See how Insoft Services is responding to COVID-19

data check





Current Vendor :


titleCCET 1.0 – Troubleshooting Cisco Contact Center Enterprise
days2
seo_titleCCET - Troubleshooting Cisco Contact Center Enterprise Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco® PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues.   This class will help you:
  • Learn the troubleshooting techniques to maximize the benefits the prepackaged deployment model PCCE
  • Anticipate and rectify possible deployment issues by learning the tools and processes that provide solutions for deployment issues

objective

After taking this course, you should be able to:

  • Describe CCE flows and processes required to support and troubleshoot the PCCE deployment
  • Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment
  • Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE Deployment

outline
  • CCE Flows and Process Review
  • Troubleshooting and Support Methodology
  • PCCE Components
  • PCCE Call Flow Review
  • CCE Diagnostic Tools
  • Diagnostic Framework Suite
  • Run Analysis Manager
  • Run Unified System Command-Line Interface (CLI)
  • Troubleshooting CCE
  • Troubleshooting Certificates
  • Troubleshooting Cisco Finesse
  • Troubleshooting a PCCE Deployment

 

Lab Exercises

  • Configure Access to Discovery Environment
  • Explore CCE Components
  • Explore Diagnostic Framework Suite
  • Analyze Peripheral Gateway (PG) Logs
  • Navigate Certificate Store
  • View Cisco Finesse Logs

target_au
  • Account manager
  • Deployment engineer
  • Deployment project manager
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Strong knowledge of computer networking components: Windows A/D, SQL Server, and components (servers, routers, switches)
  • Strong understanding of IP networks
  • Advanced experience administering of Cisco Packaged Contact Center Enterprise
  • Experience deploying Cisco Packaged Contact Center Enterprise
  • Experience administering and troubleshooting Cisco Unified Communications Manager and Voice Gateways

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding Cisco Collaboration Foundations (CLFNDU)
  • Implementing and Administering Cisco Solutions (CCNA®)
  • Administering Cisco Contact Center Enterprise (CCEA)
  • Administering Advanced Cisco Contact Center Enterprise (CCEAA)
  • Implementing Cisco Contact Center Enterprise (CCEI)

titleCCER 1.0 – Reporting Cisco Contact Center Enterprise
days5
seo_titleCCER - Reporting Cisco Contact Center Enterprise Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. The course explains the nuances of analyzing and troubleshooting in various deployment scenarios: Designed Tier 2/Day 2 Support. The Cisco® Contact Center Enterprise (CCE) solution helps businesses deliver a connected digital experience, enabling you to provide contextual, continuous, and capability-rich journeys for your customers, across time and channels. The course teaches you the business application of the CCE solution providing the framework of interrelationship between both core and optional components required to configure the CCE solution.   This class will help you:
  • Consolidate disparate data into manageable, comprehensive reports
  • Understand the business application of the CCE solution and how it provides a framework of correlation between core and optional components

objective

After taking this course, you should be able to:

  • Explain the Cisco Unified Intelligence Center including the benefits and features of the system and describe the high-level architecture of Cisco Unified Intelligence Center in the UCCE environment
  • Understand the Cisco Unified Intelligence Center administration console to perform Cisco Unified Intelligence Center administrative, maintenance and provisioning functions
  • Discuss the functional attributes of the Cisco Unified Intelligence Center
  • Customize Cisco Unified Intelligence Center Reports and Views

outline
  • Cisco Unified Intelligence Center Foundations
    • Cisco Unified Intelligence Center – Basics
    • Cisco Unified Intelligence Center – Deployment Models

     

    Cisco Unified Intelligence Center Administration and Operations Console

    • Operations Console (OAMP) Console Introduction
    • Admin User Management

     

    Cisco Unified Intelligence Center Attributes

    • Stock Reporting
    • Dashboard Features

     

    Cisco Unified Intelligence Center Custom Reports and Views

    • Creating Views
    • Building Report Definitions

     

    Lab outline

    • Exploring Cisco Unified Intelligence Center (CUIC) OAMP
    • Working with Stock Reports
    • Working with Dashboards
    • Value Lists and Collections
    • Exploring Supervisor Defaults
    • Using Groups
    • Editing Report Views Pt 1 of 2
    • Editing Report Views Pt 2 of 2
    • Report Definitions and Drilldowns
    • Create Custom Route Call Detail (RCD) Report Definition (Database Query) and Report
    • Value Lists and Drilldowns

target_au
  • Administrators
  • Business liaisons
  • Deployment engineers
  • Managers overseeing CCE deployments

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of computer networking components: Windows Active Directory (AD) SQL Server and components (servers, routers, switch) is helpful but not required
  • Understanding of Cisco Packaged Contact Center Enterprise components and call flows
  • Experience administering Cisco Packaged Contact Center Enterprise

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Administering Cisco Contact Center Enterprise (CCEA)
  • Cisco Certified Network Associate (CCNA®)
  • Understanding Cisco Foundation Collaborations (CLFNDU)

titleCCEF 1.0 – Understanding Cisco Contact Center Enterprise Foundations
days1
seo_titleCCEF - Understanding Cisco Contact Center Enterprise Foundations Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Understanding Cisco Contact Center Enterprise Foundations (CCEF) v1.0 course gives you an overview of the Cisco® Packaged Contact Center Enterprise (PCCE) and Unified Contact Center Enterprise solutions. You will gain an understanding of contact center basics and describe the available Cisco contact center solutions and intended target customers. You will also focus on the Cisco Contact Center Enterprise (CCE) family of products and explore key features and functionality of the solution including architecture, major system components, and tools used for administration and reporting. This course is the foundation for additional courses required to deploy, configure, support, and troubleshoot Cisco CCE solutions.   This class will help you:
  • Learn how to manage timely, disparate data using CCER as a reporting solution
  • Apply the CCE as a business solution to deploy, troubleshoot, and tailor application usage to support business processes.
  • Understand the foundational components of Contact Center Enterprise solutions

objective

After taking this course, you should be able to:

  • Provide a high-level overview of the Cisco Contact Center portfolio
  • List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions
  • Describe how calls flow through PCCE using appropriate terms and naming conventions
  • Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment
  • Identify advanced features available within the PCCE solution

outline
  • Introduction to CCE
  • Cisco Contact Center Basics
  • Cisco Contact Center Fundamentals
  • Functionality of PCCE Components
  • Public Switched Telephone Network (PSTN) and Voice Gateways
  • Cisco Unified Border Element (CUBE)
  • Terms and Naming Conventions Used in CCE
  • CCE Access Environment
  • CCE Routing Configuration
  • Access Tools Available in CCE
  • Single Pane of Glass (SPOG)
  • Cisco Intelligent Contact Management (ICM) Configuration Manager
  • Discovering CCE Features Beyond Default
  • Agent Management
  • Agent Efficiency

 

Lab outline

  • This class does not have any labs.

target_au
  • Account and project managers
  • Business liaisons
  • Deployment engineers
  • Managers overseeing CCE deployments
  • Technical sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
  • Working knowledge of Unified Communications Manager and Voice Gateways
  • Basic understanding of IP networks

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • CCNA®
  • Understanding Cisco Foundation Collaborations (CLFNDU)

titleCCEI 1.0 – Implementing Cisco Contact Center Enterprise
days3
seo_titleCCEI - Implementing Cisco Contact Center Enterprise Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Contact Center Enterprise (CCEI) v1.0 course teaches you how to build and implement a Cisco® Packaged Contact Center Enterprise (PCCE) solution, including advanced integration of external data, Single Sign-On (SSO), and process detail for the Contact Center Enterprise (CCE) solution with examples of the various deployment models. This integration process enables businesses and organizations to deliver a connected digital experience of continuous and capability-rich journeys for your customers, across time and channels. This course teaches you to install the CCE solution and provide Tier 2–3 solution support. The focus is on Day 1 support for a new CCE deployment.   This class will help you:
  • Learn how to optimize management of CCE solutions for smooth, connected, and efficient digital experiences across multiple channels
  • Manage the effects of using CCE solutions for scalability, flexibility, and growth to support larger contact center enterprises

objective

After taking this course, you should be able to:

  • Examine components, protocols, and variables that influence selection of the design and sizing of a PCCE deployment
  • Identify concepts necessary to create CCE system design specifications and deployment plans
  • Configure an advanced VXML application implementing DB lookup functionality and digit collection; use Call Studio and CCE Scripting tools to present call data collected from the caller to the gent desktop
  • Discover how to install CCE software
  • Administer CA signed security certificates to support the successful addition of a PCCE site
  • Identify the tasks associated with adding Remote Site functionality to the PCCE environment
  • Discuss integration of the CUIC, LiveData, and Finesse reporting environments
  • Configure the PCCE Dial Plan end-to-end, incorporating the use of Cisco Unified Border Element (CUBE), Cisco Unified SIP Proxy (CUSP), Cisco Virtualized Voice Browsers (VVBs), Voice XML (VXML) Gateways (GW), and Significant Digits
  • Examine concepts necessary to create CCE system design specifications and deployment plans
  • Create a series of routing scripts using PCCE
  • Configure Single sign-on for Unified CCE

outline

Planning a Cisco Packaged Contact Center Enterprise Deployment

  • Packaged CCE Component Overview
  • Call Flows Review

 

Staging a Packaged CCE Deployment

  • PCCE Deployment Planning and System Design Specification
  • Software Compatibility and OS Requirements

 

Preparing CCE Software for Installation

  • General Considerations and System Requirements
  • Active Directory Considerations

 

Administering Security Certificates

  • Security Certificate Overview
  • Install and Configure Certificate Authority

 

Introducing the Packaged CCE Integration Wizard

  • PCCE Inventory and Service Accounts
  • Run the PCCE Wizard Adding a Site to Packaged CCE

 

Adding a Site to Packaged CCE

  • PCCE Remote Site Overview
  • Remote Site Security Certificate Considerations

 

Integrating Cisco Unified Intelligence Center, LiveData, and Finesse

  • Compare Real Time vs. Live Data
  • Complete Cisco Unified Intelligence Center Integration

 

Personalizing the Packaged CCE Dial Plan

  • CCE Dial Plan Components
  • Ingress Gateway and Cisco Unified Border Element Dial Plans Configuring to Validate Deployment

 

Configuring to Validate Deployment

  • Confirm Configuration Readiness
  • Cisco Unified Communications Manager Administration

 

Scripting for Packaged Contact Center Enterprise

  • Configure Script Editor
  • Use Microapps

 

Configuring Single Sign-On

  • SSO Overview
  • Configure SSO Prerequisites

 

Lab Practice

  • Navigate CCE Discovery Architecture and Components
  • Explore ICM Configuration Tools
  • Observe Installed CCE Software
  • Navigate Certificate Store
  • Add a Remote Site to PCCE
  • Personalize Finesse Server
  • Configure Site Dial Plan
  • Verify Configuration Details for Final Testing
  • Build a Series of Test Scripts
  • Enable Single Sign-On

target_au
  • Deployment engineer
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Advanced knowledge of computer networking components: Windows A/D, SQL Server, and components
  • Understanding of IP networks
  • Strong understanding of Cisco Packaged Contact Center Enterprise functionality
  • Advanced experience administering of Cisco Packaged Contact Center Enterprise
  • Working knowledge of Unified Communications Manager and Voice Gateways

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Administering Cisco Contact Center Enterprise (CCEA)
  • Administering Advanced Cisco Contact Center Enterprise (CCEAA)
  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Understanding Cisco Collaboration Foundations (CLFNDU)
  • Implementing and Administering Cisco Solutions (CCNA®)

titleCCEAA 1.0 – Administering Advanced Cisco Contact Center Enterprise
days3
seo_titleCCEAA - Administering Advanced Cisco Contact Center Enterprise Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco® Contact Center Enterprise (CCE) solution through an in-depth examination of technical and operational requirements, and of the tools used to configure and ensure CCE solution functionality.   This class will help you:
  • Learn how to optimize management of CCE solutions for proactive management of contact centers tasks
  • Manage the effects of using CCE solutions for scalability and interaction between the solution components for centralized application management

objective

After taking this course, you should be able to:

  • Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities.
  • Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration.
  • Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop.
  • Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new.
  • Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop.
  • Successfully deploy Mobile Agent in a CCE Environment.
  • Successfully deploy Post Call Survey in a CCE Environment.

outline

PCCE Review

  • Review PCCE Architecture and Components
  • Review PCCE Protocols

 

Introducing Bulk Import Tools

  • Use the PCCE Bulk Import Tool
  • Use Bulk Import Templates

 

Configuring Advanced Scripting and CCE Data Exchange

  • Design for Advanced Scripting
  • CCE Data Exchange

 

Cisco Unified Communications Manager Initiated Call Flows

  • Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models
  • Describe Subsequent Transfers

 

Using Gadgets to Customize the Finesse Desktop

  • Obtain Finesse Custom Gadgets
  • Deploy Finesse Custom Gadgets

 

Implementing Mobile Agent

  • Examine Mobile Agent Functionality
  • Identify Mobile Agent Architecture and Components

 

Implementing Post Call Survey

  • Examine Post Call Survey Functionality
  • Configure Post Call Survey

 

Lab Practice

  • Review Discovery
  • Navigate CCE Discovery Architecture and Components
  • Import Bulk Data
  • Create a VXML Application Using Call Studio
  • Configure Precision Queues
  • Create a CCE Routing Script
  • Customize the Finesse Desktop
  • Test Your Call Flow
  • Configure Cisco Unified Communications Manager (CUCM) as Routing Client and Agent Transfers
  • Deploy Cisco Finesse Gadgets
  • Implement Mobile Agent

target_au
  • Deployment engineer
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required.
  • Working knowledge of Unified Communications Manager and voice gateways
  • Basic understanding of Cisco Unified Contact Center Enterprise architecture and operation

 

 Recommended Cisco offerings that may help you meet these prerequisites:

  • Administering Cisco Contact Center Enterprise (CCEA)
  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding CiscoCollaboration Foundations (CLFNDU)

titleCCEA 1.0 – Administering Cisco Contact Center Enterprise
days4
seo_titleCCEA - Administering Cisco Contact Center Enterprise Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Administering Cisco Contact Center Enterprise (CCEA) v1.0 course teaches you the contextual information around call flow between components in the Cisco® Unified Contact Center Enterprise (UCCE) solution including intelligent contact routing, call treatment, network-to-desktop Computer Telephony Integration (CTI), and multichannel contact management over an IP infrastructure. You receive hands-on practice using administrative tools to perform routine adds, moves, and changes in an inbound contact center environment.   This class will help you:
  • Leverage the Cisco Unified Contact Center Enterprise (UCCE) for a smooth integration of inbound and outbound voice applications to support multiple communication channels.
  • Manage a multichannel contact functionality with IP telephony as a unified solution to rapidly deploy within a distributed contact center infrastructure.

objective

After taking this course, you should be able to:

  • Navigate CCE configuration and scripting tools
  • Configure a dialed number, call type, and media routing domain
  • Build a basic Cisco Intelligent Contact Management (ICM) script
  • Configure agents and skill groups
  • Configure basic Interactive Voice Response (IVR) functionality
  • Implement attributes and precision queues
  • Configure Ring-No-Answer (RONA) using CCE configuration tools
  • Configure and populate an agent team and primary supervisor
  • Improve agent efficiency through finesse enhancements
  • Build and test a basic Voice XML (VXML) application
  • Implement roles, departments, and business hours
  • Run Cisco Unified Intelligence Center (CUIC) reports using the Reporting tool

outline

Cisco Unified Contact Center Review

  • Contact Center Basics
  • Components and Architecture

 

Deploying Basic Call Settings

  • Associate Basic Call Settings
  • Explore Media Routing Domains

 

Building a Basic Cisco Unified Contact Center Enterprise Script

  • Introduce Script Editor
  • Use Script Editor Nodes

 

Configuring Basic Agent Functionality

  • Introduce Agent Functionality
  • Configure Agent Desk Settings

 

Configuring Basic Call Treatment and Queuing

  • Explore Media Server and Files
  • Introduce Microapps

 

Implementing Precision Routing

  • Introduce Precision Routing Basics
  • Examine the Migration Path

 

Configuring RONA Support

  • Introduce RONA Functionality
  • Identify RONA Timeout Considerations

 

Configuring Agent Teams and Supervisors

  • Configuring Teams and Supervisors
  • Explore Agent Roles

 

Administering the Cisco Finesse Desktop

  • Administering Cisco Finesse Desktop
  • Introduce Cisco Finesse Administration

 

Implementing Voice XML Applications

  • Introduce VXML
  • Build a Basic Call Studio Project

 

Configuring Roles, Departments, and Business Hours

  • Examine Post-Call Survey Functionality
  • Configure Post-Call Survey

 

Running Unified CC Enterprise Reports with Unified Intelligence Center (IC)

  • Configure Unified CC Enterprise Administrators
  • Configure Departments

 

Lab Exercises

  • Navigate CCE Discovery Architecture and Components
  • Explore ICM Configuration Tools
  • Administering ICM Dialed Numbers and Call Types
  • Prepare a Basic Label Script
  • Using ICM Tools for ICM Scripts
  • Configure ICM for Basic Agent and Skill Group Functionality
  • Configure UCM for Agent Functionality
  • Test Basic Skill Group Functionality in an ICM Script
  • Examine Media Files and Variables in ICM Scripts
  • Build Basic ICM Scripts with MicroApps
  • Configure and Implement Precision Routing
  • Configure RONA
  • Configure Agent Teams and Supervisors
  • Cisco Finesse Administration
  • Configure VXML Server and Install Call Studio
  • Create and Deploy a Call Studio Project
  • Integrate VXML Applications with a Unified CC Enterprise Script
  • Configuring Roles, Departments, and Business Hours
  • Run Unified IC Stock Reports

target_au
  • Account and project managers
  • Contact Center Enterprise (CCE) administrators
  • Deployment engineers
  • Technical sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
  • Working knowledge of Unified Communications Manager and voice gateways
  • Basic understanding of Cisco Unified Contact Center Enterprise architecture and operation

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding Cisco Collaboration Foundations (CLFNDU)

titleCLFNDU v1.1 – Understanding Cisco Collaboration Foundations
days5
seo_titleCLFNDU - Understanding Cisco Collaboration Foundations Training
seo_dec
seo_tkey
categoryunified-communications
vendorCisco

techonogyCollaboration
overviewThe Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. The course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several professional-level collaboration courses and exams:
NO Id Course NameVendor seo titlekeywords seo description
Collaboration Courses Collaboration Exams
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) 350-801 Implementing Cisco Collaboration Core Technologies (CLCOR)
Implementing Cisco Collaboration Applications (CLICA) 300-810 Implementing Cisco Collaboration Applications (CLICA)
Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM)
Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) 300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)
Implementing Automation for Cisco Collaboration Solutions (CLAUI) 300-835 Implementing Automation for Cisco Collaboration Solutions (CLAUI)

objective

After taking this course, you should be able to:

  • Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model
  • Configure and modify required parameters in Cisco Unified Communications Manager (CM) including service activation, enterprise parameters, CM groups, time settings, and device pool
  • Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM

outline
  • Define Collaboration Technology and Benefits
  • Administering Initial Parameters for Cisco Unified Communications Manager
  • Exploring Endpoints and the Registration Process
  • Exploring Codecs and Call Signaling
  • Managing Users in Cisco Unified Communication Manager
  • Describing a Basic Dial Plan
  • Describing Class of Service
  • Enabling Endpoints and Features
  • Describing the Cisco ISR as a Voice Gateway
  • Exploring Cisco Unified Communication Manager Media Resources
  • Reporting and Maintenance
  • Exploring Additional Requirements for Video Endpoints
  • Describing Cisco Unity Connection

Lab outline

  • Configure Cisco Unified Communication Manager Initial Parameters
  • Configure the Cisco Unified CM Core System Settings
  • Configure an Access Switch for an Endpoint
  • Deploy an IP Phone Through Auto and Manual Registration
  • Administer Endpoints in Cisco Unified Communications Manager
  • Create a Local User Account and Configure LDAP
  • Adding Users in Cisco Unified Communications Manager Create a Basic Dial Plan
  • Explore Partitions and Call Search Spaces
  • Explore Private Line Automatic Ringdown (PLAR)
  • Deploy an On-Premise Cisco Jabber® Client for Windows
  • Implement Common Endpoint Features
  • Implement Single-Site Extension Mobility Configure Jabber
  • Configure Voice over Internet Protocol (VoIP) Dial Peers
  • Configure Integrated Service Digital Network (ISDN) Circuits and Plain Old Telephone Service (POTS) Dial Peers
  • Control Access to Media Resources
  • Use Reporting and Maintenance Tools
  • Explore Endpoint Troubleshooting Tools
  • Examine the Integration between Unity Connection and Cisco Unified CM
  • Manage Unity Connection Users

target_au
  • Students preparing to take the CCNP Collaboration certification
  • Network administrators
  • Network engineers
  • Systems engineers

pre_req

This course is intended to be an entry-level course. While there are no specific prerequisite Cisco courses; however, the following skills are required:

  • Internet web browser usability knowledge and general computer usage
  • Knowledge of Cisco Internetwork Operating System (Cisco IOS®) command line

titleDCNXA 1.0 – Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced
days4
seo_titleDCNXA 1.0 - Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced Training
seo_dec
seo_tkey
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features. This course will help you:
  • Learn how you can integrate Cisco Nexus 9000 Switches in NX-OS mode to manage your enterprise IT environment
  • Understand the common platform architecture and key features of the Cisco Nexus 9000 Series in NX-OS mode to provide a consistent set of provisioning, management, and diagnostic capabilities for applications

objective

After taking this course, you should be able to:

  • Configure VXLAN EVPN in a single site using Cisco DCNM
  • Configure a Multi-Site VXLAN EVPN
  • Configure L4-L7 service redirection
  • Configure external connectivity from a VXLAN EVPN
  • Configure tenant-level features and Tenant-Routed Multicast (TRM) in VXLAN EVPN
  • Configure Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD)

outline
  • Describing VXLAN EVPN in Single Site
    • Describe VXLAN EVPN Control Plane
    • Describe VXLAN EVPN Data Plane
  • Describing Multi-Site VXLAN EVPN
    • Describe VXLAN EVPN Multi-Site Features
    • Describe Supported Multi-Site Topologies
  • Describing Layer 4-Layer 7 Service Redirection
    • Describe Layer 4-Layer 7 Service Integration Options
    • Describe Integration of Active/Standby and Active/Active Service Devices
  • Describing External Connectivity from VXLAN EVPN
    • Describe External VRF-Lite Connectivity
  • Describing VXLAN EVPN Functionality Enhancements
    • Describe Fabric Management Options
    • Describe Tenant-Level Dynamic Host Configuration Protocol (DHCP) Relay
  • Describing Cisco NX-OS Enhanced Policy-Based Redirect and Intelligent Traffic Director
    • Describe Enhanced Policy-Based Redirect
    • Describe Tenant-Level DHCP Relay

Labs

  • Import an Existing VXLAN Border Gateway Protocol (BGP) EVPN Fabric into Cisco DCNM
  • Configure vPC and Layer 3 Connectivity
  • Configure Multi-Site VXLAN EVPN
  • Configure Routed Firewall Integration into VXLAN EVPN Using PBR
  • Configure External VRF Lite Connectivity and Endpoint Locator
  • Configure Tenant DHCP Relay
  • Configure Tenant-Routed Multicast
  • Configure Enhanced Policy-Based Redirect
  • Configure Traffic Load-Balancing Using the ITD

target_au

Basic knowledge in the following areas can help you get the most from this course:

  • Networking protocols, routing, and switching
  • General Cisco data center technologies
  • Virtualization fundamentals
  • Cisco Nexus platform management

The following course offerings may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Implementing Cisco Nexus 9000 Switches in NX-OS Mode (DCNX)

pre_req

IT professionals interested in understanding the capabilities of Cisco Nexus 9000 Series Switches including:

  • Data center engineer
  • Field engineer
  • Network designer
  • Network administrator
  • Network engineer
  • Systems engineer
  • Technical solutions architect

titleDCMDSO 1.5 – Cisco MDS 9000 Series Switches Overview
days1
seo_titleDCMDSO 1.5 - Cisco MDS 9000 Series Switches Overview Training
seo_dec
seo_tkey
categorystorage-networking
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.5 course gives you a technical overview of how Cisco Multilayer Director Switch (MDS) 9000 Series, can be used to build highly available and scalable storage networks with advanced security and unified management. The course is for technical decision makers and IT professionals who architect, implement, and manage data center Storage Area Network (SAN) environments. In this course, you’ll learn about key capabilities of the MDS 9000 Series, including platforms, architecture, software, management, and key features that contribute to performance, high availability, flexibility, and operational simplicity of storage environments. This course will help you:
  • Learn how you can use Cisco MDS Series 9000 Multilayer Switches to manage your enterprise SAN environment
  • Understand the common platform architecture and key features of the MDS 9000 Series, which provide a consistent set of provisioning, management, and diagnostic capabilities and lead to flexibility, speed, lower operational costs and more benefits

objective

After taking this course, you should be able to:

  • Describe Cisco MDS SAN features and advantages
  • Define fixed and modular platforms
  • Understand Cisco MDS architecture and high-availability mechanisms
  • Identify technologies used in modern SANs
  • Describe SAN management with Cisco Data Center Network Manager (DCNM)
  • Explain key value-add features that distinguish Cisco MDS switches

outline
  • Define Cisco MDS Platform Overview
  • Introduction and Advantages of Cisco MDS
  • Fixed Platforms
  • Modular Platforms
  • Describe Cisco MDS Architecture
  • Store-and-Forward Architecture
  • High Availability
  • Redundancy
  • Explore Cisco MDS Key Features
  • Virtual Storage Area Networks
  • Port Channels
  • Slow Drain Device and Path Analysis Using Congestion Control Mechanisms
  • Cisco DCNM SAN Insights for SAN Analytics
  • Zoning
  • Smart Zoning
  • Other Differentiating Features
  • Examine Cisco MDS Management
  • Cisco Data Center Network Manager

target_au

IT professionals interested in understanding the capabilities of the MDS 9000 Series, including:

  • Data center architects
  • Data center engineers
  • IT directors
  • IT managers
  • Network architects
  • Network engineers
  • Solutions architects
  • Systems engineers

pre_req

Understanding the following information can help you get the most from this course:

  • Experience managing data center deployments
  • Grasping the fundamentals of SAN technologies
  • Understanding business and application requirements

titleVWAAS v1.0 – Implementing Cisco Virtual Wide Area Application Services
days5
seo_titleVWAAS v1.0 - Implementing Cisco Virtual Wide Area Application Services Training
seo_dec
seo_tkey
categoryrouting-switching
vendorCisco

techonogyEnterprise Networking
overviewThe VWAAS - Implementing Cisco Virtual Wide Area Application Services v1.0 is a five-day instructor-led training. This course teaches learners how to deploy, configure, operate, maintain and support a solution using Cisco Virtual Wide-Area Application Services that provides performance optimization for application data over WAN. In this course, you will get the skills to understand optimization technologies, protocols, services, functions, advanced features and operation. Besides, you will learn how to implement, integrate, install, manage and troubleshoot Cisco VWAAS solutions in diverse Data Center virtualization environments such as in Enterprise networks and Virtual Private Clouds, and gain a comprehensive hands-on labs experience.
objective

Upon completion of this course, you will be able to:

  • Understand the concept of Customer Success in the context of software products or services
  • Be able to identify the key tasks and expectations from the CSM role
  • Know about the concepts of CSF, KPI and how they are employed to measure success
  • Be able to define the concepts of stakeholders, business outcomes, ARR, LTCV, and how they relate to tracking success

outline
  • Section 1: Introducing Cisco WAAS
  • Section 2: Configuring Applications Acceleration in Cisco VWAAS
  • Section 3: Configuring Cisco AppNav
  • Section 4: Configuring Traffic Interception for Cisco VWAAS
  • Section 5: Configuring Cisco VWAAS with Akamai Connect
  • Section 6: Managing Cisco VWAAS Devices Using AAA and RBAC
  • Section 7: Monitoring Cisco VWAAS
  • Section 8: Troubleshooting Cisco VWAAS
  • Section 9: Cisco VWAAS on Virtual Private Clouds (VPC)

target_au
  • Data Center Engineers
  • IT, Cloud Computing Experts
  • Network Virtualization Services Experts

pre_req

It is recommended, but not required, to have the following skills and knowledge before attending this course:

  • Cisco CCNA Routing and Switching (or equivalent knowledge)
  • Fundamental knowledge server virtualization and hypervisors
  • Fundamental knowledge of cloud computing infrastructure
  • Fundamental knowledge of WAN Optimization
  • Fundamental knowledge on Network Protocols and Applications including HTTP, HTTPS, SSL, SMB, NFS, MAPI, VDI

titleDCIT v7.0 – Troubleshooting Cisco Data Center Infrastructure
days5
seo_titleDCIT v7.0 – Troubleshooting Cisco Data Center Infrastructure Training
seo_dec
seo_tkey
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 course shows you how to troubleshoot LAN, SAN, Cisco® Data Center Unified Fabric, Cisco Unified Computing System™ (Cisco UCS®), and Cisco Application-Centric Infrastructure (Cisco ACI®).You will learn methodologies and tools to identify issues that may occur in data center network architecture. You will get extensive hands-on practice troubleshooting installation, configuration and interconnectivity issues on Cisco Multilayer Director Switch (MDS) switches, Cisco Nexus® switches, Cisco Fabric Extenders (FEXs), Cisco UCS, Cisco ACI, and more. This course helps prepare you to take the exam:
  • 300-615 Troubleshooting Cisco Data Center Infrastructure (DCIT)
This course will help you:
  • Learn how to deploy and troubleshoot various components of Cisco data center infrastructure to support performance, resiliency, scalability needs
  • Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
  • Earn 50 CE credits toward recertification

objective

After taking this course, you should be able to:

  • Describe how to troubleshoot the data center network, troubleshooting tools and methodologies available from the Command-Line Interface (CLI) that are used to identify and resolve issues in a Cisco data center network architecture
  • Identify and resolve issues that are related to: Virtual LANs (VLANs) and private VLANs (PVLANs); port channels and virtual port channels; Overlay Transport Virtualization (OTV); and Virtual Extensible LAN (VXLAN)
  • Describe troubleshooting of routing protocols such as Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Protocol-Independent Multicast (PIM), and LAN security features
  • Identify and resolve issues that are related to a single device
  • Identify and resolve issues that are related to Fibre Channel interface operation
  • Identify and resolve Fibre Channel switching issues when the Cisco NX-OS Software is used in switched mode, and in N-Port Virtualization (NPV) mode
  • Identify and resolve issues that are related to Fibre Channel over Ethernet (FCoE) and FCoE Initialization Protocol (FIP), including FCoE performance
  • Describe Cisco UCS architecture, initial setup, tools, and service aids that are available for Cisco UCS troubleshooting and interpretation of the output
  • Describe Cisco UCS configuration, Cisco UCS B-Series Blade Server operation and troubleshoot related issues
  • Describe LAN, SAN, and Fibre Channel operations, including in-depth troubleshooting procedures
  • Describe Cisco Integrated Management Controller (IMC) tools for validating performance and facilitating data-gathering activities for Cisco UCS C-Series server troubleshooting, and the troubleshooting approach for hardware and firmware failures
  • Define the proper procedures for configuring LAN and SAN connectivity, avoiding issues with the VIC, troubleshooting connectivity issues and Cisco UCS C-Series server integration with Cisco UCS Manager
  • Identify the tools, protocols, and methods to effectively troubleshoot Cisco ACI

outline
  • Describing the Troubleshooting Process
  • Understanding CLI Troubleshooting Tools
  • Troubleshooting VLANs and PVLANs
  • Troubleshooting Port Channels and Virtual Port Channels
  • Troubleshooting Cisco Overlay Transport Virtualization (OTV)
  • Troubleshooting Virtual Extensible LAN (VXLAN)
  • Troubleshooting Routing and High-Availability Protocols
  • Troubleshoot Data Center LAN Security
  • Troubleshooting Platform-Specific Issues
  • Troubleshooting Fibre Channel Interfaces
  • Troubleshooting Fibre Channel Fabric Services
  • Troubleshooting NPV Mode
  • Troubleshooting FCoE
  • Troubleshooting Cisco UCS Architecture and Initialization
  • Troubleshooting Cisco UCS Configuration
  • Troubleshooting Cisco UCS B-Series Servers
  • Troubleshooting Cisco UCS B-Series LAN and SAN Connectivity
  • Troubleshooting Cisco UCS C-Series Servers
  • Troubleshooting Cisco UCS C-Series LAN and SAN Connectivity
  • Troubleshooting Cisco UCS C-Series and Cisco UCS Manager Integration
  • Exploring the Tools and Methodologies for Troubleshooting Cisco ACI
  • Troubleshoot Automation and Scripting Tools
  • Troubleshooting Programmability

Lab outline

  • Document the Network Baseline
  • Troubleshoot Rapid PVST+
  • Troubleshoot Link Aggregation Control Protocol (LACP)
  • Troubleshoot vPC
  • Troubleshoot OTV
  • Troubleshoot VXLAN
  • Troubleshoot OSPF
  • Troubleshoot FHRP
  • Troubleshoot Cisco Fabric Services
  • Troubleshoot VRF
  • Troubleshoot Cisco FEX
  • Troubleshoot Fibre Channel Interfaces
  • Troubleshoot Fibre Channel VSANs, Zones, and Domain Services
  • Troubleshoot NPV Mode
  • Troubleshoot FCoE
  • Troubleshoot DCB
  • Troubleshoot Cisco UCS Management and Service Profile Deployment
  • Troubleshoot Cisco UCS C-Series Server LAN Connectivity
  • Troubleshoot Cisco UCS C-Series Server Boot from the Fibre Channel LUN
  • Troubleshoot Cisco UCS C-Series Server Management Connectivity
  • Troubleshoot Cisco ACI Integration with VMware vCenter
  • Troubleshoot Contracts in Cisco ACI
  • Troubleshoot Cisco ACI External Layer 3 Connectivity
  • Troubleshoot Cisco ACI External Layer 2 Connectivity

target_au
  • Network designers
  • Network administrators
  • Network engineers
  • System engineers
  • Data center engineers
  • Consulting systems engineers
  • Technical solutions architects
  • Server administrators
  • Network managers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Configure, secure, and maintain LAN and SAN based on Cisco Nexus and MDS switches
  • Configure, secure, and maintain Cisco Unified Computing System
  • Configure, secure, and maintain Cisco ACI

 

The following Cisco courses may help you meet these prerequisites:

  • Implementing and Administering Cisco Networking Technologies (CCNA®)
  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Introducing Cisco NX-OS Switches and Fabrics in the Data Center (DCINX)
  • Configuring Cisco NX-OS Switches and Fabrics in the Data Center (DCCNX)
  • Introducing Cisco Unified Computing System (DCIUCS)
  • Configuring Cisco Unified Computing System (DCCUCS)

titleDCACIA 1.0 – Implementing Cisco Application Centric Infrastructure – Advanced
days5
seo_titleDCACIA 1.0 - Implementing Cisco Application Centric Infrastructure - Advanced Training
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA) v1.0 course shows you how to integrate the capabilities of the Cisco & Nexus & 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode providing enhanced management and policy framework, along with the protocols used in the underlying fabric. The course also covers how to use Cisco ACI as a policy-driven solution that integrates software and hardware, and how to implement Cisco ACI Multi-Pod and Multi-Site deployments. You will gain hands-on practice implementing advanced ACI capabilities such as Rogue Endpoint Feature, Transit Routing, VRF Route Leaking, Contracts and Zoning Rules, Policy Based Redirect to Layer 4 & 7 Service Node, Multi-Pod Fabric and Cisco ACI Multi-Site Orchestrator.   This course will help you:  
  • Learn best practices for implementing and managing Cisco Nexus 9000 Series Switches in Cisco ACI mode
  • Leverage the integration software and hardware solutions to expand the capabilities of data center and cloud networks
  • Maximize the benefits of an application-centric approach to deliver automation and flexibility in IT services, and automate fabric deployment and configuration

objective

After taking this course, you should be able to:

  • Integrate Cisco ACI advanced fabric packet forwarding
  • Implement advanced ACI policy and tenant configuration
  • Demonstrate Cisco ACI Multi-Pod deployment
  • Understand the details and consideration of implementing and integrating traditional network with Cisco ACI
  • Configure Cisco ACI Service Graph Policy-Based Redirect (PBR)
  • Describe Cisco ACI Multi-Site deployment

outline

Cisco ACI Advanced Packet Forwarding

  • Packet Forwarding Between Leaf Switches
  • Endpoint Learning
  • Network Interface Card (NIC) Teaming to ACI Fabric
  • Endpoint Learning Optimizations
  • Endpoint Loop Protection
  • Rogue Endpoint Control

Using Advanced Cisco ACI Policy and Tenant Configuration

  • Layer 3 Outside Transit Routing
  • Using Tenant Common for Shared Services
  • Using Virtual Routing and Forwarding (VRF) Route Leaking for Shared Services
  • Using Layer 3 Outside configuration policy (L3Out) VRF Route Leaking for Shared Services
  • Detailed Contract Architecture with pcTag
  • Contract with vzAny
  • Contract Preferred Group

Implementing Traditional Network in Cisco ACI

  • Integrating Switched Network with Cisco ACI
  • Migrating Existing Switched Network to Cisco ACI
  • Network- vs. Application-Centric Deployment Models

Cisco ACI Service Graph PBR

  • Service Graph PBR Overview
  • PBR End-to-End Packet Flow
  • Service Graph PBR Requirements and Topologies
  • Service Graph PBR Tracking Options

Cisco ACI Multi-Pod Deployment

  • Cisco ACI Multi-Pod Overview
  • Inter-Pod Network Overview
  • Multi-Pod Provisioning and Packet Flow Between Pods
  • Connectivity to External L3 Networks
  • Service Node Integration Considerations
  • Service Graph Considerations

Cisco ACI Multi-Site Deployment

  • Cisco ACI Multi-Site Overview
  • Cisco ACI Multi-Site Orchestrator
  • Inter-Site Network Overview
  • Tenant Configuration Deployment from Multi-Site Orchestrator (MSO)
  • Packet Flow Between Sites
  • Multi-Site Stretched Components
  • Multi-Site vs Multi-Pod Comparison

 

Lab Outline

 

  • Examine Local and Remote Endpoint Learning
  • Verify Bounce Entries
  • Validate IP Learning
  • Mitigate IP and MAC Flapping with the Rogue Endpoint Feature
  • Enable Transit Routing
  • Implement VRF Route Leaking
  • Configure VRF Route Leaking with L3Out
  • Examine Contracts and Zoning Rules
  • Configure Policy-Based Redirect to Layer 4–7 Service Node
  • Deploy Multi-Pod Fabric
  • Provision Policies with Cisco ACI Multi-Site Orchestrator

target_au
  • Network designers
  • Network administrators
  • Network engineers
  • Systems engineers
  • Data center engineers
  • Consulting systems engineers
  • Technical solutions architects
  • Field engineers
  • Server administrators
  • Network managers
  • Storage administrators
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Basic understanding of Cisco ACI
  • Understanding of Cisco data center architecture
  • Familiarity with virtualization fundamentals

 

These are the recommended courses that may help you meet these prerequisites:

  • Implementing Cisco Application Centric Infrastructure (DCACI) v1.0
  • Implementing and Administering Cisco Solutions (CCNA) v1.0
  • Understanding Cisco Data Center Foundations (DCFNDU) v1.0

titleVH8DM – VMware Horizon 8: Deploy and Manage (V8.0)
days5
seo_titleVH8DM - VMware Horizon 8: Deploy and Manage (V8.0) Training
seo_dec
seo_tkey
categorydesktop-mobility
vendorVMware

techonogyWireless
overviewVMware Horizon 8: Deploy and Manage is a five days course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
objective

Upon completing this course, the learner will be able to meet these objectives:

  • Recognize the features and benefits of Horizon
  • Use VMware vSphere® to create VMs to be used as desktops for Horizon
  • Create and optimize Windows VMs to create Horizon desktops
  • Install and configure Horizon Agent on Horizon desktop
  • Configure and manage the VMware Horizon® Client™ systems and connect the client to a VMware Horizon desktop
  • Configure, manage, and entitle desktop pools of full VMs
  • Configure, manage, and entitle pools of instant-clone desktops
  • Create and use Remote Desktop Services (RDS) desktops and application pools
  • Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool
  • Identify Horizon Connection Server installation, architecture, and requirements.
  • Describe the authentication and certification options for a Horizon environment
  • Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8
  • Discuss performance and scalability options available in Horizon 8
  • Describe different security options for the Horizon environment

outline

Module 1: Course Introduction

  • Introductions and course logistics
  • Course objectives

Module 2: Introduction to VMware Horizon

  • Recognize the features and benefits of Horizon
  • Describe the conceptual and logical architecture of Horizon

Module 3: Introduction to Use Case

  • Define a use case for your virtual desktop and application infrastructure
  • Convert customer requirements to use-case attributes

Module 4: vSphere for Horizon 8

  • Explain basic virtualization concepts
  • Use VMware vSphere® Client™ to access your vCenter Server system and VMware ESXi™ hosts
  • Create, provision, and remove a virtual machine

Module 5: VMware Horizon Desktops

  • Create a Windows and a Linux virtual machine using vSphere
  • Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs

Module 6: VMware Horizon Agents

  • Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines
  • Create a gold master for Windows Horizon desktops

Module 7: VMware Horizon Pools

  • Identify the steps to set up a template for desktop pool deployment
  • List the steps to add desktops to the VMware Horizon® Connection Server™ inventory
  • Compare dedicated-assignment and floating-assignment pools
  • Outline the steps to create an automated pool
  • Define user entitlement
  • Explain the hierarchy of global, pool-level, and user-level policies

Module 8: VMware Horizon Client Options

  • Describe the different clients and their benefits
  • Access Horizon desktop using various Horizon clients and HTML
  • Configure integrated printing, USB redirection, and the shared folders option
  • Configure session collaboration and media optimization for Microsoft Teams

Module 9: Creating and Managing Instant-Clone Desktop Pools

  • List the advantages of instant clones
  • Explain the provisioning technology used for instant clone desktop pools
  • Set up an automated pool of instant clones
  • Push updated images to instant clone desktop pools

Module 10: Creating RDS Desktop and Application Pools

  • Explain the difference between an RDS desktop pool and an automated pool
  • Compare and contrast an RDS session host pool, a farm, and an application pool
  • Create an RDS desktop pool and an application pool
  • Access RDS desktops and application from Horizon Client
  • Use the instant clone technology to automate the build-out of RDSH farms
  • Configure load-balancing for RDSHs on a farm

Module 11: Monitoring VMware Horizon

  • Monitor the status of the Horizon components using the Horizon Administrator console dashboard
  • Monitor desktop sessions using the HelpDesk tool

Module 12: Course Introduction

  • Introductions and course logistics
  • Course objectives

Module 13 : Horizon Connection Server

  • Recognize VMware Horizon reference architecture
  • Identify the Horizon Connection Server supported features
  • Identify the recommended system requirements for Horizon Connection Server
  • Configure the Horizon event database
  • Outline the steps for the initial configuration of Horizon Connection Server
  • Discuss the ADAM database as a critical component of Horizon Connection Server installation

Module 14: VMware Horizon Authentication and Certificates

  • Compare the authentication options that Horizon Connection Server supports
  • Describe the Smartcard authentication options that Horizon Connection Server supports
  • Outline the steps to create a Horizon administrator and custom roles
  • Describe the roles available in a Horizon environment
  • Explain the role that certificates play for Horizon Connection Server
  • Install and configure certificates for Horizon Connection Server
  • Install and configure True SSO in a Horizon environment

Module 15: Workspace ONE Access & Virtual Application Management

  • Recognize the features and benefits of Workspace ONE Access
  • Recognize the Workspace ONE Access console features
  • Explain identity management in Workspace ONE Access
  • Explain access management in Workspace ONE Access
  • Describe the Workspace ONE Access directory integration
  • Describe the Workspace ONE Access directory integration
  • Deploy virtual applications with Workspace services

Module 16: VMware Horizon Performance and Scalability

  • Describe the purpose of a replica connection server
  • Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
  • Describe the 3D rendering options available in Horizon 8
  • List the steps to configure graphics cards for use in a Horizon environment
  • Configure a load balancer for use in a Horizon environment
  • Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
  • Explain Horizon Cloud Pod Architecture scalability options

Module 17: Managing VMware Horizon Security

  • Explain concepts relevant to secure Horizon connections
  • Describe how to restrict Horizon connections.
  • Discuss the benefits of using Unified Access Gateway
  • List the two-factor authentication options that are supported by Unified Access Gateway
  • List Unified Access Gateway firewall rules
  • Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces

target_au

The primary audience for this course is as follows:

  • Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization’s end-user computing infrastructure.

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Use VMware vSphere® Web Client to view the state of virtual machines, datastores, and networks
  • Open a virtual machine console on VMware vCenter Server® and access the guest operating system
  • Create snapshots of virtual machines
  • Configure guest customization specifications
  • Modify virtual machine properties
  • Convert a virtual machine into a template
  • Deploy a virtual machine from a template

Attendees should also have the following Microsoft Windows system administration experience:

  • Configure Active Directory services, including DNS, DHCP, and time synchronization
  • Restrict user activities by implementing Group Policy objects
  • Configure Windows systems to enable Remote Desktop Connections
  • Build an ODBC connection to an SQL Server database

titleENSDA – Deploying Cisco SD-Access
days4
seo_titleENSDA - Deploying Cisco SD-Access Training
seo_dec
seo_tkey
categorysoftware-defined-networking
vendorCisco

techonogyDatacenter & Virtualization
overviewThis advanced, instructor-led, lab-based, hands-on course covers Cisco SD-Access fundamentals, provisioning, policies, wireless integration, border operations, and migration strategies. This 4-day course, Deploying Cisco SD-Access, teaches you how to successfully deploy the Cisco Software-Defined Access (SD-Access) solution in your enterprise network. This advanced, instructor-led, lab-based, hands-on course covers SD-Access fundamentals, provisioning, policies, wireless integration, border operations, and migration strategies. The course also discusses how Cisco SD-Access fits into the Cisco Digital Network Architecture (Cisco DNA).
  • Describe Cisco SD-Access and how it relates to Cisco DNA.
  • Orchestrate a Cisco SD-Access solution using the Cisco DNA Center orchestration platform.
  • Use the Network Data Platform to demonstrate the assurance and analytics capabilities of SD-Access.

objective

Upon successful completion of this course, students will be able to meet these objectives:

  • Gain hands-on practice using SD-Access with lab exercises.
  • Deepen your understanding of the SD-Access solution.
  • Prepare for successful SD-Access deployment.

outline

Cisco SD-Access Overview

  • Exploring Cisco SD-Access
  • Describing the Cisco SD-Access Architecture
  • Exploring Cisco DNA Center
  • Configuring Underlay Automation

Cisco SD-Access Implementation

  • ISE Integration in DNA Center
  • Policy Provisioning Basics
  • Navigating and Managing the Policy Application Workflows

Cisco SD-Access Border Operations

  • Cisco SD-Access Deployment Models
  • Connecting the Fabric to External Domains

Wireless Integration Orchestration

  • Integrating Wireless with the Cisco SD-Access Solution
  • Workflow of Cisco SD-Access Wireless
  • Cisco SD-Access Wireless Network Design
  • Cisco SD-Access Wireless Basic Operation

Cisco SD-Access Assurance and Migration

  • Cisco Network Data Platform
  • Cisco SD-Access Migration Strategies

 

Lab Outline:

  • Validating DNA Center and Underlay Connectivity
  • Configuring the Identity Services Engine
  • Enabling Dynamic Authentication
  • Configuring DNA Center Design
  • Creating SD-Access Policy
  • Provisioning SD-Access Overlay
  • Configuring SD-Access Wireless Integration
  • Configuring Wireless Hosts and Access Points

target_au

The primary audience for this course is as follows:

  • System engineers
  • Network engineers
  • Technical architects
  • Technical support personnel
  • Channel partners and resellers

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • You should have an understanding of network routing and switching principles equivalent to the Cisco CCNA certification level.
  • You should have a basic understanding of ISE and SD-Access.

titleBuilding Web Applications with React and Redux (REACT)
days4
seo_titleBuilding Web Applications with React and Redux (REACT) Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewReact is an open-source JavaScript library from Facebook used for building HTML5 web applications. In this training course, you learn how to develop a complete application by building high-performance User Interfaces (UIs) with JSX components targeting a virtual DOM, and creating Flux applications, which provide complementary architectural patterns to construct client-side application functionality.
objective
  • Create an isomorphic web application using Facebook React and Flux
  • Compose a UI using React JavaScript and JSX components
  • Integrate React forms with Ajax and back-end REST services
  • Apply the Flux application pattern (dispatcher, stores, and actions)
  • Exploit React animation components with CSS3 transitions

outline

Introduction and Overview

  • Features of React and Flux
  • Benefits of the virtual DOM
  • Configuring the development and build environment

Designing Custom React Components

Displaying React content

  • Employing React.createElement() and React.DOM.* factories
  • Rendering the application with ReactDOM.render()
  • Constructing the UI on the server with renderToString()

Leveraging JSX for UI design

  • Coding custom components with React.createClass()
  • Generating component output with the render method
  • Composing a JSX component hierarchy
  • Incorporating third-party components

Activating React Components

Parameterising components

  • Disambiguating component properties and state
  • Inserting properties into rendered output with this.props
  • Passing property values using JSX { } expressions
  • Initialising default values with getDefaultProps()

Manipulating component state

  • Setting starting state values with getInitialState()
  • Reading application data with this.state
  • Mutating data with this.setState()
  • Harnessing React autobinding and event aggregation

Integrating into the component life cycle

  • Attaching and detaching logic and event handlers in componentDidMount and componentWillUnmount
  • Enhancing performance with componentShouldUpdate
  • Responding to changes with componentWillReceiveProps

Developing React Forms

Manipulating form input components

  • Working with interactive properties
  • value
  • defaultValue
  • checked
  • selected
  • Capturing form component updates with onChange
  • Comparing controlled and uncontrolled components

Simulating two-way binding

  • Applying the onChange / setState() convention
  • Employing the LinkedStateMixin
  • Passing ReactLink objects through the props hierarchy

Connecting React to REST services

  • Making Ajax calls from React
  • Mapping CRUD access to REST actions
  • GET
  • POST
  • PUT
  • DELETE

Creating Flux Applications

Modelling client-side data interactivity

  • Identifying Flux participants
  • Actions
  • Dispatcher
  • Stores
  • Views
  • Harnessing unidirectional data flow
  • Comparing Flux to Model View Controller, Redux and Relay

Coding a Flux application

  • Extending the Facebook Dispatcher
  • Utilising Node.js EventEmitter with custom stores
  • Integrating REST access with Flux action creators

Integrating routing into Flux

  • Exploiting the react-router for semantic URLs
  • Mapping URL paths and parameters to components

Analysing React Applications

Developer tools

  • Inspecting React components with browser extensions
  • Identifying and debugging rendering errors

Unit testing

  • Running tests with Jest
  • Simulating event dispatch with ReactTestUtils.Simulate

Performance testing

  • Establishing a baseline
  • Profiling React execution with Perf.start() and stop()
  • Optimising component reconciliation with key

Animating React Applications

  • Including the react-css-transition-group add-on
  • Employing the ReactCS component
  • Writing CSS transitions and animations

target_au
pre_req

Experience developing web pages with JavaScript, HTML, and CSS at the level of:

  • JavaScript for Modern Web Development

titlePython Programming 2 (PYP2)
days3
seo_titlePython Programming 2 Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewThe Python Programming 2 course comprises sessions dealing with advanced object orientation, iterators and generators, comprehensions, decorators, multithreading, functional programming, web services, and unit testing. The delegate will learn how to exploit advanced features of the Python language to build complex and efficient applications. Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
objective

This course aims to provide the delegate with the knowledge to be able to interpret, write, and troubleshoot complex Python applications exploiting inheritance and polymorphism, mixins, composition and aggregation, iterators, generators, decorators, comprehension, concurrency, functional programming, and RESTful web services.

The delegate will learn and acquire skills as follows:

  • Encapsulating classes
  • Exploiting polymorphism using inheritance and mixins
  • Associating objects via composition and aggregation
  • Working with static members
  • Using iterators as an alternative to for
  • Constructing custom iterators
  • Constructing functions that yield generators
  • Manipulating lists, sets, and dictionaries using comprehension
  • Exploiting aspect oriented programming using decorators
  • Writing multithreaded code
  • Sharing data between threads
  • Processing collections using lambdas
  • Building RESTful clients
  • Building RESTful APIs
  • Testing units of code

outline

Day 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: ADVANCED OBJECT ORIENTATION

  • The self Keyword
  • Constructors and Destructors
  • Encapsulation
  • Inheritance
  • Polymorphism
  • Abstract Classes
  • Multiple Inheritance and Mixins
  • Composition and Aggregation
  • Static Members

Session 2: ITERATORS & GENERATORS

  • Iterables
  • Iterators
  • Custom Iterators
  • Generators
  • Yield vs. Return

Session 3: COMPREHENSIONS

  • List Comprehension
  • Set Comprehension
  • The zip Function
  • Dictionary Comprehension

Day 2

Session 4: FUNCTIONAL PROGRAMMING

  • Functional Programming
  • Lambdas
  • Immutability
  • Mapping
  • Filtering
  • Reducing

Session 5: DECORATORS

  • Decorators
  • Decorator Functions
  • Decorator Annotations
  • Decorator Use Cases
  • Labs

Session 6: MULTITHREADING

  • Threads
  • Multithreading
  • Thread Construction
  • Thread Execution
  • Thread Sleep
  • Joins
  • Data Sharing
  • Synchronisation
  • Multithreading vs. Multiprocessing

Day 3

Session 7: WEB SERVICES

  • RESTful Web Services
  • JSON Data
  • CRUD and HTTP
  • RESTful Clients
  • RESTful APIs

Session 8: UNIT TESTING

  • Unit Testing Terminology
  • Test Classes
  • Test Fixtures
  • Test Cases
  • Assertions
  • Test Runners

target_au

The Python Programming 2 course is designed for existing Python developers who have a good grounding in the basics and want to exploit some of the advanced features of the language.

For the delegate for whom Python is their first programming language, we recommend taking the Python Programming 1 (PYP1) course first, then taking some time to practice the skills gained, before returning to take the Python Programming 2 course.


pre_req

Students should be able to build Python applications that exploit all fundamental elements of the language including variables and expressions, conditions and loops, functions, objects, and lists.

This knowledge can be gained by attendance on the pre-requisite Python Programming 1 (PYP1) course.


titlePython Programming 1 (PYP1)
days4
seo_titlePython Programming 1 Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewPython is an object oriented rapid development language deployed in many scenarios in the modern world. This Python Programming 1 course is designed to give delegates the knowledge to develop and maintain Python scripts using the current version (V3) of Python. There are many similarities between Python V2 and Python V3. The skills gained on this course will allow the delegate to develop their own skills further using Python V2 or V3 to support the development and maintenance of scripts. The Python Programming 1 course comprises sessions dealing with syntax, variables and data types, operators and expressions, conditions and loops, functions, objects, collections, modules and packages, strings, pattern matching, dates, exception handling, files, and databases. Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
objective

This course aims to provide the delegate with the knowledge to be able to produce Python scripts and applications that exploit all core elements of the language including variables, expressions, selection and iteration, functions, objects, collections, strings, modules, pattern matching, exception handling, I/O, and classes.

The delegate will learn and acquire skills as follows:

  • Writing and testing simple scripts
  • Representing data using built-in and custom data types
  • Building expressions
  • Building conditional and iterative statements
  • Declaring and calling functions
  • Using objects
  • Creating and manipulating collections including lists, tuples, and dictionaries
  • Creating and manipulating strings
  • Creating modules and packages, and using third-party libraries
  • Pattern matching
  • Working with date and time objects
  • Handling exceptions
  • Reading from and writing to files and databases
  • Coding in an OOP manner

outline

Day 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: GETTING STARTED

  • About Python
  • Python versions
  • Python documentation
  • Python runtimes
  • Installing Python
  • The REPL shell
  • Python editors

Session 2: PYTHON SCRIPTS & SYNTAX

  • Script naming
  • Comments
  • Docstring
  • Statements
  • The backslash
  • Code blocks
  • Whitespace
  • Console IO (to enable the writing of simple programs)
  • A first Python program
  • Script execution

Session 3: VARIABLES & DATA TYPES

  • Literals
  • Identifiers
  • Assignment
  • Numbers (bool, int, float, complex)
  • Binary, octal, and hexadecimal numbers
  • Collections (str, list, tuple, set, dict)
  • None
  • Implicit and explicit type conversion (casting)
  • The type function

Session 4: OPERATORS & EXPRESSIONS

  • Arithmetic Operators
  • Assignment Operators
  • Comparison Operators
  • Logical Operators
  • Membership Operators
  • Bitwise Operators
  • Identity Operators

Session 5: CONDITIONS & LOOPS

  • Conditional statements (if, elif, else)
  • Short hand if/if else
  • Python’s alternative to the ternary operator
  • Iterative statements (while, for, else)
  • The range function
  • Iterating over a list
  • Break
  • Continue
  • Nested conditional/iterative statements

Day 2

Session 6: FUNCTIONS

  • Declaration
  • Invocation
  • Default values for parameters
  • Named arguments
  • args and kwargs
  • Returning multiple values
  • Nested functions
  • Functions as data
  • Introduction to lambda expressions
  • Variable scope
  • The pass keyword

Session 7: OBJECTS AND CLASSES

  • About objects
  • Attributes and the dot notation
  • The dir function
  • Dunder attributes
  • Mutability
  • The id function
  • Pass by reference
  • Introduction to Classes
  • Class Declaration and Instantiation
  • Data attributes
  • Methods
  • Composition

Session 8: LISTS

  • About lists
  • List syntax including slicing
  • Getting and setting list elements
  • Iterating over a list
  • Checking for the presence of a value
  • The len function
  • List methods incl. append, insert, remove, pop, clear, copy, sort, reverse etc.
  • The del keyword
  • Appending to and combining lists
  • List comprehension

Session 9: TUPLES

  • About tuples
  • Tuple syntax
  • Getting tuple elements including unpacking
  • Iterating over a tuple
  • Checking for the presence of a value
  • The len function
  • Appending to and combining tuples

Session 10: SETS

  • About Sets
  • Dictionary syntax
  • Creating, adding and removing set elements
  • Iterating over a set
  • Membership Testing
  • Sorting
  • Copying
  • Set methods incl. union, intersection, difference, symmetric_difference etc.

