
  • Migrate and upgrade Appliance

SESSION 4 –TROUBLESHOOTINGOVERVIEW

Module15: Troubleshooting & debug overview

  • Troubleshooting tools Real-time monitor Forcepoint Security Manager logo Counters Command Line Troubleshooting
  • Backend files and processes log on with root access to Email Security appliance backed files and processes debugging
  • CLI debug command debugging Forcepoint Modules using the CLIoDebugging Postfix modules (requires root access)

Module16: Installation Errors

  • Email Log Server installation errors
  • Forcepoint Management Server installation errors
  • Appliance registration errors

Module17: Mailflow Issues

  • Delivery problems handling outbound/internal delivery problems handling inbound delivery problems
  • Spam detection error false negative / False possible receiving backscatter / Sending backscatter
  • Troubleshooting with “mail log”

SESSION 5 –TROUBLESHOOTINGCONTINUED

Module18: LogDatabase and Log Server Issues

  • Cannot see logs form TRION Manager
  • Log server failed to start
  • Log DB extract, transform, and load process wrong
  • Track on-box PostgreSQL
  • Debug log daemon

Module19: Quarantine Issues

  • Message queues•Cannot see quarantine email in Blocked Messages
  • Debug quarantine daemon

Module20: PEM Issues

  • End-user login fail
  • PEM portal load fail•End user cannot receive notification
  • End-user cannot release messages
  • PEM always permit/blocklist fails
  • Debug PEM

Module21: Email DLPIssues

  • Email DLP registration fail
  • Email DLP policy deployment fail
  • Email DLP policy does not work normally
  • Use multiple policy engines

Module22: Cluster Problems

  • Configuration and license synchronization
  • Heartbeat Request and response
  • A secondary node cannot be synchronized
  • Debug clusteringModule23: Hybrid Issues
  • Hybrid configuration file
  • Hybrid logs cannot be synchronized
  • Debug Hybrid

target_au
  • Consultants, system architects, integrators
  • Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support

pre_req
  • Completion of the Forcepoint Email Security Administrator Course and certification.
  • Intermediate knowledge of networking and computer security concepts.
  • A computer that meets the requirements noted at the end of this document.

titleForcepoint DLP System Engineer Course
days5
seo_titleForcepoint DLP System Engineer Training Course | Insoft Services
seo_decThe Forcepoint DLP System Engineer course is a five-day instructor-led training, where you will create and test a Forcepoint DLP deployment.
seo_tkeyForcepoint DLP System Engineer
categorydlp-system
vendorForcepoint

techonogyIT Systems and Security
overviewThe Forcepoint DLP System Engineer course is a five-day hands-on instructor-led training, where you will create and test a Forcepoint DLP deployment, perform an in-depth analysis of DLP component architecture, and integrate Forcepoint DLP with local and cloud-based products. In this course, you will also learn how to manage incident data through Security Manager as well as through SQL, and perform maintenance tasks, such as dealing with failovers, upgrades and troubleshooting of all of the above, including advanced debugging of DLP logs.   See other Forcepoint courses
objective
  • Given a set of environmental, acceptable usage, and user requirements, deploy and configure Forcepoint DLP in various enterprise environments
  • Itemize and explain the processes involved in the interaction between DLP components
  • Explain the methodology used for evaluating necessary sizing of the DLP product
  • Perform advanced configuration of custom classifiers, predefined classifiers, rules and policies
  • Formulate policies leveraging predefined classifiers for regulatory compliance, the prevention of IP loss, and data theft
  • Build, configure, and deploy DLP Endpoint
  • Configure and enable cloud-based integrations with DLP, including online services and Forcepoint CASB
  • Explain the integration and function of DLP with RMS and file tagging software, such as Azure RMS and Boldon James
  • Demonstrate multiple methods for generating real-time incidents and discovery events
  • Indicate primary log files used to review component function, and itemize useful topics to debug
  • Troubleshoot functionality of all DLP system modules, including Linux based appliances
  • Compile and analyse incident data both in Forcepoint Security Manager and from SQL
  • Compare and configure incident workflows through Forcepoint Security Manager and email
  • Perform maintenance activities on Forcepoint DLP, including automated and manual upgrade, failover, backup, and restore

outline

MODULE 1: COMPONENTS AND INITIAL SETUP

  • Provide an organized list of available resources for support when working with Forcepoint DLP
  • Classify the basic methodologies for Forcepoint DLP deployment depending on the scale (Single Datacenter or Multiple Datacenter).
  • Identify software components (PEI, PE, Crawler, OCR, EP Servers, EP Agents) and hardware components used by Forcepoint DLP
  • Itemize and explain the software components and database locations used in Forcepoint Security Manager infrastructure
  • Install and configure Forcepoint Security Manager, Forcepoint DLP, Analytics Engine, Web Content Gateway, and Email Security Gateway

MODULE 2: DLP ARCHITECTURE

  • Diagram and explain the internal architecture used by Policy Engine, Data Batch Server, and Message Broker, as well as Security Manager and each DLP System Module (WCG, ESG, DSS Server, Protector)
  • Follow the flow of transaction processing during Policy Engine analysis
  • Document possible options for deployment patterns, including web and email traffic monitoring
  • Formulate sizing requirements for DLP Deployments, based on environment and user demands
  • Configure and demonstrate Policy Engine load balancing features
  • Generate artificial traffic using regression testing tools (PolicyEngineClient.exe, ContentExtractorClient.exe)

MODULE 3: INTEGRATIONS AND ADVANCED DEPLOYMENT

  • Explain basic configuration and troubleshooting for a DLP Protector, Mobile Agent, LDAP import and ResourceResolver
  • Identify upgrade requirements and procedures for upgrading a Protector or Mobile Agent
  • Identify basic requirements and functions when integrating DLP with Web Security, including DLP only Content Gateway
  • Analyze methods of integrating DLP with Email Security, including leveraging Email Security action plans in DLP and configuring Email Gateway for Office 365
  • Explain basic configuration and troubleshooting for the Analytics Engine•Identify the elements of the Incident Risk Ranking interface elements in Forcepoint Security manager, and explain their functions
  • Configure and test email encryption using Forcepoint Secure Messaging (Park and Pull)
  • Modify a Protector deployment to pair with a Web Content Gateway in ICAP mode
  • Install, configure, and test Squid on a Protector
  • Enable the Web Security Linking Service, Import URL Categories, and test Geolocation Lookup on Web DLP Policies
  • Configure an Email Encryption action plan and leverage it in a DLP Policy. Test functionality using a 3rd party MTA
  • Configure and perform remediation on incidents created by a DLP Policy that monitors and enforces against inbound mail.

MODULE 4: TROUBLESHOOTING AND DEBUGGING

  • Compare methodologies for diagnosing and resolving potential issues occurring in Forcepoint DLP
  • Discuss and analyzeDLP Troubleshooting use cases
  • Document log and debug topic structure used in Policy Engine debugging
  • Document log and debug topic structure used for DLP system modules (Security Manager, Protector, Content Gateways, Analytics Engine)
  • Enable debugging of Tomcat logs on Forcepoint Security Manager
  • Enable debugging of Policy Engine logs on an appliance (Email Security Gateway), and use debug information to track live transactions as they are submitted

MODULE 5: POLICIES, RULES, AND CLASSIFIERS

  • Define an Acceptable Use Policy as a preface to configuring Policies and Rules
  • Identify and define the three categories of DLP Policies
  • Analyze Boolean Logic as used in DLP Policies, and formulate examples, including an “off switch” argument
  • Explain how DLP interacts with Microsoft RMS using protected file classifiers
  • Analyze the uses of and compare the inherent accuracy of the different types of classifiers DLP uses (Key Phrases, Dictionaries, Regular Expressions, Scripts, File Properties, Machine Learning, Fingerprinting)
  • Document the syntax used, and analyze basic use cases for Regular Expression classifiers
  • Explain what the different components of Script (a.k.a. predefined) classifiers, and how Natural Language Processing functions
  • Analyze use cases involving configurable Script Classifiers, including the Email to Competitors classifier
  • Define exceptions to DLP policies using LDAP search expressions
  • Given an example of an Acceptable Use Policy, create a .bat file to automate regression testing using PolicyEngineClient
  • Explain, configure, and test the different components of the Customizable IDs Classifier
  • Perform stress testing on DLP Email policies using an SMTP “Black Hole”

MODULE 6: DISCOVERY AND CLOUD

  • Define the potential resources we can scan using Forcepoint DLP Discovery
  • Explain the methods used to assist Crawlers when dealing with very large discovery tasks•Manually administrate Discovery jobs using WorkSchedulerWebServiceClient
  • Explain configuration of Discovery tasks against cloud services (Sharepoint Online, Exchange Online, Office365, Box.com)
  • Differentiate between the three types of Remediation Scriptsand explain how to use Discovery Remediation Scripts using .bat files
  • Explain the basic functionality of Classifier Administration software (Boldon James) and how DLP integrates with those classifiers, including reading and writing document tags, as well as updates to the reporting interface.
  • Explain basic configuration for deploying a DLP Email Gateway in the cloud using Microsoft Azure•Explain basic configuration for integrating Forcepoint DLP with Forcepoint CASB, including adding ‘Cloud Services’ as destinations for DLP Policies
  • Configure and run a Network Discovery task using a Crawler, and configure load balancing for the Crawler
  • Manually delete a Discovery task using WorkSchedulerWebServiceClient
  • Configure and run a Database Discovery task against Oracle Enterprise
  • Create and run an Incident Management Remediation Script
  • Create a Policy Remediation Script, add it to an action plan, and test functionality
  • Create an Endpoint Remediation Script, add it to an action plan, and test functionality
  • Install a trial version of Boldon James Office Classifier, and experiment with DLP interaction using hierarchical content tags

MODULE 7: FINGERPRINTING, MACHINE LEARNING, AND OCR

  • Document and analyze the implications of the N-gram (5-word sliding window) fingerprinting algorithm
  • List and explain best practices when performing both file and database fingerprinting, including the use of validation scripts
  • Explain the functionality of Machine Learning versus Fingerprinting, and differentiate PreciseID from the Support Vector Machine (SVM) algorithm
  • Diagram and explain Work scheduler (Crawler) architecture, functionality, and debugging
  • Explain how Fingerprint tasks may be recorded and replayed for troubleshooting purposes
  • Document the architecture and explain the functionality of OCR
  • Analyze methods for troubleshooting OCR, including log file locations, best topics to debug, and manual testing using OCRClient
  • Create a File Fingerprint Classifier, configure it in a policy, and run multiple tests differentiated using an Ignored Section classifier
  • Perform Database Fingerprinting on an imported .csv file, configure the classifier in policy, and test functionality
  • Prepare training sets for a Machine Learning classifier, create the classifier and fine-tune accuracy, then evaluate success using an automated test script (.bat file with PolicyEngineClient)
  • Install a DSS Server with an OCR component, then test OCR using both external email traffic and manually generated traffic using OCRClient

MODULE 8: FORCEPOINT DLP ENDPOINT

  • Diagram and analyze endpoint server architecture
  • Diagram and analyze endpoint agent architecture, including log file locations and debugging
  • Explain and demonstrate Endpoint command line functionality (WDEUtil)
  • Document web browser integration using Browser Extensions, and explain troubleshooting methods with use cases
  • Differentiate between Unhooked and Trusted Endpoint applications
  • Explain how to use Tasklist from the command line to thoroughly Unhook and application and all related .dll files
  • Explain how serial numbers may be used to identify removable media for use in DLP Policies
  • Deploy Endpoints manually, using SCCM or GPO
  • Review installation procedure and explain how to configure and use DLP Endpoint on XenApp and XenDesktop
  • Build and install a DLP Endpoint package, then test Temporary Bypass function
  • Configure and deploy a custom message file for custom Endpoint alerts as part of an Endpoint package•Install an Endpoint in Stealth Mode•Debug an Endpoint agent and perform log analysis
  • Use Tasklist to completely unhook an application and all .dll files, then test to confirm the success
  • Create an Endpoint encryption action plan and test using emulated USB Removable Media, then attempt decryption using Forcepoint Decryption Utility

MODULE 9: INCIDENT MANAGEMENT, REPORTING, AND MAINTENANCE

  • Explain Syslog configuration and integration with a Syslog server (Splunk)
  • List the types of configurable DLP Alerts
  • Explain and demonstrate advanced functions of system health dashboard and system, traffic, and audit logs
  • Explain the functions of the User Risk Report
  • Demonstrate pulling various data points manually from SQL (when-data-security)
  • Explain and demonstrate what permissions can be limited for delegated admins and the effects in Forcepoint Security Manager
  • Perform each possible workflow in Incident Management•Configure and test the DLP Force Release feature
  • Configure and test Incident Notifications with Action Links (Email Based Incident Workflow)
  • Perform a manual incident dump from SQL using .bat files
  • Schedule and run a Backup task, while manually modifying the backup .vbs script, and performing a manual backup of the Fingerprint Repository
  • Configure and test DLP Alerts for various system health-related events

target_au
  • System Engineers, high-level System Administrators, and IT professionals assisting with DLP deployment, configuration, and administration
  • Consultants, system architects, integrators and planners who help customers with Forcepoint DLP implementations
  • Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint DLP Administrator Course and certification.
  • Intermediate knowledge of networking and computer security concepts.
  • A computer that meets the requirements noted at the end of this document.

titleForcepoint CASB System Engineer
days3
seo_titleForcepoint CASB System Engineer Training Course | Insoft Services
seo_decThe Forcepoint CASB System Engineer training course enables CASB administrators, network security administrators, IT staff and Forcepoint CASB operators.
seo_tkeyForcepoint CASB System Engineer
categorycloud-security
vendorForcepoint

techonogyIT Systems and Security
overviewThe Forcepoint CASB System Engineer training course focuses on enabling CASB administrators, network security administrators, IT staff and Forcepoint CASB operators, as well as consultants, system architects, integrators and planners who help customers with Forcepoint CASB implementations. Forcepoint CASB training is available in a two-tier learning path. The first course, Forcepoint CASB Administrator is focused on how to use and administer the Forcepoint CASB solution after implementation. The second course, Forcepoint CASB SE is focused on how to deploy, tune, and troubleshoot the Forcepoint CASB solution. The Forcepoint CASB Administrator and Forcepoint CASB SE training is available separately or can be taken at one time through the Forcepoint CASB Service Professional Bootcamp.   See other Forcepoint courses
objective

The Forcepoint CASB Administrator course provides in-depth instruction for students looking to learn the features, components, and key integrations that enable Forcepoint CASB capabilities. Students will develop skills in system architecture, Active Directory integration, cloud app discovery, managing assets, DLP integration, compliance and governance, forensic analysis, reporting, and health assessment and maintenance of the Forcepoint CASB system.


outline

During the three days, students will gain an understanding of the core competencies and skills needed to practice as a System Engineer handling Forcepoint CASB. The core competencies are sizing, deployment, product tuning, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint CASB from concept creation to production.


target_au
pre_req
titleForcepoint NGFW
days3
seo_titleForcepoint NGFW Training Course | Insoft Services
seo_decIn this Forcepoint NGFW instructor-led training course, you will learn how to install, configure, administer, and support Forcepoint NGFW.
seo_tkeyForcepoint NGFW
categoryngfw
vendorForcepoint

techonogyIT Systems and Security
overviewIn this Forcepoint NGFW instructor-led training course, you will learn how to install, configure, administer, and support Forcepoint NGFW. Through instructional content, demonstrations, and hands-on lab practice exercises, you will learn the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments. You will develop expertise in creating security rules and policies, managing users and authentication, understanding multi-link technology, configuring VPNs, traffic deep inspection, performing common administration tasks including status monitoring and reporting.   See other Forcepoint courses
objective
  • Understand the fundamentals of NGFW
  • Articulate the NGFW System Architecture
  • Differentiate the various NGFW operating modes
  • Administer the SMC components and use them to manage and monitor
  • Perform common administration tasks
  • Configure security policies and access control
  • Manage users and authentication
  • Understand monitoring capabilities
  • Create and edit reporting of the trafficprocessed by NGFWs
  • Integrate NGFW with other Forcepoint solutions
  • Perform basic troubleshooting of NGFW
  • Configure and install a single firewall

outline

MODULE 0: INTRODUCTION

  • Welcome to the course
  • Understand and prepare to use the virtual training environment

MODULE 1: NGFW OVERVIEW

  • Articulate NGFW key benefits and differentiators from other firewall products
  • Differentiate the various NGFW operating modes
  • Describe the NGFW Hardware Platform and Virtualization options
  • Describe different installation methods•Understand different NGFW deployment options

MODULE 2: SMC OVERVIEW

  • Articulate the NGFW system architecture
  • Describe the components of the SMC and its supported platforms
  • Identify the properties of the Management & Log server
  • Identify the properties of the Web Portal Server
  • Articulate the SMC Deployment options
  • Understand communication between SMC components and NGFW
  • Understand locations and contact addresses

MODULE 3: GETTING STARTED WITH SMC

  • Describe a high-level overview of the functionality of the management client
  • Prepare to perform system backups
  • Describe SMC High Availability solutions
  • Understand different SMC Administrator roles and access limitation
  • Articulate SMC logging approach and how to utilize Logs view

MODULE 4: NGFW POLICIES AND TEMPLATES

  • Describe the types of NGFW policies
  • Understand firewall policy templates
  • Explain automatic rules
  • Understand a firewall policy hierarchy

MODULE 5: ACCESS CONTROL AND NAT

  • Utilize the policy editor to customize NGFW policies
  • Configure Access Control Rules
  • Understand Rules Options
  • Describe the supported types of NAT
  • Configure the Network Address Translation

MODULE 6: TRAFFIC INSPECTION

  • Understand the difference between stateful and proxy mode
  • Configure web filtering
  • Explain different ways to control applications
  • Configure Sidewinder Proxy on the NGFW
  • Describe integration with external solutions

MODULE 7: INSPECTION POLICIES

  • Describe the Inspection Policies and Inspection Policy hierarchy
  • Configure the system policies and utilize the template for deep packet inspection
  • Articulate the different inspection policy components and options.
  • Modify Inspectionrules to react with various traffic
  • Understand how to tune the Inspection Policy

MODULE 8: MALWARE DETECTION AND FILE FILTERING POLICIES

  • Explain the malware detection process in the NGFW
  • Articulate the different options for detecting malware
  • Configure a File Filtering Policy•Explain the detection methods used in the NGFW Inspection

MODULE 9: ALERTING AND NOTIFICATIONS

  • Explain the alert escalation process in the NGFW system
  • Create an alert policy and alert chain to escalate an alert•Configure alert notifications channels

MODULE 10: USERS AND AUTHENTICATION

  • Identify supported directory servers and authentication methods
  • Explain and configure user authentication
  • Comprehend user identification•Understand how to integrate active directory interacts with the FUID agent
  • Understand ECA agent integration in windows environments

MODULE 11: MOBILE VPN AND SSL VPN PORTAL

  • Understand client-based and clientless remote access
  • Articulate the different Forcepoint options for remote access
  • Perform the SSL VPN Portal configuration

MODULE 12: SITE-TO-SITE VPN

  • Understand NGFW VPN Terminology
  • Differentiate between policy-based VPN and route-based VPN
  • Understand different site-to-site VPN topologies
  • Configure a policy-based VPN

MODULE 13: USING LOGS

  • Describe the log entry types available in the NGFW
  • Analyze how pruning filters affect log data
  • Create permanent filters•Illustrate the analysis and visualization tools for logs
  • Configure log data management tasks

MODULE 14: MONITORING, STATISTICS, AND REPORTING

  • Understand status monitoring views and dashboards
  • Understand Overviews and alert thresholds
  • Create customizable reports from log data
  • Comprehend the different third party probing methods

MODULE 15: POLICY TOOLS

  • Understand policy snapshots within the Management Server
  • Run the Rule Search tool available for Access rules, NAT rules, and Inspection Policies
  • Utilize the Policy Validation tool•Understand the Rule Counter Analysis
  • Comprehend the Policy Activation process in NGFW

MODULE 16: TROUBLESHOOTING

  • Understand the full troubleshooting process
  • Recognize the different kinds of logs that SMC provides to perform troubleshooting
  • Utilize various logs for troubleshooting and understand their meaning
  • Capture traffic and run diagnostics
  • Learn what to provide support when troubleshooting
  • Apply knowledge through three common problem scenarios

MODULE 17: SINGLE FIREWALL INSTALLATION

  • NGFW Deployment Overview
  • NGFW Operating Roles
  • Single NGFW Configuration
  • NGFW Installation
  • Add-Ons Features
  • Advanced Configuration Settings

MODULE 18: WHAT’S NEW IN NGFW 6.7

  • Describe the new features added in 6.7to the Forcepoint NGFW

target_au
  • New and existing customers of Forcepoint NGFW
  • Forcepoint Channel Partners
  • Forcepoint NGFW end users

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint Web Security
days3
seo_titleForcepoint Web Security Training Course | Insoft Services
seo_decIn the Forcepoint Web Security course you will gain an understanding of the key core competencies to manage Forcepoint Web Security.
seo_tkeyForcepoint Web Security
categoryweb-security
vendorForcepoint

techonogySecurity
overviewThe Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.   See other Forcepoint courses
objective
  • Understand the Forcepoint Web Security components and architecture
  • Articulate common deployment topologies
  • Access anduse Security Manager, including other available user interfaces
  • Execute updates and upgrades on Forcepoint Web Security
  • Understand delegated administration
  • Comprehend and perform policy and filter basics
  • Create effective web policies
  • Understand exception management
  • Recognize different user management methods
  • Configure user identification and policy enforcement
  • Create notifications and alerts
  • Understand report types and utilization
  • Create various reports
  • Understand system health alerts and usage monitoring
  • Understand system disaster recovery procedures
  • Learn how to respond to incidents

outline

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security
  • Describe features, components, and key integrations that enable Web Security functionalities
  • Compare the advantages and disadvantages of various deployment methodologies
  • Articulate the licensing structure and how and when to enter the key within the Content Gateway
  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning
  • Identify standard and custom policies (and related filters) based on your organizations needs
  • Distinguish the key settingsin Security Manager
  • Compare user identification and proxy authentication
  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts
  • Explain the reporting flow
  • Describe the various reporting options to gain important insights about your environment
  • Identify suspicious network activity using threats dashboard
  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents
  • Compare and contrast the available update options
  • Distinguish the guidelines related to incident management and disaster recovery
  • Identify system health monitoring capabilities
  • Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery

target_au
  • System Administrators, Network Security Administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint Email Security Administrator Course
days2
seo_titleForcepoint Email Security Administrator Course | Insoft Services
seo_decDuring the Forcepoint Email Security Administrator course, you will develop skills in creating email policies and system architecture and maintenance.
seo_tkeyForcepoint Email Security Administrator
categorynetwork-security-courses
vendorForcepoint

techonogySecurity
overviewDuring the Forcepoint Email Security Administrator course, you will learn the features, components, and key integrations that enable Forcepoint Email Security functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the Forcepoint Email Security system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.   See other Forcepoint courses
objective
  • Describe the key capabilities of Forcepoint Email Security
  • Understand the required and add-on components of Forcepoint Email Security
  • Understand multiple deployment scenarios
  • Perform initial setup configurations
  • Configure connection level controls and message properties
  • Create policies to fulfill various organization needs
  • Understand the difference between various block/permit lists
  • Configure email DLP policies
  • Configure and customize PEM portal
  • Understand email encryption methods
  • Run and interpret reports and configure logs
  • Understand how to upgrade the system and disaster recovery procedures

outline

Topic 1: Features & Components

  • Forcepoint solution overview
    • Forcepoint solution introduction
  • Forcepoint Email Security features and new features
    • Key features
    • What’s new
  • Understanding the deployment
    • Forcepoint Email Security appliances
    • V-Series appliance interfaces
    • Network without Forcepoint Email Security
    • Network with Forcepoint Email Security
    • Required components
    • Internal daemons
    • Communications with external services
    • Supported V-Series and X-Series models and total resources
    • Hardware allocation
  • Getting started with Forcepoint Email Security
    • Fundamental email security concepts: protected domain and email relay
    • Setting up Forcepoint Email Security
  • Setting up users
    • Domain group
    • User directory
  • Defining email routing
    • Domain-based route
    • Directory-based route

Topic 2: Traffic & Policies

  • Traffic
    • Message processing flow
    • Setting connection properties (simultaneous connection per IP)
    • Configuring message properties (size, volume)
    • RBL & Reputation service
    • SMTP greeting delay
    • Recipient validation
    • DHA prevention
    • SPF check
    • SMTP authentication
    • Global IP block list
    • IP address group
    • Compare trusted IP group and Allow Access List
  • Quarantine system
    • Quarantine system overview
    • Queue monitor
    • Message queues
  • Policy
    • Policy flow
    • Policy type
    • Policy condition
    • Rules, filters, actions
    • Action options merge
    • Global IP and address permit list
    • Dynamic permit list
    • Built-in DLP
      • DLP integration
      • Registered with data security server

Topic 3: PEM & advanced configurations & Maintenance

  • Personal Email Manager (PEM)
    • PEM architecture
    • Enabling PEM
    • End user block/permit list
  • Threat Projection Cloud
    • Threat Protection Cloud introduction
    • Configure Threat Protection Cloud
  • Traffic shaping
    • 5 parameters
    • How traffic shaping works
  • Transfer Layer Security (TLS)
    • Enforced/Mandatory TLS vs opportunistic TLS
    • Enable enforced TLS for incoming/outgoing connections
    • Enforced TLS security level & encryption strength
    • CA issued or self-signed TLS certification process
    • Enable mandatory TLS
    • Enable opportunistic TLS
  • Secure Message Delivery
    • Secure Message Delivery scenario 1
    • Secure Message Delivery scenario 2
    • Enable Secure Message Delivery
    • Secure encryption queue
    • Secure Message Delivery end-user experiences
  • Maintenance
    • Reporting
      • Log and reporting system overview
      • Log Server and database deployment
      • Dashboard & alert & logs
      • Presentation reports
      • Real-time monitor
      • Log database partition & rollover & maintenance
    • System administration & maintenance
      • Manage appliances
      • Delegated administration
      • Backup and restore

target_au
  • End-User/Customers: System administrators, network security administrators, IT staff
  • Channel Partners: Sales Engineers, consultants, implementation specialists

pre_req

None


titleCourse MB-700T00-A: Microsoft Dynamics 365: Finance and Operations Apps Solution Architect
days3
seo_titleMB-700T00-A: Dynamics 365 Finance Operations Apps Solution Architect
seo_decThe Microsoft Dynamics 365 Finance & Operations Apps Solution Architect (MB-700T00-A) course is developed for aspiring solution architects.
seo_tkeyMB-700T00-A
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365: Finance and Operations Apps Solution Architect (MB-700T00-A) course is developed for those aspired to be and new to the solution architect role. This course provides technical information focusing on application architecture and technical skills to start their journey into this role. This course will not cover the industrial skills and delivery skills required for this role.   See other Microsoft courses
objective

After completing the MB-700T00-A course, students will be able to:

  • Define skill areas for the solution architect role
  • Explain instances & deployment models recommendations by Microsoft
  • Understand cloud solution, CDM & CDS
  • Get more info on Licensing, AppSource & Support for Dynamics 365
  • Use Lifecycle services as a solution architect
  • Know the considerations for blueprinting Dynamics 365 solution
  • Understand the concepts and tools used for data management
  • Explain the Integration options & Business events on solutions
  • Know the available options on solution localization, compliance & reporting
  • Have architectural conversations on extensibility, security, & performance
  • Know what is ALM application lifecycle management
  • Identify opportunities for automated testing and using RSAT

outline
  • Module 1: Introduction
  • Module 2: The Architect Role
  • Module 3: Environment, Instances & Deployment Models
  • Module 4: Cloud Solution, CDM & CDS
  • Module 5: Licensing, AppSource & Support
  • Module 6: Lifecycle services
  • Module 7: Blueprinting Dynamics 365 solutions
  • Module 8: Data Management
  • Module 9: Integration & Business events
  • Module 10: Localization, Compliance & Reporting
  • Module 11: Extensibility
  • Module 12: Security
  • Module 13: Performance
  • Module 14: Application Lifecycle Management
  • Module 15: Automated Testing & RSAT
  • Module 16: Additional Areas for Architects

target_au

The audience for this course should have previous experience with a functional or technical focus in Dynamics 365: Finance and Operations Applications. Primarily for those who are aspired to be and new to solution architect role.


pre_req

You must complete the solution architect learning path for solution architects.


titleCourse AZ-120T00-A: Planning and Administering Microsoft Azure for SAP Workloads
days4
seo_titleCourse AZ-120T00-A Plan & Administer Azure for SAP Workloads
seo_decThe Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course how to leverage Azure resources that include deployment of VMs.
seo_tkeyAzure for SAP Workloads
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course teach IT Professionals experienced in SAP solutions how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. Students of this course will learn through concepts, scenarios, procedures, and hands-on labs on how to best plan and implement migration and operation of an SAP solution on Azure. You will receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution.   See other Microsoft courses
objective

After completing the Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course, students will be able to:

  • Migrate and SAP HANA, S/4HANA, SAP NetWeaver to Azure
  • Leverage Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager
  • Use intersite connectivity features including VNet Peering and VNet-to-VNet connections
  • Work with Azure Active Directory (AAD) and Azure AD Connect

outline

Module 1: Introduction

  • Contains an overview of the SAP and Microsoft partnership.

Module 2: Foundations of SAP on Azure

  • Contains brief lessons on Azure compute, Azure storage, Azure networking, SAP HANA for Azure (Large Instances), identity services, governance and manageability, backup and data protection services, and migration services.

Module 3: SAP Certified Offerings on Azure

  • Contains lessons on general prerequisites (SAP support in public cloud environments), deployment options of Azure for SAP workloads, SAP product-specific support for Azure, operating System support of Azure for SAP workloads, storage support of Azure for SAP workloads, networking support for SAP, database support for SAP, high availability and disaster recovery support for SAP, and monitoring requirements for SAP.
  • Lab: Online Lab: Implementing Linux clustering on Azure VMs
  • Lab: Online Lab: Implementing Windows clustering on Azure VMs

Module 4: SAP on Azure Reference Architecture

  • Contains lessons on SAP NetWeaver with AnyDB, SAP S4 HANA, and SAP HANA on Azure (Large Instances) on Azure VMs.

Module 5: Planning for Implementing SAP Solutions on Azure

  • Contains lessons on Azure VM compute, network, and storage considerations. As well as Azure VM high availability and disaster recovery, Azure VM backup considerations, Azure VM monitoring considerations, Azure VM security considerations, and Azure VM authentication and access control considerations.

Module 6: Planning for Migrating SAP Workloads to Azure

  • Contains lessons on strategies for migrating SAP systems to Microsoft Azure and SAP a workload planning and deployment checklist.

Module 7: Implementing Azure VM-based SAP Solutions

  • Contains lessons on Azure VM deployment methodologies, single-instance implementations (2-tier or 3-tier), implementing HA SAP NetWeaver with AnyDB on Azure VMs, implementing HA SAP HANA on Azure VMs, configure the Azure Enhanced Monitoring Extension for SAP, and implementing AD and Azure AD-based authentication.

Module 8: Module 8-Deploying HANA Large Instances (HLI)

  • Contains a lesson on implementing HANA Large Instances (HLI).

Module 9: Migrating SAP Workloads to Azure

  • Contains lessons on migration options, DMO methodologies, cloud migration options, and Very Large Database Migration to Azure.
  • Lab: Online Lab-Implement SAP architecture on Azure VMs running Linux
  • Lab: Online Lab-Implement SAP architecture on Azure VMs running Windows

Module 10: Maintaining SAP on Azure

  • Contains lessons on, remote management, performing backups and restores, OS and workload updates, vertical and horizontal scaling, and Disaster Recovery (DR).

Module 11: Monitoring and Troubleshooting SAP on Azure

  • Contains lessons on monitoring Azure VMs, monitoring SAP HANA on Azure (Large Instances), and integrating SAP solutions with Microsoft cloud services.

target_au

The Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course are for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle.

They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.


pre_req
  • Administrators and architects of Azure solutions for SAP should possess solid knowledge of SAP Applications, SAP HANA, S/4HANA, SAP NetWeaver, SAP BW, OS  Servers for SAP Applications and Databases.
  • Prior to taking this course, it is recommended that students to have taken the Azure Administrator (AZ-103) or Azure Solutions Architect (AZ-300) training, as well as SAP HANA and Linux training.

titleCourse 55285A: Advanced Python
days2
seo_titleCourse 55285A: Advanced Python Training | Insoft Services
seo_decIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques.
seo_tkeyAdvanced Python
categoryprogramming
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques. This advanced Python course is taught using Python 3; however, differences between Python 2 and Python 3 are noted. For private Python classes, our instructor can focus specifically on Python 2 if desired.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Work with the Collections module.
  • Understand mapping and filtering and lambda functions.
  • Perform advanced sorting.
  • Work with regular expressions in Python.
  • Work with databases, CSV files, JSON, and XML.
  • Write object-oriented code in Python.
  • Test and debug your Python code

outline

Module 1: Advanced Python Concepts

In this lesson, you will learn about some Python functionality and techniques that are commonly used but require a solid foundation in Python to understand.

Lessons

  • Lambda Functions
  • Advanced List Comprehensions
  • Collections Module
  • Mapping and Filtering
  • Mutable and Immutable Built-in Objects
  • Sorting
  • Unpacking Sequences in Function Calls

Lab: Exercises in this Lesson

  • Rolling Five Dice
  • Creating a defaultdict
  • Creating an OrderedDict
  • Creating a Counter
  • Working with a deque
  • Converting list.sort() to sorted(iterable)
  • Converting a String to a DateTime.date Object

After completing this module, students will be able to:

  • Work with lambda functions.
  • Write more advanced list comprehensions.
  • Work with the collections module to create named tuples, defaultdicts, ordereddicts, counters, deque
  • Use mapping and filtering.
  • Sort sequences.
  • Unpack sequences in function calls.
  • Create modules and packages.

 

Module 2: Working with Data

Data is stored in many different places and in many different ways. There are Python modules for all of the most common ways.

Lessons

  • Relational Databases
  • CSV
  • Getting Data from the Web
  • JSON

Lab: Exercises in this Lesson

  • Querying an SQLite Database
  • Inserting File Data into a Database
  • Comparing Data in a CSV File
  • Requests and Beautiful Soup
  • Using JSON to Print Course Data

After completing this module, students will be able to:

  • Access and work with data stored in a relational database.
  • Access and work with data stored in a CSV file.
  • Get data from a web page.
  • Access and work with data stored as HTML and XML.
  • Access an API.
  • Access and work with data stored as JSON.

 

Module 3: Testing and Debugging

This module explains how to test and debug using Python.

Lessons

  • Testing for Performance
  • The unittest Module

Lab: Exercises in this Lesson

  • Fixing Functions

After completing this module, students will be able to:

  • Test performance with timers and using the time it module.
  • To write unit tests using the unittest module.

 

Module 4: Classes and Objects

An object is something that has attributes and/or behaviours, meaning it is certain ways and does certain things. In the real world, everything could be considered an object. Some objects are tangible, like rocks, trees, tennis racquets, and tennis players. And some objects are intangible, like words, colours, tennis swings, and tennis matches.

Lessons

  • Attributes
  • Behaviours
  • Classes vs. Objects
  • Attributes and Methods
  • Private Attributes
  • Properties
  • Documenting Classes
  • Inheritance
  • Static Methods
  • Class Attributes and Methods
  • Abstract Classes and Methods
  • Understanding Decorators

Lab: Exercises in this Lesson

  • Adding a roll() Method to Die
  • Properties
  • Documenting the Die Class
  • Extending to Die, Class
  • Extending the roll() Method

After completing this module, students will be able to:

  • Create classes and objects in Python.
  • Write instance methods, class methods, and static methods.
  • Define properties.
  • Create subclasses using inheritance.
  • Create abstract classes.
  • Appropriately document Python classes.
  • Understand how decorators work.

target_au
pre_req

Experience in the following is required for this Python class:

  • Basic Python programming experience. In particular, you should be very comfortable with:
    1. Working with strings.
    2. Working with lists, tuples and dictionaries.
    3. Loops and conditionals.
    4. Writing your own functions.

Experience in the following would be useful for this Python class:

  • Some exposure to HTML, XML, JSON, and SQL.

titleCourse 55278A: Advanced Microsoft Outlook 2019
days1
seo_titleCourse 55278A: Advanced Microsoft Outlook 2019 Training | Insoft UK
seo_decThe Advanced Microsoft Outlook 2019 (55278A) course teaches how to work with some of the more advanced features of Outlook.
seo_tkeyMicrosoft Outlook 2019
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewThe Advanced Microsoft Outlook 2019 (55278A) training course builds on basic skills in Outlook and teaches students to work with some of the more advanced features of Outlook.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tasks and notes.
  • Learn to work with signatures and themes.
  • Manage your inbox including filtering, creating search folders, and archiving.
  • Work with multiple accounts.

outline

Module 1: Working with Tasks and Notes

This module explains how to work with tasks and notes in Microsoft Outlook.

Lessons

  • Create a Task
  • Print a Task
  • Update a Task
  • Search for Tasks
  • Assign a Task
  • Reply to a Task Request
  • Track Tasks
  • Change Your Task View
  • Work with Notes
  • Lab: Work with Tasks
After completing this module, students will be able to:
  • Change your Task view.
  • Create a task.
  • Print a task.
  • Update a task.
  • Assign a task.
  • Search for tasks.
  • Reply to a task request.
  • Track tasks.
  • Work with notes.

 

Module 2: Using Signature and Themes

This module explains how to use signatures and themes.

Lessons

  • Create a Signature
  • Automatically Add a Signature to Messages
  • Modify a Signature
  • Format Outgoing Messages
  • Create and Apply a Theme
  • Lab: Adding a Theme and Signature to Your Messages
After completing this module, students will be able to:
  • Create a signature.
  • Learn how to automatically add the signature to email messages.
  • Modify a signature.
  • Create and apply a theme

 

Module 3: Managing Your Inbox

This module explains how to manage your inbox in Microsoft Outlook.

Lessons

  • Search for Messages
  • Create Search Folders
  • Sort Messages
  • Add New Local Folders
  • Move Messages between Folders
  • Group Your Mailbox Items
  • Filter Messages
  • Organize Messages
  • Create and Manage Rules
  • Manage Your Junk Email
  • Archive Your Messages
  • Create an Outlook Data File
  • Create a Quick-Step
  • Add Protection to Your Outgoing Messages
  • Create Auto-replies
  • Lab: Managing Your Inbox Exercises
  • Organizing Your Messages
  • Managing Your Mail by Creating a Quick-Step
After completing this module, students will be able to:
  • Search for messages.
  • Create search folders.
  • Group your mailbox items.
  • Filter messages.
  • Organize messages.
  • Manage your junk mail.
  • Archive your messages.
  • Create an Outlook data file.
  • Create a Quick Step to easily and quickly apply multiple actions to emails.
  • Add protection to outgoing emails.

 

Module 4: Working with Multiple Email Accounts

This module explains how to work with multiple email accounts in Microsoft Outlook.

Lessons

  • Setting Up Multiple Accounts in Outlook
  • Send Emails from Different Accounts
  • POP vs. IMAP Email Programs
  • Lab: Working with Multiple Email Accounts
After completing this module, students will be able to:
  • Set up multiple accounts in Outlook.
  • Send emails from different accounts.
  • Learn the differences between POP and IMAP email programs.

target_au

This course is intended for students who have basic skills with Microsoft Outlook 2019 who want to learn higher level skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Experience in the following is required for this Microsoft Outlook class:
  • Familiarity with Windows.
  • Introductory level knowledge of Outlook.

titleCourse 55274A: Advanced Microsoft Word 2019
days1
seo_titleCourse 55274A: Advanced Microsoft Word 2019 | Insoft Services
seo_decIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents and footnotes.
seo_tkeyAdvanced Microsoft Word 2019
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents, footnotes, and endnotes, adding comments, tracking changes, comparing and combining documents, creating envelopes and labels, using Mail Merge, and protecting documents. This class is for Word 2019 on Windows.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tables of contents.
  • Learn to work with footnotes and endnotes.
  • Learn to insert bibliographies and indexes.
  • Learn to use comments.
  • Learn to use track changes including accepting and rejecting changes.
  • Learn to compare and combine documents.
  • Learn to use Mail Merge and create envelopes and labels.
  • Learn to protect documents.
  • Learn to use bookmarks, add watermarks, and customize the Ribbon.

outline

Module 1: Working with Long Documents

This module explains how to work with long documents in Microsoft Word.

Lessons

  • Adding a Table of Contents
  • Updating the Table of Contents
  • Deleting the Table of Contents
  • Footnotes and Endnotes
  • Inserting citations and a Bibliography
  • Adding an Index
  • Inserting a Table of Figures
  • Inserting and Updating a Table of Authorities
  • Creating an Outline
  • Lab: Working with Long Documents Exercises
  • Insert and Update a Table of Contents
  • Working with Footnotes
  • Insert Citations and a Bibliography
After completing this module, students will be able to:
  • Add a table of contents to a Microsoft Word document.
  • Update the table of contents.
  • Add footnotes to a Microsoft Word document.
  • Add endnotes to a Microsoft Word document.
  • Insert citations into a Microsoft Word document.
  • Insert a bibliography.
  • Update the bibliography.
  • Mark entries in a document.
  • Insert an index into a Microsoft Word document.
  • Create an outline in Word.

 

Module 2: Review and Collaborating on Documents

This module explains how to review and collaborate on Microsoft Word documents.

Lessons

  • Adding Comments
  • Tracking Changes
  • Viewing Changes, Additions, and Comments
  • Accepting and Rejecting Changes
  • Lab: Reviewing and Collaborating Exercises
  • Adding Comments to a Document
  • Tracking Changes
  • Viewing Markup
  • Accepting and Rejecting Changes
After completing this module, students will be able to:
  • Add and work with comments.
  • Track changes and set and change tracking options.
  • View changes, additions and comments.
  • Use the Reviewing pane.
  • Choose what changes to show.
  • Accept and reject changes.

 

Module 3: Comparing and Combining Documents

This module explains how to compare and combine documents in Microsoft Word.

Lessons

  • Comparing Documents
  • Combining Documents
  • Lab: Comparing and Combining Documents Exercises
  • Comparing Documents
  • Combining Documents
After completing this module, students will be able to:
  • Compare documents to find out what has changed between different versions of a document.
  • Combine documents to gather revisions made by various individuals into a single document.

 

Module 4: Managing Mailings

This module explains how to manage mailings in Microsoft Word.

Lessons

  • Creating Envelopes and Labels
  • Using Mail Merge
  • Lab: Managing Mailings Exercises
  • Printing an Envelope
  • Using Mail Merge
After completing this module, students will be able to:
  • Create and print envelopes in Microsoft Word.
  • Create and print labels in Microsoft Word.
  • Use Mail Merge to print or email form letters to multiple recipients.
  • Select mail Merge recipients from an existing list

 

Module 5: Protecting Documents

This module explains how to protect documents in Microsoft Word.

Lessons

  • Making Word Documents Read Only
  • Password Protect Word Documents
  • Removing Metadata from Files
  • Restrict Formatting and Editing
  • Lab: Protecting a Document
After completing this module, students will be able to:
  • Mark documents as final and makes them read-only.
  • Password protect Microsoft Word documents.
  • Restrict formatting options before sharing a document with others.
  • Restrict editing options before sharing a document with others

 

Module 6: Random Useful Items

This module goes over several random and useful features in Microsoft Word.

Lessons

  • Using Bookmarks
  • Adding Watermarks
  • Adding Titles to Sections
  • Inserting Built-in Fields
  • Using the Go To Feature
  • Using Macros
  • Copy Macros From Document to Document
  • Macro Security
  • Recording a Macro
  • Assigning Shortcut Keys
  • Customizing the Ribbon
  • Preparing a Document for Internationalization and Accessibility
  • Sharing
  • Lab: Random Useful Items Exercises
  • Using Bookmarks
  • Adding Custom Watermarks
  • Recording a Macro
  • Customizing the Ribbon
  • Using the Cloud
After completing this module, students will be able to:
  • Add bookmarks to a Microsoft Word document and to use them to jump around the document.
  • Add watermarks to a Microsoft Word document.
  • Add titles to sections.
  • Insert built-in fields.
  • Use the Go-To feature.
  • Customize the ribbon.
  • Prepare a document for internationalization and accessibility.
  • Learn how to use the Cloud.

target_au

This course is intended for students who have intermediate skills with Microsoft Word 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req

Intermediate-level experience in Microsoft Word.


titleCourse 55270A: Advanced Microsoft Excel 2019
days1
seo_titleCourse 55270A: Advanced Microsoft Excel 2019 | Insoft Services
seo_decIn this Advanced Microsoft Excel 2019 (55270A) training class you will gain skills to use pivot tables, audit and analyze worksheet data and manage macros.
seo_tkeyAdvanced Microsoft Excel 2019
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewThis Advanced Microsoft Excel 2019 (55270A) training class is designed for students to gain the skills necessary to use pivot tables, audit and analyze worksheet data, utilize data tools, collaborate with others, and create and manage macros.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Create pivot tables and charts.
  • Learn to trace precedents and dependents.
  • Convert text and validate and consolidate data.
  • Collaborate with others by protecting worksheets and workbooks.
  • Create, use, edit, and manage macros.
  • Import and export data.

outline

Module 1: Using Pivot Tables

This module explains how to use pivot tables in Microsoft Excel.

Lessons

  • Creating Pivot Tables
  • More PivotTable Functionality
  • Inserting Slicers
  • Multi-Select Option in Slicers
  • PivotTable Enhancements
  • Working with Pivot Tables
  • Inserting Pivot Charts
  • More Pivot Table Functionality
  • Working with Pivot Tables
  • Lab: Working with Pivot Tables
After completing this module, students will be able to:
  • Use pivot tables to analyze data.
  • Edit pivot tables.
  • Format pivot tables.
  • Insert pivot charts.
  • Use Slicers.

 

Module 2: Auditing Worksheets

This module explains how to audit worksheets.

Lessons

  • Tracing Precedents
  • Tracing Dependents
  • Showing Formulas
  • Lab: Auditing Worksheets Exercises
  • Tracing Precedents
  • Tracing Dependents
After completing this module, students will be able to:
  • Audit formulas.
  • Trace precedents to determine which cells impact a specific cell.
  • Trace dependents to determine which cells are impacted by a specific cell.
  • Remove precedent and dependent arrows.
  • Show formulas.
  • Check for errors frequently found in formulas

 

Module 3: Data Tools

This module explains how to work with data tools.

Lessons

  • Converting Text to Columns
  • Linking to External Data
  • Controlling Calculation Options
  • Data Validation
  • Using Data Validation
  • Consolidating Data
  • Goal Seek
  • Using Goal Seek
  • Lab: Data Tools Exercises
  • Converting Text to Columns
  • Using Data Validation
  • Consolidating Data
  • Using Goal Seek
After completing this module, students will be able to:
  • Convert text to columns.
  • Use Data Validation to restrict the type of data that can be entered into a cell.
  • Consolidate data from a number of different ranges into one new range.
  • Use Goal Seek to figure out the value to input to obtain a specific result

 

Module 4: Working with Others

This module explains how to work with others in Microsoft Excel.

Lessons

  • Protecting Worksheets and Workbooks
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
  • Marking a Workbook as Final
  • Lab: Working with Others Exercises
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
After completing this module, students will be able to:
  • Password protect a workbook.
  • Password protect a worksheet.
  • Password protect ranges in a worksheet.
  • Track changes.
  • Accept and reject changes.
  • List all changes on a new sheet

 

Module 5: Recording and Using Macros

This module explains how to record and use macros.

Lessons

  • Recording Macros
  • Recording a Macro
  • Running Macros
  • Editing Macros
  • Adding Macros to the Quick Access Toolbar
  • Adding a Macro to the Quick Access Toolbar
  • Lab: Recording and Using Macros Exercises
  • Recording a Macro
  • Adding a Macro to the Quick Access Toolbar
After completing this module, students will be able to:
  • Record macros.
  • Run macros.
  • Edit macros (kind of).
  • Add macros to the Quick Access Toolbar

 

Module 6: Random Useful Items

This module explains how to use sparklines and other useful random features.

Lessons

  • Sparklines
  • Inserting and Customizing Sparklines
  • Using Microsoft Translator
  • Preparing a Workbook for Internationalization and Accessibility
  • Importing and Exporting Files
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
  • Lab: Random Useful Items Exercises
  • Inserting and Customizing Sparklines
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
After completing this module, students will be able to:
  • Insert sparklines into worksheets.
  • Customize sparklines by:
  • Change the type of sparkline.
  • Highlight key points.
  • Change colours.
  • Change the axis.
  • Prepare a workbook for internationalization, accessibility, and compatibility.
  • Import text files into Microsoft Excel.
  • Copy cells from a worksheet into Microsoft Word.
  • Copy and paste a chart into Microsoft Word.

 

Module 7: Cloud

This module explains how to save, share, and collaborate with others using the cloud.

Lessons

  • Using the Cloud.
  • Lab: Using the Cloud
After completing this module, students will be able to:
  • Use Excel in the Cloud.

target_au

Students who have intermediate skills with Microsoft Excel 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Before attending this course, students must have:
  • Basic and Intermediate Excel experience.

titleCourse 40573G: Microsoft Cloud Workshop: Hybrid Identity
days1
seo_titleCourse 40573G: Microsoft Cloud Workshop: Hybrid Identity | Insoft UK
seo_decIn the Microsoft Cloud Workshop: Hybrid identity (40573G) workshop, you will learn to set up a hybrid identity solution that integrates with Azure.
seo_tkeyHybrid Identity
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud Workshop: Hybrid identity (40573G) workshop, you will learn to set up and configure a hybrid identity solution that integrates an existing on-premises identity solution with Azure. You will learn how to secure the virtual network by deploying a network virtual appliance and configure firewall rules and route tables. Additionally, you will set up access to the virtual network with a jump box and a site-to-site VPN connection.  
objective

At the end of this workshop, you will be better able:

  • Design virtual networks in Azure with multiple subnets to filter and control network traffic.
  • Create a virtual network and provision subnets.
  • Create route tables with required routes.
  • Build a management jump box.
  • Configure firewalls to control traffic flow.
  • Configure site-to-site connectivity.

outline

Module 1: Whiteboard Design Session – Hybrid identity

In this workshop, you will learn to set up and configure a hybrid identity solution that integrates an existing on-premises identity solution with Azure. You will learn how to secure the virtual network by deploying a network virtual appliance and configure firewall rules and route tables. Additionally, you will set up access to the virtual network with a jump box and a site-to-site VPN connection.

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

 

Module 2: Hands-On Lab – Hybrid identity

In this hands-on lab you will setup and configure a number of different hybrid identity scenarios. The scenarios involve an Active Directory single-domain forest named contoso.local, which in this lab environment, consists (for simplicity reasons) of a single domain controller named DC1 and a single domain member server named APP1. The intention is to explore Azure AD-related capabilities that allow you to integrate Active Directory with Azure Active Directory, optimize hybrid authentication and authorization, and provide secure access to on-premises resources from Internet for both organizational users and users who are members of partner organizations.

Lessons

  • Integrate an Active Directory forest with an Azure Active Directory tenant.
  • Manage Authentication, Authorization, and Access Control in Hybrid Scenarios.
  • Configure application access in hybrid scenarios.

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas. Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


pre_req

Workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop.


titleCourse 40565G: Microsoft Cloud Workshop: Modernizing Data Analytics with SQL Server 2019
days1
seo_titleModernizing Data Analytics with SQL Server 2019 Workshop | Microsoft
seo_decIn this Microsoft Data Analytics with SQL Server 2019 (Course 40565G) workshop, you will gain a better understanding of the features of SQL Server 2019.
seo_tkeySQL Server Workshop
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud: Modernizing Data Analytics with SQL Server 2019 Workshop (Course 40565G), you will gain a better understanding of the features of SQL Server 2019 enables more Big Data and analytics capabilities through the use of Big Data Clusters, data virtualization and orchestration, query processing enhancements, and through better scalability through distributed storage and compute.   See other Microsoft courses
objective

At the end of this SQL Server Workshop, you will be better able:

  • Design a modernization plan for performing Big Data analytics using SQL Server 2019 capabilities
  • Build solutions for conducting advanced data analytics with scalable SQLServer2019 Big Data clustersSQL Server Workshop

outline

Module 1: Whiteboard Design Session – Modernizing Data Analytics with SQL Server 2019

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-On Lab – Modernizing Data Analytics with SQL Server 2019

Lessons

  • Using data virtualization
  • Using notebooks
  • Machine learning
  • Identify PII and GDPR-related compliance issues using Data Discovery & Classification in SSMS
  • Exploring intelligent query processing (QP) features
  • Monitoring the big data cluster

target_au

This SQL Server Workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this SQL Server Workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40564G: Microsoft Cloud Workshop: Securing the IoT End-to-End
days1
seo_titleSecuring the IoT End-to-End - Microsoft Cloud Workshop | Insoft Services
seo_decIn this Microsoft Cloud Workshop: Securing the IoT End-to-End (Course 40564G) workshop, you will look at the process for designing a secure IoT solution.
seo_tkeySecuring the IoT
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Securing the IoT End-to-End (Course 40564G) workshop, you will look at the process for designing and implementing an oil and gas manufacturing IoT solution that is secured end-to-end following best practices. At the end of this workshop, you will be better able to architect a comprehensive and secure oil and gas manufacturing IoT solution.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Architect a comprehensive and secure oil and gas manufacturing IoT solution.

outline

Module 1: Whiteboard Design Session – Securing the IoT end to end

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Securing the IoT end to end

Lessons

  • Secure and configure IoT Hub and Device Provisioning Service
  • Enroll and provision IoT devices
  • Install and configure IoT Edge
  • Install Azure Security IoT Agent
  • Simulate IoT attacks
  • Configure security and alerts

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas. Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


pre_req
titleCourse 40563G: Microsoft Cloud Workshop: Real-time data with Azure Database for PostgreSQL Hyperscale
days1
seo_titleReal-time data with Azure Database for PostgreSQL Hyperscale | Insoft UK
seo_decIn this workshop Real-time data with Azure Database for PostgreSQL Hyperscale, you will learn advanced features of the PostgreSQL PaaS service on Azure.
seo_tkeyAzure Database for PostgreSQL Hyperscale
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud Workshop: Real-time data with Azure Database for PostgreSQL Hyperscale (Course 40563G) workshop, you will learn how to use advanced features of the managed PostgreSQL PaaS service on Azure to make your database more scalable and able to handle the rapid ingest of streaming data while simultaneously generating and serving pre-aggregated data for reports. You will design a resilient stream processing pipeline to ingest, process, and save real-time data to Postgres. Next, you will learn how to explore and gain insights from flat files at scale, perform aggregates, and save valuable information to your database. Finally, you will create complex reports containing advanced visualizations, using a drag-and-drop interface, and use them to build a customizable dashboard that gets updated in real-time.   See other Microsoft courses
objective

At the end of this workshop, you will be better able to:

  • Implement a highly scalable, managed open source database solution.
  • Ensure that it can handle real-time, roll-up and serve data for advanced visualizations.

outline

Module 1: Whiteboard Design Session – Real-time data with Azure Database for PostgreSQL Hyperscale

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Real-time data with Azure Database for PostgreSQL Hyperscale

Lessons

  • Connect to and set up your database
  • Add secrets to Key Vault and configure Azure Databricks
  • Send clickstream data to Kafka and process it in real-time
  • Rollup real-time data in PostgreSQL
  • Create advanced visualizations in Power BI

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40561G: Microsoft Cloud Workshop: Machine Learning
days1
seo_titleMicrosoft Cloud Workshop: Machine Learning | Insoft Services
seo_decIn this Microsoft Machine Learning Workshop, you will design and implement a solution that combines Azure Databricks with Azure Machine Learning.
seo_tkeyMicrosoft Machine Learning
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Machine Learning (Course 40561G), you will work with a group to design and implement a solution that combines Azure Databricks with Azure Machine Learning service to build, train and deploy the machine learning and deep learning models. You will learn how to use automated machine learning, model lifecycle management from training to deployment, in batch and real-time inferencing scenarios, and construct deep learning models for Natural Language Processing (NLP) in text classification and forecasting against time-series data. Finally, you’ll learn to compare data with PyTorch and Keras for deep learning.   See other Microsoft courses
objective

After completing this course, students will understand:

  • The capabilities and implementation solutions of Azure Machine Learning and Azure Databricks.

outline

Module 1: Whiteboard Design Session – Machine Learning

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on lab – Machine Learning

Lessons

  • Creating a forecast model using automated machine learning
  • Understanding the automated ML generated forecast model using model explainability
  • Creating a deep learning model (RNN) for time series data and registering the model
  • Using a forecast model for scoring of streaming telemetry
  • Creating a deep learning text classification model

target_au

This Microsoft Machine Learning workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40560G: Microsoft Cloud Workshop: Predictive Maintenance for remote field devices
days1
seo_titlePredictive Maintenance for remote field devices - Microsoft Workshop
seo_decIn this Predictive Maintenance for remote field devices workshop, you will learn how to evaluate Microsoft's catalogue of PaaS and SaaS-based IoT products.
seo_tkeyPredictive Maintenance for remote devices
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Predictive Maintenance for remote field devices (Course 40560G), you will learn how to evaluate Microsoft's catalogue of PaaS and SaaS-based IoT products to determine the optimal combination of tools to fulfil Fabrikam's needs. You will design and implement a solution that simplifies IoT device management and reporting, providing Fabrikam with a faster path to realizing their IoT strategy without requiring a lot of custom development. Next, you will learn how to deploy a trained predictive maintenance Machine Learning model and design a stream processing pipeline that makes predictions with the model in near real-time. At the end of this pipeline is an alert that is sent to the oil pump maintenance team when a pump failure is imminent.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Design an IoT-based predictive maintenance solution in Azure.

outline

Module 1: Whiteboard Design Session – Predictive Maintenance for remote field devices

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Predictive Maintenance for remote field devices

Lessons

  • Configuring IoT Central with devices and metadata
  • Run the Rod Pump Simulator
  • Creating a device set
  • Creating a useful dashboard
  • Create an Event Hub and continuously export data from IoT Central
  • Use Azure Databricks and Azure Machine Learning service to train and deploy a predictive model
  • Create an Azure Function to predict pump failure

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure. Workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop.


titleCourse 40559G: Microsoft Cloud Workshop: MLOps
days1
seo_titleMicrosoft Cloud Workshop: MLOps Training | Insoft Services
seo_decIn this Microsoft Cloud Workshop: MLOps (Course 40559G) workshop, you will learn how Trey Research can leverage Deep Learning technologies.
seo_tkeyMLOps
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: MLOps (Course 40559G) workshop, you will learn how Trey Research can leverage Deep Learning technologies to scan through their vehicle specification documents to find compliance issues with new regulations and manage the classification through their web application. The entire process from model creation, application packaging, model deployment and application deployment needs to occur as one unified repeatable, pipeline. At the end of this workshop, you will be better able to design and implement end-to-end solutions that fully operationalize deep learning models, inclusive of all application components that depend on the model.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Design and implement end-to-end solutions that fully operationalize deep learning models.

outline

Module 1: Whiteboard Design Session – MLOps

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on lab – MLOps

Lessons

  • Creating and evaluating compliance classification models
  • Registering the model
  • Setup New Project in Azure DevOps
  • Setup and Run the Build Pipeline
  • Setup the Release Pipeline
  • Test Build and Release Pipelines
  • Testing the deployed solution
  • Examining deployed model performance

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40526G: Microsoft Cloud Workshop: SAP HANA on Azure
days1
seo_titleSAP HANA on Azure Training - Microsoft Cloud Workshop | Insoft Services
seo_decIn this Microsoft Cloud Workshop: SAP HANA on Azure (Course 40526G) training, you will learn how to provision a highly available deployment of SAP HANA.
seo_tkeySAP HANA on Azure Training
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop (Course 40526G): SAP HANA on Azure Training, you will learn how to provision a highly available deployment of SAP HANA in Azure. Throughout the whiteboard design session and the hands-on lab, you will look at the planning process for SAP HANA migration and deployment. You will identify and implement Azure infrastructure components necessary to support a clustered deployment of SAP HANA. You will also step through installing SAP HANA and configuring SAP HANA system replication. Finally, you will review and test different scenarios that involve manual and automatic failover between cluster nodes.   See other Microsoft courses  
objective

At the end of this SAP HANA on Azure training workshop, you will be able to better design and deploy SAP HANA on Azure. After its completion, you will be able to provision Azure infrastructure components necessary to support highly available SAP HANA deployments, configure Azure virtual machines to support highly available SAP HANA installations, implement SUSE Linux Enterprise clustering, install SAP HANA, configure SAP HANA system replication, and test high availability scenarios.


outline

Module 1: Whiteboard Design Session – SAP HANA on Azure

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-On Lab – SAP HANA on Azure

Lessons

  • Provision Azure infrastructure
  • Configure operating system on Azure VMs running Linux
  • Configure clustering on Azure VMs running Linux
  • Install SAP HANA
  • Configure SAP HANA replication
  • Configure cluster framework
  • Test the deployment

target_au

This SAP HANA on Azure training workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40519G: Microsoft Cloud Workshop: SAP NetWeaver on Azure
days1
seo_titleSAP NetWeaver on Azure Training - Microsoft Cloud Workshop | Insoft UK
seo_decIn this Microsoft Cloud Workshop, you will learn to deploy and configure SAP on Azure infrastructure and SAP NetWeaver deployment running on Azure.
seo_tkeySAP NetWeaver on Azure Training
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop (Course 40519G): SAP NetWeaver on Azure training, you will learn to deploy and configure SAP on Azure infrastructure and SAP NetWeaver deployment running on Azure infrastructure, including SAP NetWeaver ASCS and SAP NetWeaver database servers. Key takeaways are the Azure infrastructure solution components and the way they are put together to run SAP applications as well as the Solution architecture references.   See other Microsoft courses
objective

At the end of this SAP NetWeaver on Azure training workshop, you will be better able to design and deploy SAP running on Azure infrastructure as a service component and understand the proper configuration of SAP NetWeaver ASCS, database and application servers in Azure.


outline

Module 1: Whiteboard Design Session – SAP on AzureLessons

Review the customer case study
Call to action: Design a proof of concept solution
Call to action: Present the solution

Module 2: Hackathon – SAP on AzureLessons

Deploy the SAP on Azure infrastructure components
Configure the SAP NetWeaver ASCS servers (Part 1)
Configure SAP NetWeaver database servers
Configure SAP NetWeaver Application servers


target_au
pre_req

This SAP NetWeaver on Azure training workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop:


titleCourse 20345-2B: Designing and Deploying Microsoft Exchange Server 2016/2019
days5
seo_titleDesigning and Deploying Microsoft Exchange Server 2016/2019
seo_decThis Designing and Deploying Microsoft Exchange Server 2016/2019 course provides the skills to implement an Exchange Server messaging environment.
seo_tkeyMicrosoft Exchange Server
categoryexchange-server
vendorMicrosoft

techonogyInternet of Technology
overviewThis Designing and Deploying Microsoft Exchange Server 2016/2019 (20345-2B) course provides experienced Exchange Server administrators with the knowledge to design and implement an Exchange Server messaging environment. The course covers how to design and configure advanced components in an Exchange Server deployment such as site resiliency, advanced security, compliance, archiving and discovery solutions, coexistence with other Exchange organizations or Exchange Online, and migration from previous versions of Exchange server. The course also provides guidelines, best practices, and considerations that will help optimize Exchange Server deployments.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Plan for Exchange Server deployments.
  • Plan and deploy Exchange Server hardware, virtualization, mailbox databases, and public folders.
  • Plan message transport in Exchange Server.
  • Plan and deploy Client Access services in Exchange Server.
  • Design and implement a highly available Exchange Server environment.
  • Maintain Exchange Server by using Managed Availability and Desired State Configuration (DSC).
  • Plan for messaging security and design and implement Active Directory Rights Management Services (AD RMS) and Microsoft Azure RMS in Exchange Server.
  • Design and implement message retention and archiving.
  • Design and implement data loss prevention policies, In-Place Hold, and eDiscovery.
  • Design and implement messaging coexistence among Exchange Server organizations.
  • Plan and implement the upgrade from previous versions of Exchange Server to Exchange Server 2019.
  • Plan a hybrid Exchange deployment.

outline

Module 1: Planning Exchange Server deployments

This module explains the key features of Exchange Server and explains how to gather business requirements. It also explains how to plan for an Exchange Server deployment and the migration of Unified Messaging to Cloud Voicemail.

Lessons

  • New features in Exchange Server 2019
  • Gathering business requirements for an Exchange Server deployment
  • Planning for an Exchange Server deployment
  • Planning the migration of Unified Messaging to Cloud Voicemail

Lab: Planning Exchange Server 2019 deployments

  • Evaluating an existing messaging infrastructure
  • Identifying requirements
  • Discussion: Deployment design for Exchange Server 2019

After completing this module, students will be able to:

  • Describe the new features in Exchange Server 2019.
  • Describe how to gather business requirements for an Exchange Server deployment.
  • Plan an Exchange Server deployment.
  • Plan how to migrate Exchange Server 2016 Unified Messaging (UM) to Cloud Voicemail.

 

Module 2: Planning and deploying Exchange Server Mailbox services

This module explains how to plan and implement Exchange Server hardware, Exchange Server virtualization, Azure integration, and public folders.

Lessons

  • Planning Exchange Server hardware requirements
  • Planning Exchange Server for virtualization and Microsoft Azure integration
  • Planning and implementing public folders

Lab: Planning and implementing Exchange Server mailbox servers, databases, and public folders

  • Planning mailbox server configuration and location
  • Planning for mailbox databases
  • Implementing mailbox databases
  • Planning and implementing public folders

After completing this module, students will be able to:

  • Plan and implement Exchange Server hardware.
  • Plan for Exchange Server virtualization and Microsoft Azure integration.
  • Plan and implement public folders.

 

Module 3: Planning message transport

This module explains how to plan and implement mail routing internally as well as from and to the internet. This module also describes transport-related tasks in the organization.

Lessons

  • Designing message routing
  • Designing transport services
  • Designing the message-routing perimeter
  • Designing transport compliance

Lab: Planning message transport

  • Planning for a redundant and secure message transport
  • Planning for transport compliance
  • Implementing transport compliance

After completing this module, students will be able to:

  • Design message routing.
  • Design transport services.
  • Design external message routing.
  • Design and implement transport compliance.

 

Module 4: Planning and deploying client access

This module explains how to plan and implement Exchange Server clients, client access, Microsoft Office Online Server, and coexistence of Microsoft SharePoint with Exchange Server. It also explains the design and implementation of the external client access.

Lessons

  • Planning for Exchange Server clients
  • Planning for client access
  • Planning and implementing Office Online Server
  • Planning and implementing coexistence of SharePoint 2019 with Exchange Server 2019
  • Designing external client access

Lab: Planning and deploying client access solutions

  • Planning and configuring namespaces
  • Planning and configuring client access services options
  • Planning and deploying Office Online Server
  • Planning and implementing a reverse proxy

After completing this module, students will be able to:

  • Plan for Exchange Server clients.
  • Plan for client access.
  • Plan and implement Office Online Server.
  • Plan and implement SharePoint and with Exchange Server coexistence.
  • Design external client access.

 

Module 5: Designing and implementing high availability

This module explains how to plan and implement high availability for Exchange Server. It also explains how to plan for load balancing. Finally, it explains how to plan and implement site resilience.

Lessons

  • Planning high availability for Exchange Server
  • Planning for load balancing
  • Planning for site resilience

Lab: Designing and implementing high availability

  • Planning high availability and site resilience
  • Creating a site-resilient DAG
  • Validating site resilience
  • Creating a lagged database copy
  • Recovering data from a lagged database copy

After completing this module, students will be able to:

  • Plan high availability for an Exchange Server.
  • Plan for load balancing in an Exchange Server deployment.
  • Plan for site resilience in an Exchange Server deployment.

 

Module 6: Maintaining Exchange Server

This module explains how to maintain Exchange Server by using Managed Availability and DSC.

Lessons

  • Using Managed Availability to improve high availability
  • Implementing DSC

Lab: Maintaining Exchange Server

  • Using Windows PowerShell to investigate and configure Managed Availability
  • Implementing DSC

After completing this module, students will be able to:

  • Use Managed Availability to improve high availability.
  • Implement DSC.

 

Module 7: Designing messaging security

This module explains how to plan for messaging security, and how to design and implement AD RMS and Azure RMS in an Exchange Server organization.

Lessons

  • Planning messaging security
  • Designing and implementing AD RMS and Azure RMS

Lab: Designing messaging security

  • Planning messaging security
  • Implementing AD RMS
  • Integrating AD RMS with Exchange Server
  • Creating a message transport rule to protect email

After completing this module, students will be able to:

  • Plan messaging security.
  • Design and implement AD RMS and Azure RMS.

 

Module 8: Designing and implementing message retention and archiving

This module explains the purpose of archiving and messaging records management. It also explains how to design and implement In-Place archiving and message retention.

Lessons

  • Overview of archiving and messaging records management
  • Designing In-Place Archiving
  • Designing and implementing message retention

Lab: Designing and implementing message retention and archiving

  • Designing message retention and archiving
  • Implementing message retention and archiving

After completing this module, students will be able to:

  • Explain the purpose of archiving and messaging records management.
  • Design and implement In-Place archiving.
  • Design and implement message retention.

 

Module 9: Designing and implementing messaging compliance

This module explains how to design and implement data loss prevention policies, In-Place Hold, and In-Place eDiscovery.

Lessons

  • Designing and implementing data loss prevention policies
  • Designing and implementing In-Place Hold
  • Designing and implementing In-Place eDiscovery

Lab: Designing and implementing messaging compliance

  • Designing messaging compliance
  • Implementing data loss prevention
  • Implementing In-Place eDiscovery
  • Comparing messaging policy and compliance options

After completing this module, students will be able to:

  • Design and implement data loss prevention.
  • Design and implement In-Place Hold.
  • Design and implement In-Place eDiscovery.

 

Module 10: Designing and implementing messaging coexistence

This module explains how to design and implement federation. It also explains how to design coexistence between Exchange Server organizations. Finally, it explains how to design and implement cross-forest mailbox moves.

Lessons

  • Designing and implementing federation
  • Designing coexistence between Exchange organizations
  • Designing and implementing cross-forest mailbox moves

Lab: Implementing messaging coexistence

  • Implementing message-routing coexistence
  • Migrating user mailboxes

After completing this module, students will be able to:

  • Design and implement federation.
  • Design the coexistence between Exchange Server organizations.
  • Design and implement cross-forest mailbox moves.

 

Module 11: Upgrading to Exchange Server 2019

This module provides an overview of the options you have when choosing to implement Exchange Server 2019, and provides details on how to upgrade an existing Exchange Server 2013 or Exchange Server 2016 organization to Exchange Server 2019.

Lessons

  • Planning an upgrade from previous Exchange Server versions
  • Implementing the upgrade from previous Exchange Server versions

Lab: Upgrading from Exchange Server 2013 to Exchange Server 2019

  • Documenting the Exchange Server 2013 organization
  • Deploying Exchange Server 2019
  • Upgrading from Exchange Server 2013 to Exchange Server 2019
  • Removing Exchange Server 2013

After completing this module, students will be able to:

  • Plan an upgrade to Exchange Server 2019.
  • Implement the upgrade to Exchange Server 2019.

 

Module 12: Planning a hybrid Exchange Server deployment

This module explains the basics of a hybrid deployment and how to plan for authentication in a hybrid deployment. It also explains how to implement the Microsoft Azure Active Directory (Azure AD) Connect, a hybrid development, and advanced functionality for hybrid deployments.

Lessons

  • Basics of a hybrid deployment
  • Planning and implementing a hybrid deployment
  • Implementing Azure AD Connect
  • Implementing a hybrid deployment
  • Implementing advanced functionality for hybrid deployments

Lab: Planning a hybrid Exchange deployment

  • Creating a plan for hybrid Exchange deployment

After completing this module, students will be able to:

  • Explain the basics of a hybrid deployment.
  • Plan for authentication in a hybrid environment.
  • Implement Azure AD Connect.
  • Implement a hybrid deployment.
  • Implement advanced functionality for hybrid deployments.

target_au

The audience for this course includes IT professionals who are experienced messaging administrators, messaging architects, or consultants. This course is designed for people in an enterprise environment who are responsible for designing and deploying Exchange Server solutions, including environments that contain previous versions of Exchange Server or Exchange Online.


pre_req
Students taking this course are expected to have experience with Exchange Server 2019 or previous versions of Exchange Server.
In addition to their professional experience, students who attend this Designing and Deploying Microsoft Exchange Server 2016/2019 training should already have the following technical knowledge:
  • Attended course 20345-1B: Administering Microsoft Exchange Server 2016/2019 or have equivalent knowledge
  • Minimum of two years of experience working with any version of Exchange Server
  • Minimum of six months of experience working with Exchange Server 2013 or Exchange Server 2016
  • Minimum of two years of experience administering the Windows Server operating system, including Windows Server 2016 or Windows Server 2019
  • Minimum of two years of experience working with Active Directory Domain Services (AD DS)
  • Minimum of two years of experience working with name resolution, including Domain Name System (DNS)
  • Experience working with certificates, including public key infrastructure (PKI) certificates
  • Experience working with Windows PowerShell

titleCourse WS-050T00-A: Migrating Application Workloads to Azure
days2
seo_titleMigrating Application Workloads to Azure | Insoft Services
seo_decThe Migrating Application Workloads to Azure workshop teaches you how to migrate existing on-premises workloads and assets to the cloud.
seo_tkeyMigrating Application Workloads to Azure
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Migrating Application Workloads to Azure workshop teaches IT Professionals how to migrate existing on-premises workloads and assets to the cloud, specifically to the Microsoft Azure platform. Students learn how to assess and evaluate an existing on-premises environment in preparation for cloud migration. Students also learn how to monitor and optimize their Azure-based workloads to maximize return on investment (ROI), and use Azure services to protect and manage your virtual machines, applications, and data.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Identify the tools and services specific to each phase of the migration.
  • Identify the tools and services specific to each phase of the migration
  • Discover and assess on-premises workloads for migration to Azure
  • Obtain deeper profiling of an environment using app dependency mapping and assessment customizations
  • Perform an end-to-end migration of on-premises workloads to Azure using Azure Migrate
  • Replicate data from an on-premises datacenter to Azure or to a secondary site
  • Migrate data from existing data sources to Azure data platforms using the Database Migration Service
  • Secure and manage migrated workloads using Azure Security Center, Azure Backup, and Log Analytics
  • Ensure an effective business continuity strategy that includes high availability, disaster recovery
  • Back up and protect Azure IaaS virtual machines from any location using the Azure Backup Service
  • Define a recovery plan to ensure virtual machines failover properly before running a full failover

outline

Module 1: Planning and Assessing and Azure Migration
In this module, you’ll learn about the key business and technical drivers leading to cloud migration, the phases of an Azure migration and tools and services used for each phase. You will learn how to discover and assess your on-premises environments in preparation to migrate the appropriate workloads to Azure.

Lessons

  • Cloud Migration – Business Motivations, Goals and Outcomes
  • Discovery and Assessment

Lab: Discover and Assess On-Premises Resources for Migration

 

Module 2: Introduction to Data Migration

In this module, you’ll learn about solutions you can use when you need to securely send terabytes of data to Azure. You will learn about the Azure Data Box family of products with both online and offline transfer options. You will then learn about migrating an on-premises SQL Server 2008R2 database to Azure SQL Database Managed Instance (MI), using the Azure Database Migration Service (DMS).

Lessons

  • Azure Data Box
  • Database Migration

Lab: Migrate On-Premises SQL Server Database to Azure SQL Managed Instance

 

Module 3: Implementing Migration using Azure Migrate Services

In this module, you’ll learn how to prepare the on-premises infrastructure and the Azure components ahead of the planned migration. You’ll also learn how to perform and end to end migration using Azure Migrate Services.

Lessons

  • Overview of Azure Migrate Server Migration
  • VMware – Agentless Migration
  • VMware – Agent-based Migration
  • Securing Migrated Workloads
  • Datacenter Migration using Microsoft Migration Factory

Lab: Replicate Virtual Machines to Azure

 

Module 4: Backup and Disaster Recovery in Azure

In this module, you’ll learn about the key components of a business continuity strategy and what is required for a highly available solution. You will also learn how to implement Azure IaaS virtual machine back up using the Azure Backup service. Additionally, you will learn how to replicate Azure VMs to any other Azure location using Azure Site Recovery.

Lessons

  • Azure Backup Overview
  • Implementing Azure IaaS Backup
  • Azure to Azure Site Recovery
  • Application Disaster Recovery

target_au

This workshop is for IT Administrators and staff who need to plan, implement and manage migrations of on-premises resources to Azure, or to replicate Azure virtual machines to other Azure locations. They take business requests from workload owners to migrate workloads to the cloud in order to take advantage of the benefits that a cloud-enabled strategy provides over a traditional datacenter approach. This role requires communicating and coordinating with different individuals within an organization’s IT department and business groups, as well as vendors.


pre_req
  • IT Administrators start this role with experience in operating systems, virtualization, cloud infrastructure, storage structures, and networking. In addition, IT administrators should have experience or equivalent knowledge in administering an IaaS Azure infrastructure.
  • Understanding of on-premises virtualization technologies, including VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
  • Understanding of resilience and disaster recovery, including backup and restore operations.
  • Familiarity with using Azure, including the Azure portal, Cloud Shell, Azure PowerShell, CLI and ARM template.
  • Understanding of Azure Active Directory and cloud identity management.
  • Understanding of management of subscriptions, users, groups, and billing, and Azure policies.

titleCourse MS-700T00-A: Managing Microsoft Teams
days5
seo_titleManaging Microsoft Teams - Microsoft 365 | Insoft Services
seo_decThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role.
seo_tkeyManaging Microsoft Teams
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. Microsoft Teams admins configure, deploy, and manage Office 365 workloads for Microsoft Teams that focus on efficient and effective collaboration and communication in an enterprise environment. This course covers six central elements - Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the environment for a Microsoft Teams deployment, deploying and managing teams, managing collaboration and managing communication in Microsoft Teams.   See other Microsoft courses
objective

By actively participating in this course, you will learn about the following:

  • What is Microsoft Teams and how the components work together
  • How to implement Governance, Security and Compliance for Microsoft Teams
  • How to prepare an organizations environment for a Microsoft Teams deployment
  • How to deploy and manage teams
  • Ways of managing collaboration in Microsoft Teams
  • Techniques to manage and troubleshoot communication in Microsoft Teams

outline

Module 1: Microsoft Teams Overview

In Microsoft Teams overview, you will get an overview of Microsoft Teams including Teams architecture and related Office 365 workloads. You will be provided with an overview of security and compliance in Microsoft Teams and finally get an overview of how to manage Microsoft Teams.

Lessons

  • Overview of Microsoft Teams
  • Overview of security and compliance in Microsoft Teams
  • Overview of managing Microsoft Teams

Lab: Manage roles and create teams

  • Prepare team roles and licenses
  • Create a new team

 

Module 2: Implement Microsoft Teams Governance, Security and Compliance

In implementing governance, security and compliance for Microsoft Teams, you will plan and configure governance for Office 365 groups including expiration and naming policies. Then you will implement security by configuring conditional access, MFA or Threat Management for Microsoft Teams. Finally, you will implement compliance for Teams by using DLP policies, eDiscovery cases or supervision policies.

Lessons

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing Security for Microsoft Teams
  • Implementing Compliance for Microsoft Teams

Lab: Configure Security and Compliance for teams and content

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing security for Microsoft Teams
  • Implementing compliance for Microsoft Teams

 

Module 3: Prepare the environment for a Microsoft Teams deployment

In preparing the environment for a Microsoft Teams deployment, you plan an upgrade from Skype for Business to Microsoft Teams by evaluating upgrade paths with coexistence and upgrade modes, manage meeting migrations and configuring coexistence and upgrade settings. Then you plan and configure network settings for Microsoft Teams, and finally, you will deploy and manage Microsoft Teams endpoints.

Lessons

  • Upgrade from Skype for Business to Microsoft Teams
  • Plan and configure network settings for Microsoft Teams
  • Deploy and Manage Microsoft Teams endpoints

Lab: Environment preparation for Teams

  • Calculate networking capabilities
  • Evaluate configuration profiles
  • Provide team resources

 

Module 4: Deploy and manage teams

In deploying and managing teams, you will learn how to create and manage teams, manage membership and access for both, internal and external users.

Lessons

  • Create and manage teams
  • Manage membership
  • Manage access for external users

Lab: Manage teams

  • Manage team resources
  • Manage sharing and access

 

Module 5: Manage collaboration in Microsoft Teams

In managing collaboration in Microsoft Teams, you will manage chat and collaboration experiences such as team settings or private channel creation policies. Finally, you will manage settings for Teams apps such as app setup policies, Apps, bots & connectors in Microsoft Teams or publish a custom app in Microsoft Teams.

Lessons

  • Manage chat and collaboration experiences
  • Manage settings for Teams apps

Lab: Modify collaboration settings for Teams

  • Configure channel and message policies
  • Manage app settings for team

 

Module 6: Manage communication in Microsoft Teams

This course concludes with managing communication in Microsoft Teams. You will learn how to manage Live event and meetings experiences, manage phone numbers or Phone System for Microsoft Teams and finally how to troubleshoot audio, video, and client issues.

Lessons

  • Manage Live event and meetings experiences
  • Manage phone numbers
  • Manage Phone System for Microsoft Teams
  • Troubleshoot audio, video, and client issues

Lab: Modify communication settings for Teams

  • Configure meeting policies
  • Manage Phone System for Microsoft Teams
  • Troubleshooting audio, video and client issues

target_au

Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam.


pre_req
  • A proficient understanding of basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices, including using PowerShell.

titleCourse MS-101T00-A: Microsoft 365 Mobility and Security
days5
seo_titleMicrosoft 365 Mobility and Security Training Course | Insoft Services
seo_decThis Microsoft 365 Mobility and Security (MS-101T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkeyMicrosoft 365 Mobility and Security
categorymicrosoft-365
vendorMicrosoft

techonogyIT Services Management
overviewThis Microsoft 365 Mobility and Security (MS-101T00-A) course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links.   See other Microsoft courses
objective

By actively participating in this course, you will learn about the following:

  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence
  • Data Governance in Microsoft 365
  • Archiving and Retention in Office 365
  • Data Governance in Microsoft 365 Intelligence
  • Search and Investigations
  • Device Management
  • Windows 10 Deployment Strategies
  • Mobile Device Management

outline

Module 1: Introduction to Microsoft 365 Security Metrics Lessons

  • Threat Vectors and Data Breaches
  • Security Solutions in Microsoft 365
  • Introduction to the Secure Score
  • Introduction to Azure Active Directory Identity Protection

 

Module 2: Managing Your Microsoft 365 Security Services Lessons

  • Introduction to Exchange Online Protection
  • Introduction to Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Monitoring and Reports

 

Module 3: Lab 1 – Manage Microsoft 365 Security Services

Lab: Manage Microsoft 365 Security Services

  • Exercise 1 – Set up a Microsoft 365 Trial Tenant
  • Exercise 2 – Implement an ATP Safe Links policy and Safe Attachment policy

 

Module 4: Microsoft 365 Threat Intelligence Lessons

  • Overview of Microsoft 365 Threat Intelligence
  • Using the Security Dashboard
  • Configuring Advanced Threat Analytics
  • Implementing Your Cloud Application Security

 

Module 5: Lab 2 – Implement Alert Notifications Using the Security Dashboard

Lab: Implement Alert Notifications Using the Security Dashboard

  • Exercise 1 – Prepare for implementing Alert Policies
  • Exercise 2 – Implement Security Alert Notifications
  • Exercise 3 – Implement Group Alerts
  • Exercise 4 – Implement eDiscovery Alerts

 

Module 6: Introduction to Data Governance in Microsoft 365 Lessons

  • Introduction to Archiving in Microsoft 365
  • Introduction to Retention in Microsoft 365
  • Introduction to Information Rights Management
  • Introduction to Secure Multipurpose Internet Mail Extension
  • Introduction to Office 365 Message Encryption
  • Introduction to Data Loss Prevention

 

Module 7: Archiving and Retention in Office 365 Lessons

  • In-Place Records Management in SharePoint
  • Archiving and Retention in Exchange
  • Retention Policies in the SCC

 

Module 8: Lab 3 – Implement Archiving and Retention

Lab: Implement Archiving and Retention

  • Exercise 1 – Initialize Compliance in Your Organization
  • Exercise 2 – Configure Retention Tags and Policies
  • Exercise 3 – Implement Retention Policies

 

Module 9: Implementing Data Governance in Microsoft 365 Intelligence Lessons

  • Planning Your Security and Compliance Needs
  • Building Ethical Walls in Exchange Online
  • Creating a Simple DLP Policy from a Built-in Template
  • Creating a Custom DLP Policy
  • Creating a DLP Policy to Protect Documents
  • Working with Policy Tips

 

Module 10: Lab 4 – Implement DLP Policies

Lab: Implement DLP Policies

  • Exercise 1 – Manage DLP Policies
  • Exercise 2 – Test MRM and DLP Policies

 

Module 11: Managing Data Governance in Microsoft 365 Lessons

  • Managing Retention in Email
  • Troubleshooting Data Governance
  • Implementing Azure Information Protection
  • Implementing Advanced Features of AIP
  • Implementing Windows Information Protection

 

Module 12: Lab 5 – Implement AIP and WIP

Lab: Implement AIP and WIP

  • Exercise 1 – Implement Azure Information Protection
  • Exercise 2 – Implement Windows Information Protection

 

Module 13: Managing Search and Investigations Lessons

  • Searching for Content in the Security and Compliance Center
  • Auditing Log Investigations
  • Managing Advanced eDiscovery

 

Module 14: Lab 6 – Manage Search and Investigations

Lab: Manage Search and Investigations

  • Exercise 1 – Investigate Your Microsoft 365 Data
  • Exercise 2 – Configure and Deploy a Data Subject Request

 

Module 15: Planning for Device Management Lessons

  • Introduction to Co-management
  • Preparing Your Windows 10 Devices for Co-management
  • Transitioning from Configuration Manager to Intune
  • Introduction to Microsoft Store for Business
  • Planning for Mobile Application Management

 

Module 16: Lab 7 – Implement the Microsoft Store for Business

Lab: Implement the Microsoft Store for Business

  • Exercise 1 – Configure the Microsoft Store for Business
  • Exercise 2 – Manage the Microsoft Store for Business

 

Module 17: Planning Your Windows 10 Deployment Strategy Lessons

  • Windows 10 Deployment Scenarios
  • Implementing Windows Autopilot
  • Planning Your Windows 10 Subscription Activation Strategy
  • Resolving Windows 10 Upgrade Errors
  • Introduction to Windows Analytics

 

Module 18: Implementing Mobile Device Management Lessons

  • Planning a Mobile Device Management
  • Deploying Mobile Device Management
  • Enrolling Devices to MDM
  • Managing Device Compliance

 

Module 19: Lab 8 – Manage Devices with Intune

Lab: Manage Devices with Intune

  • Exercise 1 – Enable Device Management
  • Exercise 2 – Configure Azure AD for Intune
  • Exercise 3 – Create Intune Policies
  • Exercise 4 – Enroll a Windows 10 Device
  • Exercise 5 – Manage and Monitor a Device in Intune

target_au

This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleCourse MS-100T00-A: Microsoft 365 Identity and Services
days5
seo_titleMicrosoft 365 Identity and Services Training Courses | Insoft Services
seo_decThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkeyMicrosoft 365 Identity and Services
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management. In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management.   See other Microsoft courses
objective

By actively participating in this course, you will learn about the following:

  • Designing, configuring, and managing your Microsoft 365 tenant
  • Office 365 product functionality
  • Configuring Office 365
  • Managing Office 365 ProPlus deployments
  • Planning and implementing identity synchronization
  • Implementing application and external access

outline

Module 1: Designing Your Microsoft 365 Tenant

Lessons

  • Planning Microsoft 365 in your On-premises Infrastructure
  • Planning Your Identity and Authentication Solution
  • Planning Your Service Setup
  • Planning Your Hybrid Environment
  • Planning Your Migration to Office 365

 

Module 2: Configuring Your Microsoft 365 Tenant

Lessons

  • Planning  Your Microsoft 365 Experience
  • Configuring  Your Microsoft 365 Experience
  • Managing User Accounts and Licenses in Microsoft 365
  • Managing Security Groups in Microsoft 365
  • Implementing Your Domain Services
  • Leveraging FastTrack and Partner Services

 

Module 3: Lab 1 – Configuring your Microsoft 365 Tenant

Lab: Configuring your Microsoft 365 Tenant

  • Exercise 1 – Set up a Microsoft 365 Trial Tenant

 

Module 4: Managing Your Microsoft 365 Tenant

Lessons

  • Configuring Tenant Roles
  • Managing Tenant Health and Services

 

Module 5: Lab 2 – Managing your Microsoft 365 Tenant

Lab: Managing your Microsoft 365 Tenant

  • Exercise 1 – Manage Administration Delegation
  • Exercise 2 – Configure Office 365 Message Encryption (OME)
  • Exercise 3 – Monitor and Troubleshoot Office 365

 

Module 6: Office 365 Overview

Lessons

  • Exchange Online Overview
  • SharePoint Online Overview
  • Teams Overview
  • Additional Resources Overview
  • Device Management Overview

 

Module 7: Lab 3 – Office 365 Overview

Lab: Office 365 Overview

  • Exercise 1 – Exchange Online Overview
  • Exercise 2 – SharePoint Online Overview
  • Exercise 3 – Teams Overview

 

Module 8: Configuring  Office 365

Lessons

  • Office 365 Client Overview
  • Configuring Office Client Connectivity to Office 365

 

Module 9: Managing Office 365 ProPlus Deployments

Lessons

  • Managing User-Driven Client Installations
  • Managing Centralized Office 365 ProPlus Deployments
  • Configuring Office Telemetry
  • Configuring Microsoft Analytics

 

Module 10: Lab 4 – Managing Office 365 ProPlus installations

Lab: Managing Office 365 ProPlus installations

  • Exercise 1 – Prepare an Office 365 ProPlus Managed Installation
  • Exercise 2 – Manage a Centralized Office 365 ProPlus Installation
  • Exercise 3 – Deploy and Configure Office Telemetry Components

 

Module 11: Planning and Implementing Identity Synchronization

Lessons

  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities
  • Password Management in Microsoft 365

 

Module 12: Lab 5 – Implementing Identity Synchronization

Lab: Implementing Identity Synchronization

  • Exercise 1 – Set up your organization for identity synchronization
  • Exercise 2 – Implement Identity Synchronization

 

Module 13: Implementing Application and External Access

Lessons

  • Implementing Applications in Azure AD
  • Configuring Azure AD App Proxy
  • Designing Solutions for External Access

target_au

This Microsoft 365 Identity and Services course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleCourse MS-030T00-A: Office 365 Administrator
days5
seo_titleOffice 365 Administrator Training Course | Insoft Services
seo_decThis Office 365 Administrator (MS-030T00-A) course focuses on skills required to set up an Office 365 tenant and its users.
seo_tkeyOffice 365 Administrator
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThis Office 365 Administrator (MS-030T00-A) course is a five-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in evaluating, planning, deploying, and operating Microsoft Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to set up an Office 365 tenant, including federation with existing user identities, and skills required to sustain an Office 365 tenant and its users.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Plan an Office 365 deployment, configure the Office 365 tenant and plan a pilot deployment.
  • Manage Office 365 users, groups, and licenses, and configure delegated administration.
  • Plan and configure client connectivity to Office 365.
  • Plan and configure directory synchronization between Microsoft Azure AD and on-premises AD DS.
  • Plan and implement the Office 365 ProPlus deployment.
  • Plan and manage Microsoft Exchange Online recipients and permissions.
  • Plan and configure Exchange Online services.
  • Plan and configure Microsoft Teams
  • Plan and configure Microsoft SharePoint Online.
  • Plan and configure Office 365 collaboration solutions.
  • Plan and configure the integration between Office 365 and Microsoft Azure Information Protection.
  • Monitor and review Office 365 services, and troubleshoot Office 365 issues.
  • Plan and implement identity federation between on-premises AD DS and Azure AD.

outline

Module 1: Planning and provisioning Office 365

This module reviews the features of Office 365 and identifies recent improvements to the service, and describes the process of provisioning an Office 365 tenant. This module also identifies the challenges in deploying Office 365 and the benefits of the Microsoft FastTrack for Office 365 approach, as compared to the traditional plan, prepare, and migrate deployment process.