Day 3

Session 11: DICTIONARIES

  • About dictionaries
  • Dictionary syntax
  • Getting and setting dictionary elements
  • Iterating over a dictionary (keys, values, and items)
  • Checking for the presence of a key
  • The len function
  • Dictionary methods incl. keys, values, items, get, pop, popitem, clear etc.
  • The del keyword
  • Dictionary comprehension

Session 12: STRINGS

  • About strings
  • String syntax including slicing
  • Escape characters
  • Triple-quoted strings
  • Concatenation
  • Placeholders
  • The format method
  • Other methods e.g. endswith, find, join, lower, replace, split, startswith, strip, upper etc.
  • A string as a list of bytes

Session 13: MODULES & PACKAGES

  • About modules
  • The module search path
  • Importing modules
  • Namespaces
  • Importing module objects
  • The import wildcard
  • Aliases
  • Importing within a function
  • Executable modules
  • Reloading a module
  • About packages
  • Importing packaged modules
  • Importing packaged module objects
  • Package initialisation
  • Subpackages
  • Referencing objects in sibling packages
  • The Standard Library
  • Installing modules and packages using pip

Session 14: PATTERN MATCHING

  • About regular expressions
  • Regular expression special characters
  • Raw strings
  • About the re module
  • re module functions incl. match, search, findall, full match, split, sub

Day 4

Session 15: DATES

  • About the datetime module
  • datetime object attributes
  • Creating a datetime object
  • Date arithmetic
  • Formatting dates

Session 16: EXCEPTION HANDLING

  • About exceptions and exception handling
  • Handling exceptions (try, except, else, finally)
  • Exception types
  • The exception object
  • Raising exceptions
  • Custom exception types

Session 17: FILES & THE FILESYSTEM

  • The open function
  • Methods for seeking (seekable, seek)
  • Methods for reading from a file (readable, read, readline, readlines)
  • Iterating over a file
  • Methods for writing to a file (writable, write, writelines)
  • Introduction to context managers
  • File parsing for files of type CSV, XML, JSON, YAML
  • About the os module
  • os module functions incl. getcwd, listdir, mkdir, chdir, remove, rmdir etc.
  • Session 18: DATABASES
  • The DB-API
  • DP-API implementations
  • Establishing a connection
  • Creating a cursor
  • Executing a query
  • Fetching results
  • Transactions
  • Inserting, updating, and deleting records

target_au

The Python Programming 1 course is aimed at anyone who wants to learn Python as a first language, and developers/engineers who want to migrate to Python from another language, particularly those with little or no object-oriented knowledge.


pre_req

Students attending this course should be able to define general programming concepts including compilation and execution, variables, arrays, sequence, selection and iteration, navigate the filesystem (on the command line ideally), edit and save text files and browse the web.


titleIntroduction to Python Certification Training
days4
seo_titleIntroduction to Python Certification Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overview55284A Python instructional class, understudies provides knowledge on how to program in Python. The course is gone for understudies new to the language who could conceivably have involvement in other programming dialects. This Python course is shown utilizing Python 3; be that as it may, contrasts between Python 2 and Python 3 are noted. For private Python classes, our educator can concentrate explicitly on Python 2 whenever wanted.
objective

After completion of this course, you will learn how to :

  • Understand how Python functions and what it’s useful for
  • Understand Python’s place in the realm of programming dialects
  • Work with and control strings in Python
  • Perform math tasks with Python
  • Work with Python arrangements: records, clusters, word references, and sets
  • Collect client info and yield results
  • Perform stream control preparing in Python
  • Write to and read from records utilizing Python
  • Write works in Python
  • Handle special cases in Python
  • Work with dates and times in Python

outline

Module 1: Python Basics

  • Running Python
  • Hello, World!
  • Literals
  • Python Comments
  • Variables
  • WRiting a Python Module
  • print Function
  • Collecting User Input
  • Getting Help
  • Lab : Exercises in this Lesson
  • Hello, World
  • Exploring Types
  • A Simple Python Script

Module 2: Functions and Modules

  • Defining Functions
  • Variable Scope
  • Global Variables
  • Function Parameters
  • Returning Values
  • Importing Modules
  • Lab : Exercises in this Lesson
  • A Function with Parameters
  • Parameters with Default Values

 

Module 3: Math

  • Arithmetic Operators
  • Assignment Operators
  • Built-in Math Functions
  • The math Module
  • The randon Module
  • Lab : Exercises in this Lesson
  • Floor and Modulus
  • How Many Pizzas Do We Need

Module 4: Python Strings

  • Quotation Marks and Special Characters
  • String Indexing
  • Slicing Strings
  • Concatentaion and Repetition
  • Common String Methods
  • String Formatting
  • Formatted String Literals (f-strings)
  • Built-in String Functions
  • Lab : Exercises in this Lesson
  • Indexing Strings
  • Slicing Strings
  • Repetition
  • Playing with Formatting
  • Getting Acquainted with f-strings
  • Outputting Tab-delimited Text

Module 5: Iterables: Sequences, Dictionaries, and Sets

  • Definitions
  • Sequences
  • Unpacking Sequences
  • Dictionaries
  • The len Function
  • Sets
  • *args and **kwargs
  • Lab : Exercises in this Lesson
  • Remove and Return Random Element
  • Simple Rock, Paper, Scissors Game
  • Slicing Sequences
  • Creating a Dictionary from User Input

Module 6: Flow Control

  • Conditional Statements
  • Loops in Python
  • break and continue
  • The enumerate() Function
  • Generators
  • List Comprehensions
  • Lab : Exercises in this Lesson
  • All True and Any True
  • Word Guessing Game
  • Find the Needle
  • Rolling Dice

Module 7: Virtual Environments

  • Virtual Environmen
  • Lab : Exercises in this Lesson
  • Working with a Virtual Environment

Module 8: Regular Expressions

  • Regular Expression Syntax
  • Python’s Handling of Regular Expressions

Module 9: Unicode and Encoding

  • Bits and Bytes
  • Hexadecimal Numbers
  • Encoding
  • Lab : Exercises in this Lesson
  • Converting Numbers between Number Systems
  • Finding Confusables

Module 10: File Processing

  • Opening Files
  • The os and os.path Modules
  • Lab : Exercises in this Lesson
  • Finding Text in a File
  • Writing to FilesList CreatorAfter completing this module, students will be able to:Read files on the operating system.
  • Create and write to files on the operating system.
  • Access and work with directories on the operating system.
  • Work with the os and os.path modules.

Module 11: Handling

  • Wildcard except Clauses
  • Getting Information on Exceptions
  • The else Clause
  • The finally Clause
  • Using Exceptions for Flow Control
  • Raising your Own Exceptions
  • Exception Hierarchy
  • Lab : Excercises in this Lesson
  • Raising Exceptions
  • Running Sum

Module 12: Python Dates and Times

  • Understanding Time
  • The time Module
  • The datetime Module
  • Lab : Exercises in this Lesson
  • Report on Amtrack Departure Times

Module 13: Running Python Scripts from the Command Line

  • sys.arg
  • sys.path
  • Lab : Exercises in this Lesson
  • Migrating Settings by using Windows Easy Transfer
  • Configuring a Reference Image of Windows 7
  • Configuring a Reference Image

target_au

This course is planned for understudies who need to learn Python. Some programming experience is useful yet not required.


pre_req
  • Some programming experience is useful, yet not required.

titleBeginning Frontend Development with React
days1
seo_title
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewThis is a 1 day course packed with the perfect balance of theory and hands-on activities that will help you get started with React. React is widely used to create fast and reusable user interface components. It has been remarkably successful in recent years, since it is easy to use and offers a coherent design model. React's ease of use depends on an actual understanding of the core concepts of the library. By exploiting these concepts, you can build a high-quality design interface. You'll find helpful tips and tricks, as well as useful self-assessment material, exercises, and activities to help benchmark your progress and reinforce what you’ve learned.
objective
  • Create components and combine them together to build other components
  • Use JSX declaratives to describe how a component should look
  • Manage a component’s internal state
  • Manage interaction events
  • Exploit component lifecycle events
  • Manage navigation between high-level components
  • Design user interfaces by making the most of React’s features

outline

Lesson 1: Introducing React and UI Design

  • What is React?
  • How to Set Up a React-Based Application
  • How to Design a UI

Lesson 2: Creating Components

  • Definition of a Component
  • Using JSX
  • Composing Components
  • Data Propagation
  • Managing the Internal State

Lesson 3: Managing User Interactivity

  • Managing User Interaction
  • Component Lifecycle Events

Managing Routing


target_au
pre_req

Hardware

For successful completion of this course, students will require computer systems with the following:

  • Processor: Pentium 4 (or equivalent)
  • 2 GB RAM
  • Hard disk space: 10 GB
  • A projecting device (for the instructor only)
  • An Internet Connection

A keyboard and mouse or other pointing device

Software

  • Operating System: Windows 10 version, 1507
  • The latest version of Node.js (https://nodejs.org/en/)
  • The latest version of Chrome or the penultimate version

titleDeploy and Manage Citrix ADC 13.x with Traffic Management
days5
seo_titleDeploy and Manage Citrix ADC 13.x with Traffic Management Training
seo_dec
seo_tkey
categorynetworking
vendorCitrix

techonogyEnterprise Networking
overviewBuild your Citrix ADC knowledge and skills by enrolling in this five days course. It covers Citrix ADC essentials-- platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB). You will learn about key ADC capabilities such as high availability, security and performance, and explore SSL offload, load balancing and monitoring. The traffic management curriculum will cover the AppExpert policy engine, the Rewrite and Responder features, and Content Switching.
objective
  • Understand the functionalities and capabilities of Citrix ADC
  • How to obtain, install, and manage Citrix ADC licenses
  • Comprehend basic ADC network architecture
  • Understand how SSL is used to secure Citrix ADC
  • Optimize the ADC system for traffic handling and management

outline

Module 1: Getting Started

  • Introduction to Citrix ADC
  • Feature and Platform Overview
  • Deployment Options
  • Architectural Overview
  • Setup and Management

Module 2: Basic Networking

  • Networking Topology
  • Citrix ADC Components
  • Routing
  • Access Control Lists

Module 3: ADC Platforms

  • Citrix ADC MPX
  • Citrix ADC VPX
  • Citrix ADC CPX
  • Citrix ADC SDX
  • Citrix ADC BLX

Module 4: High Availability

  • Citrix ADC High Availability
  • High Availability Configuration
  • Managing High Availability
  • In Service Software Upgrade
  • Troubleshooting High Availability

Module 5: Load balancing

  • Load Balancing Overview
  • Load Balancing Methods and Monitors
  • Load Balancing Traffic Types
  • Load Balancing Protection
  • Priority Load Balancing
  • Load Balancing Troubleshooting

Module 6: SSL Offloading

  • SSL Overview
  • SSL Configuration
  • SSL Offload
  • Troubleshooting SSL Offload
  • SSL Vulnerabilities and Protections

Module 7: Security

  • Authentication, Authorization, and Auditing
  • Configuring External Authentication
  • Admin Partitions

Module 8: Security

  • Citrix ADC Logging
  • Monitoring with SNMP
  • Reporting and Diagnostics
  • AppFlow Functions
  • Citrix Application Delivery Management
  • Troubleshooting

Module 9: Advanced Policies

  • Default Policy Overview
  • Default Expression Syntax
  • Policy Bindings
  • AppExpert Additional Features

Module 10: Rewrite Responder URL Transformation

  • Rewrite Policies
  • Responder Policies
  • DNS Rewrite and Responder
  • URL Transformation

Module 11: Content Switching

  • Content Switching Overview
  • Content Switching Configuration

Module 12: Optimization

  • Citrix ADC Optimization Overview
  • HTTP Compression
  • Integrated Caching
  • Front-End Optimization

Module 13: Global Server Load Balancing

  • GSLB Overview
  • GSLB Architecture
  • Content-Switching GSLB
  • GSLB MEP and Monitoring
  • Customizing GSLB

target_au

Built for IT Professionals working with Citrix ADC, with little to no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to implement and manage Citrix ADC features using leading practices.


pre_req

This course requires little to no previous experience with Citrix ADC; however, Citrix recommends a basic understanding of of TCP/IP, HTTP, and of the OSI model, network devices, and networking protocols.


titleDCITET Implementing Cisco Tetration Analytics
days3
seo_titleDCITET Implementing Cisco Tetration Analytics Training
seo_dec
seo_tkey
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Tetration Analytics (DCITET) course shows you how to deploy, use, and operate Cisco® Tetration Analytics™ platform for comprehensive workload-protection and application and network insights across a multicloud infrastructure. Through expert instruction, use cases, and hands-on labs, you will learn how the Cisco Tetration Analytics platform uses streaming telemetry, behavioral analysis, unsupervised machine learning, analytical intelligence, and big data analytics to deliver pervasive visibility, automated intent-based policy, workload protection, and performance management. You will get hands-on practice in software agent installation, implementing policy, workload security, administration and operational tasks, and more. Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement, and reduce your attack surface. This course will help you:
  • Learn how to implement and use the Cisco Tetration platform to address data center security challenges and provide secure infrastructure for workload protection
  • Learn how Cisco Tetration Analytics integrates into the intent-based network management automation infrastructure using application security policy and other network policies
  • Learn how the Cisco Tetration big data platform analyses data using unsupervised machine learning and behavior analysis to support application, network, and security use cases
  • Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
  • Succeed in today’s demanding data center operations roles

objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Define the Cisco telemetry and analytics approach. Explore common scenarios that Cisco Tetration Analytics can solve.
  • Describe how the Cisco Tetration Analytics platform collects telemetry and other context information. Discuss how relative agents are installed and configured. Explore the operational aspects of the Cisco Tetration Analytics platform.
  • Describe the Cisco Tetration Analytics support for application visibility or application insight based on the Application Dependency Mapping (ADM) feature.
  • List the concepts of the intent-based declarative network management automation model.
  • Describe the Cisco Tetration policy enforcement pipeline, components, functions, and implementation of application policy.
  • Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data.
  • Describe Cisco Tetration Analytics platform use cases in the modern heterogeneous, multicloud data center.
  • List the options for the Cisco Tetration Analytics platform enhancements.
  • Explain how to perform the Cisco Tetration Analytics administration.

outline

Module 1: Exploring Cisco Tetration

  • Data Center Challenges
  • Define and Position Cisco Tetration
  • Cisco Tetration Features
  • Cisco Tetration Architecture
  • Cisco Tetration Deployment Models
  • Cisco Tetration GUI Overview

 

Module 2: Implementing and Operating Cisco Tetration

  • Explore Data Collection
  • Install the Software Agent
  • Install the Hardware Agent
  • Import Context Data
  • Describe Cisco Tetration Operational Concepts

 

Module 3: Examining Cisco Tetration ADM and Application Insight

  • Describe Cisco Tetration Application Insight
  • Perform ADM
  • Interpret ADM Results Application Visibility

 

Module 4: Examining Cisco Tetration Intent-Based Networking

  • Describe Intent-Based Policy
  • Examine Policy Features
  • Implement Policies

 

Module 5: Enforcing Tetration Policy Pipeline and Compliance

  • Examine Policy Enforcement
  • Implement Application Policy
  • Examine Policy Compliance Verification and Simulation

 

Module 6: Examining Tetration Security Use Cases

  • Examine Workload Security
  • Attack Prevention
  • Attack Detection
  • Attack Remediation

 

Module 7: Examining IT Operations Use Cases

  • Key Features and IT Operations Use Cases
  • Performing Operations in Neighborhood App-based Use Cases

 

Module 8: Examining Platform Enhancement Use Cases

  • Integrations and Advanced Features
  • Third-party Integration Examples
  • Explore Data Platform Capabilities

 

Module 9: Exploring Cisco Tetration Analytics Administration

  • Examine User Authentication and Authorization
  • Examine Cluster Management
  • Configure Alerts and Syslog

target_au
pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Knowledge of cloud and (virtual) data center architecture or cloud basic networking concepts
  • Familiarity with Cisco basic networking security concepts and application security concepts
  • Familiarity with basic Cisco telemetry protocols and Big Data analytics
  • Familiarity with basic Cisco data analytics pipelines, intelligent algorithms, tools, and concepts

titleSDAISE Software Defined Access & ISE Integration for Policy Deployment & Enforcement
days3
seo_titleSDAISE Software Defined Access & ISE Integration for Policy Deployment & Enforcement Training
seo_dec
seo_tkey
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewSD-Access is Cisco’s Next Generation campus networking solution that simplifies management, automation, and improves security implications. Who (People), what (Devices), when (Time) and where (Location) are questions we would like answered when working with users and devices! These questions are answered within a single pane of glass known as the Cisco Identity Services Engine (ISE). Once users and devices are identified we often segment these groups for management purposes. Cisco's Digital Networks Architecture Center (DNAC) is a means of configuring and maintaining that segmentation using software defined access. DNA Center is not limited to configuration changes. DNA Center also provides a policy-based approach to services that support the network such as NTP, DNS, DHCP. In this course, you integrate ISE and DNAC which gives you the ability to manage physical devices, logical segmentation, IP, transport rules as well as Authentication, Authorization and Accounting (AAA) of users and devices along with an overview and introduction to SD-Access and DNA Center.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Explain the role that ISE plays as part of the solution
  • Configure AAA services and TrustSec Policy in ISE
  • Explain ISE Integration with DNA Center for Policy enforcement
  • Know and understand Cisco’s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today’s networks.
  • Differentiate and explain each of the building blocks of SD-Access Solution
  • Explain the concept of “Fabric” and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)
  • Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access Solution
  • Understand TrustSec concepts, deployment details and the way it is used as part of SD-Access Solution for segmentation and Policy Enforcement
  • Understand the role of DNA Center as solution orchestrator and Intelligent GUI
  • Be familiar with workflow approach in DNA Center – Design, Policy, Provision and Assurance

outline

Module 1: Cisco ISE Integration for SD Access

  • Introduction to Cisco ISE
  • Using Cisco ISE as a Network Access Policy Engine
  • Introducing Cisco ISE Deployment Models
  • Introducing 802.1x and MAB Access: Wired and Wireless
  • Introducing Identity Management
  • Configuring Certificate Service
  • Introducing Cisco ISE Policy
  • Configuring Cisco ISE Policy Sets
  • Introduction to Cisco TrustSec for segmentation
  • The Concept of Security Group (SG) and Security Group Tag (SGT)
  • Cisco TrustSec Phases
    • Classification
    • Propagation
    • Enforcement
  • Methods for Classification
    • Static Classification
    • Dynamic Classification
  • Methods for SGT tag propagation
    • Inline Tagging
    • SGT Exchange Protocol (SXP)

 

Module 2: Introduction to Cisco’s Software Defined Access (SD-Access)

  • SD-Access Overview
  • SD-Access Benefits
  • SD-Access Key Concepts
  • SD-Access Main Components
    • Campus Fabric
      • Wired
      • Wireless
    • Nodes
      • Edge
      • Border
      • Control Plane
    • DNA Controller (APIC-EM Controller)
    • Introducing Cisco ISE 2.x px
  • 2-level Hierarchy
    • Macro Level: Virtual Network (VN)
    • Micro Level: Scalable Group (SG)

 

Module 3: DNA Center Workflow

  • DNA Center Refresher
  • Creating Enterprise and Sites Hierarchy
  • Configuring General Network Settings
  • Loading maps into the GUI
  • IP Address Management
  • Software Image Management
  • Network Device Profiles
  • Introduction to Analytics
  • NDP Fundamentals
  • Overview of DNA Assurance

 

Module 4: SD-Access Campus Fabric

  • The concept of Fabric
  • Node types (Breakdown)
  • LISP as protocol for Control Plane
  • VXLAN as protocol for Data Plane

 

Module 5: Campus Fabric External Connectivity for SD-Access

  • Enterprise Sample Topology for SD-Access
  • Role of Border Nodes
  • Types of Border Nodes
    • Border
    • Default Border
  • Single Border vs. Multiple Border Designs
  • Collocated Border and Control Plane Nodes
  • Distributed (separated) Border and Control Plane Nodes

 

Module 6: Implementing WLAN in SD-Access Solution

  • WLAN Integration Strategies in SD-Access Fabric
    • Fabric CUWN
    • SD-Access Wireless (Fabric enabled WLC and AP)
  • SD-Access Wireless Architecture
    • Control Plane: LISP and WLC
    • Data Plane: VXLAN
    • Policy Plane and Segmentation: VN and SGT
  • Sample Design for SD-Access Wireless

 

Lab Outline

  • ISE basic setup and Navigating GUI
  • Configuring TrustSec in ISE
  • Connecting and getting familiar with DNA Center GUI
  • Performing SD-Access Design Step in DNA Center
  • Integrating ISE and DNA Center for Policy Deployment and Enforcement
  • Performing SD-Access Policy Step in DNA Center and ISE
  • Performing SD-Access Provision Step in DNA Center
  • Performing SD-Access Assurance Step in DNA Center
  • Integrating WLAN services through SD-Wireless architecture
  • Integrate ISE with Active Directory
  • Achieving External Connectivity to remote locations through Border Node

target_au

The primary audience for this course is as follows:

  • Anyone interested in knowing about SD-Access
  • Personnel involved in SD-Access Design and Implementation
  • Network Operations team with SD-Access solution

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Knowledge level equivalent to Cisco CCNA Routing & Switching
  • Basic knowledge of Software Defined Networks
  • Basic knowledge of network security including AAA, Access Control and ISE
  • Basic knowledge and experience with Cisco IOS, IOS XE and CLI

titleSDAOTS Cisco Software Defined Access, Use Case Implementation, Ops & Troubleshooting
days5
seo_titleSDAOTS Cisco Software Defined Access, Use Case Implementation, Ops & Troubleshooting Training
seo_dec
seo_tkey
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewThis 5 days training course explores the capabilities of the Cisco Software-Defined Access (SDA) solution. Students will learn how to implement SDA for different solution verticals. It also addresses the details of how to operate and troubleshoot the different capabilities of the underlying solution components.
objective

Upon completing this course, the learner will be able to meet these objectives:   

  • Articulate the value of Cisco SDA Use Cases including, for example: saving operational and management cost to maintain and support ever growing network infrastructure; central security policy to comply to regional or global regulatory requirements and enterprise security policy;  deliver best-in-class services to end-users; leveraging networking insights and trends to optimize business process and workflows. Some real scenarios such as supporting multi-mode collaboration within shared workspaces in life sciences; accelerating the deployment of “pop-up” sites for emergency medical purposes; creating integrated building management solutions; zero-touch day 0 network turn-up of additional sites, rapid response to network threat and vulnerabilities, and similar.
  • Describe the technical capabilities of Cisco DNA Center and how they are applied in SDA Use Cases. This includes the lifecycle stages of network device discovery, assigning network devices to sites, network design options, provisioning, software image management, building a fabric, segmentation design, assurance, application policy, etc.
  • Set up an SDA environment, integrating Cisco Identity Services Engine (ISE) and other solution components as required.
  • Apply troubleshooting methods, processes, tips to resolve implementation and maintenance issues of the following aspects of the technical solution:
  • Device Onboarding, including device discovery, Plug-and-Play and LAN Automation
  • Network design settings, including sites, AAA, SNMP, Syslog, IP address pools, image management, network profiles, and authentication templates
  • Policies for access control, applications and virtual networks
  • Provisioning, including template-based provisioning for day 0 and day N operations
  • Network Segmentation, including the application of Cisco TrustSec security with Scalable Group Tags (SGTs) and Virtual Networks
  • Assurance to monitor network, endpoint, and applications to ensure best user experience
  • Integration of ServiceNow for an integrated IT service management lifecycle
  • Integration of InfoBlox for integrated IPAM

outline

Module 1: Introduction to Cisco’s Software Defined Access (SD-Access)

  • Understanding Cisco Intent-Based Networking
  • Understanding Cisco SDA Use Cases customer’s benefits including business and technical outcomes and capabilities
  • Cisco DNA Center Introduction
  • SD-Access Overview
  • SD-Access Benefits
  • SD-Access Key Concepts
  • SD-Access Main Components
    • Fabric Control Plane Node
    • Fabric Border Node
    • Fabric Edge Node
    • Fabric Wireless LAN Controller and Fabric Enabled Access Points
  • Cisco DNA Center Automation
  • Cisco ISE (Policy)
  • Cisco StealthWatch (Traffic Analysis)
  • DNA Center Assurance

 

Module 2: Deployment and Initial setup for the Cisco DNA-Center

  • Cisco DNA-Center Appliances
  • Cisco DNA-Center Deployment Models
    • Single Node Deployment
    • Clustered Deployment
  • Installation Procedure
  • Initial Setup and Configuration
  • GUI Navigation

 

Module 3: SDA – Design

  • Network design options
  • Sites
  • Creating Enterprise and Sites Hierarchy
  • Configuring General Network Settings
  • Loading maps into the GUI
  • IP Address Management
  • Software Image Management
  • Network Device Profiles
  • AAA
  • SNMP
  • Syslog
  • IP address pools
  • Image management
  • Creating Enterprise and Guest SSIDs
    • Creating the wireless RF Profile
    • Cresting the Guest Portal for the Guest SSIDs
  • Network profiles
  • Authentication templates

 

Module 4: SDA – Policy

  • 2-level Hierarchy
    • Macro Level: Virtual Network (VN)
    • Micro Level: Scalable Group (SG)
  • Policy
    • Policy in SD-Access
    • Access Policy: Authentication and Authorization
    • Access Control Policy
    • Application Policy
    • Extending Policy across domains
    • Preserving Group Metadata across Campus, WAN and DC
    • Enforcing policy in Firewall domains
    • Cross Domain Policies

 

Module 5: SDA – Provision

  • Devices Onboarding
    • Lifecycle stages of network device discovery
    • Discovering Devices
    • Assigning Devices to a site
    • Provisioning device with profiles
    • Plug-and-Play
    • LAN Automation
  • Templates
    • Templates for day 0
    • Templates for day N operations
  • IP Transits
    • How to connect the Fabric Sites to the external network
    • Creating the IP Transit
    • Considerations for a SD-Access Border Node Design
    • BGP Hand-Off Between Border and Fusion
  • Fabric Domains
    • Understanding Fabric Domains and Sites
    • Using Default LAN Fabric Domain
    • Creating Additional Fabric Domains and Sites
  • Adding Nodes
    • Adding Fabric Edge Nodes
    • Adding Control Plane Nodes
    • Adding Border Nodes

 

Module 6: SDA – Assurance

  • Overview of DNA Assurance
  • Cisco DNA Center Assurance- Use Cases Examples
  • Network Health & Device 360
  • Client Health & Client 360
  • Application Health & Application 360
  • Cisco SD- Application Visibility Control (AVC) on DNA-Center
  • Proactive troubleshooting using Sensors

 

Module 7: Cisco SD-Access Distributed Campus Design

  • Introduction to Cisco SD-Access Distributed Campus Design – The Advantage?
  • Fabric Domain vs Fabric Site
  • SD-Access Transits:
    • IP-Based Transit
    • Cisco SD-Access Transit
    • Cisco SD-WAN Transit
  • Deploying the Cisco Distributed Campus with SD-Access Transit
    • Site considerations
    • Internet connectivity considerations
    • Segmentation considerations
    • Role of a Cisco Transit Control Plane
  • Cisco SD-Access Fabric in a Box
    • The need for FiaB
    • Deploying the FiaB

 

Module 8: Cisco SD-Access Brownfield Migration

  • Cisco SD-Access Migration Tools and Strategies
  • Two Basic Approaches:
    • Parallel Deployment Approach
    • Incremental Deployment Approach
  • Integration with existing Cisco ISE in the network – Things to watch out for!
  • Choosing the correct Fusion Device
    • Existing Core as Fusion
    • Firewall as Fusion
  • When do you need the SD-Access Layer-2 Border?
    • L2 Border – Understanding the requirement
    • Designing and Configuring the L2 Border
    • L2 Border – Not a permanent solution

 

Module 9: Cisco DNA Center Automation- Use Cases Examples

  • DAY0: Onboarding new devices using Zero Touch Deployment
  • DAY1: Configurations using Templates
  • DAYN: Security Advisories based on Machine Reasoning Engine
  • DAYN: Simplified Software Management based on Golden Images
  • DAYN: Defective Device Replacement – RMA

 

Module 10: 3rd Party Integrations

  • ServiceNow
    • Integration
    • Management
  • InfoBlox IPAM
    • Integration
    • Management

 

Module 11: Specific Use Cases

  • Use Case:  STACK LAN Automation
  • Use Case:  Silent Hosts
  • Use Case:  Wake on LAN
  • Use Case: The need for L2 flooding
  • Use Case: Multicast in the SD-Access Fabric

 

Module 12: Cisco SD-Access Multi-Domain Integrations

  • Cisco SD-Access to ACI Integrations
    • Phase-1: Policy Plane Integration
    • Phase-2: Data Plane Integration
  • Cisco SD-Access to Cisco SD-WAN Integrations
    • What is possible today? SD-WAN Transit setup.
    • Phase-1: The one box solution
    • Phase-2: The two box solution

 

Module 13: Troubleshooting

  • Fabric
  • Layer 3 forwarding
  • Layer 2 forwarding
  • Multicast Forwarding
  • Security in the Fabric
  • Troubleshooting Multi-Site Deployments

 

Lab Outline:

  • Discovery Lab 1: SDA Fundamentals
  • Discovery Lab 2: Using the DNAC Discovery Tool
  • Discovery Lab 3: Using the DNAC Inventory Tool
  • Discovery Lab 4: ISE and DNAC Integration
  • Discovery Lab 5: Using the DNAC Design Application
  • Discovery Lab 6: Using the DNAC Policy Application
  • Discovery Lab 7: Fabric Provisioning
  • Discovery Lab 8: Wired and Wireless Host and Access Point Onboarding Configuration
  • Discovery Lab 9: Configuring External Connectivity Using Fusion Router
  • Discovery Lab 10: Configuring Cisco ISE Policies for User Onboarding
  • Discovery Lab 11: Onboarding and Provisioning Access Points
  • Discovery Lab 12: Fabric and Segmentation Verification
  • Discovery Lab 13: Layer-2 Border Fundamentals
  • Discovery Lab 14: Configuring a Layer-2 Border  to Extend the Same IP Pool
  • Discovery Lab 15: Transitioning the Traditional User to the SDA Anycast Gateway
  • Discovery Lab 16: Testing IP Connectivity between SDA User and Traditional User
  • Discovery Lab 17: Introduction to SDA Distributed Campus
  • Discovery Lab 18: Configuring an SDA-Transit and the Transit Control Plane (TCP)
  • Discovery Lab 19: Designing a Second Fabric Site
  • Discovery Lab 20: Deploying a Second Fabric Site – Fabric in a Box
  • Discovery Lab 21: Deploying a New Fabric Edge using LAN Automation
  • Discovery Lab 22: Automate Network Devices Using Day-N Template
  • Discovery Lab 23: Add as Edge Node to Fabric Site-2
  • Discovery Lab 24: Host Onboarding at Fabric Site-2
  • Discovery Lab 25: Connecting the two Fabric Sites Using the SDA-Transit
  • Discovery Lab 26: Testing IP Connectivity and Micro-Segmentation between Fabric Site-1 and Fabric Site-2

target_au

The primary audience for this course is as follows:

  • IT management, to understand how to address key business requirements with greater efficiency and flexibility in network service delivery
  • IT solution architects, to understand the role that SDA plays in enabling such efficiency and flexibility for network services in the context of IT solution delivery
  • IT and network security architects, to understand how the integrated capabilities of the SDA solution are used to design and implement network segmentation-based security
  • IT operations engineers, integrating network and application visibility and root cause analysis into integrated IT case handling workflows
  • Networking Admin and Operations installing, integrating, configuring and operating Cisco DNA Center, Cisco Identity Services Engine (ISE), and other solution components, in the context of Cisco SDA based network services
  • Networking Field Engineers using capabilities of Cisco DNA Center to deploy, monitor and maintain network infrastructure for SDA based network services

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Implementation of Enterprise LAN networks
  • Basic understanding of Enterprise switching, and wireless connectivity
  • Basic understanding of Enterprise routing connectivity
  • Basic understanding of AAA (authentication, authorization, and accounting) process and workflow
  • Programming knowledge such as Python, RestAPI is useful

titleVMware Horizon 8: Infrastructure Administration [V8.0]
days2
seo_titleVMware Horizon 8: Infrastructure Administration Training
seo_dec
seo_tkey
categorydesktop-mobility
vendorVMware

techonogyWireless
overviewThis two days, hands-on course gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon® through a combination of lecture and hands-on labs. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Identify Horizon Connection Server installation, architecture, and requirements.
  • Describe the authentication and certification options for a Horizon environment.
  • Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8.
  • Discuss performance and scalability options available in Horizon 8.
  • Describe different security options for the Horizon environment.

outline

Module 1: Course Introduction

  • Introductions and course logistics
  • Course objectives

 

Module 2: Horizon Connection Server

  • Recognize VMware Horizon reference architecture
  • Identify the Horizon Connection Server supported features
  • Identify the recommended system requirements for Horizon Connection Server
  • Configure Horizon event database
  • Outline the steps for the initial configuration of Horizon Connection Server
  • Discuss the ADAM database as a critical component of Horizon Connection Server installation

 

Module 3: VMware Horizon Authentication and Certificates

  • Compare the authentication options that Horizon Connection Server supports
  • Describe the Smartcard authentication options that Horizon Connection Server supports
  • Outline the steps to create a Horizon administrator and custom roles
  • Describe the roles available in a Horizon environment
  • Explain the role that certificates play for Horizon Connection Server
  • Install and configure certificates for Horizon Connection Server
  • Install and configure True SSO in a Horizon environment

 

Module 4: Workspace ONE Access & Virtual Application Management

  • Recognize the features and benefits of Workspace ONE Access
  • Recognize the Workspace ONE Access console features
  • Explain identity management in Workspace ONE Access
  • Explain access management in Workspace ONE Access
  • Describe the Workspace ONE Access directory integration
  • Describe the Workspace ONE Access directory integration
  • Deploy virtual applications with Workspace services

 

Module 5: VMware Horizon Performance and Scalability

  • Describe the purpose of a replica connection server
  • Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
  • Describe the 3D rendering options available in Horizon 8
  • List the steps to configure graphics cards for use in a Horizon environment
  • Configure a load balancer for use in a Horizon environment
  • Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
  • Explain Horizon Cloud Pod Architecture scalability options

 

Module 6: Managing VMware Horizon Security

  • Explain concepts relevant to secure Horizon connections
  • Describe how to restrict Horizon connections.
  • Discuss the benefits of using Unified Access Gateway
  • List the two-factor authentication options that are supported by Unified Access Gateway
  • List Unified Access Gateway firewall rules
  • Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces

target_au

The primary audience for this course is as follows:

  • Administrators and architects for VMware Horizon should enroll in this course. These individuals are responsible for the implementation, maintenance, and administration of an organization’s end-user computing infrastructure.

pre_req

For attending this course you should have these VMware infrastructure skills:

  • Use VMware vSphere® Web Client to view the state of virtual machines, datastores, and networks.
  • Open a virtual machine console on VMware vCenter Server® and access the guest operating system.
  • Create snapshots of virtual machines.
  • Configure guest customization specifications.
  • Modify virtual machine properties.
  • Convert a virtual machine into a template.
  • Deploy a virtual machine from a template.

 

Students should also have the following Microsoft Windows system administration experience:

  • Configure Active Directory services, including DNS, DHCP, and time synchronization.
  • Restrict user activities by implementing Group Policy objects.
  • Configure Windows systems to enable Remote Desktop Connections.
  • Build an ODBC connection to an SQL Server database.

titlePython NETPYA: Network Automation with Python and Ansible
days4
seo_titlePython NETPYA: Network Automation with Python and Ansible Training
seo_dec
seo_tkey
categorynetworking
vendorCisco

techonogyEnterprise Networking
overviewThis course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day’s topics and demonstrations. Class is appropriate for those interested in automation, specifically network automation, and those looking to marry a Python and Ansible skillset.
objective
outline

Critical Python Catchup & Review

  • Overview of Python and Ansible
  • Python white space rules & best practices
  • Printing and more Printing
  • Date types and Variables
  • Packing and Unpacking Variables
  • f Strings
  • Conditional expressions
  • Relational and Boolean operators
  • Lists, Tuples, Dictionaries
  • Indexing and slicing
  • Built-in functions
  • Iterating with Loops (for and while)
  • Working with files
  • Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.)
  • Using Python to access REST interfaces
  • Working with JSON
  • Python, Ansible and Paramiko
  • Using Paramiko to SSH with keys and passwords
  • RESTful API review
  • API keys
  • Paramiko Review
  • Using Paramiko to SFTP with keys and passwords

 

Python and Network Automation

  • Introduction to Netmiko (automating routers and switches)
  • Using Netmiko to send commands to / from network devices
  • Working with YAML
  • Converting JSON to YAML with Python
  • Ansible keywords
  • YAML and JSON for data exchange
  • Ansible and YAML
  • Ansible Playbook components
  • Tying together Python and Ansible – Using Python within Ansible
  • Ansible Network Modules
  • What is new in Ansible (most current updates / release notes)
  • Network Agnostic modules
  • Writing network playbooks
  • Reviewing the construction of network playbooks
  • Writing Ansible playbooks that respond to network failures

 

Blending Python and Ansible Skillsets

  • Review how to use Python within Ansible
  • Calling Python scripts with Ansible
  • Jinja2 Templating Engine for Python (and Ansible)
  • Using Templates in Ansible playbooks
  • Jinja2 filters, looping, and other useful tricks for automating with Ansible
  • Playbook tagging for selective runs
  • When to use Python and when to use Ansible
  • “Big Picture” options for using Python & Ansible within your Network
  • Ansible Roles

 

Customizing Ansible with Python

  • Review – Running Scripts with Ansible
  • Prompting for Ansible user input
  • Ansible Galaxy & Getting at Roles
  • Writing a custom Ansible Module with Python
  • Ansible “Engine” vs Ansible “Tower” – marketing hype, capabilities, costs, etc.
  • Case Study: Automate your Enterprise Network
  • When to use Python and when to use Ansible
  • Writing your own Ansible modules in Python
  • “Big Picture” options for using Python & Ansible within your Network
  • Overview – NETCONF / YANG and what they mean for Python and Ansible
  • Molecule – Testing your roles

 

Lab Outline

  • Lab 0 – Setting up the Admin PC for Development
  • Lab 1 – Build your First Python Script
  • Lab 2 – More Python
  • Lab 3 – Strings in Python
  • Lab 4 – Using argv
  • Lab 5 – Lists and Dictionaries
  • Lab 6 – Loops and if-else
  • Lab 7 – Defining a Function
  • Lab 8 – Using Python Scripting and the REST API
  • Lab 9 – Telnetib (Optional)
  • Lab 10 – Paramiko
  • Lab 11 – Netmiko
  • Lab 12 – Ansible Installation
  • Lab 13 – Verify the Ansible Installation
  • Lab 14 – CSRX-1 SSH Connectivity
  • Lab 15 – Cisco IOS Show Command Execution with Ansible
  • Lab 16 – Configuration Changes with Ansible
  • Lab 17 – Create a Custom Module for Ansible
  • Lab 18 – Installing and Using a Role from Galaxy
  • Lab 19 – Ansible and Jinja2 Templating
  • Lab 20 – Integrating Template Instantiation and Device Synchronization into a Playbook

target_au

The primary audience for this course is as follows:

  • Network Administrators
  • Administrators interested in Automation
  • Individuals interested in devops, specifically for networking

pre_req
titleADMUMB v2.0: Administering and Positioning Cisco Umbrella Operations
days3
seo_titleADMUMB v2.0: Administering and Positioning Cisco Umbrella Operations Training
seo_dec
seo_tkey
categorycloud-management
vendorCisco

techonogyCloud Computing
overviewCisco Umbrella is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella works and what are the features is the key focus of this 3 days Cisco online IT class. Students who enter the course with a basic understanding of Cisco products and IT solutions will be able to describe the Cisco Umbrella, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco Roaming Client.
objective

Upon successful completion of this course, the learner will gain the following knowledge:

  • How to describe and position Cisco Umbrella
  • Discuss Secure Internet Gateway and Ransomware Protection
  • Learn about DNS & IP layer enforcement & Intelligent Proxy
  • Describe Command and control callback blocking
  • Discuss Threat Intelligence
  • Compare Umbrella Packages
  • Understand Roaming Security
  • Basic understanding of Cisco Roaming Client
  • Understand how to use Cisco Umbrella Virtual Appliance
  • Explain the ease of Integrating Cisco Umbrella into Active Directory
  • Discuss Umbrella Reporting
  • Understand Utilize Multi-Organization Tools

outline

Module 1: Describe Cisco Umbrella

  • Umbrella and Available Features Overview

 

Module 2: Umbrella Deployment Options

  • DHCP
  • DNS Server
  • Roaming Client

 

Module 3: Configure Policy Components  – Part 1

  • Destination Lists
  • Content Categories
  • Application Settings
  • Tenant Controls
  • Security Settings

 

Module 4: Configure Policy Components  – Part 2

  • Block Page Appearance
  • Integrations
  • Selective Decryption Lists
  • Bypass Users
  • Bypass Codes

 

Module 5: Umbrella Policies-DNS, Firewall and Web

  • DNS Policies
  • Firewall Policies
  • Web Policies

 

Module 6: Integrating Umbrella with Active Directory

  • AD Connector and Script
  • Virtual Appliance
  • Roaming Client
  • AnyConnect Roaming Security

 

Module 7: Umbrella Roaming Security – Roaming Client

Module 8: Umbrella Roaming Security – AnyConnect Roaming Security

Module 9: Cisco Umbrella DNS Mobile Security

  • MDM Integration
  • IOS Devices
  • Android Devices

 

Module 10: User Account Management

  • Local Accounts
  • User Roles

 

Module 11: Umbrella Reporting

  • Core Reports
  • Additional Reports
  • Management Reports

 

Module 12: Umbrella Investigate

Module 13: Umbrella Multi-Organization

Module 14: Integrating Umbrella within Cisco SecureX

Lab Outline:

  • Lab 0: Accessing the Lab Devices
  • Lab 1: Deploying Cisco Umbrella
  • Lab 2: Configuring Policy Components
  • Lab 3: Configuring Umbrella DNS Policy
  • Lab 4: Configuring Umbrella Firewall Policy
  • Lab 5: Configuring Umbrella Web Policy
  • Lab 6: Active Directory Integration using the Virtual Appliance
  • Lab 7: Deploying Umbrella Roaming Client
  • Lab 8: Deploying AnyConnect Roaming Security
  • Lab 9: Umbrella User Account and Roles Management
  • Lab 10: Umbrella Reporting
  • Lab 11: Leveraging Umbrella Investigate
  • Lab 12: SecureX Integration walk-though

target_au
pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic understanding of Cisco products and solutions

titleCLCNF 1.0 – Implementing Cisco Collaboration Conferencing
days5
seo_titleCLCNF 1.0 - Implementing Cisco Collaboration Conferencing Training
seo_dec
seo_tkey
categoryunified-communications
vendorCisco

techonogyCollaboration
overviewThe Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco® on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.
objective

This class will help you:

  • Learn how to configure and troubleshoot on-premises conferencing solutions with Cisco Meeting Server.
  • Integrate on-premises conferencing solutions with other collaboration components to meet the needs of modern-day workplaces.

After taking this course, you should be able to:

  • Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing
  • Describe the physical deployment options and deployment models for Cisco Meeting Server, including Cisco Meeting Server 1000, 2000, and virtual machine
  • Configure a Cisco Meeting Server single combined deployment for Web-Real Time Communications (WebRTC) endpoints within the enterprise
  • Use APIs and the Cisco Meeting Server API Guide to configure profiles using Postman and the Webadmin API tool
  • Configure a scalable and resilient deployment of Cisco Meeting Server with three servers for WebRTC endpoints within the enterprise
  • Configure a scalable and resilient deployment of Cisco Meeting Server to support standard Session Initiation Protocol (SIP) and WebRTC connectivity outside the enterprise
  • Configure a scalable and resilient deployment of Cisco Meeting Server to support recording and streaming of conferences
  • Configure Cisco Unified Communications Manager and Cisco Meeting Server to support Rendezvous, Scheduled, and Ad-hoc conferencing for Cisco Unified CM registered endpoints
  • Configure Cisco Meeting Server to integrate with a preconfigured on-premise Microsoft Skype for Business installation
  • Install Cisco TelePresence Management Suite (Cisco TMS) and Cisco TelePresence Management Suite for Microsoft Exchange (Cisco TMSXE) on a single Microsoft Windows 2012 server and connect to an existing SQL environment
  • Install and integrate Cisco Meeting Management with Cisco TMS and Cisco Meeting Server
  • Set up and manage a scheduled conference with Cisco TMS and Cisco Meeting Management
  • Capture and analyze logs from Cisco Meeting Server and Cisco Meeting Manager to diagnose faults, including a SIP connection error

outline
  • Describing Cisco Conferencing Architecture
  • Configuring a Single Combined Deployment
  • Installing Cisco Meeting Server
  • Using APIs with Cisco Meeting Server
  • Configuring a Cisco Meeting Server Scalable and Resilient Deployment
  • Configuring Business to Business (B2B) and WebRTC Firewall Traversal Connectivity for Cisco Meeting Server
  • Configuring Recording and Streaming with Cisco Meeting Server
  • Troubleshooting Cisco Meeting Server
  • Integrating Cisco Meeting Server with Cisco Unified CM
  • Integrating Cisco Meeting Server with Microsoft Skype for Business
  • Installing and Operating Cisco TMS and Cisco TMSXE
  • Installing and Integrating Cisco Meeting Management

Lab Practice

  • Cisco Meeting Server Initial Configuration
  • Cisco Meeting Server Single Combined Deployment
  • Install a Cisco Meeting Server Virtual Machine
  • Using Postman with Cisco Meeting Server
  • Using Cisco Meeting Server Webadmin API Tool
  • Cluster Cisco Meeting Server Databases
  • Cluster Cisco Meeting Server Call Bridges
  • Configure Cisco Meeting Server Distributed Spaces and Active Directory
  • Configure Cisco Meeting Server Scalable and Resilient Web Bridges
  • Configure External WebRTC Connectivity for Cisco Meeting Server
  • Configure External B2B Connectivity for Cisco Meeting Server
  • Configure Cisco Meeting Server Recording
  • Capturing Log Files in Cisco Meeting Server
  • Troubleshoot Cisco Meeting Server
  • Configure Cisco Meeting Server Integration with Cisco Unified CM Using a SIP Trunk
  • Configure Cisco Meeting Server Integration with Cisco Unified CM as a Conference Resource
  • Install, Upgrade, and Maintain Cisco TMS and TMSXE
  • Configure Cisco TMS for Scheduled Conferences
  • Manage Endpoints in Cisco TMS Part 1
  • Manage Endpoints in Cisco TMS Part 2
  • Cisco Meeting Management Initial Installation
  • Integrate Cisco Meeting Management
  • Manage Conferences in Cisco TMS and Cisco Meeting Management
  • Specific Lab Issues

target_au
  • Deployment engineer
  • Network engineer
  • Sales engineer

pre_req

o fully benefit from this course, you should have the following knowledge:

  • PC skills
  • Addition and management of devices and users in Cisco Unified CM
  • SIP signaling fundamentals
  • Video endpoint operation and configuration
  • Management of media resources in Cisco Unified CM
  • Familiarity with Cisco Expressway ideal but not required
  • Familiarity with APIs ideal but not required

Recommended Cisco offerings that may help you meet these prerequisites:

  • Cisco Collaboration Fundamentals (CLFNDU)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)

titleVSICM70 – VMware vSphere: Install, Configure, Manage [V7.0]
days5
seo_titleVSICM70 - VMware vSphere: Install, Configure, Manage [V7.0]
seo_decThis course prepares you to administer a vSphere infrastructure for an organization of any size.
seo_tkeyVSICM70
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewVMware vSphere: Install, Configure, Manage [7.0] is a 5-day course which features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 7, which includes VMware ESXi™ 7 and VMware vCenter Server® 7. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most of the other VMware technologies in the software-defined data center. Attendance of this course meets the training requirement to achieve the following certification:
  • VMware Certified Professional – Data Center Virtualization (VCP-DCV)

objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe the software-defined data center (SDDC)
  • Explain the vSphere components and their function in the infrastructure
  • Install and configure VMware ESXi™ hosts
  • Deploy and configure VMware vCenter® Server Appliance™
  • Use VMware vSphere® Client™ to manage the vCenter Server inventory and the vCenter Server configuration
  • Manage, monitor, back up, and protect vCenter Server Appliance
  • Create virtual networks with vSphere standard switches
  • Describe the storage technologies supported by vSphere
  • Configure virtual storage using iSCSI and NFS storage
  • Create and manage VMware vSphere® VMFS datastores
  • Use the vSphere Client to create virtual machines, templates, clones, and snapshots
  • Create a content library and deploy virtual machines from templates in the library
  • Manage virtual machine resource use
  • Migrate virtual machines with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
  • Create and manage a vSphere cluster that is enabled with VMware vSphere® High Availability and VMware vSphere® Distributed Resource Scheduler™
  • Discuss solutions for managing the vSphere life cycle
  • Use VMware vSphere® Update Manager™ to apply patches and perform upgrades to ESXi hosts and virtual machines

outline

Module 1: Course Introduction

  • Introductions and course logistics
  • Course objectives

Module 2: Introduction to vSphere and the Software-Defined Data Center

  • Explain basic virtualization concepts
  • Describe how vSphere fits into the software-defined data center and the cloud infrastructure
  • Explain how vSphere interacts with CPUs, memory, networks, and storage
  • Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts
  • Use VMware Host Client™ to access and manage ESXi host

Module 3: Virtual Machines

  • Create and remove a virtual machine
  • Provision a virtual machine with virtual devices
  • Identify the files that make up a virtual machine
  • Explain the importance of VMware Tools™

Module 4: vCenter Server

  • Describe the vCenter Server architecture
  • Discuss how ESXi hosts communicate with vCenter Server
  • Deploy and configure vCenter Server Appliance
  • Use the vSphere Client to manage the vCenter Server inventory
  • Add data center, organizational objects, and hosts to vCenter Server
  • Use roles and permissions to enable users to access objects in the vCenter Server inventory
  • Back up vCenter Server Appliance
  • Monitor vCenter Server tasks, events, and appliance health
  • Use vCenter Server High Availability to protect a vCenter Server Appliance

Module 5: Configuring and Managing Virtual Networks

  • Create and manage standard switches
  • Describe the virtual switch connection types
  • Configure virtual switch security, traffic-shaping and load-balancing policies
  • Compare vSphere distributed switches and standard switches

Module 6: Configuring and Managing Virtual Storage

  • Identify storage protocols and storage device types
  • Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
  • Create and manage VMFS and NFS datastores
  • Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage
  • Deploy virtual machines on a VMware vSAN™ datastore

Module 7: Virtual Machine Management

  • Use templates and cloning to deploy new virtual machines
  • Modify and manage virtual machines
  • Create a content library and deploy virtual machines from templates in the library
  • Dynamically increase the size of a virtual disk
  • Use customization specification files to customize a new virtual machine
  • Perform vSphere vMotion and vSphere Storage vMotion migrations
  • Create and manage virtual machine snapshots
  • Examine the features and functions of VMware vSphere® Replication™

Module 8: Resource Management and Monitoring

  • Discuss CPU and memory concepts in a virtualized environment
  • Describe what overcommitment of a resource means
  • Describe methods for optimizing CPU and memory usage
  • Use various tools to monitor resource use
  • Create and use alarms to report certain conditions or events

Module 9: vSphere Clusters

  • Describe options for making a vSphere environment highly available

target_au

The primary audience for this course is as follows:

  • System administrators
  • System engineers

pre_req

The knowledge and skills that a learner should have before attending this course are
as follows:

  • System administration experience on Microsoft Windows or Linux operating systems

titleACUCM/AUC – Administering Cisco Unified Communications Manager and Unity Connection v12.x
days5
seo_titleACUCM/AUC - Administering Cisco Unified Communications Manager and Unity Connection v12.x
seo_dec
seo_tkeyACUCM
categorynetworking
vendorCisco

techonogyEnterprise Networking
overview

Administering Cisco Unified Communications Manager (ACUCM with AUC) is a 5-day training program that provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. This course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration.

This is an entry-level course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network. This UC training course focuses on Cisco Unified Communications Manager v12 x. All labs are using CUCM v12.x.

This online Cisco IT class includes various lab exercises to apply what was learned in each preceding lesson. Labs begin with a newly installed publisher and subscriber. The only element that is preconfigured is two MGCP gateways, for the headquarters (HQ) and branch (BR), and an intercluster trunk pointing to the neighbor’s pod. Therefore, the student will become familiar with all the various concepts through configuration of the elements in the lab environment.

Our online Cisco training course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments. The course does not cover issues of initial deployment, new cluster deployment or international deployments. Also, the course does not cover issues with the underlying network that involve routers, switches, or Cisco IOS software configuration.

Administering Cisco Unity Connection (AUC) describes Cisco Unity Connection administration features, options, and configuration settings as they apply to the administrator. The course presents Cisco Unity Connection with the focused goal of providing the administrators with the necessary skills to perform their day-to-day job functions using the Cisco Unity Connection system.