Lessons

  • Overview of Office 365
  • Provisioning an Office 365 tenant
  • Planning a pilot deployment

Lab: Provisioning Office 365

  • Configuring an Office 365 tenant
  • Configuring a custom domain
  • Exploring the Office 365 administrator interfaces

After completing this module, students will be able to:

  • Describe the features and benefits of Office 365.
  • Provision of new tenant accounts.
  • Plan a pilot deployment of Office 365.

 

Module 2: Managing Office 365 users and groups

This module explains how to manage users, groups, and licenses, and configure administrative access by using the Office 365 console and the Windows PowerShell command-line interface. This module also explains how to manage user passwords and configure multi-factor authentication.

Lessons

  • Managing user accounts and licenses
  • Managing passwords and authentication
  • Managing security groups in Office 365
  • Managing Office 365 users and groups with Windows PowerShell
  • Configuring administrative access

Lab: Managing Office 365 users and passwords

  • Managing Office 365 users and licenses by using the Microsoft 365 admin centre
  • Managing Office 365 password policies

Lab: Managing Office 365 groups and administration

  • Managing Office 365 groups
  • Managing Office 365 users and groups by using Windows PowerShell
  • Configuring service administrators

After completing this module, students will be able to:

  • Manage user accounts and licenses by using the Microsoft 365 admin centre.
  • Manage passwords and authentication.
  • Manage security and distribution groups by using the Microsoft 365 admin centre.
  • Manage Office 365 users and groups by using Windows PowerShell.
  • Configure administrative access.

 

Module 3: Configuring client connectivity to Microsoft Office 365

This module covers the different types of client software that you can use to connect to Office 365. It also explains the infrastructure requirements that the clients need to connect to Office 365, in addition to how to configure different types of Office 365 clients.

Lessons

  • Planning for Office 365 clients
  • Planning connectivity for Office 365 clients
  • Configuring connectivity for Office 365 clients

Lab: Configuring client connectivity to Office 365

  • Configuring DNS records for Office 365 clients
  • Running the Office 365 connectivity analyzer tools
  • Connecting Office apps

After completing this module, students will be able to:

  • Plan for the deployment of Office 365 clients.
  • Plan for, and troubleshoot, connectivity for Office 365 clients.
  • Configure connectivity for Office 365 clients.

 

Module 4: Planning and configuring directory synchronization

This module explains how to plan, prepare, and implement directory synchronization as a methodology for user and group management in an Office 365 deployment. It explains how to prepare an on-premises environment, and install and configure directory synchronization. It also explains how to manage Office 365 identities after you enable directory synchronization.

Lessons

  • Planning and preparing for directory synchronization
  • Implementing directory synchronization by using Azure AD Connect
  • Managing Office 365 identities with directory synchronization

Lab: Configuring directory synchronization

  • Preparing for directory synchronization
  • Configuring directory synchronization
  • Managing Active Directory users and groups

After completing this module, students will be able to:

  • Plan and prepare for directory synchronization.
  • Implement directory synchronization by using Microsoft Azure Active Directory Connect (AD Connect).
  • Manage Office 365 identities with directory synchronization.

 

Module 5: Planning and deploying Office 365 ProPlus

This module explains how to plan for client deployment and ensure that users receive the tools that they need to interact with Office 365 effectively. It also explains the planning process, how to make Office 365 ProPlus directly available to end-users, and how to deploy it as a managed package. Finally, it describes how to set up Office telemetry so that administrators can track how users are interacting with Microsoft Office.

Lessons

  • Overview of Office 365 ProPlus
  • Planning and managing user-driven Office 365 ProPlus deployments
  • Planning and managing centralized deployments of Office 365 ProPlus
  • Office Telemetry and reporting

Lab: Managing Office 365 ProPlus installations

  • Preparing an Office 365 ProPlus managed installation
  • Managing user-driven Office 365 ProPlus installations
  • Managing centralized Office 365 ProPlus installations

After completing this module, students will be able to:

  • Describe Office 365 ProPlus.
  • Plan and manage user-driven Office 365 ProPlus deployments.
  • Plan and manage centralized deployments for Office 365 ProPlus.
  • Describe Office Telemetry and reporting.

 

Module 6: Planning and managing Exchange Online recipients and permissions

This module describes Exchange Online and explains how to create and manage recipient objects, and how to manage and delegate Exchange security.

Lessons

  • Overview of Exchange Online
  • Managing Exchange Online recipients
  • Planning and configuring Exchange Online permissions

Lab: Managing Exchange Online recipients and permissions

  • Configuring Exchange Online recipients
  • Configuring role-based access control

After completing this module, students will be able to:

  • Describe Exchange Online.
  • Manage Exchange Online recipients.
  • Plan and configure delegated administration.

 

Module 7: Planning and configuring Exchange Online services

This module explains how to plan for and configure email flow, in addition to anti-malware and anti-spam settings in Office 365. It also explains how to plan and configure policies for Exchange clients. Additionally, it describes how to plan and configure a migration to Exchange Online.

Lessons

  • Planning and configuring email flow in Office 365
  • Planning and configuring email protection in Office 365
  • Planning and configuring client access policies
  • Migrating to Exchange Online

Lab: Configuring message transport in Exchange Online

  • Configuring message transport settings

Lab: Configuring email protection and client policies

  • Configuring email protection
  • Configuring client access policies

After completing this module, students will be able to:

  • Plan and configure email flow in Office 365.
  • Plan and configure anti-malware and anti-spam settings in Office 365.
  • Plan and configure policies for Exchange clients.
  • Plan and configure a migration to Exchange Online.

 

Module 8: Planning and deploying Microsoft Teams

This module explains how to plan and configure Teams. It explains how to configure Teams user settings and clients, and plan for voice integration. It also explains how to transition from Skype for Business to Teams and how Teams integrates with other Office 365 services.

Lessons

  • Teams Explained
  • Deploying Teams
  • Authentication and Access
  • Transitioning Skype For Business to Microsoft Teams
  • Management and Reporting

Lab: Teams Overview

  • Manage Meeting Settings
  • Manage Messaging Policies
  • Manage Voice Settings
  • Manage Org-Wide Settings

After completing this module, students will be able to:

  • Plan and Configure Teams
  • Configure teams user settings and channels
  • manage Voice intergration
  • Configure Organisation-wide settings in teams

 

Module 9: Planning and configuring SharePoint Online

This module describes how to configure SharePoint Online services. It explains how to plan and configure SharePoint site collections and external user sharing. It also provides a brief overview of additional portals, such as the video portal.

Lessons

  • Configuring SharePoint Online services
  • Planning and configuring SharePoint Online site collections
  • Planning and configuring external user sharing

Lab: Configuring SharePoint Online

  • Configuring SharePoint Online settings
  • Creating and configuring SharePoint Online site collections
  • Configuring and verifying external user sharing

After completing this module, students will be able to:

  • Configure SharePoint Online services.
  • Plan and configure SharePoint Online site collections.
  • Plan and configure external user sharing.

 

Module 10: Planning and configuring an Office 365 collaboration solution

This module describes how to enable and configure Yammer Enterprise. It also explains how to configure OneDrive for Business and Office 365 groups.

Lessons

  • Planning and managing Yammer Enterprise
  • Planning and configuring OneDrive for Business
  • Configuring Office 365 groups

Lab: Planning and configuring an Office 365 collaboration solution

  • Configuring Yammer Enterprise
  • Configuring OneDrive for Business
  • Configuring Office 365 groups

After completing this module, students will be able to:

  • Enable and configure Yammer Enterprise.
  • Enable and configure Yammer Enterprise.
  • Configure Office 365 groups.

 

Module 11: Planning and configuring security and compliance in Office 365

This module describes the compliance features in Office 365 and how to manage them. It explains how to plan and configure Azure Information Protection. Additionally, it explains the security features in Office 365.

Lessons

  • Overview of the compliance features in Office 365
  • Planning and configuring Azure Information Protection in Office 365
  • Managing the compliance features in Office 365

Lab: Configuring Rights Management and compliance

  • Configuring Rights Management in Office 365
  • Configuring compliance features

After completing this module, students will be able to:

  • Describe the compliance features in Office 365.
  • Configure Azure Information Protection in Office 365.
  • Manage the compliance features in Office 365

 

Module 12: Monitoring and troubleshooting Microsoft Office 365

This module explains how to troubleshoot issues with Office 365 connectivity and services, and how to monitor Office 365 service health.

Lessons

  • Troubleshooting Office 365
  • Monitoring Office 365 service health

Lab: Monitoring and troubleshooting Office 365

  • Monitoring Office 365
  • Monitoring service health and analyzing reports

After completing this module, students will be able to:

  • Troubleshoot Office 365 connectivity and service issues.
  • Monitor Office 365 service health.

target_au

This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Lync Server or Skype for Business Server, and Microsoft SharePoint Server.


pre_req

Before attending this course, students must have:

  • A minimum of two years of experience administering the Windows Server operating system, including Windows Server 2012 or later.
  • A minimum of one year of experience working with AD DS.
  • A minimum of one year of experience working with name resolution, including DNS.
  • Experience working with certificates, including public key infrastructure (PKI) certificates.
  • Experience working with Windows PowerShell.
  • Experience working with Exchange Server 2013 or later, Lync Server 2013 or Skype for Business Server 2015, and SharePoint Server 2013 or later is beneficial, but not required.

titleCourse MD-101T00-A: Managing Modern Desktops
days5
seo_titleManaging Modern Desktops Training | Insoft Services
seo_decIn the Managing Modern Desktops (MD-101T00-A) course, you will be introduced to key components of modern management and co-management strategies.
seo_tkeyManaging Modern Desktops
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Managing Modern Desktops (MD-101T00-A) course, students will learn how to plan and implement an operating system deployment strategy using modern deployment methods, as well as how to implement an update strategy. Students will be introduced to key components of modern management and co-management strategies. This course also covers what it takes to incorporate Microsoft Intune into your organization. Students will also learn about methods for deployment and management of apps and browser-based applications. Students will be introduced to the key concepts of security in modern management including authentication, identities, access, and compliance policies. Students will be introduced to technologies such as Azure Active Directory, Azure Information Protection and Windows Defender Advanced Threat Protection, as well as how to leverage them to protect devices and data.   See other Microsoft courses
objective

After completing this course, learners should be able to:

  • Plan, develop, and implement an Operating System deployment, upgrade, and update strategy.
  • Understand the benefits and methods of co-management strategies.
  • Plan and implement device enrollment and configuration.
  •  Manage and deploy applications and plan a mobile application management strategy.
  •  Manage users and authentication using Azure AD and Active Directory DS.
  •  Describe and implement methods used to protect devices and data.

outline

Module 1: Planning an Operating System Deployment Strategy

This module explains how to plan and implement a deployment strategy. Students will learn about the concepts of supporting the desktop through its entire lifecycle. This module also covers assessing an existing environment and the tools used to prepare a deployment strategy. Finally, students will be introduced to the tools and strategies used for desktop deployment.

Lessons

  • The Enterprise Desktop
  • Assessing Deployment Readiness
  • Deployment Tools & Strategies

Lab: Practice Lab – Planning Windows 10 deployment

After completing this module, students will be able to:
  • Describe the enterprise desktop lifecycle.
  • Describe how to assess an existing environment.
  • Describe methods for mitigating deployment blockers.
  • Describe the different tools and methods for deployment.

 

Module 2: Implementing Windows 10

This module covers the modern methods of Windows deployment used in common scenarios such as upgrading and migrating to Windows 10, as well as deploying new devices and refreshing existing devices. Students will also learn about alternate methods of OS deployment as well as considerations when choosing methods of deployment.

Lessons

  • Upgrading Devices to Windows 10
  • Deploying New Devices and Refreshing
  • Migrating Devices to Windows 10
  • Alternate Deployment Methods
  • Imaging Considerations

Lab: Practice Lab – Implementing Windows 10

  • Creating and deploying the provisioning package
  • Migrating user settings
  • Deploying Windows 10 with AutoPilot

After completing this course, learners should be able to:

  • Develop an Operating System deployment and upgrade strategy.
  • Understand the different methods of deployment.
  • Understand which scenarios on-premise and cloud-based solutions can be used for.
  • Deploy and migrate desktops to Windows 10.

 

Module 3: Managing Updates for Windows 10

This module covers managing updates to Windows. This module introduces the servicing options for Windows 10. Students will learn the different methods for deploying updates and how to configure windows update policies. Finally, students will learn how to ensure and monitor update compliance using Windows Analytics.

Lessons

  • Updating Windows 10
  • Windows Update for Business
  • Introduction to Windows Analytics

Lab: Practice Lab – Managing Updates for Windows 10

  • Manually configuring Windows Update settings
  • Configuring Windows Update by using GPOs

After completing this module, students will be able to:

  • Describe the Windows 10 servicing channels.
  • Configure a Windows update policy using Group Policy settings.
  • Configure Windows Update for Business to deploy OS updates.
  • Use Windows Analytics to assess upgrade readiness and update compliance.

 

Module 4: Device Enrollment

In this module, students will examine the benefits and prerequisites for co-management and learn how to plan for it. This module will also cover Azure AD join and will be introduced to Microsoft Intune, as well as learn how to configure policies for enrolling devices. The module will conclude with an overview of device inventory in Intune and reporting using the Intune console, Power BI and Microsoft Graph.

Lessons

  • Device management options
  • Microsoft Intune Overview
  • Manage Intune device enrollment and inventory
  • Managing devices with Intune

Lab: Practice Lab – Device Enrollment and Management

After completing this module, students will be able to:

  • Describe the benefits and methods for migrating to co-management.
  • Deploy an MDM with Microsoft Intune.
  • Configure device enrollment.
  • Enrol desktop and mobile devices in Windows Intune.
  • Configure and downloads inventory reports.

 

Module 5: Configuring Profiles

This module dives deeper into Intune device profiles including the types of device profiles and the difference between built-in and custom profiles. The student will learn about assigning profiles to Azure AD groups and monitoring devices and profiles in Intune. The module will conclude with an overview of using Windows Analytics for health and compliance reporting.

Lessons

  • Configuring device profiles
  • Managing user profiles
  • Monitoring devices

Lab: Practice Lab – Managing profiles

After completing this module, students will be able to:
  • Describe the types of device profiles.
  • Create and assign device profiles.
  • Configure the user profile and folder redirection.
  • Monitor and report on devices using Intune and Windows Analytics.

 

Module 6: Application Management

In this module, students learn about application management on-premise and cloud-based solutions. This module will cover how to manage Office 365 ProPlus deployments in Intune as well as how to manage apps on non-enrolled devices. The module will conclude with an overview of Enterprise Mode with Internet Explorer and Microsoft Edge and tracking your installed applications, licenses, and assigned apps using Intune.

Lessons

  • Implement Mobile Application Management (MAM)
  • Deploying and updating applications
  • Administering applications

Lab: Practice Lab – Managing Applications

After completing this module, students will be able to:

  • Describe the methods for application management.
  • Deploy applications using Intune and Group Policy.
  • Configure Microsoft Store for Business.
  • Deploy Office365 ProPlus using Intune.
  • Manage and report application inventory and licenses.

 

Module 7: Managing Authentication in Azure AD

In this module, students will are introduced to the concept of a directory in the cloud with Azure AD. Students will learn the similarities and differences between Azure AD and Active Directory DS and how to synchronize between the two. Students will explore identity management in Azure AD and learn about identity protection using Windows Hello for Business, as well as Azure AD Identity Protection and multi-factor authentication.

Lessons

  • Azure AD Overview
  • Managing identities in Azure AD
  • Protecting identities in Azure AD
  • Managing device authentication

Lab: Practice Lab – Managing objects and authentication in Azure AD

After completing this module, students will be able to:
  • Describe the capabilities of Azure AD.
  • Manage users using Azure AD with Active Directory DS.
  • Implement Windows Hello for Business.
  • Join devices to Azure AD.

 

Module 8: Managing Device Access and Compliance

In this module, students will be introduced to managing device security. The module will cover securely accessing corporate resources and introduce concepts such as Always On VPN and remote connectivity in Windows 10. Students will learn how to create and deploy compliance policies and use compliance policies for conditional access. The module concludes with monitoring devices enrolled in Intune.

Lessons

  • Microsoft Intune Overview
  • Implement device compliance policies

Lab: Practice Lab – Managing Access and Compliance

After completing this module, students will be able to:

  • Describe methods of enabling access from external networks.
  • Deploy compliance and conditional access policies.
  • Use Intune to monitor device compliance.

 

Module 9: Managing Security

In this module, students will learn about data protection. Topics will include Windows & Azure Information Protection, and various encryption technologies supported in Windows 10. This module also covers key capabilities of Windows Defender Advanced Threat Protection and how to implement these capabilities on devices in your organization. The module concludes using Windows Defender and using functionalities such as antivirus, firewall and Credential Guard.

Lessons

  • Implement device data protection
  • Managing Windows Defender ATP
  • Managing Windows Defender in Windows 10

Lab: Practice Lab – Managing Security in Windows 10

After completing this module, students will be able to:

  • Describe the methods of protecting device data.
  • Describe the capabilities and benefits of Windows ATP.
  • Deploy and manage settings for Windows Defender clients.

target_au

The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Responsibilities include managing identity, access, policies, updates, and apps. The MDA collaborates with the M365 Enterprise Administrator to design and implement a device strategy that meets the business needs of a modern organization.

The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring and maintaining Windows 10 and non-Windows devices. The MDA role focuses on cloud services rather than on-premises management technologies.


pre_req

The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 10 and non-Windows devices. The MDA role focuses on cloud services rather than on-premises management technologies. It is recommended students complete course MD-100, Windows 10, prior to taking this course.


titleCourse MB-500T00-A: Microsoft Dynamics 365: Finance and Operations Apps Developer
days5
seo_titleCourse MB-500T00-A: Dynamics 365 Finance Operations Apps Developer
seo_decIn the Dynamics 365 Finance Operations Apps Developer (MB-500T00-A) course you will learn how to implement and extend apps to meet business requirements.
seo_tkeyMB-500T00-A
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365: Finance and Operations Apps Developer (MB-500T00-A) course is a five-day instructor-led training for developers. In this course, you will learn how to implement and extend applications to meet the requirements of the business. Candidates provide fully realized solutions by using standardized application coding patterns, extensible features, and external integrations.   See other Microsoft courses
objective
outline

Module 1: Overview & Architecture

  • Describe the Dynamics 365 ecosystem and major components of the Dynamics 365 Finance and Operations (FO) software, describe the architecture of D365FO, describe relevant D365FO design and deployment considerations
  • Lab: Development Environment configuration and Project/Model Creation

Module 2: Developer Tools

  • Manage system implementations by using Lifecycle Services, Customize D365FO by using Visual Studio, Manage source code and artefacts by using version control, Work with other development tools to complete tasks
  • Lab: Source Control using DevOps

Module 3: Solution Design

  • Determine the required application stack components and server architecture, Implement Application Lifecycle Management (ALM), Design a solution for D365FO
  • Lab: Data Structure Development

Module 4: AOT Elements

  • Create forms, Create and extend tables, Create Extended Data Types (EDT) and enumerations, Create classes and extend AOT elements
  • Lab: Metadata Extension & Development

Module 5: Code Development & Testing

  • Develop X++ code, Develop object-oriented code, Extend D365 FO functionality, Describe test framework and tools, Perform Unit Testing
  • Lab: Code Extension & Development

Module 6: Data Migration

  • Describe migration tools and methodologies, Plan Migration strategy, Prepare data for migration and migrate data
  • Lab: Data Export/Import using Data Entity
  • Lab: Recurring Data Transfer

 

Module 7: Frameworks

  • Implement D365 FO functionality
  • Lab: SysExtension Framework

Module 8: Integration

  • Identify Data integration patterns and scenarios, Implement Data integration concepts and solutions, Implement Recurring integrations, Integrate D365FO with Microsoft Azure, Troubleshoot integration errors, Implement the Data Management Package API
  • Lab: OData Integration
  • Lab: Logic App Integration
  • Lab: Calling an External Web Service

Module 9: Reporting

  • Describe the capabilities and limitations of reporting tools in D365FO, Design, create, and revise Dynamics Reports, Design, create, and revise Dynamics workspaces, Design, create and revise data sources that connect to data stores external to D365FO
  • Lab: Power BI reporting from F&O

Module 10: Security & Performance

  • Describe and implement performance tools and LCS Environment Monitoring tools, Implement role-based security policies and requirements, Apply fundamental performance optimization techniques, Optimize performance for batch processes, Optimize user interface performance, Enhance Integration performance, Optimize Report Performance
  • Lab: Async & Sandbox Functionality

target_au

The MB-500T00-A course is meant for Microsoft Dynamics 365 Finance and Operations Apps Developers.


pre_req
titleCourse MB-400T00-A: Microsoft Power Apps + Dynamics 365 Developer
days3
seo_titleCourse MB-400T00-A: Microsoft Power Apps + Dynamics 365 Developer
seo_decThe Microsoft Power Apps + Dynamics 365 Developer (MB-400T00-A) course provides you with the skills to help organisations optimize their operations.
seo_tkeyMB-400T00-A
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyIT Systems and Security
overviewThe Microsoft Power Apps + Dynamics 365 Developer (MB-400T00-A) course is a three-day training that provides you with the skills to use Microsoft Power Platform to help organisations optimize their operations by automating routine tasks and standardizing business best practices. A PowerApps Developer is a professional software developer who extends the Power Platform to solve complex business problems. In this course, PowerApps Developers will build on their existing knowledge of the Power Platform, Microsoft stack, and standard development tools and practices. PowerApps Developers will learn how to estimate effort and scope; validate requirements and design technical architecture; create data models; determine implementation tools, and document their technical design. Broad topics will include implementing user security and accessibility; managing environments; extending the Common Data Service; creating and using web resources, and working with plug-ins.   See other Microsoft courses
objective

After completing the MB-400T00-A course, students will be able to:

  • Create and document a data model
  • Implement entities and fields
  • Create and maintain solutions
  • Automate business processes
  • Extend the user experience
  • Develop integrations

outline

Module 1: Introduction to developing with the Power Platform

In this module, students will learn about developer resources and how to leverage them to extend the Power Platform.Lessons

  • Introduction to Power Platform developer resources
  • Use developer tools to extend the Power Platform
  • Introduction to extending the Power Platform

After completing this module, students will be able to:

  • Identify the functionality of developer tools
  • Use developer tools

 

Module 2: Extending the Power Platform Common Data Service

In this module, students will learn how and when to use plug-ins or other tools to extend the Common Data Service.Lessons

  • Introduction to Common Data Service for developers
  • Extend plug-ins

After completing this module, students will be able to:

  • Write a plug-in
  • Use a plug-in to extend the Common Data Service

 

Module 3: Extending the Power Platform user experience

In this module, students will learn how to leverage web resources and client script to extend the Power Platform user experience.Lessons

  • Introduction to web resources
  • Performing common actions with client script
  • Automate Business Process Flows with client script

After completing this module, students will be able to:

  • Use web resources
  • Write client script
  • Extend business process flows

target_au

A PowerApps Developer is responsible for designing, developing, securing, extending, and integrating a platform implementation. The developer implements components of the solution that include application enhancements, custom user experience, system integrations, data conversions, custom process automation, and custom visualizations.


pre_req
Before attending the MB-400T00-A course, students must have:
  • A basic understanding of the Power Platform.
  • Experience in software development against the Microsoft stack and Visual Studio.
  • Experience in administering solutions in Azure (preferred).

titleCourse MB-240T00-A: Microsoft Dynamics 365 Field Service
days3
seo_titleCourse MB-240T00-A: Microsoft Dynamics 365 Field Service
seo_decThe Dynamics 365 Field Service (MB-240T00-A) course provides skills to configure key components that are used to deliver Field Service and mobile solutions.
seo_tkeyDynamics 365 Field Service
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365 Field Service (MB-240T00-A) course provides is a three-day instructor-led training. This course will equip students with the skills necessary to identify and configure the key components that are used to deliver Field Service and mobile solutions. Key topics include identifying the organizational considerations that will drive configuration decisions and common configuration aspects. This course helps students better understand the bigger picture and end goals focused around implementations that aid in designing more efficient solutions that align with customer and organizational goals. The Dynamics 365 Field Service helps organisations better position themselves in the market by providing a variety of tools that assist in identifying and scheduling resources and managing workloads for mobile workers.   See other Microsoft courses
objective

After completing the MB-240T00-A course, you will be able to:

  • Identify the key components involved in Field Service Implementations.
  • Define the products and services that will be delivered to customers.
  • Determine which pricing options to use in specific scenarios.
  • Determine which resources are required.

outline

Module 1: Configure Field Service

In this introductory module, we will introduce key concepts of Dynamics 365 Field Service, including products, services, and tax codes.

  • Introduction to configuring Field Service
  • Defining products and services
  • Defining tax codes

After completing this module you will be able to:

  • Create and manage products and services
  • Configure tax codes for your organization

 

Module 2: Resource Scheduling Configuration

In this module, we will explore the concept of resource scheduling, and learn how to configure the system to schedule resources efficiently.

  • Mapping and location information
  • Configuring resource components
  • Defining account preferences

After completing this module you will be able to:

  • Configure resource scheduling for your organization
  • Define account preferences
  • Enable location mapping

 

Module 3: Defining and Configuring Bookable Resources

In this module, we will learn how to create and manage bookable resources, including resource pools and crews.

  • Defining bookable resources
  • Resource pools, crews and facilities

After completing this module you will be able to:

  • Define bookable resources
  • Create pools and crews
  • Manage facility records

 

Module 4: Configure Incidents

In this module, we will learn how incidents can improve the scheduling efficiency and consistency of your organization.

  • Creating an incident
  • Using service tasks

After completing this module you will be able to:

  • Create an incident for common service tasks
  • Schedule using incidents

 

Module 5: Inventory and Work Order Management

In this module, we will learn how to create and use work orders to schedule resources.

  • Configure Field Service work orders
  • Creating work orders
  • Managing work orders

After completing this module you will be able to:

  • Configure work orders
  • Schedule resources using work orders

 

Module 6: Field Service Agreements

In this module, we will introduce agreements, and learn how to configure them for your organization.

  • Using Field Service agreements
  • Set up bookings
  • Set up invoices

After completing this module you will be able to:

  • Use an agreement to schedule work orders
  • Generate invoices for customers

 

Module 7: Inventory and Purchasing

In this module, we will learn about the management of customer assets.

  • Manage customer assets
  • Manage inventory
  • Purchasing and returns

After completing this module you will be able to:

  • Create customer asset records
  • Manage inventory, purchasing and returns

 

Module 8: Field Service Mobile

In this module, we will learn how to use and configure the Field Service Mobile application for a mobile workforce.

  • Mobile client overview
  • Install and deploy Field Service mobile projects
  • Manage mobile projects
  • Deploy the mobile client

After completing this module you will be able to:

  • Manage mobile projects
  • Install and deploy the mobile client
  • Describe the value of the mobile app for a mobile workforce

 

Module 9: Universal Resource Scheduling

In this module, we will introduce the concept of Universal Resource Scheduling, and describe how it can be leveraged for an organization.

  • URS overview and configuration
  • Enabling entities for URS
  • Customize entities for URS

After completing this module you will be able to:

  • Describe Universal Resource Scheduling
  • Enable an entity for URS

 

Module 10: Managing Scheduling Options

In this module, we will learn how to use the schedule board to reschedule, substitute resources, and schedule pools and crews.

  • Using the schedule board
  • Schedule items
  • Rescheduling and substituting resources
  • Crew and pool scheduling

After completing this module you will be able to:

  • Configure and use the schedule board to schedule resources
  • Reschedule work orders
  • Substitute resources

 

Module 11: Customizing the Schedule Board

In this module, we will learn how to configure the schedule board to best meet the organization or scheduler’s needs.

  • Configure the board
  • Create additional schedule boards
  • Use views to enhance the schedule board
  • Configuring schedule board queries and filters
  • Working with requirement groups

After completing this module you will be able to:

  • Customize the schedule board
  • Create additional boards
  • Add views to a schedule board

 

Module 12: Advanced Scheduling Options

In this module, we will dive deeper into the options for customizing the scheduling of work orders based on unique business requirements.

  • Working with resource scheduling optimization
  • Defining optimization goals
  • Defining optimization scopes
  • Defining optimization profiles
  • Single resource scheduling

After completing this module you will be able to:

  • Define optimization for an organization
  • Schedule single resources

target_au

The MB-240T00-A course is designed for IT professionals with experience or interest in delivering Field Service solutions for large-scale customers.


pre_req
titleCourse MB-220T00-A: Microsoft Dynamics 365 Marketing
days4
seo_titleCourse MB-220T00-A: Microsoft Dynamics 365 Marketing
seo_decThe Microsoft Dynamics 365 Marketing (MB-220T00-A) course will review the marketing application configuration needed to drive business growth.
seo_tkeyDynamics 365 Marketing
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365 Marketing (MB-220T00-A) course will review the marketing application configuration needed to drive business growth. It will also dive into lead management, marketing forms and pages, segmentation, and email marketing messages. All these pieces are tied together through interactive customer journey design, including event and survey configuration.   See other Microsoft courses
objective

After completing this course, you will be able to:

  • Configure advanced settings
  • Manage marketing content, templates and integrations
  • Create and manage leads
  • Design and create marketing forms and pages
  • Create and manage segments
  • Set up and launch customer journeys
  • Create and manage events
  • Distribute and analyze surveys

outline

Module 1: Marketing Application Configuration

In this module, you will learn about advanced settings, marketing content, templates and integrations in Dynamics 365 for Marketing.

Lessons

  • Configure advanced settings
  • Manage marketing content and templates
  • Manage LinkedIn and Power BI integrations

After completing this module you will be able to:

  • Configure advanced settings such as organization, business management, and content.
  • Manage marketing content and templates.

 

Module 2: Leads

This module will review how to create, manage and score leads.

Lessons

  • Create and manage leads
  • Assess sales readiness

After completing this module you will be able to:

  • Create and manage leads.
  • Synchronize leads from LinkedIn.
  • Assess sales readiness using lead scoring models.

 

Module 3: Marketing Forms and Pages

This module will cover how to create marketing forms and pages.

Lessons

  • Create marketing forms
  • Create marketing pages
  • Manage internet marketing

After completing this module you will be able to:

  • Create marketing forms and embed them on marketing pages.
  • Create a marketing page.
  • Preview, validate and go live with a marketing page.
  • Create a marketing form and page templates.

 

Module 4: Segments and Lists

This module will cover how to manage segments, subscription centres, lists and double opt-in.

Lessons

  • Create and manage segments
  • Create and manage subscription centres
  • Double opt-in

After completing this module you will be able to:

  • Configure static and dynamic segments.
  • Create a subscription list.
  • Set up a subscription centre page.
  • Set up and enable a double opt-in process.

 

Module 5: Marketing Emails

This module will cover how to create email messages in Dynamics 365 Marketing.

Lessons

  • Create Email Message

After completing this module you will be able to:

  • Create and design email messages.
  • Preview, validate and go live with email messages.
  • Save an email message as a template.

 

Module 6: Customer Journeys

This module will review the customer journey creation process.

Lessons

  • Create customer journeys

After completing this module you will be able to:

  • Create a customer journey from a template.
  • Identify customer journey tiles and properties.
  • Validate and go live with a customer journey.
  • Create an account-based customer journey.
  • Understand the marketing calendar features.

 

Module 7: Insights

This module will demonstrate how to view, understand and manage customer insights.

Lessons

  • Marketing insights
  • Customer insights
  • Marketing execution insights
  • Lead management insights
  • Internet marketing insights

After completing this module you will be able to:

  • Locate insights.
  • Understand marketing insights such as contact, segment, customer journey, marketing email and leads.

 

Module 8: Events

In this module, you will learn how to manage event planning and execution in Dynamics 365 for Marketing.

Lessons

  • Manage event planning
  • Manage event execution

After completing this module you will be able to:

  • Create in-person and webinar events.
  • Set up event planning features such as sessions, speakers, event passes, waitlists, and venues.
  • Create and manage recurring events.

 

Module 9: Surveys

In this module, you will review how to configure, design and distribute surveys in Dynamics 365 for Marketing.

Lessons

  • Create surveys

After completing this module you will be able to:

  • Create a reusable survey theme.
  • Create, design, preview and publish a survey.

 

Module 10: Results

In the Results module, you will review marketing event and survey insights.

Lessons

  • Review event and survey results

After completing this module you will be able to:

  • Utilize the event dashboard to assess the outcome of your events.

target_au

This course is designed for IT or marketing professionals who want to learn how to leverage Dynamics 365 for Marketing for businesses.


pre_req

Knowledge of the Dynamics 365 platform and an understanding of basic marketing principles.


titleCourse DP-070T00-A: Migrate Open Source Data Workloads to Azure
days1
seo_titleCourse DP-070T00-A: Migrate Open Source Data Workloads to Azure
seo_decThe Migrate Open Source Data Workloads to Azure (DP-070T00-A) course will enable you to migrate MySQL and PostgreSQL workloads to Azure SQL Database.
seo_tkeyMigrate Data Workloads to Azure
categorysql-server
vendorMicrosoft

techonogyDatacenter & Virtualization
overviewThe Migrate Open Source Data Workloads to Azure (DP-070T00-A) course will enable the students to understand Azure SQL Database, and educate the students on what is required to migrate MySQL and PostgreSQL workloads to Azure SQL Database.   See other Microsoft courses
objective

At the end of the Migrate Open Source Data Workloads to Azure (DP-070T00-A) course, the students will have learned:

  • Migrate on-premises MySQL to Azure SQL DB for MySQL
  • Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL

outline

Module 1: Migrate to Azure SQL DB for MySQL & PostgreSQL

This module describes the benefits and architecture of Azure SQL DB.

Lessons

  • OSS databases overview
  • Common OSS database workloads
  • Customer challenges in migration

Lab: Creating source OSS databases

  • Installation of Postgres migration DB server
  • Installation of MySQL migration DB server
  • Backups / data dumps from Postgres / MySQL
  • Restore from data dumps

At the end of this module, the students will be able to:

  • OSS databases overview
  • Common OSS database workloads
  • Customer challenges in migration

 

Module 2: Migrate on-premises MySQL to Azure SQL DB for MySQL

This module describes the benefits and process of migrating MySQL workloads to Azure SQL DB.

Lessons

  • Configure and Manage Azure SQL DB for MySQL
  • Migrate on-premises MySQL to SQL DB for MySQL
  • Application Migration
  • Post-migration considerations

Lab: Migrating MySQL DB Workloads to Azure SQL DB

  • Migrating MySQL DB Workloads to Azure SQL DB
  • Define Source and Target DBS
  • Perform Migration
  • Verify Migration

At the end of this module, the students will be able to:

  • Configure and Manage Azure SQL DB for MySQL
  • Migrate on-premises MySQL to SQL DB for MySQL
  • Application Migration
  • Post-migration considerations

 

Module 3: Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL

This module describes the benefits and process of migrating PostgreSQL DB workloads to Azure SQL DB.

Lessons

  • Configure and Manage Azure SQL DB for PostgreSQL
  • Migrate on-premises MySQL to SQL DB for PostgreSQL
  • Application Migration
  • Post-migration considerations

Lab: Migrating PostgreSQL DB Workloads to Azure SQL DB

  • Configure Azure SQL DB for PostgreSQL
  • Define Source and Target DBS
  • Perform Migration
  • Verify Migration

At the end of this module, the students will be able to:

  • Configure and Manage Azure SQL DB for PostgreSQL
  • Migrate on-premises MySQL to SQL DB for PostgreSQL
  • Application Migration
  • Post-migration considerations

target_au
  • The primary audience for this course is database developers who plan to migrate their MySQL or Postgres DB workloads to Azure SQL DB.
  • The secondary audience for this course is MySQL/Postgres administrators to raise awareness of the features and benefits of Azure SQL DB.

pre_req
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
  • Some knowledge of open-source relational database management systems such as Postgres;
  • and/or MySQL, SQL administration, backup and recovery techniques i.e. dumping table data.

titleCourse DP-060T00-A: Migrate NoSQL workloads to Azure Cosmos DB
days1
seo_titleCourse DP-060T00-A: Migrate NoSQL workloads to Azure Cosmos DB
seo_decThe Migrate NoSQL workloads to Azure Cosmos DB (DP-060T00-A) course will teach you how you can migrate MongoDB and Cassandra workloads to Cosmos DB.
seo_tkeyMigrate NoSQL workloads to Azure Cosmos DB
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Migrate NoSQL workloads to Azure Cosmos DB (DP-060T00-A) course will teach the students what is Cosmos DB and how you can migrate MongoDB and Cassandra workloads to Cosmos DB.   See other Microsoft courses
objective

At the end of the Migrate NoSQL workloads to Azure Cosmos DB (DP-060T00-A) course, the students will have learned:

  • Building Globally Distributed Applications with Cosmos DB
  • Migrate MongoDB Workloads to Cosmos DB
  • Migrate Cassandra DB Workloads to Cosmos DB

outline

Module 1: Building Globally Distributed Applications with Cosmos DB

This module describes the benefits and architecture of Cosmos DB.

Lessons

  • Cosmos DB overview
  • Cosmos DB APIs
  • Provisioning Throughput
  • Partitioning/Sharding Best Practices

At the end of this module, the students will be able to describe:

  • Cosmos DB overview
  • Cosmos DB APIs
  • Provisioning Throughput
  • Partitioning/Sharding Best Practices

 

Module 2: Migrate MongoDB Workloads to Cosmos DB

Migrate MongoDB Workloads to Cosmos DB.

Lessons

  • Understand Migration Benefits
  • Migration Planning
  • Data Migration
  • Application Migration
  • Post-migration considerations

Lab: Migrating MongoDB Workloads to Cosmos DB

  • Create a Migration Project
  • Define Source and Target
  • Perform Migration
  • Verify Migration

At the end of this module, the students will be able to:

  • Understand Migration Benefits
  • Perform Migration Planning
  • Perform Data Migration
  • Perform Application Migration
  • Undertake Post-migration considerations

Module 3: Migrate Cassandra DB Workloads to Cosmos DB
This module describes the benefits and process of migrating Cassandra DB workloads to Cosmos DB.Lessons

  • Understand Migration Benefits
  • Migration Planning
  • Data Migration
  • Application Migration
  • Post-migration considerations

Lab : Migrating Cassandra DB Workloads to Cosmos DB

  • Export the Schema
  • Move Data Using CQLSH COPY
  • Move Data Using Spark
  • Verify Migration

At the end of this module, the students will be able to:

  • Understand Migration Benefits
  • Perform Migration Planning
  • Perform Data Migration
  • Perform Application Migration
  • Undertake Post-migration considerations

target_au

The primary audience for this course is database developers who plan to migrate their MongoDB or Cassandra DB workloads to Azure using Cosmos DB.


pre_req

In addition to their professional experience, students who attend this training should already have the following technical knowledge:

  • The fundamental concepts of partitioning, replication, and resource governance for building and configuring scalable NoSQL applications that are agnostic of a Cosmos DB API.

titleCourse DP-050T00-A: Migrate SQL workloads to Azure
days2
seo_titleCourse DP-050T00-A: Migrate SQL workloads to Azure
seo_decIn the Migrate SQL workloads to Azure (DP-050T00-A) course, you will explore the objectives of data platform modernization.
seo_tkeyMigrate SQL workloads to Azure
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Migrate SQL workloads to Azure (DP-050T00-A) course, the students will explore the objectives of data platform modernization and how it is suitable for given business requirements. They will also explore each stage of the data platform modernization process and define what tasks are involved at each stage, such as the assessment and planning phase. In this course, students will also learn the available migration tools and how they are suitable for each stage of the data migration process. The student will learn how to migrate to the three target platforms for SQL based workloads; Azure Virtual Machines, Azure SQL Databases and Azure SQL Database Managed Instances. The student will learn the benefits and limitations of each target platform and how they can be used to fulfil both business and technical requirements for modern SQL workloads. The student will explore the changes that may need to be made to existing SQL based applications so that they can make the best use of modern data platforms in Azure.   See other Microsoft courses
objective

After completing the Migrate SQL workloads to Azure (DP-050T00-A) course, students will be able to:

  • Understand Data Platform Modernization
  • Choose the right tools for Data Migration
  • Migrate SQL Workloads to Azure Virtual Machines
  • Migrate SQL Workloads to Azure SQL Databases
  • Migrate SQL Workloads to Azure SQL Database Managed Instance

outline

Module 1: Introducing Data Platform Modernization

In this module, the students will learn the purpose of Data Platform Modernization and they will outline the benefits that data platform modernization can bring to an organization. The students will then learn the various stages of a data platform migration projects to understand what is involved in each stage to maximise the chances of a successful Data Platform Modernization Projects. Finally, students will explore the various data migration paths to understand how each approach is different and why you would choose one migration approach over another.

Lessons

  • Understand Data Platform Modernization
  • Understanding the stages of migration
  • Data Migration Paths

Lab: Introducing Data Platform Modernization

  • Understand Data Platform Modernization
  • Understand the Stages of Migration
  • Data Migration Paths

After completing this module, students will be able to:

  • Understand Data Platform Modernization
  • Understand the Stages of Migration
  • Data Migration Paths

 

Module 2: Choose the right tools for Data Migration

In this module, the student will be introduced to the Data Migration Guide as a starting point for the source of information that your organization should use for step by step guidance for modernizing your existing data platform. They will then learn the value of the Microsoft Assessment and Planning Toolkit to help discover the data assets that currently exist in their environments. The students will then learn the tools that can be used to help them to asses for compatibility or workload issues using both the Data Migration and Data Experimentation Assistant. The students will then see how the Azure Database Migration Service can be used to aid the online migration of databases to reduce the amount of downtime. Finally, an overview of the SQL Migration assistant is provided to show the student how to migrate no-SQL Server workloads.