Students that require skills beyond administration where engineering, integration, and networking skills are required should consider the Implementing Cisco Unity Connection (IUC) course.


objective

Upon completion of this course, students will be able to:

  • Describe the Cisco Unified Communications Manager network, service, and features
  • Understand the importance of and configuration of redundancy and high availability in the enterprise network
  • Describe user configuration and the user web interface
  • Explain basic phone options and the use of BAT
  • Explain the route plan and on-net/off-net calling
  • Describe the various media resources, including conferencing and MOH
  • Describe the basic phone features and use of hunt groups
  • Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system
  • Describe the components that are required for user call processing by Cisco Unity Connection
  • Implement the various features and options that are available to users in Cisco Unity Connection
  • Use the various applications, tools, and reports that are available in Cisco Unity Connection

outline

ACUCM Course Outline:

Module 1: Introduction to IP Telephony

  • Lesson 1: Exploring IP Telephony

    • Traditional Voice versus IP Telephony
    • Clustering Overview
    • Intracluster Communications
    • Traditional Voice versus IP Telephony
    • Clustering Overview
    • Intracluster Communications
  • Lesson 2: Describing Deployment Models

    • Single-Site Deployment
    • Centralized Call-Processing Deployment
    • Distributed Call-Processing Deployment
    • Distributed Single-Cluster Call-Processing Deployment
    • Hybrid Call-Processing Deployment
    • New Advanced Multicluster Options
  • Lesson 3: Understanding Advanced Multisite Features

    • Need for CAC
    • Deploying AAR
    • Survivable Remote Site Telephony
    • SRST Failover

Module 2: Defining the Basic Configuration

  • Lesson 1: Logging In to Cisco Unified Communications Manager

    • Logging In to Cisco Unified CM Administration and Cisco Unified Serviceability
    • Logging In to Cisco Unified Operating System Administration and the DRS
    • Navigation Menu
    • Command-Line Interface
  • Lesson 2: Examining Basic Server Configuration

    • Server Configuration—Eliminating DNS Reliance
    • Configuring Enterprise Parameters
  • Lesson 3: Describing Multilevel Administration

    • Configuring Multilevel Administration
    • Creating End Users
    • Creating Roles
    • Creating User Groups
  • Lesson 4: Configuring DRS Backup and Restore Procedures

    • DRS Backup Procedures
    • DRS Restore Procedures

Module 3: User Administration

  • Lesson 1: Understanding User Configuration

    • Understanding User Management
    • Configuring Users
  • Lesson 2: Using the User Web Pages

    • Understanding the User Web Pages
    • Using the User Web Pages

Module 4: Exploring Phone Registration and Cisco Unified IP Phones

  • Lesson 1: Configuring System Parameters

    • Cisco Unified CM Configuration
    • Cisco Unified Communications Manager Group Configuration
    • Phone NTP Configuration
    • Date/Time Group
    • Codecs and Regions Location Configuration
    • Device Pool Configuration
    • DHCP Service Configuration
    • Device Defaults Configuration
    • Clusterwide Parameters
    • Licensing
  • Lesson 2: Supporting Cisco Unified IP Phones

    • Cisco Unified IP Phones Overview
    • Specialized Cisco Unified IP 7900 Series Phones
    • Phone Button Templates
    • Softkey Templates
  • Lesson 3: Exploring Phone Registration and IP Phone Communications

    • Cisco Unified IP Phone Registration
    • Cisco Unified IP Phone Configuration
  • Lesson 4: Utilizing the Bulk Administration Tool (BAT)

    • Overview of Cisco Unified Communications Manager BAT
    • Cisco Unified Communications Manager TAPS

Module 5: Basic Route Plan Configuration

  • Lesson 1: Implementing Dial Plan Connectivity

    • Organizational Dial Plan
    • Trunks
    • Gateways
  • Lesson 2: Creating Route Plans

    • Dial Plan Overview
    • Route Pattern Overview
    • Digit Collection
    • Call Routing

Module 6: Route Filters and Digit Manipulation

  • Lesson 1: Configuring Translation Patterns and Route Filters

    • Translation Patterns
    • The 9.@ Pattern
    • Route Filters
  • Lesson 2: Implementing Digit Manipulation

    • Discard Digits Instruction
    • Transformation Masks

Module 7: Class of Control

  • Lesson 1: Defining Class of Control

    • Overview of Class of Control
    • Partitions
    • CSS Configuration
    • PLAR Application
  • Lesson 2: Using Class of Control Features

    • Call Restriction
    • Time of Day Routing
    • Traditional vs. Line/Device Approach

Module 8: Understanding Media Resources

  • Lesson 1: Defining Media Resources

    • Overview of Media Resources
    • Conference Bridge
    • Media Termination Points
    • Transcoder
    • Music on Hold
    • Annunciator
  • Lesson 2: Exploring Media Resource Management

    • MRG Management
    • Configuring MRGs
    • Configuring MRGLs

Module 9: Features and Services

  • Lesson 1: Describing Basic Features

    • Call Park
    • Call Pickup
    • Cisco Call Back
    • Shared Lines with Barge and Privacy
  • Lesson 2: Exploring Hunt Groups

    • Hunt Group Overview
    • Line Group Configuration
    • Hunt List Configuration
    • Hunt Pilot Configuration
    • Final Forwarding
  • Lesson 3: Describing Phone Services

    • Cisco IP Phone Services
    • Cisco Phone Services Configuration

AUC Course Outline

Module 1: Introduction to Cisco Unity Connection

  • Lesson 1: Overview of Cisco Unity Connection

    • Understanding Cisco Unity Connection
    • Cisco Unity Connection Integration
    • Active-Active, High-Availability Deployment
    • Digital Networking Deployment Model
  • Lesson 2: Navigating Cisco Unity Connection

    • Accessing Cisco Unity Connection
    • Logging into Cisco Unity Connection Applications
    • Cisco Unified Serviceability and Cisco Unity Connection Serviceability
    • Cisco Unity Connection Administration
    • Port Configuration for Telephony Integration
    • General Configuration
  • Lesson 3: Understanding Call Handlers, Users, and Call Flow

    • Call Processing
    • Default Call Handlers
    • Handlers—Function and Purpose
    • Default Call Handler Flow
    • Call Handler Configuration
    • Incoming Call Flows
    • Cisco Unity Connection Incoming Call Flow
    • Message Retrieval
    • Incoming Call Processing Components
    • Call Routing—Direct or Forwarded
    • Call Routing—Direct
    • Call Routing—Forwarded
    • Configuration of Users
    • Implementation of Call Routing
    • Implementation of Call Routing—Direct
    • Implementation of Call Routing—Forwarded
    • Directory Handlers
    • Directory Handlers Configuration
    • Interview Handlers
    • Interview Handlers Configuration

Module 2: Configuration of Users and Contacts

  • Lesson 1: Explaining Users and Contacts

    • Understanding Users
    • Preparing to Configuring Users
    • Configuring Authentication Rules
    • Configuring CoS
    • Configuring Schedules and Holidays
  • Lesson 2: Managing Multiple Users

    • Configuring Multiple Users
    • Importing Users Using AXL
    • Importing Users Using LDAP
    • Importing Users Using BAT
    • Reviewing Users

Module 3: Implementation of Features

  • Lesson 1: Implementing the Dial Plan

    • Dial Plan Components
    • Dial Plan Configuration
  • Lesson 2: Understanding User Features

    • Reviewing User Features
  • Lesson 3: Accessing Voice Messaging and User Features

    • Accessing Voice Messaging
    • Phone View
    • Implementing Cisco Unity Connection VMO
    • Accessing Voice Messaging Using RSS Feeds
    • Implementing Secure Messaging

Module 4: Use of Cisco Unity Connection Applications, Tools and Reports

  • Lesson 1: Designing an Audiotext Application

    • Audiotext Application Design
    • Audiotext Application Configuration
    • Greeting Administrator
    • Greeting Administrator Configuration
  • Lesson 2: Using Cisco Unity Connection Tools and Reports

    • Using the Bulk Edit Feature
    • Using Task Management
    • Cisco Unity Connection Reports
  • Lesson 3: Using the DRS

    • Disaster Recovery System
    • Configuring Backups
    • Performing Restore Operations

target_au

The primary audiences for this course are:

  • Phone network administrators
  • Data system administrators
  • Entry-level network engineers
  • Administrators
  • IT support personnel
  • Helpdesk support staff

The secondary audience includes:

  • Learners looking to gain a technical overview of Cisco Unified Communications Manager
  • Learners who need a preparatory course before taking Implementing Cisco Unified Communications IP Telephony Part 1 (CIPT1) and Implementing Cisco Unified Communications IP Telephony Part 2 (CIPT2)
  • Introduction to Cisco Unity Connection for Network Engineering Staff Personnel

pre_req

To fully benefit from this course, students should have the following prerequisite skills and knowledge:

  • Basic knowledge of IP and networking or voice networks is suggested, but not required
  • Basic knowledge of the Windows desktop environment
  • Basic understanding of fundamental terms and concepts of computer networking, including LANs, WANs, and IP switching and routing.
  • Basic knowledge of traditional PSTN operations and technologies, including PBX and voice-mail administration tasks
  • Basic understanding of Cisco Unified Communications Manager

titleDCUCA – Administering Cisco Data Center Unified Computing System v 2.3
days4
seo_titleDCUCA Administering Cisco Data Center Unified Computing System v 2.3
seo_decThis custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager as the primary interface.
seo_tkeyDCUCA
categoryunified-computing
vendorCisco

techonogyDatacenter & Virtualization
overview

Administering Cisco Data Center Unified Computing System (DCUCA) is a 4-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager as the primary interface.

Using real-world scenarios and examples, this Cisco training course will explore all of the components of the UCS B-Series and C-Series solutions from a day to day administrative point of view. Learn C-Series standalone, C-Series under UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central. Learn more about administering Cisco Data Center Unified Computing System and the course outline below.


objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand the B-Series and C-Series product line similarities and differences
  • Describe the C-Series standalone and UCS managed architectures
  • Understand the process for upgrading B-Series and C-Series Firmware
  • Administering service profiles, pools, and policies
  • Understanding RBAC with Active Directory integration
  • Administering backup and restores in UCS Manager
  • Learn and discuss the various management tools for Cisco UCS
  • Perform basic troubleshooting of B-Series and C-Series in normal operations

outline

Module 1: UCS Infrastructure Components

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: Exploring Cisco UCS User Interfaces
  • Lesson 3: Cisco UCS Management Framework and Features

Module 2: Administering Cisco C-Series Servers

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: Describing Cisco UCS C-Series Servers
  • Lesson 3: Cisco UCS C-Series Integrated Management Controller
  • Lesson 4: Provisioning Monitoring and Logging on the Cisco UCS C-Series Server
  • Lesson 5: Provisioning Cisco UCS C-Series Server Integration in UCS Manager
  • Lesson 6: Updating Cisco UCS C-Series Firmware with the Host Update Utility
  • Lesson 7: UCS C-Series Standalone and UCS Managed Troubleshooting

Module 3: Administering Cisco B-Series Servers

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: RBAC, Organizations, and Active Directory Integration
  • Lesson 3: Configuring Compute Node LAN Connectivity
  • Lesson 4: Configuring Compute Node SAN Connectivity
  • Lesson 5: Creating Identity and Resource Pools
  • Lesson 6: Creating Service Profiles
  • Lesson 7: Creating Templates and Cloning Service Profiles
  • Lesson 8: Managing Service Profiles
  • Lesson 9: Operating System Installation Options
  • Lesson 10: Backing Up and Restoring UCSM Database
  • Lesson 11: Upgrading UCS B-Series Firmware
  • Lesson 12: Troubleshooting Cisco UCS B-Series Configuration
  • Lesson 13: Troubleshooting Cisco UCS B-Series Operation

Module 4: UCS Management Tools

  • Lesson 1: UCS Management Tool Overview
  • Lesson 2: Integrating UCS Manager with UCS Central
  • Lesson 3: Managing UCS Using the Cisco UCS PowerTool

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems
  • Basic knowledge of servers and storage

titleSDWOTS – Cisco SD-WAN Operations, Troubleshooting, and Best Practices
days5
seo_titleSDWOTS - Cisco SD-WAN Operations, Troubleshooting, and Best Practices
seo_decStudents will learn how to design, configure and operate a Cisco SD-WAN utilizing any transport (MPLS, Broadband, LTE, VSAT etc.).
seo_tkeySDWOTS
categorynetworking
vendorCisco

techonogyEnterprise Networking
overviewThis five-day course covers the new deployment, options and features of version 20.x Cisco Software-Defined WAN (SD-WAN). SD-WAN is an overlay architecture that overcomes the biggest drawbacks of traditional WAN. Students will learn how to design, configure and operate a Cisco SD-WAN utilizing any transport (MPLS, Broadband, LTE, VSAT etc.). Candidates will discuss and build an SD-WAN environment starting from Day 0 provisioning and will also be able to provide troubleshooting, management, policy control and application visibility across the enterprise network. This hands-on Course covers the Cisco SD-WAN product and contains extensive labs to reinforce the knowledge learned.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe how to deploy SD-WAN
  • Configure SD-WAN environment
  • Deploy Plug and Play / Zero-Touch Provisioning
  • Implement SD-WAN Security
  • Configure SD-WAN Policies
  • Deploy, maintain and troubleshoot cEdge devices
  • Operate SD-WAN Devices and software
  • Troubleshoot SD-WAN environment

outline

Module 1: Cisco SD-WAN Introduction

  • High-level Cisco SD-WAN Deployment models
  • Application level SD-WAN solution
  • Cisco SDWAN high availability solution
  • Cisco SD-WAN Scalability
  • Cisco SD-WAN Solution Benefits

Module 2: Cisco SD-WAN Orchestration

  • Introduction
  • vManage NMS
  • vSmart Controller
  • vBond Orchestrator
  • Controller Resiliency Architecture

Module 3: Site Architecture and Deployment Models

  • Site Capabilities
  • cEdge Router
  • Upgrading a current ISR router to support SD-WAN

Module 4: Plug and Play Connect Portal – Zero Touch Provisioning

  • Overview
  • Understanding Cisco Plug and Play Connect Portal
  • cEdge registration, licensing and onboarding
  • Understanding the legacy ZTP Portal for vEdge
  • User Input Required for the ZTP Automatic Authentication Process
  • Authentication between the vBond Orchestrator and a cEdge Router
  • Authentication between the cEdge Router and the vManage NMS
  • Authentication between the vSmart Controller and the cEdge Router

Module 5: Cisco SD-WAN Solution

  • Overlay Management Protocol (OMP)
  • Cisco SDWAN Circuit Aggregation Capabilities
  • Secure Connectivity in Cisco SD-WAN
  • Performance Tracking Mechanisms
  • Application Discovery
  • Dynamic Path Selection
  • Performance Based Routing
  • Dynamic Cloud Access
  • Understanding the Cisco SD-WAN Onramp
  • Understanding Direct Internet Access (DIA) and it’s advantages
  • Zone Based Firewall
  • Umbrella integration
  • SD-WAN security features overview

Module 6: Operations Best Practices

  • Config: Test Configuration Changes Before Committing
  • NAT: Secure Routers Acting as NATs
  • cEdge / vEdge Routers: Connect to the Console Port
  • cEdge / vEdge Routers: Use the Poweroff Command
  • cEdge / Viptela Devices: Site ID Naming Conventions
  • Edge Devices: Using the System IP Address
  • vManage NMS: Disaster Recovery

Module 7: Application Monitoring

  • vManage
  • vAnalytics
  • Ecosystem Partner Solutions

Module 8: Troubleshooting Methods

  • Remote Access
  • Console Access
  • LAN Interfaces
  • WAN Interfaces
  • Control Connections

Module 9: General Troubleshooting

  • Check Application-Aware Routing Traffic
  • Collect Device Data To Send to Customer Support
  • Monitor Alarms and Events
  • Monitor TCP Optimization
  • Ping a Viptela Device
  • Run a Traceroute
  • Simulate Flows
  • Troubleshoot Cellular Interfaces
  • Troubleshoot Device Bringup
  • Troubleshoot WiFi Connnections
  • Use Syslog Messages
  • Tunnel Health

Module 10: Troubleshooting: Data Plane Issues

  • BFD Session Information
  • Cflowd Information
  • Data Policies
  • DPI Information
  • Symptom: Site Cannot Reach Applications in Datacenter
  • Symptom: vManage Showing vEdge or Interface Down
  • Symptom: Site-Wide Loss of Connectivity (Blackout)
  • Symptom: Poor Application Performance (Brownout)
  • Issue Severity Assessment

Module 11: Troubleshooting:  Routing Issues

  • BGP Information
  • Multicast Information
  • OMP Information
  • OSPF Information
  • PIM Information
  • Symptom: Some or All Routes Missing from vEdge Routing table
  • Symptom: Data Traffic Using Suboptimal Path
  • Symptom: Data Traffic Not Using All Transports

Module 12: Application-Aware Routing

  • Application Performance with CloudExpress Service
  • Tunnel Latency Statistics
  • Tunnel Loss Statistics

Module 13: Interface Troubleshooting

  • Reset an Interface
  • All Interfaces
  • ARP Table Entries
  • Cellular Interface Information
  • DHCP Server and Interface Information
  • Interface MTU Information
  • Management Interfaces
  • VRRP Information
  • WAN Interfaces

Module 14: Network Operations

  • Check Alarms and Events
  • Check User Accounts and Permissions
  • Deploy the Viptela Overlay Network
  • Determine the Status of Network Sites
  • Control Connections
  • Data Connections
  • Network Performance with vAnalytics Platform
  • OMP Status

Module 15: Security Certificate Troubleshooting

  • Generate a Certificate
  • Upload the vEdge Serial Number File
  • Certificate
  • CSR

Module 16: Viptela Devices Maintenance

  • Decommission an vEdge Cloud Router
  • Determine the Status of a Network Device
  • Locate an Edge Device
  • Migrate a Controller’s Virtual Machine Using vMotion
  • Reboot a Device
  • Remove an Edge Router’s Serial Number from the vManage NMS
  • Replace an Edge Router
  • Restore the vManage NMS
  • Set Up User Accounts to Access Viptela Devices
  • Validate or Invalidate a vEdge Router
  • Software Versions Installed on a Device
  • Status of a vBond Orchestrator
  • Status of a cEdge / vEdge Router
  • Status of a vSmart Controller

Module 17: Viptela Device Operation and Troubleshooting

  • Determine Changes to a Configuration Template
  • Determine Why a Device Rejects a Template
  • Alarm Severity Levels
  • Hardware Alarms
  • Checking Alarms and Notifications
  • LEDs
  • Additional Information
  • Restore a cEdge / vEdge Router
  • Remove cEdge / vEdge Router Components

Module 18: Working With Viptela Support

  • Case Priority Levels and Response Times
  • Information for Opening Cases
  • Viptela Customer Support Portal
  • Other Ways to Contact Support

target_au

The primary audience for this course is as follows:

  • Engineering and Planning team evaluating WAN evolution
  • Personnel involved in SD WAN Design, Implementation and Operation
  • Network Operations team with SD WAN solution
  • Cisco partners who sell and support SD WAN solutions

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Familiarity with WAN Networks

titleDNACAM – Monitoring/Troubleshooting Network Performance using DNA Center with Assurance
days3
seo_titleDNACAM - Monitoring/Troubleshooting Network Performance using DNA Center with Assurance
seo_dec
seo_tkeyDNACAM
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewMonitoring and Troubleshooting Network Performance using Cisco DNA Center with Assurance is a 3-day course which provides students with the skills to implement, monitor, troubleshoot, and remediate network infrastructure, applications, and devices using Cisco DNA Center Assurance tools and techniques.
objective
  • Explain the role of Cisco DNA Center Assurance, its key features, use cases, and how it supports intent-based networking
  • Configure Cisco DNA Center Assurance to collect network telemetry data and monitor the network devices, clients, and applications
  • Interpret health scores of network devices, clients, and applications and plan remediation actions
  • Use Cisco DNA Center Assurance to explore common troubleshooting issues of client onboarding and application QoS concerns

outline

Module 1: Introduction to Cisco DNA Center Assurance

  • Introduction to DNA Center
  • System Architecture
  • Key Features and Use Cases
  • Getting Started
  • Navigating the GUI

Module 2: Assurance System Architecture and Data Analytics

  • DNAC Assurance Concepts
  • Assurance Data and Metrics
  • Assurance Health Scores
  • Assurance Time Stamps and Data Refresh Concepts

Module 3: Monitoring Device, Client, and Application Health

  • Monitoring Network Device Health and Performance
  • Monitoring Wired and Wireless Client Health and Performance
  • Monitoring Application Health and Performance

Module 4: Analyzing Issues using Cisco DNA Center Assurance

  • Detecting Issues
  • View and Mediate Issues

Module 5: Troubleshooting using Cisco DNA Center Assurance Tools

  • DNAC Assurance Troubleshooting Tools
  • Using Sensor Tests
  • Using Intelligent Capture

target_au
pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • CCNP Level Routing
  • Understanding of Identity Services Engine
  • Practical network and LAN or WAN management experience.

titleSDAINT – Introduction to SD-Access and DNA Center
days2
seo_titleSDAINT - Introduction to SD-Access and DNA Center
seo_decThis 2-day network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks.
seo_tkeySDAINT
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewDNA Center and SD-Access offer Cisco’s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This 2-day network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Students who enroll in this course should have a basic understanding of Cisco CCNA Routing & Switching, of Software Defined Networks, and have experience with Cisco IOS, IOS XE, and CLI. Find additional course information below.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Know and understand Cisco’s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today’s networks.
  • Differentiate and explain each of the building blocks of SD-Access Solution
  • Explain the concept of “Fabric” and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)
  • Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access Solution
  • Understand the role of DNA Center as solution orchestrator and Intelligent GUI
  • Be familiar with workflow approach in DNA Center and its 4 Steps: Design, Policy, Provision and Assurance

outline

Module 1: Introduction to Cisco’s Software Defined Access (SD-Access)

  • SD-Access Overview
  • SD-Access Benefits
  • SD-Access Key Concepts
  • SD-Access Main Components
    • Campus Fabric
      • Wired
      • Wireless
    • Nodes
      • Edge
      • Border
      • Control Plane
    • DNA Controller
    • ISE (Policy)
    • NDP (Analytics and Assurance)

Module 2: SD-Access Campus Fabric

  • The concept of Fabric
  • Node types
  • Fabric Edge Nodes
  • Control Plane Nodes
  • Border Nodes
  • LISP as protocol for Control Plane
  • VXLAN as protocol for Data Plane
  • Concept of Virtual Network
  • Fabric-enabled WLAN
    • Fabric Enabled WLC
    • Fabric Enabled AP’s

Module 3: DNA Center and Workflow for SD-Access

  • Introduction to DNA Center
  • Workflow for SD-Access in DNA Center
    • Design Step overview
    • Policy Step overview
    • Provision Step overview
    • Assurance Step overview
  • Integration with Cisco ISE for Policy Enforcement
  • Integration with Cisco NDP for Analytics and Assurance
  • Relationship with APIC-EM controller

Module 4: DNA Center Workflow First Step – Design

  • Creating Enterprise and Sites Hierarchy
  • Discuss and Demonstrate General Network Settings
  • Loading maps into the GUI
  • IP Address Administration
  • Administering Software Images
  • Network Device Profiles

Module 5: DNA Center Workflow Second Step – Policy

  • 2-level Hierarchy
    • Macro Level: Virtual Network (VN)
    • Micro Level: Scalable Group (SG)
  • Policy Types
    • Access Policy
    • Access Control Policy
    • Traffic Copy Policy
  • ISE Integration with DNA Center
  • Cross Domain Policies

Module 6: DNA Center Workflow Third Step – Provision

  • Devices Onboarding
    • Discovering Devices
    • Assigning Devices to a site
    • Provisioning device with profiles
  • Fabric Domains
    • Understanding Fabric Domains
    • Using Default LAN Fabric Domain
    • Creating Additional Fabric Domains
  • Adding Nodes
    • Adding Fabric Edge Nodes
    • Adding Control Plane Nodes
    • Adding Border Nodes

Module 7: DNA Center Workflow Fourth Step – Assurance

  • Introduction to Analytics
  • NDP Fundamentals
  • Overview of DNA Assurance
  • Components of DNA Assurance
  • DNA Center Assurance Dashboard

Module 8: Implementing WLAN in SD-Access Solution

  • WLAN Integration Strategies in SD-Access Fabric
    • CUWN Wireless Over The Top (OTT)
    • SD-Access Wireless (Fabric enabled WLC and AP)
  • SD-Access Wireless Architecture
    • Control Plane: LISP and WLC
    • Data Plane: VXLAN
    • Policy Plane and Segmentation: VN and SGT
  • Sample Design for SD-Access Wireless

Module 9: Campus Fabric External Connectivity for SD-Access

  • Enterprise Sample Topology for SD-Access
  • Role of Border Nodes
  • Types of Border Nodes
    • Border
    • Default Border
  • Single Border vs. Multiple Border Designs
  • Collocated Border and Control Plane Nodes
  • Distributed (separated) Border and Control Plane Nodes

target_au

The primary audience for this course is as follows:

  • Anyone interested in knowing about DNA Center and SD-Access
  • Personnel involved in SD-Access Design and Implementation
  • Network Operations team with SD-Access solution
  • Network admin staff that deal with User Access
  • Channel Partner SEs and other sales support
  • Network Access Control administration
  • Network Administrators
  • Network Architects
  • Network Engineers

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Knowledge level equivalent to Cisco CCNA Routing & Switching
  • Basic knowledge of Software Defined Networks
  • Basic knowledge and experience with Cisco IOS, IOS XE and CLI

titleDCIHX – Implementing Cisco HyperFlex v1.2
days4
seo_titleDCIHX - Implementing Cisco HyperFlex | IT Training
seo_decIn this course students will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations.
seo_tkeyDCIHX
categoryhyperflex
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco HyperFlex (DCIHX) v1.2 course shows you how to deploy and use the Cisco® HyperFlex™ data platform to support multicloud workloads. Students will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.™  This class will help you use Cisco HyperFlex to:
  • Enable multicloud IT with an adaptive platform that powers any application anywhere with the simplicity of hyperconverged infrastructure
  • Gain hands-on experience using Cisco HyperFlex

objective

Upon completion of this course, the student will be able to meet these overall objectives:

  • Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex
  • Explain the Cisco Unified Computing System™ (Cisco UCS®) and what makes it valuable to business
  • Describe how Cisco HyperFlex Data Platform (HXDP) works
  • Describe the physical components of Cisco HyperFlex
  • Install and expand Regular vSphere Cisco HyperFlex
  • Manage your Cisco HyperFlex VMware ESXi-based cluster
  • Describe how to maintain Cisco HyperFlex
  • Design a Cisco HyperFlex solution
  • Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption
  • Describe a stretched cluster and how is it different from a standard cluster
  • Describe a HyperV-based cluster and how is it different from an ESXi-based cluster
  • Design a multicloud datacenter with Cisco HyperFlex
  • Describe an Edge cluster and how is it different from a standard cluster
  • Perform basic troubleshooting tasks and explain Cisco Intersight
  • Explain Cisco HyperFlex releases beyond 4.0(1a)

outline

Topics Covered

  • Introducing Hyperconvergence and Cisco HyperFlex
  • Describing Cisco UCS: The Foundation of Cisco HyperFlex
  • Describing Cisco HyperFlex Software Components
  • Describing Cisco HyperFlex Hardware Components
  • Managing Cisco HyperFlex in vSphere Environment
  • Maintaining Cisco HyperFlex
  • Designing Cisco HyperFlex
  • Protecting Your Data
  • Introducing Stretched Cluster
  • Introducing HyperV-Based Standard Cluster
  • Designing Multicloud Data Center with Cisco HyperFlex
  • Introducing EDGE Cluster
  • Troubleshooting Cisco HyperFlex

target_au

The primary audience for this course is as follows:

  • Data center engineers
  • Cisco integrators and partners

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Cisco CCNA®–level knowledge about data center architecture and products technologies (network, compute, storage network)
  • Familiarity with VMware vCenter and ESXi
  • Familiarity with Microsoft Server 2016 and Hyper-V

Recommended Cisco learning offerings that may help you meet these prerequisites:

  • Introducing Cisco Data Center Networking (DCICN) 6.x
  • Introducing Cisco Data Center Technologies (DCICT) 6.x
  • Implementing Cisco Data Center Unified Computing (DCUCI) 6.x

titleC98WF6 – Configuring Cisco Catalyst 9800 and Intro to WIFI6
days3
seo_titleC98WF6 - Configuring Cisco Catalyst 9800 and Intro to WIFI6
seo_decThis course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
seo_tkeyC98WF6
categorywireless-courses
vendorCisco

techonogyWireless
overviewConfiguring Cisco Catalyst 9800 and Intro to WIFI6 is a course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits. This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
objective

After completing this course you should be able to:

  • Describe Cisco Catalyst 9800
  • Understand the Benefits for Catalyst 9800
  • Configure Catalyst 9800
  • Migrate to the Catalyst 9800
  • Troubleshoot the Catalyst 9800
  • Understand and Discuss WIFI6

outline

Introduction

  • Cisco Catalyst 9800 Overview
  • Intent Based Networking (IBN)
  • Cisco Catalyst Next Gen Wireless Architecture
  • Cisco Catalyst 9800 Wireless – Platform Support

Cisco Catalyst 9800 Wireless Controller Appliances

  • Cisco Catalyst 9800 Wireless Controller Series: C9800-80-K9
  • Cisco Catalyst 9800 Wireless Controller Series: C9800-40-K9
  • Cisco Catalyst 9800 Wireless Controller Cloud Series: C9800-CL-K9

Cisco Catalyst 9800 use in Private and Public Cloud Environments

  • Private
  • Public
  • Hybrid

What is WiFi 6 and Why do we need it?

  • Use Cases – how WiFi 6 will change Buisness and Industry
  • WIFI6 technical – a leap from previous WiFi technologies
  • Design Considerations
  • Cisco WiFi6 Portfolio and Interoperability
  • Configure WiFi6 on Cat 9800

Cisco Catalyst 9800 Series Embedded Controller for SDA

  • SD-Access Everywhere
  • Wireless Assurance with DNA Center
  • Catalyst 9800 SD-Access Wireless
  • Catalyst 9800 SD-Access Embedded Wireless Controllers

High Availability

  • Reducing downtime for Upgrades and Unplanned Events
  • High Availability (Client SSO)
  • High Availability (AP & Client SSO)

Software Updates

  • Software Updates
  • SSO
  • Patching
  • Rolling Upgrades
  • Wireless Controller SMU
  • Rolling AP Update
  • Image Upgrade

Programmability and Telemetry

  • Flexible management options with Cisco Catalyst 9800 Wireless Controllers
  • Wireless Programmability “Stack”
  • Config vs Operational YANG data models
  • Model Driven Telemetry
  • Security and Threat Detection
  • Intent-based wireless networks Security
  • Security and Threat Mitigation

Catalyst 9800 Wireless Controller Configuration Model

  • New Configuration Model
  • AireOS vs. Catalyst 9800 Config Model
  • Catalyst 9800 Config Model

Wireless Basic Setup

  • Wireless Basic Configuration Model
  • Adding Local Site
  • Adding Remote Site
  • Provisioning APs to Site
  • Day 0
  • AP PnP

Wireless Advanced

  • Guided UI Configuration Workflow
  • WLAN Profile
  • Policy Profile
  • AP Join profile
  • RF Profile
  • Static and Rule-Based AP Tagging

Migration

  • AireOS Config Translator
  • Using the Tool
  • Migration using Prime
  • AireOS Config Translator on PI 3.5

Troubleshooting

  • IOS-XE logging architecture
  • Packet tracing and packet captures
  • Embedded Packet Capture web interface
  • Useful commands and tools

Lab Outline:

  • Configure Windows 10 Client Access
  • Configure Centralized WLAN Deployment with Catalyst 9800
  • Configure Security in Centralized WLAN Deployment with Catalyst 9800 using ISE
  • Configuring Guest Access using Catalyst 9800 and Anchor AirOS
  • Implement Flex-Connect WLAN Deployment with Catalyst 9800
  • High Availability SSO with Catalyst 9800
  • Migrating Configuration from AireOS to Catalyst 9800 WLC using WebUI and Prime Infrastructure
  • Catalyst 9800 Software Upgrade

target_au

The primary audience for this course is as follows:

  • Cisco Partners and customers interested in the Catalyst 9800 wireless controller

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Understanding of Wi-Fi technologies (CCNA Level)

titleSDWMER – Cisco Meraki SD-WAN Advanced Policy, Security & Programmability
days3
seo_titleSDWMER - Cisco Meraki SD-WAN Advanced Policy, Security & Programmability
seo_decThis 3-day course is hands-on training on Cisco Meraki SD-WAN implementations, basic and advanced Cisco Meraki SD-WAN Security features that are available on Meraki MX routers.
seo_tkeySDWMER
categorydata-center-virtualization
vendorCisco

techonogySecurity
overviewThis 3-day course is hands-on training on Cisco Meraki SD-WAN implementations, basic and advanced Cisco Meraki SD-WAN Security features that are available on Meraki MX routers. Deep dive into capabilities like Firewall and Traffic, Application Aware Firewall, AMP Integration, Content Filtering and Threat protection and many other advanced features are covered as a part of this training. This course also provides hands-on training on Cisco Meraki SD-WAN Programmability features.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Introduction to Cisco Meraki SD-WAN Solution and Products/Components
  • Understand key concepts of Cisco Meraki SD-WAN
  • Implement Meraki SD-WAN Solution
  • Understand Cisco Meraki SD-WAN Security Features
  • Implement Firewall and IPS Policies
  • Understand Cisco SD-WAN Programmability features
  • Script APIs to automate Cisco SD-WAN vManage configurations

outline

Module 1: Introduction to Meraki SD-WAN and Meraki Key Concepts

  • Meraki Centralized Dashboard
  • Meraki key concepts
    • Meraki Concentrator Modes
    • VPN Topology
    • Split Tunnel and Full Tunnel
    • Hub and Spoke and VPN Mesh
  • Meraki Connection Monitor
  • Data Center Redundancy (DC-DC Failover)
  • Warm Spare for VPN Concentrators

Module 2: Meraki SD-WAN Deployment Models

  • Introduction
  • Data Center Deployment
  • MX Deployment Considerations
    • MX Deployment Considerations
    • Upstream DC Switching Considerations
    • Routing Considerations
    • Firewall Considerations
  • Branch Deployment
    • AutoVPN at the Branch
    • Hub and Spoke VPN Deployment
    • Hub Priorities and Design considerations

Module 3: Meraki SD-WAN Security

  • Exploring the SD-WAN and Security Dashboard
  • Site-to-site VPN Deep Dive
  • Client VPN Technologies
  • Access control and Splash Page
  • NAT and Port Forwarding
  • Firewall and Traffic Shaping
  • Content Filtering and Threat Protection
  • Meraki and Cisco Umbrella Integration

Module 4: Firewall and Traffic Shaping Policies

  • MX Firewall Settings
    • Outbound Rules
    • Appliance Services
    • Layer 7 Firewall Rules
    • Forwarding Rules
  • IP Source Address Spoofing Protection
    • Overview and Key Terms
    • NAT Modes Implementation
    • Supported Deployment Topologies
  • SD-WAN and Traffic Shaping
    • Uplink Configurations
    • Uplink Selections
    • Global Bandwidth Limitations
    • Traffic Shaping Rules
    • Web Cache

Module 5: SD-WAN Security – Content Filtering and Threat Protection

  • MX and Active Directory Integrations
  • Content Filtering Implementations and Troubleshooting
  • Cisco AMP Integrations and Threat Protection
  • Threat Grid Integrations

Module 6: Programmable API

  • Meraki Dashboard API with Postman
  • Meraki Organization and Networks Import into Postman
  • Meraki Devices into the appropriate Networks using APIs
  • Troubleshooting Meraki using APIs
  • Dashboard
  • Device Dashboard

target_au

This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals with job titles or in roles such as:

  • Field deployment technicians
  • Network administrators
  • Pre-/Post-sales engineers
  • Service provider engineers
  • Systems engineers
  • IT professionals

pre_req
titleCCEFIN – Finesse Operations for Cisco Contact Center
days3
seo_titleCCEFIN - Finesse Operations for Cisco Contact Center
seo_decThe installation and configuration of Cisco Finesse will be covered and many hands-on labs will demonstrate how to customize the desktop for agents and supervisors using the built in functions of the Cisco Finesse Administrative interface.
seo_tkeyCCEFIN
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewThis 3-day course, Finesse Operations for Cisco Contact Center v1.0, is a hands on experience that covers Cisco Finesse for both UCCX and UCCE. The installation and configuration of Cisco Finesse will be covered and many hands-on labs will demonstrate how to customize the desktop for agents and supervisors using the built in functions of the Cisco Finesse Administrative interface. Beyond that you will learn and implement how to deploy and use custom 3rd party or in house gadgets to make the Cisco Finesse exactly what you need.
objective

Upon completing this course, the learner will have an understanding of the following:

  • Cisco Finesse Basics
  • Basic Finesse Customization
  • Gadgets
  • The REST API
  • Troubleshooting

outline

Module 1: Finesse Overview

  • Finesse Basics
    • What is Finesse
    • Supported OS and Browsers
    • Versions Supported
    • Components of Finesse
  • Finesse Architecture
    • The Finesse Server
    • The Connections to the Finesse Server
    • Finesse Client Connections
  • Finesse Failover
    • Failover Mechanisms
    • CTI Failure
    • AWDB Failure
    • Finesse Server Failure
    • Finesse Browser Issues
    • Finesse IP Phone Failure
  • Finesse Out of the Box
    • Logging into Finesse as an Agent
    • The Finesse Agent Interface
    • Logging into the Supervisor Interface
    • The Finesse Supervisor Interface

Module 2: Basic Finesse Customizations

  • Administration Interface Tour
  • Phone Books
  • Screen Pops
  • Reason Codes
  • Wrap up Codes
  • Desktop Layouts
    • Adding CUIC live Data
    • Adding CUIC Gauges and Charts
    • Task Overview
    • CUIC Tasks
    • Finesse Admin Tasks
  • Workflows
    • Web Browser Pops
    • API Actions
      • Recording Calls
      • Post Call Survey 3

Module 3: Gadgets

  • Gadgets Overview
  • Cisco Sample Gadgets
  • Uploading Gadgets to the Finesse Server
  • Adding Gadgets to the Desktop Layout

Module 4: Rest API

  • The Finesse REST API
  • The Finess REST API Structure
  • Using the Fineesse API from the CLI
  • Adding API Elements to a Web Site

Module 5: 3rd party Solutions

  • Examples of Third Party Apps

Module 6: Troubleshooting Finesse

  • Troubleshooting Finesse Server
  • Collecting Trace Files
  • Finesse Errors

target_au

The primary audience for this course is as follows:

  • Those wanting to customize the Agent and Supervisor desktop out of the box solution
  • IT support staff that need to be able to troubleshoot the Finesse Server and interfaces
  • Administrators that want to use the basic tools to customize Cisco Finesse

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Basic familiarity with Contact Centers.

titleDCUCAI – Administering Cisco Data Center Unified Computing System w/Intersight
days3
seo_titleAdministering Cisco Data Center Unified Computing System w/Intersight
seo_decIn this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers including using Cisco Intersight for UCS management.
seo_tkeyDCUCAI
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewDCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) B-Series and C-Series servers including using Cisco Intersight for UCS management. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager or Intersight as the primary interface. Using real-world scenarios and examples, this Cisco training course will explore all the components of the UCS B-Series and C-Series solutions from a day-to-day administrative point of view. Learn C-Series standalone, C-Series under UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central, as well as using Cisco Intersight for UCS and Hyperflex operations and management.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand the B-Series and C-Series product line similarities and differences
  • Describe the Intersight support for C-Series standalone and UCS managed architectures
  • Describe Cisco Intersight and how it can be used to manage UCS and Hyperflex
  • Understand the process for upgrading B-Series and C-Series Firmware with UCSM and Intersight
  • Administering service profiles, pools, and policies with UCSM and Intersight
  • Understanding RBAC with Active Directory integration
  • Administering backup and restores in UCS Manager
  • Learn and discuss the various management tools for Cisco UCS including Intersight
  • Perform basic troubleshooting of B-Series and C-Series in normal operations with UCSM and Intersight
  • Describe how to get started with Intersight programmability

outline

Module 1: UCS Infrastructure Components with Intersight

  • Cisco UCS Product Line, Use Cases, and Components
  • Introducing Cisco Intersight
  • Describing Cisco UCS C-Series Servers

Module 2: Administering Cisco UCS with Intersight

  • Managing Virtual Resources
  • Configuring Compute Node LAN Connectivity
  • Configuring Compute Node SAN Connectivity
  • Creating Identity and Resource Pools
  • Creating Service Profiles
  • Creating Service Profile Templates and Cloning Service Profiles
  • Managing Service Profiles
  • Troubleshooting Cisco UCS B-Series Configuration
  • Troubleshooting Cisco UCS B-Series Operation
  • Backing Up & Restoring the Cisco UCS Manager Database
  • Managing and Upgrading Cisco UCS B-Series Firmware

Module 3: Administering UCS Management Tools with Intersight

  • Describing Cisco UCS User Interfaces
  • Exploring Intersight User Interfaces
  • Describing Cisco UCS Management Framework & Features
  • Describing Cisco UCS Hyperflex
  • Getting Started with Intersight Programmability

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems
  • Basic knowledge of servers and storage
  • Familiarity with Cisco UCS and Hyperflex

titleTETADV – Tetration Firewall Enforcement Agents, Data Flow Mapping & Advanced Policy Deployment
days5
seo_titleTetration Firewall Enforcement Agents, Data Flow Mapping & Advanced Policy Deployment
seo_decThis course will provide the details and hands-on activities necessary to successfully deploy, manage, and troubleshoot firewall policies in Cisco Tetration.
seo_tkeyTETADV
categoryfirewall-vpn
vendorCisco

techonogySecurity
overviewTETADV, Tetration Firewall Enforcement Agents, Data Flow Mapping, and Advanced Policy Deployment is a 5-day course exploring telemetry data, the flows corpus, and how Cisco Tetration Analytics™ Firewall Agent provides enforcement. This course will provide the details and hands-on activities necessary to successfully deploy, manage, and troubleshoot firewall policies in Cisco Tetration.
objective

Upon completing this course, the learner will be able to understand how Cisco Tetration AnalyticsTM:

  • Describe how the Cisco Tetration Firewall Agent works to enforce security policy
  • Describe how to deploy the Cisco Tetration Firewall Agent
  • Describe how to Manage and Troubleshoot Cisco Tetration Firewall Agent policies
  • Review administrative and management tasks necessary to operate, support and manage Tetration
  • Describe how Tetration telemetry data is utilized in the Flows Corpus
  • Construct effective policies based on discovered flows and Application Dependency Mapping (ADM)

outline

Module 1: Cisco Tetration Firewall Agent

  • How the Cisco Tetration Firewall Agent Enforces Firewall Rules
  • Deploying and Managing Linux Enforcement Agents
  • Deploying and Managing Windows Enforcement Agents
  • Deploying and Managing AIX Enforcement Agents

Module 2: Tetration Enforcement Agent Components, Messaging, and Interaction

  • Enforcement Front End
  • Firewall and Catch-all Rules
  • The Preserve Rules Option
  • Agent Config Intents
  • Stateful Enforcement

Module 3: Tetration Enforcement Agent UI Configurations and Troubleshooting

  • Agent UI Configuration
  • Monitoring Agents
  • Platform Specific Enforcement Features and Requirements
  • Known Limitations
  • Troubleshooting Inbound and Outbound Firewall Rules

Module 4: Tetration Secure Connector, Edge and Ingest Appliances

  • Tetration Secure Connector Overview
  • Tetration Secure Connector features and configuration
  • Tetration Edge Appliance Overview
  • Tetration Edge Appliance configuration
  • Tetration Ingest Appliance Overview
  • Tetration Ingest appliance features and configurations

Module 5: Application Dependency Mapping

  • Application Management Workflow Cycle
  • Tetration Application Insight
  • ADM Process
  • ADM Run Results
  • Cluster Confidence

Module 6: Tetration Policy Analysis

  • Enable Policy Analysis
  • Live Policy Analysis
  • Backdated Policy Experiments
  • Quick Policy Analysis
  • Diagnosis Using Policy Analysis

Module 7: Cisco Tetration Analytics Policy Enforcement Overview

  • Policy Global Ordering & Conflict Resolution
  • Scope Priorities
  • Troubleshooting Policy Enforcement

Module 8: Cisco Tetration Flow Search

  • Understanding the Flow Corpus
  • Using Scopes to Filter Results
  • Searching with Conjunctions
  • Correlating Flow Data with Hosts and Processes
  • Leveraging Annotations

Module 9: Using Tetration Forensics

  • Forensic Signals
  • Configuring Forensics
  • Forensics Visualization and Alerts
  • ForensicsScoring
  • Network and Process Hash Anomaly Detection

Module 10: Tetration Apps and API

  • App Store
  • User Apps
  • Visualize Data Sources
  • Bring your own Data
  • OpenAPI

target_au
pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Knowledge of cloud and (virtual) data center architecture or cloud basic networking concepts
  • Familiarity with Cisco basic networking security concepts and application security concepts
  • High-level familiarity with basic telemetry protocols and Big Data analytics

titleTEDI – Cisco Thousand Eyes Deployment & Implementation
days5
seo_titleTEDI - Cisco Thousand Eyes Deployment & Implementation
seo_dechis course provides the details and hands-on activities necessary to successfully deploy ThousandEyes and perform outage and performance analysis by leveraging data patterns and correlating test output.
seo_tkeyTEDI
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewTEDI (Cisco ThousandEyes Deployment and Implementation) is a 5-day course designed to help you understand, deploy, and manage the ThousandEyes platform. This course provides the details and hands-on activities necessary to successfully deploy ThousandEyes and perform outage and performance analysis by leveraging data patterns and correlating test output.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe the ThousandEyes solution and its benefits
  • Describe ThousandEyes agents, their purpose and how to determine optimal agent placement
  • Explain the different ThousandEyes test types and their purposes
  • Configure and run tests to correlate test output with the source of an application or network performance issue

outline

Module 1: Evolution of Application Delivery and Network Monitoring Requirements

  • The SaaS Cloud Disruption
  • The Importance of Enterprise App-to-User Visibility

Module 2: Thousand Eyes Platform Overview

  • ThousandEyes Platform and Architecture
  • Working with Agents
  • Understanding Consumption Models and Pricing
  • External Integrations

Module 3: Solution Use Cases

  • ThousandEyes Cloud Adoption Use Cases
  • Use Cases for Digital Experience
  • L3 And WAN Use Cases
  • Qualifying ThousandEyes Strategic Value

Module 4: Enterprise Agent Installation and Placement

  • Enterprise Agent Overview and Data Collected
  • About BrowserBot
  • OVA and Hyper-V Hypervisor Installation
  • UX Installation and Docker Deployment
  • Installation for Cisco IOS XE Containers
  • Installation for Cisco Catalyst 9000 Series Switches
  • Other Installation Options
  • Enterprise Agent Clusters
  • Interface Selection, Creation and Configuration
  • Placement Considerations

Module 5: Endpoint Agent Installation and Configuration

  • Endpoint Agent Overview and Data Collected
  • Endpoint Agent Installation options
  • Configuration and Deployment
  • Creating Scheduled Tests
  • User Experience

Module 6: Thousand Eyes Test Types and Functionality

  • Cloud and Enterprise Agent Based Tests
  • Nesting of Tests
  • Data Collection
  • Adding Tests
  • Relating Foundation Technologies to Test Methods  and Output

Module 7: Network Layer Tests

  • Test Inputs
  • Agent-to-Server Test Configuration
  • Agent-to-Agent Test Configuration
  • End-to-End Metrics and Visualization

Module 8: BGP Testing

  • BGP Protocol Review
  • Test Inputs
  • Alert Rules
  • Interpreting BGP Route Visualization

Module 9: DNS Testing

  • DNS Review
  • DNS Test Inputs
  • Analyzing DNS Test Output
  • DNS+ Layer Tests Settings
  • DNS+ Layer Tests Output

Module 10: Testing Web Servers

  • HTTP Inputs
  • FTP Server Test Inputs
  • Analyzing Web Test Output

Module 11: VoIP Tests

  • VoIP Technology Review
  • RTP Settings
  • SIP Server Settings
  • Interpreting RTP Stream and SIP Server Output

Module 12: Transaction Testing

  • Modeling User Workflows
  • Basic Test Configuration
  • Transaction Scripting Examples
  • Using the ThousandEyes Recorder
  • Selenium and Web Dev Tools
  • The Document Object Model and Interpreting Waterfall Charts

Module 13: SD-WAN Visibility and App Performance

  • SD-WAN Review
  • Leveraging Visibility to Baseline App and Network Performance
  • SD-WAN Branch, SaaS, and ISP Metrics
  • Using Underlay/Overlay Visualizations to Validate Performance and Isolate Issues

Module 14: Outage and Performance Analysis with ThousandEyes

  • Determining the Correct Test Type and Config
  • Correlating and Validating Test Results

Module 15: Monitoring, Alerting and Remediation

  • Using ThousandEyes Monitoring to Improve Digital Experience
  • Determining Actions to Take Based on Test Output
  • Using Snapshots
  • Managing Alerts
  • Capturing Historical Data

Module 16: Troubleshooting

  • Missing or Incorrect Path Visualization Information
  • HTTP server test errors
  • Endpoint Agent Issues
  • Firewall Considerations
  • CLI Network Troubleshooting Utilities

target_au

The primary audience for this course is as follows:

  • Systems Engineers
  • Technical Solutions Architects
  • Application Developers and Engineers

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Knowledge of cloud and (virtual) data center architecture and networking concepts
  • High-level familiarity with basic network protocols and applications
  • Familiarity with common application delivery methods

titleINTPRO – Cisco Intersight UCS & HyperFlex Programmability & Orchestration
days2
seo_titleINTPRO - Cisco Intersight UCS & HyperFlex Programmability & Orchestration
seo_decThis course is for users that want to begin using programmability with Cisco Intersight to enhance the management and operation of their Cisco UCS and HyperFlex infrastructure.
seo_tkeyINTPRO
categoryhyperflex
vendorCisco

techonogyCisco
overviewINTPRO is a 2-day course is for users that want to begin using programmability with Cisco Intersight to enhance the management and operation of their Cisco UCS and HyperFlex infrastructure. This training will demonstrate how programmability on Cisco compute platforms has evolved and how Cisco Intersight always-on cloud-based management can simplify UCS infrastructure management on a global scale by leveraging the Intersight Open API and developer tools.
objective

Upon completion of this course, the student will be able to meet these overall objectives:

  • Describe the Intersight REST API,  Object Model, and Intersight Managed Objects
  • Demonstrate how to use Intersight developer tools
  • Understand how to use Postman to interact with the Intersight API
  • Use Python to manage UCS/HX operations with the Intersight API
  • Demonstrate how to use Ansible to automate deployments with Intersight
  • Deploy UCS/HX infrastructure using Terraform

outline

Module 1: Examining the Intersight Object Model and API tools

  • Understanding Managed Objects in Intersight
  • Using the REST API Browser to test resources and methods and run results
  • Intersight Developer tools

Module 2: Interacting with the Intersight REST API using Postman

  • Using the Postman collection repo
  • Configuring environment variables
  • Intersight Collection Postman How-To
  • Understanding  request headers
  • Why use a pre-request script?
  • Request examples for managing UCS and HX in Intersight

Module 3: Using Python to manage operations with the Intersight  REST API

  • Using the Intersight Python SDK
  • How to Generate API Keys and Secrets
  • looking at the contents of the rest-API repository
  • Leveraging Python examples with Intersight
  • Running and validating python requests on Intersight

Module 4: Managing and automating Intersight with Ansible

  • Installing Ansible and the UCS Python SDK
  • Installing the UCS and UCSM Ansible Collections
  • Configure and run UCS Ansible Playbooks
  • Install the Intersight Ansible Collection
  • Configure and run Intersight Ansible Playbooks
  • Intersight Automated Hyperflex Deployment with Ansible How-To

Module 5: Deploying UCS infrastructure with Intersight and Terraform

  • Terraform Workflow Overview
  • How to Install GO and Terraform
  • Intersight Terraform Provider requirements and config
  • Terraform configuration files
  • How to Initialize Terraform
  • Create and configure Terraform Resources
  • Running Terraform Apply to configure UCS infrastructure in Intersight

target_au

The primary audience for this course is as follows:

  • People interested in applying programmability to automate and manage their UCS or HyperFlex infrastructure with Cisco Intersight
  • Systems administrators and engineers
  • Technical solutions architects
  • Systems integrators
  • Channel partners
  • Value-added resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Familiarity with Cisco UCS and HyperFlex

titleINCVDO – Cisco CyberVision Deployment & Operation
days3
seo_titleINCVDO - Cisco CyberVision Deployment & Operation
seo_decINCVDO, Cisco CyberVision Deployment and Operation, is a 3-day instructor-led course. Security is every enterprise’s top priority in today’s connected world and keeping enterprise architecture secure will protect business values and outcomes.
seo_tkeyINCVDO
categorydata-center-security
vendorCisco

techonogySecurity
overviewINCVDO, Cisco CyberVision Deployment and Operation, is a 3-day instructor-led course. Security is every enterprise’s top priority in today’s connected world and keeping enterprise architecture secure will protect business values and outcomes. Thus, a critical element to the success of any network is ensuring and maintaining security – it’s a need that is applicable to all networks and network devices, including those that power Cisco Internet of Things technologies and solutions. In an effort to simplify cybersecurity and increase device visibility within systems utilized by our IoT customers and partners, Cisco introduces Cisco Cyber Vision – a software cybersecurity solution for Operations Technology (OT). This course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays IoT Extended Enterprise and IT – OT integration using Cyber Vision. The goal of this course is to help the student understand the types of attacks, the types of targets and the tools available to protect the Industrial IoT architecture and to use Cyber Vision to keep the IoT infrastructure safe. Practical skills will be achieved using real-world scenarios and examples in a lab developed for such a purpose. Cisco Cyber Vision provides organizations the ability to gain visibility into industrial environments including full details of what assets are on the network, how those assets are communicating, and application level understanding of operational information. As a result, Cisco Cyber Vision provides views and capabilities, including integrations, that can be leveraged by security teams, IT infrastructure teams, and operational teams to ensure system integrity and protect against cyber risks.
objective

Upon completion of this course, the learner will be able to meet these overall objectives:

  • Explain the common vulnerabilities in the IoT deployments.
  • Explain the cybersecurity approach for IoT architectures.
  • Define the Cyber Vision main concepts.
  • Describe Cyber Vision solution portfolio.
  • Describe and use the Cyber Vision GUI.
  • Identify and explain Cyber Vision Installation and Support procedures.
  • Define Cyber Vision Assessment.
  • Identify Cyber Vision Assessment components.
  • Explain and use Cyber Vision Asset solution.
  • Describe and use Cyber Vision API for Automation.
  • Identify Cyber Vision use cases.

outline

Lesson 1: Industrial Internet of Things Security Threats

  • Describe security threats and potential impacts on the network
  • Understand the security challenges faced by the IIoT staff on a daily basis
  • Explain why Cisco Validated Designs lead to a more secure infrastructure
  • Describe security threats in the Extended Enterprise network

Lesson 2: Introducing Cyber Vision

  • Cybersecurity overview in IIoT deployments
  • Cyber Vision overview
  • Cyber Vision solution components
  • Cyber Vision installation procedure

Lesson 3: Cyber Vision Concepts

  • Preset
  • Filters
  • Component
  • Activity
  • Flow
  • Time span
  • Tags
  • Properties
  • Vulnerabilities
  • Events
  • Credentials
  • Variable accesses

Lesson 4: Cyber Vision GUI Exploration

  • General Dashboard
  • Preset Views
  • Panels
  • Reports
  • Events
  • Monitor
  • Search
  • Admin
  • Systems Statistics
  • My Settings

Lesson 5: Cyber Vision Operation

  • Using General Dashboard
  • Explore Preset Views and Panels
  • Examine and generate Reporting features
  • Working with Events, Alerts and Audits.
  • Using Monitor Mode and its Views
  • Describing and Exploring Monitor Mode Differences
  • Creating Baselines from default preset and from groups
  • Defining with Weekend Baselines
  • Enabling and using Baselines
  • Cyber Vision Use Cases
  • Administering Cyber Vision System and Data Management
  • Cyber Vision Center and Sensors general administration
  • Administering Users
  • Administering Events
  • Administering Licensing
  • Working with RBAC and LDAP Settings
  • Exploring and using Cyber Vision API
  • Cyber Vision Context Information Exchange with pxGrid
  • IDS functionality with SNORT
  • Cyber Vision Integrations and Extensions
  • Working with My Settings

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco Security.
  • Sound knowledge of Internet of Things Concepts.
  • Sound knowledge of IIoT Architectures.

titleCIOTOC – Configuring & Operating Cisco IoT Operations Center
days3
seo_titleCIOTOC - Configuring & Operating Cisco IoT Operations Center
seo_decToday, data governs all aspects of business decision making helping to improve efficiencies across the organization.
seo_tkeyCIOTOC
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewCIOTOC, Configuring and Operating Cisco IoT Operations Center, is a 3-day instructor-led course. Today, data governs all aspects of business decision making helping to improve efficiencies across the organization. Digitization requires Enterprise Applications to communicate to all assets while enterprises are converging to IP/Ethernet/Wireless Networks and need to keep every IoT deployment safe. Additionally, the impact of the pandemic is driving organizations to look to the Internet of Things (IoT) not just for efficiencies but also for resiliency. To adapt and thrive in the new normal, organizations need simplified management systems to proactively monitor and troubleshoot their IT–OT infrastructure in the Industrial IoT Architecture. The goal of this course is to help the student acquire the knowledge and skills needed to understand and face the IoT Management Challenges and to use and operate IoT Operations Center software solution in order to achieve a centrally controlled and continuously operating IoT infrastructure. Practical skills will be achieved using real-world scenarios and examples in a lab developed for such a purpose. Cisco IoT Operations Center provides organizations the ability to simplify IoT management using a single portal for OT/IT to deploy, manage, monitor and maintain their IoT network, assets and data in the cloud or on-premise.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Explain the challenges in IoT infrastructure management.
  • Explain Cisco’s IoT Management Model.
  • Identify IoT Management Challenges.
  • Identify IoT Operations Center Deployment Options.
  • Describe IoT Operations Center Solution Concepts and Components.
  • Configure and Operate Edge Device Manager.
  • Configure and Operate Edge Intelligence Management.
  • Configure and Operate Industrial Asset Vision.
  • Configure and Operate Mesh Endpoints.
  • Describe and use IoT Operations Center API for Automation.
  • Identify IoT Operations Center use cases.

outline

Lesson 1: Industrial Internet of Things Overview

  • IoT Concepts Review
  • Customer IoT Journey
  • Portfolio Overview

Lesson 2: Introducing Cisco IoT Operations Center

  • IoT Management Challenges
  • IoT Management Product Portfolio
  • Cisco Network Management Solution Positioning
  • IoT Management Model
  • Cisco IoT Operations Center Overview
  • Features and Benefits
  • IoT Operations Center Licensing

Lesson 3: Cisco IoT Operations Center Administration and Operation

  • IoT Operations Center Deployment
  • Supported Devices
  • Edge Device Manager Configuration and Operation
  • Edge Intelligence Management Configuration and Operation
  • Industrial Asset Vision Configuration and Operation
  • Mesh Endpoints Configuration and Operation
  • IoT Operations Center GUI exploration
  • Topology/Field Devices View
  • Devices Management
  • OT Assets
  • Alarms
  • IoT Operations Center API
  • pxGrid Integration
  • IoT Operations Center Management

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Basic knowledge of IoT Management
  • Sounded knowledge of Internet of Things Concepts
  • Sounded knowledge of IIoT Architectures

titleNXEWS – Networking Express for Engineers Workshop
days2
seo_titleNXEWS - Networking Express for Engineers Workshop
seo_decThis Cisco Express Networking training course does require some fundamental knowledge. Students should be familiar with network operation, basic network security, and wireless.
seo_tkeyNXEWS
categorynetworking
vendorCisco

techonogyEnterprise Networking
overviewWith the 2 day Cisco Express Networking specialization, you will focus on Meraki technologies as a point of entry into the Cisco portfolio and gain exposure to foundational Cisco technologies. This Cisco Express Networking training course does require some fundamental knowledge. Students should be familiar with network operation, basic network security, and wireless. Course modules cover Cisco Networking, Portfolio and Switching Solutions, Routing Portfolio and Solutions, Wireless Portfolio and Solutions, Security Portfolio and Solution, and more. This Networking Express for Engineers Workshop is intended for channel partners. Find additional course information below!
objective

After you complete this course you should be able to pass the Networking Express for Engineers exam which includes:

  • Describe and explain networking express
  • Describe, explain, and identify switching product portfolio
  • Explain and identify switching positioning
  • Describe and explain routing features
  • Describe and explain Mobility Express features
  • Explain and identify wireless tools and resources
  • Describe, explain, and identify security product portfolio
  • Describe, explain, and identify Cisco Active Advisor SE programs
  • Describe, explain, and identify FindIT SE programs
  • Describe and explain Meraki cloud architecture design
  • Describe and explain Meraki datacenter reliability and security
  • Describe and explain the Meraki WLAN (MR) platform and features
  • Describe and explain the Meraki security appliance (MX) platform and features
  • Describe and explain the Meraki switching (MS) platform and features
  • Describe and explain the Meraki security cameras (MV) platform and feature
  • Describe and explain the Meraki licensing model
  • Describe and explain the Meraki support model

outline

Day 1: Routing and Switching

Module 1: Introduction to Cisco Networking

  • Lesson 1: Overview
  • Lesson 2: Market Trends and Drivers

Module 2: Portfolio and Switching Solutions

  • Lesson 1: Switching Overview
  • Lesson 2: Cisco Switching Solutions
  • Lesson 3: Switching Product Portfolio
  • Lesson 4: Positioning Cisco Switching Solutions and Products
  • Lesson 5: Cisco Switching Tools and Resources

Module 3: Introduction to Routing Portfolio and Solutions

  • Lesson 1: Routing Overview
  • Lesson 2: Routing Product Portfolio
  • Lesson 3: Positioning Cisco Routing
  • Lesson 4: Cisco Routing Tools and Resources

Module 4: Introduction to Wireless Portfolio and Solutions

  • Lesson 1: Build or Expand a Wireless Practice
  • Lesson 2: Mobility Express Overview
  • Lesson 3: Mobility Express Products and Features
  • Lesson 4: Cisco Wireless Products RF Planner
  • Lesson 5: Wireless Resources

Module 5: Introduction to Security Portfolio and Solution

  • Lesson 1: Branch Threat Defense Umbrella
  • Lesson 2: Security in the Digital Age
  • Lesson 3: Security Portfolio Overview
  • Lesson 4: Security Sales Resources

Module 6: Programs, Support, Services, Software, and Resources

  • Lesson 1: Programs – Cisco Active Advisor
  • Lesson 2:  Programs – FindIT
  • Lesson 3: Support Services

Day 2: Meraki

Module 7: Meraki Overview

  • Lesson 1: The Meraki Mission
  • Lesson 2: Cloud Based Management
  • Lesson 3: Zero Touch Provisioning

Module 8: Meraki MR – Wireless LAN

  • Lesson 1: Overview
  • Lesson 2: Features
  • Lesson 3: Models
  • Lesson 4: Performance

Module 9: Meraki MX – Security Appliances

  • Lesson 1: Overview
  • Lesson 2: Dashboard
  • Lesson 3: Intrusion Prevention
  • Lesson 4: Threat protection

Module 10: Meraki MS – Switches

  • Lesson 1: Access and Aggregation
  • Lesson 2: Zero Touch Provisioning
  • Lesson 3: Deployment
  • Lesson 4: Management

Module 11: Meraki SM – Mobility Management

  • Lesson 1: Cloud Based Enterprise Mobility Management
  • Lesson 2: Device On Boarding
  • Lesson 3: Policy Automation

Module 12: Meraki MC – Collaboration

  • Lesson 1: Cloud Managed Communication
  • Lesson 2: Products
  • Lesson 3: Features

Module 13: Meraki MV – Surveillance

  • Lesson 1: Automatic Network Detection
  • Lesson 2: MV Cameras
  • Lesson 3: Video Sharing

Module 14: Meraki APIs – Developer Platforms

  • Lesson 1: Meraki developers’ platform and community (APIs)
  • Lesson 2: API Integration

Module 15: Meraki Sales Cycle

  • Lesson 1: Sales Resources
  • Lesson 2: Meraki opportunities
  • Lesson 3: Meraki demos

Module 16: Meraki Licensing, Support, and Warranty

  • Lesson 1: Meraki licensing model
  • Lesson 2: Meraki support mode

target_au

The primary audience for this course is as follows:

  • Channel Partners

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Familiarity with Wireless
  • Familiarity with Network operation
  • Understanding of basic network security

titleHXIAVR – HyperFlex Implementation and Administration with VR
days3
seo_titleHXIAVR - HyperFlex Implementation and Administration with VR
seo_decThis HyperFlex training course provides an introduction to hyper-converged infrastructure and presents the Cisco HyperFlex (HX) hardware and software architecture.
seo_tkeyHXIAVR
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewHyperFlex Implementation and Administration with Virtual Reality (HXIAVR) is a 3-day instructor-led course. This HyperFlex training course provides an introduction to hyper-converged infrastructure and presents the Cisco HyperFlex (HX) hardware and software architecture. HX use cases and solutions based on Cisco Validated Designs (CVD) are presented as well as performance advantages of the HX platform over competing vendors. Pre-installation requirements, best practices and post installation requirements are delivered in conjunction with the HX Data Platform Installer as a utility to streamline cluster creation and validation. The learner will also get virtual hands on experience with racking and connecting HyperFlex devices in a virtual environment using NterOne’s ClearConnect VR application. Additional topics include troubleshooting and upgrading HX, creating HyperFlex stretched clusters and installing HX within Hyper-V environments. Practical skills will be achieved using real-world scenarios and examples in a traditional lab as well as a state-of-the-art virtual reality environment developed by NterOne.
objective

Upon completion of this course, the student will be able to meet these overall objectives:

  • Define the concept of Software Defined Storage in Hyperconverged Infrastructure
  • Describe the architecture, components, features and operation of Cisco HyperFlex Systems
  • Rack HyperFlex family devices.
  • Install, configure, deploy, manage and monitor Cisco HyperFlex Systems
  • Describe pre-installation, best practices and post-installation requirements for Cisco HyperFlex Systems
  • Configure a Cisco HyperFlex Stretched Cluster
  • Describe Cisco HyperFlex Systems Use Cases

outline

Lesson 1: Introduction to Hyper-converged Infrastructure (HCI)

  • Identify the components of a Hyper-converged Infrastructure (HCI)
  • Understand the challenges that are being addresses by Hyper-converged Infrastructure
  • Explain the benefits of an HCI solution
  • Present the components and physical topology of the Cisco HyperFlex with Application Centric Infrastructure (ACI) solution

Lesson 2: Cisco HyperFlex Systems Hardware and Software Architecture

  • What’s New in HX v4.x
  • Describe the Virtualization Platforms options for HypeFlex: VMWare, Hyper-V, Containers with Kubernetes
  • Understand the capabilities and functionality of the HyperFlex Hybrid, All-Flash and NVMe server platform
  • Describe the HyperFlex HX Compute Only solution
  • Describe the HyperFlex HX Edge solution
  • Present the Cisco HyperFlex HX Data Platform hardware components
  • Describe the Cisco HyperFlex system architecture
  • Understand the advanced storage features and performance enhancements of the HyperFlex cluster
  • Identify the hardware functionality of the Hyperflex HX server nodes
  • Describe the management and connectivity details for various HyperFlex HX cluster deployments

Lesson 3: Cisco HyperFlex Systems Use Cases, Solutions and Performance

  • Introduce the Cisco Validated Design (CVD) guides that are available for the HyperFlex HX Data Platform solution
  • Describe the Cisco HyperFlex All-Flash Systems for Deploying Microsoft SQL Server Database validated design details
  • Present the Cisco HyperFlex M5 All-Flash Hyperconverged System with up to 600 Citrix XenDesktop Users validated design details
  • Identify and compare the performance advantages of the Cisco HyperFlex HCI solution with other vendors for Oracle OLTP, SQL Server and mixed workload operating environments

Lesson 4: HyperFlex Pre-installation Requirements in VMware

  • Review the software requirements for VMware ESXi
  • Describe the physical requirements for successful HX cluster deployment
  • Present the network requirements for HX Data Platform installation
  • Define the port requirements for VMware ESXi and vCenter
  • Identify the HyperFlex external connections
  • Provide the deployment information and variables required when using the HX Data Platform installer

Lesson 5: HyperFlex HX Data Platform Installation Best Practices

  • Confirm the configuration requirements of the northbound switches that are connected to the HyperFlex cluster
  • Present the Cisco UCS configuration parameters required for the HyperFlex Data Installer utility
  • Describe the VMware vCenter host, licensing and networking parameters that support successful of the HX Data Platform

Lesson 6: Installing Cisco HyperFlex Systems Using the HX Installer

  • Present the benefits of the HX Data Platform automation function to streamline Cisco UCS and VMware vCenter configuration
  • Describe the HyperFlex factory pre-installed hardware and software options
  • Identify the steps required to install, deploy and launch the HX Data Platform Installer
  • Describe HyperFlex cluster creation validation using UCS Manager and VMware vSphere Client/Web Client
  • Review installation procedures using Intersight

Lesson 7: Post-Installation Requirements for HX Data Platform

  • Describe the post installation capabilities of the HX Installer command line interface
  • Present the post install script as a streamlined to perform cluster administrative functions such as Auto Support, email alerts and password changes
  • Identify the HX vSphere Plug-in and the HX Connect utility as two methods to create and manage HyperFlex cluster datastores
  • Explain the use of the HX vSphere Plug-in to create snapshots and ReadyClone VM clones
  • Using Cisco Workload Optimization Manager to improve operation.

Lesson 8: Troubleshooting HX Data Platform Installation and Upgrades

  • Present issues that are commonly encountered during HX cluster creation and upgrade activities
  • Describe troubleshooting steps to validate and correct network connectivity problems due to misconfiguration of VLAN, frame size and quality of service parameters across vCenter, UCS and northbound switch platforms
  • Identify issues that cause virtual machine migration (vMotion) failure
  • Present the issues that prevent successful completion of HX cluster and node upgrades and provide corrective measures to complete the operations

Lesson 9: Upgrading the HX Data Platform

  • Present the upgrade features for HX Data Platform
  • Describe the HX Data Platform upgrade guidelines and recommendations
  • Identify the Cisco HX Data Platform upgrade matrix including Cisco UCS manager and VMware ESXi
  • Present the upgrade validations, pre-installation checks and pre-upgrade procedures
  • Describe the process to upgrade the Cisco UCS Infrastructure using UCS Manager
  • Describe the process to upgrade the HX Data Platform, Cisco UCS Server and VMware ESXi using the HX Connect utility

Lesson 10: HyperFlex Stretched Cluster Overview and Configuration

  • Introduce the HyperFlex Stretched Cluster architecture and pre-installation checklist requirements
  • Describe the process to download the witness VM installation image file and complete the configuration and deployment within vCenter
  • Present the process to create the Stretched Cluster Sites and run the Configure Site workflow for Sites A and B
  • Explain the required steps to create the HyperFlex Stretched Cluster and run the Create Stretch Cluster workflow

Lesson 11: HX Data Platform for the Hyper-V Environment

  • Describe the hardware, software network services and port requirements that support the installation of the HX Data Platform for the Hyper-V environment
  • Present the guidelines and limitations for creating the HyperFlex cluster using the HX Data Installer as well as DNS and Active Directory
  • Present the process to download the HX Data Installer VM and install the image onto a Hyper-V server
  • Define the steps required to deploy the HyperFlex cluster for Hyper-V using the HX Data Installer

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems and Hyperconvergence
  • Basic knowledge of servers and storage

titleDCSVR – Data Center Security with Virtual Reality
days2
seo_titleDCSVR - Data Center Security with Virtual Reality
seo_decThis course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays advanced Data Centers.
seo_tkeyDCSVR
categorydata-center-security
vendorCisco

techonogyDatacenter & Virtualization
overviewData Center Security with Virtual Reality (DCSVR) is a 2-day instructor-led course. Security is every enterprise’s top priority in today’s connected world and keeping Data Center secure will protect business values and outcomes. This course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays advanced Data Centers. The goal of this course is to help the student understand the types of attacks, the types of targets and the tools available to protect the DC. The learner will get virtual hands on experience with racking and connecting security appliances in a virtual environment using NterOne’s ClearConnect VR application. We will also discuss newer security solutions such as Application Centric Infrastructure (ACI), Stealth watch and Tetration to understand how logical separation, data mining and anomaly detection can help us protect the infrastructure. Practical skills will be achieved using real-world scenarios and examples in a traditional lab as well as a state-of-the-art virtual reality environment developed by NterOne.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Explain the common vulnerabilities in the Data Center
  • Understand Data Center Cisco Validated Designs
  • Identify the common attack vectors in the Data Center
  • Identify malicious activities
  • Identify patterns of suspicious behaviors across the Data Center
  • Secure device management in the Data Center
  • Explain Zero Trust Networking
  • Describe Firewall Features for the Data Center
  • Explain the advantages of AMP protection
  • Secure the Network with Umbrella
  • Understand the reports and information available from Stealthwatch
  • Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data

outline

Lesson 1: DC Security Threats

  • Describe security threats and potential impacts on the network
  • Understand the security challenges faced by the DC staff on a daily basis
  • Explain why Cisco Validated Designs lead to a more secure infrastructure
  • Describe security threats in the storage network
  • Explain Zero Trust Networking

Lesson 2: Protecting the Management Network

  • Discuss options for in band and out of band management
  • Describe role-based access control
  • Explain the role of TACACS and Identity Services Engine (ISE) for device administration control

Lesson 3: Firewalling the Data Center

  • Positioning the Firewall Within Data Center Networks
  • Cisco Firepower Portfolio
  • Describe advanced policy configuration and Firepower system configuration options
  • Configure policies to find and stop Ransomware
  • Configure Correlation events, white rules, traffic profiles, and create respective events and remediate them
  • Understand network and host based AMP on a server
  • Configure and analyze host based AMP on a server
  • Firewall Virtualization
  • Design for Threat Mitigation
  • Threat Mitigation Integration with other Cisco products

Lesson 4: Umbrella Integration

  • Umbrella and Available Features Overview
  • Destination Lists
  • Content Categories
  • Application Settings
  • Tenant Controls
  • Security Settings
  • Integrations
  • Selective Decryption Lists
  • DNS Policies
  • Firewall Policies
  • Virtual Appliance
  • Core Reports
  • Management Reports
  • Integrating Umbrella within Cisco SecureX

Lesson 5: Stealthwatch in the Data Center

  • Explain what Cisco Stealthwatch is and how it works.
  • Describe the goals of using Cisco Stealthwatch in the proactive and operational modes.
  • Define basic concepts of investigation and detection of potential security issues using the Cisco Stealthwatch System.
  • Complete workflows to identify indicators of compromise in your network.
  • Describe alarm types and alarm notification within Cisco Stealthwatch.
  • Explain the utility of maps in the Cisco Stealthwatch System.
  • Describe how the Cisco Stealthwatch System contributes to successful incident handling

Lesson 6: Utilizing Tetration in the Data Center

  • Enable pervasive visibility of traffic across datacenter infrastructure
  • Uses long term data retention for forensics and analysis
  • Create communication and dependencies for all applications within the datacenter
  • Empower the company to utilize a whitelist policy model
  • Identify behavior deviation in real time
  • Perform forensics operations

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco Security
  • Basic knowledge of Cisco Data Center Architecture
  • Basic knowledge of servers, storage, and security appliances

titleICUCSVR – Installation and Configuration of the Cisco Unified Computing System with Virtual Reality
days3
seo_titleInstallation and Configuration of the Cisco Unified Computing System with Virtual Reality
seo_decIn this Cisco UCS server training course, you will become experienced with the installation, configuration, and troubleshooting of Cisco Unified Computing System (UCS) B-Series.
seo_tkeyICUCSVR
categoryunified-computing
vendorCisco

techonogyDatacenter & Virtualization
overviewInstallation and Configuration of the Cisco Unified Computing System with Virtual Reality (ICUCSVR) is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the installation, configuration, and troubleshooting of Cisco Unified Computing System (UCS) B-Series. The learner will also get virtual hands on experience with racking and connecting UCS devices in a virtual environment using NterOne’s ClearConnect VR application. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager as the primary interface. Using real-world scenarios and examples in a traditional lab as well as a state-of-the-art virtual reality environment developed by NterOne, this Cisco training course will explore all of the components of the UCS B-Series from a day to day administrative point of view. Learn UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central.
objective

Upon completing this course, the learner will be able to meet the following overall objectives:

  • Understand the B-Series product line similarities and differences
  • Describe UCS managed architectures
  • Install and rack UCS family devices.
  • Understand the process for upgrading B-Series Firmware
  • Administering service profiles, pools, and policies
  • Understanding RBAC with Active Directory integration
  • Administering backup and restores in UCS Manager
  • Learn and discuss the various management tools for Cisco UCS
  • Perform basic troubleshooting of B-Series in normal operations

outline

Module 1: UCS Infrastructure Components

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: Exploring Cisco UCS User Interfaces
  • Lesson 3: Cisco UCS Management Framework and Features
  • Lesson 4: Rack, Stack, Power, and Console

Module 2: Configuring Cisco B-Series Servers

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: RBAC, Organizations, and Active Directory Integration
  • Lesson 3: Configuring Compute Node LAN Connectivity
  • Lesson 4: Configuring Compute Node SAN Connectivity
  • Lesson 5: Creating Identity and Resource Pools
  • Lesson 6: Creating Service Profiles with VMware
  • Lesson 7: Creating Templates and Cloning Service Profiles
  • Lesson 8: Managing Service Profiles
  • Lesson 9: Operating System Installation Options
  • Lesson 10: Backing Up and Restoring UCSM Database
  • Lesson 11: Upgrading UCS B-Series Firmware
  • Lesson 12: Troubleshooting Cisco UCS B-Series Configuration
  • Lesson 13: Troubleshooting Cisco UCS B-Series Operation

Module 3: UCS Management Tools Essentials

  • Lesson 1: UCS Management Tool Overview
  • Lesson 2: Introduction to UCS Central
  • Lesson 3: Introduction to Cisco Intersight

target_au

The primary audience for this course are as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems
  • Basic knowledge of servers, storage, and VMware

titleNS303 – Cisco NSO Administration and DevOps v3.0
days4
seo_titleNS303 - Cisco NSO Administration and DevOps v3.0
seo_decYou will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and you will learn best practices for using DevOps.
seo_tkeyNS303
categorynetworking
vendorCisco

techonogyDatacenter & Virtualization
overviewThis four day course, Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v3.0, focuses on Cisco® NSO development, operation, and administration tasks. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and you will learn best practices for using DevOps.
objective
outline

Section 1: Cisco NSO Administration

  • Introducing Network and IT Convergence
  • Introducing Cisco NSO Architecture
  • Introducing Linux
  • Explaining Setup
  • Explaining Access Control
  • Describing Integration Options

Section 2: Scalability

  • Introducing Scalability and High Availability
  • Describing Scalable System Management

Section 3: DevOps Fundamentals

  • Describing Software Development Methodologies
  • Explaining Version Control System
  • Describing Continuous Integration and Continuous Delivery

Section 4: Cisco NSO Operations

  • Introducing Service Maintenance
  • Performing Network Element Driver (NED) Upgrades
  • Introducing Configuration Management
  • Describing Change Management
  • Explaining Service Problem Management
  • Explaining Service Monitoring and Compliance Reporting
  • Cisco NSO and DevOps
  • Introducing Inventory Management
  • Describing Cisco NSO Use Cases

target_au

The primary audience for this course is as follows:

  • System installers
  • System integrators
  • System administrators
  • Network administrators
  • Solution designers

pre_req

Before you take this course, we recommend that you have the knowledge and skills obtainable by attending the Cisco Network Services Orchestrator Foundation (NSO201) class, including:

  • Basic knowledge of the command line of UNIX-like operating systems.
  • Basic knowledge of Network Configuration Protocol (NETCONF).
  • Basic knowledge of Yet Another Next Generation (YANG) data modelling.
  • Basic knowledge of Python software development.

titleDCNML – Managing LAN Infrastructure with Cisco Data Center Network Manager
days3
seo_titleManaging LAN Infrastructure with Cisco Data Center Network Manager
seo_decIn this course enhances your knowledge of managing LAN Infrastructure with Cisco Data Center Network Manager (DCNM) implementing a spine-and-leaf network fabric using DCNM.
seo_tkeyDCNML
categorydata-center-insoft-specials
vendorCisco

techonogyDatacenter & Virtualization
overviewThis 3-day course, Managing LAN Infrastructure with Cisco Data Center Network Manager (DCNML), enhances your knowledge of managing LAN Infrastructure with Cisco Data Center Network Manager (DCNM) implementing a spine-and-leaf network fabric using DCNM with Virtual Extensible LAN (VXLAN), Ethernet VPN (EVPN), and Border Gateway Protocol (BGP). You will learn how the integration of spine-and-leaf network fabric with Cisco Data Center Network Manager increases overall data center infrastructure uptime and reliability, thereby improving business continuity. It provides a robust framework and comprehensive feature set that meets the routing, switching, and storage administration needs of data centers. Cisco DCNM streamlines the provisioning for the unified fabric and monitors the SAN (Storage area network) and LAN (Local area network) components.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe the components and functionality of DCNM.
  • Describe the software define network protocols of VXLAN, eVPN and BGP.
  • Deploy a DCNM environment in high-availability environment.
  • Operate the DCNM discovery process to acquire management of all devices.
  • List high lever navigation features of DCNM and utilize the DCNM GUI (Graphical User Interface) to optimize data center topologies.
  • Manage and monitor data center LAN fabric from DCNM.
  • Program RESTful APIs native to DCNM to perform any network management task.
  • Troubleshoot and monitor the network using DCNM troubleshooting tools.
  • Describe the benefits of DCNM Network Insights.

This course will help you:

  • Acquire the advanced skills and techniques to use spine-leaf topologies to provide better scalability and more seamless capacity and support for devices and lines.
  • Gain the necessary skills to maximize the benefits of DCNM by integrating automation, and greater visibility into network infrastructure and elimination of configuration errors with templated deployment models.

outline

Section 1: Introducing Cisco DCNM LAN

  • Cisco DCNM Introduction
  • Cisco DCNM LAN Solution Overview

Section 2: Deploying VXLAN EVPN with Cisco DCNM LAN

  • VXLAN Overlays and Underlays
  • Easy Fabric VXLAN EVPN Underlay Model

Section 3: Deploying Cisco DCNM

  • Cisco DCNM High Availability
  • Cisco DCNM Installation Requirements

Section 4: Discovering Existing Network Devices with Cisco DCNM

  • Configure Switches for Discovery

Section 5: Exploring the Data Center with Cisco DCNM Topology

  • Access Topology View in the GUI
  • Navigate the Map Views and Layouts

Section 6: Managing and Monitoring the Data Center with Cisco DCNM LAN

  • Manage the Configuration Archive
  • Deploy Changes to the Fabric

Section 7: Automating Cisco DCNM Programmatically

  • Explore APIs for the Network
  • REST API Tool

Section 8: Troubleshooting and Monitoring Cisco DCNM

  • Troubleshoot and Monitor Cisco DCNM

Section 9: Describing Network Insights

  • Network Insights Advisor

target_au

The primary audience for this course is as follows:

  • Data Network Engineers and Administrators
  • Data Center Technical Managers

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Understanding of Cisco routing and switching in a data center.
  • CCNA certification recommended.
  • Fundamentals of network management.

titleConfiguring VXLANs on Cisco Nexus 9000 Series Switches (DCVX9K) v1.0
days2
seo_titleConfiguring VXLANs on Cisco Nexus 9000 Series Switches
seo_decThe Configuring VXLANs on Cisco Nexus 9000 Series Switches (DCVX9K) v1.0 course shows you how to deploy Virtual Extensible LAN (VXLAN) on the Cisco Nexus® 9000 Series Switches.
seo_tkeyDCVX9K
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Configuring VXLANs on Cisco Nexus 9000 Series Switches (DCVX9K) v1.0 course shows you how to deploy Virtual Extensible LAN (VXLAN) on the Cisco Nexus® 9000 Series Switches. Through expert instruction and hands-on lab exercises, you will learn how to implement Border Gateway Protocol (BGP), VXLAN, and Ethernet VPN (EVPN), and to monitor and troubleshoot VXLAN operation.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand and describe the operation of the Cisco Nexus 9000 series of switches
  • Configure BGP operation on the Cisco Nexus 9000 series of switches
  • Configure VXLAN and EVPN operation on the Cisco Nexus 9000 series of switches
  • Troubleshoot the Cisco Nexus 9000 series of switches, including EVPN/VXLAN operation
  • Build your skills to enable large-scale virtualized and multi-tenant data centers using Cisco Nexus 9000 Series Switches
  • Gain hands-on practice using Cisco Nexus 9000 Series Switches

outline
  • Topology Options for Cisco Nexus 9000 Series
    • Traditional Data Center Topologies on the Cisco Nexus 9000
    • Spine and Leaf Topologies on the Cisco Nexus 9000 Series Switches
    • Overlay Topologies on the Cisco Nexus 9000 Series Switches
    • Cisco Nexus 9000 Hardware Basics
    • Cisco Nexus 9500 Series Chassis
    • Cisco Nexus 9300 Series Switches
    • Cisco Nexus 9500 Series Packet Processing
  • BGP Overview and Configuration
    • BGP Attributes and Route Processing
    • Basic BGP Configuration
  • VXLAN and EVPN on Cisco Nexus 9000 Series Switches
    • VXLAN Network with Multiprotocol BGP (MP-BGP) EVPN Control Plane
    • VXLAN and EVPN Configuration
  • Monitoring and Troubleshooting VXLAN Operations
    • VXLAN EVPN Diagnostic show Commands
    • VXLAN EVPN Diagnostic debug Commands
    • VXLAN EVPN Troubleshooting Steps
    • VXLAN EVPN Troubleshooting Sample Scenarios

target_au

The primary audience for this course is as follows:

  • Data Center Engineers
  • Systems Engineers
  • Technical Solutions Architects
  • Product specialists in data center technical roles
  • Cisco Integrators and Partners

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Familiarity with Cisco Ethernet switching products
  • Understanding of Cisco Data Center architecture

titleIOT – Essentials Sales and Technical Training
days1
seo_titleIOT - Essentials Sales and Technical Training | IT Training
seo_decIn this course, IoT Essentials: Sales & Technical Training, we’ll dive into Cisco’s high-level strategy and vision for IoT.
seo_tkey
categoryinternet-of-things-courses
vendorCisco

techonogyCisco
overviewIn this course, IoT Essentials: Sales & Technical Training, we’ll dive into Cisco’s high-level strategy and vision for IoT, and explore the underlying guiding principles which will help you in your customer engagements as you become an advisor in their IoT journey. In addition, we will explore the IoT Portfolio, where we cover ‘what to sell’ with a high-level overview of Cisco’s entire landscape of offerings for the infrastructure, applications, and resources that serve as the building blocks for your customers’ IoT solutions. Finally, we will break down the ‘where to sell’ question. The student will learn how, as a Cisco Partner, to create awareness of how you can help your customer navigate their IoT journey. You will be able to position yourself and your organization to support your customers in their IoT journey by leveraging Cisco’s Portfolio of IoT products, solutions, and services. This course will help prepare the student to take the 700-825 exam.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand the guiding principles to help in the customer engagements.
  • Understand an overview of the Cisco IoT product offerings.
  • Understand how to assist customers in their IoT journey.

outline

IoT Portfolio Overview

  • Delivering Value Now
  • Industrial Switching Portfolio
  • Industrial Routing Portfolio
  • Industrial Wireless Portfolio
  • Industrial Security Portfolio
  • Cisco DNA & Intent-based Networking
  • Cisco Industrial Network Director
  • IOx and Edge Computing
  • Kinetic Portfolio
  • DevNet Resources

Sales Play: Extended Enterprise Opportunity

  • Extended Enterprise Opportunity
  • Sales Plays and Use Cases
  • Key Takeaways

Sales Play: Remote and Mobile Assets Opportunity

  • Remote and Mobile Assets Opportunity
  • Customer Use Cases

Sales Play: Industry Solutions Opportunity

  • Opportunities with Industry Plays
  • Manufacturing Sales Plays
  • Transportation and Roadways Plays
  • Oil and Gas Plays
  • Utilities Sales Plays

target_au

The primary audience for this course is as follows:

  • Individuals preparing for the Cisco IoT Essentials for Account Managers (700-825) exam.

pre_req

This course has no formal prerequisites, but it is recommended that students have the following:

  • Experience with and interest in working with customers to determine, measure, and deliver business outcomes through the implementation of technology.
  • Time spent in a customer facing role, including technical sales, system engineering, or similar will be especially helpful.

titleOEMBST – Catalyst 9K, Nexus 9K, VXLAN Implementation & Administration
days5
seo_titleCatalyst 9K, Nexus 9K, VXLAN Implementation & Administration
seo_decThe purpose of the VXLAN IPv6 Networking training is to provide implementation and administration knowledge.
seo_tkeyOEMBST
categorynetwork-virtualization
vendorCisco

techonogyEnterprise Networking
overviewThe purpose of the VXLAN IPv6 Networking training is to provide implementation and administration knowledge on the hardware and software, geared towards VA technical staff.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Learn how to Implement and Administer a next generation network leveraging the latest Cisco Catalyst 9000 series switches, Cisco Nexus 9000 switches and VXLAN.

outline

Section 1: OSPF basics

Section 2: BGP basics

Section 3: IPv6 basics

Section 4: Overview of VXLAN

Section 5: Intro to Spine, Leaf, Border Leaf, Intermediary

Section 6: VXLAN Underlay

Section 7: VXLAN Overlay

Section 8: VXLAN Overlay

Section 9: Layer 2 VNI for isolated networks segments

Section 10: Layer 3 VNI for non-isolated networks segments

Section 11: VXLAN Troubleshooting


target_au

The primary audience for this course is as follows:

  • Network engineers
  • Network administrators
  • Network support technicians
  • Help desk technicians

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic understanding of enterprise routing and switching

titleSWAT – Cisco Stealthwatch Tuning
days2
seo_titleSWAT - Cisco Stealthwatch Tuning
seo_decCisco Stealthwatch Tuning is a two-day course which provides resources to make the configuration and use of the Cisco Stealthwatch System manageable.
seo_tkeySWAT
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewCisco Stealthwatch Tuning is a two-day course which provides resources to make the configuration and use of the Cisco Stealthwatch System manageable. The course builds on the content introduced in the Cisco Stealthwatch for Security Operations, Cisco Stealtwatch for Network Operations and Cisco Stealthwatch for System Administrators courses.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe how the Cisco Stealthwatch Enterprise system provides network visibility through monitoring and detection.
  • Define tuning and how it helps the Stealthwatch system create actionable alarms.
  • Use the stages of the tuning process to identify workflows and best practices to operationalize Stealthwatch

outline

Module One

  • Course Introduction
  • Cisco Stealthwatch Tuning Course Overview
  • The Purpose of Tuning
  • Understanding Security Events and Alarms
  • Defining Stealthwatch Policies

Module Two

  • Posture the System
  • Host Locks and Custom Security Events
  • Response Management
  • Tiered Alarms
  • Culminating Scenario: Tuning
  • Tuning Best Practices in Stealthwatch
  • Cisco Stealthwatch Tuning Course Outcomes
  • Course Conclusion

target_au

The primary audience for this course is as follows:

  • Individuals who are responsible for tuning the Stealthwatch System, creating and maintaining policies, monitoring traffic, and obtaining and responding to actionable alarm.

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Cisco Stealthwatch for Security Operations
  • Cisco Stealthwatch for Network Operations
  • Stealthwatch Foundation

titleIBNTRN – Transforming to a Cisco Intent-Based Network
days5
seo_titleIBNTRN - Transforming to a Cisco Intent-Based Network
seo_decTransforming to a Cisco Intent-Based Network (IBNTRN), teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™).
seo_tkeyIBNTRN
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewThis 5-day course, Transforming to a Cisco Intent-Based Network (IBNTRN), teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended.
objective

Upon successful completion of this course, students will be able to meet these overall objectives:

  • Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components.
  • Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco
  • Identity Services Engine (Cisco ISE) for Automation and Assurance.
  • Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access.
  • Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding.
  • Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network.
  • Introduce Cisco SD-Access, describe the different node types in the fabric and the two level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access.
  • Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes.
  • Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network.
  • Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless.
  • Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution
  • Describe the use cases and migration scenarios for migrating users from traditional campus to SD

outline
  • Introducing Cisco DNA Architecture
  • Cisco DNA Center Design
  • Cisco DNA Center Inventory
  • Cisco DNA Center Automation
  • Explore Cisco DNA Center and Automating
  • Network Changes
  • Introducing Cisco Software-Defined Access
  • Deploying Cisco Software-Defined Access
  • Deploy Wired Fabric Networks with Cisco DNA Center
  • Cisco SD-Access for Wireless
  • Cisco SD-Access Extension for IoT
  • Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
  • Migrating to Cisco SD-Access
  • Cisco SD-Access Multicast
  • Integrating Cisco DNA Center
  • Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications
  • Understanding Programmable Network Infrastructure
  • Operating and Managing Cisco DNA Infrastructure
  • Test Drive Cisco DNA Center APIs

target_au

The primary audience for this course is as follows:

  • Channel partners and resellers
  • Network administrators
  • Network engineers
  • Sales engineers
  • System engineers
  • Technical architects
  • Technical support personnel

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Understanding of network routing and switching principles equivalent to a CCNP® Enterprise level
  • Experience with Cisco Unified Wireless Network technologies
  • Experience with Cisco ISE, 802.1x, and Cisco TrustSec
  • Understanding of segmentation technologies such as VLANs and Virtual Routing and Forwarding (VRF)
  • Basic understanding of overlay technologies such as Virtual Extensible LAN (VXLAN)
  • Basic understanding of Locator ID Separation Protocol (LISP).

titleDNAAS – Leveraging Cisco Intent-Based Networking DNA Assurance
days3
seo_titleDNAAS - Leveraging Cisco Intent-Based Networking DNA Assurance
seo_decLeveraging Cisco Intent-Based Networking DNA Assurance (DNAAS), course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco® Digital Network Architecture (Cisco DNA™) Assurance.
seo_tkeyDNAAS
categorydata-center
vendorCisco

techonogyDatacenter & Virtualization
overviewThis 3-day course, Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS), course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco® Digital Network Architecture (Cisco DNA™) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer.
objective

Upon successful completion of this course, students will be able to meet these overall objectives:

  • Explain the benefits of using Cisco DNA Center in a traditional, enterprise network
  • Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts
  • Discuss the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance
  • Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends
  • Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause
  • Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications

outline

Introducing Cisco DNA Center Assurance

  • Cisco DNA Center and Intent-Based Network Management Automation
  • Cisco DNA Center System Architecture

Monitoring Health and Performance with Cisco DNA Center Assurance

  • Cisco DNA Center Assurance Functional Components
  • Cisco DNA Center Assurance Data Analytics and Metrics

Troubleshooting Issues, Observing Insights and Trends

  • Detect Issues, Insights, and Trends in the Network
  • Observe Trends, Insights, and Comparative Analysis

Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools

  • Review of Assurance Tools for Troubleshooting Wireless Networks
  • Use Sensor Tests to Troubleshoot Wireless Networks

target_au

The primary audience for this course is as follows:

  • Network administrators
  • Network operators

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Internet web browser usability knowledge
  • Working knowledge of TCP/IP networking
  • Familiarity with network management concepts such as Simple Network Management Protocol (SNMP), Syslog, and NetFlow

titleFortiEDR
days2
seo_titleFortiEDR Training | Insoft Services
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this two days class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality.
objective

After completing this course, you should be able to:

  • Explain the FortiEDR approach and how it works
  • Identify the communicating components and how they are configured
  • Schedule, organize, and tune a new deployment
  • Carry out basic troubleshooting steps, including: verifying that FortiEDR is installed and actively blocking malware, identifying whether FortiEDR has blocked a process or connection, finding logs, and contacting FortiEDR Support
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, and viewing system events
  • Complete basic tasks in of each area of the management console: the Dashboard, the Event Viewer, the Forensics tab, the Threat Hunting module, Communication Control, Security Policies, Playbooks, Inventory, and the Administration tab
  • Manage security events and their status
  • Block communication from applications that are risky or unwanted, but not inherently malicious
  • Define next-generation antivirus, its role in FortiEDR, and where it falls in the order of operations
  • Find and remove malicious executables from all the devices in your environment
  • Use RESTful API to manage your FortiEDR environment
  • Administer a multi-tenant environment
  • Recognize what Fortinet Cloud Service is and how it works
  • Troubleshoot collector upgrades and performance issues
  • Obtain collector logs and memory dumps
  • Have a basic understanding of the history of malware, how it exploits trust, and the persistence techniques used in malware today
  • Triage PowerShell and CScript events, verify their destinations, and retrieve memory
  • Prioritize, investigate, and analyze security events
  • Remediate malicious events and create exceptions to allow safe processes

outline
  1. Overview and Technical Positioning
  2. Installation and Architecture
  3. Administration
  4. Best Practices and Deployment
  5. The User Interface in Depth Part 1
  6. The User Interface in Depth Part 2
  7. Events and Alerting
  8. Help Desk Level 1 Triage
  9. Communication Control
  10. Next-Generation Antivirus
  11. Threat Hunting
  12. RESTful API
  13. Multi-Tenancy
  14. Fortinet Cloud Services
  15. Advanced Troubleshooting
  16. Endpoint Security 101
  17. PowerShell and CScript
  18. Alert Analysis 401

target_au

IT and security professionals involved in the administration and support of FortiEDR should attend this course.


pre_req
  • Basic understanding of cybersecurity concepts

titleSD-WAN
days2
seo_titleSD-WAN Training | Insoft Services
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this two days course, you will learn about common SD-WAN deployment scenarios using Fortinet Secure SD-WAN solutions. You will explore different situations, from a single enterprise site, to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments.
objective

After completing this course, you should be able to:

  • Describe capabilities of the Fortinet Secure SD-WAN solution
  • Configure basic SD-WAN features
  • Configure advanced SD-WAN features
  • Differentiate basic static routing from the advanced dynamic routing capabilities of the Fortinet Secure SD-WAN solution
  • Configure SD-WAN with advanced VPN features
  • Integrate FortiOS SD-WAN solutions with FortiManager for central management

outline
  1. Introduction
  2. Routing, Sessions, and Performance SLA
  3. SD-WAN Rules
  4. Traffic Shaping
  5. Integration
  6. Advanced IPsec
  7. Auto-discovery VPN (ADVPN)

target_au

Anyone responsible for the day-to-day management of a Fortinet SD-WAN deployment and network operation.


pre_req
  • Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager
  • It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure
    • NSE 5 FortiManager

titleAdvanced Analytics
days3
seo_titleNSE 7 - Advanced Analytics Training | Insoft Services
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this three days course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn to add various organizations to FortiSIEM and discover devices from each organization. You will learn to differentiate logs and events from each organization and apply appropriate rules. You will dive deep into rules and their architecture. You will also learn about incidents and how they are generated when a rule is triggered. You will learn about different clear conditions. You will also dive deep into baseline calculations performed on FortiSIEM. You will learn to create your own baseline profile and run queries based on the profile. Finally, you will learn the methods of remediation available on FortiSIEM. In interactive labs, you will explore the role of FortiSIEM in a service provider environment. You will configure FortiSIEM in a cluster with a worker and NFS server for data storage. You will add organizations to FortiSIEM and manage the scope of each organization. You will register collectors from those organizations on FortiSIEM. You will also register Linux and Windows agents. You will analyze events from different organizations and understand how those events trigger some of the built-in rules. You will create your own rules and generate security events to trigger incidents for those rules.
objective

After completing this course, candidates will be able to:

  • Identify various implementation requirements for a multi-tenant FortiSIEM deployment
  • Understand how FortiSIEM can be deployed in a hybrid environment with and without collectors
  • Understand EPS restrictions on FortiSIEM
  • Define organizations on FortiSIEM and assign collectors to organizations
  • Deploy collectors in a multi-tenant solution
  • Register collectors on the supervisor
  • Understand the impact of excessive collectors on a FortiSIEM cluster
  • Identify the impact of excessive collectors on a FortiSIEM cluster
  • Manage EPS assignment on collectors
  • Manage collector high availability
  • Maintain and troubleshoot a collector installation
  • Install Windows and Linux agents and identify the benefits of log collection through agents
  • Understand agent architecture and associate templates with Windows and Linux agents
  • Understand rule processes architecture and differentiate between a rule worker and a rule master
  • Understand how the rule engine sliding time window works when it is evaluating rules
  • Understand the out-of-the-box single pattern security rules and how to create rules by evaluating security events
  • Define actions for a single pattern security rule
  • Understand incident generation and identify the attributes that trigger an incident
  • Identify multiple pattern security rules and define conditions and actions for them
  • Understand how baseline data is useful in creating conditions in rules
  • Differentiate between a standard report and a baseline report
  • Understand the built-in baseline profile and learn to create your own baseline profiles
  • Understand how statistical average and standard deviation calculations are performed on FortiSIEM
  • Understand hourly buckets for weekdays and weekends
  • Clone and edit some out-of-the-box baseline rules
  • Understand clear conditions on FortiSIEM and walk through a rule with clear conditions
  • Learn about remediation options on FortiSIEM and analyze some out-of-the-box remediation scripts

outline
  1. Introduction to Multi-tenancy
  2. Defining Collectors and Agents
  3. Operating Collectors
  4. FortiSIEM Windows and Linux Agents
  5. Rules Breakdown
  6. Single Subpattern Security Rule
  7. Multiple Subpattern Rules
  8. Introduction to Baseline
  9. Baseline Rules
  10. Clear Conditions
  11. Remediation

target_au

Security professionals involved in the management, configuration, administration, and monitoring of FortiSIEM devices in an enterprise or service provider deployment used to monitor and secure the networks of customer organizations should attend this course.

Participants should have a thorough understanding of all the topics covered in the NSE 5 FortiSIEM course before attending the NSE 7 Advanced Analytics course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts
  • Basic understanding of SIEM products
  • Basic understanding of Linux

It is highly recommended that you have an understanding of the topics covered in the NSE 5 FortiSIEM course.


titleSecure Access
days3
seo_titleSecure Access - Fortinet Training in the UK | Insoft Services
seo_decWith the Secure Access course, you will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this three days course, you will learn how FortiGate, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity over wired and wireless networks. You will also learn how to provision, administer, and monitor FortiAP and FortiSwitch devices using FortiManager. This course covers the deployment, integration, and troubleshooting of advanced authentication scenarios, as well as best practices for securely connecting wireless and wired users. You will learn how to keep the network secure by leveraging Fortinet Security Fabric integration between FortiGate, FortiSwitch, FortiAP, and FortiAnalyzer to automatically quarantine risky and compromised devices using IOC triggers.   See other Fortinet courses
objective

After completing this course, you should be able to:

  • Configure advanced user authentication and authorization scenarios using RADIUS and LDAP
  • Troubleshoot user authentication and authorization problems
  • Implement two-factor authentication using digital certificates
  • Implement and troubleshoot RADIUS and syslog single sign-on solutions
  • Provision, configure, and manage FortiSwitch using FortiManager over FortiLink
  • Configure Layer 2 authentication for wired and wireless users using 802.1.x
  • Provision, deploy, and manage FortiAP using FortiManager over FortiLink
  • Deploy complex wireless networks with dynamic VLAN assignments
  • Implement and deploy wireless network with IoT segmentation
  • Secure the wired and wireless network
  • Provide secure access to guest users
  • Monitor and analyze wireless clients and traffic using Wireless Manager
  • Automatically quarantine wired and wireless clients using IOC triggers

outline
  1. RADIUS and LDAP
  2. Certificate-Based Authentication
  3. Radius and Syslog Single Sign-On
  4. Centralized Management
  5. FortiSwitch
  6. Port Security
  7. Integrated Wireless
  8. Guest Access
  9. Enhanced Wireless

target_au

This course is intended for networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate, FortiManager, FortiAP, FortiSwitch, and Wireless Manager devices used to secure access to their organizations’ resources.


pre_req
  • Knowledge of network authentication protocols
  • Knowledge of Layer 2 switching
  • Understanding of wireless networks
  • Understanding of the topics covered in the following courses:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure
  • An understanding of the topics covered in the following courses is also recommended:
    • NSE 5 FortiManager
    • NSE 6 FortiAuthenticator
    • NSE 6 Integrated and Cloud Wireless

titleWindows Server 2019 Administration
days5
seo_title
seo_dec
seo_tkey
categorywindows-server
vendorMicrosoft

techonogy
overviewThis five days instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations.
objective
outline

Module 1: Windows Server Administration Overview
This module describes how to distinguish different Windows Server 2019 editions and techniques for deployment, servicing and activation. The module also introduces Windows Server Core and compares it with the Desktop Experience version. The module describes tools and concepts for adminstering Windows Server, such as Windows Admin Center, PowerShell, and delegation of privileges.
Lessons

  • Overview of Windows Server administration principles and tools
  • Introducing Windows Server 2019
  • Windows Server Core Overview

Lab : Deploying and configuring Windows Server

  • Deploying and configuring Server Core
  • Implementing and using remote server administration

After completing this module, students will be able to:

  • Describe Windows Server as well as techniques for deployment, servicing and activation.
  • Describe Windows Server Core, its specifics and ways to administer it.

Module 2: Identity Services in Windows Server
This module introduces identity services and describes Active Directory Domain Services (AD DS) in a Windows Server environment. The module describes how to deploy domain controllers in AD DS, as well as the Azure Active Directory (AD) and the benefits of integrating Azure AD with AD DS. The module also covers Group Policy basics and how to configure group policy objects (GPOs) in a domain environment. Finally, the modules describes the role of Active Directory certificate services and certificate usage.

Lessons

  • Overview of AD DS
  • Deploying Windows Server domain controllers
  • Overview of Azure AD
  • Implementing Group Policy
  • Overview of Active Directory Certificate Services

Lab : Implementing identity services and Group Policy

  • Deploying a new domain controller on Server Core
  • Configuring Group Policy
  • Deploying and using certificate services

After completing this module, students will be able to:

  • Describe AD DS in a Windows Server environment.
  • Deploy domain controllers in AD DS.
  • Describe Azure AD and benefits of integrating Azure AD with AD DS.
  • Explain Group Policy basics and configure GPOs in a domain environment
  • Describe the role of Active Directory certificate services and certificate usage

Module 3: Network Infrastructure services in Windows Server
This module describes how to implement core network infrastructure services in Windows Server. The modules covers how to deploy, configure and manage DNS and IPAM. The modules also describes how to use Remote Access Services.
Lessons

  • Deploying and managing DHCP
  • Deploying and managing DNS services
  • Deploying and managing IPAM

Lab : Implementing and configuring network infrastructure services in Windows Server

  • Deploying and configuring DHCP
  • Deploying and configuring DNS

After completing this module, students will be able to:

  • Describe, deploy and configure DHCP service.
  • Deploy, configure and manage DNS.
  • Describe, deploy and manage IPAM.

Module 4: File Servers and Storage management in Windows Server
This modules describes how to configure file servers and storage in Windows Server. The module covers file sharing and deployment of Storage Spaces technology. The module describes how to implement data deduplication, iSCSI based storage in Windows Server, and finally, how to deploy DFS.

Lessons

  • Volumes and file systems in Windows Server
  • Implementing sharing in Windows Server
  • Implementing Storage Spaces in Windows Server
  • Implementing Data Deduplication
  • Implementing iSCSI
  • Deploying Distributed File System

 

  • Implementing Data Deduplication
  • Configuring iSCSI storage
  • Configuring redundant storage spaces
  • Implementing Storage Spaces Direct

After completing this module, students will be able to:

  • Implement sharing in Windows Server
  • Deploy Storage Spaces technology
  • Implement the data deduplication feature
  • Implement iSCSI based storage
  • Deploy and manage Distributed File System (DFS)

Module 5: Hyper-V virtualization and containers in Windows Server
This modules describes how to implement and configure Hyper-V VMs and containers. The module covers key features of Hyper-V in Windows Server, describes VM settings, and how to configure VMs in Hyper-V. The module also covers security technologies used with virtualization, such as shielded VMs, Host Guardian Service, admin-trusted and TPM-trusted attestation, and KPS.

Lessons

  • Hyper-V in Windows Server
  • Configuring VMs
  • Securing virtualization in Windows Server
  • Containers in Windows Server
  • Overview of Kubernetes

Lab : Implementing and configuring virtualization in Windows Server

  • Creating and configuring VMs
  • Installing and configuring containers

After completing this module, students will be able to:

  • Describe the key features of Hyper-V in Windows Server.
  • Describe VM settings and deploy and configure VMs in Hyper-V.
  • Explain the use of security technologies for virtualization.
  • Describe and deploy containers in Windows Server.
  • Explain the use of Kubernetes on Windows.

Module 6: High Availablity in Windows Server
This module describes current high availability technologies in Windows Server. The module describes failover clustering and considerations for implementing it, and how to create and configure failover clustering. The module also explains stretch clusters and options for achieving high availability with Hyper-V VMs.

Lessons

  • Planning for failover clustering implementation
  • Creating and configuring failover cluster
  • Overview of stretch clusters
  • High availability and disaster recovery solutions with Hyper-V VMs

Lab : Implementing failover clustering

  • Configuring iSCSI storage
  • Configuring a failover cluster
  • Deploying and configuring a highly available file server
  • Validating the deployment of the highly available file server

After completing this module, students will be able to:

  • Describe failover clustering and the considerations for implementing it.
  • Create and configure failover clusters.
  • Describe stretch clusters.
  • Describe options to achieve high availability with Hyper-V VMs.

Module 7: Disaster recovery in Windows Server
This module describes disaster recovery technologies in Windows Server and how to implement them. The module covers how to configure and use Hyper-V Replica and describes Azure Site Recovery. The module also covers how to implement Windows Server backup and describes the Azure Backup service.
Lessons

  • Hyper-V Replica
  • Backup and restore infrastructure in Windows Server

Lab : Implementing Hyper-V Replica and Windows Server Backup

  • Implementing Hyper-V Replica
  • Implementing backup and restore with Windows Server Backup

After completing this module, students will be able to:

  • Describe and implement Hyper-V Replica.
  • Describe Azure Site Recovery.
  • Describe and implement Windows Server backup.
  • Describe the Azure Backup service.

Module 8: Windows Server security
This module describes Windows Server security features and how to implement them. The module covers credentials used in Windows Server and explains how to implement privileged access protection. In addition to describing methods and technologies for hardening Windows Server security, the module explains how to configure Just Enough Administration (JEA) and how to secure SMB traffic. Finally, the module covers Windows Update, its deployment and management options.

Lessons

  • Credentials and privileged access protection in Windows Server
  • Hardening Windows Server
  • Just Enough Administration in Windows Server
  • Securing and analyzing SMB traffic
  • Windows Server update management

Lab : Configuring sercurity in Windows Server

  • Configuring Windows Defender Credential Guard
  • Locating problematic accounts
  • Implementing LAPS

After completing this module, students will be able to:

  • Describe credentials used in Windows Server.
  • Explain how to implement privileged access protection.
  • Describe methods and technologies to harden security in Windows Server.
  • Describe and configure Just Enough Administration (JEA).
  • Secure SMB traffic in Windows Server.
  • Describe Windows Update and its deployment and management options.

Module 9: Remote Desktop Services in Windows Server
This module describes key Remote Desktop Protocol (RDP) and Virtual Desktop Infrastructure (VDI) features in Windows Server. The modules covers how to deploy session-based desktops and describes personal and poled virtual desktops.

Lessons

  • Remote Desktop Services Overview
  • Configuring a session-based desktop deployment
  • Overview of personal and pooled virtual desktops

Lab : Implementing RDS in Windows Server

  • Implementing RDS
  • Configuring RemoteApp collection settings
  • Configuring a virtual desktop template

After completing this module, students will be able to:

  • Describe Remote Desktop Services (RDS) in Windows Server.
  • Describe and deploy session-based desktops.
  • Describe personal and pooled virtual desktops.

Module 10: Remote access and web services in Windows Server
This module describes how to implement virtual private networks (VPNs), Network Policy Server (NPS), and Microsoft Internet Information Services (IIS). The module provides an overview of remote access services and describes Always On VPN functionality, as well as how to configure NPS and Web Server (IIS) in Windows Server.

Lessons

  • Overview of RAS in Windows Server
  • Implementing VPNs
  • Implementing NPS
  • Implementing Always On VPN
  • Implementing Web Server in Windows Server

Lab : Deploying network workloads

  • Implementing Web Application Proxy
  • Implementing VPN in Windows Server
  • Deploying and Configuring Web Server

After completing this module, students will be able to:

  • Describe VPN options in Windows Server.
  • Describe Always On VPN functionality.
  • Describe and configure NPS.
  • Describe and configure Web Server (IIS).

Module 11: Monitoring, performance, and troubleshooting
This module describes how to implement service and performance monitoring, and apply troubleshooting in Windows Server. The module highlights monitoring tools and describes how to monitor performance, including event logging and how to perform event logging monitoring for troubleshooting purposes.

Lessons

  • Overview of Windows Server monitoring tools
  • Using Performance Monitor
  • Monitoring event logs for troubleshooting

Lab : Monitoring and troubleshooting Windows Server

  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs
  • Identifying the source of a performance problem
  • Describe monitoring tools in Windows Server.
  • Describe performance monitoring and use it in Windows Server.
  • Describe event logging and perform event logging monitoring for troubleshooting purposes.

Module 12: Upgrade and migration in Windows Server
This module describes how to perform upgrades and migrations for AD DS, Storage, and Windows Server. The module covers tools to use for AD DS migration. The module also covers the Storage Migration Service, and finally, Windows Server migration tools and usage scenarios.

Lessons

  • AD DS migration
  • Storage Migration Service
  • Windows Server migration tools

Lab : Migrating Server workloads

  • Selecting a process to migrate server workloads
  • Planning how to migrate files by using Storage Migration Service

After completing this module, students will be able to:

  • Describe tools to use for AD DS migration.
  • Describe the Storage Migration Service.
  • Describe Windows Server migration tools and their usage scenarios.

target_au

This course is intended for Information Technology (IT) Professionals who have some experiencing working with Windows Server and are looking for a single five-day course that covers core administration components and technologies in Windows Server 2019. This course also helps server administrators from previous Windows Server versions to update their knowledge and skills related to Windows Server 2019. Additionally, this course can help individuals looking for preparation materials to pass exams related to Windows Server. The course is also to individuals from a service desk role who wish to transition into server maintenance.


pre_req
  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
  • Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
  • An awareness of basic security best practices.
  • Experience working hands-on with Windows client operating systems such as Windows 8, Windows 8.1 or Windows 10.
  • Basic experience with Windows PowerShell.

titleAZ-104T00-A: Microsoft Azure Administrator
days4
seo_titleAZ-104T00-A: Microsoft Azure Administrator
seo_dec
seo_tkey
categoryazure
vendorMicrosoft

techonogyEnterprise Networking
overviewThis course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.
objective

You will learn,

  • Identity
  • Governance and Compliance
  • Azure Administration
  • Virtual Networking
  • Intersite Connectivity
  • Network Traffic Management
  • Azure Storage
  • Azure Virtual Machines
  • Serverless Computing
  • Data Protection and
  • Monitoring

outline

Module 1: Identity

In this module, you will learn how to secure identities with Azure Active Directory, and implement users and groups.

Lessons

  • Azure Active Directory
  • Users and Groups

After completing this module, students will be able to:

  • Secure and manage identities with Azure Active Directory.
  • Implement and manage users and groups.

Module 2: Governance and Compliance

In this module, you will learn about managing your subscriptions and accounts, implementing Azure policies, and using Role-Based Access Control.

Lessons

  • Subscriptions and Accounts
  • Azure Policy
  • Role-based Access Control (RBAC)

After completing this module, students will be able to:

  • Implement and manage Azure subscriptions and accounts.
  • Implement Azure Policy, including custom policies.
  • Use RBAC to assign permissions.

Module 3: Azure Administration

In this module, you will learn about the tools an Azure Administrator uses to manage their infrastructure. This includes the Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Templates. This module includes:

Lessons

  • Azure Resource Manager
  • Azure Portal and Cloud Shell
  • Azure PowerShell and CLI
  • ARM Templates

After completing this module, students will be able to:

  • Leverage Azure Resource Manager to organize resources.
  • Use the Azure Portal and Cloud Shell.
  • Use Azure PowerShell and CLI.
  • Use ARM Templates to deploy resources.

Module 4: Virtual Networking

In this module, you will learn about basic virtual networking concepts like virtual networks and subnetting, IP addressing, network security groups, Azure Firewall, and Azure DNS.

Lessons

  • Virtual Networks
  • IP Addressing
  • Network Security groups
  • Azure Firewall
  • Azure DNS

After completing this module, students will be able to:

  • Implement virtual networks and subnets.
  • Configure public and private IP addressing.
  • Configure network security groups.
  • Configure Azure Firewall.
  • Configure private and public DNS zones.

Module 5: Intersite Connectivity

In this module, you will learn about intersite connectivity features including VNet Peering, Virtual Network Gateways, and Site-to-Site Connections.

Lessons

  • VNet Peering
  • VPN Gateway Connections
  • ExpressRoute and Virtual WAN

After completing this module, students will be able to:

  • Configure VNet Peering.
  • Configure VPN gateways.
  • Choose the appropriate intersite connectivity solution.

Module 6: Network Traffic Management

In this module, you will learn about network traffic strategies including network routing and service endpoints, Azure Load Balancer, Azure Application Gateway, and Traffic Manager.