Lessons

  • Discover the Database Migration Guide
  • Build your data estate inventory using Map Toolkit
  • Identify Migration candidates using Data Migration Assistant
  • Evaluate a Data workload using Database Experimentation Assistant
  • Data Migration using Azure Database Migration Service
  • Migrate non-SQL Server workloads to Azure using SQL Migration Assistant

Lab: Choose the right Tools for Data Migration

  • Identify Migration candidates using Data Migration Assistant
  • Evaluate a Data workload using Database Experimentation Assistant

After completing this module, students will be able to:

  • Identify Migration candidates using Data Migration Assistant
  • Evaluate a Data workload using Database Experimentation Assistant

 

Module 3: Migrating SQL Workloads to Azure Virtual Machines

In this module, the student will learn how to migrate on-premises SQL workloads to Azure Virtual Machines that are running SQL Server. Students will first explore the migration consideration when migrating from on-premises SQL Server to Azure Virtual Machines and the benefits they can gain by performing the migration. They will then learn the different migration options that can be performed when migrating to Azure Virtual Machines. This will include a look at the benefits and limitations of each approach. The students will finally look at SQL Server workloads that include High Availability and Disaster Recovery to ensure service continuity.

Lessons

  • Considerations of SQL Server to Azure VM Migrations
  • SQL Workloads to Azure VM Migration Options
  • Implementing High Availability and Disaster Recovery Scenarios

Lab: Migrating SQL Workloads to Azure Virtual Machines

After completing this module, students will be able to:

  • Considerations of SQL Server to Azure VM Migrations
  • SQL Workloads to Azure VM Migration Options
  • Implementing High Availability and Disaster Recovery Scenarios

 

Module 4: Migrate SQL Workloads to Azure SQL Databases

In this module, the students will explore what is Azure SQL Database and why it is a suitable target for SQL based workloads. It teaches students how to choose the appropriate SQL Server instance option and why it can fulfil business requirements for data platform modernization. The modules will also show students how they can perform both offline and online migrations to Azure SQL Database. By doing so, they can assess which method may be appropriate to their scenarios at work. It will also show the tools that can be used to enable the data migration process. Finally, they will explore the methods that can be used to load data into Azure SQL Database from an on-premises instance.

Lessons

  • Choose the right SQL Server Instance option in Azure
  • Migrate SQL Server to Azure SQL DB offline
  • Load and Move data to Azure SQL Database

Lab: Migrate SQL Workloads to Azure SQL Databases

After completing this module, students will be able to:

  • Choose the right SQL Server Instance option in Azure
  • Migrate SQL Server to Azure SQL DB online
  • Load and Move data to Azure SQL Database

 

Module 5: Migrate SQL Workloads to Azure SQL Database Managed Instance

This module will explore what is an Azure SQL Database Managed Instance and why it is a suitable target for SQL based workloads. They also learn how the Azure SQL Database Managed Instance can fulfil the business requirements for data platform modernization. The students will then explore the tools that can be used to enable the data migration process to Azure SQL Database Managed Instance. They will then explore the methods and tools that can be used to load data into Azure SQL Database Managed Instance from an on-premises instance. Finally, they will learn some of the changes that may need to be made to existing SQL based applications so that they can use Azure SQL Database Managed Instance.

Lessons

  • Evaluate migration scenarios to SQL Database Managed Instance
  • Migrate to SQL Database Managed instance
  • Load and Move data to SQL Database Managed instance
  • Application Configuration and Optimization

Lab: Migrate SQL Workloads to Azure SQL Database Managed Instance

After completing this module, students will be able to:

  • Evaluate migration scenarios to SQL Database Managed Instance
  • Migrate to SQL Database Managed instance
  • Load and Move data to SQL Database Managed instance
  • Application Configuration and Optimization

target_au
  • The audience for this course is data professionals and data architects who want to learn about migrating data platform technologies that exist on Microsoft Azure and how existing SQL based workloads can be migrated and modernized.
  • The secondary audience for this course is individuals who manage data platforms or develop applications that deliver content from the existing data platform technologies.

pre_req

In addition to their professional experience in SQL Server, students who take this training should have technical knowledge equivalent to the following courses:


titleCourse AZ-500T00-A: Microsoft Azure Security Technologies
days4
seo_titleCourse AZ-500T00-A: Microsoft Azure Security Technologies
seo_decIn the Microsoft Azure Security Technologies (AZ-500T00-A) course covers configuring and deploying security solutions for cloud N-tier architecture.
seo_tkeyAZ-500T00-A
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Azure Security Technologies (AZ-500T00-A) course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediation of vulnerabilities by using a variety of security tools. The AZ-500T00-A course covers configuring and deploying security solutions for cloud N-tier architecture.   See other Microsoft courses
objective

After completing the Microsoft Azure Security Technologies (AZ-500T00-A) course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure data protection mechanisms
  • Implement Azure data encryption methods
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features

outline

Module 1: Manage Identity and Access

Gone are the days when security focused on a strong perimeter defence to keep malicious hackers out. Anything outside the perimeter was treated as hostile, whereas inside the wall, an organization’s systems were trusted. Today’s security posture is to assume breach and use the Zero Trust model. Security professionals no longer focus on perimeter defence. Modern organizations have to support access to data and services evenly from both inside and outside the corporate firewall. This module will serve as your roadmap as you start building more security into your Azure solutions.

Lessons

  • Configure Azure AD PIM
  • Configure and manage Azure Key Vault
  • Configure Azure AD for Azure workloads
  • Security for an Azure subscription
After completing this module, students will be able to:
  • Understand the Zero Trust Model.
  • Configure Azure Active Directory for workloads.
  • Configure Azure AD Privileged Identity Management.
  • Configure Azure tenant security.
  • Configure and manage Key Vault.

 

Module 2: Implement Platform Protection

We know that security is job one in the cloud and how important it is that you find accurate and timely information about Azure security. One of the best reasons to use Azure for your applications and services is to take advantage of its wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on the secure Azure platform.

Lessons

  • Understand cloud security
  • Azure networking
  • Secure the network
  • Implementing host security
  • Implement platform security
  • Implement subscription security
After completing this module, students will be able to:
  • Implement network security.
  • Implement host security.
  • Configure container Security.
  • Implement Azure Resource Manager security.

 

Module 3: Secure Data and applications

Azure security for data and applications offers a comprehensive solution that helps organizations take full advantage of the promise of cloud applications while maintaining control with improved visibility into activity. It also increases protection of critical data across cloud applications. With tools to help uncover Shadow IT, assess risk, enforce policies, investigate activities and stop threats, organizations can safely move to the cloud while maintaining control of critical data.

Lessons

  • Configure security policies to manage data
  • Configure security for data infrastructure
  • Configure encryption for data at rest
  • Understand application security
  • Implement security for application lifecycle
  • Secure applications
  • Configure security policies to manage data.
  • Configure security for data infrastructure.
  • Configure encryption for data at rest.
  • Implement security for application delivery.
  • Configure application security.

 

Module 4: Manage Security Operations

Azure provides security mechanisms to aid administrators who manage Azure cloud services and virtual machines. These mechanisms include:

  • Authentication and role-based access control.
  • Monitoring, logging, and auditing.
  • Certificates and encrypted communications.
  • A web management portal.

Lessons

  • Configure security services
  • Configure security policies using Azure Security Center
  • Manage security alerts
  • Respond to remediation of security issues
  • Create security baselines

After completing this module, students will be able to:

  • Configure security services.
  • Configure security policies.
  • Manage security alerts.

target_au
pre_req

Before attending the Microsoft Azure Security Technologies (AZ-500T00-A) course, it is strongly encouraged that:

  • Students have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.
  • Learners acquire the knowledge equivalent to what is assessed as part of the Microsoft Azure Administrator Associate certification.

titleCourse AZ-204T00-A: Developing Solutions for Microsoft Azure
days5
seo_titleCourse AZ-204T00-A: Developing Solutions for Microsoft Azure
seo_decThe Developing Solutions for Microsoft Azure (AZ-204T00-A) course teaches developers how to create end-to-end solutions in Microsoft Azure.
seo_tkeyDeveloping Solutions for Microsoft Azure
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Developing Solutions for Microsoft Azure (AZ-204T00-A) course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.   See other Microsoft courses
objective
outline

Module 1: Creating Azure App Service Web Apps

Students will learn how to build a web application on the Azure App Service platform. They will learn how the platform functions and how to create, configure, scale, secure, and deploy to the App Service platform.

Lessons

  • Azure App Service core concepts
  • Creating an Azure App Service Web App
  • Configuring and Monitoring App Service apps
  • Scaling App Service apps
  • Azure App Service staging environments

 

Module 2: Implement Azure functions

This module covers creating Functions apps, and how to integrate triggers and inputs/outputs into the app.

Lessons

  • Azure Functions overview
  • Developing Azure Functions
  • Implement Durable Functions

 

Module 3: Develop solutions that use blob storage

Students will learn how Azure Blob storage works, how to manage data through the hot/cold/archive blob storage lifecycle, and how to use the Azure Blob storage client library to manage data and metadata.

Lessons

  • Azure Blob storage core concepts
  • Managing the Azure Blob storage lifecycle
  • Working with Azure Blob storage

 

Module 4: Develop solutions that use Cosmos DB storage

Students will learn how Cosmos DB is structured and how data consistency is managed. Students will also learn how to create Cosmos DB accounts and create databases, containers, and items by using a mix of the Azure Portal and the .NET SDK.

Lessons

  • Azure Cosmos DB overview
  • Azure Cosmos DB data structure
  • Working with Azure Cosmos DB resources and data

 

Module 5: Implement IaaS solutions

This module instructs students on how to use create VMs and container images to use in their solutions. It covers creating VMs, using ARM templates to automate resource deployment, create and manage Docker images, publishing an image to the Azure Container Registry, and running a container in Azure Container Instances.

Lessons

  • Provisioning VMs in Azure
  • Create and deploy ARM templates
  • Create container images for solutions
  • Publish a container image to Azure Container Registry
  • Create and run container images in Azure Container Instances

 

Module 6: Implement user authentication and authorization

Students will learn how to leverage the Microsoft Identity Platform v2.0 to manage authentication and access to resources. Students will also learn how to use the Microsoft Authentication Library and Microsoft Graph to authenticate a user and retrieve information stored in Azure, and how and when to use Shared Access Signatures.

Lessons

  • Microsoft Identity Platform v2.0
  • Authentication using the Microsoft Authentication Library
  • Using the Microsoft Graph
  • Authorizing data operations in Azure Storage

 

Module 7: Implement secure cloud solutions

This module covers how to secure the information (keys, secrets, certificates) an application uses to access resources. It also covers securing application configuration information.

Lessons

  • Manage keys, secrets, and certificates by using the KeyVault API
  • Implement Managed Identities for Azure resources
  • Secure app configuration data by using the Azure App Configuration

 

Module 8: Implement API Management

Students will learn how to publish APIs, create policies to manage information shared through the API, and to manage access to their APIs by using the Azure API Management service.

Lessons

  • API Management overview
  • Defining policies for APIs
  • Securing your APIs

 

Module 9: Develop App Service Logic Apps

This module teaches students how to use Azure Logic Apps to schedule, automate, and orchestrate tasks, business processes, workflows, and services across enterprises or organizations.

Lessons

  • Azure Logic Apps overview
  • Creating custom connectors for Logic Apps

 

Module 10: Develop event-based solutions

Students will learn how to build applications with event-based architectures.

Lessons

  • Implement solutions that use Azure Event Grid
  • Implement solutions that use Azure Event Hubs
  • Implement solutions that use Azure Notification Hubs

 

Module 11: Develop message-based solutions

Students will learn how to build applications with message-based architectures.

Lessons

  • Implement solutions that use Azure Service Bus
  • Implement solutions that use Azure Queue Storage queues

 

Module 12: Monitor and optimize Azure solutions

This module teaches students how to instrument their code for telemetry and how to analyze and troubleshoot their apps.

Lessons

  • Overview of monitoring in Azure
  • Instrument an app for monitoring
  • Analyzing and troubleshooting apps
  • Implement code that handles transient faults

 

Module 13: Integrate caching and content delivery within solutions

Students will learn how to use different caching services to improve the performance of their apps.

Lessons

  • Develop for Azure Cache for Redis
  • Develop for storage on CDNs

target_au

Students in attending the Developing Solutions for Microsoft Azure (AZ-204T00-A) course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam.


pre_req

Before attending the Developing Solutions for Microsoft Azure (AZ-204T00-A) course, students must have:

  • One to two years of professional development experience and experience with Microsoft Azure;
  • Be able to program in an Azure Supported Language.

titleCourse AZ-103T00-A: Microsoft Azure Administrator
days4
seo_titleCourse AZ-103T00-A: Microsoft Azure Administrator | Insoft Services
seo_decThe Microsoft Azure Administrator ( AZ-103T00-A) course teaches how to manage their Azure subscriptions, create and scale VMs and monitor your solutions.
seo_tkeyMicrosoft Azure Administrator
categoryazure
vendorMicrosoft

techonogyIT Systems and Security
overviewThe Microsoft Azure Administrator (AZ-103T00-A) course teaches IT Professionals how to manage their Azure subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution.   The correspondent exam, AZ-101, has been retired. See other Microsoft courses
objective
outline

Module 1: Azure Administration

In this module, you’ll learn about to tooling Azure Administrator uses to manage their infrastructure. This includes the Azure Portal, Cloud Shell, Azure PowerShell, CLI, Resource Manager, and Resource Manager Templates. The demonstrations in this module will ensure you are successful in the course labs.

Lessons

  • Azure Portal and Cloud Shell
  • Azure PowerShell and CLI
  • Resource Manager
  • ARM Templates

 

Module 2: Azure Virtual Machines

In this module, you’ll learn about Azure virtual machines including planning, creating, availability and extensions.

Lessons

  • Virtual Machine Planning
  • Creating Virtual Machines
  • Virtual Machine Availability
  • Virtual Machine Extensions

Lab: Deploy and Manage Virtual Machines

Lab: Virtual Machines and Scale Sets

 

Module 3: Azure Storage

In this module, you’ll learn about basic storage features including storage accounts, blob storage, Azure files, and storage security.

Lessons

  • Storage Accounts
  • Azure Blobs
  • Azure Files
  • Storage Security

Lab: Implement and Manage Storage

 

Module 4: Virtual Networking

In this module, you’ll learn about basic virtual networking concepts like virtual networks, IP addressing, Azure DNS, and network security groups.

Lessons

  • Virtual Networks
  • IP Addressing and Endpoints
  • Azure DNS
  • Network Security Groups

Lab: Configure Azure DNS

 

Module 5: Intersite Connectivity

In this module, you’ll learn about intersite connectivity features including VNet Peering, VNet-to-VNet connections, Site-to-Site Connections, and ExpressRoute.

Lessons

  • VNet Peering
  • VNet-to-VNet Connections
  • ExpressRoute Connections

Lab: VNet Peering and Service Chaining

 

Module 6: Monitoring

In this module, you’ll learn about monitoring your Azure infrastructure including Azure Monitor, alerting, log analytics, and Network Watcher.

Lessons

  • Azure Monitor
  • Azure Alerts
  • Log Analytics
  • Network Watcher

Lab: Network Watcher

 

Module 7: Data Protection

In this module, you’ll learn about data replication strategies, backing up files and folders, and virtual machine backups.

Lessons

  • Data Replication
  • File and Folder Backups
  • Virtual Machine Backups

Lab: Azure Site Recovery Between Regions

 

Module 8: Network Traffic Management

In this module, you’ll learn about network traffic strategies including service endpoints, network routing, Azure Load Balancer, and Azure Traffic Manager.

Lessons

  • Network Routing
  • Azure Load Balancer
  • Azure Traffic Manager

Lab: Load Balancer and Traffic Manager

 

Module 9: Azure Active Directory

In this module, you’ll learn about Azure Active Directory (AD) including Azure AD Connect and Azure AD Join.

Lessons

  • Azure Active Directory
  • Azure AD Connect
  • Azure AD Join

Lab: Implement Directory Synchronization

 

Module 10: Securing Identities

In this module, you’ll learn how to secure identities including Multi-Factor Authentication, Azure AD Identity Protection, and Self-Service Password Reset.

Lessons

  • Multi-Factor Authentication
  • Azure AD Identity Protection
  • Self-Service Password Reset

Lab: Azure AD Identity Protection

Lab: Self-Service Password Reset

 

Module 11: Governance and Compliance

In this module, you’ll learn about managing your subscriptions and accounts including role-based access control, users and groups, and Azure policy.

Lessons

  • Subscriptions and Accounts
  • Role-Based Access Control (RBAC)
  • Users and Groups
  • Azure Policy

Lab: Role-Based Access Control

Lab: Governance and Compliance

 

Module 12: Data Services

In this module, you’ll learn how to effectively share data using Import and Export service, Data Box, Content Delivery Network, and File Sync.

Lessons

  • Content Delivery Network
  • File Sync
  • Import and Export Service
  • Data Box

Lab: File Sync


target_au

The Microsoft Azure Administrator (AZ-103T00-A) course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle.

They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.


pre_req

Before attending the Microsoft Azure Administrator (AZ-103T00-A) course, students must have:

  • Understanding of on-premises virtualization technologies, including VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
  • Understanding of resilience and disaster recovery, including backup and restore operations.

titleCourse AZ-010T00-A: Azure Administration for AWS SysOps
days2
seo_titleCourse AZ-010T00-A: Azure Administration for AWS SysOps
seo_decThe Azure Administration for AWS SysOps (AZ-010T00-A) course teaches how Azure is different from AWS and how Azure is administered.
seo_tkeyAzure Administration for AWS SysOps
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Azure Administration for AWS SysOps (AZ-010T00-A) course is a two-day instructor-led training designed for AWS Sysops administrators interested in learning how Azure is different from AWS, and how Azure is administered. The workshops main topics are Azure Administration, Azure Networking, Azure Compute, Azure Storage, and Azure Governance. This workshop combines lecture with hands-on practical exercises and discussion/review. During the workshop, students will build an end-to-end architecture that demonstrates the main features discussed in the course.   See other Microsoft courses
objective
outline

Module 1: Azure Administration

In this module, you’ll learn about the tools and principle concepts needed to administer Azure. Topics include Resource Manager, Resource Groups, Azure Portal, Azure CLI, Azure Templates, Cloud Shell, Azure Marketplace, and Azure PowerShell.

Module 2: Azure Networking
In this module, you’ll learn about Azure networking features. Topics include: Azure Regions, Virtual Networks and Subnets, IP Addressing, Network Security Groups, Virtual Network Peering, VNet-to-VNet Connections, ExpressRoute, Load Balancers, and Network Watcher.
Module 3: Azure Compute
In this module, you’ll learn about configuring and monitoring Azure virtual machines. Topics include: Azure Virtual Machines, Creating Virtual Machines, Virtual Machine Sizes, Virtual Machine Disks, Availability Zones, Availability Sets, Windows VM Connections, Linux VM Connections, Azure Monitor, and Azure Alerts.
Module 4: Azure Storage
In this module, you’ll learn about Azure storage features and implementation. Topics include: Storage Accounts, Blob Storage, Blob Performance Tiers, File Shares, File Sync, Data Box, Content Delivery Network, Shared Access Signatures, and Service Endpoints.
Module 5: Azure Identity
In this module, you’ll learn about Azure identity solutions. Topics include: Azure Domains, Role-based Access Control, Azure Active Directory, Multi-Factor Authentication, Azure AD Identity Protection, and Azure Policy.


target_au

The audience for the Azure Administration for AWS SysOps (AZ-010T00-A) course is

  • AWS Sysops Administrator Associate or equivalent. This person has one to two years of experience in AWS deployment, management, and operations. Students taking this course are interested in learning how Azure is different from AWS, and how Azure is administered.
  • Students may also be interested in taking the AZ-103 Microsoft Azure Administrator certification exam, or the AZ-900 Azure Fundamentals exam.

pre_req
Successful AWS Sysops start this course with experience in operating systems, virtualization, cloud infrastructure, storage structures, identity solutions, and networking. Specifically, students should have:
  • Working knowledge of how to construct CLI commands, including using the help pages to determine appropriate parameters and command structure.
  • Understanding of virtual network concepts, Domain Name System (DNS), virtual private networks (VPNs), firewalls, gateways, and encryption technologies.
  • Understanding of virtual machines, how they are used, and configuration options like CPU performance and disks.
  • Understanding virtual storage concepts such as storage accounts, blobs, file shares, and disk types.
  • Understanding of governance concepts, including role-based access control, identity management, and identity protection.

titleCourse MB-901T00-A: Microsoft Dynamics 365 Fundamentals
days2
seo_titleMicrosoft Dynamics 365 Fundamentals (MB-901T00-A) | Insoft UK
seo_decThe Microsoft Dynamics 365 Fundamentals (MB-901T00-A) course introduces you each of the applications, articulate business value and demo core functionality.
seo_tkeyMicrosoft Dynamics 365 Fundamentals
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365 Fundamentals (MB-901T00-A) course provides learners with a broad overview of Dynamics 365 applications. We will introduce you to each of the applications, articulate their business value, and discuss and demo core functionality. We will cover Dynamics 365 security, reporting, and familiarize you with data and product integrations available.   See other Microsoft courses
objective

After completing the Microsoft Dynamics 365 Fundamentals course, students will be able to:

  • Distinguish between the different Dynamics 365 applications
  • Articulate the business value and core functionality of the Dynamics 365 apps
  • Describe artificial intelligence (AI) and mixed reality (MR)
  • Define the digital transformation loop
  • Describe cloud-based security
  • Summarize role-based security in Dynamics 365
  • Explain Dynamics 365 reporting options
  • Give examples of cross-Dynamics app integration
  • Describe Office 365 and Dynamics 365 integration

outline

Module 1: Introduction to Microsoft Dynamics 365

We help you explore and evaluate the Dynamics 365 applications that empower employees, engage customers, and optimize operations. You’ll be introduced to Dynamics 365 with a holistic view of the whole application.

Lessons

  • Introduction
  • Dynamics 365 Applications
  • What is Artificial intelligence (AI)?
  • What is a mixed reality (MR)?
  • Digital Transformation
  • Summary

After completing this module you will be able to:

  • Identify the Dynamics 365 Business Applications
  • Understand the role of Artificial Intelligence (AI) and mixed reality (MR) in Dynamics 365
  • Explain digital transformation
  • Recognize how the Dynamics 365 apps support digital transformation

 

Module 2: Principles of cloud computing and deployment

In this module, we help you understand the principle of cloud computing and explore deployment options for Dynamics 365 business applications.

Lessons

  • Introduction
  • What is cloud computing?
  • Benefits of cloud computing
  • Compliance, terms and requirements
  • Types of cloud services
  • Deployment
  • Azure DevOps
  • Microsoft Dynamics Lifecycle Services (LCS)
  • Explore Power Platform Admin Center
  • Summary

After completing this module you will be able to:

  • Describe cloud computing and its benefits
  • Understand deployment options for Dynamics 365 applications
  • Articulate cloud services compliance and compliance requirements
  • Describe the types of cloud services
  • Explain Azure DevOps and Lifecycle Services (LCS)

 

Module 3: Recognize Dynamics 365 Security

Dynamics 365 and the Power Platform are built with security, privacy, compliance, and transparency in mind. Microsoft Cloud security safeguards your cross-cloud resources. It helps secure infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It quickly finds vulnerabilities in your apps to provide better defense. In this module, we help you understand and learn data loss prevention which is part of the overall layers of security that the power platform at Dynamics 365 offers.

Lessons

  • Introduction
  • Dynamics 365 cloud security
  • Cloud security basics
  • Understanding role-based security
  • Security in Finance and Operations apps
  • Summary
  • Lab: Explore security roles in Dynamics 365 model-driven apps
  • Lab: Explore security roles in Finance and Operations apps
  • Lab: Enhance security by encrypting your data

After completing this module you will be able to:

  • Describe Dynamics 365 cloud security
  • Describe Dynamics 365 role-based security

 

Module 4: Connect and analyze your Dynamics 365 data

How can business leaders make important and correct decisions in their business without the accurate insights of the underlying financial and operational data running their business? With no visibility, it would be Impossible! In this module, we will help you understand reporting and analytics in Dynamics 365 business applications.

Lessons

  • Introduction
  • The use of Microsoft Power Platform in Dynamics 365
  • Benefits of Common Data Service
  • Dynamics 365 reporting
  • Summary
  • Lab: Explore Power Platform Admin CenterAfter completing this module you will be able to:
  • Describe the use of Power Platform in Dynamics 365
  • Articulate the benefits of Common Data Service
  • Explain Dynamics 365 reporting

 

Module 5: Introduction to Dynamics 365 Sales

In this module, we will introduce you to Dynamics 365 Sales, which enables salespeople to build strong relationships with their customers, take actions based on insights, and close sales faster.

Lessons

  • Introduction
  • Automation of business processes with Dynamics 365 Sales
  • Manage the sales process and pipeline
  • Benefits of Microsoft Relationship Sales Solution (MRSS)
  • Dynamics 365 Sales Insights
  • Microsoft Forms Pro
  • Dynamics 365 Product Visualize
  • Summary
  • Lab: Explore Dynamics 365 Sales
  • Create or edit quotes
  • Create or edit orders
  • Create or edit invoices

After completing this module you will be able to:

  • Describe Dynamics 365 sales automation
  • Articulate how to manage the sales process in Dynamics 365 Sales
  • Discover Microsoft Relationship Sales Solution (MRSS)
  • Explain the business value of Dynamics 365 Sales Insights
  • Explain the business value of Microsoft Forms Pro

 

Module 6: Introduction to Dynamics 365 Marketing

In this module, we will introduce you to Dynamics 365 Marketing and show how Dynamics 365 Marketing is designed to help you find and nurture the right leads. You can run multi-channel marketing campaigns to attract the right prospects. That means email, web, events, text messaging, and custom channels.

Lessons

  • Introduction
  • The benefits of Dynamics 365 Marketing
  • Features and functionality of Dynamics 365 Marketing
  • Lead generation and qualification
  • Customer journey
  • Segmentation
  • Event management
  • Summary
  • Lab: Explore Dynamics 365 Marketing
  • Create engaging emails
  • Pinpoint your audience
  • Build a campaign

After completing this module you will be able to:

  • Articulate the benefits of using Dynamics 365 Marketing
  • Describe the features and functionality of Dynamics 365 Marketing
  • Describe a Customer journey

 

Module 7: Introduction to Dynamics 365 Customer Service

Excellent customer service creates happy customers. The built-in intelligence of Dynamics 365 Customer Service delivers faster, more personalized support that adds value to every interaction. In this module, we will introduce you to how Marketing manages customer expectations and provides the necessary tools so organizations can keep their customers happy, especially when something doesn’t go exactly as planned.

Lessons

  • Introduction
  • Overview of Dynamics 365 Customer Service
  • Account Management
  • Case lifecycle management
  • Knowledge articles
  • Omnichannel for Dynamics 365 Customer Service
  • PowerApps Portals
  • Dynamics 365 Customer Service Insights
  • Summary
  • Lab: Explore Dynamics 365 Customer Service
  • Create and manage a case

After completing this module you will be able to:

  • Present an overview of Dynamics 365 Customer Service
  • Discuss the core capabilities of Dynamics 365 Customer Service
  • Explain the value of Dynamics 365 Customer Service Insights

 

Module 8: Introduction to Dynamics 365 Field Service

In this module, we will introduce you to Dynamics 365 Field Service. You will learn how Field Service helps organizations deliver seamless end-to-end service experience, where world-class Customer Relationship Management (CRM) capabilities converge with powerful machine learning, mixed reality, and IoT technology to create a single, integrated solution that is transforming field service management.

Lessons

  • Introduction
  • Benefits of Dynamics 365 Field Service
  • Connected Field Service
  • Service resource scheduling
  • Resource Scheduling Optimization (RSO)
  • Field Service Mobile
  • Dynamics 365 Remote Assist
  • Dynamics 365 Guides
  • Summary

After completing this module you will be able to:

  • Describe the benefits of Dynamics 365 Field Service
  • Explain Connected Field Service
  • Discover Dynamics 365 Remote Assist
  • Discover Dynamics 365 Guides

 

Module 9: Explore model-driven app integrations and Dynamics 365 Customer Insights

Model-driven apps integrate across the Microsoft product’s stack. Using connectors, it is also possible to integrate with hundreds of other software offerings available in AppSource. In this module, we will introduce you to the integrations available to model-driven apps.

Lessons

  • Introduction
  • Integration across Dynamics 365 applications
  • Integration with Microsoft products
  • Integration with third-party applications
  • Dynamics 365 Customer Insights
  • Summary

After completing this module you will be able to:

  • Explain how Dynamics 365 model-driven app integrate
  • Describe Office 365 integrations
  • Identify third-party integrations
  • Describe Dynamics 365 Customer Insights
  • Recognize Adobe Experience Cloud

 

Module 10: Introduction to Dynamics 365 Finance

Succeeding in today’s business environment requires leveraging technology to manage finances across the globe, monitor performance in real-time, automate and simplify functions, protect future business outcomes, and maximize productivity. In this module, we will introduce you to Dynamics 365 Finance, Microsoft’s financial management business application that enables medium and enterprise organizations to monitor the performance of global financial operations in real-time, predict future outcomes, and make data-driven decisions to drive growth.

Lessons

  • Introduction
  • Overview of Dynamics 365 Finance
  • Dynamics 365 Finance core capabilities
  • Summary
  • Lab: Explore Dynamics 365 FinanceAfter completing this module you will be able to:
  • Describe the benefits of Dynamics 365 Finance
  • Provide a high-level overview of Dynamics 365 Finance
  • Explain the Accounts receivable and payable functions in Dynamics 365 Finance

 

Module 11: Introduction to Dynamics 365 Supply Chain Management

Manufacturing and distributors are transforming to smart factories and warehouses, where human intelligence is enhanced by Artificial Intelligence (AI), advanced robotics, Internet of Things (IoT) and Machine Learning (ML) are speeding production while lowering the defects. In this module, we will introduce you to Dynamics 365 Supply Chain Management, which empowers employees of a business to get a unified view of inventory, warehouse, manufacturing, service, and logistics with predictive analytics that turn data into insights to support better strategic decisions.

Lessons

  • Introduction
  • Overview of Dynamics 365 Supply Chain Management
  • Dynamics 365 Supply Chain Management core capabilities
  • Dynamics 365 Layout
  • Summary
  • Lab: Explore Dynamics 365 Supply Chain Management
  • Create a product
  • Create product masters
  • Create a purchase order
  • Create sales orders

After completing this module you will be able to:

  • Describe the benefits of Dynamics 365 Supply Chain Management
  • Provide a high-level overview of Dynamics 365 Supply Chain Management
  • Articulate the value of Asset management
  • Discuss Dynamics 365 Layout

 

Module 12: Introduction to Dynamics 365 Business Central

Dynamics 365 Business Central is a comprehensive business management solution that helps connect data, people, and processes. It is designed for small and medium businesses that have outgrown their existing management tools and need to streamline and improve their operations. In this module, we will introduce you to how Dynamics 365 Business Central automatically pulls systems and processes together, enabling users to manage integrated financials, sales, service, and operations.

Lessons

  • Introduction
  • Overview of Dynamics 365 Business Central
  • Finance and budgeting
  • Supply chain management
  • Project management
  • Sales and service
  • When should you use Business Central versus other Dynamics 365 applications?
  • Summary

After completing this module you will be able to:

  • Explore common use cases for Dynamics 365 Business Central
  • Discover when to leverage Business Central versus other Dynamics 365 products

 

Module 13: Introduction to Dynamics 365 Human Resources

The workforce is changing and competition for top talent is fierce! HR leaders are struggling to find and hire the right candidates for the job, and the hiring process is more complicated than ever before. In this module, we will introduce you to Dynamics 365 Human Resources.

Lessons

  • Introduction
  • Overview of Dynamics 365 Human Resources
  • Employee Self-service
  • Personnel management
  • Benefits management
  • Employee development
  • Summary
  • Lab: Explore Dynamics 365 Human Resources
  • Create a job

After completing this module you will be able to:

  • Discover the Human Resources tools that help drive operational efficiency
  • Explore the features and functionality of Human Resources

 

Module 14: Introduction to Dynamics 365 Commerce

Customer shopping is no longer limited to a moment in time. Engagement starts well before customers reach your store or website and the nature of our interaction with customers has also changed. Customers are no longer looking to sales associates for product details, but rather engage retailers when they are already significantly down the track of the purchase journey. Along with this shift comes a new expectation from customers that their purchasing experience needs to be personalized, engaging, and friction-free. This experience is only possible by bringing together digital and physical shopping channels to delivering personalized and differentiated experiences that enable a competitive edge and build brand loyalty. In this module, we will introduce you to Dynamics 365 Commerce.

Lessons

  • Introduction
  • Overview of Dynamics 365 Commerce
  • Omnichannel and Channel management
  • Dynamics 365 Commerce core functional areas
  • Assisted Selling
  • Merchandizing and inventory
  • Dynamics 365 Commerce deployment options
  • Dynamics 365 Fraud Protection
  • Summary

After completing this module you will be able to:

  • Provide a high-level overview of Dynamics 365 Commerce
  • Discover deployment options
  • Describe Dynamics 365 Fraud Protection
  • Explore omnichannel

 

Module 15: Explore Finance and Operations cross-app integrations

In this module, we help you make the right design decision when you implement integration scenarios in Microsoft Dynamics 365 Finance and Supply Chain Management.

Lessons

  • Introduction
  • Integration across Dynamics 365 apps
  • Discover the Data Management Framework
  • Integrations across Microsoft products
  • Integrations with third-party apps
  • Explore external system integration capabilities
  • Summary

After completing this module you will be able to:

  • Describe the data management framework
  • Explain Office 3565 integrations
  • Explore external system integration capabilities

target_au

The Microsoft Dynamics 365 Fundamentals (MB-901T00-A) course is targeted to learners who want to acquire a solid grounding in the fundamentals of Dynamics 365.


pre_req
titleCompTIA PenTest+
days5
seo_titlePenTest+ CompTIA Training (Exam PT0-001) | Insoft Services
seo_decIn the PenTest+ CompTIA (Exam PT0-001) course In this course, you will be introduced to some general concepts and methodologies related to pen testing.
seo_tkeyPenTest+
categorynetwork-security-courses
vendorComptia

techonogySecurity
overviewThe CompTIA PenTest+ course can also assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-001. The course is designed to provide content and activities that correlate to the exam objectives, and therefore can be a resource as you prepare for the examination. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and even more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.   See other CompTIA courses
objective

After you complete this course, you will be able to:

  • Plan, conduct, analyze, and report on penetration tests.
  • Plan and scope penetration tests.
  • Conduct passive reconnaissance.
  • Perform non-technical tests to gather information.
  • Conduct active reconnaissance.
  • Analyze vulnerabilities.
  • Penetrate networks.
  • Exploit host-based vulnerabilities.
  • Test applications.
  • Complete post-exploit tasks.
  • Analyze and report pen test results.

outline

Lesson 1: Planning and Scoping Penetration Tests

  • Topic A: Introduction to Penetration Testing Concepts
  • Topic B: Plan a Pen Test Engagement
  • Topic C: Scope and Negotiate a Pen Test Engagement
  • Topic D: Prepare for a Pen Test Engagement

Lesson 2: Conducting Passive Reconnaissance

  • Topic A: Gather Background Information
  • Topic B: Prepare Background Findings for Next Steps

Lesson 3: Performing Non-Technical Tests

  • Topic A: Perform Social Engineering Tests
  • Topic B: Perform Physical Security Tests on Facilities

Lesson 4: Conducting Active Reconnaissance

  • Topic A: Scan Networks
  • Topic B: Enumerate Targets
  • Topic C: Scan for Vulnerabilities
  • Topic D: Analyze Basic Scripts

Lesson 5: Analyzing Vulnerabilities

  • Topic A: Analyze Vulnerability Scan Results
  • Topic B: Leverage Information to Prepare for Exploitation

Lesson 6: Penetrating Networks

  • Topic A: Exploit Network-Based Vulnerabilities
  • Topic B: Exploit Wireless and RF-Based Vulnerabilities
  • Topic C: Exploit Specialized Systems

Lesson 7: Exploiting Host-Based Vulnerabilities

  • Topic A: Exploit Windows-Based Vulnerabilities
  • Topic B: Exploit *nix-Based Vulnerabilities

Lesson 8: Testing Applications

  • Topic A: Exploit Web Application Vulnerabilities
  • Topic B: Test Source Code and Compiled Apps

Lesson 9: Completing Post-Exploit Tasks

  • Topic A: Use Lateral Movement Techniques
  • Topic B: Use Persistence Techniques
  • Topic C: Use Anti-Forensics Techniques

Lesson 10: Analyzing and Reporting Pen Test Results

  • Topic A: Analyze Pen Test Data
  • Topic B: Develop Recommendations for Mitigation Strategies
  • Topic C: Write and Handle Reports
  • Topic D: Conduct Post-Report-Delivery Activities

target_au
  • This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course.
  • This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-001, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management.

pre_req

To ensure your success in this course, you should have:

  • Intermediate knowledge of information security concepts, including but not limited to identity and access management (IAM), cryptographic concepts and implementations, computer networking concepts and implementations, and common security technologies.
  • Practical experience in securing various computing environments, including small to medium businesses, as well as enterprise environments.

titleCySA+ CompTIA Cybersecurity Analyst
days5
seo_titleCySA+ Training: CompTIA Cybersecurity Analyst CS0-001 | Insoft Services
seo_decThe CySA+ CompTIA Cybersecurity Analyst (Exam CS0-001) course introduces tools and tactics to manage cybersecurity risks and identifying common threats.
seo_tkeyCySA+
categorycybersecurity-courses
vendorComptia

techonogySecurity
overviewThis CompTIA Cybersecurity Analyst (CySA+) training course will prepare you to successfully achieve this in-demand certification with hands-on, scenario-based training so you'll be ready to meet advanced persistent threats (APTs) head on. In this certification training course, you will gain the foundational knowledge to fully prepare for the CySA+ exam (CS0-002). This is an intermediate certification that is part of the CompTIA certification pathway, fitting in between the Network+ & CASP certifications. Achieving this certification validates that you have the skills as a cybersecurity analyst, that you can take an analytical approach to cybersecurity, and have the knowledge of network security tools and techniques to combat threats.   See other CompTIA courses
objective

The CompTIA CySA+ certification is a vendor-neutral credential. The CompTIA CySA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technical, “hands-on” focus on IT security analytics.

The CompTIA CySA+ exam is based on these objectives:
Threat Management
Vulnerability Management

  • Cyber Incident Response
  • Security Architecture and Tool Sets

outline

Threat Management

  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
  • Procedures/common tasks: 
  • Topology discovery
  • OS fingerprinting
  • Service discovery
  • Packet capture
  • Log review
  • Router/firewall ACLs review
  • Email harvesting
  • Social media profiling
  • Social engineering
  • DNS harvesting
  • Phishing
  • Variables:
  • Wireless vs. wired
  • Virtual vs. physical
  • Internal vs. external
  •  On-premises vs. cloud
  • Tools:
  •  NMAP
  •  Host scanning
  •  Network mapping
  •  NETSTAT
  •  Packet analyzer
  •  IDS/IPS
  •  HIDS/NIDS
  •  Firewall rule-based and logs
  •  Syslog
  •  Vulnerability scanner
  • Given a scenario, analyze the results of a network reconnaissance
  • Point-in-time data analysis: 
  • Packet analysis
  • Protocol analysis
  • Traffic analysis
  • Netflow analysis
  • Wireless analysis
  • Data correlation and analytics: 
  • Anomaly analysis
  • Trend analysis
  • Availability analysis
  • Heuristic analysis
  • Behavioral analysis
  • Data output: 
  • Firewall logs
  • Packet captures
  • NMAP scan results
  • Event logs
  • Syslogs
  • IDS report
  • Tools: 
  • SIEM
  • Packet analyzer
  • IDS
  • Resource monitoring tool
  • Netflow analyzer
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure
  • Network segmentation: 
  • System isolation
  • Jump box
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs: 
  • Sinkhole
  • Hardening:
  • Mandatory Access Control (MAC)
  • Compensating controls
  • Blocking unused ports/services
  • Patching
  • Network Access Control (NAC): 
  • Time-based
  • Rule-based
  • Role-based
  • Location-based
  • Explain the purpose of practices used to secure a corporate environment
  • Penetration testing: 
  • Rules of engagement
  • Reverse engineering: 
  • Isolation/sandboxing
  • Hardware
  • Software/malware
  • Training and exercises: 
  • Red team
  • Blue team
  • White team
  • Risk evaluation: 
  • Technical control review
  • Operational control review
  • Technical impact and likelihood

2. Vulnerability Management

  • Given a scenario, implement an information security vulnerability management process
  • Identification of requirements: 
  • Regulatory environments
  • Corporate policy
  • Data classification
  • Asset inventory
  • Establish scanning frequency:
  • Risk appetite
  • Regulatory requirements
  • Technical constraints
  • Workflow
  • Configure tools to perform scans according to specification: 
  • Determine scanning criteria
  • Tool updates/plug-ins
  • Permissions and access
  • Execute scanning
  • Generate reports:
  • Automated vs. manual distribution
  • Remediation:
  • Prioritizing
  • Communication/change control
  • Sandboxing/testing
  • Inhibitors to remediation
  • Ongoing scanning and continuous monitoring
  • Given a scenario, analyze the output resulting from a vulnerability scan
  • Analyze reports from a vulnerability scan: 
  • Review and interpret scan results
  • Validate results and correlate other data points
  • Compare to best practices or compliance
  • Reconcile results
  • Review related logs and/or other data sources
  • Determine trends
  • Compare and contrast common vulnerabilities found in the following targets within an organization
  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure:
  • Virtual hosts
  • Virtual networks
  • Management interface
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices

3. Cyber Incident Response

  • Given a scenario, distinguish threat data or behavior to determine the impact of an incident
  • Threat classification: 
  • Known threats vs. unknown threats
  • Zero day
  • Advanced persistent threat
  • Factors contributing to incident severity and prioritization: 
  • Scope of impact
  • Types of data
  • Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
  • Forensics kit: 
  • Digital forensics workstation
  • Write blockers
  • Cables
  • Drive adapters
  • Wiped removable media
  • Cameras
  • Crime tape
  • Tamper-proof seals
  • Documentation/forms
  • Forensic investigation suite:
  • Imaging utilities
  • Analysis utilities
  • Chain of custody
  • Hashing utilities
  • OS and process analysis
  • Mobile device forensics
  • Password crackers
  • Cryptography tools
  • Log viewers
  • Explain the importance of communication during the incident response process
  • Stakeholders:
  • HR
  • Legal
  • Marketing
  • Management
  • Purpose of communication processes:
  • Limit communication to trusted parties
  • Disclosure based on regulatory/legislative requirements
  • Prevent inadvertent release of information
  • Secure method of communication
  • Role-based responsibilities:
  • Technical
  • Management
  • Law enforcement
  • Retain incident response provider
  • Given a scenario, analyze common symptoms to select the best course of action to support incident response
  • Common network-related symptoms:
  • Bandwidth consumption
  • Beaconing
  • Irregular peer-to-peer communication
  • Rogue devices on the network
  • Scan sweeps
  • Unusual traffic spikes
  • Common host-related symptoms:
  • Processor consumption
  • Memory consumption
  • Drive capacity consumption
  • Unauthorized software
  • Malicious processes
  • Unauthorized changes
  • Unauthorized privileges
  • Data exfiltration
  • Common application-related symptoms:
  • Anomalous activity
  • Introduction of new accounts
  • Unexpected output
  • Unexpected outbound communication
  • Service interruption
  • Memory overflows
  • Summarize the incident recovery and post-incident response process
  • Containment techniques:
  • Segmentation
  • Isolation
  • Removal
  • Reverse engineering
  • Eradication techniques:
  • Sanitization
  • Reconstruction/reimage
  • Secure disposal
  • Validation:
  • Patching
  • Permissions
  • Scanning
  • Verify logging/communication to security monitoring
  • Corrective actions:
  • Lessons learned report
  • Change control process
  • Update incident response plan
  • Incident summary report

4. Security Architecture and Tool Sets

  • Explain the relationship between frameworks, common policies, controls, and procedures
  • Regulatory compliance
  • Frameworks:
  • NIST
  • ISO
  • COBIT
  • SABSA
  • TOGAF
  • ITIL
  • Policies:
  • Password policy
  • Acceptable use policy
  • Data ownership policy
  • Data retention policy
  • Account management policy
  • Data classification policy
  • Controls:
  • Control selection based on criteria
  • Organizationally defined parameters
  • Physical controls
  • Logical controls
  • Administrative controls
  • Procedures:
  • Continuous monitoring
  • Evidence production
  • Patching
  • Compensating control development
  • Control testing procedures
  • Manage exceptions
  • Remediation plans
  • Verifications and quality control:
  • Audits
  • Evaluations
  • Assessments
  • Maturity model
  • Certification
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management
  • Security issues associated with context-based authentication:
  • Time
  • Location
  • Frequency
  • Behavioral
  • Security issues associated with identities:
  • Personnel
  • Endpoints
  • Servers
  • Services
  • Roles
  • Applications
  • Security issues associated with identity repositories:
  • Directory services
  • TACACS+
  • RADIUS
  • Security issues associated with federation and single sign-on:
  • Manual vs. automatic provisioning/deprovisioning
  • Self-service password reset
  • Exploits:
  • Impersonation
  • Man-in-the-middle
  • Session hijack
  • Cross-site scripting
  • Privilege escalation
  • Rootkit
  • Given ascenario, review security architecture and make recommendations to implement compensating controls
  • Security data analytics:
  • Data aggregation and correlation
  • Trend analysis
  • Historical analysis
  • Manual review: 
  • Firewall log
  • Syslogs
  • Authentication logs
  • Event logs
  • Defense in depth:
  • Personnel
  • Processes
  • Technologies
  • Other security concepts
  • Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
  • Best practices during software development:
  • Security requirements definition
  • Security testing phases
  • Manual peer reviews
  • User acceptance testing
  • Stress test application
  • Security regression testing
  • Input validation
  • Secure coding best practices:
  • OWASP
  • SANS
  • Center for Internet Security
  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
  • Preventative:
  • IPS
  • HIPS
  • Firewall
  • Antivirus
  • Anti-malware
  • EMET
  • Web proxy
  • Web Application Firewall (WAF)
  • Collective:
  • SIEM
  • Network scanning
  • Vulnerability scanning
  • Packet capture
  • Command line/IP utilities
  • IDS/HIDS
  • Analytical:
  • Vulnerability scanning
  • Monitoring tools
  • Interception proxy
  • Exploit:
  • Interception proxy
  • Exploit framework
  • Fuzzers
  • Forensics:
  • Forensic suites
  • Hashing
  • Password cracking
  • Imaging

target_au

The CompTIA Cybersecurity Analyst (CySA+) examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.


pre_req

While there is no required prerequisite, the CompTIA CySA+ certification is intended to follow CompTIA Security+ or equivalent experience. It is recommended for CompTIA CySA+ certification candidates to have the following:

  • 3-4 years of hands-on information security or related experience
  • Network+, Security+, or equivalent knowledge

titleRH200 – RHCSA Rapid Track
days5
seo_titleRH200: RHCSA Rapid Track - Red Hat Training | Insoft Services
seo_decThe RHCSA Rapid Track (RH200) course provides skills to students who already have significant experience with Linux administration.
seo_tkeyRH200
categorylinux-system
vendorRed Hat

techonogyLPI - Linux
overviewThe RHCSA Rapid Track (RH200) course provides skills to students who already have significant experience with Linux administration. This training course combines Red Hat System Administration I (RH124) and Red Hat System Administration II (RH134) and includes the Red Hat Certified System Administrator (RHCSA) exam (EX200), allowing you to review and validate the tasks at an accelerated pace.   See other Red Hat courses
objective
  • Package management with new repository structure and appstream modules
  • Create storage devices, volumes, and file systems, including Stratis storage management
  • Configure network services and security
  • Manage processes, scheduling, and tuning
  • Manage users, groups, and authentication
  • Perform server management with the Cockpit web management utility
  • Troubleshoot and obtain support

outline

Access systems and get help
Log in to local and remote Linux systems, and investigate problem resolution methods provided through Red Hat Insights and support.

Navigate file systems
Copy, move, create, delete, and organize files while working from the bash shell.

Manage local users and groups
Create, manage, and delete local users and groups and administer local password policies.

Control access to files
Set Linux file system permissions on files and to interpret the security effects of different permission settings.

Manage SELinux security
Protect and manage the security of a server by using SELinux.

Tune system performance
Evaluate and control processes, set tuning parameters, and adjust process scheduling priorities on a Red Hat Enterprise Linux system.

Install and update software packages
Download, install, update, and manage software packages from Red Hat and yum package repositories.

Manage basic storage
Create and manage storage devices, partitions, file systems, and swap spaces from the command line.

Control services and the boot process
Control and monitor network services, system daemons, and the boot process using systemd.

Manage networking
Configure network interfaces and settings on Red Hat Enterprise Linux servers.

Analyze and store logs
Locate and accurately interpret logs of system events for troubleshooting purposes.

Implement advanced storage features
Create and manage logical volumes containing file systems and swap spaces from the command line, and configure advanced storage features with Stratis and VDO.

Schedule future tasks
Schedule tasks to automatically execute in the future.

Access network-attached storage
Access network-attached storage, using the NFS protocol.

Manage network security
Control network connections to services using the system firewall and SELinux rules.


target_au

This offering is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks:

  • Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures
  • Providing operational support
  • Managing systems for monitoring system performance and availability
  • Writing and deploying scripts for task automation and system administration

pre_req

You will be expected to already understand fundamental Linux computing concepts and be ready to practice the Red Hat Enterprise Linux methods for performing system administration tasks. Significant field experience working with Linux as a system administrator is recommended.

If you do not have experience with fundamental Linux computer concepts, we advise you to start with the Red Hat System Administration I (RH124) course instead.


titleJB184 – Red Hat Application Development I: Programming in Java EE
days5
seo_titleJB184 - Red Hat Application Development I: Programming in Java EE
seo_decThe Red Hat Application Development I: Programming in Java EE (JB184) course, you will learn about the various specifications that make up Java EE.
seo_tkeyRed Hat Application Development I
categoryapplication-development
vendorRed Hat

techonogyService Provider Training
overviewThe Red Hat Application Development I: Programming in Java EE (JB184) course exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application. This course is a combination of Red Hat Application Development I: Programming in Java EE (JB183) and Red Hat Certified Enterprise Application Developer Exam (EX183). This course is based on Red Hat Enterprise Application Platform 7.0.   See other Red Hat courses
objective
  • Generating multi-tiered Java EE applications.
  • Packaging and deploying Java EE applications.
  • Creating Enterprise Java Beans, including message-driven beans.
  • Managing persistence.
  • Creating REST services with JAX-RS.
  • Implementing Contexts and Dependency Injection.
  • Creating messaging applications with JMS.
  • Securing Java EE applications with JAAS.

outline

Transition to multi-tiered applications
Describe Java EE features and distinguish between Java EE and Java SE applications.

Package and deploying applications to an application server
Describe the architecture of a Java EE application server, package an application, and deploy the application to an EAP server.

Create Enterprise Java Beans
Develop Enterprise Java Beans, including message-driven beans.

Manage persistence<
Create persistence entities with validations.

Manage entity relationships
Define and manage JPA entity relationships.

Create REST services
Create REST APIs using the JAX-RS specification.

Implement Contexts and Dependency Injection
Describe typical use cases for using CDI and successfully implement it in an application.

Create messaging applications with JMS<
Create messaging clients that send and receive messages using the JMS API.

Secure Java EE applications
Use JAAS to secure a Java EE application.

Comprehensive review of Red Hat JBoss Development I: Java EE
Demonstrate proficiency of the knowledge and skills obtained during the course.


target_au

This course is designed for Java developers who want to learn more about the specifications that comprise the world of Java Enterprise Edition (Java EE).


pre_req
  • Proficiency in developing Java SE applications, with 2+ years of experience required
  • Proficiency in using an IDE such as Red Hat Developer Studio or Eclipse
  • Experience with Maven is recommended but not required

titleMB-200T00 Microsoft Power Platform + Dynamics 365 Core
days5
seo_titleMB-200 Microsoft Power Platform + Dynamics 365 Core | Insoft Services
seo_decThis Microsoft Power Platform (MB-200) course helps organisations optimise their operations by automating routine tasks and standardizing best practices.
seo_tkeyMicrosoft Power Platform
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyIT Systems and Security
overviewThe Microsoft Power Platform + Dynamics 365 Core (MB-200) course helps organisations optimise their operations by automating routine tasks and standardizing best practices. This training provides a high-level overview of the capabilities of Microsoft Dynamics 365 and the Power Platform and provides a foundation for other Microsoft Dynamics 365 and Power Platform training offerings. High-level topics include application configuration, automation opportunities, integration, testing, and deployment.   See other Microsoft courses
objective

After attending the Microsoft Power Platform + Dynamics 365 Core (MB-200) course, you will be able to:

  • Identify platform components.
  • Understand administrator options.
  • Effectively model data.

outline

Module 1: Power Platform overview

In this module, you will learn the basics of the Power Platform. You will tour the various administrator portals and install applications.

Lessons

  • Overview
  • Configure Power Platform environments
  • Creating applications
  • Discovery and planning

After completing this module you will be able to:

  • Identify common platform components and their uses.

 

Module 2: Data Modeling

In this module, you will learn how to model data effectively using the platform’s entities, attributes and relationships.

Lessons

  • Data model fundamentals
  • Relationships
  • Other entity options
  • Other field options
  • Internationalizing

After completing this module you will be able to:

  • Create and use relationships and entities.

 

Module 3: Model-driven apps

In this module, you will learn about model-driven applications and how to configure and use them.

Lessons

  • Configure model-driven apps
  • Configure model-driven forms
  • Configure views
  • Configure model-driven charts
  • Configure model-driven dashboards
  • Configure reports

After completing this module you will be able to:

  • Create and modify forms.
  • Create and modify views and dashboards.
  • Identify and use other user experience components.

 

Module 4: Canvas apps

In this module, you will learn how to create and use canvas apps, as well as learn the differences between canvas apps and model-driven.

Lessons

  • Application fundamentals
  • Working with data and services
  • Customizing the user experience
  • Integration with model-driven apps

After completing this module you will be able to:

  • Create a canvas app.
  • Work with CDS data.

 

Module 5: Security

In this module, you will learn how the platform’s security model manages users’ experiences and access to both data and functionality.

Lessons

  • Security overview
  • Business units
  • Manage security roles
  • Manage teams
  • Configure hierarchy security

After completing this module you will be able to:

  • Create and use business units.
  • Create, modify and use security roles.

 

Module 6: Platform Automation Overview

In this module, you will learn the basics of the Power Platform automation capabilities.

Lessons

  • Automation Overview

After completing this module you will be able to:

  • Identify common platform automation capabilities.

 

Module 7: Business Rules

In this module, you will learn how to build and use business rules and how they work alongside other platform automation.

Lessons

  • Introduction to business rules
  • Additional business rule details

After completing this module you will be able to:

  • Create and use business rules.

 

Module 8: Workflows

In this module, you will learn how to build and use workflows and how they work alongside other platform automation.

Lessons

  • Introduction to workflows
  • Building workflows
  • Advanced workflows

After completing this module you will be able to:

  • Create and use workflows.

 

Module 9: Microsoft Flows

In this module, you will learn how to build and use Microsoft Flows and how they work alongside other platform automation.

Lessons

  • Introduction to Microsoft Flow
  • Other Flow concepts
  • Working with CDS
  • Building approval flows
  • Starting from apps
  • Flow deployment considerations

After completing this module you will be able to:

  • Create and use Microsoft Flows.

 

Module 10: Business Process Flows

In this module, you will learn how to build and use business process flows and how they work alongside other platform automation.

Lessons

  • Introduction to business process flows
  • Configure business process flows
  • Additional business process flow details

After completing this module you will be able to:

  • Create and use business process flows.

 

Module 11: Introduction to integrations

In this module, you will learn the basics of the Power Platform integration capabilities. You will learn how to configure and use email integrations.

Lessons

  • Overview of common scenarios
  • Email integration
  • Outlook integration

After completing this module you will be able to:

  • Identify common integrations,
  • Configure and use email integrations.

 

Module 12: Integration with Office

In this module, you will learn how to integrate with common Office products like OneNote, Word and Excel.

Lessons

  • Templates
  • SharePoint
  • Microsoft Teams
  • Additional integrations

After completing this module you will be able to:

  • Configure and use integrations with Office products.

 

Module 13: Managing Data

In this module, you will learn how to import and export data for the Power Platform and create and use data maps.

Lessons

  • Managing data overview
  • Duplicate detection
  • Importing data
  • Exporting data
  • Bulk delete

After completing this module you will be able to:

  • Import and export data.
  • Create and use data maps.
  • Perform bulk delete.

 

Module 14: Manage Instances and Applications

In this module you will learn how to enable and update first-party applications; install third-party apps and configure using admin portals.

Lessons

  • Overview
  • Manage applications

After completing this module you will be able to:

  • Enable and update first-party apps.
  • Install third-party apps.

 

Module 15: Manage Solutions

In this module, you will learn how to create, manage and deploy solutions.

Lessons

  • Solution concepts
  • Planning and creating solutions
  • Working with solution components
  • Distributing solutions
  • Working with managed solutions

After completing this module you will be able to:

  • Create solutions.
  • Deploy customisations.

 

Module 16: Additional Deployment Considerations

In this module, you will learn how to configure for mobile and deploy components such as Microsoft Flow.

Lessons

  • Configure settings
  • Mobile configuration settings
  • Mobile configuration

After completing this module you will be able to:

  • Configure for mobile.
  • Deploy components.

target_au
  • Functional Consultant who implements a solution using out of the box capabilities, codeless extensibility, application and service integrations.
  • A Dynamics 365 Customer Engagement Functional Consultant is responsible for performing discovery, capturing requirements, engaging subject matter experts and stakeholders, translating requirements, and configuring the solution and applications.

pre_req
titleDO408 – Automation with Ansible
days5
seo_titleDO408: Automation with Ansible - Red Hat Training | Insoft Services
seo_decThe Automation with Ansible (DO408) course learn how to install and configure Ansible on a management workstation and prepare managed hosts for automation.
seo_tkeyAutomation with Ansible
categorylinux-system
vendorRed Hat

techonogyInternet of Technology
overviewThe Automation with Ansible (DO408) course is designed for Linux system administrators and developers who need to automate provisioning, configuration, application deployment, and orchestration. You will learn how to install and configure Ansible on a management workstation and prepare managed hosts for automation, as well as validating that knowledge. This course is based on Red Hat Ansible Engine 2.7. This course also includes Red Hat Certified Specialist in Ansible Automation exam (EX407). Incorporating IT automation is key to managing large numbers of systems and applications efficiently and consistently at scale. In this course, you will write Ansible playbooks to automate tasks, and you will run them to ensure servers are correctly deployed and configured. You will also explore examples of how to approach the automation of common Linux system administration tasks. The material covered in this curriculum is now included within our newly released Red Hat System Administration III: Linux Automation with Ansible and exam (RH295), which covers how to use Red Hat Ansible Automation to automate across different functions. If you are interested in learning how to scale infrastructure efficiently, begin your journey with Linux automation today.   See other Red Hat courses
objective
  • Install Ansible/Red Hat Ansible Engine on control nodes.
  • Create and update inventories of managed hosts and manage connections to them.
  • Automate administration tasks with Ansible playbooks and ad hoc commands.
  • Write effective Ansible playbooks at scale.
  • Protect sensitive data used by Ansible with Ansible Vault.
  • Reuse code and simplify playbook development with Ansible roles.

outline

Introduction to Ansible
Describe Ansible concepts and install Red Hat Ansible Engine.

Deploy Ansible
Configure Ansible to manage hosts and run ad hoc Ansible commands.

Implement playbooks
Write a simple Ansible playbook and run it to automate tasks on multiple managed hosts.

Manage variables and facts
Write playbooks that use variables to simplify management of the playbook and facts to reference information about managed hosts.

Implement task control
Manage task control, handlers, and task errors in Ansible playbooks.

Deploy files to managed hosts
Deploy, manage, and adjust files on hosts managed by Ansible.

Manage large projects
Write playbooks that are optimized for larger, more complex projects.

Simplify playbooks with roles
Use Ansible roles to develop playbooks more quickly and to reuse Ansible code.

Troubleshoot Ansible
Troubleshoot playbooks and managed hosts.

Automate Linux administration tasks
Automate common Linux system administration tasks with Ansible.

Comprehensive review

Demonstrate skills learned in this course by installing, optimizing, and configuring Ansible for the management of managed hosts.


target_au

This course and exam are designed for Linux system administrators, DevOps engineers, infrastructure automation engineers, and systems design engineers. The curriculum is particularly geared toward those responsible for automation of configuration management; consistent and repeatable application deployment; provisioning and deployment of development, testing, and production servers; and integration with DevOps CI/CD workflows.


pre_req
  • Be a Red Hat Certified System Administrator (RHCSA), or demonstrate equivalent Red Hat® Enterprise Linux® knowledge and experience
  • Being a Red Hat Certified Engineer (RHCE) may be beneficial

titleDO289 – Red Hat OpenShift Development I: Containerizing Applications
days5
seo_titleDO289 - Red Hat OpenShift Development I: Containerizing Applications
seo_decIn The Red Hat OpenShift Development I (DO289) course you’ll learn to manage container deployments and scale apps using Kubernetes.
seo_tkeyRed Hat OpenShift Development I
categoryopenshift-administration
vendorRed Hat

techonogyInternet of Technology
overviewThe Red Hat OpenShift Development I: Containerizing Applications (DO289) course builds and validates understanding of containers as a key technology for configuring and deploying applications and microservices. As the second offering in the OpenShift development track, this course and exam will test your ability to design, build, and deploy containerized software applications to an OpenShift cluster. The Red Hat Certified Specialist in OpenShift Application Development exam (EX288) is included in this offering, which is based on Red Hat® OpenShift Container Platform 4.1. Whether you’re writing container-native applications or migrating existing brownfield applications, you’ll learn how to boost developer productivity powered by Red Hat OpenShift Container Platform, a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes.   See other Red Hat courses
objective
  • Manager and trigger application builds.
  • Customize an existing source-to-image base image.
  • Create an OpenShift template.
  • Create health checks to monitor and improve application reliability.
  • Create and deploy a Jenkins pipeline for continuous integration and continuous deployment.
  • Create and deploy cloud-native application for OpenShift.

outline

Deploy and manage applications on an OpenShift cluster
Deploy applications using various application packaging methods to an OpenShift cluster and manage their resources.

Design containerized applications for OpenShift
Select a containerization method for an application and create a container to run on an OpenShift cluster.

Publish enterprise container images
Create an enterprise registry and publish container images to it.

Manage building applications
Describe the OpenShift build process, in addition to triggering and managing builds.

Customize source-to-image builds
Customize an existing S2I base image and create a new one.

Create applications from OpenShift templates
Describe the elements of a template and create a multicontainer application template.

Manage application deployments
Monitor application health and implement various deployment methods for cloud-native applications.

Implement CI/CD pipelines in OpenShift
Create and deploy Jenkins pipelines to facilitate continuous integration and continuous deployment (CI/CD) with OpenShift.

Build cloud-native applications on OpenShift
Create and deploy cloud-native applications on OpenShift.


target_au
  • Enterprise application developers
  • Site reliability engineers

pre_req
titleDO281 – Red Hat OpenShift Administration I
days4
seo_titleDO281 - Red Hat OpenShift Administration I | Insoft Services
seo_decThe Red Hat OpenShift Administration I (DO280) course teaches you how to install and administer the Red Hat OpenShift Container Platform.
seo_tkeyRed Hat OpenShift Administration I
categoryopenshift-administration
vendorRed Hat

techonogyInternet of Technology
overviewThe Red Hat OpenShift Administration I (DO280) course teaches you how to install and administer the Red Hat OpenShift Container Platform. This hands-on, lab-based course shows you how to install, configure, and manage OpenShift clusters and deploy sample applications to further understand how developers will use the platform. OpenShift is a containerized application platform that allows enterprises to manage container deployments and scale their applications using Kubernetes. OpenShift provides predefined application environments and builds upon Kubernetes to provide support for DevOps principles such as reduced time to market, infrastructure-as-code, continuous integration (CI), and continuous delivery (CD). This course is based on Red Hat Enterprise Linux 7.5 and Openshift Container Platform 4.2. The Red Hat Certified Specialist in OpenShift Administration exam is included.   See other Red Hat courses
objective
outline

Describe the Red Hat OpenShift Container Platform
Learn the components of Red Hat OpenShift Container Platform and how they interact.

Verify a Cluster
Verify a cluster is installed and healthy.

Configure Authentication
Configure authentication with an identity provider.

Control Access to OpenShift Resources
Define and apply role-based access controls and protect sensitive information with secrets.

Configure OpenShift Networking Components

Identify the components of OpenShift software-defined networking and configure some of the components.

Control Pod Scheduling
Control which nodes a pod runs on.

Scale an OpenShift Cluster
Control the size of an OpenShift cluster.

Perform Cluster Updates
Describe how to perform a cluster update.

Manage the Cluster with the Web Console
Manage the OpenShift cluster using the web console.

Comprehensive Review
Verify, manage, and troubleshoot an OpenShift cluster for enterprise use.


target_au

This course is designed for system administrators, system architects, and developers who want to install and configure Red Hat OpenShift Container Platform.

  • System and Software Architects are interested in understanding the features and functionality of an OpenShift cluster.
  • System Administrators are interested in the initial establishment of a cluster.
  • Cluster Operators interested in the ongoing maintenance of a cluster.
  • Site Reliability Engineers interested in the ongoing maintenance and troubleshooting of a cluster.

pre_req
  • Become a Red Hat Certified System Administrator, or demonstrate equivalent Red Hat Enterprise Linux system administration experience.
  • Complete Introduction to Containers, Kubernetes, and Red Hat OpenShift (DO180), or demonstrate equivalent experience with containers, Kubernetes, and OpenShift basics.

titleCL311 – Red Hat OpenStack Administration III: Networking & Foundations of NFV
days5
seo_titleCL311 - Red Hat OpenStack Administration III: Networking NFV
seo_decIn the Red Hat OpenStack Administration III (CL311) course you'll learn how to manage the OpenStack Neutron with NFV to enhance network performance.
seo_tkeyCL311
categorynetworking
vendorRed Hat

techonogyEnterprise Networking
overviewThe Red Hat OpenStack Administration III: Networking & Foundations of NFV (CL311) course teaches network engineers, network operators, cloud operators, and cloud administrators how to manage and tune Red Hat® OpenStack Platform for network performance. You will learn how to manage the OpenStack networking service (Neutron) with network functions virtualization to enhance network performance. You configure distributed virtual routers, Open vSwitch with Data Plane Development Kit datapath, and IPv6 networking in OpenStack. You will also deploy software-defined networking with OpenDaylight. This course includes Red Hat® Certified Engineer in Red Hat OpenStack exam (EX310). This offering is based on Red Hat OpenStack version 10.0 and Red Hat Enterprise Linux 7.4.   See other Red Hat courses
objective
  • Network functions virtualization (NFV)
  • Distributed virtual router (DVR)
  • Open vSwitch with Data Plane Development Kit (OVS-DPDK) datapath
  • IPv6 networking
  • Single-root I/O Virtualization (SR-IOV)*
  • Software-defined networking (SDN) with OpenDaylight (ODL)
  • VLAN, VXLAN, and GRE networks

*SR-IOV is covered in the course as a lecture and a video. The specification is not covered as a hands-on exercise because it requires special hardware.


outline

Manage networks in Linux
Administer network interfaces, bridges, and virtual networking devices.

Manage OpenStack networking agents
Manage the L2, L3, DHCP, and other OpenStack networking agents.

Deploy IPv6 networks
Set up IPv6 networks in OpenStack.

Provision OpenStack networks
Provision tenant networks and provider networks.

Implement distributed virtual routing
Enable distributed virtual routing (DVR) to provide scaling and performance.

Tune NFV performance
Tune OpenStack networking performance.

Implement NFV data paths
Execute network functions virtualization (NFV) data paths.

Build software-defined networks with OpenDaylight
Create software-defined networks with OpenDaylight (ODL).

Comprehensive review of Red Hat OpenStack Administration III
Configure advanced networking on Red Hat® OpenStack Platform.


target_au

This course is designed for network engineers, network operators, cloud administrators, and cloud operators.


pre_req
  • Become a Red Hat® Certified System Administrator (RHCSA), or demonstrate equivalent experience
  • Complete the Red Hat® Certified System Administrator in Red Hat OpenStack exam (EX210), or demonstrate equivalent experience

titleCDA – Continuous Delivery Architecture
days2
seo_titleCDA - Continuous Delivery Architecture - DevOps Training | Insoft Services
seo_decThe Continuous Delivery Architecture (CDA) course provides you with the skills to design, implement and manage DevOps deployment pipelines including CI/CD.
seo_tkeyContinuous Delivery Architecture
categorydevops
vendorDevOps

techonogyDevOps
overviewThe Continuous Delivery Architecture (CDA) course provides you with the skills to design, implement and manage DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APIs and cultural considerations with Continuous Delivery. Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmanoeuvre the competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution. Built upon the principles and practices highlighted in bestselling books such as “Continuous Delivery,” “Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations,” and more written by thought leaders in the DevOps movement. The Continuous Delivery Architecture course equips IT professionals with the broad-based competencies necessary in architecting and orchestrating effective and efficient automated deployment pipelines. The course materials will include practical artefacts, templates, and lexicons to assist learners post-class.   See other DevOps courses
objective

The learning objectives for CDA include a practical understanding of:

  • Goals, history, terminology, and pipeline
  • The importance, practices, and transformation of a DevOps collaborative culture
  • Design practices, such as modular design and microservices
  • Continuous Integration (Cl), such as version control, builds, and remediation
  • Tenets and best practices of Continuous Testing (CT)
  • Continuous Delivery and Deployment (CD): packaging, containers, and release
  • Continuous Monitoring (CM): monitoring and analysis infrastructure, process, and apps
  • Infrastructure and tools: frameworks, tools, and infrastructure as code
  • Security Assurance: DevSecOps
  • The opportunity to hear and share real-life scenarios

outline
  • Sixteen (16) hours of instructor-led training and exercise facilitation
  • Digital Learner Manual (excellent post-class reference)
  • Participation in exercises designed to apply concepts
  • Sample documents, templates, tools and techniques
  • Access to additional sources of information and communities

target_au

The target audience for the Continuous Delivery Architecture course is anyone interested in learning about the principles of Continuous Integration and Continuous Delivery, such as:

  • Build Engineers
  • Enterprise Architects
  • IT Managers
  • Maintenance and Support Staff
  • Operational and Infrastructure Teams
  • Project Managers
  • QA Managers
  • Release Managers and Engineers
  • Software Developers
  • Security Professionals
  • Testers

pre_req
titleCAPO – Certified Agile Process Owner
days2
seo_titleCAPO - Certified Agile Process Owner - DevOps Training | Insoft Services
seo_decThe Certified Agile Process Owner (CAPO) course provides the skills to oversee the design and re-engineering of IT Service Management (ITSM) processes.
seo_tkeyAgile Process Owner
categorydevops
vendorDevOps

techonogyDevOps
overviewThe Certified Agile Process Owner (CAPO) course provides guidance into the process Owner responsibilities so they can describe what they are doing as a process and provides the education needed to oversee the design, re-engineering and improvement of IT Service Management (ITSM) processes; particularly in the context of Agile Service Management. Participants learn how to apply Scrum practices to Process Owner responsibilities and use Agile and Lean principles and practices to put in place ‘just enough’ process and how to continually align process performance with overall business goals. A process owner is an individual accountable for the performance of a process and for ensuring the process delivers value to its stakeholders. Process owners manage the requirements of process stakeholders, translate those requirements into process performance objectives, and oversee the entire process design and improvement lifecycle.   See other DevOps courses available
objective

The learning objectives for CAPO include an understanding of:

  • Basic Agile and Agile Service Management concepts
  • Process owner role and responsibilities
  • Managing and prioritizing a processing backlog
  • Creating and utilizing user stories
  • Collaborating with process stakeholders and other process owners
  • Overseeing Agile process design and improvement activities
  • Managing organizational change activities
  • Monitoring and measuring process performance
  • Conducting process reviews and identifying improvements

outline
  • Sixteen (16) hours of instructor-led training and exercise facilitation
  • The Agile Service Management Guide and Scrum Guide (pre-class resources)
  • Digital Learner Manual (excellent post-class reference)
  • Participation in unique hands-on exercises designed to apply concepts
  • Sample documents, templates, tools and techniques
  • Access to additional sources of information and communities

target_au

The target audience for the CAPO course is:

  • Process owners
  • Process managers
  • Employees and managers responsible for designing, re-engineering or improving processes
  • Consultants guiding their clients through process improvement initiatives

Anyone responsible for:

  • Managing process-related requirements
  • Ensuring the efficiency and effectiveness of processes
  • Maximizing the value of processes

pre_req
  • Completion of pre-class assignment
  • Familiarity with Scrum Familiarity with IT and IT services

titleCASM – Certified Agile Service Manager
days2
seo_titleCASM - Certified Agile Service Manager - DevOps Training | Insoft UK
seo_decThe Certified Agile Service Manager (CASM) course provides an intro to the integration of agile thinking into service management processes and projects.
seo_tkeyAgile Service Manager
categorydevops
vendorDevOps

techonogyDevOps
overviewThe Certified Agile Service Manager (CASM) course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT’s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements. As Dev and Ops have been working in parallel with Dev focused on Agile/Scrum and Ops focused on ITSM/ITIL, this course strives to bring together individual achievements to deliver full business value. The course cross-pollinates Agile and ITSM practices to support end-to-end Agile Service Management so Dev starts to manage services instead of products and Ops and ITSM become more agile by scaling to “just enough” process leading to improved flow of work and time to value. Agile Service Management helps IT to meet customer requirements faster, improve the collaboration between Dev and Ops, overcome constraints in process workflows by taking an iterative approach to process design that will improve the velocity of process improvement teams to get more done.   See other DevOps courses available
objective

The learning objectives for Certified Agile Service Manager (CASM) include an understanding of:

  • What does it mean to “be agile?”
  • The Agile Manifesto, its core values, and principles
  • Agile concepts and practices including ITSM, Kanban, Lean and DevOps
  • Learn about SCRUM from a product and process perspective
  • Agile thinking and values into service management
  • Scrum roles, artifacts, and events as it applies to both products and processes
  • The two aspects of Agile Service Management:
  • Agile Process Improvement–ensuring processes are lean and deliver “just enough” control
  • Agile Process Design–applying Agile practices to process design projects

outline
  • Sixteen (16) hours of instructor-led training and exercise facilitation
  • The Agile Service Management Guide and Scrum Guide (pre-class resources)
  • Learner Manual (excellent post-class reference)
  • Participation in unique hands-on exercises designed to apply concepts
  • Sample documents, templates, tools and techniques
  • Access to additional sources of information and communities

target_au

The target audience for the CASM course is

  • Anyone interested in learning about Agile and Scrum from a products and process perspective
  • Process owners and process designers
  • Developers who are interested in helping make processes more agile
  • Managers who are looking to bridge multiple practices into a DevOps environment
  • Employees and managers responsible for designing, re-engineering or improving process
  • Consultants guiding their clients through process improvement and DevOps initiatives
  • Internal and external suppliers Process stakeholders

pre_req
  • Completion of pre-class assignment
  • Familiarity with IT service management processes and ITIL is recommended

titleDTE – DevOps Test Engineering
days2
seo_titleDTE - DevOps Test Engineering Training | Insoft Services
seo_decThe DevOps Test Engineering (DTE) course concepts such as the active use of test automation for developers, security and operational teams.
seo_tkeyDevOps Test Engineering
categorydevops
vendorDevOps

techonogyDevOps
overviewThe DevOps Test Engineering (DTE) course addresses testing in a DevOps environment and covers concepts such as the active use of test automation, testing earlier in the development cycle, and instilling testing skills in developers, quality assurance, security, and operational teams. The course is relevant for every modern IT professional involved in defining or deploying a DevOps testing strategy for their organization, as test engineering is the backbone of DevOps and the primary key for successful DevOps pipeline to support digital transformation. Actionable and exciting exercises will be used to apply the concepts covered in the course and sample documents, templates, tools, and techniques will be provided to leverage after the class.   See other DevOps courses
objective

The learning objectives for DTE include a practical understanding of:

  • The purpose, benefits, concepts, and vocabulary of DevOps testing
  • How DevOps testing differs from other types of testing
  • DevOps testing strategies, test management, and results analysis
  • Strategies for selecting test tools and implementing test automation
  • Integration of DevOps testing into Continuous Integration and Continuous Delivery workflows
  • How DevOps testers fit with a DevOps culture, organization, and roles

outline
  • Sixteen (16) hours of instructor-led training and exercise facilitation
  • Digital Learner Manual (excellent post-class reference)
  • Participation in exercises designed to apply concepts
  • Sample documents, templates, tools and techniques
  • Access to additional sources of information and communities

target_au

The target audience for the DevOps Test Engineering course is anyone involved in defining a DevOps Testing strategy, such as

  • Delivery Staff
  • DevOps Engineers
  • IT Managers
  • Project Managers
  • Lab Staff
  • Maintenance and Support Staff
  • Quality Assurance Managers
  • Quality Assurance Teams
  • Release Managers
  • Testers
  • Software Engineers

pre_req
titleDOL – DevOps Leader
days2
seo_titleDOL - DevOps Leader Training & Certification | Insoft Services
seo_decThe DevOps Leader (DOL) course is for those who take a transformational leadership approach and want to impact their organisation by implementing DevOps.
seo_tkeyDevOps Leader
categorydevops
vendorDevOps

techonogyDevOps
overviewThe DevOps Leader (DOL) course is a unique and practical experience for participants who want to take a transformational leadership approach and make an impact within their organisation by implementing DevOps. Leading people through a DevOps evolution requires new skills, tools, innovative thinking, and transformational leadership. Leaders up, down and across an organization must align and collaborate to break down silos and evolve the organization. The course highlights the human dynamics of cultural change and equips participants with practices, methods, and tools to engage people across the DevOps spectrum through the use of real-life scenarios and case studies. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding Value Stream Mapping. The course was developed by leveraging key DevOps leadership sources to extract real-life best practices in leading DevOps initiatives and has been designed to teach the key differences and emerging practices for DevOps ways of working through leadership in a fast-paced DevOps and Agile environment.   See other DevOps courses 
objective

The learning objectives for DOL include a practical understanding of:

  • DevOps and time to value
  • Mindset and mental models
  • Key differences between DevOps IT and traditional IT
  • Target operating models and organizational design
  • Performance management, rewards and motivation
  • Preparing investment cases
  • Focusing on value outcomes
  • Ideas for organizing workflows
  • Empowerment and participation
  • Defining meaningful metrics
  • Value stream mapping

outline
  • Sixteen (16) hours of instructor-led training and exercise facilitation
  • Learner Manual (excellent post-class reference) including:
    • Course slideware
    • Value-Added Resources
    • Glossary
  • Participation in exercises and discussions designed to apply concepts
  • Case stories
  • Access to additional sources of information and communities

target_au

The target audience for the DevOps Leader course are professionals including::

  • Anyone starting or leading a DevOps cultural transformation program
  • Anyone interested in modern IT leadership and organizational change approaches
  • Business Managers
  • Business Stakeholders
  • Change Agents
  • Consultants
  • DevOps Consultants
  • DevOps Engineers
  • IT Directors
  • IT Managers
  • IT Team Leaders
  • Lean Coaches
  • Practitioners
  • Product Owners
  • Scrum Masters
  • System Integrators
  • Tool Providers

pre_req

Participants should have baseline knowledge and understanding of common DevOps definitions and principles.


titleDSOE – DevSecOps Engineering
days2
seo_titleDSOE - DevSecOps Engineering Training | Insoft Services
seo_decThe DevSecOps Engineering (DSOE) course teaches practical steps on how to integrate security programs into DevOps practices.
seo_tkeyDevSecOps
categorydevops
vendorDevOps

techonogyDevOps
overviewThe DevSecOps Engineering (DSOE) course explains how DevOps security practices differ from other security approaches and provide the education needed to understand and apply data and security sciences. Participants learn the purpose, benefits, concepts, and vocabulary of DevSecOps; particularly how DevSecOps roles fit with a DevOps culture and organisation. At the end of this course, participants will understand using “security as code” with the intent of making security and compliance consumable as a service. As companies are pushing code faster and more often than ever, the rate of vulnerabilities in our systems is accelerating. As we are being asked to do more with less, DevOps has shown immense value to business and security as an integral component that needs to be integrated into the strategy. Topics covered in the course include how DevSecOps provides the business value of DevOps and the ability DevOps has to enable the business and support an organisational transformation with the ultimate goal of increasing productivity, reducing risk, and optimizing cost in the organisation. The course is designed to teach practical steps on how to integrate security programs into DevOps practices and highlights how professionals can use data and security science as the primary means of protecting the organisation and customer. Using real-life scenarios and case studies, participants will have tangible takeaways to leverage when back at the office. This course positions learners to successfully complete the DevSecOps Engineering exam, which is offered on the last day of class for classroom learners. Virtual learners will receive a voucher for a webcam proctored exam which they can schedule at their convenience.   See other DevOps courses
objective

The learning objectives include a practical understanding of:

  • The purpose, benefits, concepts, and vocabulary of DevSecOps
  • How DevOps security practices differ from other security approaches
  • Business-driven security strategies
  • Understanding and applying data and security sciences
  • The use and benefits of Red and Blue Teams
  • Integrating security into Continuous Delivery workflows
  • How DevSecOps roles fit with a DevOps culture and organisation

outline
  • Sixteen (16) hours of instructor-led training and exercise facilitation
  • Digital Learner Manual (excellent post-class reference)
  • Participation in exercises designed to apply concepts
  • Sample documents, templates, tools and techniques
  • Access to additional sources of information and communities

target_au

The target audience for the DevSecOps Engineering course are professionals including:

  • Anyone involved or interested in learning about DevSecOps strategies and automation
  • Anyone involved in Continuous Delivery toolchain architectures
  • Compliance Team
  • Delivery Staff
  • DevOps Engineers
  • IT Managers
  • IT Security Professionals, Practitioners, and Managers
  • Maintenance and support staff
  • Managed Service Providers
  • Project & Product Managers
  • Quality Assurance Teams
  • Release Managers
  • Scrum Masters
  • Site Reliability Engineers
  • Software Engineers
  • Testers

pre_req
titleDevOps Foundation
days2
seo_titleDevOps Foundation Training & Certification | Insoft Services
seo_decThe DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language.
seo_tkeyDevOps Foundation
categorydevops
vendorDevOps

techonogyDevOps
overviewThe DevOps Foundation course provides a baseline understanding of key DevOps terminology to ensure everyone is talking the same language and highlights the benefits of DevOps to support organisational success. The course includes the latest thinking, principles and practices from the DevOps community including real-world case studies from high performing organisations including ING Bank, Ticketmaster, Capital One, Alaska Air, Target, Fannie Mae, Societe Generale, and Disney that engage and inspire learners, leveraging multimedia and interactive exercises that bring the learning experience to life, including the Three Ways as highlighted in the Phoenix Project by Gene Kim and the latest from the State of DevOps and DevOps Institute Upskilling reports. Learners will gain an understanding of DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation to improve the flow of work between software developers and IT operations professionals. The course is designed for a broad audience, enabling those on the business side to obtain an understanding of microservices and containers. Those on the technical side will obtain an understanding as to the business value of DevOps to reduce cost (15-25% overall IT cost reduction) with increased quality (50-70% reduction in change failure rate) and agility (up to 90% reduction in provision and deployment time) to support business objectives in support of digital transformation initiatives. Unique and exciting exercises will be used to apply the concepts covered in the course and sample documents, templates, tools, and techniques will be provided to use after the class.   See other DevOps courses
objective

The learning objectives for DevOps Foundation include an understanding of:

  • DevOps objectives and vocabulary
  • Benefits to the business and IT
  • Principles and practices including Continuous Integration, Continuous Delivery, testing, security and the Three Ways
  • DevOps relationship to Agile, Lean and ITSM
  • Improved workflows, communication and feedback loops
  • Automation practices including deployment pipelines and DevOps toolchains
  • Scaling DevOps for the enterprise
  • Critical success factors and key performance indicators
  • Real-life examples and results

outline
  • Sixteen (16) hours of instructor-led training and exercise facilitation
  • Learner Manual (excellent post-class reference)
  • Participation in unique exercises designed to apply concepts
  • Sample documents, templates, tools and techniques
  • Access to additional value-added resources and communities

target_au

The target audience for the DevOps Foundation course includes Management, Operations, Developers, QA and Testing professionals such as:

  • Individuals involved in IT development, IT operations or IT service management
  • Individuals who require an understanding of DevOps principles
  • IT professionals working within, or about to enter, an Agile Service Design Environment

The following IT roles:

  • Automation Architects, Application Developers, Business Analysts, Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Consultants, DevOps Engineers, Infrastructure Architects, Integration Specialists, IT Directors, IT Managers, IT Operations, IT Team Leaders, Lean Coaches, Network Administrators, Operations Managers, Project Managers, Release Engineers, Software Developers, Software Testers/QA, System Administrators, Systems Engineers, System Integrators, Tool Providers

pre_req

Familiarity with IT terminology and IT related work experience are recommended.


titleSPFNDU – Understanding Cisco Service Provider Network Foundations
days5
seo_titleSPFNDU - Understanding Cisco Service Provider Network Foundations
seo_decThe Cisco Service Provider Network (SPFNDU) course provides you with the foundational knowledge for the suite of Cisco CCNP Service Provider certification.
seo_tkeySPFNDU
categoryservice-provider
vendorCisco

techonogyService Provider Training
overviewThe Understanding Cisco Service Provider Network Foundations (SPFNDU) v1.0 course is designed to provide you with the foundational knowledge for the suite of Cisco® CCNP® Service Provider courses. The course expands what you learned from the Cisco CCNA® course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe network architectures, devices, and software used by service providers
  • Describe the various Internet governance organizations, their roles, and tools available for governance information verification
  • Configure the Cisco Internetwork Operating System (Cisco IOS®) and Cisco IOS XE routers
  • Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks
  • Describe various access and core technologies used by service providers
  • Describe various major switching technologies used by service providers
  • Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN)
  • Describe various major routing protocols used by service providers
  • Configure Layer 3 services used by service providers
  • Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage
  • Describe the usage of various services used and maintained by service providers
  • Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR software

outline
  • Introducing Service Provider Architectures
  • Describing Internet Governance Organizations
  • Configuring the Cisco IOS and Cisco IOS XE Router
  • Configuring Cisco IOS XR Router
  • Introducing Access and Core Technologies in the Service Provider Environment
  • Introducing Routing Technologies in the Service Provider Environment
  • Describing MPLS
  • Implementing Layer 3 Services
  • Introducing Switching Technologies in the Service Provider Environment
  • Introducing Overlay Technologies
  • Implementing Service Provider Services
  • Introducing Programmability on Cisco IOS XR Routers

Lab outline

  • Review Lab Environment
  • Examine Governance Data
  • Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration
  • Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices
  • Perform Initial Cisco IOS XR Configuration
  • Configure and Verify Connectivity on Cisco IOS XR
  • Configure Intermediate System to Intermediate System (IS-IS)
  • Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng)
  • Configure Basic Border Gateway Protocol (BGP)
  • Configure MPLS
  • Configure Internet Protocol Service Level Agreement (IP SLA)
  • Configure Hot Standby Router Protocol (HSRP) with Object Tracking
  • Configure Virtual Routing and Forwarding (VRFs)
  • Configure Network Time Protocol (NTP)
  • Use Linux Command Line Interface
  • Configure IOS XR Using a Bash Script

target_au

This course is designed for network and software engineers and hold job roles such as:

  • Network administrator
  • Network engineer
  • Network manager
  • System engineer
  • Project manager
  • Network designer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Knowledge of IPv4 and IPv6 Transmission Control Protocol/Internet Protocol (TCP/IP) networking
  • Familiarity with typical service provider environment
  • Basic knowledge about networking devices and their roles

titleSPAUI – Implementing Automation for Cisco Service Provider Solutions
days3
seo_titleSPAUI - Implementing Automation for Cisco Service Provider Solutions
seo_decThe SPAUI course prepares you to implement automation solutions in a Service Provider network infrastructure, using network programmability principles.
seo_tkeySPAUI
categoryservice-provider
vendorCisco

techonogyService Provider Training
overviewThe Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 course prepares you to implement and support automation solutions in a Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms. Through a combination of lessons and hands-on labs, you will learn to deploy, configure, monitor, and operate Service Provider network environments using modern data models. These models allow you to represent operational data and new network management protocols in order to administer hundreds or thousands of devices in a single operation, replacing traditional, time-consuming, error-prone, device-by-device Command Line Interface (CLI) management. The course also introduces powerful automation solutions that can streamline network operations.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Use NETCONF and RESTCONF programmability protocols on Cisco devices
  • Describe and use tools to validate YANG data models on Cisco devices
  • Describe and configure model-driven telemetry on Cisco devices
  • Describe and configure network traffic automation with Cisco XTC
  • Describe and use network automation tools that utilize SSH
  • Automate service provider network configuration with Cisco NSO
  • Describe how to automate virtualized resources with Cisco ESC
  • Describe how to automate service provider WAN with Cisco WAE

outline
  • Implementing Network Device Programmability Interfaces with NETCONF and RESTCONF
    • Implement NETCONF Protocol
    • Implement RESTCONF Protocol
  • Implementing Model-Driven Programmability with YANG
    • YANG Data Models
    • YANG Tools
    • YANG Development Kit
  • Implementing Model-Driven Telemetry
    • Implementing Model-Driven Telemetry with gRPC
    • Implementing Model-Driven Telemetry with gNMI
  • Automating Service Provider Network Traffic with Cisco XTC
    • Cisco XTC Fundamentals
    • Configure Cisco XTC
  • Automating Networks with Tools That Utilize SSH
    • Implement Device Configurations with Python Netmiko Library
    • Implement Device Configurations with Ansible Playbooks
  • Orchestrating Network Services with Cisco NSO
    • Cisco NSO Fundamentals
    • Cisco NSO Device Manager
    • Cisco NSO Services
    • Implement Device Configurations with Python
  • Automating Virtualized Resources with Cisco Elastic Services Controller
    • Cisco ESC Architecture
    • Cisco ESC Resource Management
  • Automating the WAN with Cisco WAE
    • Describe the Cisco WAE Components

Lab outline

  • Explore NETCONF Protocol in Cisco Devices
  • Configure Cisco IOS XE Devices with RESTCONF
  • Explore Cisco and OpenConfig YANG Data Models with YANG Tools
  • Use ncclient and Python to Configure Cisco Devices
  • Use YANG Development Kit (YDK) to Configure Cisco Devices
  • Configure Model-Driven Telemetry with gRPC
  • Configure Model-Driven Telemetry with gNMI
  • Configure Path Disjointness with Cisco XTC
  • Use Python Netmiko Library to Configure Cisco Devices
  • Use Ansible to Configure Cisco Devices
  • Use Cisco NSO Device Manager
  • Create a Loopback Service Template
  • Use Cisco NSO REST API with Postman
  • Explore and Use Cisco WAE Features

target_au

This course is designed for Service Provider networking professionals in job roles such as:

  • Network administrators
  • Network architects
  • Network designers
  • Network engineers
  • Network managers
  • Network Operations Center (NOC) personnel
  • Network supervisors

pre_req

Before taking this course, you should have the following knowledge and skills:

  • CCNP equivalent level of knowledge for Routing and Switching (R&S)
  • Cisco Internetworking Operating System (IOS XE) and Cisco IOS XR working experience
  • SP Operations experience with routing, Multi-Protocol Label Switching (MPLS) and Virtual Private Network (VPN) Solutions
  • Network Programmability Basics (Network Programming Foundations, APIs and Protocols, Network Model-Driven APIs and Protocols, Configuration Management with Ansible, Service Provider Network Automation workflows)

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleSPVI – Implementing Cisco Service Provider VPN Services
days5
seo_titleSPVI - Implementing Cisco Service Provider VPN Services Training
seo_decThe SPVI course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider MPLS backbone.
seo_tkeySPVI
categoryservice-provider
vendorCisco

techonogyService Provider Training
overviewThe Implementing Cisco Service Provider VPN Services (SPVI) v1.0 course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.   See other Cisco courses available
objective

After taking the SVPI course, you should be able to:

  • Describe VPN concepts and operation in a Service Provider environment
  • Implement Layer 3 MPLS VPN operations in a Service Provider environment
  • Implement Layer 3 Inter-domain MPLS VPN services traversing multiple Service Providers
  • Implement Layer 3 Multicast MPLS VPN operations in a Service Provider environment
  • Troubleshoot typical issues in Layer 3 MPLS VPN environments
  • Implement Layer 2 VPN operations in a Service Provider environment
  • Troubleshoot Layer 2 VPN issues in a Service Provider network
  • Implement MPLS VPN solutions for IPv6 environments
  • Troubleshoot MPLS VPN solutions for IPv6 environments

outline
  • Introducing VPN Services
    • VPN Fundamentals
    • MPLS VPN Control Plane Operation
  • Troubleshooting MPLS VPN Underlay
    • Troubleshoot Core Interior Gateway Protocol (IGP)
    • Troubleshoot Border Gateway Protocol (BGP)
  • Implementing Layer 3 MPLS VPNs
    • Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs
    • Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNs
  • Implementing Layer 3 Interdomain MPLS VPNs
    • Inter-Autonomous System (AS) for Layer 3 MPLS VPNs
    • Content Security and Control (CSC) for Layer 3 MPLS VPNs
  • Implementing Layer 3 Multicast MPLS VPNs
    • Multicast VPN (MVPN) Fundamentals
    • Implement Intranet MVPN
  • Troubleshooting Intra-AS Layer 3 VPNs
    • Troubleshoot PE-CE Connectivity
    • Troubleshoot PE-to-Route Reflector
  • Implementing Layer 2 VPNs
    • Layer 2 Service Architecture and Carrier Ethernet Services
    • Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree Solutions
  • Troubleshooting Layer 2 VPNs
    • Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions
    • Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) Solutions
  • Implementing Layer 3 IPv6 MPLS VPNs
    • Classical Solutions for Deploying IPv6 over IPv4 Environments
    • Using 6VPE to Deploy IPv6 Connectivity over MPLS Environment
  • Troubleshooting Layer 3 IPv6 MPLS VPNs
    • Troubleshooting PE-to-PE Connectivity

Lab outline

  • Verify the Service Provider Backbone Operation for MPLS VPN
  • Work with VRF Instances
  • Troubleshoot the MPLS VPN Backbone
  • Configure MP-BGP as the PE-CE Routing Protocol
  • Configure and Verify PE-to-CE Routing Requirements
  • Enable Shared Services VPN
  • Deploy Internet Access as a VPN Service
  • Troubleshoot Layer 3 MPLS VPN End-Customer Connectivity
  • Implement Different EVPN Solutions
  • Troubleshoot EVPN VPWS
  • Implement IPv6 VPN Provider Edge Router (6VPE)

target_au

This SVPI course is for network professionals who need to learn the techniques to implement, configure, monitor, and support Service Provider VPN solutions based on MPLS backbones.