Lessons

  • Network Routing and Endpoints
  • Azure Load Balancer
  • Azure Application Gateway
  • Traffic Manager

After completing this module, students will be able to:

  • Configure network routing including custom routes and service endpoints.
  • Configure an Azure Load Balancer.
  • Configure and Azure Application Gateway.
  • Choose the appropriate network traffic solution.

Module 7: Azure Storage

In this module, you will learn about basic storage features including storage accounts, blob storage, Azure files and File Sync, storage security, and storage tools.

Lessons

  • Storage Accounts
  • Blob Storage
  • Storage Security
  • Azure Files and File Sync
  • Managing Storage

After completing this module, students will be able to:

  • Create Azure storage accounts.
  • Configure blob containers.
  • Secure Azure storage.
  • Configure Azure files shares and file sync.
  • Manage storage with tools such as Storage Explorer.

Module 8: Azure Virtual Machines

In this module, you will learn about Azure virtual machines including planning, creating, availability and extensions.

Lessons

  • Virtual Machine Planning
  • Creating Virtual Machines
  • Virtual Machine Availability
  • Virtual Machine Extensions

After completing this module, students will be able to:

  • Plan for virtual machine implementations.
  • Create virtual machines.
  • Configure virtual machine availability, including scale sets.
  • Use virtual machine extensions.

Module 9: Serverless Computing

In this module, you will learn administer serverless computing features like Azure App Service, Azure Container Instances, and Kubernetes.

Lessons

  • Azure App Service Plans
  • Azure App Service
  • Container Services
  • Azure Kubernetes Service

After completing this module, students will be able to:

  • Create an app service plan.
  • Create a web app.
  • Implement Azure Container Instances.
  • Implement Azure Kubernetes Service.

Module 10: Data Protection

In this module, you will learn about backing up files and folders, and virtual machine backups.

Lessons

  • File and Folder Backups
  • Virtual Machine Backups

After completing this module, students will be able to:

  • Backup and restore file and folders.
  • Backup and restore virtual machines.

Module 11: Monitoring

In this module, you will learn about monitoring your Azure infrastructure including Azure Monitor, alerting, and log analytics.

Lessons

  • Azure Monitor
  • Azure Alerts
  • Log Analytics
  • Network Watcher

After completing this module, students will be able to:

  • Use Azure Monitor.
  • Create Azure alerts.
  • Query using Log Analytics.
  • Use Network Watcher.

Labs

  • Lab : Manage Azure Active Directory Identities
  • Lab : Manage Subscriptions and RBAC
  • Lab : Manage Governance via Azure Policy
  • Lab : Manage Azure resources by Using the Azure Portal
  • Lab : Manage Azure resources by Using ARM Templates
  • Lab : Manage Azure resources by Using Azure PowerShell
  • Lab : Manage Azure resources by Using Azure CLI
  • Lab : Implement Virtual Networking
  • Lab : Implement Intersite Connectivity
  • Lab : Implement Traffic Management
  • Lab : Manage Azure storage
  • Lab : Manage virtual machines
  • Lab : Implement Web Apps
  • Lab : Implement Azure Container Instances
  • Lab : Implement Azure Kubernetes Service
  • Lab : Implement Data Protection
  • Lab : Implement Monitoring


target_au
pre_req

Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.

  • Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).

titleADCX – Data Center Fabric with EVPN and VXLAN
days5
seo_title
seo_dec
seo_tkey
categorydata-center-insoft-specials
vendorJuniper

techonogyJuniper
overviewThis 5 days course is designed to provide in-depth instruction on IP fabric and EVPN-VXLAN data center design and configuration. Additionally, the course will cover other data center concepts, including basic and advanced data center design options, Data Center Interconnect (DCI), EVPN multicast enhancements, and an introduction to data center automation concepts. The course ends with a multisite data center design lab. This content is based on Junos OS Release 17.4R1 and 18.2R1-S3. Associated Certification: Juniper Data Center Professional (JNCIP-DC)
objective

After you complete this course you will be able to:

  • Describe and configure an IP fabric
  • Describe and configure an EVPN-VXLAN data center
  • Identify and configure centrally routed bridging (CRB) EVPN-VXLAN designs
  • Identify and configure edge-routed bridging (ERB) EVPN-VXLAN designs
  • Evaluate basic and advanced data center design concepts
  • Describe and configure DCI
  • Describe enhancements to multicast functionality in an EVPN-VXLAN
  • Describe the role of multicloud data center controllers.

outline

Data Center Fundamentals Overview

  • Traditional Multitier Architecture Challenges
  • Next Generation Data Center Fabrics
  • Juniper Networks Data Center Platforms IP Fabric Configuration

IP Fabrics

  • IP Fabric Overview
  • IP Fabric Routing
  • IP Fabric Scaling
  • IP Fabric Configuration
  • Lab: IP Fabric

VXLAN Fundamentals

  • VXLAN Functions and Operations
  • VXLAN Implementation
  • VXLAN Gateways

EVPN Controlled VXLAN

  • Benefits of EVPN
  • VXLAN Using EVPN Control Plane

Configuring EVPN Controlled VXLAN

  • Configuring and Monitoring EVPN Signaling for VXLAN Routing
  • Lab: EVPN-VXLAN

Basic Data Center Architectures

  • Basic Data Center Architecture
  • Base Design
  • Design Options and Modifications
  • Lab: EVPN-VXLAN Layer 3 Gateways

Data Center Interconnect

  • DCI Overview
  • DCI Options for a VXLAN Overlay
  • EVPN Type 5 Routes
  • DCI Example
  • Lab: DCI

Advanced Data Center Architectures

  • Advanced Data Center Architectures
  • Base Design

EVPN Multicast

  • Multicast Overview
  • Multicast in an EVPN-VXLAN Environment

Introduction to Multicloud Data Center

  • Data Center Evolution
  • Contrail Enterprise Multicloud Use Cases

Comprehensive Data Center Lab

  • Data Center Architecture
  • Lab: Data Center Comprehensive Lab

Appendix A: Virtual Chassis Fabric

Appendix B: Virtual Chassis Fabric Management

Appendix C: Junos Fusion Data Center 

Appendix D: Multichassis LAG

Appendix E: Troublehsooting MC-LAG

Appendix F: ZTP

Appendix G: In-Service Software Upgrade

Appendix H: Troubleshooting Basics

Appendix I: Data Center Devices


target_au
  • Data Center Implementation Engineers and Data Center Design Engineers

pre_req

Attendees should meet the following prerequisites:

  • Understanding of the OSI model
  • Advanced routing knowledge—the Advanced Junos Enterprise Routing (AJER) course or equivalent knowledge
  • Intermediate switching knowledge—the Junos Enterprise Switching (JEX) course or equivalent knowledge
  • Intermediate to advanced Junos CLI experience

Recommended prerequisites:

  • JEX – Junos Enterprise Switching
  • AJER – Advanced Junos Enterprise Routing

titleMIST – Juniper Mist AI-Driven Networks
days4
seo_title
seo_dec
seo_tkey
categorynetworking
vendorJuniper

techonogyEnterprise Networking
overviewThis four-day course is designed to provide students with the knowledge required to work with enterprise wireless technologies and Mist AI-driven Wi-Fi networks. Students will gain in-depth knowledge of Wi-Fi technologies, Mist technologies, and how to use and configure them. Through demonstrations and hands-on labs, students will gain experience with the features and functionality of Mist AI-driven Wi-Fi.
objective

After successfully completing this course, you should be able to:

  • Describe WLAN association and roaming.
  • Explain the wireless LAN life cycle.
  • Explain and configure Mist architecture.
  • Describe a wireless enterprise network.
  • Explain the purpose of Mist and key differentiators.
  • Describe wireless fundamentals.
  • Describe the basic features Mist.
  • Describe how to add new organizations and sites.
  • Navigate the Mist portal.
  • Describe the Mist AP deployment model.
  • Provide an overview of the Mist onboarding workflow.
  • Implement RF and configuration templates.
  • Configure wireless access policies.
  • Describe the EX Series switch deployment model.
  • Describe the workflow for onboarding an EX Series switch to a Wired Assurance deployment.
  • Describe labels and their use with Mist.
  • Use Mist intelligent analytics and Marvis.
  • Describe Real Time Location Sensor (RTLS) concepts and methods.
  • Describe Mist automation and scripting.
  • Instantiate a standalone NGFW site using CSO and SRX Series devices.
  • Describe Service Level Experience and its place in wireless networks.
  • Describe the client location service and use cases.
  • Describe the components of an enterprise WLAN.
  • Configure an enterprise grade WLAN.
  • Describe a sitemap, site survey, and their critical components.
  • Describe the subscriptions available for Mist.
  • Describe the monitoring features.
  • Generate reports.

outline

Day 1

Chapter 1: Course Introduction

Chapter 2: WiFi Basics

  • What Is Wi-Fi?
  • 802.11 PHYs
  • Frequency Bands
  • RF Basics
  • Modulation and Coding
  • Network Arbitration and Contention
  • WLAN Architectures
  • WLAN Association and Roaming
  • Network Contention
  • Wireless LAN Life Cycle
  • LAB 1: WLAN Testing

 

Day 2

Chapter 3: Mist Architecture and Initial Setup

  • Mist Architecture
  • Mist Account Organizations and Subscriptions
  • Configuration Objects
  • Organization Objects Versus Site Objects
  • Access Points Overview, Configuration, and Troubleshooting
  • LAB 2: Initial Setup
  • LAB 3: Remote Site

 

Chapter 4: WLANs

  • WLAN Concepts
  • Security Concepts
  • Mist WLANs
  • Policy (WxLAN)
  • Wireless Intrusion Detection and Prevention
  • LAB 4: WLANs
  • LAB 5: Multiple PSK

 

 

Day 3

Chapter 5: RTLS

  • Wireless Assurance
  • Events and Insights
  • Radio Resources Management (RRM)
  • Wired Assurance
  • LAB 6: SLE Troubleshooting

 

Chapter 6: AI and Marvis

  • Artificial Intelligence (AI) Reactive and Proactive Troubleshooting
  • Reactive and Proactive Troubleshooting
  • Marvis Language and Actions
  • LAB 7: Marvis

 

 

Day 4

Chapter 7: Real Time Location Sensor (RTLS)

  • Concepts and Methods
  • Wi-Fi Location
  • Virtual BLE
  • User Engagement
  • Asset Visibility

 

Chapter 8: Automation and Scripting Overview

  • Mist API Overview
  • Automation and Scripting Overview
  • LAB 8: RESTful API
  • LAB 9: WebSocket API

target_au

This course benefits individuals responsible for working with enterprise wireless networks and applying artificial intelligence to their activities.


pre_req

The following are the prerequisites for this course:

  • Basic TCP/IP skills
  • Basic knowledge of wireless (Wi-Fi) technologies is recommended.

titleIJAUT – Introduction to Junos Platform Automation and DevOps
days3
seo_title
seo_dec
seo_tkey
categorynetwork-automation
vendorJuniper

techonogyJuniper
overviewThis three-day course provides students with introductory knowledge of how to automate Junos using DevOps automation tools, protocols, and technologies. Students receive hands-on experience with tools and languages relevant to automating the Junos OS platform in a DevOps environment. The course includes an introduction to the basic DevOps practices, Junos APIs, and NETCONF. It then focuses on using Python, PyEZ, Ansible, and REST API to automate Junos. XML, JSON, and YAML are introduced as these languages facilitate Junos automation. Through demonstrations and hands-on labs, students will gain experience in automating the Junos operating system and device operations. This course uses Junos OS Release 18.1R1, Junos PyEZ 2.1, and Ansible 2.5.
objective

After successfully completing this course, you should be able to:

  • Describe the Junos operating system and its basic design architecture.
  • Explain traffic processing for transit and exception traffic.
  • Describe the Junos CLI and its features.
  • List and perform initial configuration tasks.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe DevOps principles and practices.
  • Explain how DevOps can benefit an IT organization.
  • List and describe the various APIs Junos provides for automation.
  • Discuss various frameworks, libraries and tools available to automate Junos devices.
  • Read Junos XML documents.
  • Use XPath to navigate a Junos XML document.
  • Use NETCONF and the XML API to issue RPCs.
  • Use NETCONF and the XML API to configure a Junos device.
  • Understand JSON syntax.
  • Understand YAML syntax.
  • Create JSON and YAML documents.
  • Perform Ansible installation.
  • Retrieve information from Junos devices using Ansible.
  • Use Ansible to configure Junos devices.
  • Create and execute simple Python scripts.
  • Use the Python interactive interpreter.
  • Install Junos PyEZ.
  • Use PyEZ to connect to Junos devices.
  • Use PyEZ to issue RPCs.
  • Use PyEZ to modify a Junos device configuration.
  • Use PyEZ to upgrade Junos devices.
  • Describe basic PyEZ exception handling.
  • Describe the capabilities of the Junos REST API.
  • Use the Junos REST API Explorer.
  • Issue Junos REST API RPCs.

outline

Day 1

Chapter 1: Course Introduction

Chapter 2: Introduction to Junos OS

  • Junos OS Basic Design Architecture
  • Traffic Processing
  • CLI Modes and Features
  • Initial Configuration Tasks
  • Interface Types and Configuration
  • Lab 1: Configuring a Device using Junos CLI

 

Chapter 3: Introduction to DevOps

  • Why DevOps?
  • The Benefits of DevOps
  • DevOps Goals and Best Practices

 

Chapter 4: The Junos Automation Stack

  • The Junos Automation Stack and DevOps
  • Junos XML API Overview
  • Junos REST API Overview
  • Junos JET API Overview
  • Review of Junos Automation Tools

 

Day 2

Chapter 5: Introduction to XML and XPath

  • Basic XML Syntax
  • The Junos XML Schema
  • Navigating the Junos XML Schema with XPath
  • Lab 2: Working with XML and XPath

 

Chapter 6: The XML API and NETCONF

  • NETCONF
  • The Junos XML API
  • Languages and Libraries Used to Automate the Junos XML API
  • Case Study
  • Lab 3: Using XML and NETCONF for Automation

 

Chapter 7: Introduction to JSON and YAML

  • The Need to Structure Data
  • JSON Basics
  • YAML Basics
  • Use of JSON and YAML in Junos Automation
  • Lab 4: Using JSON and YAML

 

Chapter 8: Introduction to Ansible

  • Ansible Architecture and Capabilities
  • Ansible Playbook Basics
  • Using Ansible to Retrieve Junos Status Information
  • Using Ansible to Retrieve and Modify Configuration Information
  • Case Study
  • Lab 5: Using Ansible to Automate Junos

 

Chapter 9: Introduction to Python

  • Basic Python Syntax
  • Python 2 vs. Python 3
  • Python Data Types and Variables
  • Python Sequences, Tuples, Sets, and Dictionaries
  • Python Libraries
  • The Python Interactive Interpreter
  • Case Study: Creating a Python Script to Solve a Problem
  • Lab 6: Using the Python Interpreter

 

Day 3

Chapter 10: Introduction to XML and XPath

  • Connecting to Junos Devices with PyEZ
  • Retrieving Junos Device Status and Configuration Handling
  • Modifying the Junos Configuration with PyEZ
  • Using PyEZ utilities to upgrade Junos software
  • Case Study
  • Lab 7: Using PyEZ to Manage Junos Devices

 

Chapter 11: The Junos REST API

  • Overview of the Junos REST API
  • Methods of Connecting to the Junos REST API
  • Configuring the Junos REST API
  • Using the Junos REST API Explorer
  • Using the Junos REST API to Retrieve Junos Configuration Data
  • Case Study
  • Lab 4: Using the REST API

target_au

This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.


pre_req

Basic understanding of the OSI model and the TCP/IP protocol suite;

Basic understanding of computer networking concepts


titleIJSEC – Introduction to Junos Security
days3
seo_title
seo_dec
seo_tkey
categoryjunos-security
vendorJuniper

techonogyJuniper
overview
This 3-day course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration.   The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application-level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies.   Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.   This course is based on Junos OS Release 19.1R1.6.

objective

After completing this course you should be able to:

  • Identify high-level security challenges in today’s networks
  • Identify products that are incorporated into the Juniper Connected Security solution
  • Explain the value of implementing security solutions
  • Explain how Juniper Connected Security solves the cyber security challenges of the future
  • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide
  • Explain traffic flows through the SRX Series devices
  • List the different security objects and how to create them
  • Describe interface types and perform basic interface configuration tasks
  • Describe the initial configuration for an SRX Series device
  • Explain security zones
  • Describe screens and their use
  • Explain address objects
  • Describe services and their use
  • Describe the purpose for security policies on an SRX Series device
  • Describe zone-based policies
  • Describe global policies and their use
  • Explain unified security policies
  • Configure unified security policies with the J-Web user interface
  • Describe IDP signatures
  • Configure an IDP policy using predefined templates with the J-Web user interface
  • Describe the use and configuration of the integrated user firewall feature
  • Describe the UTM security services
  • List the available UTM services on the SRX Series device
  • Configure UTM filtering on a security policy with the J-Web user interface
  • Explain Sky ATP’s use in security
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats
  • Describe NAT and why it is used
  • Explain source NAT and when to use it
  • Explain destination NAT and when to use it
  • Explain static NAT and its uses
  • Describe the operation and configuration the different types of NAT
  • Identify various types of VPNs
  • Describe IPsec VPNs and their functionality
  • Describe how IPsec VPNs are established
  • Describe IPsec traffic processing
  • Configure IPsec VPNs with the J-Web user interface
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface
  • Monitor IPsec VPNs with the J-Web user interface
  • Describe the J-Web monitoring features
  • Explain the J-Web reporting features
  • Describe the Sky Enterprise service and how it can save resources
  • Explain the functionality of Junos Space Security Director

outline

Juniper Security Concepts

  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security

Juniper Connected Security – SRX Series Devices

  • Connected Security
  • Interfaces
  • Initial Configuration
  • LAB 1: Initial Configuration

Security Objects

  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects
  • LAB 2: Creating Security Objects with J-Web

Security Policies

  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies
  • LAB 3: Creating Security Policies with J-Web

Security Services – IDP and User Firewall

  • IDP Security Services
  • Integrated User Firewall
  • LAB 4: Adding IDP and User Firewall Security Services to Security Policies

Security Services – UTM

  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam
  • LAB 5: Adding UTM Security Services to Security Policies

Juniper Connected Security – Sky ATP

  • Sky ATP Overview
  • Blocking Threats
  • Lab 6: Demonstrating Sky ATP

Network Address Translation

  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT
  • Lab 7: Implementing Network Address Translation

IPsec VPN Concepts

  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing

Site-to-Site VPNs

  • IPsec Configuration
  • IPsec Site-to-Site Tunnel
  • Lab 8: Implementing Site-to-Site IPsec VPNs

Monitoring and Reporting

  • J-Web monitoring options
  • J-Web Reporting options
  • Lab 9: Using Monitoring and Reporting

Appendices

  • Appendix A: SRX Series Hardware
  • Appendix B: Virtual SRX
  • Appendix C: CLI Primer
  • Appendix D: Sky Enterprise Services
  • Appendix E: Junos Space Security Director

target_au

Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.


pre_req

Attendees should meet the following prerequisites:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite

titleEMCC – Enterprise Multicloud Automation and Orchestration Using Contrail
days3
seo_title
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis three-day course is designed to provide knowledge of how to use Contrail Enterprise Multicloud in cloud networks. Through demonstrations and hands-on labs, students will gain experience in working with Contrail Enterprise Multicloud in Kubernetes, OpenShift, VMware vCenter, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) environments. Students will also learn how to secure cloud networks with Contrail Security, service chaining, and Juniper cSRX. This course is based on Contrail Release 2003. Enterprise Multicloud Automation and Orchestration Using Contrail (EMCC) is an advanced-level course
objective

After successfully completing this course, you should be able to:

  • Describe the benefits of Contrail Enterprise Multicloud.
  • Describe the use cases of Contrail Enterprise Multicloud.
  • Understand the Contrail Enterprise Multicloud architecture.
  • Explain Kubernetes architecture.
  • Explain how Contrail integrates with Kubernetes.
  • Understand how Contrail Security is used with Kubernetes.
  • List main deployment methods for Contrail with Kubernetes.
  • Explain Red Hat OpenShift architecture.
  • Explain how Contrail integrates with Red Hat OpenShift.
  • Understand how to launch OpenShift workloads and connect them over Contrail Virtual Networks.
  • Understand how Contrail Security is used with Red Hat OpenShift.
  • Explain vCenter architecture.
  • Understand vCenter integration with Contrail.
  • Describe how to connect vCenter workloads using Contrail virtual networks.
  • Describe how to use Contrail Security features to secure vCenter workloads.
  • Understand how VMware vRealize Orchestrator works with Contrail.
  • Explain the main AWS concepts.
  • Describe how to launch AWS workloads with Contrail Enterprise Multicloud .
  • Describe how to connect AWS workloads to private cloud over Contrail VNs.
  • Explain the main Azure concepts.
  • Describe how to launch Azure workloads with Contrail Enterprise Multicloud .
  • Describe how to connect Azure workloads to private cloud over Contrail VNs.
  • Explain the main GCP concepts.
  • Describe how to launch GCP workloads with Contrail Enterprise Multicloud .
  • Describe how to connect GCP workloads to private cloud over Contrail VNs.
  • Describe service chaining within Contrail.
  • Configure In-Network, In-Network-NAT, and Transparent service chains.
  • Understand route leaking, policies, and aggregation in service chains.
  • Understand the features of Juniper cSRX.
  • Configure cSRX service chains

outline

Chapter 1: Course Introduction

Chapter 2: Contrail Enterprise Multicloud Overview

  • CEM Overview
  • CEM Use Cases
  • CEM Architecture

 

Chapter 3: Using Contrail with Kubernetes

  • Kubernetes Architecture
  • Contrail Integration Overview
  • Service and Ingress
  • Workload Isolation
  • Using Contrail Security
  • Deploying Contrail with Kubernetes
  • Lab 1: Contrail and Kubernetes Integration

 

Chapter 4: Using Contrail with Red Hat OpenShift

  • Red Hat OpenShift Overview
  • OpenShift Architecture and Contrail Integration
  • Working with OpenShift and Contrail
  • Case Study
  • Lab 2: Contrail and OpenShift Integration

Chapter 5: Using Contrail with VMware vCenter

  • Overview of VMware vCenter and Contrail Integration
  • Using Contrail vCenter Fabric Manager Plugin
  • Using Contrail Virtual Machine
  • Instantiating vCenter Workloads over Contrail Virtual Networks
  • Securing vCenter Workloads with Contrail Security
  • Contrail and VMware vRealize Orchestrator
  • Lab 3: Contrail and vCenter Integration

 

Chapter 6: Private to Public Cloud Overlay Networking – AWS

  • AWS and Contrail Overview
  • Deploying Contrail Multicloud for AWS
  • Lab 4: Interconnecting Private Cloud Workloads to AWS Workloads

 

Chapter 7: Private to Public Cloud Overlay Networking – Azure

  • Azure and Contrail Overview
  • Deploying Contrail Multicloud for Azure
  • Lab 5: Interconnecting Private Cloud Workloads to Azure Workloads

Chapter 8: Private to Public Cloud Overlay Networking – GCP

  • Google Cloud Platform (GCP) Overview
  • Deploying Contrail Multicloud for GCP

 

Chapter 9: Contrail Service Chains

  • Service Chaining Overview
  • Service Chain Configuration
  • Advanced Service Chain Operation
  • Lab 6: Creating Contrail Service Chains

 

Chapter 10: Service Chaining with cSRX

  • cSRX Overview
  • Multiple Interface Pods in Kubernetes
  • Service Chaining with cSRX
  • Lab 7: Creating Service Chains with cSRX

target_au

The primary audience for this course includes network engineers, administrators, support personnel, and reseller support personnel, responsible for working with Contrail-based networking solutions in data center and enterprise cloud environments.


pre_req

The prerequisites for this course are as follows:

  • TCP/IP networking knowledge
  • Working knowledge of cloud networks
  • Attended Cloud Automation Using Contrail (CAC) course

Recommended prerequisites:


titleJCF – Juniper Cloud Fundamentals
days3
seo_title
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis three-day course is designed to provide students with an understanding of cloud enabled networks, cloud service deployment concepts, and virtualized network platforms such as vSRX and vMX. This course provides a high level overview and understanding of the following concepts:
  • Cloud Network Underlays
  • Cloud Network Overlays
  • Cloud Design
  • Cloud Implementation Methods
  • Cloud Services
  • Juniper Networks Virtualized Platforms

objective
  • Describe network overlay and underlay concepts.
  • Describe private, public, and hybrid cloud architecture and implementation.
  • Describe the implementation of services in a cloud networking environment.
  • Describe the implementation and functions of the Juniper vSRX platform.
  • Describe the implementation and functions of the Juniper vMX platform.
  • Describe the implementation and functions of the Juniper NFX platform.
  • Describe the role of Juniper Networks virtualized platforms in public cloud offerings.
  • Describe the functionality and use of Juniper Networks Cloud Connector.
  • Describe the need for Software Defined Networking.
  • Describe basic SDN concepts.
  • Describe common types of SDN implementation.
  • Describe the main Network Function Virtualization components.
  • Describe cloud services monitoring.
  • Describe the functions of AppFormix in cloud services.
  • Describe SDN WAN concepts.
  • Describe the role, functions, and features of the NorthStar Controller.
  • Describe the role, functions, and features of WANDL/IP MPLS View.
  • Describe the role and functions a vCPE and uCPE components.
  • Describe the role and functions of Contrail Service Orchestration.
  • Describe Software Defined Secure Network concepts.
  • Describe methods to secure an SDN environment.

outline

Day1:

1.Course Introduction

2. Cloud Components:

  • Cloud Networking Definition
  • Cloud Architecture
  • XaaS 3 Virtualized Platforms
  • Juniper Networks Virtualized Platforms
  • Juniper Networks Virtualized Platforms in Public Clouds
  • Cloud Connector Lab: Deploying Juniper Networks Virtual Devices – vMX

3.Virtualized Platforms

  •  Juniper Networks Virtualized Platforms
  • Juniper Networks Virtualized Platforms in Public Clouds
  • Cloud Connector Lab: Deploying Juniper Networks Virtual Devices – vMX

Lab: Deploying Juniper Networks Virtual Devices – vMX

4. SDN Fundamentals:

  • The Need for SDN
  • SDN Explained
  • OpenFlow Based SDN
  • SDN as an Overlay
  • SDN via API
  • Applications of SDN

 Day2:

5. Network Function Virtualization:

  • Introduction to NFV
  • NFV Architecture
  • Examples of VNFs

Lab: Manually Deploying VNFs

 

 6.Orchestration and Automation

  • Managing a Cloud Infrastructure
  • OpenStack for Orchestration
  • Contrail/OpenContrail SDN Controller

NSX for SDN

 

 7.AppFormix:

  • Operations Management
  • AppFormix Operation and Use Cases

Lab: AppFormix

 

8.SD WAN Solutions:

  • SD WAN Concepts
  • NorthStar SD WAN Controller
  • NorthStar Controller Use Cases
  • WANDL IP/MPLSView

9.Cloud CPE:

  • Legacy Versus Cloud CPE Architecture
  • Cloud CPE with Contrail Service Orchestration

Lab: Cloud CPE (video demonstration)

 

10 Cloud Security :

  • Legacy Network Security
  • Cloud Security Concepts
  • SDSN Components Lab

Cloud Security using SkyATP


target_au

This course benefits individuals responsible for planning and coordinating cloud enabled networks and services in data center, private cloud, public cloud, hybrid cloud, service provider, and enterprise WAN environments.


pre_req

Students should have basic TCP/IP skills, a general understanding of data center environments, a general understanding of enterprise WAN environments, and a basic understanding of virtualization


titleIJSA – Implementing Juniper Networks Secure Analytics
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogy
overviewThis three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.   Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4. Implementing Juniper Networks Secure Analytics is an introductory-level course.
objective
  • After successfully completing this course, you should be able to:
  • Describe the JSA system and its basic functionality.
  • Describe the hardware used with the JSA system.
  • Identify the technology behind the JSA system.
  • Identify the JSA system’s primary design divisions—display versus detection, and events versus traffic.
  • Plan and prepare for a new installation.
  • Access the administration console.
  • Configure the network hierarchy.
  • Configure the automatic update process.
  • Access the Deployment Editor.
  • Describe the JSA system’s internal processes.
  • Describe event and flow source configuration.
  • List key features of the JSA architecture.
  • Describe the JSA system’s processing logic.
  • Interpret the correlation of flow and event data.
  • List the architectural component that provides each key function.
  • Describe Events and explain where they come from.
  • Access the Log Activity interface.
  • Execute Event searches.
  • Describe flows and their origin.
  • Configure the Network Activity interface.
  • Execute Flow searches.
  • Specify the JSA system’s Asset Management and Vulnerability Assessment functionality.
  • Access the Assets interface.
  • View Asset Profile data.
  • View Server Discovery.
  • Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).
  • Access vulnerability scanner configuration.
  • View vulnerability profiles.
  • Describe rules.
  • Configure rules.
  • Configure Building Blocks (BBs).
  • Explain how rules and flows work together.
  • Access the Offense Manager interface.
  • Understand Offense types.
  • Configure Offense actions.
  • Navigate the Offense interface.
  • Explain the Offense summary screen.
  • Search Offenses.
  • Use the JSA system’s Reporting functionality to produce graphs and reports.
  • Navigate the Reporting interface.
  • Configure Report Groups.
  • Demonstrate Report Branding.
  • View Report formats.
  • Identify the basic information on maintaining and troubleshooting the JSA system.
  • Navigate the JSA dashboard.
  • List flow and event troubleshooting steps.
  • Access the Event Mapping Tool.
  • Configure Event Collection for Junos devices.
  • Configure Flow Collection for Junos devices.
  • Explain high availability (HA) functionality on a JSA device.

outline
  • Chapter 1: Course Introduction
  • Chapter 2: Product Overview
  • Overview of the JSA Series Device
  • Hardware
  • Collection
  • Operational Flow
  • Chapter 3: Initial Configuration
  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
  • Lab 1: Initial Configuration
  • Chapter 4: Architecture
  • Processing Log Activity
  • Processing Network Activity
  • JSA Deployment Options
  • Chapter 5: Log Activity
  • Log Activity Overview
  • Configuring Log Activity
  • Lab 2: Log Activity
  • Chapter 6: Network Activity
  • Network Activity Overview
  • Configuring Network Activity
  • Lab 3: Network Activity
  • Chapter 7: Assets and Vulnerability Assessment
  • Asset Interface
  • Vulnerability Assessment
  • Vulnerability Scanners
  • Lab 4: Assets and Vulnerability Assessment
  • Chapter 8: Rules
  • Rules
  • Configure Rules and Building Blocks
  • Lab 5: Rules
  • Chapter 9: Offense Manager
  • Offense Manager
  • Offense Manager Configuration
  • Offense Investigation
  • Lab 6: Configure the Offense Manager
  • Chapter 10: JSA Reporting
  • Reporting Functionality
  • Reporting Interface
  • Lab 7: Reporting
  • Chapter 11: Basic Tuning and Troubleshooting
  • Basic Tuning
  • Troubleshooting
  • Chapter 12: Configuring Junos Devices for Use with JSA
  • Collecting Junos Events
  • Collecting Junos Flows
  • Lab 8: Configuring Junos Devices for JSA
  • Appendix A: High Availability
  • High Availability
  • Configuring High Availability

 


target_au

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing the JSA system.

 


pre_req
  • This course assumes that students have basic networking knowledge and experience in the following areas:
  • Understanding of TCP/IP operation;
  • Understanding of network security concepts; and
  • Experience in network security administration.

titleCAC – Cloud Automation Using Contrail
days5
seo_title
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis five-day course is designed to provide students with the knowledge required to work with the Juniper Contrail software-defined networking (SDN) solution. Students will gain in-depth knowledge of how to use the Contrail Command user interface, Contrail Networking, Contrail’s fabric management and administration features, and Contrail Security, as well as AppFormix analytics features. Students will also learn to use APIs and the CLI to perform the Contrail configuration tasks. Through demonstrations and hands-on labs, students will gain experience with the features of Contrail and AppFormix. This course is based on Contrail Release 1912 and AppFormix 2.19.10. Cloud Automation Using Contrail is an intermediate-level course
objective

After successfully completing this course, you should be able to:

  • Explain the role of Contrail SDN Controller.
  • List available Contrail solutions.
  • Describe the purpose of an orchestrator.
  • Describe the basics of Kubernetes.
  • Identify the function of each of the main OpenStack Projects.
  • Describe the purpose of Contrail.
  • Explain how the versions of Contrail differ.
  • Discuss Contrail related solutions.
  • Describe the functions of the Contrail vRouter and Contrail Controller.
  • Explain the role of the control, configuration, and analytic nodes.
  • Configure and deploy virtual DNS and IPAMs.
  • Create virtual networks.
  • Create policies to control the flow of traffic.
  • Explain the routing behavior of an IP Fabric
  • Describe the steps to onboard a Brownfield IP Fabric.
  • Describe the steps to onboard a Greenfield IP Fabric.
  • Describe the various commands to troubleshoot the onboarding of an IP Fabric.
  • Explain the benefits of VXLAN in the data center.
  • Describe EVPN signaling for VXLAN.
  • Describe how CEM can bridge between a VM and a BMS.
  • Implement bridging between VMs and BMSs using VXLAN and EVPN signaling.
  • Describe EVPN signaling for VXLAN routing in the Spine.
  • Describe how to enable central routing using CEM.
  • Describe EVPN signaling for DCI.
  • Describe how to enable DCI using CEM.
  • Create physical gateways.
  • Describe architecture and capabilities of Contrail Security.
  • Configure main Contrail Security features.
  • Explain the benefits of AppFormix.
  • Explain the operation and use of AppFormix.
  • Explain how to setup and install AppFormix in different environments.
  • Explain the purpose and use of the different AppFormix features.
  • Understand the purpose of the Clusters feature.
  • Describe how to use the dashboard to examine the state of the network.
  • Understand the purpose and use of the Charts feature.
  • Explain the benefits of capacity planning.
  • Explain how to setup the chargeback functionality.
  • Explain how to use AppFormix charts.
  • Explain how to use AppFormix heat maps.
  • Describe the benefits of reports and service monitoring functionalities.
  • Explain the purpose and use of AppFormix alarms.
  • Explain the purpose and use of AppFormix Composite Alarms.
  • Explain the purpose of JTI.
  • Discuss native sensors.
  • Explain OpenConfig and gRPC sensors.
  • Describe best practices for JTI.
  • Explain how to use JTI with AppFormix.

outline

Chapter 1: Course Introduction

Chapter 2: SDN and Contrail

  • Review of SDN
  • Contrail Basics Contrail Advantages, Capabilities, and Features Contrail Products and Solutions Contrail Use Cases Contrail Command
  • Lab 1: Contrail Command Walkthrough

 

Chapter 3: Orchestration Fundamentals

  • Orchestrator Overview
  • Kubernetes Orchestrator
  • OpenStack Orchestrator
  • Lab 2: Instantiating Virtual Workloads

Chapter 4: Contrail Architecture Fundamentals

  • Contrail Architecture Overview
  • Contrail Management and Analytics
  • Contrail Control Plane Communications
  • Contrail Data Plane Communications
  • Basic Contrail Troubleshooting
  • Lab 3: Exploring and Troubleshooting the Contrail vRouter and SDN Controller

 

Chapter 5: Contrail Configuration

  • Contrail Configuration Methods
  • Configuring DNS and IPAM
  • Configuring the Metadata Service
  • Configuring Virtual Networks
  • Configuring Network Policies and Security Groups
  • Contrail Configuration API
  • Lab 4: Configuring Virtual Networks and Policies

 

Chapter 6: IP Fabric Automation

  • IP Fabric Review
  • Greenfield Fabric Automation
  • Brownfield Fabric Automation
  • Troubleshooting Fabric Automation
  • Lab 5: IP Fabric Automation

Chapter 7: VM to BMS Bridging

  • VXLAN Review
  • EVPN Signaling for BMS to BMS VXLAN Forwarding
  • Contrail VM to BMS Bridging<./li>
  • Server/Instance example
  • Virtual Port Groups
  • Lab 6: VM to BMS Bridging

 

Chapter 8: VXLAN Routing

  • EVPN Signaling for Central Routing
  • Central Routing Example
  • EVPN Signaling for Edge Routing
  • Edge Routing Example
  • Lab 7: VXLAN Routing

 

Chapter 9: Data Center Interconnect

  • DCI Overview
  • DCI Options for a VXLAN Overlay using Contrail Automation
  • DCI Example using Contrail Automation
  • Lab 8: Data Center Interconnect

Chapter 10: Interacting with External Networks

  • DC Gateway Use Case/LI>
  • Implementing a DC Gateway
  • Lab 9: DC Gateway

 

Chapter 11: Fabric Administration

  • Generic Device Operations/LI>
  • Hitless Fabric Upgrade
  • Lab 10: Fabric Administration

 

Chapter 12: Contrail Security

  • The Need for Contrail Security
  • Contrail Security Configuration
  • Monitoring and Visualization
  • Lab 11: Contrail Security

Chapter 13: AppFormix Overview

  • AppFormix Overview
  • AppFormix UI and General Settings AppFormix Features Overview: Clusters, Dashboard, Charts, Heat Map, Plan, Reports, Chargeback

 

Chapter 14: Alarms and Composite Alarms

  • Alarms
  • Alarms Case Study
  • Composite Alarms
  • Lab 12: Implementing AppFormix Features

 

Chapter 15: Junos Telemetry Interface

  • JTI Overview
  • Native Sensors for JTI
  • OpenConfig and gRPC Sensors for JTI
  • Lab 13: Implementing JTI with AppFormix

target_au

This course benefits individuals responsible for working with software-defined networking solutions in data center, service provider, and enterprise network environments.


pre_req

The prerequisites for this course are as follows:

  • Basic TCP/IP skills;
  • General understanding of data center virtualization;
  • Basic understanding of the Junos operating system;
  • Completion of the Data Center Fabric with EVPN and VXLAN (ADCX) course or equivalent knowledge; and
  • Completion of the Juniper Cloud Fundamentals (JCF) course; and
  • Basic knowledge of object-oriented programming and Python scripting is recommended.

Recommended prerequisites:


titleJND-DC – Juniper Networks Design – Data Center
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for data center design including data center architectures, data center interconnects, security considerations, virtualization, and data center operations.
objective

After successfully completing this course, you should be able to:

  • State high-level concepts about different data center architectures.
  • Identify features used to interconnect data centers.
  • Identify key high-level considerations about securing and monitoring a data center deployment.
  • Outline key high-level concepts when implementing different data center approaches.
  • Recommend data center cooling designs and considerations.
  • Explain device placement and cabling requirements.
  • Outline different data center use cases with basic architectures.
  • Describe a traditional multitier data center architecture.
  • Explain link aggregation and redundant trunk groups.
  • Explain multichassis link aggregation.
  • Summarize and discuss key concepts and components of a Virtual Chassis.
  • Summarize and discuss key concepts and components of a VCF.
  • Summarize and discuss key concepts and components of a QFabric System.
  • Summarize and discuss key concepts and components of Junos Fusion.
  • List the reasons for the shift to IP fabrics.
  • Summarize how to scale an IP fabric.
  • State the design considerations of a VXLAN overlay.
  • Define the term Data Center Interconnect.
  • List differences between the different Layer 2 and Layer 3 DCIs.
  • Summarize and discuss the benefits and use cases for EVPN.
  • Discuss the security requirements and design principles of the data center.
  • Identify the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.
  • Summarize and discuss the purpose of SDN.
  • Explain the function of Contrail.
  • Summarize and discuss the purpose of NFV.
  • Discuss the purpose and function of vSRX and vMX.
  • Discuss the importance of understanding the baseline behaviors in your data center.
  • List the characteristics of the Junos Space Network Management Platform and describe its deployment options.
  • Describe the importance of analytics.
  • Discuss automation in the data center.
  • Discuss the benefits of QoS and CoS.
  • State the benefits of a converged network.
  • Identify general aspects of data center migration.
  • Summarize and discuss best practices for migration planning.
  • Outline some common migration scenarios.
  • Summarize high availability design considerations in the data center.
  • Provide an overview of high availability offerings and solutions in the data center

outline

Chapter 1: Course Introduction

Chapter 2: Overview of Data Center Design

  • Initial Considerations
  • Architectures and Design considerations
  • Connecting Data Centers
  • Security and Operation
  • Implementation Considerations

Chapter 3: Initial Design Considerations

  • Physical Layout and Placement
  • Environmental Conditions
  • Cabling Options
  • Data Center Use Cases

Chapter 4: Traditional Data Center Architecture

  • Traditional Multi-tier Architecture
  • Link Aggregation and Redundant Trunk Groups
  • Multichassis Link Aggregation
  • Designing a Multi-tier Architecture Lab

Chapter 5: Ethernet Fabric Architectures

  • Virtual Chassis
  • Virtual Chassis Fabric
  • QFabric
  • Junos Fusion
  • Ethernet Fabric Design Considerations
  • Lab: Ethernet Fabric Architecture

Chapter 6: IP Fabric Architecture

  • The Shift To IP Fabrics
  •  IP Fabric Routing Design
  • IP Fabric Scaling
  • VXLAN
  • Lab: IP Fabric Architecture

Chapter 7: Data Center Interconnect

  • DCI Overview
  • Layer 2 DCI
  • EVPN Use Cases
  • Layer 3 DCI
  • Lab: Interconnecting Data Centers

Chapter 8: Securing the Data Center

  • Overview of Data Center Security
  • Security Elements
  • Simplifying Security in the Data Center
  • Advanced Data Center Security
  • Lab: Securing the Data Center

Chapter 9: SDN and Virtualization in the Data Center

  • Designing SDN in the Data Center
  • Using Contrail in the Data Center
  • Using NFV in the Data Center
  • Understanding How Contrail Works in the Data Center
  • Working in Virtual Environments in the Data Center
  • Lab: SDN and Virtualization

Chapter 10: Data Center Operation

  • Understanding baseline behaviors
  • Deploying Junos Space and JSA
  • Understanding analytics
  • Deploying automation in the data center
  • Lab: Data Center Operations

Chapter 11: Traffic Prioritization for Converged Networks

  • Understanding QoS, and CoS
  • Converging Networks
  • Lab: Prioritizing Data in the Data Center

Chapter 12: Migration Strategies

  • Migration Overview
  • Common Scenarios
  • Migration Case Study
  • Lab: Data Center Migration

Chapter 13: High Availability

  • Data Center High Availability Overview
  • Link Level and Physical Device Redundancy
  • Device-Level Redundancy

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of design for the data center


pre_req

The following are the prerequisites for this course:

  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Basic knowledge of hypervisors and load balancers.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

Recommended prerequisites:


titleJND-SEC – Juniper Networks Design Security
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for security design, including traditional and modern security principles such as security design specifics for campus and branch, enterprise wide area network (WAN), service provider WAN, and data center deployments. This course also includes design principles for security management, automation, and virtualization.JND-SEC is an intermediate-level course.
objective
  • After successfully completing this course, you should be able to:
  • Identify high level security challenges with different design architectures.
  • Explain the value of implementing security solutions in any network design.
  • Identify key factors in Juniper Networks security focus.
  • List and describe the security platforms and solutions offered by Juniper Networks.
  • Perform the steps necessary to identify customer security requirements.
  • Explain what is required to define the scope of the security design.
  • Identify the data required to perform a data analysis of the customer’s existing network and use that information in the design.
  • Describe traditional security practices used to secure a network.
  • Explain the added capabilities that next generation firewalls provide.
  • Explain the evolution of modern security models.
  • Describe intelligent networks.
  • Explain how Software-Defined Secure Networking improves security in network design.
  • Explain the need for centralized Security Management.
  • Describe what Junos Space Security Director can do to manage network security.
  • Describe the function of Juniper Secure Analytics in managing network security.
  • List the main components of the Juniper Automation Stack.
  • Explain Juniper Networks automation solutions.
  • Describe the benefits of automating security.
  • Describe how security works in a virtualized environment.
  • Explain the benefits of service chaining.
  • Describe Juniper Virtual SRX and Container SRX products.
  • Describe network virtualization with VMware NSX.
  • Describe the benefits of HA with security devices.
  • Discuss how to handle asymmetric traffic with security devices.
  • Describe different options for SRX chassis cluster deployments.
  • Describe the main security concerns for the campus and the branch networks.
  • Explain end-to-end security concepts.
  • Describe security functions at different network layers.
  • Explain network authentication and access control concepts.
  • Describe common campus and branch network security design examples.
  • Describe security considerations for the enterprise WAN.
  • Explain when to use IPsec and NAT in the enterprise WAN.
  • Explain virtual router applications for the enterprise WAN.
  • Discuss security best practices in the enterprise WAN.
  • Describe security in the service provider WAN.
  • Discuss security best practices for the service provider WAN.
  • Discuss the security requirements and design principles of the data center.
  • Describe the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.

outline
  • Chapter 1: Course Introduction
  • Chapter 2:Security in Network Design
  • The Value of Security in Network Design
  • Juniper’s Security Focus
  • Chapter 3: Assessing Security in Network Design
  • Overview
  • Customer Security Requirements
  • Customer Scope
  • Data Analysis
  • Chapter 4: Traditional Security Architectures
  • Traditional Security Practices
  • NAT
  • IPsec VPNs
  • Next Generation Firewalls
  • Unified Threat Management
  • Lab: Designing a Traditional Security Architecture
  • Chapter 5: Modern Security Principles
  • Modern Security Model
  • Designing an Intelligent Network
  • Use Cases
  • Modularity in Security Design
  • Lab: Designing for Security Intelligence
  • Chapter 6: Managing Security
  • Security Management Challenges
  • Junos Space Security Director
  • Juniper Secure Analytics
  • Lab: Security Management
  • Chapter 7: Automating Security
  • Automating Security Introduction
  • Juniper Automation Stack
  • Juniper Automation Tools
  • Automating Security
  • Lab: Automating Security
  • Chapter 8: Virtualizing Security
  • Security in a Virtualized Environment
  • Virtual SRX
  • Security with SDN and NFV
  • Container SRX
  • Network Virtualization with VMware NSX
  • Lab: Virtualizing Security
  • Chapter 9: Providing High Availability in Security Design
  • Benefits of High Availability with Security Devices
  • Implementing Physical High Availability
  • Asymmetrical Traffic Handling
  • SRX Chassis Clustering
  • Lab: High Availability
  • Chapter 10: Securing the Campus and Branch
  • Campus and Branch Security: An Overview
  • Network Segmentation and Perimeter Security
  • Application-Level Security
  • Access Control and Authentication
  • Layer 2 Security Functions
  • Case Studies and Example Architectures
  • Lab: Designing for Campus and Branch Security
  • Chapter 11: Securing the Enterprise WAN
  • Security in the Enterprise WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures
  • Lab: Designing for Enterprise WAN Security
  • Chapter 12: Securing the Service Provider WAN
  • Security in the Service Provider WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures
  • Lab: Designing for Service Provider WAN Security
  • Chapter 13: Securing the Data Center
  • Overview of Data Center Security
  • Security Elements
  • Simplifying Security in the Data Center
  • Advanced Data Center Security
  • Lab: Securing the Data Center
  • Appendix A: Juniper Security Solutions
  • Security Products and Solutions

 


target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design


pre_req
  • The following are the prerequisites for this course:
  • Knowledge of network security concepts, including: Traditional and next-generation firewalls; IPsec VPNs; Network Address Translation (NAT); and Security intelligence.
  • Knowledge of Juniper Networks products and solutions.
  • Network automation and virtualization concepts.
  • Basic knowledge of hypervisors and high availability concepts.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

 

Recommended prerequisites:


titleJND-SP – Juniper Networks Design-Service Provider
days5
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for Wide Area Network (WAN) design including WAN interconnects, security considerations, virtualization, and management/operations. This course covers both service provider and enterprise WAN design.
objective
  • Describe high level concepts about the different WAN architectures.
  • Identify key features used to interconnect WANs.
  • Describe key high level considerations about securing and monitoring a WAN deployment.
  • Outline high level concepts for implementing WANs.
  • Explain various methods of WAN connectivity.
  • Describe basic MPLS concepts as they are related to WANs.
  • Identify basic Ethernet concepts as they are related to WANs.
  • Describe key concepts of network availability.
  • Explain high availability features and protocols.
  • Describe the key aspects of class of service.
  • Describe how core WAN technologies are used to solve specific problems facing network designers.
  • Discuss core routing requirements.
  • Explain how to design a high performance MPLS WAN core.
  • Define CoS requirements for the WAN core.
  • Discuss BGP peering and path selection.
  • Design MPLS Layer 2 and Layer 3 services.
  • Design metro Ethernet networks.
  • Understand role of class of service in provider edge.
  • Describe Next-generation MVPNs.
  • Explain how enterprise WAN technologies are used to solve specific problems facing network designers.
  • Outline various solutions regarding campus and branch WANs.
  • Explain how data centers are interconnected through WANs.
  • Identify various solutions regarding data center WAN interconnection.
  • Describe the benefits and use cases for EVPN.
  • Describe security concepts regarding WANs.
  • Explain the differences between LAN security concepts and WAN security concepts.
  • Explain VPN-related concepts regarding WANs.
  • Describe methods to manage WANs.
  • Discuss key concepts related to WAN management.
  • Explain how virtualization and SDN can be leveraged in the WAN.
  • Describe various SDN products and how they are used in the WAN.
  • Describe MX, SRX, T, PTX, ACX, QFX, EX, and NFX Series devices and the basics of how they relate to WAN solutions

outline

Day 1

COURSE INTRODUCTION

Overview of WAN Design

  • WAN Design Overview
  • WAN Domains
  • Management, Operations, and Security
  • Implementation Considerations

WAN Connectivity

  • Public and Private
  • Service Provider
  • Enterprise

Network Availability and Traffic Prioritization

  • Network Availability
  • Class of Service

LAB: Network Availability and CoS Design

Day 2

Service Provider Core WAN

  • WAN Core Overview
  • Core Routing
  • MPLS Design
  • CoS Considerations

Lab : WAN Core Design

Day 3

Service Provider Edge WAN

  • Provider Edge

Lab: Service Provider Edge—VPN Design

Access and Aggregation Edge

  • Services
  • CoS Considerations
  • Multicast

Lab : Service Provider Edge—Services Design

Day 4

Enterprise WAN

  • Enterprise WAN Overview
  • WAN Topologies
  • Campus and Branch
  • CoS Considerations
  • Large Enterprise Designs

LAB: Enterprise WAN Design

Data Center WAN

  • WAN Overview
  • EVPN

LAB: Data Center WAN Design

WAN Security

  • Security Overview
  • WAN Versus LAN
  • Service Provider Core WAN Security
  • Service Provider Edge WAN Security
  • Enterprise WAN Security

LAB: Security Design

Day 5

WAN Management

  • Best Practices and Considerations
  • OoB Management Design
  • Junos Space
  • Juniper WAN Automation

LAB: WAN Management Design

WAN Virtualization and SDN

  • SDN Overview
  • NorthStar
  • Contrail
  • SD-WAN

LAB: SDN Design

WAN Device Portfolio

  • Platform and Junos Overview
  • MX Series
  • SRX Series
  • PTX and T Series
  • ACX Series
  • QFX Series
  • EX Series
  • NFX Series

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of WAN design.


pre_req
  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

titleNSE 4 – FortiGate v6.4 Bundle Training
days5
seo_titleNSE 4 - FortiGate v6.4 Bundle Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this 5 days course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. You will aldo learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics.

Product Versions

  • FortiOS 6.4
 

This FortiGate Bundle Training course help participants prepare for the NSE 4 certification exam.


objective

After completing this course, you should be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Identify the characteristics of the Fortinet Security Fabric
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Offer an SSL VPN for secure access to your private network
  • Collect and interpret log entries
  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load -balanced deployments
  • Configure SD-WAN to load balance traffic between multiple WAN links effectively
  • Inspect traffic transparently, forwarding as a Layer 2 device
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Deploy implicit and explicit proxy with firewall policies, authentication, and caching
  • Diagnose and correct common problems

outline

FortiGate Security:

  1. Introduction and Initial Configuration
  2. Security Fabric
  3. Firewall Policies
  4. Network Address Translation (NAT)
  5. Firewall Authentication
  6. Logging and Monitoring
  7. Certificate Operations
  8. Web Filtering
  9. Application Control
  10. Antivirus
  11. Intrusion Prevention and Denial of Service
  12. SSL VPN

FortiGate Infrastructure:

  1. Routing
  2. Software-Defined WAN (SD-WAN)
  3. Virtual Domains
  4. Layer 2 Switching
  5. IPsec VPN
  6. Fortinet Single Sign-On (FSSO)
  7. High Availability (HA)
  8. Web Proxy
  9. Diagnostics

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network

titleNSE4 – FortiGate Infrastructure v6.4
days2
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this two days course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), web proxy, and diagnostics.
objective

After completing this course, you should be able to:

  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load -balanced deployments
  • Configure SD-WAN to load balance traffic between multiple WAN links effectively
  • Inspect traffic transparently, forwarding as a Layer 2 device
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Deploy implicit and explicit proxy with firewall policies, authentication, and caching
  • Diagnose and correct common problems

outline
  1. Routing
  2. Software-Defined WAN (SD-WAN)
  3. Virtual Domains
  4. Layer 2 Switching
  5. IPsec VPN
  6. Fortinet Single Sign-On (FSSO)
  7. High Availability (HA)
  8. Web Proxy
  9. Diagnostics

target_au

Networking and security professionals involved in the design, implementation, and administration of network infrastructure using FortiGate appliances should attend this course.

This course assumes knowledge of basic FortiGate fundamentals. Participants should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network
  • Knowledge of the fundamentals of FortiGate, as presented in the FortiGate Security course

titleNSE4 – FortiGate Security v6.4
days3
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this three days course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, security fabric, user authentication, SSL VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
objective

After completing this course, you should be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Identify the characteristics of the Fortinet Security Fabric
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Offer an SSL VPN for secure access to your private network
  • Collect and interpret log entries

outline
  1. Introduction and Initial Configuration
  2. Security Fabric
  3. Firewall Policies
  4. Network Address Translation (NAT)
  5. Firewall Authentication
  6. Logging and Monitoring
  7. Certificate Operations
  8. Web Filtering
  9. Application Control
  10. Antivirus
  11. Intrusion Prevention and Denial of Service
  12. SSL VPN

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.