  • Network administrators
  • Network engineers
  • Network supervisors
  • Network managers
  • Network Operations Center (NOC) personnel
  • Network designers
  • Network architects
  • Channel partners

pre_req

Before taking the SVPI course, you should have Service Provider knowledge at the professional level, equivalent to the material in the following Cisco courses:

 

In the new certification program, foundational material is covered in these courses:


titleSPRI – Implementing Cisco Service Provider Advanced Routing Solutions
days5
seo_titleSPRI - Implementing Cisco Service Provider Advanced Routing Solutions
seo_decThe SPRI course teaches you how to integrate advanced routing technologies and expanding your knowledge and skills in Service Provider core networks.
seo_tkeySPRI
categoryservice-provider
vendorCisco

techonogyService Provider Training
overviewThe Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) course teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe the main characteristics of routing protocols that are used in Service provider environments
  • Implement advanced features of multiarea Open Shortest Path First (OSPFv2) running in Service Provider networks
  • Implement advanced features of multilevel Intermediate System to Intermediate System (ISIS) running in Service Provider networks
  • Configure route redistribution
  • Configure Border Gateway Protocol (BGP) in order to successfully connect the Service Provider network to the customer or upstream Service Provider
  • Configure BGP scalability in Service Provider networks
  • Implement BGP security options
  • Implement advanced features in order to improve convergence in BGP networks
  • Troubleshoot OSPF, ISIS, and BGP
  • Implement and verify MPLS
  • Implement and troubleshoot MPLS traffic engineering
  • Implement and verify segment routing technology within an interior gateway protocol
  • Describe how traffic engineering is used in segment routing networks
  • Implement IPv6 tunnelling mechanisms
  • Describe and compare core multicast concepts
  • Implement and verifying the PIM-SM protocol
  • Implement enhanced Protocol-Independent Multicast – Sparse Mode (PIM-SM) features
  • Implement Multicast Source Discovery Protocol (MSDP) in the interdomain environment
  • Implement mechanisms for dynamic Rendezvous Point (RP) distribution

outline
  • Implementing and Verifying Open Shortest Path First Multiarea Networks
  • Implementing and Verifying Intermediate System to Intermediate System Multilevel Networks
  • Introducing Routing Protocol Tools, Route Maps, and Routing Policy Language
  • Implementing Route Redistribution
  • Influencing Border Gateway Protocol Route Selection
  • Scaling BGP in Service Provider Networks
  • Securing BGP in Service Provider Networks
  • Improving BGP Convergence and Implementing Advanced Operations
  • Troubleshooting Routing Protocols
  • Implementing and Verifying MPLS
  • Implementing Cisco MPLS Traffic Engineering
  • Implementing Segment Routing
  • Describing Segment Routing Traffic Engineering (SR-TE)
  • Deploying IPv6 Tunneling Mechanisms
  • Implementing IP Multicast Concepts and Technologies
  • Implementing the PIM-SM Protocol
  • Implementing PIM-SM Enhancements
  • Implementing Interdomain IP Multicast
  • Implementing Distributed Rendezvous Point Solution in Multicast Network

Lab outline

  • Implement OSPF Special Area Types (IPv4 and IPv6)
  • Implement Multiarea IS-IS
  • Implement Route Redistribution
  • Influence BGP Route Selection
  • Implement BGP Route Reflectors
  • Implement BGP Security Options
  • Troubleshoot Routing Protocols
  • Implement MPLS in the Service Provider Core
  • Implement Cisco MPLS TE
  • Configure and Verify Interior Gateway Protocol (IGP) Segment Routing
  • Implement Tunnels for IPv6
  • Enable and Optimize PIM-SM
  • Implement PIM-SM Enhancements
  • Implement Rendezvous Point Distribution

target_au

This course is for professionals who need knowledge about implementing various Service Provider core technologies and advanced routing technologies.

  • Network administrators
  • System engineers
  • Project managers
  • Network designers

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Intermediate to advanced knowledge of Cisco Internetwork Operating System (Cisco IOS ®) or IOS XE and Cisco IOS XR Software configuration
  • Knowledge of IPv4 and IPv6 TCP/IP networking
  • Intermediate knowledge of BGP, OSPF, and IS-IS routing protocols
  • Understanding of MPLS technologies
  • Understanding of multicast technologies
  • Familiarity with segment routing

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleSPCOR – Implementing and Operating Cisco Service Provider Network Core Technologies
days5
seo_titleSPCOR - Implementing & Operating Cisco Service Provider Network Core
seo_decThe SPCOR course teaches you how to configure, verify, troubleshoot, and optimize next-generation, Service Provider IP network infrastructures.
seo_tkeySPCOR
categoryservice-provider
vendorCisco

techonogyService Provider Training
overviewThe Implementing and Operating Cisco Service Provider Network Core Technologies(SPCOR) v1.0 course teaches you how to configure, verify, troubleshoot, and optimize next-generation, Service Provider IP network infrastructures. It provides a deep dive into Service Provider technologies including core architecture, services, networking, automation, quality of services, security, and network assurance.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe the Service Provider network architectures, concepts, and transport technologies
  • Describe the Cisco Internetwork Operating System (Cisco IOS®) software architectures, main IOS types, and their differences
  • Implement Open Shortest Path First (OSPF) in the Service Provider network
  • Implement Integrated Intermediate System-to-Intermediate System (IS-IS) in the Service Provider network
  • Implement Border Gateway Protocol (BGP) routing in Service Provider environments
  • Implement route maps and routing policy language
  • Describe IPv6 transition mechanisms used in the Service Provider networks
  • Implement high-availability mechanisms in Cisco IOS XR software
  • Implement traffic engineering in modern Service Provider networks for optimal resource utilization
  • Describe segment routing and segment routing traffic engineering concepts
  • Describe the VPN technologies used in the Service Provider environment
  • Configure and verify Multiprotocol Label Switching (MPLS) L2VPN in Service Provider environments
  • Configure and verify MPLS L3VPN in Service Provider environments
  • Implement IP multicast services
  • Describe the Quality of Service (QoS) architecture and QoS benefits for SP networks
  • Implement QoS in Service Provider environments
  • Implement control plane security in Cisco devices
  • Implement management plane security in Cisco devices
  • Implement data plane security in Cisco devices
  • Describe the Yet Another Next Generation (YANG) data modelling language
  • Implement automation and assurance tools and protocols
  • Describe the role of Cisco Network Services Orchestrator (NSO) in Service Provider environments
  • Implement virtualization technologies in Service Provider environments

outline
  • Describing Service Provider Network Architectures
  • Describing Cisco IOS Software Architectures
  • Implementing OSPF
  • Implementing IS-IS
  • Implementing BGP
  • Implementing Route Maps and Routing Protocol for LLN [Low-Power and Lossy Networks] (RPL)
  • Transitioning to IPv6
  • Implementing High Availability in Networking
  • Implementing MPLS
  • Implementing Cisco MPLS Traffic Engineering
  • Describing Segment Routing
  • Describing VPN Services
  • Configuring L2VPN Services
  • Configuring L3VPN Services
  • Implementing Multicast
  • Describing QoS Architecture
  • Implementing QoS
  • Implementing Control Plane Security
  • Implementing Management Plane Security
  • Implementing Data Plane Security
  • Introducing Network Programmability
  • Implementing Automation and Assurance
  • Introducing Cisco NSO
  • Implementing Virtualization in Service Provider Environments

Lab outline

  • Deploy Cisco IOS XR and IOS XE Basic Device Configuration
  • Implement OSPF Routing
  • Implement Integrated IS-IS Routing
  • Implement Basic BGP Routing
  • Filter BGP Prefixes Using RPL
  • Implement MPLS in the Service Provider Core
  • Implement Cisco MPLS Traffic Engineering (TE)
  • Implement Segment Routing
  • Implement Ethernet over MPLS (EoMPLS)
  • Implement MPLS L3VPN
  • Implement BGP Security
  • Implement Remotely Triggered Black Hole (RTBH) Filtering

target_au
  • Network administrators
  • Network engineers
  • Network managers
  • System engineers
  • Project managers
  • Network designers

pre_req
  • Intermediate knowledge of Cisco IOS or IOS-XE
  • Familiarity with Cisco IOS or IOS XE and Cisco IOS XR Software configuration
  • Knowledge of IPv4 and IPv6 TCP/IP networking
  • Intermediate knowledge of IP routing protocols
  • Understanding of MPLS technologies
  • Familiarity with VPN technologies

titleSVPN – Implementing Secure Solutions with Virtual Private Networks
days5
seo_titleSVPN - Implementing Secure Solutions with Virtual Private Networks
seo_decThe SVPN course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions.
seo_tkeySVPN
categorysecurity-cls
vendorCisco

techonogySecurity
overviewThe Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy. This course will prepare you for the 300-730 Implementing Secure Solutions with Virtual Private Networks (SVPN) exam. This course will help you:
  • Acquire the knowledge and skills to enhance Internet privacy, speed, and performance
  • Gain hands-on experience using the tools to ensure premium data security
  • Prepare for the 300-730 SVPN exam
  • Earn 40 CE credits toward recertification
What to expect in the exam The 300-730 SVPN exam certifies your knowledge and skills related to implementing secure remote communications with Virtual Private Network (VPN) solutions including secure communications, architectures, and troubleshooting. After you pass 300-730 SVPN exam, you earn the Cisco® Certified Specialist - Network Security VPN Implementation and you satisfy the concentration exam requirement for this professional-level certification:   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Introduce site-to-site VPN options available on Cisco router and firewalls
  • Introduce remote access VPN options available on Cisco router and firewalls
  • Review site-to-site and remote access VPN design options
  • Review troubleshooting processes for various VPN options available on Cisco router and firewalls

outline
  • Introducing VPN Technology Fundamentals
  • Implementing Site-to-Site VPN Solutions
  • Implementing Cisco Internetwork Operating System (Cisco IOS®) Site-to-Site FlexVPN Solutions
  • Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions
  • Implementing Cisco AnyConnect VPNs
  • Implementing Clientless VPNs

Lab outline

  • Explore IPsec Technologies
  • Implement and Verify Cisco IOS Point-to-Point VPN
  • Implement and Verify Cisco Adaptive Security Appliance (ASA) Point-to-Point VPN
  • Implement and Verify Cisco IOS Virtual Tunnel Interface (VTI) VPN
  • Implement and Verify Dynamic Multipoint VPN (DMVPN)
  • Troubleshoot DMVPN
  • Implement and Verify FlexVPN with Smart Defaults
  • Implement and Verify Point-to-Point FlexVPN
  • Implement and Verify Hub and Spoke FlexVPN
  • Implement and Verify Spoke-to-Spoke FlexVPN
  • Troubleshoot Cisco IOS FlexVPN
  • Implement and Verify AnyConnect Transport Layer Security (TLS) VPN on ASA
  • Implement and Verify Advanced Authentication, Authorization, and Accounting (AAA) on Cisco AnyConnect VPN
  • Implement and Verify Clientless VPN on ASA

target_au

This course is designed for professionals in the following job roles:

  • Network security engineer
  • CCNP Security candidate
  • Channel Partner

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Familiarity with the various Cisco router and firewall command modes
  • Experience navigating and managing Cisco routers and firewalls
  • A clear understanding of the benefits of site-to-site and Remote Access VPN options

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleDCAUI – Implementing Automation for Cisco Data Center Solutions
days3
seo_titleDCAUI - Implementing Automation for Cisco Data Center Solutions
seo_decThe DCAUI course teaches you how to implement Cisco Data Center automated solutions including programming concepts, orchestration, and automation tools.
seo_tkeyDCAUI
categorynetwork-automation
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 course teaches you how to implement Cisco® Data Center automated solutions including programming concepts, orchestration, and automation tools. Through a combination of lessons and hands-on practice, you will manage the tools and learn the benefits of programmability and automation in the Cisco-powered Data Center. You will examine Cisco Application Centric Infrastructure (Cisco ACI®), Software-Defined Networking (SDN) for Data Center and cloud networks, Cisco Nexus® (Cisco NX-OS) platforms for device-centric automation, and Cisco Unified Computing System (Cisco UCS®) for Data Center compute. You will study their current ecosystem of Application Programming Interfaces (APIs), software development toolkits, and relevant workflows along with open industry standards, tools, and APIs, such as Python, Ansible, Git, JavaScript Object Notation (JSON), Yaml Ain't Markup Language (YAML), Network Configuration Protocol (NETCONF), Representational State Transfer Configuration Protocol (RESTCONF), and Yet Another Generation (YANG). This course prepares you for the 300-635 Automating Cisco Data Center Solutions (DCAUTO) certification exam. See other Cisco courses available
objective

After taking this course, you should be able to:

  • Review Cisco ACI fundamental concepts and GUI workflows, and create the case for implementing automation
  • Introduce the Cisco ACI REST API, the tools already available on the Cisco Application Policy Infrastructure Controller (APIC), and understand basic API interaction using Postman
  • Understand the functionality provided by the Python ACI libraries and write scripts that apply configuration and verify state on the Cisco ACI fabric
  • Understand Cisco ACI Ansible modules, build playbooks that apply Infrastructure-as-Code concepts to Cisco ACI tenant configuration, and generate a health report using Ansible
  • Understand Cisco ACI Apps Center integration and the benefits of integrating Kubernetes infrastructure with Cisco ACI
  • Understand the API types and capabilities available on the Cisco Nexus product family
  • Understand Day 0 operations and how Zero Touch Provisioning (ZTP), PowerOn Auto Provisioning (POAP), and enhanced Pre-boot eXecution Environment (iPXE) fulfil these goals with their respective tooling
  • Understand functionality provided by the on-box tooling on the Cisco Nexus series switches and implement simple solutions to improve daily operation
  • Use Python and Ansible to leverage the NX-API to implement and verify configuration state using modern workflows
  • Understand the paradigm shift of Model-Driven Telemetry and explore a fully set up pipeline for data collection and analysis
  • Understand the Cisco UCS developer tools and implement management workflows leveraging Cisco UCS APIs, Python, and Ansible modules
  • Leverage Cisco UCS Director APIs to manage infrastructure using Postman and Python scripts
  • Review Cisco Data Center Network Manager (DCNM) product capabilities and understand how its API can be beneficial to automating the Cisco Data Center
  • Understand the advantages of using Cisco Intersight™ and how to implement automation tasks using its REST APIs via Python and Ansible

outline
  • Describing the Cisco ACI Policy Model
  • Describing the Cisco APIC REST API
  • Using Python to Interact with the ACI REST API
  • Using Ansible to Automate Cisco ACI
  • Describing Cisco ACI Apps Center and Kubernetes Integration
  • Introducing Cisco NX-OS Programmability
  • Describing Day-Zero Provisioning with Cisco NX-OS
  • Implementing On-Box Programmability and Automation with Cisco NX-OS
  • Implementing Off-Box Programmability and Automation with Cisco NX-OS
  • Understanding Model-Driven Telemetry
  • Automating Cisco UCS Using Developer Tools
  • Implementing Workflows Using Cisco UCS Director
  • Describing Cisco DCNM
  • Describing Cisco Intersight

Lab outline

  • Use the Cisco APIC Web GUI
  • Discover the Cisco APIC REST API
  • Use Postman with the APIC REST API
  • Use Python with the Cisco APIC REST API
  • Configure and Verify Cisco ACI Using Acitoolkit
  • Use Cobra and Arya to Recreate a Tenant
  • Manage Configuration Using Ansible
  • Set Up a New Tenant the NetDevOps Way
  • Create an Infrastructure Health Report
  • Install an Application from the App Center on the Cisco APIC
  • Power on Auto Provisioning on the Cisco Nexus 9000
  • Use Bash and Guest-Shell on Cisco NX-OS
  • Use Python to Enhance CLI Commands
  • Trigger a Python Script Using Cisco Embedded Event Manager (EEM)
  • Docker Containers on NX-OS
  • Configure and Verify Using NX-API and Python
  • Configure and Verify Using NETCONF/YANG
  • Use Ansible with NX-OS
  • Streaming Telemetry
  • Connect, Query, and Modify Cisco UCS Manager Objects Using Cisco UCS PowerTool
  • Discovery 21: Connect, Query, and Modify Cisco UCS Integrated Management Controller (IMC) Objects Using Cisco IMC PowerTool
  • Utilize the Cisco UCS Python Software Development Kit (SDK)
  • Utilize the Cisco IMC Python SDK
  • Implement Ansible Playbooks to Modify and Verify the Configuration of the Cisco UCS Manager

target_au

This course is designed for network and software engineers who hold the following job roles:

  • Network engineer
  • Systems engineer
  • Wireless engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network administrator
  • Wireless design engineer
  • Network manager
  • Site reliability engineer
  • Deployment engineer
  • Sales engineer
  • Account manager

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Basic programming language concepts
  • Basic understanding of virtualization and VMware
  • Ability to use Linux and Command Line Interface (CLI) tools, such as Secure Shell (SSH) and bash
  • CCNP level Data Center knowledge
  • A foundational understanding of Cisco ACI

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleCLAUI – Implementing Automation for Cisco Collaboration Solutions
days3
seo_titleCLAUI - Implementing Automation for Cisco Collaboration Solutions
seo_decThe CLAUI course teaches you how to implement Cisco Collaboration automated solutions for voice, video, conferencing and leverage frameworks such as Python.
seo_tkeyCLAUI
categorynetwork-automation
vendorCisco

techonogyCollaboration
overviewThe Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 course teaches you how to implement Cisco® Collaboration automated, programmable solutions for voice, video, collaboration, and conferencing on-premises or in the cloud. Through a combination of lessons and hands-on labs, you will combine tools and processes to tackle communication challenges using key platforms including Cisco Unified Communications Manager, Cisco IP Phone Services, Cisco Unity® Connection, Cisco Finesse®, Cisco Collaboration Endpoints, Cisco Webex Teams™, and Cisco Webex® Meetings. You will also learn how to use Application Programming Interfaces (APIs) interfaces such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP), parsing data in Extensible Markup Language (XML) and JavaScript Object Notation (JSON) formats, and leverage frameworks such as Python.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Examine API and automation capabilities and concepts for Cisco Unified Communication Manager
  • Examine API and automation capabilities and concepts for Cisco Unity Connection
  • Examine API and automation capabilities and concepts for Cisco Finesse
  • Examine Experience API (xAPI) and automation capabilities and concepts for Cisco Collaboration endpoints
  • Examine API and automation capabilities and concepts for Cisco Webex Teams
  • Examine API and automation capabilities and concepts for Cisco Webex Meetings

outline
  • Automating Cisco Unified Communications Manager
  • Automating the Cisco Unity Connection
  • Automating Cisco Finesse
  • Examining Cisco Collaboration Endpoint Automation
  • Examining Cisco Cloud Collaboration Automation
  • Examining Cisco Conferencing Automation

Lab outline

  • Configure the Initial Collaboration Lab Environment
  • Verify Phone Details
  • Configure Phone Line Label
  • Configure User Pin
  • Configure System Forward No Answer Timer
  • Configure Route Plan Report
  • Deploy Basic SQL Query
  • Deploy Advanced SQL Query
  • Configure an Alternate Extension in Cisco Unity Connection
  • Configure Voicemail Pin
  • Verify Agent Settings
  • Deploy Gadget
  • Deploy Modify Call Via Video Codec
  • Configure System Name and Branding
  • Deploy and Monitor Video Call
  • Configure Custom Control Panel
  • Deploy Macro
  • Verify Cisco Webex Organization and License Information
  • Configure New Cisco Webex Teams Room
  • Deploy Interactive Bot
  • Deploy Widget
  • Configure Cisco Webex Meetings User
  • Configure and Record Cisco Webex Meeting
  • Verify System Status
  • Configure Host Access on Cisco Meeting Server Spaces

target_au

This course is designed for network and software engineers interested in Cisco Collaboration and Webex automation and who hold job roles such as:

  • Collaboration Sales Engineer
  • Collaboration Software Developer
  • Collaboration Solutions Architect
  • Consulting Systems Engineer
  • Network Administrator
  • Network Engineer
  • Network Manager
  • Software Architect
  • Software Developer
  • Systems Engineer
  • Technical Solutions Architect
  • Wireless Design Engineer
  • Wireless Engineer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Basic knowledge of Simple Object Access Protocol (SOAP) and REST APIs
  • Basic programming and scripting skills in Python
  • Intermediate knowledge in managing and configuring three or more of the following Cisco Collaboration offerings:
    • Cisco Unified Communications Manager
    • Cisco IP Phones
    • Cisco Finesse
    • Cisco Webex Devices (Collaboration and Video Endpoints)
    • Cisco Webex Teams

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleENAUI – Implementing Automation for Cisco Enterprise Solutions
days3
seo_titleENAUI - Implementing Automation for Cisco Enterprise Solutions Training
seo_decThe ENAUI course teaches you how to integrate automation in the Cisco Enterprise Campus and Wide Area Network (WAN) using programming concepts.
seo_tkeyENAUI
categorynetwork-automation
vendorCisco

techonogyEnterprise Networking
overviewThe Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 course teaches you how to integrate programmability and automation in the Cisco®-powered Enterprise Campus and Wide Area Network (WAN) using programming concepts, orchestration, telemetry, and automation tools to create more efficient workflows and more agile networks. Through a combination of lessons and hands-on labs, you will gain knowledge and skills for using Cisco Internetworking Operating System (Cisco IOS®-XE) for device-centric automation, Cisco Digital Network Architecture (Cisco DNA™) Center for the intent-based enterprise network, Cisco Software-Defined (SD) WAN, and Cisco Meraki™. You will study software development toolkits, industry-standard workflows, tools, and Application Programming Interface (APIs), such as Python, Ansible, Git, JavaScript Object Notation (JSON), YAML Ain’t Markup Language (YAML), Network Configuration Protocol (NETCONF), Representational State Configuration Protocol (RESTCONF), and Yet Another Generation (YANG).   See other Cisco courses available
objective

After taking the ENAUI course, you should be able to:

  • Describe the various models and APIs of the Cisco IOS-XE platform to perform Day 0 operations, improve troubleshooting methodologies with custom tools, augment the Command-Line Interface (CLI) using scripts, and integrate various workflows using Ansible and Python
  • Explain the paradigm shift of model-driven telemetry and the building blocks of a working solution
  • Control the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center™
  • Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman
  • Explain Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure
  • Manage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible and Postman

outline
  • Introducing Cisco SD-WAN Programmability
  • Building Cisco SD-WAN Automation with Python
  • Building Cisco SD-WAN Automation with Ansible
  • Managing Configuration with Ansible and Network Automation and Programmability Abstraction Layer with Multivendor support (NAPALM)
  • Implementing On-Box Programmability and Automation with Cisco IOS XE Software
  • Implementing Model-Driven Telemetry
  • Day 0 Provisioning with Cisco IOS-XE
  • Automating Cisco Meraki
  • Implementing Meraki Integration APIs
  • Implementing Automation in Enterprise Networks
  • Building Cisco DNA Center Automation with Python
  • Automating Operations using Cisco DNA Center

Lab outline

  • Perform Administrative Tasks Using the Cisco SD-WAN API
  • Build, Manage, and Operate Cisco SD-WAN Programmatically
  • Consume SD-WAN APIs Using the Uniform Resource Identifier (URI) Module
  • Build Reports Using Ansible-Viptela Roles
  • Manage Feature Templates with Ansible
  • Use NAPALM to Configure and Verify Device Configuration
  • Implement On-Box Programmability and Automation with Cisco IOS XE Software
  • Use Python on Cisco IOS XE Software
  • Implement Streaming Telemetry with Cisco IOS XE
  • Implement Cisco Meraki API Automation
  • Explore Cisco Meraki Integration APIs
  • Explore Cisco Meraki Webhook Alerts

target_au

This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:

  • Network engineer
  • Systems engineer
  • Wireless engineer
  • Consulting systems engineer
  • Network administrator
  • Wireless design engineer
  • Network manager
  • Sales engineer
  • Account manager

pre_req

Before taking the ENAUI course, you should have the following knowledge and skills:

  • Basic programming language concepts
  • Basic understanding of virtualization
  • Ability to use Linux and CLI tools, such as Secure Shell (SSH) and bash
  • Networking knowledge equivalent to the CCNP level
  • A foundational understanding of Cisco DNA, Meraki, and Cisco SD-WAN

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleDEVWBX – Developing Applications for Cisco Webex and Webex Devices
days5
seo_titleDEVWBX - Developing Applications for Cisco Webex and Devices
seo_decIn the DEVWBX training course you will learn the Webex API, meetings, devices, teams, messaging, embedding Cisco Webex, administration, and compliance.
seo_tkeyDEVWBX
categorynetwork-automation
vendorCisco

techonogyEnterprise Networking
overviewThe Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.0 training course prepares you to use the programmability features of Webex®, Cisco® enterprise solution for video conferencing, online meetings, online training, webinars, web conferencing, cloud calling, and collaboration. Through a combination of lessons and hands-on labs, you will learn about Webex Application Programming Interface (API) Foundation, meetings, devices, teams, messaging, embedding Cisco Webex, administration, and compliance. You will learn how to leverage Webex APIs to extend the functionalities of teams, meetings, and devices, and explore how these APIs can help automate, administer, and enforce compliance. This course prepares you for the 300-920 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) exam.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe and use Webex APIs, authentication, and documentation
  • Manage meetings using the Webex Meetings Representational State Transfer (REST) API and Extensible Markup Language (XML) API
  • Manage and extend Cisco Collaboration Devices with Experience API (xAPI), macros, and user interface customizations
  • Program with WebEx teams REST API, cards, webhooks, and bots
  • Embed Webex collaboration features into web and mobile applications using the Webex teams JavaScript SDK, widgets, and Mobile Software Development Kits (SDKs)
  • Manage Webex administration and compliance using JavaScript

outline
  • Introducing Webex APIs Foundations
    • Webex as an Extensible Platform
  • Managing Meetings with the Cisco Webex Meetings XML API
    • Describe the capabilities of Cisco Webex meeting APIs
  • Automating and Extending Cisco Collaboration Devices with xAPI
    • Manage and extend Cisco collaboration devices with xAPI, macros, and user interface customizations
  • Building Webex Teams Applications
    • Describe the different uses and capabilities for Webex Teams programmability
  • Embedding Cisco Webex
    • Embed Webex collaboration features into web and mobile applications using the Webex Teams™ JavaScript SDK, widgets, and Mobile SDKs
  • Managing Administration and Compliance with Cisco Webex Teams APIs
    • Construct the JavaScript code to administer a Webex organization including users, licenses and devices

target_au

This course is designed for professionals in job roles such as:

  • Network engineer
  • Communication engineer
  • Software engineer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Basic programming knowledge
  • JavaScript, Node.js, JavaScript Object Notation (JSON), REST syntax and uses, and Visual Studio Code Integrated Development Environment (IDE) familiarity
  • Knowledge of Webex products usage and administration: teams, meetings, and devices

titleDEVIOT – Developing Solutions using Cisco IoT and Edge Platforms
days5
seo_titleDEVIOT - Developing Solutions using Cisco IoT and Edge Platforms
seo_decThe DEVIOT course prepares you to develop Internet of Things (IoT) applications for Cisco IoT edge compute and network architecture.
seo_tkeyDEVIOT
categorynetwork-automation
vendorCisco

techonogyEnterprise Networking
overviewThe Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) v1.0 course prepares you to develop Internet of Things (IoT) applications for Cisco® IoT edge compute and network architecture. Through a combination of lessons and hands-on experience, you will learn to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic. This course covers designing, deploying, and troubleshooting edge applications, and understanding the use of management tools, so you can control your industrial network and connected devices at scale. This course will prepare you for the 300-915 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) exam.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Explain the fundamentals of Cisco IoT and list common devices involved
  • List the common protocols, standards, and data flows of IoT
  • Explain the Cisco IoT, common needs, and the corresponding solutions
  • Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective
  • Describe common Cisco IoT applications and how they apply to Cisco IoT use cases
  • Explain the functions and use cases for Cisco security applications and Cisco IoT

outline
  • Defining Cisco IoT
  • IoT Networking and Other Devices
  • Examining IoT Protocols
  • Examining IoT Standards
  • Recognizing Cisco IoT Needs and Solutions
  • Using Programmability with Cisco IoT
  • Describing Cisco IoT Applications: Cisco IOx
  • Describing Cisco IoT Applications: Cisco Kinetic and Cisco Field Network Director
  • Defining Cisco Security Applications

Lab outline

  • Use an MQTT Consumer to Subscribe to Sensor Data
  • Use Cisco IOx Applications to Receive and Process Sensor Data
  • Troubleshoot a Sensor Connection
  • Use and Interpret Freeboard Data
  • Use and Interpret Grafana Data
  • Use and Interpret Kibana Data
  • Cisco IOx Familiarity Lab
  • Develop and Deploy a Cisco IOx Application
  • Troubleshoot Cisco IOx
  • Navigate Cisco Field Network Director
  • Explore Cisco Field Network Director API

target_au

This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:

  • Consulting systems engineer
  • IoT Designer
  • Network administrator
  • Network engineer
  • Network manager
  • Sales engineer
  • Systems engineer
  • Technical solutions architect

pre_req

Before taking this course, you should have the following knowledge and skills:

  • General software development or coding skills
  • Basic functional and object-oriented programming skills
  • Basic understanding of where applications live and how they are deployed in real-world scenarios
  • Basic understand of how networking works
  • Basic Linux OS skills: installing code language dependencies, installing code libraries, and general scripting
  • Understanding of how to store code using git or another Version-Control System (VCS)

titleDEVOPS – Implementing DevOps Solutions and Practices using Cisco Platforms
days5
seo_titleDEVOPS - Implementing DevOps Solutions using Cisco Platforms
seo_decThe DEVOPS course teaches you how to automate application deployment on Cisco platforms and how to integrate it Docker and Kubernetes.
seo_tkeyDEVOPS
categorynetwork-automation
vendorCisco

techonogyEnterprise Networking
overviewThe Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) v1.0 course teaches you how to automate application deployment, enable automated configuration, enhance management, and improve the scalability of cloud microservices and infrastructure processes on Cisco® platforms. You will also learn how to integrate Docker and Kubernetes to create advanced capabilities and flexibility in application deployment. This course prepares you for the 300-910 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) certification exam.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe the DevOps philosophy and practices, and how they apply to real-life challenges
  • Explain container-based architectures and available tooling provided by Docker
  • Describe application packaging into containers and start building secure container images
  • Utilize container networking and deploy a three-tier network application
  • Explain the concepts of Configuration Item (CI) pipelines and what tooling is available
  • Implement a basic pipeline with Gitlab CI that builds and deploys applications
  • Implement automated build testing and validation
  • Describe DevOps principles applied to infrastructure
  • Implement on-demand test environments and explain how to integrate them with an existing pipeline
  • Implement tooling for metric and log collection, analysis, and alerting
  • Describe the benefits of application health monitoring, telemetry, and chaos engineering in the context of improving the stability and reliability of the ecosystem
  • Describe how to implement secure DevOps workflows by safely handling sensitive data and validating applications
  • Explain the design and operational concepts related to using a mix of public and private cloud deployments
  • Describe modern application design and microservices architectures
  • Describe the building blocks of Kubernetes and how to use its APIs to deploy an application
  • Explain advanced Kubernetes deployment patterns and implement an automated pipeline
  • Explain how monitoring, logging, and visibility concepts apply to Kubernetes

outline
  • Introducing the DevOps Model
  • Introducing Containers
  • Packaging an Application Using Docker
  • Deploying a Multitier Application
  • Introducing CI/CD
  • Building the DevOps Flow
  • Validating the Application Build Process
  • Building an Improved Deployment Flow
  • Extending DevOps Practices to the Entire Infrastructure
  • Implementing On-Demand Test Environments at the Infrastructure Level
  • Monitoring in NetDevOps
  • Engineering for Visibility and Stability
  • Securing DevOps Workflows
  • Exploring Multicloud Strategies
  • Examining Application and Deployment Architectures
  • Describing Kubernetes
  • Integrating Multiple Data Center Deployments with Kubernetes
  • Monitoring and Logging in Kubernetes

Lab outline

  • Interact with GitLab Continuous Integration (CI)
  • Explore Docker Command-Line Tools
  • Package and Run a WebApp Container
  • Build and Deploy Multiple Containers to Create a Three-Tier Application
  • Explore Docker Networking
  • Build and Deploy an Application Using Docker Compose
  • Implement a Pipeline in Gitlab CI
  • Automate the Deployment of an Application
  • Validate the Application Build Process
  • Validate the Deployment and Fix the Infrastructure
  • Build a Yaml Ain’t Markup Language (YAML) Infrastructure as Code (IaC) Specification for the Test Environment
  • Manage On-Demand Test Environments with Terraform
  • Build Ansible Playbooks to Manage Infrastructure
  • Integrate the Testing Environment in the CI/CD Pipeline
  • Implement Pre-deployment Health Checks
  • Set Up Logging for the Application Servers and Visualize with Kibana
  • Create System Dashboard Focused on Metrics
  • Use Alerts Through Kibana
  • Instrument Application Monitoring
  • Use Alerts and Thresholds to Notify Webhook Listener and Cisco Webex® Teams™ Rooms
  • Secure Infrastructure in the CI/CD Pipeline
  • Explore Kubernetes Setup and Deploy an Application
  • Explore and Modify a Kubernetes CI/CD Pipeline
  • Kubernetes Monitoring and Metrics—Elasticsearch, Logstash, and Kibana (ELK)

target_au

This course is designed for network and software engineers interested in automation and programmability and who hold job roles such as:

  • Account manager
  • Consulting systems engineer
  • Network administrator
  • Network engineer
  • Network manager
  • Sales engineer
  • Systems engineer
  • Technical solutions architect
  • Wireless design engineer
  • Wireless engineer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Basic programming language concepts and familiarity with Python
  • Basic understanding of compute virtualization
  • Ability to use Linux, text-driven interfaces, and CLI tools, such as Secure Shell (SSH), bash, grep, IP, vim/nano, curl, ping, traceroute, and telnet
  • A foundational understanding of Linux-based OS architecture and system utilities
  • CCNA level core networking knowledge
  • A foundational understanding of DevOps concepts
  • Awareness and familiarity with continuous integration, continuous deployment, and continuous delivery CI/CD) concepts
  • Hands-on experience with Git

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleSCOR – Implementing and Operating Cisco Security Core Technologies
days5
seo_titleSCOR - Implementing and Operating Cisco Security Core Technologies
seo_decThe SCOR course helps you prepare for the Cisco CCNP Security and CCIE Security certifications and for senior-level security roles.
seo_tkeySCOR
categorysecurity-cls
vendorCisco

techonogySecurity
overviewThe Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. This course will help you:
  • Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
  • Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam
  • Qualify for professional and expert-level security job roles
  • Earn 64 CE credits toward recertification
What to expect in the exam This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security technologies. After you pass 350-701 SCOR:
  • You earn the Cisco Certified Specialist - Security Core certification
  • You satisfy the core requirement for CCNP Security and CCIE Security. To complete your CCNP Security certification, pass one of the security concentration exams. To complete your CCIE Security certification, pass the CCIE Security v6.0 Lab Exam
  See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe information security concepts and strategies within the network
  • Describe common TCP/IP, network application, and endpoint attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW)
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication

outline
  • Describing Information Security Concepts*
  • Describing Common TCP/IP Attacks*
  • Describing Common Network Application Attacks*
  • Describing Common Endpoint Attacks*
  • Describing Network Security Technologies
  • Deploying Cisco ASA Firewall
  • Deploying Cisco Firepower Next-Generation Firewall
  • Deploying Email Content Security
  • Deploying Web Content Security
  • Deploying Cisco Umbrella*
  • Explaining VPN Technologies and Cryptography
  • Introducing Cisco Secure Site-to-Site VPN Solutions
  • Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Introducing Cisco Secure Remote Access VPN Solutions
  • Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Explaining Cisco Secure Network Access Solutions
  • Describing 802.1X Authentication
  • Configuring 802.1X Authentication
  • Describing Endpoint Security Technologies*
  • Deploying Cisco Advanced Malware Protection (AMP) for Endpoints*
  • Introducing Network Infrastructure Protection*
  • Deploying Control Plane Security Controls*
  • Deploying Layer 2 Data Plane Security Controls*
  • Deploying Layer 3 Data Plane Security Controls*
  • Deploying Management Plane Security Controls*
  • Deploying Traffic Telemetry Methods*
  • Deploying Cisco Stealthwatch Enterprise*
  • Describing Cloud and Common Cloud Attacks*
  • Securing the Cloud*
  • Deploying Cisco Stealthwatch Cloud*
  • Describing Software-Defined Networking (SDN*)

*  This section is self-study material that can be done at your own pace if you are taking the instructor-led version of this course.


target_au
  • Security engineer
  • Network engineer
  • Network designer
  • Network administrator
  • Systems engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network manager
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with the basics of networking security concepts

 

These Cisco courses are recommended to help you meet these prerequisites:


titleCLACCM – Implementing Cisco Advanced Call Control and Mobility Services
days5
seo_titleCLACCM - Implementing Cisco Advanced Call Control & Mobility Services
seo_decThe CLACCM course you will teach how to use Cisco Unified Communications Manager to consolidate your communications infrastructure into a scalable solution.
seo_tkeyCLACCM
categorycollaboration-cls
vendorCisco

techonogyCollaboration
overviewThe Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services. You will learn how to use Cisco® Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution. Through a combination of lessons and hands-on experiences, you will also learn about a wealth of other features such as Globalized Call Routing, Global Dial Plan Replication, Cisco Unified Mobility, Cisco Extension Mobility, Device Mobility, Session Initiation Protocol Uniform Resource Identifier (SIP/ URI) call routing, Call Admission Control, Cisco Unified Communications Manager Express and Survivable Remote Site Telephony (SRST) gateway technologies, Cisco Unified Board Element Call deployments, signaling and media protocols, call coverage, and time of day routing. This course prepares you for the 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) exam. This course will help you:
  • Learn how to manage the tools of Cisco Unified Communications Manager (CM) for secure communication to facilitate team-based collaboration from any location using Voice over Internet Protocol (VoIP), video, unified messaging, and IM
  • Gain hands-on experience in using Cisco Unified Communications Manager for secure, compliant communication protocols
  • Acquire the knowledge to prepare for the 300-815 CLACCM exam
  • Earn 40 CE credits toward recertification
What to expect in the exam The 300-815 CLACCM exam certifies your knowledge and skills related to advanced call control and mobility services, including signaling and media protocols, Cisco Unified Communications Manager Express CME/SRST gateway technologies, Cisco Unified Board Element, call control and dial planning, Cisco Unified CM Call Control, and mobility. After you pass 300-815 CLACCM exam you earn the Cisco Certified DevNet Specialist - Collaboration Call Control and Mobility Implementation certification, and you satisfy the concentration exam requirement for this professional-level certification:
  • CCNP® Collaboration
  See other Cisco courses available
objective

After taking this course, you should be able to:

  • Analyze and troubleshoot SIP, H.323, and media protocols
  • Implement time-of-day routing, call park, call pickup, and meet-me conferences in Cisco Unified Communications Manager
  • Implement call coverage in Cisco Unified Communications Manager
  • Configure and troubleshoot Cisco Unified Communications Manager Device Mobility
  • Configure and troubleshoot Cisco Unified Communications Manager Extension Mobility
  • Configure and troubleshoot Cisco Unified Communications Manager Unified Mobility
  • Implement Cisco Unified Communications Manager Express for SIP phones
  • Implement globalized call routing within and between Cisco Unified Communications Manager clusters
  • Implement Media Gateway Control Protocol (MGCP) fallback and Survivable Remote Site Telephony (SRST) in Cisco Unified Communications Manager and in Cisco IOS® XE gateways
  • Implement Call Admission Control and Automated Alternate Routing (AAR) in Cisco Unified Communications Manager
  • Implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters
  • Troubleshoot multisite Cisco Unified Communications Manager deployments
  • Implement Intercluster Lookup Service (ILS) between Cisco Unified Communications Manager clusters and enable General Data Protection Regulation (GDPR)
  • Configure and troubleshoot Cisco Unified Border Element

outline
  • Analyzing and Troubleshooting Signaling and Media Protocols
  • Implementing Cisco Unified Communications Manager Supplemental Services
  • Implementing Call Coverage in Cisco Unified Communications Manager
  • Configuring and Troubleshooting Cisco Unified Communications Manager Device Mobility
  • Configuring and Troubleshooting Cisco Unified Communications Manager Extension Mobility
  • Configuring and Troubleshooting Cisco Unified CM Unified Mobility
  • Implementing Cisco Unified Communications Manager Express
  • Implementing Globalized Call Routing
  • Implementing Remote Site Survivability
  • Implementing Call Admission Control in Cisco Unified Communications Manager
  • Implementing URI Calling in Cisco Unified Communications Manager
  • Troubleshooting Multisite Cisco Unified Communications Manager Deployments
  • Examining Global Dial Plan Replication
  • Configuring and Troubleshooting Cisco Unified Border Element

Lab outline

  • Analyze SIP, H.323, and Media Protocols
  • Troubleshoot SIP and Media Protocols
  • Implement Cisco Unified Communications Manager Supplemental Services
  • Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager
  • Configure Device Mobility
  • Troubleshoot Cisco Unified Communications Manager Device Mobility
  • Configure Cisco Unified Communications Manager Extension Mobility
  • Troubleshoot Cisco Unified Communications Manager Extension Mobility
  • Configure Cisco Unified Mobility
  • Troubleshoot Cisco Unified Mobility
  • Implement Endpoints in Cisco Unified Communications Manager Express
  • Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express
  • Implement Calling Privileges in Cisco Unified Communications Manager Express
  • Implement Hunt Groups, Call Park, and Paging in Cisco United Communications Manager Express
  • Implement Globalized Call Routing
  • Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment
  • Implement MGCP Fallback and Survivable Remote Site Telephony
  • Implement Call Admission Control
  • Implement a URI-Based Dial Plan for Multisite Deployments
  • Troubleshoot Globalized Call Routing
  • Troubleshoot Call Admission Control
  • Implement Global Dial Plan Replication
  • Implement Cisco Unified Border Element
  • Troubleshoot Cisco Unified Border Element

target_au

This course is designed for Collaboration engineers and administration professionals in job roles such as:

  • Network administrator
  • Network architect
  • Network designer
  • Network engineer
  • Network manager

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Internet web browser usability knowledge and general computer usage
  • Basic understanding of networking technologies
  • Basic understanding of voice and video
  • Describe the different codecs and how they are used to transform analogue voice into digital streams
  • Knowledge of Cisco Internetworking Operation System (Cisco IOS XE) command line
  • Describe the Cisco Collaboration solutions architecture
  • Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premises deployment model
  • Configure and modify required parameters in Cisco Unified CM including service activation, enterprise parameters, CM groups, time settings, and device pool
  • Deploy and troubleshoot IP phones via manual configuration within Cisco Unified CM
  • Describe and configure endpoints and commonly required features
  • Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H.323, Media Gateway Control Protocol (MGCP), and Skinny Call Control Protocol (SCCP)
  • Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
  • Define Quality of Service (QoS) and its models
  • Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup
  • Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP])
  • Describe a dial plan and explain call routing in Cisco Unified Communications Manager
  • Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transformations, SIP Trunks, and SIP Route Patterns
  • Implement basic globalized call routing within a Cisco Unified Communications Manager cluster
  • Configure calling privileges in Cisco Unified Communications Manager
  • Implement toll fraud prevention
  • Implement common endpoint features including call park, softkeys, shared lines, and pickup groups
  • Implement Public Switched Telephone Network (PSTN) access using Media Gateway Control Protocol (MGCP) gateways
  • Implement a Cisco gateway for PSTN access
  • Deploy a simple SIP dial plan on a Cisco Interrupt Service Routine (ISR) gateway to enable access to the PSTN network
  • Implement and troubleshoot media resources in Cisco Unified Communications Manager
  • Manage Cisco Unified CM access to media resources available within Cisco Unified CM and Cisco ISR gateways
  • Describe tools for reporting and maintenance including Unified Reports, Real-Time Monitoring Tool (RTMT), Distributed Resource Scheduler (DRS), and Call Detail Records (CDRs) within Cisco Unified CM

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleCLICA – Implementing Cisco Collaboration Applications
days5
seo_titleCLICA - Implementing Cisco Collaboration Applications Training | Insoft UK
seo_decThe CLICA course helps you prepare for the Designing Cisco Enterprise Networks (ENSLD 300-420) exam, which is part of the CCNP Enterprise certifications.
seo_tkeyCLICA
categorycollaboration-cls
vendorCisco

techonogyCollaboration
overviewThe Implementing Cisco Collaboration Applications (CLICA) v1.0 course shows you how to implement Single Sign-On (SSO), Cisco Unified IM and Presence, Cisco Unity Connection, ad Cisco Unity Express. You will learn how to streamline communication procedures, strengthen compliance measures, and enhance your communication systems and devices. This course will prepare you for the exam:
  • 300-810 Implementing Cisco Collaboration Applications (CLICA)
This course will help you:
  • Learn to implement and troubleshoot voice mail and Interactive Voice Response (IVR) solutions using Cisco Unity Connections and Cisco Unity Express
  • Earn 40 credits toward recertification
  • Prepare for the 300-810 CLICA exam
What to expect in the exam The 300-810 CLICA exam certifies your knowledge and skills related to collaboration applications, including SSO, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients. After you pass 300-810 CLICA, you earn the Cisco Certified Specialist - Collaboration Applications Implementation certification, and you satisfy the concentration exam requirement for the CCNP® Collaboration certification.   See other Cisco courses available
objective

After taking this CLICA training course, you should be able to:

  • Configure Cisco Unity Connection integration
  • Configure and troubleshoot Cisco Unity Connection and Cisco Unity Connection call handlers
  • Configure and troubleshoot Cisco Unity Express
  • Describe SSO for Cisco Unified Communications applications
  • Describe how Cisco Jabber® and Cisco Unified Communications Manager IM and Presence are integrated with other Cisco or third-party applications
  • Customize the Cisco Unified Communications Manager IM and Presence and Cisco Jabber functionality
  • Configure and troubleshoot chat rooms and message archiving
  • Troubleshoot Cisco Jabber and Cisco Unified Communications Manager IM and Presence
  • Integrate Cisco Unified Attendant Console Advanced with Cisco Unified Communications Manager and Cisco Unified Communications Manager IM and Presence server
  • Configure call recording and monitoring

outline
  • Configuring and Troubleshooting Cisco Unity Connection Integration
  • Configuring and Troubleshooting Cisco Unity Connection Call Handlers
  • Troubleshooting Cisco Unity Connection
  • Configuring and Troubleshooting Cisco Unity Express
  • Configuring Single Sign-On (SSO) for Cisco Unified Communications Applications
  • Integrating Cisco Unified Communications Manager IM and Presence and Cisco Jabber
  • Customizing Cisco Unified Communications Manager IM and Presence and Cisco Jabber Functionality
  • Configuring Cisco Unified Communications Manager IM and Presence Service Compliance and Message Archiving
  • Troubleshooting Cisco Unified Communications Manager IM and Presence Service
  • Integrating Cisco Unified Attendant Console Advanced
  • Implementing Call Recording and Monitoring

Lab outline

  • Integrate and Set Up Cisco Unity Connection
  • Configure Cisco Unity Connection Call Handlers
  • Implement Toll Fraud Prevention
  • Troubleshoot Cisco Unity Connection Call Handlers
  • Troubleshoot Cisco Unity Connection
  • Configure Cisco Unity Express
  • Troubleshoot Cisco Unity Express
  • Configure Cisco Unified Communications Manager IM and Presence High Availability
  • Implement Cisco Jabber
  • Configure Centralized Cisco Unified Communications Manager IM and Presence
  • Configure Cisco Unified Communications Manager IM and Presence Service Functionality
  • Enable Message Archiving and Chat Rooms
  • Troubleshoot the Cisco Unified Communications IM and Presence Database Connection
  • Troubleshoot Cisco Unified Communications Manager IM and Presence High Availability
  • Troubleshoot Cisco Unified Communications Manager IM and Presence Service
  • Integrate Cisco Unified Attendant Console Advanced
  • Implement Call Recording and Monitoring Using a Switched Port Analyzer (SPAN)-based Solution
  • Implement Cisco Unified Communications Manager Call Recording and Monitoring

target_au

This course is designed primarily for professionals in the following job roles:

  • Collaboration engineers
  • Collaboration administrators

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Basic understanding of networking technologies
  • Basic understanding of voice and video
  • Cisco Unified Communications Manager experience including single-site dial plan, single Public Switched Telephone Network (PSTN) gateway, and Session Initiation Protocol (SIP) trunks

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleECMS2 v1.0 – Engineering Cisco Meraki Solutions
days3
seo_titleECMS2 - Engineering Cisco Meraki Solutions 2 Training | Insoft Services
seo_decIn this Cisco Meraki Solutions 2 (ECMS2) technical course, you’ll gain the skills to plan, design, implement, and operate complex Cisco Meraki solutions.
seo_tkeyECMS2
categorynetworking
vendorCisco

techonogyCisco
overviewThe course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v1.0 elevates your knowledge of Cisco Meraki technology. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification. This course will help you:
  • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
  • Prepare you to take the upcoming Meraki certification(s)
  See other Cisco courses available
objective

After attending an ECMS2 session, you should be able to:

  • Plan for network deployments and integrations using the Meraki platform
  • Design Meraki architectures for redundancy, high-density, and scalability
  • Implement comprehensive Meraki product features to meet design objectives
  • Operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics

outline
  • Planning new Meraki architectures and expanding existing deployments
  • Designing for scalable management and high availability
  • Automating and scaling Meraki deployments
  • Routing design and practices on the Meraki platform
  • Implementing Quality of Service (QoS) and traffic shaping design
  • Architecting VPN and WAN topologies
  • Securing, expanding, and shaping the network
  • Switched network concepts and practices
  • Understand wireless configuration practices and concepts
  • Understand Endpoint management concepts and practices
  • Implement physical security concepts and practices
  • Gaining additional network insight through application monitoring
  • Preparing monitoring, logging, and alerting services
  • Setting up Dashboard reporting and auditing capabilities
  • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

Lab outline

  • Creating and Applying Tags
  • Configuring Link Aggregation
  • Setting Up Port Mirroring
  • Establishing Auto VPN
  • Configuring Virtual Interfaces and Routing
  • Configuring Routes and Redistribution
  • Configuring Quality of Service
  • Configuring Traffic Shaping
  • Configuring Load Balancing
  • Defining Firewall Rules
  • Enabling Advanced Malware Protection
  • Enabling Intrusion Detection and Protection
  • Enabling Content Filtering
  • Configuring and Applying Access Policies
  • Configuring Wireless Guest Access
  • Configuring Service Set Identifiers (SSIDs)
  • Implementing RF Profiles
  • Implementing Air Marshal
  • Creating System Manager (SM) Configuration Profiles
  • Defining Security Policies
  • Enforcing End-to-End Security
  • Setting Up Motion Alerts
  • Managing Video Retention
  • Deploying Wireless Cameras
  • Enabling Alerts
  • Adding Monitoring and Reporting
  • Generating Summary Reports
  • Managing Firmware
  • Peripheral Component Interconnect (PCI) Reporting
  • Troubleshooting an Offline Device
  • Troubleshooting Content Filtering
  • Troubleshooting Remote Site Connectivity

target_au

This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals in roles such as:

  • Field deployment technicians
  • Network administrators
  • Pre-/Post-sales engineers
  • Service provider engineers
  • Systems engineers
  • IT professionals

pre_req

Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

General network:

  • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
  • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
  • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
  • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
  • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
  • A foundational understanding of network security controls/protocols, network management best practices, and data security
  • A foundational understanding of best practice Radiofrequency (RF) design principles and practical implementations
  • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
  • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
  • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

Meraki knowledge:

  • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
  • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
  • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
  • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
  • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
  • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
  • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

titleECMS1 v1.1 – Engineering Cisco Meraki Solutions
days1
seo_titleECMS1 - Engineering Cisco Meraki Solutions 1 Training | Insoft Services
seo_decThe Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.0 course equips you with the knowledge and skills to confidently operate Cisco Meraki deployments.
seo_tkeyECMS1
categorynetworking
vendorCisco

techonogyWireless
overviewThe Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.1 course equips you with the knowledge and skills to confidently operate Cisco Meraki solutions as a unified management system of an entire network from a centralized dashboard. Through a full day of instruction including live demos and guided lab practice, you will learn how to implement core configurations for a full stack solution in the Meraki Dashboard and leverage essential Meraki Dashboard tools to enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on managed devices. This is the first of two courses that prepare you to take the Cisco Meraki Solutions Specialist certification exam. This course will help you:
  • Learn the skills, technologies, and best practices you need to deploy Cisco Meraki solutions and operate the Meraki platform
  • Validate your knowledge and prepare to take the Cisco Meraki Solutions Specialist certification exam
  See other Cisco courses available
objective

After taking this course, you should be able to:

  • Implement core configurations for a full stack solution in the Meraki Dashboard
  • Deploy foundational Meraki product features to meet basic IT requirements
  • Understand and leverage essential Meraki Dashboard tools for troubleshooting

outline

Cloud and Dashboard

Cisco Meraki devices and the cloud

  • Describe the process of Meraki devices connecting to the cloud

Licensing

  • Describe licensing and co-termination

Products and Administration

MV security cameras

  • Describe the hardware and features of the MV security cameras

MI web-based application analytics

  • Describe the hardware and features of Meraki Insights

Operating and Troubleshooting

Dashboard sync and real-time tools

  • Describe configuration updates and live tools

Application Program Interfaces

  • Describe available application program interfaces

Lab

Configuring the Dashboard

  • Basic initial device setup

Advanced features

  • Enable network security

Troubleshooting in Dashboard

  • Wireless reconfiguration and fine-tuning

target_au

This course is designed for:

  • Meraki operators interested in introductory-level technical training or in preparing for the Cisco Meraki Solutions Specialist certification
  • Anyone who would like to gain experience in understanding, configuring, and troubleshooting Meraki networking environments with the Meraki Dashboard

*If you have already taken CMNO, we do not recommend that you enroll in the course as the content is the same.


pre_req

Before taking this course, you should have earned a CCNA certification or be familiar with:

  • Basic network fundamentals and building simple LANs
  • Basic IP addressing and subnets
  • Routing and switching fundamentals
  • Basic wireless networking concepts and terminology

titleWLFNDU – Understanding Cisco Wireless Foundations
days5
seo_titleWLFNDU - Understanding Cisco Wireless Foundations Training | Insoft UK
seo_decThis Cisco Wireless Foundations (WLFNDU) course gives you the skills to position, plan, implement, operate, and manage a Cisco wireless LAN (WLAN) network.
seo_tkeyWLFNDU
categoryenterprise-networks-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Understanding of Cisco Wireless Foundations (WLFNDU) v1.0 course gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco wireless LAN (WLAN) network. This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size.   See other Cisco courses available
objective
  • Describe and implement the foundational wireless theory
  • Describe and implement basic wireless security and client access
  • Describe and implement a Cisco wireless network architecture
  • Configure Cisco centralized wireless networks
  • Describe and implement WLAN maintenance and troubleshooting

outline
  • Describing and Implementing Foundational Wireless Theory
  • Describing and Implementing Foundational Wireless Math and Antennas
  • Describing and Implementing Foundational Wireless Operation
  • Describing and Implementing Basic Wireless Security
  • Describing and Implementing 802.1X and Extensible Authentication Protocol (EAP)
  • Implementing Wireless Guest Access and Configuring Wireless Security
  • Describing and Implementing Cisco Wireless Network Architecture
  • Describing and Implementing Cisco Wireless Network
  • Describing and Implementing Cisco Wireless Network Wired Support
  • Configuring Cisco Centralized Wireless Networks
  • Describing and Implementing WLAN Maintenance and Troubleshooting

Lab outline

  • Practice RF Math
  • Antenna Calculations
  • Explore the Wi-Fi Environment
  • Analyze Wireless Frames
  • Configure Client Access
  • Configure the Wired Infrastructure
  • Configure a Centralized Cisco Wireless LAN Controller (WLC) Deployment
  • Configure a Centralized WLAN Deployment on Cisco 3504 WLC
  • Configure a Centralized WLAN Deployment on Cisco 9800 WLC
  • Configure an IPv6 Operation in a Centralized WLAN Deployment
  • Optimize RF Conditions and Performance for Clients
  • Perform Centralized Controller Maintenance
  • Use Troubleshooting Tools

target_au
  • Network engineer
  • Systems engineer
  • Wireless engineer
  • Technical solutions architect
  • Network administrator
  • Wireless design engineer
  • Network manager

pre_req

We recommend but do not require that you have the following knowledge and skills before taking the WLFNDU course:

  • General knowledge of networks
  • General knowledge of wireless networks
  • Routing and switching knowledge

titleCSSLP – Certified Secure Software Lifecycle Professional
days7
seo_titleCSSLP - Certified Secure Software Lifecycle Professional Training
seo_decThis CSSLP (Certified Secure Software Lifecycle Professional) course helps IT professionals prepare for the CSSLP certification exam.
seo_tkeyCSSLP
categorycybersecurity-courses
vendorISC2

techonogySecurity
overviewThis CSSLP (Certified Secure Software Lifecycle Professional) course provides IT professionals with a fully-immersed, zero-distraction, all-inclusive CSSLP training experience. Our CSSLP course encompasses all domains of the (ISC)2 CSSLP CBK, all meals, and accommodation. This course, you'll prepare for and sit the CSSLP exam.   See other courses available
objective
outline

The following topics are presented during our CSSLP Program:

  • Secure Software Concepts – security implications in software development
  • Secure Software Requirements – capturing security requirements in the requirements gathering phase
  • Secure Software Design – translating security requirements into application design elements
  • Secure Software Implementation/Coding – unit testing for security functionality and resiliency to attack, and developing secure code and exploit mitigation
  • Secure Software Testing – integrated QA testing for security functionality and resiliency to attack
  • Software Acceptance – security implication in the software acceptance phase
  • Software Deployment, Operations, Maintenance and Disposal – security issues around steady-state operations and management of software

target_au
  • Software developers
  • Engineers and architects
  • Project managers
  • Software QA
  • QA testers
  • Business analysts and
  • The professionals who manage these stakeholders.

pre_req

Before attending this course, you must successfully complete the following:

  • Subscribe to the (ISC)2 Code of Ethics
  • Provide proof of four years in the SDLC (Software Development Lifecycle) processor 3 years plus a bachelors degree or regional equivalent in an IT discipline
  • Submit Experience Assessment essays or pass the examination
  • Complete the endorsement process

titleDTCSM – Cisco Customer Success Manager
days3
seo_titleDTCSM - Cisco Customer Success Manager Training | Insoft Services
seo_decThe Cisco Customer Success Manager (DTCSM) course provides skills to help your customers realize value from their solutions and achieve business goals.
seo_tkeyDTCSM
categorybusiness-skills
vendorCisco

techonogyBusiness/Technology Specialization
overviewThe Cisco Customer Success Manager (DTCSM) v2.1 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers. This course is based on the concept of the customer lifecycle and how to optimize that journey, increasing the value realized by the customer, and maximizing your likelihood to maintain their loyalty and renew or expand their business opportunities. The course helps you prepare for the 820-605Cisco® Customer Success Manager (CSM) exam. Passing this exam, makes you earn the Cisco Customer Success Manager Specialist certification.   See other Cisco courses
objective

After taking the DTCSM course, you should be able to:

  • Describe the role of the Customer Success Manager
  • Describe the tools that the Customer Success Manager uses to ensure customer experience
  • Describe the lifecycle approach to customer experience

outline
  • Transition to Subscription Economy
  • Engaging the Customer for Success
  • Customer Success Management Activities

target_au
  • Individuals preparing for the Cisco Customer Success Manager Specialist certification
  • Individuals who have experience working with customers to determine, measure, and deliver business outcomes through the implementation of technology

pre_req

The DTCSM course has no formal prerequisites, but we recommend that you have:

  • Experience working with customers to determine, measure, and deliver business outcomes through the implementation of technology

titleCLCEI – Implementing Cisco Collaboration Cloud and Edge Solutions
days5
seo_titleCLCEI - Implementing Cisco Collaboration Cloud and Edge Solutions
seo_decThis Cisco Collaboration (CLCEI) course provides you with skills on Cisco Expressway Series solutions enabling B2B calls, Cisco Mobile and remote access.
seo_tkeyCLCEI
categorycollaboration-cls
vendorCisco

techonogyCollaboration
overviewThe Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) v1.0 course provides you with knowledge about Cisco® Expressway Series solutions enabling Business-To-Business (B2B) calls, Cisco Mobile, remote access, authentication options, and additional Cisco Expressway Series features. Through a combination of lessons and hands-on labs, you will learn how to leverage collaborative technology to access secure, collaborative work supports including video, voice, content, and remote workloads. This course also prepares you for the 300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) exam. This course will help you:
  • Acquire the knowledge and skills to use the tools and systems designed to facilitate team-based collaboration whether in-office or remote.
  • Gain hands-on experience in using Cisco Expressway software for secure, remote access for phones, endpoints, smartphones, tablets, video, and other communication devices to support nontraditional workspaces.
  • Prepare for the 300-820 CLCEI exam
  • Earn 40 CE credits toward recertification
What to expect in the exam The 300-820 CLCEI exam certifies your knowledge and skills related to collaboration cloud and edge solutions, expressway configurations, and Cisco WebEx Teams™ hybrid and emerging technologies. After you pass 300-820 CLCEI, you earn the Cisco Certified Specialist - Collaboration Cloud and Edge Implementation certification, and you satisfy the concentration exam requirement for this professional-level certification:   See other Cisco courses
objective

After taking this course, you should be able to:

  • Configure and troubleshoot Cisco Unified Communications Manager and Cisco Expressway Series integration
  • Describe the Cisco Expressway-C additional features
  • Configure and troubleshoot Cisco Collaboration solutions for B2B calls
  • Describe how to secure B2B communication with Cisco Expressway Series
  • Describe the Mobile and Remote Access (MRA) feature
  • Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity® Connection and Cisco Instant Messaging and Presence (IM&P)
  • Configure Cisco Webex® Hybrid Services

outline
  • Configuring and Troubleshooting the Cisco Expressway Series
  • Configuring Cisco Expressway Additional Features
  • Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series
  • Configuring and Troubleshooting Cisco Collaboration Solutions for Business-to-Business
  • Securing Business-to-Business Communication
  • Configuring and Troubleshooting Mobile and Remote Access
  • Integrating and Securing Mobile and Remote Access
  • Configuring Cisco Webex Hybrid Services

Lab outline

  • Deploy Virtualized Cisco Expressway
  • Perform the Initial Cisco Expressway Series Configuration
  • Register Endpoints on Cisco Expressway Series
  • Call Search History and Registration
  • Troubleshooting Tools
  • Configure Cisco Expressway Series Bandwidth Management and Registration Restrictions
  • Troubleshoot Cisco Expressway Series Endpoint Registration and Local Dial Plan
  • Configure Cisco Expressway Series Security Features
  • Configure Cisco Unified Communications Manager to Connect with Cisco Expressway-C
  • Troubleshoot Cisco Unified Communications Manager and Cisco Expressway Series Integration
  • Configure Cisco Unified Communications Manager and Cisco Expressway Series Integration (Practice Activity)
  • Implement a B2B Cisco Collaboration Solution
  • Troubleshoot B2B Calls on the Cisco Expressway Series
  • Troubleshoot B2B Calls on the Cisco Expressway Series (practice activity)
  • Secure a B2B Cisco Collaboration Communication
  • Configure MRA on the Cisco Expressway Series
  • Troubleshoot MRA on the Cisco Expressway Series
  • Configure MRA with Additional Application Integrations
  • Prepare for Cisco Webex Teams Integration
  • Configure Cisco Webex Hybrid Services

target_au

This course is designed for professionals in job roles such as:

  • Collaboration engineers
  • Collaboration administrators

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Understanding of networking technologies
  • Understanding voice and video
  • Knowledge of Cisco collaboration core technologies
  • Session Initiation Protocol (SIP) and Extensible Messaging and Presence Protocol (XMPP) signalling protocol fundamentals
  • Collaboration call control fundamentals of Cisco Unified Communications Manager

 

The following Cisco courses can help you gain the knowledge you need to prepare for this course:


titleENWLSI 1.1 – Implementing Cisco Enterprise Wireless Networks
days5
seo_titleENWLSI - Implementing Cisco Enterprise Wireless Networks Training
seo_decThe Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.0 course gives you the skills to secure and troubleshoot wireless network infrastructure.
seo_tkeyENWLSI
categorynetworking
vendorCisco

techonogyWireless
overview

The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.

This course provides hands-on labs to reinforce concepts including deploying Cisco Prime Infrastructure Release 3.5, Cisco Catalyst® 9800 Wireless Controller Release, Cisco IOS XE Gibraltar 16.10, Cisco Digital Network Architecture (Cisco DNA) Center Release 1.2.8, Cisco Connected Mobile Experiences (CMX) Release 10.5, Cisco Mobility Services Engine (MSE) Release 8.0 features, and Cisco ISE Release 2.4.

This course also helps you prepare to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the new CCNP® Enterprise certification and the Cisco Certified Specialist - Enterprise Wireless Implementation certification.

This course will help you:
  • Use Cisco Identity Services Engine, Cisco Prime Infrastructure, and Cisco Connect Mobile Experience to streamline network management, improve operations efficiency, and enhance consistency of network services
  • Implement, secure and configure a tailored Cisco wireless network infrastructure
  • Earn 40 CE credits toward recertification
  See other Cisco courses
objective

After taking this course, you should be able to:

  • Implement network settings to provide a secure wireless network infrastructure
  • Implement a secure wireless client and troubleshoot wireless client connectivity issues
  • Implement and troubleshoot QoS in wireless networks
  • Implement and troubleshoot advanced capabilities in wireless network services

outline
  • Securing and Troubleshooting the Wireless Network Infrastructure
  • Implementing and Troubleshooting Secure Client Connectivity
  • Implementing and Troubleshooting Quality of Service (QoS) in Wireless Networks
  • Implementing and Troubleshooting Advanced Wireless Network Services

Lab Outline

  • Lab Familiarization (Base Learning Lab)
  • Configure Secure Management Access for Cisco Wireless LAN Controllers (WLCs) and Access Points (APs)
  • Add Network Devices and External Resources to Cisco Prime Infrastructure
  • Customize Cisco Prime Infrastructure for Network Monitoring
  • Configure 802.1X Port Access for the APs
  • Capture a Successful AP Authentication
  • Implement Authentication, Authorization, and Accounting (AAA) Services for Central Mode WLANs
  • Implement AAA Services for FlexConnect Mode Wireless LANs (WLANs)
  • Configure Guest Services in the Wireless Network
  • Configure Bring Your Own Device (BYOD) in the Wireless Network
  • Capture Successful Client Authentications
  • Configure Cisco CMX Facebook Wi-Fi
  • Configure QoS in the Wireless Network for Voice and Video Services
  • Configure Cisco Application Visibility and Control (AVC) in the Wireless Network
  • Configure multicast DNS (mDNS) in the Wireless Network
  • Capture Successful QoS Traffic Marking in the Wireless Network
  • Configure, Detect, and Locate Services on the Cisco CMX

target_au
  • Network designers
  • Sales engineers
  • Wireless network engineers

pre_req

Before taking this course, you should have:

  • General knowledge of networks and wireless networks
  • Routing and switching knowledge

The following Cisco courses can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA)
  • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
  • Understanding Cisco Wireless Foundations (WLFNDU)

titleCCIE Enterprise Infrastructure Bootcamp
days1
seo_titleCCIE Enterprise Infrastructure Bootcamp - Prep IP | Insoft Services
seo_decThe CCIE Enterprise Infrastructure bootcamp prepares you for the CCIE exams and for today’s expert-level jobs in enterprise infrastructure technologies.
seo_tkeyCCIE Enterprise Infrastructure
categoryrouting-switching
vendorPrep IP

techonogyCisco
overviewThe CCIE Enterprise Infrastructure Bootcamp v1.0 prepares you for the CCIE exams and for today’s expert-level jobs in enterprise infrastructure technologies. This training now includes automation and programmability to help you scale your IT infrastructure. This Bootcamp includes:
  • Study Material (Workbook and Slides)
  • Prep IP Mentoring with a Cisco Expert, 48h after the training (up to 1h of support)
  • Prep IP Membership with access to new lab releases every 3 months and to a network of expert-level professionals though the Prep IP community.
  See other courses available
objective
outline

1 – Network Infrastructure

  • 1.1 Switched campus
    • 1.1.a Switch administration
    • 1.1.b Layer 2 protocols
    • 1.1.c VLAN technologies
    • 1.1.d EtherChannel
    • 1.1.e Spanning Tree Protocol
  • 1.2 Routing Concepts
    • 1.2.a Administrative distance
    • 1.2.b VRF-lite
    • 1.2.c Static routing
    • 1.2.d Policy Based Routing
    • 1.2.e VRF-aware routing with any routing protocol
    • 1.2.f Route filtering with any routing protocol
    • 1.2.g Manual summarization with any routing protocol
    • 1.2.h Redistribution between any pair of routing protocols
    • 1.2.i Routing protocol authentication
    • 1.2.j Bidirectional Forwarding Detection
  • 1.3 EIGRP
    • 1.3.a Adjacencies
    • 1.3.b Best path selection
    • 1.3.c Operations
    • 1.3.d EIGRP load balancing
    • 1.3.e EIGRP Named Mode
    • 1.3.f Optimization, convergence and scalability
  • 1.4 OSPF (v2 and v3)
    • 1.4.a Adjacencies
    • 1.4.b Network types, area types
    • 1.4.c Path preference
    • 1.4.d Operations
    • 1.4.e Optimization, convergence and scalability
  • 1.5 BGP
    • 1.5.a IBGP and EBGP peer relationships
    • 1.5.b Path selection
    • 1.5.c Routing policies
    • 1.5.d AS path manipulations
    • 1.5.e Convergence and scalability
    • 1.5.f Other BGP features
  • 1.6 Multicast
    • 1.6.a Layer 2 multicast
    • 1.6.b Reverse path forwarding check
    • 1.6.c PIM

 

2 – Software-Defined Infrastructure

  • 2.1 Cisco SD-Access
    • 2.1.a Design a Cisco SD-Access solution
    • 2.1.b Cisco SD-Access deployment
    • 2.1.c Segmentation
    • 2.1.d Assurance
  • 2.2 Cisco SD-WAN
    • 2.2.a Design a Cisco SD-WAN solution
    • 2.2.b WAN edge deployment
    • 2.2.c Configuration templates
    • 2.2.d Localized policies (only QoS)
    • 2.2.e Centralized policies

 

3 – Transport Technologies and Solutions

  • 3.1 MPLS
    • 3.1.a Operations
    • 3.1.b L3VPN
  • 3.2 DMVPN
    • 3.2.a Troubleshoot DMVPN Phase 3 with dual-hub
    • 3.2.b Identify use-cases for FlexVPN

 

4 – Infrastructure Security and Services

  • 4.1 Device Security on Cisco IOS XE
    • 4.1.a Control plane policing and protection
    • 4.1.b AAA
  • 4.2 Network Security
    • 4.2.a Switch security features
    • 4.2.b Router security features
    • 4.2.c IPv6 infrastructure security features
    • 4.2.d IEEE 802.1X Port-Based Authentication
  • 4.3 System Management
    • 4.3.a Device management
    • 4.3.b SNMP
    • 4.3.c Logging
  • 4.4 Quality of Service
    • 4.4.a End to end L3 QoS using MQC
  • 4.5 Network Services
    • 4.5.a First Hop Redundancy Protocols
    • 4.5.b Network Time Protocol
    • 4.5.c DHCP on Cisco IOS
    • 4.5.d IPv4 Network Address Translation
  • 4.6 Network optimization
    • 4.6.a IP SLA
    • 4.6.b Tracking object
    • 4.6.c Flexible NetFlow
  • 4.7 Network operations
    • 4.7.a Traffic capture
    • 4.7.b Cisco IOS-XE troubleshooting tools

 

5 – Infrastructure Automation and Programmability

  • 5.1 Data encoding formats
    • 5.1.a JSON
    • 5.1.b XML
  • 5.2 Automation and scripting
    • 5.2.a EEM applets
    • 5.2.b Guest shell
  • 5.3 Programmability
    • 5.3.a Interaction with vManage API
    • 5.3.b Interaction with Cisco DNA Center API
    • 5.3.c Interaction with Cisco IOS XE API
    • 5.3.d Deploy and verify model-driven telemetry

target_au
pre_req

There are no prerequisites for attending CCIE Enterprise Infrastructure Bootcamp, but you should have a thorough understanding of the exam topics before taking the exam.


titleDNA Center Troubleshooting Bootcamp
days2
seo_titleDNA Center Troubleshooting Bootcamp - Prep IP | Insoft Services
seo_decIn this DNA Center Troubleshooting bootcamp, you will acquire the skills to troubleshoot, provision and provide assurance to the Cisco DNA Center platform.
seo_tkeyDNA Center Troubleshooting
categorysoftware-defined-networking
vendorPrep IP

techonogyEnterprise Networking
overviewIn this DNA Center Troubleshooting bootcamp, you will acquire the skills to troubleshoot, provision and provide assurance to the Cisco DNA Center platform. In this two-day hands-on bootcamp, you will also learn how to troubleshoot the Software-Defined Access (SDA) and getting started with the Cisco DNA Center programmability.
objective
outline

Day 1

Troubleshooting Cisco DNA Center Architecture, Provisioning and Assurance

  1. Cisco DNA Center Architecture overview
  • Cisco DNA Center System UI and Shell (maglev}
  • Cisco DNA Center – Networking
  • High availability architectural overview
  • Understanding and using RCA
  • Cisco DNA Center User Interface Architecture
  1. Automation
  • Software Image Management (SWIM)
  • Surfing through the Cisco DNA Center logs (Kibana and CLI)
  • Plug and Play
  • LAN Automation
  • Provisioning
  1. Assurance
  • Workflow
  • Troubleshooting
  1. Best Practices

Lab:

  • Troubleshooting DNA Center (troubleshooting the services with magctl, logs)
  • SWIM
  • PnP

Troubleshooting Software-Defined Access

  1. The fabric
  • LISP operations (Wireshark capture of the control-plane operations)
  • VXLAN encapsulation (Wireshark capture of the packet encapsulation)
  1. Layer 3 Forwarding
  • IP anycast
  • Registration of endpoints
  • Packet walkthrough analysis with CLI
  • DHCP in the fabric

 

Day 2

Troubleshooting Software-Defined Access (Continued)

  1. Layer 2 Forwarding
  • Packet walkthrough analysis with CLI
  • ARP in the fabric
  1. Authentication
  2. Secure Fabric
  • Cisco Trustsec
  • CTS enforcement

Lab:

  • Troubleshooting SD-A
  • five TS tickets to practice troubleshooting

Cisco DNA Center Programmability

  1. Cisco DNA Center API Overview
  2. Postman collection and DNA Center token
  3. Cisco DNA authentication in Python
  4. Helper functions in Python

Lab:

  • Python script to display the list of devices

target_au
pre_req
titleSD-Access Deep Dive Workshop
days5
seo_titleSD-Access Deep Dive Workshop - Prep IP | Insoft Services
seo_decIn this SD-Access Deep Dive (Cisco DNA Center Advanced) training you'll learn how to make design decision regarding the deployment of SD-A in your network.
seo_tkeySD-Access Deep Dive
categorysoftware-defined-networking
vendorPrep IP

techonogyEnterprise Networking
overview

This SD-Access Deep Dive (Cisco DNA Center Advanced) training workshop has a focused hands-on approach to the SD-A solution. In this workshop, you will have a closer look at the SD-Access. With this course, you’ll be able to make the best design decision regarding the deployment of SD-A in your network. By knowing all the options and features, you will be able to use the SD-A solution at its best. In addition, you will be able to profit from all the advantages of SD-A in the provisioning and the operation of your network thanks to automation and programming.

If you’re new to the SDA, start with Establish SD-A in your Enterprise Workshop (Cisco DNA Center Fundamentals).


objective
outline

Day 1

Deep Dive Connecting the Fabric to External Networks

  • Border Layer 3 Handoff with VRF-Lite
  • Border Resiliency (HA)
  • Shared Services with Border
  • WAN Connectivity with Border
  • Multiple Fabric Domains Connectivity with Border
  • Service Chaining with Border
  • Data Center Connectivity with Border
  • Internet Connectivity with Border

Lab:

  • Configuration of a VXLAN handoff to MPLS
  • Configuration of a transit network between 2 Fabrics

 

Day 2

Deep Dive Migration and Integrate with Existing Network

SD-Access Migration: Using new Subnets, New Switches

  • User Onboarding
  • External Route Exchange
  • Retain Existing Subnets
  • Migrating Routed Access
  • Deep Dive Integrate Wireless in SD-Access

Lab:

  • Migration from a classical network to an SD-A fabric.

Day 3

Deep Dive Integration with Data Center Architectures

Deep Dive Extending Secure Segmentation and Policy into the IoT Space

  • SD-Access Integration with DC
  • ACI Integration
  • Non-ACI Integration
  • Cloud Integration
  • SD-Access use cases for IoT Networks
  • IoT Deployments across Multiple Sites
  • SD-Access Extended Node Functionality for IoT

Lab:

  • Configuration of a interconnect between an ACI Fabric and an SD-A Fabric

 

Day 4

Deep Dive SD-Access Wireless Integration

Deep Dive Policy-Driven Manageability

Deep Dive Secure Segmentation

  • Secure Segmentation Case Study
  • Access Policy: Authentication and Authorization
  • Access Control Policy
  • Application Policy
  • Extending Policy across domains: From Access to Data Center
  • SD-Access Wireless Guest Design
  • SD-Access Wireless Over the Top (OTT)
  • SD-Access Wireless in Distributed Campus
  • High Availability in SD-Access Wireless

Lab:

  • Configuration of a seamless interconnects between an ACI tenant and an SD-A VN with end-to-end Security mapping.

 

Day 5

Deep Dive SD-Access Assurance and Analytics

Deep Dive SD-Access programmability and API advanced

  • Advanced python
  • ISE APIs
  • DNA-Center APIs
  • Configuration of IOS-XE with NETCONF
  • Working with a flask for websites

Lab:

  • Programming the SD-A using the REST APIs
  • Configuration of a business controller to provision a new service with a simplified GUI

target_au

Network and IT professionals are always looking for ways to improve the design and operations of their networks.


pre_req
titleEstablish SDA in your Enterprise Workshop
days3
seo_titleEstablish SDA in your Enterprise Workshop - Prep IP | Insoft Services
seo_decThis Cisco DNA Center Fundamentals training focuses on hands-on learning of the SDA solution and how to implement it in your enterprise.
seo_tkeySDA in your Enterprise
categorysoftware-defined-networking
vendorPrep IP

techonogyCisco
overviewIn this SDA fundamentals workshop, you will learn how to Establish the SD-A in your Enterprise. This Cisco DNA Center Fundamentals training focuses on hands-on learning of the SD-A solution. With this hands-on training, you will be able to understand the different components of the SD-A solution, to successfully implement and put in service an SD-A fabric with wired and wireless access and with micro-segmentation. In this SDA fundamentals workshop, you will also learn how to automate and program the provisioning tasks using the APIs.  Note that, a full SD-A fabric with basic features will be built from scratch.   If you’re familiar with the SDA fabric, attend the SD-Access Deep Dive Workshop (Cisco DNA Center Advanced).
objective

This SDA Enterprise workshop focuses on building a full SD-A fabric with all its basic features will be built from scratch. The provisioning will be done with the GUI and then automated using the APIs.


outline

Day 1

Cisco SD-Access Overview

  • Exploring Cisco SD-Access
  • Describing the Cisco SD-Access Architecture
  • Exploring Cisco DNA Center
  • Configuring Underlay Automation

Lab:

  • DNA Center installation and provisioning
  • Integration of the switches into the fabric with LAN automation PnP

 

Day 2

Cisco SD-Access Implementation

  • Security Network Access with 802.1X and Cisco TrustSec
  • ISE Integration in DNA Center
  • Policy Provisioning Basics
  • Navigating and Managing the Policy Application Workflows

Lab:

  • Enable secure integration between ISE and DNA Center
  • Configure the Identity Services Engine
  • Set up authentication and authorization policies in ISE
  • Enable Dynamic Authentication with 802.1X to authenticate and authorize access to the network with a wired client

 

Day 3

Wireless Integration Orchestration

  • Integrating Wireless with the Cisco SD-Access Solution
  • The workflow of Cisco SD-Access Wireless
  • Cisco SD-Access Wireless Network Design
  • Cisco SD-Access Wireless Basic Operation

Lab:

  • Configure SD-Access wireless integration
  • Configure Wireless Hosts and Access Points
  • Set up authentication and authorization policies in ISE for Wireless
  • 802.1X to authenticate and authorize access to the network with a wireless client

target_au
  • Network engineers
  • IT professionals

pre_req
titleDCFNDU – Understanding Cisco Data Center Foundations
days5
seo_titleDCFNDU - Understanding Cisco Data Center Foundations Training | Insoft
seo_decThe DCFNDU v1.0 course provides skills to configure Cisco Data Center technologies including networking, virtualization, SAN and unified computing.
seo_tkeyDCFNDU
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Understanding of Cisco Data Center Foundations (DCFNDU) v1.0 course helps you prepare for entry-level Data Center roles. In this course, you will learn the foundational knowledge and skills you need to configure Cisco Data Center technologies including networking, virtualization, Storage Area Networking (SAN), and unified computing. In this course, you will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on the Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS).   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe the foundations of Data Center networking
  • Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools
  • Describe Layer 3 first-hop redundancy
  • Describe Cisco FEX connectivity
  • Describe Ethernet port channels and vPCs
  • Introduce switch virtualization, machine virtualization, and describe network virtualization
  • Compare storage connectivity options in the Data Center
  • Describe Fibre Channel communication between the initiator server and the target storage
  • Describe Fibre Channel zone types and their uses
  • Describe NPV and NPIV
  • Describe Data Center Ethernet enhancements that provide a lossless fabric
  • Describe FCoE
  • Describe Data Center server connectivity
  • Describe Cisco UCS Manager
  • Describe the purpose and advantages of APIs
  • Describe Cisco ACI
  • Describe the basic concepts of cloud computing

outline
  • Describing the Data Center Network Architectures
    • Cisco Data Center Architecture Overview
    • Three-Tier Network: Core, Aggregation, and Access
    • Spine-and-Leaf Network
    • Two-Tier Storage Network
  • Describing the Cisco Nexus Family and Cisco NX-OS Software
    • Cisco Nexus Data Center Product Overview
    • Cisco NX-OS Software Architecture
    • Cisco NX-OS Software CLI Tools
    • Cisco NX-OS Virtual Routing and Forwarding
  • Describing Layer 3 First-Hop Redundancy
    • Default Gateway Redundancy
    • Hot Standby Router Protocol
    • Virtual Router Redundancy Protocol
    • Gateway Load Balancing Protocol
  • Describing Cisco FEX
    • Server Deployment Models
    • Cisco FEX Technology
    • Cisco FEX Traffic Forwarding
    • Cisco Adapter FEX
  • Describing Port Channels and vPCs
    • Ethernet Port Channels
    • Virtual Port Channels
    • Supported vPC Topologies
  • Describing Switch Virtualization
    • Cisco Nexus Switch Basic Components
    • Virtual Routing and Forwarding
    • Cisco Nexus 7000 VDCs
    • VDC Types
    • VDC Resource Allocation
    • VDC Management
  • Describing Machine Virtualization
    • Virtual Machines
    • Hypervisor
    • VM Manager
  • Describing Network Virtualization
    • Overlay Network Protocols
    • VXLAN Overlay
    • VXLAN BGP EVPN Control Plane
    • VXLAN Data Plane
    • Cisco Nexus 1000VE Series Virtual Switch
    • VMware vSphere Virtual Switches
  • Introducing Basic Data Center Storage Concepts
    • Storage Connectivity Options in the Data Center
    • Fibre Channel Storage Networking
    • VSAN Configuration and Verification
  • Describing Fibre Channel Communication Between the Initiator Server and the Target Storage
    • Fibre Channel Layered Model
    • FLOGI Process
    • Fibre Channel Flow Control
  • Describing Fibre Channel Zone Types and Their Uses
    • Fibre Channel Zoning
    • Zoning Configuration
    • Zoning Management
  • Describing Cisco NPV Mode and NPIV
    • Cisco NPV Mode
    • NPIV Mode
  • Describing Data Center Ethernet Enhancements
    • IEEE Data Center Bridging
    • Priority Flow Control
    • Enhanced Transmission Selection
    • DCBX Protocol
    • Congestion Notification
  • Describing FCoE
    • Cisco Unified Fabric
    • FCoE Architecture
    • FCoE Initialization Protocol
    • FCoE Adapters
  • Describing Cisco UCS Components
    • Physical Cisco UCS Components
    • Cisco Fabric Interconnect Product Overview
    • Cisco IOM Product Overview
    • Cisco UCS Mini
    • Cisco IMC Supervisor
    • Cisco Intersight
  • Describing Cisco UCS Manager
    • Cisco UCS Manager Overview
    • Identity and Resource Pools for Hardware Abstraction
    • Service Profiles and Service Profile Templates
    • Cisco UCS Central Overview
    • Cisco HyperFlex Overview
  • Using APIs
    • Common Programmability Protocols and Methods
    • How to Choose Models and Processes
  • Describing Cisco ACI
    • Cisco ACI Overview
    • Multitier Applications in Cisco ACI
    • Cisco ACI Features
    • VXLAN in Cisco ACI
    • Unicast Traffic in Cisco ACI
    • Multicast Traffic in Cisco ACI
    • Cisco ACI Programmability
    • Common Programming Tools and Orchestration Options
  • Describing Cloud Computing
    • Cloud Computing Overview
    • Cloud Deployment Models
    • Cloud Computing Services

Lab outline

  • Explore the Cisco NX-OS CLI
  • Explore Topology Discovery
  • Configure HSRP
  • Configure the Cisco Nexus 2000 FEX
  • Configure vPCs
  • Configure vPCs with Cisco FEX
  • Configure VRF
  • Explore the VDC Elements
  • Install VMware ESXi and vCenter
  • Configure VSANs
  • Validate FLOGI and FCNS
  • Configure Zoning
  • Configure Unified Ports on a Cisco Nexus Switch and Implement FCoE
  • Explore the Cisco UCS Server Environment
  • Configure a Cisco UCS Server Profile
  • Configure Cisco NX-OS with APIs
  • Explore the Cisco UCS Manager XML API Management Information Tree

target_au
  • Data center administrators
  • Data center engineers
  • Systems engineers
  • Server administrators
  • Network managers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Good understanding of networking protocols
  • Good understanding of the VMware environment
  • Basic knowledge of Microsoft Windows operating systems

These are the recommended Cisco courses that may help you meet these prerequisites:


titleCLFNDU – Understanding Cisco Collaboration Foundations
days5
seo_titleCLFNDU - Understanding Cisco Collaboration Foundations Training
seo_decIn the CLFNDU course you will learn the basics of SIP dial plans including connectivity to PSTN services, and how to use class-of-service capabilities.
seo_tkeyCLFNDU
categorycollaboration-cls
vendorCisco

techonogyCollaboration
overviewThe Understanding Cisco Collaboration Foundations (CLFNDU) 1.0 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. The course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several professional-level collaboration courses and exams:   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model
  • Configure and modify required parameters in Cisco Unified Communications Manager (CM) including service activation, enterprise parameters, CM groups, time settings, and device pool
  • Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM
  • Describe the call setup and teardown process for a SIP device including codec negotiation using Session Description Protocol (SDP) and media channel setup
  • Manage Cisco Unified CM user accounts (local and via Lightweight Directory Access Protocol [LDAP]) including the role/group, service profile, UC service, and credential policy
  • Configure dial plan elements within a single site Cisco Unified CM deployment including Route Groups, Local Route Group, Route Lists, Route Patterns, Translation Patterns, Transforms, SIP Trunks, and SIP Route Patterns
  • Configure Class of Control on Cisco Unified CM to control which devices and lines have access to services
  • Configure Cisco Unified CM for Cisco Jabber and implement common endpoint features including call park, softkeys, shared lines, and pickup groups
  • Deploy a simple SIP dial plan on a Cisco Integrated Service Routers (ISR) gateway to enable access to the PSTN network
  • Manage Cisco UCM access to media resources available within Cisco UCM and Cisco ISR gateways
  • Describe tools for reporting and maintenance including Unified Reports, Cisco Real-Time Monitoring Tool (RTMT), Disaster Recovery System (DRS), and Call Detail Records (CDRs) within Cisco Unified CM
  • Describe additional considerations for deploying video endpoints in Cisco Unified CM
  • Describe the integration of Cisco Unity® with Cisco Unified CM and the default call handler

outline
  • Exploring the Path to Collaboration
  • Introducing Cisco Unified Communications Manager and Initial Parameters
  • Exploring Endpoints and the Registration Process
  • Exploring Codecs and Cell Signaling
  • Managing Users in Cisco Unified Communication Manager
  • Describing a Basic Dial Plan
  • Describing Class of Service
  • Enabling Endpoints and Features
  • Describing the Cisco ISR as a Voice Gateway
  • Exploring Cisco Unified Communication Manager Media Resources
  • Reporting and Maintenance
  • Exploring Additional Requirements for Video Endpoints
  • Describing Cisco Unity Connection

Lab outline

  • Configure Default Cisco Unified CM System and Enterprise Parameters
  • Configure the Cisco Unified CM Core System Settings
  • Configure an Access Switch for an Endpoint
  • Deploy an IP Phone Through Auto and Manual Registration
  • Administer Endpoints in Cisco Unified Communications Manager
  • Create a Local User Account and Configure LDAP
  • Implement Users
  • Create a Basic Dial Plan
  • Explore Partitions and Call Search Spaces
  • Describe Private Line Automatic Ringdown (PLAR)
  • Deploy an On-Premise Cisco Jabber® Client for Windows
  • Implement Common Endpoint Features
  • Configure Common Endpoint Features
  • Configure Voice over Internet Protocol (VoIP) Dial Peers
  • Configure Integrated Service Digital Network (ISDN) Circuits and Plain Old Telephone Service (POTS) Dial Peers
  • Control Access to Media Resources
  • Use Reporting and Maintenance Tools
  • Explore Endpoint Troubleshooting Tools
  • Examine the Integration between Unity Connection and Cisco Unified CM
  • Manage Unity Connection Users

target_au
  • Students preparing to take the CCNP Collaboration certification
  • Network administrators
  • Network engineers
  • Systems engineers

pre_req

This course is intended to be an entry-level course. There is no specific prerequisite Cisco courses; however, the following skills are required:

  • Internet web browser usability knowledge and general computer usage
  • Knowledge of Cisco Internetwork Operating System (Cisco IOS®) command line

titleSDWAN300 – Implementing Cisco SD-WAN Solutions
days4
seo_titleSDWAN300 - Implementing Cisco SD-WAN Solutions Training | Insoft UK
seo_decSDWAN300 Implementing Cisco SD-WAN Solutions - design, deploy, configure, and manage your Cisco Software-Defined WAN solution in a large-scale live network.
seo_tkeySDWAN300
categorynetworking
vendorCisco

techonogyCisco
overviewThe Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 course gives you deep-dive training about how to design, deploy, configure, and manage your Cisco® Software-Defined WAN (SD-WAN) solution in a large-scale live network, including how to migrate from legacy WAN to SD-WAN. You will learn best practices for configuring routing protocols in the Data Center and the branch, as well as how to implement advanced control, data, and application-aware policies. The course also covers SD-WAN deployment and migration options, placement of controllers, how to deploy and replace edge devices, and how to configure Direct Internet Access (DIA) breakout.   See other Cisco courses available
objective

After taking Implementing Cisco SD-WAN Solutions (SDWAN300) course, you should be able to:

  • Describe the Cisco SD-WAN overlay network and how modes of operation differ in legacy WAN versus SD-WAN
  • Describe options for SD-WAN cloud and on-premises deployments, as well as how to deploy virtual vEdge and physical cEdge devices with Zero Touch Provisioning (ZTP) and device templates
  • Describe best practices in WAN routing protocols, as well as how to configure and implement transport-side connectivity, service-side routing, interoperability, and redundancy and high availability
  • Describe dynamic routing protocols and best practices in an SD-WAN environment, transport-side connectivity, service-side connectivity, and how redundancy and high availability are achieved in SD-WAN environments
  • Explain how to migrate from legacy WAN to Cisco SD-WAN, including typical scenarios for data center and branch
  • Explain how to perform SD-WAN Day 2 operations, such as monitoring, reporting, logging, and upgrading

outline
  • Cisco SD-WAN Overlay Network
    • Examining Cisco SD-WAN Architecture
  • Cisco SD-WAN Deployment
    • Examining Cisco SD-WAN Deployment Options
    • Deploying Edge Devices
    • Deploying Edge Devices with Zero-Touch Provisioning
    • Using Device Configuration Templates
    • Redundancy, High Availability, and Scalability
  • Cisco SD-WAN Routing Options
    • Using Dynamic Routing
    • Providing Site Redundancy and High Availability
    • Configuring Transport-Side Connectivity
  • Cisco SD-WAN Policy Configuration
    • Reviewing Cisco SD-WAN Policy
    • Defining Advanced Control Policies
    • Defining Advanced-Data Policies
    • Implementing Application-Aware Routing
    • Implementing Internet Breakouts and Network Address Translation (NAT)
  • Cisco SD-WAN Migration and Interoperability
    • Examining Cisco SD-WAN Hybrid Scenarios
    • Performing a Migration
  • Cisco SD-WAN Management and Operations
    • Performing Day-2 Operations
    • Performing Upgrades

Lab outline

  • Deploying Cisco SD-WAN Controllers
  • Adding a Branch Using Zero Touch Provisioning (ZTP)
  • Deploying Devices Using Configuration Templates
  • Configuring Controller Affinity
  • Implementing Dynamic Routing Protocols on Service Side
  • Implementing Transport Location (TLOC) Extensions
  • Implementing Control Policies
  • Implementing Data Policies
  • Implementing Application-Aware Routing
  • Implementing Internet Breakouts
  • Migrating Branch Sites
  • Performing an Upgrade

target_au
  • System installers
  • System integrators
  • System administrators
  • Network administrators
  • Solutions designers

pre_req

You should have the following knowledge and skills before attending this course:

  • Completion of the Cisco SD-WAN Operation and Deployment (SDWAN300) course or equivalent experience
  • Knowledge of Software-Defined Networking (SDN) concepts as applied to large-scale live network deployments
  • Strong understanding of enterprise-wide area network design
  • Strong understanding of routing protocol operation, including both interior and exterior routing protocol operation
  • Familiarity with Transport Layer Security (TLS) and IP Security (IPSec)

titleENCOR – Implementing and Operating Cisco Enterprise Network Core Technologies
days5
seo_titleENCOR - Implementing and Operating Cisco Enterprise Network Core
seo_decThis course helps you prepare for the 350-401 ENCOR exam, which is part of the CCNP Enterprise, CCIE Enterprise Infrastructure and Wireless certifications.
seo_tkeyENCOR
categoryrouting-switching
vendorCisco

techonogyCisco
overviewThe Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. This course helps you prepare to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam, which is part of four new certifications:
  • CCNP® Enterprise
  • CCIE® Enterprise Infrastructure
  • CCIE Enterprise Wireless
  • Cisco Certified Specialist – Enterprise Core
This course will help you:
  • Configure, troubleshoot, and manage enterprise wired and wireless networks
  • Implement security principles within an enterprise network
  • Earn 64 CE credits toward recertification
The exam will be available beginning February 24, 2020. This course helps you prepare to take the 200-901 DevNet Associate (DEVASC) exam. By passing this exam, you earn Cisco Certified DevNet Associate certification. The 200-901 DEVASC exam goes live on February 24, 2020.   See other Cisco courses available
objective

After taking this course, you should be able to:

  • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
  • Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
  • Troubleshoot Layer 2 connectivity using VLANs and trunking
  • Implementation of redundant switched networks using Spanning Tree Protocol
  • Troubleshooting link aggregation using Etherchannel
  • Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
  • Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
  • Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
  • Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
  • Describe the virtualization technology of servers, switches, and the various network devices and components
  • Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
  • Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
  • Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
  • Describe wireless roaming and location services
  • Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
  • Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC
  • Troubleshoot wireless client connectivity issues using various available tools
  • Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
  • Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting

outline
  • Examining Cisco Enterprise Network Architecture
  • Understanding Cisco Switching Paths
  • Implementing Campus LAN Connectivity
  • Building Redundant Switched Topology
  • Implementing Layer 2 Port Aggregation
  • Understanding EIGRP
  • Implementing OSPF
  • Optimizing OSPF
  • Exploring EBGP
  • Implementing Network Redundancy
  • Implementing NAT
  • Introducing Virtualization Protocols and Techniques
  • Understanding Virtual Private Networks and Interfaces
  • Understanding Wireless Principles
  • Examining Wireless Deployment Options
  • Understanding Wireless Roaming and Location Services
  • Examining Wireless AP Operation
  • Understanding Wireless Client Authentication
  • Troubleshooting Wireless Client Connectivity
  • Introducing Multicast Protocols
  • Introducing QoS
  • Implementing Network Services
  • Using Network Analysis Tools
  • Implementing Infrastructure Security
  • Implementing Secure Access Control
  • Understanding Enterprise Network Security Architecture
  • Exploring Automation and Assurance Using Cisco DNA Center
  • Examining the Cisco SD-Access Solution
  • Understanding the Working Principles of the Cisco SD-WAN Solution
  • Understanding the Basics of Python Programming
  • Introducing Network Programmability Protocols
  • Introducing APIs in Cisco DNA Center and vManage

Lab outline

  • Investigate the CAM
  • Analyze Cisco Express Forwarding
  • Troubleshoot VLAN and Trunk Issues
  • Tuning Spanning Tree Protocol (STP) and Configuring Rapid Spanning Tree Protocol (RSTP)
  • Configure Multiple Spanning Tree Protocol
  • Troubleshoot EtherChannel
  • Implement Multi-area OSPF
  • Implement OSPF Tuning
  • Apply OSPF Optimization
  • Implement OSPFv3
  • Configure and Verify Single-Homed EBGP
  • Implementing Hot Standby Routing Protocol (HSRP)
  • Configure Virtual Router Redundancy Protocol (VRRP)
  • Implement NAT
  • Configure and Verify Virtual Routing and Forwarding (VRF)
  • Configure and Verify a Generic Routing Encapsulation (GRE) Tunnel
  • Configure Static Virtual Tunnel Interface (VTI) Point-to-Point Tunnels
  • Configure Wireless Client Authentication in a Centralized Deployment
  • Troubleshoot Wireless Client Connectivity Issues
  • Configure Syslog
  • Configure and Verify Flexible NetFlow
  • Configuring Cisco IOS Embedded Event Manager (EEM)
  • Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug
  • Configure and Verify Cisco IP SLAs
  • Configure Standard and Extended ACLs
  • Configure Control Plane Policing
  • Implement Local and Server-Based AAA
  • Writing and Troubleshooting Python Scripts
  • Explore JavaScript Object Notation (JSON) Objects and Scripts in Python
  • Use NETCONF Via SSH
  • Use RESTCONF with Cisco IOS XE Software

target_au
  • Mid-level network engineers
  • Network administrators
  • Network support technicians
  • Help desk technicians

pre_req

Knowledge and skills you should have before attending this course:

  • Implementation of Enterprise LAN networks
  • Basic understanding of Enterprise routing and wireless connectivity
  • Basic understanding of Python scripting

titleDEVCOR – Developing Applications Using Cisco Core Platforms and APIs
days5
seo_titleDEVCOR - Developing Applications Using Cisco Core Platforms and APIs
seo_decThe in the DEVCOR course gives you hands-on experience with Cisco Application Programming Interfaces (APIs) and modern development tools.
seo_tkeyDEVCOR
categorynetwork-programmability
vendorCisco

techonogyCisco
overview
The Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) v1.0 course helps you prepare for Cisco DevNet Professional certification and for professional-level network automation engineer roles. You will learn how to implement network applications using Cisco® platforms as a base, from initial software design to diverse system integration, as well as testing and deployment automation. The course gives you hands-on experience solving real-world problems using Cisco Application Programming Interfaces (APIs) and modern development tools. This course helps you prepare to take the 350-901 Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) exam. By passing this exam, you satisfy the core exam requirement toward the Cisco Certified DevNet Professional, and you earn the Cisco Certified DevNet Specialist – Core certification.
  See other Cisco courses available
objective

After taking this course, you should be able to:

  • Describe the architectural traits and patterns that improve application maintainability
  • Describe the architectural traits and patterns that improve application serviceability
  • Identify steps to design and build a ChatOps application
  • Implement robust Representational State Transfer (REST) API integrations with network error handling, pagination, and error flow control
  • Describe the necessary steps for securing user and system data in applications
  • Describe the necessary steps for securing applications
  • Identify common tasks in automated application release process
  • Describe best practices for application deployment
  • Describe methodologies for designing distributed systems
  • Describe the concepts of infrastructure configuration management and device automation
  • Utilize Yet Another Next Generation (YANG) data models to describe network configurations and telemetry
  • Compare various relational and nonrelational database types and how to select the appropriate type based on requirements

outline

This class includes lecture sections and self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning courses, the lectures are on recorded videos. In both versions, you will need to review self-study sections on your own before taking the certification exam.

NO Id Course NameVendor seo titlekeywords seo description
Section title Learning mode
Designing for Maintainability Self-study
Designing for Serviceability Self-study
Implementing ChatOps Application Lecture
Describing Advanced REST API Integration Lecture
Securing Application Data Self-study
Securing Web and Mobile Applications Self-study
Automating Application-Release Lecture
Deploying Applications Lecture
Understanding Distributed Systems Lecture
Orchestrating Network and Infrastructure Lecture
Modeling Data with YANG Lecture
Using Relational and Non-Relational Databases Self-study

Lab outline

  • Construct Sequence Diagram
  • Construct Web Sequence Diagram
  • Use Cisco Webex Teams™ API to Enable ChatOps
  • Integrate Cisco Meraki™ API to List Service Set Identifiers (SSIDs) and Retrieve Location Data
  • Use Paginated REST API Endpoint
  • Utilize REST API Error Control Flow Techniques
  • Evaluate Application for Common Open Web Application Security Project (OWASP) Vulnerabilities
  • Resolve Merge Conflicts with Git
  • Diagnose Continuous Integration and Continuous Delivery (CI/CD) Pipeline Failures
  • Containerize Application Using Docker
  • Integrate Application into Existing CI/CD Environment
  • Diagnose Problems Using Application Logs
  • Configure Network Parameters Using Ansible and Puppet
  • Synchronize Firepower Device Configuration
  • Utilize RESTCONF for Network Configuration
  • Query Relational Database
  • Query Document Store
  • Query Time Series Database
  • Query Graph Database

target_au

This course is designed for anyone who performs or seeks to perform a developer role and has one or more years of hands-on experience developing and maintaining applications that are built on top of Cisco platforms.

This course covers specialized material about designing, developing, and debugging applications using Cisco APIs and platforms, and managing and deploying applications on Cisco infrastructure. To fully benefit from this course, you should have three to five years of experience designing and implementing applications that are built on top of Cisco platforms.

The course is appropriate for:

  • Network engineers expanding their skill-base to include software and automation
  • Developers expanding expertise in automation and DevOps
  • Solution architects moving to the Cisco ecosystem
  • Infrastructure developers designing hardened production environments

The job roles best suited to the material in this course are:

  • Senior network automation engineer
  • Senior software developer
  • Senior system integration programmer

Additional job roles that could find this course useful are:

  • Senior infrastructure architect
  • Senior network designer
  • Senior test development engineer

Students preparing for Cisco Certified DevNet Professional and Cisco Certified DevNet Specialist – Core certification will also find this material useful.


pre_req

There are no formal prerequisites for Cisco Certified DevNet Associate certification, but you should make sure to have a good understanding of the exam topics before taking the exam.

Before taking this course, you should have:

  • Knowledge of program design and coding with focus on Python
  • Familiarity with Ethernet, TCP/IP, and Internet-related networking
  • Understand the utilization of APIs
  • Understanding of software development and design methodologies
  • Hands-on experience with a programming language (specifically Python)

Here are Cisco learning resources that can help you prepare:

  • Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC)
  • Explore the DevNet Certification area for specific topics and labs related to this course and certification: https://developer.cisco.com/certification/

titleDEVASC – Developing Applications and Automating Workflows using Cisco Core Platforms
days5
seo_titleDEVASC - Developing Apps & Automating Workflows using Cisco Core
seo_decThe DEVASC course will learn how to implement network applications using Cisco platforms and automation workflows across the network infrastructure.
seo_tkeyDEVASC
categorynetwork-programmability
vendorCisco

techonogyCisco
overviewThe Developing Applications and Automating Workflows Using Cisco Platforms (DEVASC) v1.0 course helps you prepare for Cisco® DevNet Associate certification and for associate-level network automation engineer roles. You will learn how to implement basic network applications using Cisco platforms as a base, and how to implement automation workflows across network, security, collaboration, and computing infrastructure. The course gives you hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools. This course helps you prepare to take the 200-901 DevNet Associate (DEVASC) exam. By passing this exam, you earn Cisco Certified DevNet Associate certification. This course will help you:
  • Take advantage of the network when you implement applications to fulfill business needs
  • Gain a foundation in the essentials of applications, automation, and Cisco platforms
  • Earn 48 CE credits toward recertification
  • Prepare for the 200-901 DEVASC exam and join the DevNet Class of 2020
What to expect in the exam The 200-901 DEVASC exam certifies your knowledge of software development and design including understanding and using APIs, Cisco platforms and development, application development and security, and infrastructure and automation. After you pass 200-901 DEVASC, you earn Cisco Certified DevNet Associate certification.
objective

After taking this course, you should be able to:

  • Describe the importance of APIs and use of version control tools in modern software development
  • Describe common processes and practices used in software development
  • Describe options for organizing and constructing modular software
  • Describe HTTP concepts and how they apply to network-based APIs
  • Apply Representational State Transfer (REST) concepts to integration with HTTP-based APIs
  • Describe Cisco platforms and their capabilities
  • Describe programmability features of different Cisco platforms
  • Describe basic networking concepts and interpret simple network topology
  • Describe interaction of applications with the network and tools used for troubleshooting issues
  • Apply concepts of model-driven programmability to automate common tasks with Python scripts
  • Identify common application deployment models and components in the development pipeline
  • Describe common security concerns and types of tests, and utilize containerization for local development
  • Utilize tools to automate infrastructure through scripting and model-driven programmability

outline

This class includes lecture sections and self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning courses, the lectures are on recorded videos. In both versions, you will need to review self-study sections on your own before taking the certification exam.

Section title Learning mode
Practising Modern Software Development Lecture
Describing Software Development Process Self-study
Designing Software Self-study
Introducing Network-Based APIs Lecture
Consuming REST-Based APIs Lecture
Employing Programmability on Cisco Platforms Lecture
Introducing Cisco Platforms Self-study
Describing IP Networks (ELT only) Self-study
Relating Network and Applications Lecture
Employing Model-Driven Programmability with YANG Lecture
Deploying Applications Lecture
Testing and Securing Applications Lecture
Automating Infrastructure Lecture

Lab outline

  • Parse API Data Formats with Python
  • Use Git for Version Control
  • Identify Software Architecture and Design Patterns on a Diagram
  • Implement Singleton Pattern and Abstraction-Based Method
  • Inspect HTTP Protocol Messages
  • Use Postman
  • Troubleshoot an HTTP Error Response
  • Utilize APIs with Python
  • Use the Cisco Controller APIs
  • Use the Cisco Webex Teams™ Collaboration API
  • Interpret a Basic Network Topology Diagram
  • Identify the Cause of Application Connectivity Issues
  • Perform Basic Network Configuration Protocol (NETCONF) Operations
  • Use the Cisco Software Development Kit (SDK) and Python for Automation Scripting
  • Utilize Bash Commands for Local Development
  • Construct a Python Unit Test
  • Interpret a Dockerfile
  • Utilize Docker Commands to Manage Local Developer Environment
  • Exploit Insufficient Parameter Sanitization
  • Construct Infrastructure Automation Workflow

target_au

This course is designed for anyone who performs or seeks to perform a developer role and has one or more years of hands-on experience developing and maintaining applications that are built on top of Cisco platforms.

The course is appropriate for software developers, application developers, and network engineers who want to expand their skill base and validate their skills in programmability, software, and automation. Students preparing for Cisco Certified DevNet Associate certification will also find this material useful.

The job roles best suited to the material in this course are:

  • Network automation engineer
  • Software developer
  • System integration programmer

Additional job roles that might be interested:

  • Infrastructure architect
  • Network designer

pre_req

There are no formal prerequisites for Cisco Certified DevNet Associate certification, but you should make sure to have a good understanding of the exam topics before taking the exam.

And before taking this course, you should have:

  • Basic computer literacy
  • Basic PC operating system navigation skills
  • Basic Internet usage skills
  • Hands-on experience with a programming language (specifically Python)

Here are the Cisco learning resources that can help you prepare:


titleNPL – Natural Language Processing Fundamentals
days3
seo_titleNPL Training - Natural Language Processing Fundamentals | Insoft UK
seo_decThis comprehensive Natural Language Processing (NPL) training course will show you how to use Python libraries and NLP concepts to solve various problems.
seo_tkeyNPL Training
categoryprogramming
vendorLogical Operations

techonogyLogical Operations
overviewThis comprehensive Natural Language Processing (NPL) Fundamentals training course will show you how to effectively use Python libraries and NLP concepts to solve various problems. This is a three-day course that starts with basics and goes on to explain various NLP tools and techniques that equip you with all that you need to solve common business problems for processing text. In this NPL training course, you'll be introduced to natural language processing and its applications through examples and exercises. This will be followed by an introduction to the initial stages of solving a problem, which includes problem definition, getting text data, and preparing it for modelling. With exposure to concepts like advanced natural language processing algorithms and visualization techniques, you'll learn how to create applications that can extract information from unstructured data and present it as impactful visuals. Although you will continue to learn NLP-based techniques, the focus will gradually shift to developing useful applications. In these sections, you'll understand how to apply NLP techniques to answer questions as can be used in chatbots. By the end of this course, you'll be able to accomplish a varied range of assignments ranging from identifying the most suitable type of NLP task for solving a problem to using a tool like spacy or genesis for performing sentiment analysis. This NPL training course will easily equip you with the knowledge you need to build applications that interpret human language.     See other courses available
objective
outline

Lesson 1: Introduction to NLP

  • What is natural language processing (NLP)?
  • Types of natural language processing tasks
  • Structuring a natural language processing project

Lesson 2: Extraction Methods from Unstructured Text

  • Tokenization methods
  • Term frequency observations
  • Bag-of-Words and TF-IDF

Lesson 3: Building a Simple Classifier

  • Basic theoretical coverage and sample code of Supervised and Unsupervised
  • Classifiers vs. regressors
  • Sampling and splitting data for training algorithms
  • Evaluating the performance of a model
  • Use of Pandas and scikit-learn

Lesson 4: Collecting Text Data

  • Retrieve and process web page data using urllib, bs4
  • Handle various types of data such as JSON, XML
  • Retrieve real-time data using API provided by the website

Lesson 5: Topic Modeling

  • Loading and preprocessing documents into a noted course
  • Training an LDA model to detect the topics in the document
  • Visually represent the topics found in a set of documents

Lesson 6: Text Summarization and Text Generation

  • Summarizing document using word frequency
  • Generating random text using the Markov chain
  • Compare the results between recent methods

Lesson 7: Vector Representation

  • Converting words to word vectors
  • Perform math-like operations on word vectors e.g. king – man = queen
  • Converting documents to document vectors.
  • Using document vectors to measure the similarity between documents

Lesson 8: Sentiment Analysis

  • Load a labelled dataset of movie reviews
  • Use word vectors to represent the words in the movie review
  • Train a simple model to predict whether the movie review is positive or negative

target_au

Natural Language Processing Fundamentals is designed for novice and mid-level data scientists and machine learning developers who want to gather and analyze text data to build an NLP-powered product. It’ll help you to have prior experience of coding in Python using data types, writing functions, and importing libraries. Some experience with linguistics and probability is useful but not necessary.


pre_req

Hardware:

This NPL training course will require a computer system for the instructor and one for each student. The minimum hardware requirements are as follows:

  • Processor: Dual Core or better
  • Memory: 4 GB RAM
  • Hard disk: 10 GB
  • Internet connection

 

Software:

  • Operating system: Windows 7 SP1 32/64-bit, Windows 8.1 32/64-bit, Windows 10 32/64-bit, Ubuntu 14.04 or later, or macOS Sierra or later
  • Browser: Google Chrome or Mozilla Firefox
  • Conda
  • Jupyterlab
  • Python 3.x

titleJava Fundamentals
days3
seo_titleJava Fundamentals Training - Programming Course | Insoft Services
seo_decThis Java Fundamentals training teaches how to write programs, automate tasks, use algorithms and data structures and explore more advanced Java courses.
seo_tkeyJava Fundamentals Training
categoryprogramming
vendorLogical Operations

techonogyLogical Operations
overviewThis three-day Java Fundamentals training course progressively imparts you with the skills you need to efficiently write programs in Java. After a quick introduction to the principles of Java, you'll move on to learn all about data types, data structures, and control. In this course, you'll also understand object-oriented programming in-depth, with emphasis on typecasting, abstract classes, and interfaces. You'll learn how to make your code strong by creating your own generics and handling exceptions. With the right flow of content coupled with exercises and activities, Java Fundamentals builds a solid foundation for you that you can use later to delve into the huge forest of Java API. Since its inception, Java has stormed the programming world. Its features and functionalities provide developers with the tools needed to write robust cross-platform applications. Java Fundamentals introduces you to these tools and functionalities that will enable you to create Java programs. The course begins with an introduction to the language, its philosophy, and evolution over time, until the latest release. You'll learn how the javac/java tools work and what Java packages are - the way a Java program is usually organized. Once you are comfortable with this, you'll be introduced to advanced concepts of the language, such as control flow keywords. You'll explore object-oriented programming and the part it plays in making Java what it is. In the concluding lessons, you'll get to grips with classes, typecasting, and interfaces, and understand the use of data structures, arrays, strings, handling exceptions, and creating generics. By the end of this course, you will have learned to write programs, automate tasks, and follow advanced courses on algorithms and data structures or explore more advanced Java courses.   See other courses available
objective

After completing this course, you will be able to:

  • Create and run Java programs
  • Use data types, data structures, and control flow in your code
  • Implement best practices while creating objects
  • Work with constructors and inheritance
  • Understand advanced data structures to organize and store data
  • Employ generics for stronger check-types during compilation
  • Learn to handle exceptions in your code

outline

Lesson 1: Introduction to Java

  • The Java Ecosystem
  • Our First Java Application
  • Packages

Lesson 2: Variables, Data Types, and Operators

  • Variables and Data Types
  • Integral Data Types
  • Typecasting

Lesson 3: Control Flow

  • Conditional Statements
  • Looping Constructs

Lesson 4: Object-Oriented Programming

  • Object-Oriented Principles
  • Classes and Objects
  • Constructors
  • The this Keyword
  • Inheritance
  • Overloading
  • Constructor Overloading
  • Polymorphism and Overriding
  • Annotations
  • References

Lesson 5: OOP in Depth

  • Interfaces
  • Typecasting
  • The Object Class
  • Autoboxing and Unboxing
  • Abstract Classes and Methods

Lesson 6: Data Structures, Arrays, and Strings

  • Data Structures and Algorithms
  • Strings

Lesson 7: The Java Collections Framework and Generics

  • Reading Data from Files
  • The Java Collections Framework
  • Generics
  • Collection

Lesson 8: Advanced Data Structures in Java

  • Implementing a Custom Linked List
  • Implementing Binary Search Tree
  • Enumerations
  • Set and Uniqueness in Set

Lesson 9: Exception Handling

  • Motivation behind Exceptions
  • Exception Sources
  • Exception Mechanics
  • Best Practices

target_au

Java Fundamentals is designed for tech enthusiasts who are familiar with some programming languages and want a quick introduction to the most important principles of Java.


pre_req

Hardware:

For the optimal student experience, we recommend the following hardware configuration:

  • Processor: Intel Core i7 or equivalent
  • Memory: 8 GB RAM
  • Storage: 35 GB available space
  • An internet connection

 

Software:

  • Operating system: Windows 7 or above
  • Java 8 JDK
  • IntelliJ IDEA

titleAdvanced Serverless Architectures with Microsoft Azure
days2
seo_titleAdvanced Serverless Architectures with Microsoft Azure | Insoft Training
seo_decThis Serverless Architectures with Microsoft Azure training course helps you build serverless systems with fewer outages and high performance using Azure.
seo_tkeyServerless Architectures with Azure
categoryprogramming
vendorLogical Operations

techonogyLogical Operations
overviewThe Advanced Serverless Architectures with Microsoft Azure course redefines your experience of designing serverless systems. It shows you how to tackle challenges of varying levels, not just the straightforward ones. You'll be learning how to deliver features quickly by building systems, which retain the scalability and benefits of serverless. You'll begin your journey by learning how to build a simple, completely serverless application. Then, you'll build a highly scalable solution using a queue, load messages onto the queue, and read them asynchronously. To boost your knowledge further, this course also features durable functions and ways to use them to solve errors in a complex system. You'll then learn about security by building a security solution from serverless components. Next, you’ll gain an understanding of observability and ways to leverage application insights to bring you performance benefits. As you approach the concluding chapters, you’ll explore chaos engineering and the benefits of resilience, by actively switching off a few of the functions within a complex system, submitting a request, and observing the resulting behaviour. By the end of this course, you will have developed the skills you need to build and maintain increasingly complex systems that match evolving platform requirements.   See other Microsoft courses available
objective
outline

Lesson One: Complete Serverless Architectures

  • Function-as-a-Service with a Simple HTTP Trigger
  • Serverless Database with Cosmos DB
  • Serverless Websites with Azure Storage

Lesson Two: Microservices and Serverless Scaling Patterns

  • Microservices
  • Serverless Queues
  • Caching
  • Asynchronous by Default

Lesson Three: Azure Durable Functions

  • Understanding Azure Durable Functions
  • Interacting with Humans in Azure Durable Functions
  • Error Handling with Durable Functions

Lesson Four: Security

  • Serverless Security
  • Protecting Azure Functions with API Management
  • Protecting Client Information with Azure Active Directory B2C

Lesson Five: Observability

  • Understanding Observability
  • Structured Logging with Azure Application Insights
  • Client-Side Metrics with Azure Application Insights

Lesson Six: Chaos Engineering

  • Chaos Engineering
  • Automation of Deployments with Azure DevOps
  • Continuous Automated Chaos

target_au

The Advanced Serverless Architectures with Microsoft Azure course is ideal if you want to build serverless systems with fewer outages and high performance using Azure. Familiarity with the C# syntax and Azure Functions and ARM templates will help you to benefit more from this course.


pre_req

Prior knowledge of basic front-end development, HTML, JS, and CSS is beneficial but not essential. Some DevOps knowledge is also beneficial but not essential.

 

Hardware:

  • ·Processor: Intel Core i3 or equivalent
  • ·Memory: 4GB RAM
  • ·Storage: 1 GB available space

Software:

  • OS: Any desktop Linux version or macOS, or Windows 10.
  • Browser: Use one of the latest browsers such as Firefox, Chrome, Safari, Edge, or IE11, for example.

titleProfessional Blockchain
days5
seo_titleProfessional Blockchain Training Course | Insoft Services
seo_decIn this Professional Blockchain course you will learn to develop decentralized apps using Ethereum, Solidity, Truffle, Ganache, and other frameworks.
seo_tkeyProfessional Blockchain
categoryprogramming
vendorLogical Operations

techonogyLogical Operations
overviewThis Professional Blockchain training course provides an introduction to all the relevant concepts of blockchain technology. You will get detailed insights into how blockchain works and the techniques that are used to build it. In this course, you will learn to develop decentralized applications and smart contracts using Ethereum, Solidity, Truffle, Ganache, and other relevant frameworks. Because the course provides a comprehensive knowledge of blockchain technology, it is a self-contained product that enables you to fully understand the technology.   See other courses available
objective

The course will then cover decentralization, its impact, relationship with blockchain, and implementation. After this, concepts like symmetric cryptography, security services, cryptographic primitives, and stream cyphers will be covered in depth. Lessons in using OpenSSL will follow, where you can experiment with symmetric cryptography and asymmetric cryptography.

A highlight of this edition is the introduction to bitcoins and altcoins with hands-on exercises on how to install the Bitcoin client and interact with the blockchain Bitcoin. You’ll also explore smart contracts, Ethereum, solidity language, and frameworks such as Ganache, TestRPC, and Truffle for smart contract development.

By the end of this course, you’ll be an expert in the making, learning about issues delaying the maturity of blockchain technology and what lies ahead in the future.

 

This course will provide you with knowledge of the following:

  • Understand decentralization and its relationship with blockchain
  • Use cryptography to provide security services
  • Describe the inner workings of Bitcoin and alternative cryptocurrency
  • Implement smart contracts
  • Grasp how Ethereum blockchain works
  • Develop decentralized applications using Solidity and other frameworks
  • Examine applications of the blockchain technology beyond currencies
  • Implement blockchain solutions including Hyperledger and Corda
  • Explore the blockchain revolution, research topics and the future scope of blockchain technology professional Blockchain should be your next read if you want to stay updated with blockchain technology and develop your own distributed applications. To easily grasp the concepts explained in this course, you must have the knowledge and experience of coding in JavaScript.

outline

Day One

Lesson One

Lesson one will cover the distributed system, the foundation of blockchain technology, elements, and tiers of blockchain technology.

  • Distributed systems
  • History of blockchain and Bitcoin – covering electronic cash, Merkle trees
  • Definition of blockchain
  • Elements of a generic blockchain
  • Tiers of Blockchain technology

Lesson Two

More technical details of Blockchain technology

  • Types of blockchain, distributed ledger technology, (DLTs), public blockchains, private blockchains.
  • Consensus, what is consensus, how to reach consensus.
  • Consensus mechanisms used in blockchains.
  • CAP Theorem and blockchain

Lesson Three

Understand the concept of decentralization, its impact and its relationship with blockchain technology. Its implementation using Blockchain technology will also be discussed.

  • Decentralization
  • Methods used to decentralize existing systems
  • Different types of networks (centralized, decentralized, distributed)
  • Exercises to show how a system can decentralize e.g. decentralization of a payment system.
  • Blockchain and full ecosystem decentralization, computing, storage, communication decentralization.
  • DAOs, DAPPs, DOs, DASs
  • Platforms for decentralization

 

Day Two

Lesson One

Symmetric cryptography and practical exercises to complement the theoretical material.

  • What is symmetric cryptography
  • Security services
  • Cryptographic primitives, stream cyphers, block cyphers, DES, AES
  • Using OpenSSL to experiment with symmetric cryptography

Lesson Two

Asymmetric (Public-key cryptography) cryptography and practical exercises to complement the theoretical material.

  • What is public-key cryptography
  • RSA
  • Elliptic curve cryptography
  • Digital signatures
  • Hash functions
  • Using OpenSSL to experiment with public-key cryptography and hash functions.

Day Three

Introduce Bitcoin and altcoins and relevant concepts in detail with hands-on exercises on how to install the Bitcoin client and interact with Bitcoin blockchain.

At the end of this day, students should be able to:

  • Define Bitcoin
  • Describe cryptocurrencies
  • Explain altcoins
  • Understand ICOs
  • Install Bitcoin client and perform interactions with the Bitcoin blockchain

Lesson One

An introduction to Bitcoin, how it works, why it works and technical details about the blockchain structure.

  • Bitcoin definition
  • Bitcoin Bird’s eye view, how transactions work
  • Digital keys and addresses
  • Transactions, a technical view
  • Blockchain structure in Bitcoin
  • Mining

Lesson Two

An introduction to the blockchain network, its components, nodes, Wallets, and clients. Also, some introduction to programming APIs and client installation and usage will also be presented.

  • Bitcoin Network
  • Bitcoin Wallets, types and usage
  • Bitcoin clients and APIs

Lesson Three

An introduction to Alternative coins, why they exist, also discuss some examples of Altcoins and differences with Bitcoin. Introduction to Initial coin offering (ICO) and tokens standards will be provided.

  • Alternative coins
  • Some example coins, Namecoin, Litecoin, Primecoin, Zcash
  • ICOs
  • ERC20 and other standards for tokens

 

Day Four

Detailed introduction to smart contracts, Ethereum, solidity language and relevant frameworks such as Ganache, TestRPC, and truffle for smart contract development.

At the end of this day, students should be able to:

  • Explain smart contracts
  • Describe Ethereum
  • Write smart contracts in Solidity
  • Use Frameworks and tools for Ethereum development
  • Build private networks using Ethereum

Lesson One

Learn what are smart contracts, how to write smart contracts and relevant Ethereum blockchain concepts.

  • What are smart contracts, definitions, and background theory
  • Introduction to Ethereum and discussion of all releases of Ethereum.
  • Types of Ethereum networks, private, public, MainNet, Morden, kovan etc.
  • How Ethereum works
  • Transactions, keys, addresses, accounts, types of accounts, gas, fee, mining

Lesson Two

Further details on technical concepts related to smart contracts, Ethereum, and solidity.

  • How to develop smart contracts
  • Introduction to Ethereum Virtual machine
  • Remix IDE
  • Solidity
  • Solidity code examples
  • How to deploy smart contracts

Lesson Three

A deeper introduction to frameworks and development tools used for Ethereum development, along with an introduction to Web3 and how to use relevant frameworks and tools.

  • Ethereum development tools and frameworks
  • Practical examples of how to build, test and deploy smart contracts.
  • Introduction to Web3
  • Using Ganache, TestRPC, Metamask, remix IDE

 

Day Five

Further introduction to Ethereum programming. Introduction to alternative blockchain solutions and its convergence with other technical fields. Also, issues being faced by blockchain technology creating hurdles towards its maturity are also introduced along with an overview of existing research and the future of blockchain technology.

At the end of this day, students should be able to:

  • Learn Ethereum programming, development and deployment continued
  • Understand Altchains (Alternative chains)
  • Explore Blockchain, beyond cryptocurrencies
  • The convergence of blockchain with other technologies
  • List the challenges that blockchain faces such as scalability and privacy and their solutions
  • Explain the current landscape and future of Blockchain technology

Lesson One

Continuation from Day four, introduction to Ethereum and relevant frameworks and tools for development. Ethereum programming in solidity and further examples.

  • Ethereum programming, implementation of smart contracts using truffle framework
  • Example of a simple sample contract

Lesson Two

This lesson will introduce applications of blockchain technology beyond cryptocurrencies in industries such as finance, government, and media.

  • Blockchain beyond cryptocurrencies
  • The convergence of blockchain with other technologies, such as IoT and Artificial Intelligence.
  • IoT practical example

Lesson Three

This lesson will introduce alternative blockchain solutions in contrast to the more common Bitcoin and Ethereum. In addition, research areas and future of blockchain technology will also be presented.

  • Alternative blockchains, for example, Hyperledger Fabric
  • Challenges in blockchain technology
  • Research areas
  • Future
  • Closing remarks

target_au

Professional Blockchain should be your next read if you want to stay updated with blockchain technology and develop your own distributed applications.


pre_req

To easily grasp the concepts explained in this course, you must have the knowledge and experience of coding in JavaScript.

 

Hardware:

For the optimal student experience, we recommend the following hardware configuration:

  • Any entry-level PC/Mac with Windows, Linux or macOS is sufficient.
  • Processor: Intel Core i5 or equivalent.
  • Memory: 4 GB RAM.
  • Storage: 35 GB available space.

Software:

You’ll also need the following software installed in advance:

  • OS: Windows 7 SP1 64 bit, Windows 8.1 64 bit Windows 10 64 bit, macOS 10.13.2, or Linux Ubuntu 16.04.1 LTS (Xenial)
  • Browser: Google Chrome, the latest version
  • OpenSSL 1.0.2g 1 Mar 2016 command-line tool
  • Remix IDE available at https://remix.etherum.org
  • Ethereum Byzantium, Geth client available from https://www.ethereum.org
  • Node.js V 8.9.3
  • NPM V5.5.1
  • Truffle from http://truffleframework.com
  • Ganache from http://truffleframework.com/ganache/

titleMongoDB, Express, Angular and Node.js Fundamentals
days2
seo_titleMongoDB, Express, Angular & Node.js Fundamentals Training | Insoft UK
seo_decThis MongoDB, Express, Angular and Node.js Fundamentals training course, shows you how to develop highly scalable, asynchronous, and event-driven APIs.
seo_tkeyAngular and Node.js Training
categoryprogramming
vendorLogical Operations

techonogyLogical Operations
overviewTaking control of the MEAN stack and getting familiar with different JavaScript technologies during the process will transform you into a full-stack JavaScript developer. This MongoDB, Express, Angular and Node.js Fundamentals training course, shows you how to develop highly scalable, asynchronous, and event-driven APIs quickly with Express and Node.js. You'll be able to demonstrate the full-stack skill by building two full-fledged MEAN applications with the user authentication feature from scratch.   See other courses available
objective

At the end of the MongoDB, Express, Angular and Node.js Fundamentals training course, you will:

  • Understand the MEAN architecture
  • Create RESTful