You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts

titleCompTIA A+ Certification
days5
seo_title
seo_dec
seo_tkey
categoryit-services-management-training
vendorComptia

techonogyIT Services Management
overviewCompTIA’s A+ Certification is the industry standard for validating the foundational skills needed by support technicians in today's digital world. A technical support professional does much more than fix a PC, they now have to understand how applications work across systems and be capable of solving problems that help to keep the business running smoothly. The CompTIA A+ Certification has recently been updated to reflect the growing focus on topics such cybersecurity, Prvacy, IoT, Scripting, Virtualisation and Cloud. This certification requires that you pass two exams: CompTIA A+ Core 1 Exam 220-1001 and Core 2 Exam 220-1002.
objective

After completing this course you should be able to:

  • Support basic IT infrastructure, including endpoint management, advanced device connectivity troubleshooting, and basic networking
  • Configure and support PC, mobile and IoT device hardware, including components, connectors and peripherals
  • Implement basic data backup and recovery methods and apply data storage and management best practices
  • Demonstrate baseline security skills for IT support professionals, including detecting and removing malware, addressing privacy concerns, physical security and device hardening
  • Configure device operating systems, including Windows, Mac, Linux, Chrome OS, Android and iOS and administer client-based as well as cloud-based (SaaS) software
  • Troubleshoot and problem solve core service and support challenges while applying best practices for documentation, change management, and the use of scripting in IT support

outline

Supporting Operating Systems

  • Identify Common Operating Systems
  • Troubleshooting Methodolgy
  • Use Windows Features and Tools
  • Manage Files in Windows
  • Manage Disks in Windows
  • Manage Devices in Windows

Installing and Configuring PC Components

  • Use Appropriate Safety Procedures
  • PC Components
  • Common Connection Interfaces
  • Install Peripheral Devices

Installing, Configuring and Troubleshooting Display and Multimedia Devices

  • Install and Configure Display Devices
  • Troubleshoot Display Devices
  • Install and Configure Multimedia Devices

Installing, Configuring and Troubleshooting Storage Devices

  • Install System Memory
  • Insall and Configure Mass Storage Devices
  • Install and Configure Removable Storage
  • Configure RAID
  • Troublshoot Storage Devices

Installing, Configuring and Troubleshooting Internal System Components

  • Install and Upgrade CPUs
  • Configure and Update BIOS/UEFI
  • Install Power SUpplies
  • Troubleshoot Internal System Components
  • Configure a Custom PC

Installing, Configuring and Maintaining Operating Systems

  • Configure and Use Linux
  • Configure and Use macOS
  • Install and Upgrade Operating Systems
  • Maintain OSs

Maintaining and Troubleshooting Microsoft Windows

  • Install and Manage Windows Applications
  • Manage Windows Performance
  • Troublshoot WIndows

Network Infrastructure Concepts

  • Wired Networks
  • Network Hardware Devices
  • Wireless Networks
  • Internet Connection Types
  • Network Configuration Concepts
  • Network Services

Configuring and Troubleshooting Networks

  • Configure Network Connection Settings
  • Install and Configure SOHO Networks
  • Configure SOHO Network Security
  • Configure Remote Access
  • Troubleshoot Network Connectons
  • Install and configure IoT Devices

Managing Users, Workstations and Shared Resources

  • Manage Users
  • Configure Shared Resources
  • Configure Active Directory Accounts and Policies

Implementing Client Virtualization and Cloud Computing

  • Configure Client-Side Virtualization
  • Cloud Computing Concepts

Security Concepts

  • Logical Security Concepts
  • Threat and Vulnerabilities
  • Physical Security Measures

Securing Workstations and Data

  • Implement Security Best Practices
  • Implement Data Protection Policies
  • Protect Data During Incident Response

Troubleshooting Workstation Security Issues

  • Detect, Remove and Prevent Malware
  • Troubleshoot Common Workstation Security Issues

Supporting and Troubleshooting Laptops

  • Use Laptop Features
  • Install and Configure Laptop Hardware
  • troublshoot Common Laptop Issues

Supporting and Troublshooting Mobile Devices

  • Mobile Device Types
  • Connect and Configure Mobile Device Accessories
  • Configure Mobile Device Network Connectivity
  • Support Mobile Apps
  • Secure Mobile Devices
  • Troublshoot Mobile Device Issues

Installing, Configuring and Troubleshooting Print Devices

  • Maintain Laser Printers
  • Maintain Inkjet Printers
  • Maintain Impact, Thermak and 3D Printers
  • Install and Configure Printers
  • Troubleshoot Print Device Issues
  • Install and Configure Imaging Devices

Implementing Operational Procedures

  • Environmental Impacts and Controls
  • Create and Maintain Documentation
  • Use Basic Change Management Best Practices
  • Implement Disaster Prevention and Recovery Methods
  • Basic Scripting Concepts
  • Professionalism and Communication

target_au
pre_req
  • Recognize the main components of a PC and different data media such as USB drives and DVD.
  • Start the computer and navigate the desktop.
  • Use Windows Explorer to create directories and subdirectories and manage files.
  • Use a web browser such as Internet Explorer to view websites.

titleSESA 3.1 – Securing Email with Cisco Email Security Appliance
days4
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications. This class will help you
  • Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
  • Gain leading-edge career skills focused on enterprise security
  • Earn 24 Cisco CE credits toward recertification
What to expect in the exam The 300-720 SESA exam certifies your knowledge of Cisco Email Security Appliance, including administration, spam control and anti-spam, message filters, data loss prevention, Lightweight Directory Access Protocol (LDAP), email authentication and encryption, and system quarantines and delivery methods. After you pass 300-720 SESA:
  • You earn the Cisco Certified Specialist - Email Content Security
  • You will have satisfied the concentration exam requirement for the new CCNP Security To complete your CCNP Security certification, pass the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam or its equivalent.

objective

After taking this course, you should be able to:

  • Describe and administer the Cisco Email Security Appliance (ESA)
  • Control sender and recipient domains
  • Control spam with Talos SenderBase and anti-spam
  • Use anti-virus and outbreak filters
  • Use mail policies
  • Use content filters
  • Use message filters to enforce email policies
  • Prevent data loss
  • Perform LDAP queries
  • Authenticate Simple Mail Transfer Protocol (SMTP) sessions
  • Authenticate email
  • Encrypt email
  • Use system quarantines and delivery methods
  • Perform centralized management using clusters
  • Test and troubleshoot

outline

Describing the Cisco Email Security Appliance

  • Cisco Email Security Appliance Overview
  • Technology Use Case
  • Cisco Email Security Appliance Data Sheet
  • SMTP Overview
  • Email Pipeline Overview
  • Installation Scenarios
  • Initial Cisco Email Security Appliance Configuration
  • Centralizing Services on a Cisco Content Security Management Appliance (SMA)
  • Release Notes for AsyncOS 11.x

Administering the Cisco Email Security Appliance

  • Distributing Administrative Tasks
  • System Administration
  • Managing and Monitoring Using the Command Line Interface (CLI)
  • Other Tasks in the GUI
  • Advanced Network Configuration
  • Using Email Security Monitor
  • Tracking Messages
  • Logging

Controlling Sender and Recipient Domains

  • Public and Private Listeners
  • Configuring the Gateway to Receive Email
  • Host Access Table Overview
  • Recipient Access Table Overview
  • Configuring Routing and Delivery Features

Controlling Spam with Talos SenderBase and Anti-Spam

  • SenderBase Overview
  • Anti-Spam
  • Managing Graymail
  • Protecting Against Malicious or Undesirable URLs
  • File Reputation Filtering and File Analysis
  • Bounce Verification

Using Anti-Virus and Outbreak Filters

  • Anti-Virus Scanning Overview
  • Sophos Anti-Virus Filtering
  • McAfee Anti-Virus Filtering
  • Configuring the Appliance to Scan for Viruses
  • Outbreak Filters
  • How the Outbreak Filters Feature Works
  • Managing Outbreak Filters

Using Mail Policies

  • Email Security Manager Overview
  • Mail Policies Overview
  • Handling Incoming and Outgoing Messages Differently
  • Matching Users to a Mail Policy
  • Message Splintering
  • Configuring Mail Policies

Using Content Filters

  • Content Filters Overview
  • Content Filter Conditions
  • Content Filter Actions
  • Filter Messages Based on Content
  • Text Resources Overview
  • Using and Testing the Content Dictionaries Filter Rules
  • Understanding Text Resources
  • Text Resource Management
  • Using Text Resources

Using Message Filters to Enforce Email Policies

  • Message Filters Overview
  • Components of a Message Filter
  • Message Filter Processing
  • Message Filter Rules
  • Message Filter Actions
  • Attachment Scanning
  • Examples of Attachment Scanning Message Filters
  • Using the CLI to Manage Message Filters
  • Message Filter Examples
  • Configuring Scan Behavior

Preventing Data Loss

  • Overview of the Data Loss Prevention (DLP) Scanning Process
  • Setting Up Data Loss Prevention
  • Policies for Data Loss Prevention
  • Message Actions
  • Updating the DLP Engine and Content Matching Classifiers

Using LDAP

  • Overview of LDAP
  • Working with LDAP
  • Using LDAP Queries
  • Authenticating End-Users of the Spam Quarantine
  • Configuring External LDAP Authentication for Users
  • Testing Servers and Queries
  • Using LDAP for Directory Harvest Attack Prevention
  • Spam Quarantine Alias Consolidation Queries
  • Validating Recipients Using an SMTP Server

SMTP Session Authentication

  • Configuring AsyncOS for SMTP Authentication
  • Authenticating SMTP Sessions Using Client Certificates
  • Checking the Validity of a Client Certificate
  • Authenticating User Using LDAP Directory
  • Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate
  • Establishing a TLS Connection from the Appliance
  • Updating a List of Revoked Certificates

Email Authentication

  • Email Authentication Overview
  • Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing
  • Verifying Incoming Messages Using DKIM
  • Overview of Sender Policy Framework (SPF) and SIDF Verification
  • Domain-based Message Authentication Reporting and Conformance (DMARC) Verification
  • Forged Email Detection

Email Encryption

  • Overview of Cisco Email Encryption
  • Encrypting Messages
  • Determining Which Messages to Encrypt
  • Inserting Encryption Headers into Messages
  • Encrypting Communication with Other Message Transfer Agents (MTAs)
  • Working with Certificates
  • Managing Lists of Certificate Authorities
  • Enabling TLS on a Listener’s Host Access Table (HAT)
  • Enabling TLS and Certificate Verification on Delivery
  • Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services

Using System Quarantines and Delivery Methods

  • Describing Quarantines
  • Spam Quarantine
  • Setting Up the Centralized Spam Quarantine
  • Using Safelists and Blocklists to Control Email Delivery Based on Sender
  • Configuring Spam Management Features for End Users
  • Managing Messages in the Spam Quarantine
  • Policy, Virus, and Outbreak Quarantines
  • Managing Policy, Virus, and Outbreak Quarantines
  • Working with Messages in Policy, Virus, or Outbreak Quarantines
  • Delivery Methods

Centralized Management Using Clusters

  • Overview of Centralized Management Using Clusters
  • Cluster Organization
  • Creating and Joining a Cluster
  • Managing Clusters
  • Cluster Communication
  • Loading a Configuration in Clustered Appliances
  • Best Practices

Testing and Troubleshooting

  • Debugging Mail Flow Using Test Messages: Trace
  • Using the Listener to Test the Appliance
  • Troubleshooting the Network
  • Troubleshooting the Listener
  • Troubleshooting Email Delivery
  • Troubleshooting Performance
  • Web Interface Appearance and Rendering Issues
  • Responding to Alerts
  • Troubleshooting Hardware Issues
  • Working with Technical Support

References

  • Model Specifications for Large Enterprises
  • Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch Offices
  • Cisco Email Security Appliance Model Specifications for Virtual Appliances
  • Packages and Licenses

Lab outline

  • Verify and Test the Cisco ESA Configuration
  • Perform Basic Administration
  • Advanced Malware in Attachments (Macro Detection)
  • Protect Against Malicious or Undesirable URLs Beneath Shortened URLs
  • Protect Against Malicious or Undesirable URLs Inside Attachments
  • Intelligently Handle Unscannable Messages
  • Leverage AMP Cloud Intelligence Via Pre-Classification Enhancement
  • Integrate Cisco ESA with AMP Console
  • Prevent Threats with Anti-Virus Protection
  • Applying Content and Outbreak Filters
  • Configure Attachment Scanning
  • Configure Outbound Data Loss Prevention
  • Integrate Cisco ESA with LDAP and Enable the LDAP to Accept Query
  • Domain Keys Identified Mail (DKIM)
  • Sender Policy Framework (SPF)
  • Forged Email Detection
  • Configure the Cisco SMA for Tracking and Reporting

target_au
  • Security engineers
  • Security administrators
  • Security architects
  • Operations engineers
  • Network engineers
  • Network administrators
  • Network or security technicians
  • Network managers
  • System designers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have one or more of the following basic technical competencies:

  • Cisco certification (Cisco CCENT® certification or higher)
  • Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
  • Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
  • Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], CompTIA (A+, Network+, Server+)

The knowledge and skills that a student must have before attending this course are:

  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
  • Experience with IP routing

Cisco learning offerings that contribute to recommended skills and knowledge:


titleUnderstanding Cisco Cybersecurity Operations Fundamentals (CBROPS) 1.0
days5
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC. This course will help you:
  • Learn the fundamental skills, techniques, technologies, and the hands-on practice necessary to prevent and defend against cyberattacks as part of a SOC team
  • Prepare for the 200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam which earns the Cisco Certified CyberOps Associate certification

objective

After taking this course, you should be able to:

  • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
  • Explain the data that is available to the network security analyst.
  • Describe the basic concepts and uses of cryptography.
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
  • Understand common endpoint security technologies.
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
  • Identify resources for hunting cyber threats.
  • Explain the need for event data normalization and event correlation.
  • Identify the common attack vectors.
  • Identify malicious activities.
  • Identify patterns of suspicious behaviors.
  • Conduct security incident investigations.
  • Explain the use of a typical playbook in the SOC.
  • Explain the use of SOC metrics to measure the effectiveness of the SOC.
  • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
  • Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
  • Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.

 


outline
  • Defining the Security Operations Center
  • Understanding Network Infrastructure and Network Security Monitoring Tools
  • Exploring Data Type Categories
  • Understanding Basic Cryptography Concepts
  • Understanding Common TCP/IP Attacks
  • Understanding Endpoint Security Technologies
  • Understanding Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
  • Understanding Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
  • Using a Playbook Model to Organize Security Monitoring
  • Understanding SOC Metrics
  • Understanding SOC Workflow and Automation
  • Describing Incident Response
  • Understanding the Use of VERIS
  • Understanding Windows Operating System Basics
  • Understanding Linux Operating System Basics

Lab outline

  • Use SIEM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Explore TCP/IP Attacks
  • Explore Endpoint Security
  • Investigate Hacker Methodology
  • Hunt Malicious Traffic
  • Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
  • Investigate Browser-Based Attacks
  • Analyze Suspicious Domain Name System (DNS) Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks
  • Explore the Windows Operating System
  • Explore the Linux Operating System

target_au

This course is designed for individuals seeking a role as an associate-level cybersecurity analyst, IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:

  • Students pursing a technical degree
  • Current IT professionals
  • Recent college graduates with a technical degree

pre_req

 

Before taking this course, you should have the following knowledge and skills:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows and Linux operating systems
  • Familiarity with basics of networking security concepts

The following Cisco course can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)

titleECS ExtremeWireless Cloud
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewExtremeWireless Cloud Training ECS course provides Extreme Networks customers and partners theoretical and practical hands-on training to give students a better understanding of Extreme Networks Cloud WiFi technologies. Students will also learn how to manage and orchestrate ExtremeWireless Cloud from within the ExtremeCloud IQ management platform. [dt_sc_button type="type1" link="https://dojo.extremenetworks.com/event/ecs-extremewireless-cloud-standard-2/" size="medium" bgcolor="#8fbd85" target="_new" timeline_button="no"]Registration Link[/dt_sc_button]
objective
  • Have the ability to onboard devices and configure WLANS using the powerful cloud based solution that is ExtremeCloud IQ.
  • Gain basic wireless skills and be able to utilize the knowledge gained to deploy real world solutions.
  • Prepare students to take the Extreme Wireless Cloud ECS exam.

outline

Solution Overview

  • Global Data Centers
  • Regional Data Centers
  • ISO 27001
  • GDPR and Privacy
  • Private Cloud
  • Local Cloud
  • Wireless Hardware
  • Distributed Architecture
  • Understanding the evolution of distributed architecture
  • Distributed Control
  • Cooperative Control Protocols

 

ExtremeCloud IQ

  • Taking a first look at ExtremeCloud IQ
  • Logging in for the first time

 

WLAN Design Concepts

  • Coverage Design
  • Roaming
  • Layer 2 Retransmissions
  • Capacity Design
  • Airtime Consumption
  • Co-Channel Interference
  • Antennas

 

Device Discovery and Provisioning

  • Device Redirection Services and Auto-Discovery
  • Auto-discovery for on-premises
  • Management Protocols and Device Updates
  • Adding Devices into ExtremeCloud IQ

 

Guided Configuration and Object Management

  • Guided Configuration of Objects
  • Clone Tool

 

Monitoring Clients, Users and Client 360

  • Monitoring Clients
  • Monitoring Devices

 

User Profiles

  • Defining VLANs
  • Firewalls
  • Tunnelling
  • Rate Limiting
  • URL Filtering
  • Availability Schedule
  • Assignment Rules

 

Troubleshooting 802.1x

  • IEEE 802.1X with EAP
  • 802.1X Troubleshooting

 

Network 360

  • Monitor View
  • Device Health
  • Client Health
  • WiFi Health
  • Network Health
  • Services Health
  • Application Health
  • Security Health

 

Private Pre-Shared Key (PPSK)

  • Understanding PPSK
  • 802.1X/EAP
  • Mapping User Profiles to User Groups
  • User Groups
  • PPSK Credential storage
  • RadSec Proxies
  • Secure Access with Cloud PPSK
  • RadSec Troubleshooting

 

Radio Profiles

  • Showing Radio Profiles through a Lab

 

Device Templates

  • AP Device Templates
  • Radio Settings
  • Radio Usage
  • Mesh
  • Exclude Channels
  • Transmit Power Control

 

Software Defined Radio (SDR)

  • Dual Band APs
  • Dual 5GHz WLAN design
  • SDR Radio Profile

 

Cloud Config Groups and Classification Rules

  • Cloud Config Groups – What are they?
  • Classification Rules
  • Joining CCGs and Classification Rules

 

Classification Rules

  • VLAN Objects
  • Captive Web Portals
  • Time Zone Objects
  • Use Cases
  • Server Objects
  • AP Device Templates
  • SSIDs

 

Deployment Optimization

  • Management and Native VLANs
  • Using Trunked Ports and VLANs
  • AP and VLAN guidelines
  • Configuring rollback timer

 

ExtremeCloud IQ Diagnostic Tools

  • Device Diagnostic Tools
  • Ping
  • Points of Failure
  • VLAN Probe
  • Common CLI Commands

 

Dashboards

  • Network
  • Reports
  • Diagnostics
  • Inventory
  • Insights – Comparative Analysis
  • Insights – Proximity
  • Insights – Presence

 

ExtremeCloud IQ Administration

  • Communications
  • Account Management
  • Administrator Accounts
  • Internal Admin Accounts
  • External Admin Accounts
  • Role Based Access Control
  • Global Settings – Logs
  • Global Settings – Audit Logs

 

Firmware Updates

  • How to do firmware updates using ExtremeCloud IQ

 

ExtremeWireless Cloud Exam

  • What you need to know about the ExtremeWireless Cloud Exam

target_au
pre_req

Students should have a working knowledge of networking concepts and a basic understanding of WiFi technologies although prior experience of WLAN design and deployment is helpful.


titleECS ExtremeWireless Cloud Troubleshooting
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewDesigned for networking professionals responsible for supporting and troubleshooting wireless LAN networks. This course is an advanced level class building upon the student’s real working experiences with ExtremeWireless Cloud and ExtremeCloud IQ. Please read the pre-requisites before enrolling on the class as prior experience with ExtremeCloud IQ and ExtremeWireless Cloud is expected. The class is a fast paced, fault-based scenario lab which immerses the student in real life situations requiring fault diagnosis and remedial actions. It provides students with the information and skills necessary to troubleshoot common WLAN issues using ExtremeCloud IQ tools and networking solutions.
objective

This challenging course is a blend of theory and real-world troubleshooting scenarios.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Cloud installations and common wireless issues using the in-built tools and the Wireshark protocol analyzer.


outline
  • Troubleshooting Theory and Best practices
  • Opening a support case
  • Techdata File
  • Co-Operative Control Protocols
  • CAPWAP and Provisioning
  • RF Troubleshooting
  • Network Performance Troubleshooting
  • ExtremeWireless Cloud troubleshooting tools
  • Authentication and Roaming
  • Private Pre-shared Key

target_au
pre_req

To gain the maximum learning experience from this class, it is extremely important that attendees adhere to the following requirements prior to attending this course:

  • Have attend the ExtremeWireless Cloud training and hold the relevant ECS ExtremeWireless Cloud certification, or, to have been grandfathered from the Aerohive ACMA qualification onto ExtremeWireless Cloud ECS.
  • Possess significant working experience with Extreme/Aerohive products as well as wireless networking. Attendees need to be able to navigate and configure the current version of XIQ confidently with minimal or no instruction.
  • Have access to the internet to connect to XIQ for the virtual instructor-led classes or bring their own laptop to classroom based instructor-led classes.

titleECS Extreme NAC
days2
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorExtreme

techonogyEnterprise Networking
overviewExtremeNAC (A3) is Extreme’s Secure Access Management Solution with enterprise-grade features for onboarding, authentication, and network access control (NAC). This training class covers the essentials of deploying ExtremeNAC (A3). It provides the theoretical knowledge and hands-on experience that will enable you to successfully deploy, configure and maintain the ExtremeNAC (A3) solution.
objective

To deploy Extreme A3 Cloud Network Access Control to build unique workflows and requirements to fit unique environments. Integrate ExtremeNAC (A3) into third party systems, implement controls and checks to help ensure compliance to regulations and policies and be able to leverage custom workflows and alarms to proactively resolve network issues.


outline
  • What is ExtremeNAC (A3)?
  • Qualifying Questions
  • Product capabilities
  • Deployment Modes and Options
  • Enforcement
  • Guest Authentication and Registration
  • Radius and 802.1x
  • Active Directory Integration and Authentication
  • Self-Registration
  • Portal Modules and Modifications
  • PKI and Certificates

target_au
pre_req

A solid networking background. Working proficiency and experience with network security and understanding basic concepts behind Active Directory and Digital Certificates.


titleECS ExtremeWireless Core
days4
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overview  This class will give the students a good technical understanding of the ExtremeWireless CORE technologies. There will also be practical, hands-on-labs, where the students will get to setup and configure this type of technology to supplement the theoretical learning.
objective

This course is a blend of both theoretical and hands-on Lab experience.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Core.

 


outline

Solution Overview

  • ExtremeWireless Landscape
  • WiNG at a glance
  • What’s New In WiNG 7
  • 11ax Introduction
  • WPA3 Introduction
  • Dual Mode Capability
  • ExtremeWireless WiNG hardware overview
  • Configuration Model
  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration

 

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links

 

AP Adoption

  • Finding a controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption

 

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

 

Supported Deployments and Provisioning

  • Reference designs for single and central site/multi-site deployments
  • Scalability considerations
  • General best practices and common design mistakes

 

Clustering

  • Clustering overview
  • Clustering setup

 

Virtual Controller

  • VC overview
  • VC configuration

 

Initial Configuration

  • Initial device setup
  • Resetting APs to factory defaults
  • Configure management access settings via Management Policy

 

Software Management

  • Mixed mode
  • Image types
  • Software upgrade

 

Wireless LANs

  • WLAN configuration
  • WLAN forwarding modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy
  • QoS policies and mappings

 

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features

 

Integrated Services

  • DHCP server
  • Radius server
  • Role Based Access Control (RBAC)
  • IPsec VPN

 

Captive Portal

  • Hotspot deployment options and defining policies
  • Authentication methods used to verify user registrations
  • Enforcing authentication methods
  • User and device registration and notification methods

 

Security Features

  • Stateful L2+ Distributed Firewall features
  • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
  • Variations of Wireless IPS (WIPS)

 

Mesh Features

  • MeshConnex overview
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex

 

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Opening GTAC case

 

NSight

  • NSight overview
  • Using NSight for monitoring and troubleshooting

 

Extreme Guest

  • Extreme Guest overview and features

 

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

 

What’s new?

  • Recent firmware releases overview

target_au
pre_req

A thorough understanding of wireless networking, wired networking and associated protocols. Highly recommended to have completed the Extreme Wireless EDS class.


titleSAUI 1.0 – Implementing Automation for Cisco Security Solutions
days3
seo_title
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overview
objective

After taking this course, you should be able to:

  • Describe the overall architecture of the Cisco security solutions and how APIs help enable security
  • Know how to use Cisco Firepower APIs
  • Explain how pxGrid APIs function and their benefits
  • Demonstrate what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes
  • Describe the features and benefits of using Cisco Stealthwatch Cloud APIs
  • Learn how to use the Cisco Umbrella Investigate API
  • Explain the functionality provided by Cisco AMP and its APIs
  • Describe how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats

outline
  • Introducing Cisco Security APIs
  • Consuming Cisco Advanced Malware Protection APIs
  • Using Cisco ISE
  • Using Cisco pxGrid APIs
  • Using Cisco Threat Grid APIs
  • Investigating Cisco Umbrella Security Data Programmatically
  • Exploring Cisco Umbrella Reporting and Enforcement APIs
  • Automating Security with Cisco Firepower APIs
  • Operationalizing Cisco Stealthwatch and the API Capabilities
  • Using Cisco Stealthwatch Cloud APIs
  • Describing Cisco Security Management Appliance APIs

target_au

This course is designed primarily for professionals in job roles such as:

  • Network engineer
  • Systems engineer
  • Wireless engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network administrator
  • Wireless design engineer
  • Network manager
  • Sales engineer
  • Account manager

pre_req

Before enrolling in this course, you should have professional level knowledge in the following areas:

  • Basic programming language concepts
  • Basic understanding of virtualization
  • Ability to use Linux and Command Line Interface (CLI) tools, such as Secure Shell (SSH) and bash
  • CCNP level core networking knowledge
  • CCNP level security networking knowledge

The following Cisco courses can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Introducing Automation for Cisco Solutions (CSAU)
  • Programming Use Cases for Cisco Digital Network Architecture (DNAPUC)
  • Introducing Cisco Network Programmability (NPICNP)
  • Implementing and Operating Cisco Security Technologies (SCOR)

titleCSAU 1.0 – Introducing Automation for Cisco Solutions
days2
seo_titleCSAU 1.0 - Introducing Automation for Cisco Solutions Training
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Introducing Automation for Cisco Solutions (CSAU) v1.0 course gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) protocols. The course also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain’t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git.   This course will help you:
  • Gain an overview of the skills you need to become a next-generation engineer
  • Prepare to accelerate network automation in your organization
  • Increase collaboration across internal and external teams using version control systems
  • Earn 16 CE credits toward recertification

objective

After taking this course, you should be able to:

  • Articulate the role network automation and programmability play in the context of end-to-end network management and operations
  • Define and differentiate between waterfall and agile software development methodologies
  • Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
  • Describe how DevOps principles, tools, and pipelines can be applied to network operations
  • Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
  • Understand and construct HTTP-based API calls to network devices
  • Articulate the differences among and common use cases for XML, JSON, YAML, and protobuf
  • Construct and interpret Python scripts using the Python requests module to auto

outline
  • Examining Network Management and Operations
  • Exploring Software Development Methodologies
  • Using Python for Network Automation
  • Describing NetDevOps: DevOps for Networking
  • Managing Automation Development Environments
  • Introducing HTTP Network APIs
  • Reviewing Data Formats and Data Encoding
  • Using Python Requests to Automate HTTP-Based APIs
  • Exploring YANG
  • Using YANG Tools
  • Automating Model-Driven APIs with Python
  • Introducing Ansible for Network Automation
  • Templating Configurations with Jinja2
  • Exploring Cisco Ansible Integrations
  • Introducing Multidomain Network Automation

target_au

This course is designed primarily for customer engineers and systems engineers in the following job roles:

  • Automation architect
  • Automation engineer
  • Consulting systems engineer
  • DevOps engineer
  • Network administrator
  • Network architect
  • Network consulting engineer
  • Network design engineer
  • Network engineer
  • Network operator
  • Network reliability engineer
  • Sales engineer
  • Site reliability engineer
  • Systems engineer
  • Technical solutions architect

 

This course would also be useful for network manager job roles such as:

  • Application developer
  • Collaboration developer
  • Collaboration solutions architect
  • IT director
  • Mobile developer
  • Network Operations Center (NOC) manager
  • Software architect
  • Web developer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Routing and switching including Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and basic configuration features such as interfaces, Simple Network Management Protocol (SNMP), and static routes
  • Fundamentals of Python data structures and programming constructs such as loops, conditionals, and classes, or the equivalent of 3–6 months of experience writing Python scripts
  • Basic Linux commands for navigating the file system and executing scripts
  • Knowledge of working with text editors

title(802.1X) 1.0 – Introduction to 802.1X Operations for Cisco Security Professionals
days3
seo_titleOperations for Cisco Security Professionals | Insoft Services
seo_decDuring Operations for Cisco Security Professionals Course you will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, and more.
seo_tkeyOperations for Cisco Security Professionals
categorysecurity-cls
vendorCisco

techonogySecurity
overviewThe Introduction to 802.1X Operations for Cisco Security Professionals Course shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch. See other courses available
objective

Upon completing this course, the learner should be able to meet these overall objectives:

  • Provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1X protocol and the ability to configure the Cisco Identity Services Engine (ISE) for 802.1X operation.
  • The course will introduce the architecture, components, and features of a Cisco TrustSec network designed around the IEEE 802.1X and RADIUS protocols.
  • The student will gain hands-on experience with configuring a network for 802.1X-based network services using the Cisco ISE, Cisco Catalyst switches, and Cisco wireless products.

outline
  • Describe Cisco TrustSec concepts
  • Describe IEEE 802.1X concepts, architecture, and requirements for deployment
  • Describe how the RADIUS authentication protocol is used for Cisco TrustSec
  • Configure Cisco ISE for 802.1X operation
  • Describe IEEE 802.1X supplicants for Microsoft, Apple, and Cisco
  • Configure IEEE 802.1X for a wired network
  • Configure IEEE 802.1X for a wireless network
  • Describe how to provide secure guest access in a Cisco TrustSec network
  • Build a high-level design of a Cisco TrustSec network using IEEE 802.1X.

target_au
  • Channel Partner / Reseller
  • Customer
  • Employee

pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • Cisco Certified Network Associate (CCNA).
  • Attendance of Securing Networks with Routers and Switches (SNRS) or equivalent knowledge.
  • Knowledge of Microsoft Windows Server 2008 Active Directory.
  • Knowledge of Cisco Wireless LAN Controllers and Lightweight Access Points.
  • Knowledge of basic command-line configuration of Cisco Catalyst switches.The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

titleCISA – Certified Information Systems Auditor
days4
seo_titleCISA Certified System Auditor Training Course | Insoft Services
seo_decIn this CISA Certified System Auditor course delegates will be exposed to the Five Domains of Information Security Auditing.
seo_tkeyCISA Certified System Auditor
categoryinformation-systems-security
vendor

techonogySecurity
overviewCISA Certified System Auditor is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security. During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing. These domains comprise the foundations of CISA and it is imperative that delegates grasp a complete understanding of these aspects in order to pass the CISA exam and use their certification within the workplace. Within each of these domains exists multiple topics, which when combined, provide a comprehensive overview of the domain of focus. Due to the breadth of information imparted with each topic over a period of just four days, this course is considered intensive and candidates must study hard to obtain the certification. The five domains are as follows:
  1. The Process of Auditing Information Systems
  2. Governance & Management of IT
  3. Information Systems Acquisition, Development, and Implementation
  4. Information Systems Operations, Maintenance, and Support
  5. Protection of Information Assets
  See other courses available  
objective

This CISA Certified System Auditor training course is not suitable for beginners. It is required that delegates possess at least five years of exposure in the field of Information Systems Auditing. With this information in mind, it is expected that CISA qualified candidates have an outstanding level of professional experience, commitment, and extensive knowledge of IS Auditing. Thus, a CISA qualification is likely to open many doors and propel certified individuals into a high ranking position within the enterprise.

The five domains within the course are as follows:

  • The Process of Auditing Information Systems
  • Governance & Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance, and Support
  • Protection of Information Assets

outline

The course content surrounds the pivotal Five Domains. The information imparted within each domain is as follows:

Domain 1: Information Systems Audit Process:

  • Developing a risk-based IT audit strategy
  • Planning specific audits
  • Conducting audits to IS audit standards
  • Implementation of risk management and control practices

Domain 2: IT Governance and Management:

  • Effectiveness of IT Governance structure
  • IT organizational structure and human resources (personnel) management
  • Organisation’s IT policies, standards, and procedures
  • Adequacy of the Quality Management System
  • IT management and monitoring controls
  • IT resource investment
  • IT contracting strategies and policies
  • Management of organizations IT-related risks
  • Monitoring and assurance practices
  • Organization business continuity plan

Domain 3: Information Systems Acquisition, Development, and Implementation:

  • Business case development for IS acquisition, development, maintenance, and retirement
  • Project management practices and controls
  • Conducting reviews of project management practices
  • Controls for requirements, acquisition, development, and testing phases
  • Readiness for Information Systems
  • Project Plan Reviewing
  • Post Implementation System Reviews

Domain 4: Information Systems Operations, Maintenance, and Support:

  • Conduct periodic reviews of organizations objectives
  • Service level management
  • Third-party management practices
  • Operations and end-user procedures
  • Process of information systems maintenance
  • Data administration practices determine the integrity and optimization of databases
  • Use of capacity and performance monitoring tools and techniques
  • Problem and incident management practices
  • Change, configuration, and release management practices
  • Adequacy of backup and restore provisions
  • Organization’s disaster recovery plan in the event of a disaster

Domain 5: Protection of Information Assets:

  • Information security policies, standards and procedures
  • Design, implementing, monitoring of system and logical security controls
  • Design, implementing, monitoring of data classification processes and procedures
  • Design, implementing, monitoring of physical access and environmental controls
  • Processes and procedures to store, retrieve, transport and dispose of information assets

target_au

The CISA essential for professionals dealing with controlling, monitoring, and assessing an organization’s information technology and business systems. This includes:

  • IS/IT auditors/consultants
  • IT compliance managers
  • Chief Compliance Officers
  • Chief risk & privacy officers
  • Security heads/directors
  • Security managers/architects

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to learn CISA from this tutorial. However, to get the CISA certification you need to:

  • Pass the CISA examination
  • Submit an application for CISA certification
  • Adhere to the Code of Professional Ethics
  • Dedicate to the Continuing Professional Education Program
  • Compliance with the Information Systems Auditing Standards

The examination is open to all individuals who have an interest in information systems audit, control, and security. A minimum of 5 years of professional information systems auditing, control or security work experience is required for the CISA certification.


titleP3O Portfolio, Programme & Project Offices Practitioner
days2
seo_titleP3O Practitioner Training Course in the UK | Insoft Services
seo_decThe P3O Practitioner course will allow individuals to analyze, distinguish, review the success or failure of projects, and contribute to a successful P3O.
seo_tkeyP3O Practitioner Course
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive P3O Practitioner Course will cover the knowledge required to pass the P3O® Practitioner examination. The training course will allow individuals to analyze, distinguish, and review the success or failure of projects, with a full appreciation of differing principles and varying roles that contribute to a successful P3O®. This P3O® certification indicates that a candidate is a proficient Portfolio Manager and can be entrusted with making informed operational decisions.   See other courses available
objective

P3O Practitioner Course (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, P3O® helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • P3O Model and implementing/Re-energising a P3O
  • Essential tools and techniques
  • Crucial P3O Operations
  • Underpinning concepts of P3O and application to your business
  • Individual, collaborative, and integrated Working Methods
  • Enable regular practice and reliable project management
  • Risk analysis and for-seeing issues
  • Best Practice in P3O projects
  • Support structures development
  • Encouraging and using evidence-based decision making
  • Quality assurance
  • Roles of responsibility and clear delegation of tasks
  • Supporting Provision
  • Improving the financial aspects of projects
  • How to create a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Promote business transparency
  • Roles & responsibilities
  • Business case
  • Model customization

outline

Module 1 – Course Overview and introduction

Module 2 – Why Have a P3O?

Module 3 – Designing a P3O

Module 4 – Implementing and Re‐energising a P3O

Module 5 – Practitioner Examination Preparation

Module 6 – Group activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

 

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.

 


pre_req

The P3O Foundation certificate is required to take the P3O practitioner exam.


titleP3O Portfolio, Programme & Project Offices Foundation & Practitioner
days5
seo_titleP3O Foundation and Practitioner Certification | Insoft Services
seo_decThis comprehensive P3O Foundation and Practitioner Certification course will cover the knowledge required to pass the P3O Foundation and Practitioner exams.
seo_tkeyP3O Foundation and Practitioner Certification
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive P3O® course will cover the knowledge required to pass the P3O® Foundation and Practitioner examinations. P3O Foundation and Practitioner Certification training will allow individuals to analyze, distinguish, and review the success or failure of projects, with a full appreciation of differing principles and varying roles that contribute to a successful P3O®. This P3O® certification indicates that a candidate is a proficient Portfolio Manager and can be entrusted with making informed operational decisions.   See other courses available
objective

P3O® (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, P3O Foundation and Practitioner Certification helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • Essential P3O® operations, concepts and, application to your business
  • Individual, collaborative, and integrated working methods
  • P3O Model and implementing/Re-energising a P3O
  • Essential tools and techniques
  • Benefits of project management
  • Risk analysis and foreseeing issues
  • Best practice in P3O® projects
  • Support structures development
  • Encouraging and using evidence-based decision making
  • Quality assurance
  • Roles of responsibility and clear delegation of tasks
  • Supporting provision
  • Improving the financial aspects of projects
  • Creating a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Promote business transparency
  • Enable regular practice and reliable project management
  • Support structures development
  • Quality assurance
  • Supporting Provision
  • Business case
  • Model customization
  • P3MS summary
  • Functions and services

outline

Module 1 – Course Overview and introduction

Module 2 – Introduction to P3O

Module 3 – Why Have a P3O?

Module 4 – Designing a P3O

Module 5 – Implementing and Re‐energising a P3O

Module 6 – Operating a P3O

Module 7 – Practice foundation exams

Module 8 – Practitioner Examination Preparation

Module 9 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this course, however, in order to take the Practitioner exam the foundation certificate will be needed (this can be completed during the course).


titleP3O Portfolio, Programme & Project Offices Foundation
days3
seo_titleP3O Foundation Certification Course | Insoft Services
seo_decThis comprehensive course offers basic tools and techniques of P3O Foundation Certification, and educate them on the constituents of a successful P3O.
seo_tkeyP3O Foundation certification
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive course will equip candidates with the basic tools and techniques of P3O® (Portfolio, Programme and Project Offices), and educate them on the constituents of a successful P3O®. This certification enables individuals to contribute to an office or enterprise in a supporting role. P3O Foundation Certification is a valuable certification in the project management industry, showing that you have the knowledge to operate within a project office that follows the P3O® model. Once you have obtained your P3O® Foundation certification, you will be ready to proceed onto the P3O® Practitioner course.   See other courses available
objective

P3O® (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, the P3O Foundation certification helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • Essential P3O® operations and concepts
  • Individual, collaborative, and integrated working methods
  • Benefits of project management
  • Risk analysis and for-seeing issues
  • Best practice in P3O® projects
  • Support structures development
  • Encouraging evidence-based decision making
  • Quality assurance
  • Roles of responsibility and delegation of tasks
  • Supporting provision
  • Improving the financial aspects of projects
  • Creating a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Business transparency at the forefront

outline

Module 1 – Course Overview and introduction

Module 2 – Introduction to P3O

Module 3 – Why Have a P3O?

Module 4 – Designing a P3O

Module 5 – Implementing and Re‐energising a P3O

Module 6 – Operating a P3O

Module 7 – Practice foundation exams

Module 8 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs


pre_req

There are no prerequisites for this exam.


titleManaging Successful Programmes: 2011 (MSP) Practitioner
days2
seo_titleManaging Successful Programmes (MSP) Practitioner | Insoft Services
seo_dec(MSP) Managing Successful Programmes Practitioner represents good practice in programme management for successfully delivering transformational change.
seo_tkeyManaging Successful Programmes Practitioner
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognized as a key tool to enable organisations to deliver their strategy and manage that transformation. The Managing Successful Programmes Practitioner Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. The two-day MSP Practitioner course builds on the foundation level concepts through to advanced level understanding of the MSP framework. Following the course candidates will be able to understand the relationships between MSP Principles, MSP Governance Themes and MSP Transformational Flow, and can apply this understanding to a given programme scenario. Successful completion of the Practitioner examinations will give the delegate a recognised international qualification; understood and identified in the industry as a mark of quality for Programme Managers.   See other courses available
objective

The MSP framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

MSP defines programme management as ‘the action of carrying out the coordinated organisation, direction and implementation of a dossier and transformation activities to achieve outcomes and realise benefits of strategic importance to the business.’

As well as the guidance detailed within MSP, candidates will learn about the themes running throughout the MSP methodology. On completion of this courses candidates will be able to:

  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Identify additional value as a result of managing change as an MSP programme
  • Explain and apply each of the MSP principles, the governance themes and the transformational flow processes and their activities
  • Explain the relationship between the MSP principles, governance themes, the transformational flow, programme information (documents) and the MSP defined programme management roles
  • Produce and evaluate examples of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP practitioner concepts

Section 4 – MSP practitioner governance themes

Section 5 – Practitioner examination preparation

Section 6 – Group activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management.

The Managing Successful Programmes Practitioner would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their need.


pre_req

To and sit the Practitioner examination the Foundation certification is required. It is strongly recommended that candidates should have a good understanding of project and program management.


titleManaging Successful Programmes: 2011 (MSP) Foundation & Practitioner
days5
seo_titleManaging Successful Programmes (MSP) | Insoft Services
seo_decManaging Successful Programmes (MSP) provides an adaptable route map for programme management to facilitate the delivery of business transformation.
seo_tkeyManaging Successful Programmes (MSP)
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognised as a key tool to enable organizations to deliver their strategy and manage that transformation. The MSP Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. The five-day MSP Foundation & Practitioner course will take candidates from foundation level concepts through to advanced level understanding of the MSP framework. Following the course candidates will be able to understand the relationships between MSP Principles, MSP Governance Themes and MSP Transformational Flow, and can apply this understanding to a given programme scenario. Successful completion of the Foundation and Practitioner examinations will give the delegate a recognized international qualification; understood and identified in the industry as a mark of quality for Programme Managers.   See other courses available
objective

The Managing Successful Programmes (MSP) framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

MSP defines programme management as ‘the action of carrying out the coordinated organisation, direction and implementation of a dossier and transformation activities to achieve outcomes and realise benefits of strategic importance to the business.’

As well as the guidance detailed within MSP, candidates will learn about the themes running throughout the MSP methodology. On completion of this courses candidates will be able to:

  • Distinguish between projects and programmes
  • Identify the MSP defined types of programme and their characteristics
  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Explain the purpose and areas of focus of the defined roles
  • Identify additional value as a result of managing change as an MSP programme
  • Explain and apply each of the MSP principles, the governance themes and the transformational flow processes and their activities
  • Explain the relationship between the MSP principles, governance themes, the transformational flow, programme information (documents) and the MSP defined programme management roles
  • Produce and evaluate examples of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP governance themes

Section 4 – MSP transformational flow

Section 5 – MSP practitioner concepts

Section 6 – MSP practitioner governance themes

Section 7 – Practice foundation exams

Section 8 – Practitioner examination preparation

Section 9 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

This course leads to foundation certification in the initial stages of training. Assuming candidates pass their Foundation examination, there is no prerequisite to attending this course.

To complete the latter stage of training and sit the Practitioner examination the Foundation certification is required. It is strongly recommended that candidates should have a good understanding of project and program management.


titleManaging Successful Programmes: 2011 (MSP) Foundation
days3
seo_titleMSP Foundation Course - IT Training | Insoft Services
seo_decThe purpose of MSP Foundation Course is to ensure candidates have the knowledge and understanding of the core concepts of MSP guidance.
seo_tkeyMSP Foundation
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognised as a key tool to enable organizations to deliver their strategy and manage that transformation. The MSP Foundation Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. This three-day course leads to the MSP Foundation. This is a free-standing qualification, but is also part of the MSP Practitioner qualification scheme and provides candidates with a broad overview of the MSP Framework. The purpose of the MSP Foundation qualification is to ensure candidates have the knowledge and understanding of the core concepts of MSP guidance to interact effectively with those involved in the management of a programme or act as an informed member of a programme office, business change team or project delivery team working within an environment supporting MSP. This level is also a prerequisite for programme management professionals progressing toward the practitioner and advanced practitioner qualification, and those aspiring to become programme management professionals in the future.   See other courses available
objective

The MSP framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

On completion of this course, candidates will be able to:

  • Distinguish between projects and programmes
  • Identify the MSP defined types of programme and their characteristics
  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Explain the purpose and areas of focus of the defined roles
  • Explain the purpose of the seven MSP principles, the nine governance themes and the six transformational flow processes
  • Explain the purpose of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP governance themes

Section 4 – MSP transformational flow

Section 5 – Practice foundation exams

Section 6 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of Project or Programme Management.


titleChange Management Practitioner
days2
seo_titleChange Management Practitioner Certification Course | Insoft Services
seo_decChange Management Practitioner Certification is designed to help manage the impact of change and provide techniques to plan and implement transformations.
seo_tkeyChange Management Practitioner Certification
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Practitioner Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.

A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative – but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, the complexity of the change initiative, and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation.


outline

Change Impact

  • Levers for change
  • Levels of adoptions and critical mass
  • Reinforcing systems

Exam Preparation

  • Change Management Practitioner Exam Preparation
  • Change Management Practitioner Exam

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. This course would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The change management foundation certificate is required to sit the Practitioner level exam.


titleChange Management Foundation & Practitioner
days5
seo_titleChange Management Certification - IT Certification | Insoft Services
seo_decChange Management Certification, developed by APMG with GMI, provides an independent standard for professional knowledge for an effective change manager.
seo_tkeyChange Management Certification
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Foundation certification is to confirm that a candidate has sufficient knowledge and understanding of Change Management to work as an informal member of a team working on an organizational change initiative. The Foundation certification is also a pre-requisite for the APMG Practitioner certification.

The new syllabus samples a wide range of knowledge regarding the theory and practice of change management including:

  • Change and the individual
  • Change and the organization
  • Communication and stakeholder engagement and;
  • Change practice

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.

A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative – but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, the complexity of the change initiative, and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation.


outline

Change and the Organization

  • Drivers for change
  • Developing a vision
  • Culture and climate
  • Emergent change and life-cycle
  • Organizational metaphors
  • Models of change
  • Roles required for change

Stakeholders

  • Principles
  • Identification
  • Analysis
  • Influencing and listening
  • Emotion and demonstration
  • Communications
  • Cognitive biases
  • Remaining people-focused
  • Improving Communications
  • Communications channels
  • Collaboration
  • Communications Planning
  • Larger workshops

Change Impact

  • Assessing impact
  • McKinsey 7 S
  • Stakeholder impact assessment
  • Assessing change readiness
  • Large change – how to staff
  • Building a change team
  • Preparing for resistance
  • Building team effectiveness

Individual Change

  • Learning theory
  • Motivation
  • Change Curve
  • Personality differences

Change Impact

  • Levers for change
  • Levels of adoptions and critical mass
  • Reinforcing systems

Exam Preparation

  • Change Management Practitioner exam preparation
  • Change Management Practitioner exam

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Change Management Practitioner would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. The change management foundation certificate is required to sit for the practitioner level exam.


titleChange Management Foundation
days3
seo_titleChange Management Foundation Course | Insoft Services
seo_decChange Management Foundation Course provides professional knowledge that allows us to deal with change and the impact of change on organizations.
seo_tkeyChange Management Foundation Course
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. Change Management Foundation Course provides professional knowledge that allows us to deal with change and the impact of change on organizations. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Change Management Foundation course is to confirm that a candidate has sufficient knowledge and understanding of Change Management to work as an informal member of a team working on an organizational change initiative. The Foundation certification is also a pre-requisite for the APMG Practitioner certification.

The new syllabus samples a wide range of knowledge regarding the theory and practice of change management including:

  • Change and the individual
  • Change and the organization
  • Communication and stakeholder engagement and;
  • Change practice

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.


outline

Change and the Organization

  • Drivers for change
  • Developing a vision
  • Culture and climate
  • Emergent change and life-cycle
  • Organizational metaphors
  • Models of change
  • Roles required for change

Stakeholders

  • Principles
  • Identification
  • Analysis
  • Influencing and listening
  • Emotion and demonstration
  • Communications
  • Cognitive biases
  • Remaining people-focused
  • Improving Communications
  • Communications channels
  • Collaboration
  • Communications Planning
  • Larger workshops

Change Impact

  • Assessing impact
  • McKinsey 7 S
  • Stakeholder impact assessment
  • Assessing change readiness
  • Large change – how to staff
  • Building a change team
  • Preparing for resistance
  • Building team effectiveness

Individual Change

  • Learning theory
  • Motivation
  • Change Curve
  • Personality differences

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Change Management Practitioner would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices


titleAgilePM Practitioner
days2
seo_title
seo_decAgilePM Practitioner certification offers the core principles needed to facilitate a successful project, while allowing a degree of scope and agility.
seo_tkeyAgilePM Practitioner
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This two-day AgilePM Practitioner certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This two-day course leads to the AgilePM Practitioner certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including:

  • Understand how Agile Project Management projects are delivered to time, cost & quality
  • Understand when and why to select Agile Project Management
  • Plan and organize Agile Project Management projects
  • Successfully complete a project using the required Agile Life-cycle, Processes, Roles, Management Products and Practices/Techniques

outline

Module 1 – Course overview and introduction

Module 2– The DSDM team model

Module 3 – Lifecycle and products

Module 4 – People, teams and collaboration

Module 5 – DSDM techniques

Module 6 – Planning and control

Module 7 – Practitioner exam preparation

Module 8 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Practitioner would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Pre-requisites accepted to be eligible to take the Practitioner examination:

  • AgilePM Foundation Certificate (either 2010 or 2014 version), or
  • DSDM Atern Foundation Certificate, or
  • DSDM Advanced Practitioner Certificate

titleAgilePM Foundation & Practitioner
days5
seo_titleAgilePM Foundation and Practitioner Certification | Insoft Services
seo_decAgilePM Foundation and Practitioner certification provides practical understanding of the techniques used, roles and responsibilities in an Agile project.
seo_tkeyAgilePM Foundation and Practitioner
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This five-day AgilePM Foundation and Practitioner certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This five-day course leads to the AgilePM Foundation and Practitioner certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including:

  • Choosing the right Agile approach
  • Philosophy, Principles and Project Variables
  • Preparing for Success
  • The DSDM Process
  • The People – DSDM Roles and Responsibilities
  • The DSDM Products
  • Key Practices – MoSCoW and Timeboxing
  • Planning and Control throughout the Life-cycle
  • Facilitated Workshops
  • Modeling and Iterative Development
  • People, Teams and Interactions
  • Understand how Agile Project Management projects are delivered to time, cost & quality
  • Understand when and why to select Agile Project Management
  • Plan and organize Agile Project Management projects
  • Successfully complete a project using the required Agile Life-cycle, Processes, Roles, Management Products and Practices/Techniques

outline

Module 1 – Course overview and introduction

Module 2 – The DSDM approach

Module 3 – The DSDM team model

Module 4 – Lifecycle and products

Module 5 – People, teams and collaboration

Module 6 – Requirements and user stories

Module 7 – Workshops and prioritization

Module 8 – Timeboxing, iterative development and testing

Module 9 – Planning and control

Module 10 – Practitioner exam preparation

Module 11 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Practitioner would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for the foundation exam.

Pre-requisites accepted to be eligible to take the Practitioner examination:

  • AgilePM Foundation Certificate (either 2010 or 2014 version), or
  • DSDM Atern Foundation Certificate, or
  • DSDM Advanced Practitioner Certificate

titleAgilePM Foundation
days3
seo_titleAgilePM Foundation Certification - IT Training | Insoft Services
seo_decThis three-day AgilePM Foundation certification provides the method with the core principles needed to facilitate a successful project.
seo_tkeyAgilePM Foundation
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This three-day AgilePM Foundation certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This two-day course leads to the AgilePM Foundation certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including

  • Choosing the right Agile approach
  • Philosophy, Principles and Project Variables
  • Preparing for Success
  • The DSDM Process
  • The People – DSDM Roles and Responsibilities
  • The DSDM Products
  • Key Practices – MoSCoW and Timeboxing
  • Planning and Control throughout the Life-cycle
  • Facilitated Workshops
  • Modeling and Iterative Development
  • People, Teams and Interactions
  • Agile PM Foundation Exam

outline

Module 1 – Course overview and introduction

Module 2 – The DSDM approach

Module 3 – The DSDM team model

Module 4 – Life-cycle and products

Module 5 – People, teams and collaboration

Module 6 – Requirements and user stories

Module 7 – Workshops and prioritization

Module 8 – Timeboxing, iterative development and testing

Module 9 – Planning and control

Module 10 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Foundation would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this exam.


titleSIAM Foundation (Service Integration and Management)
days3
seo_titleService Integration and Management (SIAM) - IT Training | Insoft Services
seo_decService Integration and Management (SIAM) is a methodology used to manage multiple service providers and to integrate them seamlessly into IT organization.
seo_tkeyService Integration and Management (SIAM)
categorysiam
vendorInsoft Specials

techonogyIT Services Management
overviewService Integration and Management (SIAM) creates an environment where IT professionals can effectively orchestrate the increasing array of business solutions and services, whether they are delivered internally, externally, or from the cloud. The BCS EXIN Foundation Certificate in SIAM® is the most relevant and practical resource for skills and knowledge development, aligning Service Management framework processes and enabling businesses of any size to effectively manage multi-sourcing. This includes outsourcing, SaaS, PaaS, and Cloud and benefits a very broad range of stakeholders. Organizations are recognizing an increasing need to implement a Service Integration and Management (SIAM) framework to help them better manage multiple suppliers and reduce service complexity, whilst improving efficiency, governance, and cost control. SIAM is a methodology used to manage multiple service providers and to integrate them seamlessly to provide a single business-facing IT organization.   See other courses available
objective

The EXIN BCS SIAM® Foundation tests a candidate’s knowledge and understanding of the terminology and the core principles. This certification covers themes such as potential benefits as well as the challenges and risks of implementing Service Integration and Management. The SIAM® certification also includes examples of implementation structures, governance, tooling and data considerations, and the common processes used in a SIAM ecosystem.

A candidate who successfully completes the EXIN BCS SIAM® Foundation knows how Service Integration and Management delivers business value and is able to contribute to the implementation and use of Service Integration and Management in an organization.


outline

Module 1 – Introduction to Service Integration and Management

Module 2 – SIAM implementation roadmap

Module 3 – SIAM and its relation to other management practices

Module 4 – SIAM roles and responsibilities

Module 5 – SIAM practices

Module 6 – Processes to support SIAM

Module 7 – SIAM challenges and risk


target_au

The certification will create clarity and consensus for anyone involved in service management that takes care of any combination of internal and external service providers.

This includes:

  • Consultants
  • Service managers
  • Project and program managers
  • Business relationship managers
  • Change and commercial managers
  • Solution Architects

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this exam.


titleSDI Service Desk & Support Manager
days4
seo_titleService Desk and Support Manager - IT Training | Insoft Services
seo_decService Desk & Support Manager qualification (SDM) ensures that candidates are provided with the knowledge, information, and tools to successfully pass the SDM exam.
seo_tkeyService Desk and Support Manager
categorysda
vendorAPMG

techonogyIT Services Management
overviewFunctioning effectively as a Service Desk & Support Manager requires a broad range of skills and abilities. These talents range from people-management abilities, relationship management, and logistical awareness to financial acumen and presentation skills. This course provides a thorough understanding of, and qualification in, Service Desk & Support Management. The course also investigates the management of support methodologies and technologies and the tools utilized within the Service Desk and support teams. This four-day course also covers issues such as Service Level Agreements, the benefits and pitfalls and the importance of metrics; the implementation of service management processes, and effective problem-solving techniques that a Service Desk Manager can utilize. The course is based upon the standards and objectives for SDI’s Service Desk & Support Manager qualification (SDM) and ensures that candidates are provided with the knowledge, information, and tools to successfully pass the SDM exam.   See other courses available
objective

After attendance on this course, candidates will recognize and understand the importance of understanding our customer’s expectations and perceptions, along with understanding the benefit of using SLAs effectively as a service quality improvement tool. Critically, candidates will learn about the importance of a reward and recognition strategy and identify some different methods of reward and recognition. Specifically, this course covers the following key Service Desk and Support Management Skills:

  • Course Overview and Introduction
  • The Strategic Role of Support
  • Essential Management Skills
  • Developing and Promoting the Service Desk
  • IT Service Management
  • Quality Assurance
  • Effective Management of Tools and Technology
  • Staff Recruitment, Retention, and Development
  • Leadership and Management
  • Professional Development

The SDI qualification is an open qualification standard that is independent of any other training curriculum. SDI is the administrator, facilitator, and arbitrator of the standards. The exams are independently administered and proctored.


outline

Module 1 – The strategic role of support

  • Role of the service desk
  • The activities of the service desk
  • Successful service desk characteristics
  • Vision and mission statements
  • Goof practice and best practice
  • Service desk and best practice
  • Business standards and Industry standards
  • Service ethics
  • Social responsibility

Module 2 – Essential Management Skills

  • Essential skills and competencies
  • Routine responsibilities
  • Strategic responsibilities
  • The importance of documentation
  • Business knowledge
  • Strategic alignment
  • Obtaining support to remove barriers and board approval
  • Commercial management
  • Financial management
  • Business cases
  • Organizational change management
  • Elements and characteristics of project management
  • Communication skills
  • Effective presentations
  • Negotiation

Module 3 – Developing and promoting the service desk

  • Effective working relationships
  • Personal networking
  • Building effective work relationships
  • Contributing to IT/Business objectives
  • Conducting assessments
  • Analysis techniques
  • Sourcing models
  • Outsourcing the service desk
  • Promoting the service desk
  • Managing stakeholders expectations

Module 4 – IT Service Management

  • Objectives of ITSM
  • IT Infrastructure Library (ITIL)
  • Incident Management
  • Request Fulfillment
  • Problem Management
  • IT Change Management
  • Release and Deployment Management
  • Service Asset and Configuration Management
  • Knowledge Management
  • Information Security Management
  • IT Service Continuity Management
  • Service Catalogue Management
  • Service Level Management

Module 5 – Quality assurance

  • Quality assurance program and practices
  • Customer feedback
  • Service desk bench-marking
  • Monitoring interactions
  • Monitoring benefits
  • Incident and request monitoring
  • Call monitoring
  • Support delivery model variables
  • CSF’s, KPI’s and metrics
  • Resource management

Module 6 – Efficient management of tools and technologies

  • Service desk infrastructure
  • Common service desk technologies
  • IT Service Management systems
  • Automatic Call Distribution (ACD)
  • Computer Telephony Integration (CTI)
  • Support tools and methodologies
  • Telephone support
  • Deskside support
  • Electronic support tools
  • IT self-service and self-help
  • Self-healing tools
  • Cloud computing
  • Social media
  • Social collaboration

Module 7 – Staff recruitment, retention and development

  • Recruitment
  • The interview process
  • Structured induction and training
  • Skills and knowledge
  • Retain staff
  • Measuring satisfaction and engagement
  • Staffing strategy
  • Common staffing pitfalls
  • Staffing models

Module 8 – Leadership and Management

  • Characteristics of effective management
  • Activates of effective management – Planning
  • Activates of effective management – Organization resources
  • Activates of effective management – Direct, control and co-ordinate
  • Characteristics of effective leadership
  • Motivations of effective leadership
  • Benefits of motivation and motivation factors
  • Maintaining a positive environment
  • Improving performance
  • Reward and recognition
  • Providing direction and focus
  • Teamwork
  • Friendly and supportive workplaces

Module 9 – Professional development

  • Professional development assessment
  • Professional development methods
  • Personal development
  • Coaching
  • Mentoring
  • Stress management

target_au

Although there is no mandatory requirement, ideally candidates should have at least three years of professional experience working at the supervisory level within a Service Desk or support team. This course is ideal for both new Service Desk and Support managers and those who are established but wish to understand the latest approach and techniques for Service Desk best practice. The SDI Service Desk & Support Manager course would suit candidates working in the following professions or areas:

  • Support Managers
  • Service Desk Managers
  • Client Managers
  • Desktop Managers
  • Customer Support Managers
  • Technical Support Managers
  • Service Center Managers

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this Service Desk & Support Analysts course, although it is recommended that candidates should have a good understanding of service desk activity and objectives.


titleSDI Service Desk & Support Analyst
days3
seo_titleService Desk and Support Analyst (SDA) - IT Training | Insoft Services
seo_decThe Service Desk & Support Analyst (SDA) is designed to prepare candidates to work within and manage customer support environments.
seo_tkeyService Desk and Support Analyst (SDA)
categorysda
vendorAPMG

techonogyIT Services Management
overviewThe Service Desk & Support Analyst (SDA) three-day course recognizes an individual’s knowledge of customer service competencies and certifies that they have the skills required to work in the support industry. An individual passing an SDI exam indicates that they understand the role of the service desk professional and the associated best practice for communications, customer service, teamwork, ethics, service desk processes, and terminology usage. The Guide has been written by leading industry experts and is part of the Service Desk Institute (SD) stream of courses. This training event is designed to prepare candidates to work within and manage customer support environments.   See other courses available
objective

The SDA course is focused on equipping support analysts with the skills essential to deliver excellent levels of customer service and support. The course also looks at support methodologies and technologies and the tools utilized within the Service Desk. It reviews issues such as Service Level Agreements, the benefits and pitfalls and the importance of metrics; the implementation of service management processes, and effective problem-solving techniques that a Service Desk Analyst can utilize. It is based upon the standards and objectives for SDI’s Service Desk & Support Analyst qualification and ensures that students are provided with the knowledge, information, and tools to take the SDA exam.

The core concepts covered in the SDA course are:

  • Roles and Responsibilities
  • Effective Communication
  • Customer Service Skills and Competencies
  • Determine the importance of effective cross-cultural communication
  • The Service Desk Environment
  • Process Management
  • Managing, Meeting and Maintaining Service Levels
  • Problem Solving
  • Develop a clear understanding of the support tools and technologies available to Service Desk Analysts

The SDI qualification is an open qualification standard that is independent of any other training curriculum. SDI is the administrator, facilitator, and arbitrator of the standards. The exams are independently administered and proctored.


outline

Module 1 – Roles and Responsibilities

  • Roles and responsibilities
  • Activities of the service desk
  • Expectation of customers
  • The role of service desk management
  • Service desk and support analyst roles
  • Personal professional development
  • The service desk and best practice
  • The organizations policies
  • Local and international legislation
  • Service commitments and ethics
  • Good service attitude, skills and knowledge
  • Quality and service expectations
  • The supportive workplace
  • Typical service desks

Module 2 – Relationship Management

  • Teamwork
  • Relationship management
  • Customer relationship techniques – Organization
  • Customer relationship techniques – Colleagues
  • Customer relationship techniques – Customers
  • Cultural awareness and sensitivity
  • Language barriers
  • Communication techniques
  • Obtaining language assistance

Module 3 – Effective communication skills and competencies

  • Elements of communication
  • Customer communication
  • Emotional intelligence
  • Communications protocols
  • Barriers to communications
  • Ineffective communication
  • Verbal skills
  • Adapting your communication style
  • Non-verbal communication
  • Listening skills
  • Activating listening
  • Written communication
  • Using questions effectively
  • Types of question types and use of them
  • Problem-solving
  • Creative thinking

Module 4 – Effective rapport and conflict management skills

  • Empathy
  • Common emotions and actions
  • Dealing with negative reactions
  • Signs of conflict and frustration
  • Your role in conflict resolution
  • Successful negotiation
  • Professional contact management
  • Interaction and call management
  • Standard telephone greetings
  • Focusing the customer attention
  • Unsupported products
  • Unprofessional call management
  • Silent time
  • Routing call handling procedures
  • Techniques to manage difficult situations
  • Disengaging calls professionally
  • Stress management
  • Time management techniques
  • Types of customer behavior
  • Confidence

Module 5 – Effective processes and IT Service Management

  • Process management
  • Importance of documentation
  • Why follow processes and procedures
  • Incident management
  • Request fulfillment
  • Problem management
  • IT change management
  • Service level management
  • Service catalog
  • Knowledge management
  • IT security management
  • Software license management
  • IT service continuity management

Module 6 – Quality assurance activities

  • Quality assurance
  • Interaction monitoring
  • Incident and request monitoring
  • Customer satisfaction surveys
  • Service desk metrics
  • Common service desk measurements

Module 7 – Service desk technologies and tools

  • Telephony systems
  • Technology for ITSM processes
  • Service desk internet technologies
  • Assisted service delivery models
  • Support delivery models
  • Telephone support
  • Remote support
  • Deskside support
  • Basic IT components
  • Automatic call distribution (ACD)
  • Computer telephony integration (CTI)
  • Self-service technology
  • Self-healing technology
  • Social media

target_au

Although there is no mandatory requirement, ideally candidates should have an awareness of working in a service or support department or team. The SDI Service Desk & Support Analyst course would suit candidates working in the following professions or areas:

  • Support Analysts
  • Service Desk Analysts
  • First-line Analysts
  • Second-line Analysts
  • Client Supports
  • Desktop Support Analysts
  • Customer Support Officers
  • Technical Support Analysts
  • Service Center Analysts

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this Service Desk & Support Analysts course, although it is recommended that candidates should have a good understanding of service desk activity and objectives.


titleEnterprise Architecture Foundation Training
days2
seo_titleTOGAF Enterprise Architecture Foundation - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Foundation helps utilize resources more efficiently and effectively, and realize a greater return on investment.
seo_tkeyTOGAF Enterprise Architecture Foundation
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This two-day course is intended as a foundational introduction to the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

The course examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 exam (foundation). During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • The basic concepts of Enterprise Architecture and TOGAF
  • The core concepts of TOGAF 9
  • The key terminology of TOGAF 9
  • The ADM cycle and the objectives of each phase, and how to adapt and scope the ADM
  • The concept of the Enterprise Continuum; its purpose and constituent parts
  • How each of the ADM phases contributes to the success of enterprise architecture
  • The ADM guidelines and techniques
  • How Architecture Governance contributes to the Architecture Development Cycle
  • The concepts of views and viewpoints and their role in communicating with stakeholders
  • The concept of building blocks
  • The key deliverables of the ADM cycle
  • The TOGAF reference models
  • The TOGAF certification program
  • Foundation Exam Preparation

outline

Module 1 – Course overview and introduction
Module 2 – TOGAF 9.1 Introduction and Core Concepts
Module 3 – The Enterprise Continuum and Tools
Module 4 – The Architecture Development Method (ADM)
Module 5 – Architecture Governance
Module 6 – ADM Guidelines and Techniques
Module 7 – TOGAF Reference Models
Module 8 – Group Activities and Buzz Exercises


target_au

The TOGAF Enterprise Architecture Foundation would suit candidates working in the following professions or areas:

  • Individuals who require a basic understanding of the TOGAF 9 framework
  • Professionals who are working in roles associated with an architecture project
  • Individuals responsible for planning, execution, development, delivery, and operation
  • Architects who are looking for a first introduction to TOGAF 9
  • Architects who want to achieve Level 2 certification

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this course, although it is recommended that candidates should have at least two years of professional experience working in Enterprise Architecture.


titleISO27001:2013 Information Security Practitioner
days2
seo_titleISO27001:2013 Information Security Practitioner Course | Insoft Services
seo_decISO27001:2013 Information Security Practitioner develops a deeper understanding of how to apply the standard for implementation, management and improvement.
seo_tkeyISO27001:2013 Information Security Practitioner
categoryit-services-management-training
vendorAPMG

techonogyIT Services Management
overviewISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. This two-day course expands on the foundational overview of this recently revised version of 2013. The ISO27001:2013 Information Security Practitioner training develops a deeper understanding of how to actually apply the standard for implementation, management, and improvement. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources.
  • ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Practitioner course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology
  • Apply your knowledge to business scenarios to enhance control of information
  • Establish a structured approach to information security management to secure information assets
  • Improve information security through the adoption of best practices
  • Understand how ISO/IEC 27001 provides a competitive differentiator when tendering for business contracts
  • Build a reputation with the secure management of confidential and sensitive information
  • Demonstrate compliance with an internationally recognized standard and the ability to satisfy customer security requirements

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – Practitioner examination preparation


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation and Practitioner would suit candidates working in the following professions or areas:

  • Both IT and business people will benefit from this course
  • Those requiring a basic understanding of the Information Security
  • IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • Anyone involved in or contributing to an on-going service improvement program
  • The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates are required to have attended an accredited training course and have successfully passed their foundation examination. It is strongly recommended that candidates should have a good understanding of security management.


titleISO27001:2013 Information Security Foundation
days3
seo_titleISO27001:2013 Information Security Foundation Course | Insoft Services
seo_decISO27001:2013 Information Security Foundation provides the basis for effective management of confidential information and application of information security controls.
seo_tkeyISO27001:2013 Information Security Foundation
categoryinformation-systems-security
vendorAPMG

techonogyIT Systems and Security
overviewThis three-day ISO27001:2013 Information Security Foundation course overviews the recently revised version of 2013. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources. ISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Foundation course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – ISMS implementation

Module 7 – ISMS audit and certification


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation would suit candidates working in the following professions or areas:

  • · Both IT and business people will benefit from this course
  • · Those requiring a basic understanding of the Information Security
  • · IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • · Anyone involved in or contributing to an on-going service improvement program
  • · The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite for attending this course. It is strongly recommended that candidates should have a good understanding of security management.


titleLean IT Leadership
days3
seo_title
seo_decLean IT Leadership shows how to establish and maintain a sustainable approach to long term improvement of value delivery from IT.
seo_tkeyLean IT Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation and Lean IT Leadership exam. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This three-day course leads to the Lean IT Leadership exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a deep understanding of what skills are needed and what it takes to be a Lean IT Leader, this includes:

  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organisation
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 2 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 3 – Helping Others to Develop

  • Definition of Genchi Genbutsu/ Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 4 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 5 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 6 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 7 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Kaizen
days3
seo_title
seo_decThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives.
seo_tkeyLean IT Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives. The course teaches students how to effectively use the Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) improvement model leveraging the Lean A3 problem identification and planning tool to complete a full improvement cycle. This certification course provides you with the knowledge, skills, and methodology required to identify, plan and implement incremental service and process improvements focused on improving the efficiency and effectiveness of any process or value stream. It also prepares you for the Lean IT Association Kaizen certification exam. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Kaizen level certification.   See other courses available
objective
outline

This three-day course leads to the Lean IT Kaizen certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to be a highly effective Lean Kaizen Lead.

During the course you will:

  • Understand Lean principles related specifically to leading a Kaizen event
  • Understand how to apply the Lean A3 tool to support continual improvement
  • Gain practical how-to knowledge of how to use of the Six Sigma DMAIC improvement model as a structured improvement methodology
  • Learn about improvement scoping and validation
  • Learn how to gain the voice of customer input and establish critical to quality requirements
  • Learn how to apply and use Value Stream Mapping (VSM) techniques to identify process waste and speed improvement opportunities
  • Understand how to use root cause analysis techniques to support problem analysis
  • Learn how to identify, select and use various improvement options
  • Understand how to establish effective controls
  • Understand how to establish methods to improve quality and mistake proof future process activities

target_au

The course is designed for IT practitioners interested in expanding their practical knowledge and skills to lead targeted Lean improvement initiatives focused on continual service improvement, including:

  • Managers tasked with department level process improvements
  • Business analysts
  • Project managers
  • Software developers
  • Quality assurance managers
  • IT Consultants
  • Any roles responsible for quality, efficiency and continual service improvement

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req
titleLean IT Foundation with Six Sigma Overview
days3
seo_titleLean IT Foundation with Six Sigma Overview | Insoft Services
seo_decLean IT Foundation with Six Sigma Overview course shows how to apply the Lean IT approach to address customer value requirements.
seo_tkeyLean IT Foundation with Six Sigma Overview
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation exam followed by an overview of Six Sigma. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.   See other courses available
objective

Lean IT Foundation with Six Sigma Overview is a three-day course that leads to the Lean IT Association foundation exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organisation
  • Lean IT Dimensions: Behaviour & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • High-level overview of Six Sigma

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behaviour & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviours
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Six Sigma

  • Meaning of Six Sigma
  • History of Six Sigma
  • Common roles in six sigma
  • Six Sigma methods
  • Six Sigma tools
  • Control charts
  • The Six Sigma organization
  • Process capability and measures

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of IT processes.


titleLean IT Foundation & Leadership
days5
seo_titleLean IT Foundation and Leadership - IT Training | Insoft Services
seo_decLean IT Foundation and Leadership provides practical appreciation of how to apply Lean IT Principles to specific business problems and pain points.
seo_tkeyLean IT Foundation and Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain both a foundational understanding of all the key parts of the Lean It approach and a more in-depth focus in IT Lean Leadership, this includes:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organization
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behavior & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviors
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 9 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 10 – Helping Others to Develop

  • Definition of Genchi Genbutsu/Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 11 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 12 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 13 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 14 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Foundation & Kaizen
days5
seo_titleLean IT Foundation and Kaizen - IT Training | Insoft Services
seo_decLean IT Foundation and Kaizen course will show how to implement and apply Kaizen improvement activities into the enterprise, use it for client initiatives.
seo_tkeyLean IT Foundation and Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewLean IT Foundation and Kaizen course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

Lean IT Foundation and Kaizen two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleLean IT Foundation
days2
seo_title
seo_decLean IT Foundation training is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.
seo_tkeyLean IT Foundation
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis two-day course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

This two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleEnterprise Architecture Foundation & Advanced Training
days4
seo_titleTOGAF Enterprise Architecture Training | Insoft Services
seo_decTOGAF Enterprise Architecture Training is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts.
seo_tkeyTOGAF Enterprise Architecture Training
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This four-day course is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Training examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 & 2 exams (foundation and certified). During the course delegates will get the opportunity to prepare for the exams and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • Course Introduction
  • TOGAF Basic Concepts
  • Architecture Governance
  • Architecture Views and Viewpoints
  • The ADM Phases
  • Building Blocks and the ADM
  • Key ADM Deliverables
  • ADM Guidelines and Techniques
  • The Architecture Development Method (ADM) – architecture process
  • Guidelines and techniques for using and adapting the ADM
  • The Architecture Content Framework – how to describe the architecture
  • The Enterprise Continuum – a classification system for architecture assets
  • TOGAF 9 Reference Models – the ‘building blocks’ of an Information System
  • Architectural Governance and Capability – governance, skills and maturity
  • Foundation & Certified Exam Preparation

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – The Enterprise Continuum and Core Concepts

Module 4 – The Architecture Development Method

Module 5 – Architecture Governance

Module 6 – ADM Guidelines and Techniques

Module 7 – TOGAF Reference Models

Module 8 – The ADM in Detail

Module 9 – Adapting the ADM Using Iterations and Levels

Module 10 – Security and the ADM

Module 11 – Service Orientated Architecture (SOA)

Module 12 – Architecture Content Framework (Metamodel)

Module 13 – Certified (Part 2) Examination Preparation

Module 14 – Group Activities and Buzz Exercices


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this taking the TOGAF Certified (Level 2) exam. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleEnterprise Architecture Advanced Training
days2
seo_titleTOGAF Enterprise Architecture Advanced - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Advanced training contains guidance on what to do to establish an architecture practice and use it for transformation.
seo_tkeyTOGAF Enterprise Architecture Advanced
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. Enterprise Architecture Advanced Training is a two-day course that is intended as an advanced exploration of the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Advanced training is designed as a follow-on course from the TOGAF Level 1 examination. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain an advanced understanding of all the key parts of the TOGAF Framework:

  • How to apply the ADM phases in the development of an enterprise architecture
  • How to apply Architecture Governance in the development of an enterprise architecture
  • How to apply the TOGAF Architecture Content Framework
  • How to apply the concept of Building Blocks
  • How to apply the Stakeholder Management Technique
  • How to apply the TOGAF Content Metamodel
  • How to apply TOGAF recommended techniques when developing an enterprise architecture
  • The TOGAF Technical Reference Model and how to customize it to meet an organizations needs
  • The Integrated Information Infrastructure Reference Model
  • The content of the key deliverables of the ADM cycle
  • How an enterprise architecture can be partitioned to meet the specific needs of an organization
  • The purpose of the Architecture Repository
  • How to apply iteration and different levels of architecture with the ADM
  • How to adapt the ADM for security
  • SOA as a style of architecture
  • The role of architecture maturity models in developing an enterprise architecture
  • The purpose of the Architecture Skills Framework and how to apply it within an organization

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – TOGAF Reference Models

Module 4 – The Architecture Development method in detail

Module 5 – Adapting the ADM Using Iterations and Levels

Module 6 – Security and the ADM

Module 7 – Service Orientated Architecture (SOA)

Module 8 – Architecture Content Framework (Metamodel)

Module 9 – Certified (Part 2) Examination Preparation

Module 10 – Group Activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleCOBIT 5 Foundation & NIST Cyber Security Framework
days5
seo_titleCOBIT 5 Foundation and NIST CyberSecurity Framework | Insoft Services
seo_decCOBIT 5 Foundation and NIST Cybersecurity Framework prepare candidates to manage cybersecurity in a structured way using the NIST Cybersecurity Framework.
seo_tkeyCOBIT 5 Foundation and NIST CyberSecurity
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThis 5-day COBIT 5 Foundation and Implementing NIST Cybersecurity Framework using COBIT® 5 course, builds from the foundation level of COBIT, what it is and what it does, to preparing candidates to manage cybersecurity in a controlled and structured way using the NIST Cybersecurity Framework. The second part of the course is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business
  • Introduction to the Cybersecurity Framework

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise End-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Critical Security Framework Structure

  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow
  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 7: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 8: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 9: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 10: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 11: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 12: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 13: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts, IT organizational management, and a basic knowledge of cybersecurity concepts.


titleCOBIT 5 & NIST Cybersecurity Framework
days2
seo_titleCOBIT 5 and NIST Cybersecurity Framework - IT Training | Insoft Services
seo_decCOBIT 5 and NIST Cybersecurity Framework provides knowledge and understanding of the CSF, its goals, and the ability to apply this information.
seo_tkeyCOBIT 5 and NIST Cybersecurity
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThis 2-day Implementing NIST Cybersecurity Framework using COBIT® 5 course, is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information. Delegates will also prepare for and sit an 80 minute, multiple-choice foundation Information is a key resource for all enterprises, and technology plays a significant role.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: Course Overview and Introduction

  • COBIT 5 Overview
  • The Five Principles of COBIT 5
  • The Goals Cascade
  • The Seven Enterprise Enablers
  • COBIT 5 Process Reference Model
  • Process Capability Levels
  • Executive Order 13636
  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow

Lesson 2: Critical Security Framework Structure

  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 3: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 4: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 5: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 6: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 7: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 8: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 9: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

The recommended prerequisites for this course are:

  • Completed COBIT 5 Foundation Course (for obtaining the CSF Implementation Enhanced Qualification)
  • Basic Knowledge of COBIT 5
  • Basic knowledge of cybersecurity concepts

titleCOBIT 5 Implementation
days3
seo_title
seo_decCOBIT 5 Implementation shows how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization.
seo_tkeyCOBIT 5 Implementation
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewGet a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 Implementation for different organizational scenarios. The course material is supported by practical exercises and case-based scenarios. Candidates learn how to apply the COBIT 5 continual improvement lifecycle approach to address requirements and establish and maintain a sustainable approach to governing and managing enterprise IT as “normal business practice."   See other courses available
objective

This course is designed as an advanced implementation guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are:

  •  How to analyze enterprise drivers
  • Seven Phase implementation Steps
  • Implementation challenges
  • Root causes and success factors in each phase
  • How to determine and assess current process capability
  • How to scope and plan improvements
  • Identify and avoid potential implementation pitfalls
  • Leverage the latest good practices

outline

Lesson 1: Introduction and Positioning GEIT

  • Understanding GEIT
  • Leveraging COBIT 5 & Integrated Frameworks, Standards and Good Practices
  • Recap of Principles
  • Recap of Enablers

Lesson 2: First Steps

  • Creating the Appropriate Environment
  • Recap of the Continual Lifecycle
  • Pain Points and Trigger Events
  • Stakeholder Involvement, Needs/ Enterprise Goals to be Mapped to Pain Points and Trigger Events
  • Key Success Factors

Lesson 3: Initiate the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 4: Define Problems and Opportunities

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 5: Plan and Execute the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 6: Realising the Benefits

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 7: Exam Preparation

  • Question Types
  • Practice Questions

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Implementation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Implementation Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Foundation and Assessor for Security
days5
seo_titleCOBIT 5 Foundation and Assessor for Security Training | Insoft Services
seo_decCOBIT 5 Foundation and Assessor for Security provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities.
seo_tkeyFoundation and Assessor for Security
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Foundation and Assessor for Security course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Foundation and Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How to use the self-assessment guide
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  •  The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Program
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 7: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 8: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 9: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 10: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 11: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 12: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 13 – Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Foundation and Assessor for Security course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Foundation and Assessor
days5
seo_titleCOBIT 5 Foundation and Assessor - IT Training | Insoft Services
seo_decThe COBIT 5 Foundation and Assessor course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities.
seo_tkeyCOBIT 5 Foundation and Assessor
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Foundation and Assessor course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Foundation and Assessor course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How to use the self-assessment guide
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 7: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  •  Assessment Class Selection
  • Self-Assessment

Lesson 8: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 9: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 10: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 11: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 12: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 13 – Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Foundation & Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organization management.


titleCOBIT 5 Foundation & Implementation
days5
seo_titleCOBIT 5 Foundation and Implementation - IT Training | Insoft Services
seo_decThe COBIT 5 Foundation and Implementation course explains the COBIT framework and supporting materials in a logical and example-driven approach.
seo_tkeyCOBIT 5 Foundation and Implementation
categorycobit
vendor

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT.  The COBIT 5 Foundation and Implementation course explains the COBIT framework and supporting materials in a logical and example-driven approach. Get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 for different organizational scenarios.   See other courses available
objective

The COBIT 5 Foundation and Implementation course is designed as an advanced course leading candidates from novice to implementation skilled professionals. The course will enable you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to analyze enterprise drivers
  • Implementation challenges, root causes and success factors
  • How to determine and assess current process capability
  • How to scope and plan improvements
  • Potential implementation pitfalls

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Introduction and Positioning GEIT

  • Understanding IT
  • Leveraging COBIT 5 & Integrated Frameworks, Standards and Good Practices
  • Recap of Principles
  • Recap of Enablers

Lesson 7: First Steps

  • Creating the Appropriate Environment
  • Recap of the Continual Lifecycle
  • Pain Points and Trigger Events
  • Stakeholder Involvement, Needs/ Enterprise Goals to be Mapped to Pain Points and Trigger Events
  • Key Success Factors

Lesson 8: Initiate the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 9: Define Problems and Opportunities

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 10: Plan and Execute the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 11: Realising the Benefits

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 12: Exam Preparation

  • Question types
  • Practice Questions

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment.

The COBIT 5 Foundation & Implementation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management. To be eligible to sit the Implementation examination, candidates must pass the Foundation examination taken during the course.


titleCOBIT 5 Foundation
days3
seo_title
seo_decCOBIT 5 Foundation course helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques.
seo_tkeyCOBIT 5 Foundation
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the drivers?
  • Phase 2 – Where are we now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What needs to be done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment.

The COBIT 5 Foundation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Awareness
days1
seo_title
seo_decCOBIT 5 Awareness will introduce COBIT 5 and how it works with existing frameworks, and discuss how to measure and assess processes using the framework.
seo_tkeyCOBIT 5 Awareness
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. This one-day COBIT 5 Awareness course will give you a flavor of what COBIT 5 is, and when used effectively can govern the use of your existing processes throughout your IT Enterprise. The course will introduce COBIT 5 and how it works with existing frameworks, discuss the COBIT 5 principles, highlight the COBIT 5 enablers, and discuss how you would measure and assess processes using the framework.   See other courses available
objective

This course is designed to provide a high-level overview of COBIT and enable delegates to understand how an integrated IT Governance framework might be utilized to achieve IT business integration, cost reductions, and increased productivity. The areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Introduction to Meeting Stakeholders Needs
  • Introduction to The Goals Cascade
  • Introduction to Covering an Enterprise Endo-to-end
  • Introduction to Single Integrated Framework
  • Introduction to Enabling a Holistic Approach
  • Introduction to Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

COBIT 5 Enabler Dimensions

  • Introduction to Enabler 1 – Principles, Policy and Frameworks
  • Introduction to Enabler 2 – Processes
  • Introduction to Enabler 3 – Organizational Structures
  • Introduction to Enabler 4 – Culture, Ethics and Behaviour
  • Introduction to Enabler 5 – Information
  • Introduction to Enabler 6 – Services, Infrastructure and Applications
  • Introduction to Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment.

The COBIT 5 Awareness course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this awareness course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Assessor for Security
days3
seo_titleCOBIT 5 Assessor for Security - IT Training | Insoft Services
seo_decThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model.
seo_tkeyCOBIT 5 Assessor for Security
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  •  How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  •  How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: Foundation Review

  • Process Capability Assessment
  • COBIT Assessment Program
  • Process Capability Program
  • Advantages of the ISO/IEC15504 Approach
  • Key Definitions
  • Process Reference Model
  • Assessing Process Capability
  • COBIT Process Assessment Attributes
  • Consequences of Capability Gaps

Lesson 2: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 3: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 4: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 5: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 6: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 7: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 8: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 9: Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Assessor Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Assessor
days3
seo_title
seo_decCOBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM).
seo_tkeyCOBIT 5 Assessor
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective
outline

Lesson 1: Foundation Review

  • Process Capability Assessment
  • COBIT Assessment Programme
  • Process Capability Program
  • Advantages of the ISO/IEC15504 Approach
  • Key Definitions
  • Process Reference Model
  • Assessing Process Capability
  • COBIT Process Assessment Attributes
  • Consequences of Capability Gaps

Lesson 2: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 3: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 4: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 5: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 6: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 7: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 8: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarise Results

Lesson 9: Exam Preparation

  •  Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Assessor Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleOWASP Top 10 Bootcamp
days2
seo_titleOWASP Top 10 Bootcamp - IT Training | Insoft Services
seo_decOWASP Top 10 Bootcamp course shows how to identify and exploit general vulnerabilities, and how to fix existing holes and prevent new ones from occurring.
seo_tkeyOWASP Top 10 Bootcamp
categoryweb-applications
vendorOWASP

techonogyOpen-Source
overviewIn OWASP Top 10 Bootcamp course you will learn about the most common security risks for web applications (OWASP Top 10). Find out how to identify and exploit general vulnerabilities in applications, and how to fix existing holes and prevent new ones from occurring.   See other courses available
objective

After successfully completing the OWASP Top 10 Bootcamp course, you will:

  • Recognize the causes behind and the consequences of common coding errors and mistakes
  • Understand the methods for discovery and exploitation of these issues
  • Understand the basic practices that help prevent the most common mistakes and lead to more secure software

outline

This training follows the structure of the OWASP Top 10 list of the most critical web application security risks. For each risk, it provides its description, common examples of vulnerabilities and ways the attackers can use to exploit them, and explains the potential consequences of a successful attack.

Basic guidance on how to avoid each risk is also provided, which is delivered in engaging, seminar-style lecture format with hands-on lab exercises for you to complete. This hands-on approach keeps you engaged and ensures the knowledge transfer of critical secure coding techniques.

Labs

The OWASP Top 10 Boot Camp features several hands-on labs, that includes:

  • Exploiting SQL injection
  • Attacking authentication
  • Cross-site scripting exploitation
  • Source code auditing
  • CMS identification
  • Attacking web services
  • Client-side attacks
  • Open-source analysis & Google hacking
  • Exploiting web application with w3a

target_au

OWASP Top 10 course applies to a broad audience. Primarily designed for professionals whose job function includes creating web applications, it will also be highly beneficial for other IT and information security professionals, as well as managers who want to know more about web application security risks and what they mean to an organization.


pre_req
titleOWASP Application Threat Modeling
days2
seo_titleOWASP Application Threat Modeling - IT Training | Insoft Services
seo_decThe OWASP Application Threat Modeling gives the best training possible and the templates to incorporate threat modeling best practices in the daily work.
seo_tkeyOWASP Application Threat Modeling
categorythreat-modeling
vendorOWASP

techonogyOpen-Source
overviewAs skilled and experienced professionals we know that there is a gap between academic knowledge of threat modeling and the real world. To close that gap, we developed practical use cases, based on real-world projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using the OWASP Application Threat Modeling methodology, we provide our students with the best training possible and the templates to incorporate threat modeling best practices in their daily work. Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on:
  • B2B web and mobile applications, sharing the same REST back-end
  • An IoT deployment with a gateway and a cloud-based update service
  • OAuth scenarios for an HR application
  • Privacy of a new face recognition system in an airport
  • Get into the defenders’ head, attacking a nuclear facility
  See other courses available
objective
outline

Day 1

  • Threat modelling introduction
  • Threat modelling in a secure development lifecycle
  • What is threat modelling?
  • Why perform threat modelling?
  • Threat modelling stages
  • Different threat modelling methodologies
  • Document a threat model
  • Diagrams –what are you building?
  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Sequence and state diagrams
  • Advanced diagrams
  • Hands-on: diagram B2B web and mobile applications, sharing the same REST backend
  • Identifying threats –what can go wrong?
  • STRIDE introduction
  • Spoofing threats
  • Tampering threats
  • Repudiation threats
  • Information disclosure threats
  • Denial of service threats
  • Elevation of privilege threats
  • Attack trees
  • Attack libraries
  • Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on-premise gateway and secure update service

Day 2

  • Addressing each threat
  • Mitigation patterns
  • Authentication: mitigating spoofing
  • Integrity: mitigating tampering
  • Non-repudiation: mitigating repudiation
  • Confidentiality: mitigating information disclosure
  • Availability: mitigating denial of service
  • Authorization: mitigating elevation of privilege
  • Specialist mitigations
  • Hands-on: threat mitigations OAuth scenarios for web and mobile applications

target_au

Threat modeling is a crucial technique to assure more secure software and systems. The OWASP Application Threat Modeling training will provide our students with the know-how, templates, and exercises to start threat modeling themselves. Key takeaways are:

  • becoming a better (security) professional
  • understanding the process and technique of threat modeling
  • knowing when and how to introduce and improve threat modeling

pre_req

Students should be familiar with basic knowledge of web and mobile applications, databases & Single sign-on (SSO) principles


titleWeb Hacking Check Point Certified PenTesting Expert
days2
seo_titleWeb Hacking Check Point Certified PenTesting Expert | Insoft Services
seo_decIn this Web Hacking Check Point PenTesting course you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing.
seo_tkeyWeb Hacking Check Point
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Web Hacking Check Point Certified PenTesting Expert course is an entry-level web application security testing training. This course works as a prerequisite for the Advanced Web Hacking course. In two days, you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing with a focus on web applications.   See other Check Point courses
objective
  • This curriculum introduces you to Web Application Hacking.
  • Practical focus
  • Learn how web application security flaws are found
  • Discover leading industry standards and approaches
  • Use this foundation to enhance your knowledge
  •  Prepare for more advanced web application topics

outline

Day 1

Information gathering, profiling and cross-site scripting

  • Understand HTTP protocol
  • Identify the attack surface
  • Username enumeration
  • Information disclosure
  • Issues with SSL / TLS
  • Cross-site scripting

Day 2

Injection, flaws, files and hacks

  • SQL injection
  • XXE attacks
  • OS code injection
  • Local/remote file include?
  • Cryptographic weakness
  • Business logic flaws
  • Insecure file uploads

target_au
  • System administrators
  • Web developers
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next level

pre_req

Before attending the Web Hacking Check Point Certified PenTesting Expert course, you should have:

  • Laptop with Windows Operating System installed (either natively or running in a VM)
  • Administrative access to perform tasks such as installing software, disabling antivirus etc..
  • Ethernet/wired network for this class (Or supported adapter).

titleInfrastructure Hacking Check Point Certified Pen Testing Expert
days2
seo_titleInfrastructure Hacking Check Point Certified PenTesting Expert | Insoft UK
seo_decThe Infrastructure Hacking Check Point Certified Pen Testing Expert course will give you what is necessary to start or formalise your pen testing career.
seo_tkeyInfrastructure Hacking Check Point
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Infrastructure Hacking Check Point Certified Pen Testing Expert course is an intermediate training designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.   See other Check Point courses
objective

This curriculum familiarizes you with hacking tools and techniques.

  • Gain practical experience with tools that will serve you in the future
  • Learn tools and techniques to hack various components involved in infrastructure hacking
  • Develop a critical understanding of the concepts behind these

outline

Day 1

  • TCP/IP basics
  • The threat of port scanning
  • Target enumeration
  • Brute-forcing
  • Meta sploit basics
  • Hacking recent Unix vulnerabilities
  • Hacking databases
  • Hacking application servers
  • Password cracking

Day 2

  • Hacking third-party applications (WordPress, Joomla, Drupal)
  • Windows enumeration
  • Hacking recent Windows vulnerabilities
  • Hacking third-party software (Browser, PDF, Java)
  • Post-exploitation: dumping secrets
  • Hacking windows domains

target_au
  • System administrators
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next-level

pre_req

Before attending the Infrastructure Hacking Check Point Certified PenTesting Expert course, you must bring or have access to a laptop with admin/root access.


titleHacking 101 Check Point Certified PenTesting
days1
seo_titleHacking 101 Check Point Certified PenTesting Training | Insoft Services
seo_decThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing and Reverse Engineering.
seo_tkeyHacking 101
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing, by providing knowledge and skills in areas of network, system, network, web and applications hacking, as well as in Reverse Engineering.   See other Check Point courses
objective

Discover the world of Pen Testing Begin your journey with proven hacking techniques. The Hacking 101 Check Point Certified PenTesting course trains IT professionals in the skills of Pen Testing. You will become familiar with the risks and vulnerabilities of corporate networks.

You will learn hacking skills for:

  • Systems
  • Networks
  • Web
  • Applications
  • Reverse software engineering

outline
  • Pen Test Methodology
  • Website architecture
  • Attack vectors
  • SQL injection
  • XSS (Cross-site scripting)
  • Burp (Proxy tool)

Learn Hacking techniques for infrastructure devices and systems. These skills are critical for penetration testing and managing vulnerabilities in your environment. Students will become familiar with scanning, testing and hacking networks.

There are live demonstrations that feature a variety of defensive hacking techniques.


target_au

Students with a background in programming and networking.


pre_req

Students should bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks such as installing software, disabling antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported. Also, note that we will use an Ethernet/wired network for this class. If your laptop does not support this, please carry the correct adaptor to ensure you are able to connect to the wired network.


titleForcepoint Web Security System Engineer Course
days5
seo_titleForcepoint Web Security System Engineer Course | Insoft Services
seo_decDuring this five-day Forcepoint Web Security System Engineer course, you will gain core skills as a system engineer for handling Forcepoint Web Security.
seo_tkeyForcepoint Web Security System Engineer
categoryweb-security
vendorForcepoint

techonogySecurity
overviewDuring this five-day Forcepoint Web Security System Engineer classroom-based instructor-led course, students will gain an understanding of the core competencies and skills needed to practice as a system engineer handling Forcepoint Web Security. The core competencies are design and deployment, component implementation, troubleshooting, and debugging. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Web Security from concept creation to production.   See other Forcepoint courses
objective
  • Analyze key deployment considerations
  • Calculate sizing and performance tuning
  • Classify different deployment types
  • Install and configure Web Security with appliances
  • Assess how Web Security integrates with supported third-party solutions
  • Configure tweaks to tune and balance settings to respond to daily needs
  • Perform troubleshooting and debugging

outline

MODULE 1: DEPLOYMENT

  • Define key deployment considerations
  • Use best practices to review the system, hardware, and other pre-requirements for installation
  • Identify which services to install and how to distribute them across different devices
  • Prepare a Windows server for a Forcepoint installation
  • Identify the location of the installation logs for troubleshooting installation problems
  • Identify the features of Forcepoint Appliances
  • Describe the hardware specifications and architecture of Forcepoint Appliances
  • Identify the information needed for the initial configuration of an appliance
  • Locate and install hotfixes
  • Explain the principle differences between appliances running version 8.3 (or later)versus those running version 8.4 (or newer)
  • Describe configuring SNMP on an appliance
  • Define and discuss the methods of traffic redirection using a proxy including the pros and cons of each
  • Deploy and configure Explicit and Transparent Proxy
  • Demonstrate understanding of PAC files, WPAD, GPO enforcement of proxy settings
  • Compare Web Security component placement per network size
  • Apply guidelines related to component deployment, limits, ratios and supported configurations
  • Identify how Web Security integrates with third-party external services
  • Detail the full scope and deployment workflow for simple, medium, and advanced network deployments
  • List components and concepts used in sizing and performance tuning
  • Apply Web Security sizing information provided by Forcepoint Performance Engineering
  • Utilize the sizing guidelines to successfully provide deployment recommendations for small, medium, and large networks
  • Compare and contrast various deployment types based on real-world deployment examples
  • Describe Installation verification for a successful deployment
  • Identify the Web Security installation footprint
  • Describe methods of configuring the proxy for high availability
  • List the components needed for disaster recovery
  • Identify the disaster recovering guidelines and considerations

MODULE 2: CONFIGURATION

  • Distinguish key settings in the Security Manager infrastructure components
  • Install and use the Forcepoint Security Appliance Manager(FSAM)
  • Identify and analyze Filtering and Policy Enforcement components
  • Articulate the key features and functions in the proxy architecture
  • Describe the pros and cons of various user identification agents
  • Describe the functions of the User Service
  • Defend the need for domain admin rights
  • Compare XID agents with proxy authentication
  • Design and implement proxy authentication based on a customer’s network size and Directory Service options
  • Utilize best practices for managing encrypted traffic
  • Implement User Identification components in single and multi-domain environments
  • Evaluate the Logging and Reporting architecture

MODULE 3: TROUBLESHOOTING AND DEBUGGING

  • Identify Web Security configuration files, diagnostic tools, tuning parameters, and verbose logging
  • Describe the process of obtaining appliance root access
  • Demonstrate appliance CLI commands and operations
  • Utilize effective procedures for troubleshooting Security Manager components
  • Detail proxy tuning and debugging procedures
  • Identify proxy debugging tools and log files
  • Debug the ant_server
  • Troubleshoot proxy authentication
  • Troubleshoot IWA
  • Troubleshoot SSL decryption
  • Inspect User Service architecture, main configuration files, troubleshooting, and debugging parameters
  • Review Log Server and Log Database back-end configuration files, tuning parameters, and troubleshooting procedures

target_au
  • Channel Partners: Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support
  • Customers: Deployment Specialists, Implementation Specialists, System Engineers
  • Forcepoint: Sales Engineers, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint Web Administrator Course and certification
  • Intermediate knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint NGFW System Engineer Course
days5
seo_titleForcepoint NGFW System Engineer Course | Insoft Services
seo_decIn the Forcepoint NGFW System Engineer course you will learn how to install, configure, administer and support Forcepoint NGFW into the security ecosystem.
seo_tkeyForcepoint NGFW System Engineer
categoryngfw
vendorForcepoint

techonogySecurity
overviewThe Forcepoint NGFW System Engineer course combines five sessions where you will learn how to install, configure, administer, support and understand how Forcepoint NGFW fits into the security ecosystem. Through instruction, demonstrations, and hands-on lab practice exercises, you will understand the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments. You will then develop expertise in topics that include, but are not limited to, clustering the NGFW, creating security rules and policies, integrating the NGFW with other Forcepoint technologies, inbound and outbound traffic management, under-standing multi-link technology, configuring VPNs, traffic deep inspection, and controlling endpoint activity with the Endpoint Context Agent.   See other Forcepoint courses
objective
  • Describe the fundamentals of NGFW
  • Detail the Security Management Center (SMC)capabilities
  • Plan and deploy the SMC
  • Configure and deploy a single firewall
  • Configure and deploy a firewall cluster
  • Configure policies for distributed firewall management
  • Configure security policies and access control
  • Configure and utilize multiple internet connections
  • Define Policy-based and Route-based VPNs
  • Manage users and authentication
  • Create a Mobile VPN
  • Monitor user and endpoint activity
  • Perform traffic inspection and malware detection
  • Create custom network applications
  • Configure TLS decryption
  • Integrate the NGFW with Forcepoint cloud solutions

outline

SESSION 1

Module 1: System Architecture Overview

  • Articulate the NGFW System Architecture
  • Understand how to size a firewall and management environment
  • Understand Management and Log Server high availability
  • Become familiar with upgrading Management Server, Log Server, and engines
  • Articulate the Forcepoint NGFW license model

Module 2: Firewall/VPN Role and Single Firewall Deployment

  • Describe basic network defence strategies
  • Define the capabilities and key features of the NGFW
  • Understand and learn the process of defining and deploy a single firewall•Identify additional features of the NGFW

Module 3: Routing and Anti-spoofing

  • Configure static routing
  • Describe additional special routing capabilities of the NGFW
  • Configure Policy-Based routing•Summarize the origin and function of Anti-spoofing

Module 4: NGFW Policies

  • Describe different NGFW policy types
  • Define NGFW policy templates and policy structure
  • Identify the anatomy of a security policy and the objects used in policies
  • Employ NGFW interface options•Detail the process of policy installation and activation

SESSION 2

Module 5: Distributed System Configuration

  • Describe system communication in a distributed firewall environment
  • Identify locations and contact addresses in distributed systems
  • Describe system communication between management and engines
  • Configure Network Address Translation (NAT)
  • Analyze the of exchanging data between management and other security devices

Module 6: Firewall/VPN Role and Clustering Technology

  • Describe the firewall clustering architecture and theory
  • Configure a firewall cluster in the SMC (management)
  • Deploy a firewall appliance (physical and virtual)

Module 7: MSSP and Virtual Contexts

  • Describe the SMC Domain Architecture
  • Detail the function of the Web Portal Server
  • Define Virtual Contexts
  • Relate Master Engines and Virtual Engines
  • Relate clustering and performance
  • Review a configuration and deployment example of an MSSP architecture

SESSION 3

Module 8: Outbound Multi-Link Technology

  • Describe Outbound Traffic Management and its capabilities
  • Explain ISP link selection•Classify when to use a particular link selection method
  • Configure Outbound Multi-Link

Module 9: Site-to-Site VPNs

  • Define Forcepoint NGFW VPN capabilities
  • Define Forcepoint NGFW VPN terminology
  • Identify supported VPN topologies•Relate Multi-Link and VPNs
  • Configure a Policy-Based VPN
  • Investigate Route-Based VPNs and when to use them
  • Test VPN-related tools in the SMC
  • Design VPN Hub configuration

Module 10: Active Directory Integration

  • Define network user management
  • Integrate Active Directory with the SMC (management)
  • Categorize the role of NPS, RADIUS, and TACAC+ in the authentication process
  • Deploy Forcepoint User Identification
  • Configure and deploy the Endpoint Context Agent
  • Monitor network users

Module 11: VPN Client

  • Describe Mobile VPN connections
  • Distinguish IPSec and SSL VPN tunnelling
  • Configure an NGFW engine for Mobile VPN connections
  • Configure the VPN Client for an endpoint
  • Demonstrate tools for Mobile VPN troubleshooting

SESSION 4

Module 12: Traffic Inspection

  • Review connection control and the role of Deep Inspection
  • Differentiate between Services, Protocol Agents, and Proxy Modules
  • Configure a Sidewinder Proxy service
  • Establish Network Application Identification
  • Differentiate Network Applications and Client Applications

Module 13: Inspection Policies

  • Relate firewall and inspection policies
  • Illustrate the anatomy of Inspection Policies
  • Differentiate the predefined Inspection Policy templates
  • Define the concept of Situations•Define the function of the Inspection Rules tree
  • Fine-tune inspection policies
  • Analyze the role and function of Inspection Exception rules
  • Analyze the use and function of Blacklisting

Module 14: Malware Detection and File Filtering

  • Explain theprocess of Malware Detection
  • Illustrate the anatomy of a File Filtering Policy
  • Define the process of using File Reputation services
  • Configure built-in Anti-Malware scanning
  • Describe the role of Advance Malware Detection

SESSION 5

Module 15: NGFW Inspection Techniques

  • Define techniques used by the NGFW to identify threats
  • Detail the traffic inspection process
  • Explain the role of Advanced Evasion Techniques and the process of traffic normalization
  • Describe misuse detection with Fingerprints
  • Describe concept of Situations and their role in traffic inspection
  • Analyze Regular Expression syntax
  • Review examples of fingerprints

Module 16: TLS Inspection

  • Articulate the purpose of TLS inspection
  • Describe TLS inspection exceptions
  • Define the process of Server and Client-Side TLS inspection
  • Configure the TLS inspection

Module 17: NGFW in Layer 2 Roles and Multi-Layer Deployment

  • Identify NGFW Operating Roles
  • Define key features of the IPS and Layer 2 firewall roles
  • Understand the difference between the Firewall and IPS
  • Deploy an IPS and a Layer 2 firewall•Configure and deploy a multi-layer NGFW
  • Analyze the role of High Availability in multi-layer deployments

Module 18: Forcepoint Integration

  • Configure integration with Forcepoint Web Gateway
  • Detail how to integrate with Forcepoint Advanced Malware Detection
  • Describe Forcepoint CASB•Review the Malware Detection process
  • Understand information exchange using Syslog or other SIEM solutions

Module 19: Troubleshooting

  • Detail the NGFW packet inspection process
  • Review the troubleshooting process and learn troubleshooting tips
  • Define the role of sgInfo in troubleshooting
  • Explore how to troubleshooting with logs
  • Understand how to troubleshoot a VPN
  • Analyze the role of monitoring in troubleshooting
  • Troubleshoot the NGFW engine

target_au
  • End-User/Customers: System Administrators, Network Security Administrators, Network Engineers, IT staff
  • Channel Partners: Consultants, System Architects, Integrators and Planners who help customers with Forcepoint NGFW implementations

pre_req
  • Completion of the Forcepoint NGFW Administrator Course and certification.
  • General understanding of routing and firewall functionality

titleForcepoint Insider Threat System Engineer Course
days5
seo_titleForcepoint Insider Threat System Engineer Course | Insoft Services
seo_decIn the Forcepoint Insider Threat System Engineer course, you will gain an understanding of the key core competencies and skills needed to practice as a SE.
seo_tkeyForcepoint Insider Threat System Engineer
categorysystem-engineer
vendorForcepoint

techonogyIT Systems and Security
overviewIn the Forcepoint Insider Threat System Engineer five-days course, students will gain an understanding of the key core competencies and skills needed to practice as a System Engineer handling Forcepoint Insider Threat. The core competencies are design, deployment, integration, maintenance, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Insider Threat from concept creation to production.   See other Forcepoint courses
objective
  • Understand key deployment types.
  • Learn about sizing and performance considerations.
  • Understand how Insider Threat integrates with other Forcepoint products and third-party products.
  • Perform common maintenance activities to keep system performance high in fast-evolving real-world environments.
  • Troubleshoot and debug each major component.

outline

Day 1&2–Design and Deployment

1. Components and communication

  • Describe the responsibilities of each component
  • Understand protocols and ports used for communication between components

2. Planning

  • Identify and confirm key System Requirements
  • Provide sizing guidelines based on number of agents and policy weight
  • Accommodate for growth and redundancy specifications

3. Installation

  • Perform demos, POCs, and simple deployments
  • Perform intermediate appliance-based deployments
  • Perform advanced clustered deployments for large enterprises

4. Initial configuration

  • Complete global setup checklist
  • Complete Administration Workbench agent setup checklist
  • Complete Policy Workbench checklist

5. Phased rollout deployments

  • Implement best practices for initial rollout
  • Configure and Install Windows Agent
  • Configure and Install Mac OS X Agent

6. Tuning

  • Create, test, and tune advanced level policies to address a variety of customer’s insider threat concerns

7. Advanced Agent deployment

  • Complete roll out using remote Agent deployment solutions

8. Backup and Disaster Recovery

  • Set up backups and confirm them with a test recovery

9. Monitoring

  • Track deployed Agents using Administration Workbench
  • Run and review reports to preempt potential performance issues

Day 3–Integrations

1. Perform AP-DATA integration

  • Test and tune AP-DATA triggered policies

2. Set up group mapping via LDAP integration

3. Understand the capabilities of Convergence and Spotlight APIs

Day 4–Upgrades and Hotfixes

1. Server upgrades

  • Prepare deployment and database for hotfix
  • Install Hotfix
  • Reinitialize database and test deployment

2. Agent Bundle upgrades and compatibility packs

  • Upgrade using agent commands
  • Upgrade using remote install utility

3. Verification

  • Confirm HF and Agent Bundles perform as expected

Day 5–Troubleshooting and Debugging

1. Troubleshooting methodology

  • Correctly identify the root cause
  • Apply and confirm a solution

2. Perform critical server diagnostics

  • Enable and review verbose logging
  • Access appliance using debug account

3. Database diagnostics and maintenance

  • Administer Oracle databases using sqlplus
  • Manage database using Oracle Enterprise Manager (OEM)

4. Agent monitoring and troubleshooting

  • Run Agent Tool diagnostics locally and remotely
  • Use Agent Tool to test for configuration issues
  • Manage Agents remotely
  • Enable and view verbose logging

 


target_au
  • Channel Partners: Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support
  • Forcepoint: Sales Engineers, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint Insider ThreatAdministrator Course(Previously “SVIT Administrator”)
  • Basic understanding of computer systems and networking

titleForcepoint Email Security System Engineer Course
days5
seo_titleForcepoint Email Security System Engineer Course | Insoft Services
seo_decThe Forcepoint Email Security System Engineer course prepares engineers to manage SE development of Forcepoint Email Security.
seo_tkeyForcepoint Email Security
categoryemail-security
vendorForcepoint

techonogySecurity
overviewDuring the Forcepoint Email Security System Engineer hands-on instructor-led course, you will gain an understanding of the key core competencies and skills needed to practice as a System Engineer handling Forcepoint Email Security. The core competencies are deploymentplanning, installation, upgrading and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Email Security from concept creation to production. See other Forcepoint courses
objective
  • Propose an Email Security deployment solution by identifying the most suitable platform, components and configurations for a given set of requirements.
  • Successfully plan and execute an Email Security on-premises installation.
  • Identify and mitigate common environmental factors within a deployment that can affect filtering efficacy.
  • Planand execute an Email Security upgrade using the Migration Tool.
  • Perform troubleshooting steps and debugging to resolve common deployment issues.

outline

SESSION 1 –DEPLOYMENT OVERVIEW AND INSTALLATION

Module1: Email Security Components

  • Required components
  • Optional components
  • Appliance offerings

Module2: Deployment Platforms

  • On-premises platform
  • Hybrid platform
  • Email Security in the Azure platform

Module3: Appliance Management Interfaces

  • Command Line Interface (CLI)
  • Forcepoint Security Appliance Manager (FSAM)

Module4: Deployment Use Cases

  • Small and middle business
  • Large and enterprise business

Module5: Installation planning

  • Requirements
  • Pre-installation considerations

Module6: Email Security on-premises Installation

  • Virtual Appliance on-premises deployment
  • Installing Forcepoint Security Manager and Log Server

Module7: Email Security in Azure

  • Deployment process

SESSION 2 -ARCHITECTURE AND ENVIRONMENT

Module8: Clustering

  • Benefits of a configuration cluster
  • Clustering with Hybrid and Data Security
  • Clustering with PEMModule9: Load Distribution
  • Third-Party Load Balancer
  • Load balancing with DNS

Module10: Upstream MTA

  • Simultaneous Connections
  • True Source IP Detection

Module 11: Address rewriting

  • Rewrite the envelope sender address
  • Rewrite the display sender address

Module12: DKIM Signing

  • DKIM process
  • Configuring DMARK in Forcepoint Security Manager

SESSION 3 –UPGRADINGEMAIL SECURITY

Module13: Plan the upgrade

  • Review the documentation
  • Component upgrade order

Module14: Perform the upgrade

  • 8.3 Appliance architecture changes
  • Migration Tool
  • Migration Process
  • Virtual Appliance Hotfix
  • Forcepoint Security Manager upgrade 8.2 –8.5.0
  • Migrate and upgrade Appliance

SESSION 4 –TROUBLESHOOTINGOVERVIEW

Module15: Troubleshooting & debug overview

  • Troubleshooting tools Real-time monitor Forcepoint Security Manager logo Counters Command Line Troubleshooting
  • Backend files and processes log on with root access to Email Security appliance backed files and processes debugging
  • CLI debug command debugging Forcepoint Modules using the CLIoDebugging Postfix modules (requires root access)

Module16: Installation Errors

  • Email Log Server installation errors
  • Forcepoint Management Server installation errors
  • Appliance registration errors

Module17: Mailflow Issues

  • Delivery problems handling outbound/internal delivery problems handling inbound delivery problems
  • Spam detection error false negative / False possible receiving backscatter / Sending backscatter
  • Troubleshooting with “mail log”

SESSION 5 –TROUBLESHOOTINGCONTINUED

Module18: LogDatabase and Log Server Issues

  • Cannot see logs form TRION Manager
  • Log server failed to start
  • Log DB extract, transform, and load process wrong
  • Track on-box PostgreSQL
  • Debug log daemon

Module19: Quarantine Issues

  • Message queues•Cannot see quarantine email in Blocked Messages
  • Debug quarantine daemon

Module20: PEM Issues

  • End-user login fail
  • PEM portal load fail•End user cannot receive notification
  • End-user cannot release messages
  • PEM always permit/blocklist fails
  • Debug PEM

Module21: Email DLPIssues

  • Email DLP registration fail
  • Email DLP policy deployment fail
  • Email DLP policy does not work normally
  • Use multiple policy engines

Module22: Cluster Problems

  • Configuration and license synchronization
  • Heartbeat Request and response
  • A secondary node cannot be synchronized
  • Debug clusteringModule23: Hybrid Issues
  • Hybrid configuration file
  • Hybrid logs cannot be synchronized
  • Debug Hybrid

target_au
  • Consultants, system architects, integrators
  • Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support

pre_req
  • Completion of the Forcepoint Email Security Administrator Course and certification.
  • Intermediate knowledge of networking and computer security concepts.
  • A computer that meets the requirements noted at the end of this document.

titleForcepoint DLP System Engineer Course
days5
seo_titleForcepoint DLP System Engineer Training Course | Insoft Services
seo_decThe Forcepoint DLP System Engineer course is a five-day instructor-led training, where you will create and test a Forcepoint DLP deployment.
seo_tkeyForcepoint DLP System Engineer
categorydlp-system
vendorForcepoint

techonogyIT Systems and Security
overviewThe Forcepoint DLP System Engineer course is a five-day hands-on instructor-led training, where you will create and test a Forcepoint DLP deployment, perform an in-depth analysis of DLP component architecture, and integrate Forcepoint DLP with local and cloud-based products. In this course, you will also learn how to manage incident data through Security Manager as well as through SQL, and perform maintenance tasks, such as dealing with failovers, upgrades and troubleshooting of all of the above, including advanced debugging of DLP logs.   See other Forcepoint courses
objective
  • Given a set of environmental, acceptable usage, and user requirements, deploy and configure Forcepoint DLP in various enterprise environments
  • Itemize and explain the processes involved in the interaction between DLP components
  • Explain the methodology used for evaluating necessary sizing of the DLP product
  • Perform advanced configuration of custom classifiers, predefined classifiers, rules and policies
  • Formulate policies leveraging predefined classifiers for regulatory compliance, the prevention of IP loss, and data theft
  • Build, configure, and deploy DLP Endpoint
  • Configure and enable cloud-based integrations with DLP, including online services and Forcepoint CASB
  • Explain the integration and function of DLP with RMS and file tagging software, such as Azure RMS and Boldon James
  • Demonstrate multiple methods for generating real-time incidents and discovery events
  • Indicate primary log files used to review component function, and itemize useful topics to debug
  • Troubleshoot functionality of all DLP system modules, including Linux based appliances
  • Compile and analyse incident data both in Forcepoint Security Manager and from SQL
  • Compare and configure incident workflows through Forcepoint Security Manager and email
  • Perform maintenance activities on Forcepoint DLP, including automated and manual upgrade, failover, backup, and restore

outline

MODULE 1: COMPONENTS AND INITIAL SETUP

  • Provide an organized list of available resources for support when working with Forcepoint DLP
  • Classify the basic methodologies for Forcepoint DLP deployment depending on the scale (Single Datacenter or Multiple Datacenter).
  • Identify software components (PEI, PE, Crawler, OCR, EP Servers, EP Agents) and hardware components used by Forcepoint DLP
  • Itemize and explain the software components and database locations used in Forcepoint Security Manager infrastructure
  • Install and configure Forcepoint Security Manager, Forcepoint DLP, Analytics Engine, Web Content Gateway, and Email Security Gateway

MODULE 2: DLP ARCHITECTURE

  • Diagram and explain the internal architecture used by Policy Engine, Data Batch Server, and Message Broker, as well as Security Manager and each DLP System Module (WCG, ESG, DSS Server, Protector)
  • Follow the flow of transaction processing during Policy Engine analysis
  • Document possible options for deployment patterns, including web and email traffic monitoring
  • Formulate sizing requirements for DLP Deployments, based on environment and user demands
  • Configure and demonstrate Policy Engine load balancing features
  • Generate artificial traffic using regression testing tools (PolicyEngineClient.exe, ContentExtractorClient.exe)

MODULE 3: INTEGRATIONS AND ADVANCED DEPLOYMENT

  • Explain basic configuration and troubleshooting for a DLP Protector, Mobile Agent, LDAP import and ResourceResolver
  • Identify upgrade requirements and procedures for upgrading a Protector or Mobile Agent
  • Identify basic requirements and functions when integrating DLP with Web Security, including DLP only Content Gateway
  • Analyze methods of integrating DLP with Email Security, including leveraging Email Security action plans in DLP and configuring Email Gateway for Office 365
  • Explain basic configuration and troubleshooting for the Analytics Engine•Identify the elements of the Incident Risk Ranking interface elements in Forcepoint Security manager, and explain their functions
  • Configure and test email encryption using Forcepoint Secure Messaging (Park and Pull)
  • Modify a Protector deployment to pair with a Web Content Gateway in ICAP mode
  • Install, configure, and test Squid on a Protector
  • Enable the Web Security Linking Service, Import URL Categories, and test Geolocation Lookup on Web DLP Policies
  • Configure an Email Encryption action plan and leverage it in a DLP Policy. Test functionality using a 3rd party MTA
  • Configure and perform remediation on incidents created by a DLP Policy that monitors and enforces against inbound mail.

MODULE 4: TROUBLESHOOTING AND DEBUGGING

  • Compare methodologies for diagnosing and resolving potential issues occurring in Forcepoint DLP
  • Discuss and analyzeDLP Troubleshooting use cases
  • Document log and debug topic structure used in Policy Engine debugging
  • Document log and debug topic structure used for DLP system modules (Security Manager, Protector, Content Gateways, Analytics Engine)
  • Enable debugging of Tomcat logs on Forcepoint Security Manager
  • Enable debugging of Policy Engine logs on an appliance (Email Security Gateway), and use debug information to track live transactions as they are submitted

MODULE 5: POLICIES, RULES, AND CLASSIFIERS

  • Define an Acceptable Use Policy as a preface to configuring Policies and Rules
  • Identify and define the three categories of DLP Policies
  • Analyze Boolean Logic as used in DLP Policies, and formulate examples, including an “off switch” argument
  • Explain how DLP interacts with Microsoft RMS using protected file classifiers
  • Analyze the uses of and compare the inherent accuracy of the different types of classifiers DLP uses (Key Phrases, Dictionaries, Regular Expressions, Scripts, File Properties, Machine Learning, Fingerprinting)
  • Document the syntax used, and analyze basic use cases for Regular Expression classifiers
  • Explain what the different components of Script (a.k.a. predefined) classifiers, and how Natural Language Processing functions
  • Analyze use cases involving configurable Script Classifiers, including the Email to Competitors classifier
  • Define exceptions to DLP policies using LDAP search expressions
  • Given an example of an Acceptable Use Policy, create a .bat file to automate regression testing using PolicyEngineClient
  • Explain, configure, and test the different components of the Customizable IDs Classifier
  • Perform stress testing on DLP Email policies using an SMTP “Black Hole”

MODULE 6: DISCOVERY AND CLOUD

  • Define the potential resources we can scan using Forcepoint DLP Discovery
  • Explain the methods used to assist Crawlers when dealing with very large discovery tasks•Manually administrate Discovery jobs using WorkSchedulerWebServiceClient
  • Explain configuration of Discovery tasks against cloud services (Sharepoint Online, Exchange Online, Office365, Box.com)
  • Differentiate between the three types of Remediation Scriptsand explain how to use Discovery Remediation Scripts using .bat files
  • Explain the basic functionality of Classifier Administration software (Boldon James) and how DLP integrates with those classifiers, including reading and writing document tags, as well as updates to the reporting interface.
  • Explain basic configuration for deploying a DLP Email Gateway in the cloud using Microsoft Azure•Explain basic configuration for integrating Forcepoint DLP with Forcepoint CASB, including adding ‘Cloud Services’ as destinations for DLP Policies
  • Configure and run a Network Discovery task using a Crawler, and configure load balancing for the Crawler
  • Manually delete a Discovery task using WorkSchedulerWebServiceClient
  • Configure and run a Database Discovery task against Oracle Enterprise
  • Create and run an Incident Management Remediation Script
  • Create a Policy Remediation Script, add it to an action plan, and test functionality
  • Create an Endpoint Remediation Script, add it to an action plan, and test functionality
  • Install a trial version of Boldon James Office Classifier, and experiment with DLP interaction using hierarchical content tags

MODULE 7: FINGERPRINTING, MACHINE LEARNING, AND OCR

  • Document and analyze the implications of the N-gram (5-word sliding window) fingerprinting algorithm
  • List and explain best practices when performing both file and database fingerprinting, including the use of validation scripts
  • Explain the functionality of Machine Learning versus Fingerprinting, and differentiate PreciseID from the Support Vector Machine (SVM) algorithm
  • Diagram and explain Work scheduler (Crawler) architecture, functionality, and debugging
  • Explain how Fingerprint tasks may be recorded and replayed for troubleshooting purposes
  • Document the architecture and explain the functionality of OCR
  • Analyze methods for troubleshooting OCR, including log file locations, best topics to debug, and manual testing using OCRClient
  • Create a File Fingerprint Classifier, configure it in a policy, and run multiple tests differentiated using an Ignored Section classifier
  • Perform Database Fingerprinting on an imported .csv file, configure the classifier in policy, and test functionality
  • Prepare training sets for a Machine Learning classifier, create the classifier and fine-tune accuracy, then evaluate success using an automated test script (.bat file with PolicyEngineClient)
  • Install a DSS Server with an OCR component, then test OCR using both external email traffic and manually generated traffic using OCRClient

MODULE 8: FORCEPOINT DLP ENDPOINT

  • Diagram and analyze endpoint server architecture
  • Diagram and analyze endpoint agent architecture, including log file locations and debugging
  • Explain and demonstrate Endpoint command line functionality (WDEUtil)
  • Document web browser integration using Browser Extensions, and explain troubleshooting methods with use cases
  • Differentiate between Unhooked and Trusted Endpoint applications
  • Explain how to use Tasklist from the command line to thoroughly Unhook and application and all related .dll files
  • Explain how serial numbers may be used to identify removable media for use in DLP Policies
  • Deploy Endpoints manually, using SCCM or GPO
  • Review installation procedure and explain how to configure and use DLP Endpoint on XenApp and XenDesktop
  • Build and install a DLP Endpoint package, then test Temporary Bypass function
  • Configure and deploy a custom message file for custom Endpoint alerts as part of an Endpoint package•Install an Endpoint in Stealth Mode•Debug an Endpoint agent and perform log analysis
  • Use Tasklist to completely unhook an application and all .dll files, then test to confirm the success
  • Create an Endpoint encryption action plan and test using emulated USB Removable Media, then attempt decryption using Forcepoint Decryption Utility

MODULE 9: INCIDENT MANAGEMENT, REPORTING, AND MAINTENANCE

  • Explain Syslog configuration and integration with a Syslog server (Splunk)
  • List the types of configurable DLP Alerts
  • Explain and demonstrate advanced functions of system health dashboard and system, traffic, and audit logs
  • Explain the functions of the User Risk Report
  • Demonstrate pulling various data points manually from SQL (when-data-security)
  • Explain and demonstrate what permissions can be limited for delegated admins and the effects in Forcepoint Security Manager
  • Perform each possible workflow in Incident Management•Configure and test the DLP Force Release feature
  • Configure and test Incident Notifications with Action Links (Email Based Incident Workflow)
  • Perform a manual incident dump from SQL using .bat files
  • Schedule and run a Backup task, while manually modifying the backup .vbs script, and performing a manual backup of the Fingerprint Repository
  • Configure and test DLP Alerts for various system health-related events

target_au
  • System Engineers, high-level System Administrators, and IT professionals assisting with DLP deployment, configuration, and administration
  • Consultants, system architects, integrators and planners who help customers with Forcepoint DLP implementations
  • Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint DLP Administrator Course and certification.
  • Intermediate knowledge of networking and computer security concepts.
  • A computer that meets the requirements noted at the end of this document.

titleForcepoint CASB System Engineer
days3
seo_titleForcepoint CASB System Engineer Training Course | Insoft Services
seo_decThe Forcepoint CASB System Engineer training course enables CASB administrators, network security administrators, IT staff and Forcepoint CASB operators.
seo_tkeyForcepoint CASB System Engineer
categorycloud-security
vendorForcepoint

techonogyIT Systems and Security
overviewThe Forcepoint CASB System Engineer training course focuses on enabling CASB administrators, network security administrators, IT staff and Forcepoint CASB operators, as well as consultants, system architects, integrators and planners who help customers with Forcepoint CASB implementations. Forcepoint CASB training is available in a two-tier learning path. The first course, Forcepoint CASB Administrator is focused on how to use and administer the Forcepoint CASB solution after implementation. The second course, Forcepoint CASB SE is focused on how to deploy, tune, and troubleshoot the Forcepoint CASB solution. The Forcepoint CASB Administrator and Forcepoint CASB SE training is available separately or can be taken at one time through the Forcepoint CASB Service Professional Bootcamp.   See other Forcepoint courses
objective

The Forcepoint CASB Administrator course provides in-depth instruction for students looking to learn the features, components, and key integrations that enable Forcepoint CASB capabilities. Students will develop skills in system architecture, Active Directory integration, cloud app discovery, managing assets, DLP integration, compliance and governance, forensic analysis, reporting, and health assessment and maintenance of the Forcepoint CASB system.


outline

During the three days, students will gain an understanding of the core competencies and skills needed to practice as a System Engineer handling Forcepoint CASB. The core competencies are sizing, deployment, product tuning, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint CASB from concept creation to production.


target_au
pre_req
titleForcepoint NGFW
days3
seo_titleForcepoint NGFW Training Course | Insoft Services
seo_decIn this Forcepoint NGFW instructor-led training course, you will learn how to install, configure, administer, and support Forcepoint NGFW.
seo_tkeyForcepoint NGFW
categoryngfw
vendorForcepoint

techonogyIT Systems and Security
overviewIn this Forcepoint NGFW instructor-led training course, you will learn how to install, configure, administer, and support Forcepoint NGFW. Through instructional content, demonstrations, and hands-on lab practice exercises, you will learn the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments. You will develop expertise in creating security rules and policies, managing users and authentication, understanding multi-link technology, configuring VPNs, traffic deep inspection, performing common administration tasks including status monitoring and reporting.   See other Forcepoint courses
objective
  • Understand the fundamentals of NGFW
  • Articulate the NGFW System Architecture
  • Differentiate the various NGFW operating modes
  • Administer the SMC components and use them to manage and monitor
  • Perform common administration tasks
  • Configure security policies and access control
  • Manage users and authentication
  • Understand monitoring capabilities
  • Create and edit reporting of the trafficprocessed by NGFWs
  • Integrate NGFW with other Forcepoint solutions
  • Perform basic troubleshooting of NGFW
  • Configure and install a single firewall

outline

MODULE 0: INTRODUCTION

  • Welcome to the course
  • Understand and prepare to use the virtual training environment

MODULE 1: NGFW OVERVIEW

  • Articulate NGFW key benefits and differentiators from other firewall products
  • Differentiate the various NGFW operating modes
  • Describe the NGFW Hardware Platform and Virtualization options
  • Describe different installation methods•Understand different NGFW deployment options

MODULE 2: SMC OVERVIEW

  • Articulate the NGFW system architecture
  • Describe the components of the SMC and its supported platforms
  • Identify the properties of the Management & Log server
  • Identify the properties of the Web Portal Server
  • Articulate the SMC Deployment options
  • Understand communication between SMC components and NGFW
  • Understand locations and contact addresses

MODULE 3: GETTING STARTED WITH SMC

  • Describe a high-level overview of the functionality of the management client
  • Prepare to perform system backups
  • Describe SMC High Availability solutions
  • Understand different SMC Administrator roles and access limitation
  • Articulate SMC logging approach and how to utilize Logs view

MODULE 4: NGFW POLICIES AND TEMPLATES

  • Describe the types of NGFW policies
  • Understand firewall policy templates
  • Explain automatic rules
  • Understand a firewall policy hierarchy

MODULE 5: ACCESS CONTROL AND NAT

  • Utilize the policy editor to customize NGFW policies
  • Configure Access Control Rules
  • Understand Rules Options
  • Describe the supported types of NAT
  • Configure the Network Address Translation

MODULE 6: TRAFFIC INSPECTION

  • Understand the difference between stateful and proxy mode
  • Configure web filtering
  • Explain different ways to control applications
  • Configure Sidewinder Proxy on the NGFW
  • Describe integration with external solutions

MODULE 7: INSPECTION POLICIES

  • Describe the Inspection Policies and Inspection Policy hierarchy
  • Configure the system policies and utilize the template for deep packet inspection
  • Articulate the different inspection policy components and options.
  • Modify Inspectionrules to react with various traffic
  • Understand how to tune the Inspection Policy

MODULE 8: MALWARE DETECTION AND FILE FILTERING POLICIES

  • Explain the malware detection process in the NGFW
  • Articulate the different options for detecting malware
  • Configure a File Filtering Policy•Explain the detection methods used in the NGFW Inspection

MODULE 9: ALERTING AND NOTIFICATIONS

  • Explain the alert escalation process in the NGFW system
  • Create an alert policy and alert chain to escalate an alert•Configure alert notifications channels

MODULE 10: USERS AND AUTHENTICATION

  • Identify supported directory servers and authentication methods
  • Explain and configure user authentication
  • Comprehend user identification•Understand how to integrate active directory interacts with the FUID agent
  • Understand ECA agent integration in windows environments

MODULE 11: MOBILE VPN AND SSL VPN PORTAL

  • Understand client-based and clientless remote access
  • Articulate the different Forcepoint options for remote access
  • Perform the SSL VPN Portal configuration

MODULE 12: SITE-TO-SITE VPN

  • Understand NGFW VPN Terminology
  • Differentiate between policy-based VPN and route-based VPN
  • Understand different site-to-site VPN topologies
  • Configure a policy-based VPN

MODULE 13: USING LOGS

  • Describe the log entry types available in the NGFW
  • Analyze how pruning filters affect log data
  • Create permanent filters•Illustrate the analysis and visualization tools for logs
  • Configure log data management tasks

MODULE 14: MONITORING, STATISTICS, AND REPORTING

  • Understand status monitoring views and dashboards
  • Understand Overviews and alert thresholds
  • Create customizable reports from log data
  • Comprehend the different third party probing methods

MODULE 15: POLICY TOOLS

  • Understand policy snapshots within the Management Server
  • Run the Rule Search tool available for Access rules, NAT rules, and Inspection Policies
  • Utilize the Policy Validation tool•Understand the Rule Counter Analysis
  • Comprehend the Policy Activation process in NGFW

MODULE 16: TROUBLESHOOTING

  • Understand the full troubleshooting process
  • Recognize the different kinds of logs that SMC provides to perform troubleshooting
  • Utilize various logs for troubleshooting and understand their meaning
  • Capture traffic and run diagnostics
  • Learn what to provide support when troubleshooting
  • Apply knowledge through three common problem scenarios

MODULE 17: SINGLE FIREWALL INSTALLATION

  • NGFW Deployment Overview
  • NGFW Operating Roles
  • Single NGFW Configuration
  • NGFW Installation
  • Add-Ons Features
  • Advanced Configuration Settings

MODULE 18: WHAT’S NEW IN NGFW 6.7

  • Describe the new features added in 6.7to the Forcepoint NGFW

target_au
  • New and existing customers of Forcepoint NGFW
  • Forcepoint Channel Partners
  • Forcepoint NGFW end users

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint Web Security
days3
seo_titleForcepoint Web Security Training Course | Insoft Services
seo_decIn the Forcepoint Web Security course you will gain an understanding of the key core competencies to manage Forcepoint Web Security.
seo_tkeyForcepoint Web Security
categoryweb-security
vendorForcepoint

techonogySecurity
overviewThe Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.   See other Forcepoint courses
objective
  • Understand the Forcepoint Web Security components and architecture
  • Articulate common deployment topologies
  • Access anduse Security Manager, including other available user interfaces
  • Execute updates and upgrades on Forcepoint Web Security
  • Understand delegated administration
  • Comprehend and perform policy and filter basics
  • Create effective web policies
  • Understand exception management
  • Recognize different user management methods
  • Configure user identification and policy enforcement
  • Create notifications and alerts
  • Understand report types and utilization
  • Create various reports
  • Understand system health alerts and usage monitoring
  • Understand system disaster recovery procedures
  • Learn how to respond to incidents

outline

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security
  • Describe features, components, and key integrations that enable Web Security functionalities
  • Compare the advantages and disadvantages of various deployment methodologies
  • Articulate the licensing structure and how and when to enter the key within the Content Gateway
  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning
  • Identify standard and custom policies (and related filters) based on your organizations needs
  • Distinguish the key settingsin Security Manager
  • Compare user identification and proxy authentication
  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts
  • Explain the reporting flow
  • Describe the various reporting options to gain important insights about your environment
  • Identify suspicious network activity using threats dashboard
  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents
  • Compare and contrast the available update options
  • Distinguish the guidelines related to incident management and disaster recovery
  • Identify system health monitoring capabilities
  • Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery

target_au
  • System Administrators, Network Security Administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint Email Security Administrator Course
days2
seo_titleForcepoint Email Security Administrator Course | Insoft Services
seo_decDuring the Forcepoint Email Security Administrator course, you will develop skills in creating email policies and system architecture and maintenance.
seo_tkeyForcepoint Email Security Administrator
categorynetwork-security-courses
vendorForcepoint

techonogySecurity
overviewDuring the Forcepoint Email Security Administrator course, you will learn the features, components, and key integrations that enable Forcepoint Email Security functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the Forcepoint Email Security system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.   See other Forcepoint courses
objective
  • Describe the key capabilities of Forcepoint Email Security
  • Understand the required and add-on components of Forcepoint Email Security
  • Understand multiple deployment scenarios
  • Perform initial setup configurations
  • Configure connection level controls and message properties
  • Create policies to fulfill various organization needs
  • Understand the difference between various block/permit lists
  • Configure email DLP policies
  • Configure and customize PEM portal
  • Understand email encryption methods
  • Run and interpret reports and configure logs
  • Understand how to upgrade the system and disaster recovery procedures

outline

Topic 1: Features & Components

  • Forcepoint solution overview
    • Forcepoint solution introduction
  • Forcepoint Email Security features and new features
    • Key features
    • What’s new
  • Understanding the deployment
    • Forcepoint Email Security appliances
    • V-Series appliance interfaces
    • Network without Forcepoint Email Security
    • Network with Forcepoint Email Security
    • Required components
    • Internal daemons
    • Communications with external services
    • Supported V-Series and X-Series models and total resources
    • Hardware allocation
  • Getting started with Forcepoint Email Security
    • Fundamental email security concepts: protected domain and email relay
    • Setting up Forcepoint Email Security
  • Setting up users
    • Domain group
    • User directory
  • Defining email routing
    • Domain-based route
    • Directory-based route

Topic 2: Traffic & Policies

  • Traffic
    • Message processing flow
    • Setting connection properties (simultaneous connection per IP)
    • Configuring message properties (size, volume)
    • RBL & Reputation service
    • SMTP greeting delay
    • Recipient validation
    • DHA prevention
    • SPF check
    • SMTP authentication
    • Global IP block list
    • IP address group
    • Compare trusted IP group and Allow Access List
  • Quarantine system
    • Quarantine system overview
    • Queue monitor
    • Message queues
  • Policy
    • Policy flow
    • Policy type
    • Policy condition
    • Rules, filters, actions
    • Action options merge
    • Global IP and address permit list
    • Dynamic permit list
    • Built-in DLP
      • DLP integration
      • Registered with data security server

Topic 3: PEM & advanced configurations & Maintenance

  • Personal Email Manager (PEM)
    • PEM architecture
    • Enabling PEM
    • End user block/permit list
  • Threat Projection Cloud
    • Threat Protection Cloud introduction
    • Configure Threat Protection Cloud
  • Traffic shaping
    • 5 parameters
    • How traffic shaping works
  • Transfer Layer Security (TLS)
    • Enforced/Mandatory TLS vs opportunistic TLS
    • Enable enforced TLS for incoming/outgoing connections
    • Enforced TLS security level & encryption strength
    • CA issued or self-signed TLS certification process
    • Enable mandatory TLS
    • Enable opportunistic TLS
  • Secure Message Delivery
    • Secure Message Delivery scenario 1
    • Secure Message Delivery scenario 2
    • Enable Secure Message Delivery
    • Secure encryption queue
    • Secure Message Delivery end-user experiences
  • Maintenance
    • Reporting
      • Log and reporting system overview
      • Log Server and database deployment
      • Dashboard & alert & logs
      • Presentation reports
      • Real-time monitor
      • Log database partition & rollover & maintenance
    • System administration & maintenance
      • Manage appliances
      • Delegated administration
      • Backup and restore

target_au
  • End-User/Customers: System administrators, network security administrators, IT staff
  • Channel Partners: Sales Engineers, consultants, implementation specialists

pre_req

None


titleCourse MB-700T00-A: Microsoft Dynamics 365: Finance and Operations Apps Solution Architect
days3
seo_titleMB-700T00-A: Dynamics 365 Finance Operations Apps Solution Architect
seo_decThe Microsoft Dynamics 365 Finance & Operations Apps Solution Architect (MB-700T00-A) course is developed for aspiring solution architects.
seo_tkeyMB-700T00-A
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365: Finance and Operations Apps Solution Architect (MB-700T00-A) course is developed for those aspired to be and new to the solution architect role. This course provides technical information focusing on application architecture and technical skills to start their journey into this role. This course will not cover the industrial skills and delivery skills required for this role.   See other Microsoft courses
objective

After completing the MB-700T00-A course, students will be able to:

  • Define skill areas for the solution architect role
  • Explain instances & deployment models recommendations by Microsoft
  • Understand cloud solution, CDM & CDS
  • Get more info on Licensing, AppSource & Support for Dynamics 365
  • Use Lifecycle services as a solution architect
  • Know the considerations for blueprinting Dynamics 365 solution
  • Understand the concepts and tools used for data management
  • Explain the Integration options & Business events on solutions
  • Know the available options on solution localization, compliance & reporting
  • Have architectural conversations on extensibility, security, & performance
  • Know what is ALM application lifecycle management
  • Identify opportunities for automated testing and using RSAT

outline
  • Module 1: Introduction
  • Module 2: The Architect Role
  • Module 3: Environment, Instances & Deployment Models
  • Module 4: Cloud Solution, CDM & CDS
  • Module 5: Licensing, AppSource & Support
  • Module 6: Lifecycle services
  • Module 7: Blueprinting Dynamics 365 solutions
  • Module 8: Data Management
  • Module 9: Integration & Business events
  • Module 10: Localization, Compliance & Reporting
  • Module 11: Extensibility
  • Module 12: Security
  • Module 13: Performance
  • Module 14: Application Lifecycle Management
  • Module 15: Automated Testing & RSAT
  • Module 16: Additional Areas for Architects

target_au

The audience for this course should have previous experience with a functional or technical focus in Dynamics 365: Finance and Operations Applications. Primarily for those who are aspired to be and new to solution architect role.


pre_req

You must complete the solution architect learning path for solution architects.


titleCourse AZ-120T00-A: Planning and Administering Microsoft Azure for SAP Workloads
days4
seo_titleCourse AZ-120T00-A Plan & Administer Azure for SAP Workloads
seo_decThe Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course how to leverage Azure resources that include deployment of VMs.
seo_tkeyAzure for SAP Workloads
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course teach IT Professionals experienced in SAP solutions how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. Students of this course will learn through concepts, scenarios, procedures, and hands-on labs on how to best plan and implement migration and operation of an SAP solution on Azure. You will receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution.   See other Microsoft courses
objective

After completing the Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course, students will be able to:

  • Migrate and SAP HANA, S/4HANA, SAP NetWeaver to Azure
  • Leverage Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager
  • Use intersite connectivity features including VNet Peering and VNet-to-VNet connections
  • Work with Azure Active Directory (AAD) and Azure AD Connect

outline

Module 1: Introduction

  • Contains an overview of the SAP and Microsoft partnership.

Module 2: Foundations of SAP on Azure

  • Contains brief lessons on Azure compute, Azure storage, Azure networking, SAP HANA for Azure (Large Instances), identity services, governance and manageability, backup and data protection services, and migration services.

Module 3: SAP Certified Offerings on Azure

  • Contains lessons on general prerequisites (SAP support in public cloud environments), deployment options of Azure for SAP workloads, SAP product-specific support for Azure, operating System support of Azure for SAP workloads, storage support of Azure for SAP workloads, networking support for SAP, database support for SAP, high availability and disaster recovery support for SAP, and monitoring requirements for SAP.
  • Lab: Online Lab: Implementing Linux clustering on Azure VMs
  • Lab: Online Lab: Implementing Windows clustering on Azure VMs

Module 4: SAP on Azure Reference Architecture

  • Contains lessons on SAP NetWeaver with AnyDB, SAP S4 HANA, and SAP HANA on Azure (Large Instances) on Azure VMs.

Module 5: Planning for Implementing SAP Solutions on Azure

  • Contains lessons on Azure VM compute, network, and storage considerations. As well as Azure VM high availability and disaster recovery, Azure VM backup considerations, Azure VM monitoring considerations, Azure VM security considerations, and Azure VM authentication and access control considerations.

Module 6: Planning for Migrating SAP Workloads to Azure

  • Contains lessons on strategies for migrating SAP systems to Microsoft Azure and SAP a workload planning and deployment checklist.

Module 7: Implementing Azure VM-based SAP Solutions

  • Contains lessons on Azure VM deployment methodologies, single-instance implementations (2-tier or 3-tier), implementing HA SAP NetWeaver with AnyDB on Azure VMs, implementing HA SAP HANA on Azure VMs, configure the Azure Enhanced Monitoring Extension for SAP, and implementing AD and Azure AD-based authentication.

Module 8: Module 8-Deploying HANA Large Instances (HLI)

  • Contains a lesson on implementing HANA Large Instances (HLI).

Module 9: Migrating SAP Workloads to Azure

  • Contains lessons on migration options, DMO methodologies, cloud migration options, and Very Large Database Migration to Azure.
  • Lab: Online Lab-Implement SAP architecture on Azure VMs running Linux
  • Lab: Online Lab-Implement SAP architecture on Azure VMs running Windows

Module 10: Maintaining SAP on Azure

  • Contains lessons on, remote management, performing backups and restores, OS and workload updates, vertical and horizontal scaling, and Disaster Recovery (DR).

Module 11: Monitoring and Troubleshooting SAP on Azure

  • Contains lessons on monitoring Azure VMs, monitoring SAP HANA on Azure (Large Instances), and integrating SAP solutions with Microsoft cloud services.

target_au

The Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course are for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle.

They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.


pre_req
  • Administrators and architects of Azure solutions for SAP should possess solid knowledge of SAP Applications, SAP HANA, S/4HANA, SAP NetWeaver, SAP BW, OS  Servers for SAP Applications and Databases.
  • Prior to taking this course, it is recommended that students to have taken the Azure Administrator (AZ-103) or Azure Solutions Architect (AZ-300) training, as well as SAP HANA and Linux training.

titleCourse 55285A: Advanced Python
days2
seo_titleCourse 55285A: Advanced Python Training | Insoft Services
seo_decIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques.
seo_tkeyAdvanced Python
categoryprogramming
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques. This advanced Python course is taught using Python 3; however, differences between Python 2 and Python 3 are noted. For private Python classes, our instructor can focus specifically on Python 2 if desired.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Work with the Collections module.
  • Understand mapping and filtering and lambda functions.
  • Perform advanced sorting.
  • Work with regular expressions in Python.
  • Work with databases, CSV files, JSON, and XML.
  • Write object-oriented code in Python.
  • Test and debug your Python code

outline

Module 1: Advanced Python Concepts

In this lesson, you will learn about some Python functionality and techniques that are commonly used but require a solid foundation in Python to understand.

Lessons

  • Lambda Functions
  • Advanced List Comprehensions
  • Collections Module
  • Mapping and Filtering
  • Mutable and Immutable Built-in Objects
  • Sorting
  • Unpacking Sequences in Function Calls

Lab: Exercises in this Lesson

  • Rolling Five Dice
  • Creating a defaultdict
  • Creating an OrderedDict
  • Creating a Counter
  • Working with a deque
  • Converting list.sort() to sorted(iterable)
  • Converting a String to a DateTime.date Object

After completing this module, students will be able to:

  • Work with lambda functions.
  • Write more advanced list comprehensions.
  • Work with the collections module to create named tuples, defaultdicts, ordereddicts, counters, deque
  • Use mapping and filtering.
  • Sort sequences.
  • Unpack sequences in function calls.
  • Create modules and packages.

 

Module 2: Working with Data

Data is stored in many different places and in many different ways. There are Python modules for all of the most common ways.

Lessons

  • Relational Databases
  • CSV
  • Getting Data from the Web
  • JSON

Lab: Exercises in this Lesson

  • Querying an SQLite Database
  • Inserting File Data into a Database
  • Comparing Data in a CSV File
  • Requests and Beautiful Soup
  • Using JSON to Print Course Data

After completing this module, students will be able to:

  • Access and work with data stored in a relational database.
  • Access and work with data stored in a CSV file.
  • Get data from a web page.
  • Access and work with data stored as HTML and XML.
  • Access an API.
  • Access and work with data stored as JSON.

 

Module 3: Testing and Debugging

This module explains how to test and debug using Python.

Lessons

  • Testing for Performance
  • The unittest Module

Lab: Exercises in this Lesson

  • Fixing Functions

After completing this module, students will be able to:

  • Test performance with timers and using the time it module.
  • To write unit tests using the unittest module.

 

Module 4: Classes and Objects

An object is something that has attributes and/or behaviours, meaning it is certain ways and does certain things. In the real world, everything could be considered an object. Some objects are tangible, like rocks, trees, tennis racquets, and tennis players. And some objects are intangible, like words, colours, tennis swings, and tennis matches.

Lessons

  • Attributes
  • Behaviours
  • Classes vs. Objects
  • Attributes and Methods
  • Private Attributes
  • Properties
  • Documenting Classes
  • Inheritance
  • Static Methods
  • Class Attributes and Methods
  • Abstract Classes and Methods
  • Understanding Decorators

Lab: Exercises in this Lesson

  • Adding a roll() Method to Die
  • Properties
  • Documenting the Die Class
  • Extending to Die, Class
  • Extending the roll() Method

After completing this module, students will be able to:

  • Create classes and objects in Python.
  • Write instance methods, class methods, and static methods.
  • Define properties.
  • Create subclasses using inheritance.
  • Create abstract classes.
  • Appropriately document Python classes.
  • Understand how decorators work.

target_au
pre_req

Experience in the following is required for this Python class:

  • Basic Python programming experience. In particular, you should be very comfortable with:
    1. Working with strings.
    2. Working with lists, tuples and dictionaries.
    3. Loops and conditionals.
    4. Writing your own functions.

Experience in the following would be useful for this Python class:

  • Some exposure to HTML, XML, JSON, and SQL.

titleCourse 55278A: Advanced Microsoft Outlook 2019
days1
seo_titleCourse 55278A: Advanced Microsoft Outlook 2019 Training | Insoft UK
seo_decThe Advanced Microsoft Outlook 2019 (55278A) course teaches how to work with some of the more advanced features of Outlook.
seo_tkeyMicrosoft Outlook 2019
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewThe Advanced Microsoft Outlook 2019 (55278A) training course builds on basic skills in Outlook and teaches students to work with some of the more advanced features of Outlook.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tasks and notes.
  • Learn to work with signatures and themes.
  • Manage your inbox including filtering, creating search folders, and archiving.
  • Work with multiple accounts.

outline

Module 1: Working with Tasks and Notes

This module explains how to work with tasks and notes in Microsoft Outlook.

Lessons

  • Create a Task
  • Print a Task
  • Update a Task
  • Search for Tasks
  • Assign a Task
  • Reply to a Task Request
  • Track Tasks
  • Change Your Task View
  • Work with Notes
  • Lab: Work with Tasks
After completing this module, students will be able to:
  • Change your Task view.
  • Create a task.
  • Print a task.
  • Update a task.
  • Assign a task.
  • Search for tasks.
  • Reply to a task request.
  • Track tasks.
  • Work with notes.

 

Module 2: Using Signature and Themes

This module explains how to use signatures and themes.

Lessons

  • Create a Signature
  • Automatically Add a Signature to Messages
  • Modify a Signature
  • Format Outgoing Messages
  • Create and Apply a Theme
  • Lab: Adding a Theme and Signature to Your Messages
After completing this module, students will be able to:
  • Create a signature.
  • Learn how to automatically add the signature to email messages.
  • Modify a signature.
  • Create and apply a theme

 

Module 3: Managing Your Inbox

This module explains how to manage your inbox in Microsoft Outlook.

Lessons

  • Search for Messages
  • Create Search Folders
  • Sort Messages
  • Add New Local Folders
  • Move Messages between Folders
  • Group Your Mailbox Items
  • Filter Messages
  • Organize Messages
  • Create and Manage Rules
  • Manage Your Junk Email
  • Archive Your Messages
  • Create an Outlook Data File
  • Create a Quick-Step
  • Add Protection to Your Outgoing Messages
  • Create Auto-replies
  • Lab: Managing Your Inbox Exercises
  • Organizing Your Messages
  • Managing Your Mail by Creating a Quick-Step
After completing this module, students will be able to:
  • Search for messages.
  • Create search folders.
  • Group your mailbox items.
  • Filter messages.
  • Organize messages.
  • Manage your junk mail.
  • Archive your messages.
  • Create an Outlook data file.
  • Create a Quick Step to easily and quickly apply multiple actions to emails.
  • Add protection to outgoing emails.

 

Module 4: Working with Multiple Email Accounts

This module explains how to work with multiple email accounts in Microsoft Outlook.

Lessons

  • Setting Up Multiple Accounts in Outlook
  • Send Emails from Different Accounts
  • POP vs. IMAP Email Programs
  • Lab: Working with Multiple Email Accounts
After completing this module, students will be able to:
  • Set up multiple accounts in Outlook.
  • Send emails from different accounts.
  • Learn the differences between POP and IMAP email programs.

target_au

This course is intended for students who have basic skills with Microsoft Outlook 2019 who want to learn higher level skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Experience in the following is required for this Microsoft Outlook class:
  • Familiarity with Windows.
  • Introductory level knowledge of Outlook.

titleCourse 55274A: Advanced Microsoft Word 2019
days1
seo_titleCourse 55274A: Advanced Microsoft Word 2019 | Insoft Services
seo_decIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents and footnotes.
seo_tkeyAdvanced Microsoft Word 2019
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents, footnotes, and endnotes, adding comments, tracking changes, comparing and combining documents, creating envelopes and labels, using Mail Merge, and protecting documents. This class is for Word 2019 on Windows.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tables of contents.
  • Learn to work with footnotes and endnotes.
  • Learn to insert bibliographies and indexes.
  • Learn to use comments.
  • Learn to use track changes including accepting and rejecting changes.
  • Learn to compare and combine documents.
  • Learn to use Mail Merge and create envelopes and labels.
  • Learn to protect documents.
  • Learn to use bookmarks, add watermarks, and customize the Ribbon.

outline

Module 1: Working with Long Documents

This module explains how to work with long documents in Microsoft Word.

Lessons

  • Adding a Table of Contents
  • Updating the Table of Contents
  • Deleting the Table of Contents
  • Footnotes and Endnotes
  • Inserting citations and a Bibliography
  • Adding an Index
  • Inserting a Table of Figures
  • Inserting and Updating a Table of Authorities
  • Creating an Outline
  • Lab: Working with Long Documents Exercises
  • Insert and Update a Table of Contents
  • Working with Footnotes
  • Insert Citations and a Bibliography
After completing this module, students will be able to:
  • Add a table of contents to a Microsoft Word document.
  • Update the table of contents.
  • Add footnotes to a Microsoft Word document.
  • Add endnotes to a Microsoft Word document.
  • Insert citations into a Microsoft Word document.
  • Insert a bibliography.
  • Update the bibliography.
  • Mark entries in a document.
  • Insert an index into a Microsoft Word document.
  • Create an outline in Word.

 

Module 2: Review and Collaborating on Documents

This module explains how to review and collaborate on Microsoft Word documents.

Lessons

  • Adding Comments
  • Tracking Changes
  • Viewing Changes, Additions, and Comments
  • Accepting and Rejecting Changes
  • Lab: Reviewing and Collaborating Exercises
  • Adding Comments to a Document
  • Tracking Changes
  • Viewing Markup
  • Accepting and Rejecting Changes
After completing this module, students will be able to:
  • Add and work with comments.
  • Track changes and set and change tracking options.
  • View changes, additions and comments.
  • Use the Reviewing pane.
  • Choose what changes to show.
  • Accept and reject changes.

 

Module 3: Comparing and Combining Documents

This module explains how to compare and combine documents in Microsoft Word.

Lessons

  • Comparing Documents
  • Combining Documents
  • Lab: Comparing and Combining Documents Exercises
  • Comparing Documents
  • Combining Documents
After completing this module, students will be able to:
  • Compare documents to find out what has changed between different versions of a document.
  • Combine documents to gather revisions made by various individuals into a single document.

 

Module 4: Managing Mailings

This module explains how to manage mailings in Microsoft Word.

Lessons

  • Creating Envelopes and Labels
  • Using Mail Merge
  • Lab: Managing Mailings Exercises
  • Printing an Envelope
  • Using Mail Merge
After completing this module, students will be able to:
  • Create and print envelopes in Microsoft Word.
  • Create and print labels in Microsoft Word.
  • Use Mail Merge to print or email form letters to multiple recipients.
  • Select mail Merge recipients from an existing list

 

Module 5: Protecting Documents

This module explains how to protect documents in Microsoft Word.

Lessons

  • Making Word Documents Read Only
  • Password Protect Word Documents
  • Removing Metadata from Files
  • Restrict Formatting and Editing
  • Lab: Protecting a Document
After completing this module, students will be able to:
  • Mark documents as final and makes them read-only.
  • Password protect Microsoft Word documents.
  • Restrict formatting options before sharing a document with others.
  • Restrict editing options before sharing a document with others

 

Module 6: Random Useful Items

This module goes over several random and useful features in Microsoft Word.

Lessons

  • Using Bookmarks
  • Adding Watermarks
  • Adding Titles to Sections
  • Inserting Built-in Fields
  • Using the Go To Feature
  • Using Macros
  • Copy Macros From Document to Document
  • Macro Security
  • Recording a Macro
  • Assigning Shortcut Keys
  • Customizing the Ribbon
  • Preparing a Document for Internationalization and Accessibility
  • Sharing
  • Lab: Random Useful Items Exercises
  • Using Bookmarks
  • Adding Custom Watermarks
  • Recording a Macro
  • Customizing the Ribbon
  • Using the Cloud
After completing this module, students will be able to:
  • Add bookmarks to a Microsoft Word document and to use them to jump around the document.
  • Add watermarks to a Microsoft Word document.
  • Add titles to sections.
  • Insert built-in fields.
  • Use the Go-To feature.
  • Customize the ribbon.
  • Prepare a document for internationalization and accessibility.
  • Learn how to use the Cloud.

target_au

This course is intended for students who have intermediate skills with Microsoft Word 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req

Intermediate-level experience in Microsoft Word.


titleCourse 55270A: Advanced Microsoft Excel 2019
days1
seo_titleCourse 55270A: Advanced Microsoft Excel 2019 | Insoft Services
seo_decIn this Advanced Microsoft Excel 2019 (55270A) training class you will gain skills to use pivot tables, audit and analyze worksheet data and manage macros.
seo_tkeyAdvanced Microsoft Excel 2019
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewThis Advanced Microsoft Excel 2019 (55270A) training class is designed for students to gain the skills necessary to use pivot tables, audit and analyze worksheet data, utilize data tools, collaborate with others, and create and manage macros.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Create pivot tables and charts.
  • Learn to trace precedents and dependents.
  • Convert text and validate and consolidate data.
  • Collaborate with others by protecting worksheets and workbooks.
  • Create, use, edit, and manage macros.
  • Import and export data.

outline

Module 1: Using Pivot Tables

This module explains how to use pivot tables in Microsoft Excel.

Lessons

  • Creating Pivot Tables
  • More PivotTable Functionality
  • Inserting Slicers
  • Multi-Select Option in Slicers
  • PivotTable Enhancements
  • Working with Pivot Tables
  • Inserting Pivot Charts
  • More Pivot Table Functionality
  • Working with Pivot Tables
  • Lab: Working with Pivot Tables
After completing this module, students will be able to:
  • Use pivot tables to analyze data.
  • Edit pivot tables.
  • Format pivot tables.
  • Insert pivot charts.
  • Use Slicers.

 

Module 2: Auditing Worksheets

This module explains how to audit worksheets.

Lessons

  • Tracing Precedents
  • Tracing Dependents
  • Showing Formulas
  • Lab: Auditing Worksheets Exercises
  • Tracing Precedents
  • Tracing Dependents
After completing this module, students will be able to:
  • Audit formulas.
  • Trace precedents to determine which cells impact a specific cell.
  • Trace dependents to determine which cells are impacted by a specific cell.
  • Remove precedent and dependent arrows.
  • Show formulas.
  • Check for errors frequently found in formulas

 

Module 3: Data Tools

This module explains how to work with data tools.

Lessons

  • Converting Text to Columns
  • Linking to External Data
  • Controlling Calculation Options
  • Data Validation
  • Using Data Validation
  • Consolidating Data
  • Goal Seek
  • Using Goal Seek
  • Lab: Data Tools Exercises
  • Converting Text to Columns
  • Using Data Validation
  • Consolidating Data
  • Using Goal Seek
After completing this module, students will be able to:
  • Convert text to columns.
  • Use Data Validation to restrict the type of data that can be entered into a cell.
  • Consolidate data from a number of different ranges into one new range.
  • Use Goal Seek to figure out the value to input to obtain a specific result

 

Module 4: Working with Others

This module explains how to work with others in Microsoft Excel.

Lessons

  • Protecting Worksheets and Workbooks
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
  • Marking a Workbook as Final
  • Lab: Working with Others Exercises
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
After completing this module, students will be able to:
  • Password protect a workbook.
  • Password protect a worksheet.
  • Password protect ranges in a worksheet.
  • Track changes.
  • Accept and reject changes.
  • List all changes on a new sheet

 

Module 5: Recording and Using Macros

This module explains how to record and use macros.

Lessons

  • Recording Macros
  • Recording a Macro
  • Running Macros
  • Editing Macros
  • Adding Macros to the Quick Access Toolbar
  • Adding a Macro to the Quick Access Toolbar
  • Lab: Recording and Using Macros Exercises
  • Recording a Macro
  • Adding a Macro to the Quick Access Toolbar
After completing this module, students will be able to:
  • Record macros.
  • Run macros.
  • Edit macros (kind of).
  • Add macros to the Quick Access Toolbar

 

Module 6: Random Useful Items

This module explains how to use sparklines and other useful random features.

Lessons

  • Sparklines
  • Inserting and Customizing Sparklines
  • Using Microsoft Translator
  • Preparing a Workbook for Internationalization and Accessibility
  • Importing and Exporting Files
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
  • Lab: Random Useful Items Exercises
  • Inserting and Customizing Sparklines
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
After completing this module, students will be able to:
  • Insert sparklines into worksheets.
  • Customize sparklines by:
  • Change the type of sparkline.
  • Highlight key points.
  • Change colours.
  • Change the axis.
  • Prepare a workbook for internationalization, accessibility, and compatibility.
  • Import text files into Microsoft Excel.
  • Copy cells from a worksheet into Microsoft Word.
  • Copy and paste a chart into Microsoft Word.

 

Module 7: Cloud

This module explains how to save, share, and collaborate with others using the cloud.

Lessons

  • Using the Cloud.
  • Lab: Using the Cloud
After completing this module, students will be able to:
  • Use Excel in the Cloud.

target_au

Students who have intermediate skills with Microsoft Excel 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Before attending this course, students must have:
  • Basic and Intermediate Excel experience.

titleCourse 40573G: Microsoft Cloud Workshop: Hybrid Identity
days1
seo_titleCourse 40573G: Microsoft Cloud Workshop: Hybrid Identity | Insoft UK
seo_decIn the Microsoft Cloud Workshop: Hybrid identity (40573G) workshop, you will learn to set up a hybrid identity solution that integrates with Azure.
seo_tkeyHybrid Identity
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud Workshop: Hybrid identity (40573G) workshop, you will learn to set up and configure a hybrid identity solution that integrates an existing on-premises identity solution with Azure. You will learn how to secure the virtual network by deploying a network virtual appliance and configure firewall rules and route tables. Additionally, you will set up access to the virtual network with a jump box and a site-to-site VPN connection.  
objective

At the end of this workshop, you will be better able:

  • Design virtual networks in Azure with multiple subnets to filter and control network traffic.
  • Create a virtual network and provision subnets.
  • Create route tables with required routes.
  • Build a management jump box.
  • Configure firewalls to control traffic flow.
  • Configure site-to-site connectivity.

outline

Module 1: Whiteboard Design Session – Hybrid identity

In this workshop, you will learn to set up and configure a hybrid identity solution that integrates an existing on-premises identity solution with Azure. You will learn how to secure the virtual network by deploying a network virtual appliance and configure firewall rules and route tables. Additionally, you will set up access to the virtual network with a jump box and a site-to-site VPN connection.

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

 

Module 2: Hands-On Lab – Hybrid identity

In this hands-on lab you will setup and configure a number of different hybrid identity scenarios. The scenarios involve an Active Directory single-domain forest named contoso.local, which in this lab environment, consists (for simplicity reasons) of a single domain controller named DC1 and a single domain member server named APP1. The intention is to explore Azure AD-related capabilities that allow you to integrate Active Directory with Azure Active Directory, optimize hybrid authentication and authorization, and provide secure access to on-premises resources from Internet for both organizational users and users who are members of partner organizations.

Lessons

  • Integrate an Active Directory forest with an Azure Active Directory tenant.
  • Manage Authentication, Authorization, and Access Control in Hybrid Scenarios.
  • Configure application access in hybrid scenarios.

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas. Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


pre_req

Workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop.


titleCourse 40565G: Microsoft Cloud Workshop: Modernizing Data Analytics with SQL Server 2019
days1
seo_titleModernizing Data Analytics with SQL Server 2019 Workshop | Microsoft
seo_decIn this Microsoft Data Analytics with SQL Server 2019 (Course 40565G) workshop, you will gain a better understanding of the features of SQL Server 2019.
seo_tkeySQL Server Workshop
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud: Modernizing Data Analytics with SQL Server 2019 Workshop (Course 40565G), you will gain a better understanding of the features of SQL Server 2019 enables more Big Data and analytics capabilities through the use of Big Data Clusters, data virtualization and orchestration, query processing enhancements, and through better scalability through distributed storage and compute.   See other Microsoft courses
objective

At the end of this SQL Server Workshop, you will be better able:

  • Design a modernization plan for performing Big Data analytics using SQL Server 2019 capabilities
  • Build solutions for conducting advanced data analytics with scalable SQLServer2019 Big Data clustersSQL Server Workshop

outline

Module 1: Whiteboard Design Session – Modernizing Data Analytics with SQL Server 2019

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-On Lab – Modernizing Data Analytics with SQL Server 2019

Lessons

  • Using data virtualization
  • Using notebooks
  • Machine learning
  • Identify PII and GDPR-related compliance issues using Data Discovery & Classification in SSMS
  • Exploring intelligent query processing (QP) features
  • Monitoring the big data cluster

target_au

This SQL Server Workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this SQL Server Workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40564G: Microsoft Cloud Workshop: Securing the IoT End-to-End
days1
seo_titleSecuring the IoT End-to-End - Microsoft Cloud Workshop | Insoft Services
seo_decIn this Microsoft Cloud Workshop: Securing the IoT End-to-End (Course 40564G) workshop, you will look at the process for designing a secure IoT solution.
seo_tkeySecuring the IoT
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Securing the IoT End-to-End (Course 40564G) workshop, you will look at the process for designing and implementing an oil and gas manufacturing IoT solution that is secured end-to-end following best practices. At the end of this workshop, you will be better able to architect a comprehensive and secure oil and gas manufacturing IoT solution.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Architect a comprehensive and secure oil and gas manufacturing IoT solution.

outline

Module 1: Whiteboard Design Session – Securing the IoT end to end

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Securing the IoT end to end

Lessons

  • Secure and configure IoT Hub and Device Provisioning Service
  • Enroll and provision IoT devices
  • Install and configure IoT Edge
  • Install Azure Security IoT Agent
  • Simulate IoT attacks
  • Configure security and alerts

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas. Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


pre_req
titleCourse 40563G: Microsoft Cloud Workshop: Real-time data with Azure Database for PostgreSQL Hyperscale
days1
seo_titleReal-time data with Azure Database for PostgreSQL Hyperscale | Insoft UK
seo_decIn this workshop Real-time data with Azure Database for PostgreSQL Hyperscale, you will learn advanced features of the PostgreSQL PaaS service on Azure.
seo_tkeyAzure Database for PostgreSQL Hyperscale
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud Workshop: Real-time data with Azure Database for PostgreSQL Hyperscale (Course 40563G) workshop, you will learn how to use advanced features of the managed PostgreSQL PaaS service on Azure to make your database more scalable and able to handle the rapid ingest of streaming data while simultaneously generating and serving pre-aggregated data for reports. You will design a resilient stream processing pipeline to ingest, process, and save real-time data to Postgres. Next, you will learn how to explore and gain insights from flat files at scale, perform aggregates, and save valuable information to your database. Finally, you will create complex reports containing advanced visualizations, using a drag-and-drop interface, and use them to build a customizable dashboard that gets updated in real-time.   See other Microsoft courses
objective

At the end of this workshop, you will be better able to:

  • Implement a highly scalable, managed open source database solution.
  • Ensure that it can handle real-time, roll-up and serve data for advanced visualizations.

outline

Module 1: Whiteboard Design Session – Real-time data with Azure Database for PostgreSQL Hyperscale

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Real-time data with Azure Database for PostgreSQL Hyperscale

Lessons

  • Connect to and set up your database
  • Add secrets to Key Vault and configure Azure Databricks
  • Send clickstream data to Kafka and process it in real-time
  • Rollup real-time data in PostgreSQL
  • Create advanced visualizations in Power BI

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40561G: Microsoft Cloud Workshop: Machine Learning
days1
seo_titleMicrosoft Cloud Workshop: Machine Learning | Insoft Services
seo_decIn this Microsoft Machine Learning Workshop, you will design and implement a solution that combines Azure Databricks with Azure Machine Learning.
seo_tkeyMicrosoft Machine Learning
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Machine Learning (Course 40561G), you will work with a group to design and implement a solution that combines Azure Databricks with Azure Machine Learning service to build, train and deploy the machine learning and deep learning models. You will learn how to use automated machine learning, model lifecycle management from training to deployment, in batch and real-time inferencing scenarios, and construct deep learning models for Natural Language Processing (NLP) in text classification and forecasting against time-series data. Finally, you’ll learn to compare data with PyTorch and Keras for deep learning.   See other Microsoft courses
objective

After completing this course, students will understand:

  • The capabilities and implementation solutions of Azure Machine Learning and Azure Databricks.

outline

Module 1: Whiteboard Design Session – Machine Learning

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on lab – Machine Learning

Lessons

  • Creating a forecast model using automated machine learning
  • Understanding the automated ML generated forecast model using model explainability
  • Creating a deep learning model (RNN) for time series data and registering the model
  • Using a forecast model for scoring of streaming telemetry
  • Creating a deep learning text classification model

target_au

This Microsoft Machine Learning workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40560G: Microsoft Cloud Workshop: Predictive Maintenance for remote field devices
days1
seo_titlePredictive Maintenance for remote field devices - Microsoft Workshop
seo_decIn this Predictive Maintenance for remote field devices workshop, you will learn how to evaluate Microsoft's catalogue of PaaS and SaaS-based IoT products.
seo_tkeyPredictive Maintenance for remote devices
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Predictive Maintenance for remote field devices (Course 40560G), you will learn how to evaluate Microsoft's catalogue of PaaS and SaaS-based IoT products to determine the optimal combination of tools to fulfil Fabrikam's needs. You will design and implement a solution that simplifies IoT device management and reporting, providing Fabrikam with a faster path to realizing their IoT strategy without requiring a lot of custom development. Next, you will learn how to deploy a trained predictive maintenance Machine Learning model and design a stream processing pipeline that makes predictions with the model in near real-time. At the end of this pipeline is an alert that is sent to the oil pump maintenance team when a pump failure is imminent.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Design an IoT-based predictive maintenance solution in Azure.

outline

Module 1: Whiteboard Design Session – Predictive Maintenance for remote field devices

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Predictive Maintenance for remote field devices

Lessons

  • Configuring IoT Central with devices and metadata
  • Run the Rod Pump Simulator
  • Creating a device set
  • Creating a useful dashboard
  • Create an Event Hub and continuously export data from IoT Central
  • Use Azure Databricks and Azure Machine Learning service to train and deploy a predictive model
  • Create an Azure Function to predict pump failure

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure. Workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop.


titleCourse 40559G: Microsoft Cloud Workshop: MLOps
days1
seo_titleMicrosoft Cloud Workshop: MLOps Training | Insoft Services
seo_decIn this Microsoft Cloud Workshop: MLOps (Course 40559G) workshop, you will learn how Trey Research can leverage Deep Learning technologies.
seo_tkeyMLOps
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: MLOps (Course 40559G) workshop, you will learn how Trey Research can leverage Deep Learning technologies to scan through their vehicle specification documents to find compliance issues with new regulations and manage the classification through their web application. The entire process from model creation, application packaging, model deployment and application deployment needs to occur as one unified repeatable, pipeline. At the end of this workshop, you will be better able to design and implement end-to-end solutions that fully operationalize deep learning models, inclusive of all application components that depend on the model.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Design and implement end-to-end solutions that fully operationalize deep learning models.

outline

Module 1: Whiteboard Design Session – MLOps

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on lab – MLOps

Lessons

  • Creating and evaluating compliance classification models
  • Registering the model
  • Setup New Project in Azure DevOps
  • Setup and Run the Build Pipeline
  • Setup the Release Pipeline
  • Test Build and Release Pipelines
  • Testing the deployed solution
  • Examining deployed model performance

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40526G: Microsoft Cloud Workshop: SAP HANA on Azure
days1
seo_titleSAP HANA on Azure Training - Microsoft Cloud Workshop | Insoft Services
seo_decIn this Microsoft Cloud Workshop: SAP HANA on Azure (Course 40526G) training, you will learn how to provision a highly available deployment of SAP HANA.
seo_tkeySAP HANA on Azure Training
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop (Course 40526G): SAP HANA on Azure Training, you will learn how to provision a highly available deployment of SAP HANA in Azure. Throughout the whiteboard design session and the hands-on lab, you will look at the planning process for SAP HANA migration and deployment. You will identify and implement Azure infrastructure components necessary to support a clustered deployment of SAP HANA. You will also step through installing SAP HANA and configuring SAP HANA system replication. Finally, you will review and test different scenarios that involve manual and automatic failover between cluster nodes.   See other Microsoft courses  
objective

At the end of this SAP HANA on Azure training workshop, you will be able to better design and deploy SAP HANA on Azure. After its completion, you will be able to provision Azure infrastructure components necessary to support highly available SAP HANA deployments, configure Azure virtual machines to support highly available SAP HANA installations, implement SUSE Linux Enterprise clustering, install SAP HANA, configure SAP HANA system replication, and test high availability scenarios.


outline

Module 1: Whiteboard Design Session – SAP HANA on Azure

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-On Lab – SAP HANA on Azure

Lessons

  • Provision Azure infrastructure
  • Configure operating system on Azure VMs running Linux
  • Configure clustering on Azure VMs running Linux
  • Install SAP HANA
  • Configure SAP HANA replication
  • Configure cluster framework
  • Test the deployment

target_au

This SAP HANA on Azure training workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40519G: Microsoft Cloud Workshop: SAP NetWeaver on Azure
days1
seo_titleSAP NetWeaver on Azure Training - Microsoft Cloud Workshop | Insoft UK
seo_decIn this Microsoft Cloud Workshop, you will learn to deploy and configure SAP on Azure infrastructure and SAP NetWeaver deployment running on Azure.
seo_tkeySAP NetWeaver on Azure Training
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop (Course 40519G): SAP NetWeaver on Azure training, you will learn to deploy and configure SAP on Azure infrastructure and SAP NetWeaver deployment running on Azure infrastructure, including SAP NetWeaver ASCS and SAP NetWeaver database servers. Key takeaways are the Azure infrastructure solution components and the way they are put together to run SAP applications as well as the Solution architecture references.   See other Microsoft courses
objective

At the end of this SAP NetWeaver on Azure training workshop, you will be better able to design and deploy SAP running on Azure infrastructure as a service component and understand the proper configuration of SAP NetWeaver ASCS, database and application servers in Azure.


outline

Module 1: Whiteboard Design Session – SAP on AzureLessons

Review the customer case study
Call to action: Design a proof of concept solution
Call to action: Present the solution

Module 2: Hackathon – SAP on AzureLessons

Deploy the SAP on Azure infrastructure components
Configure the SAP NetWeaver ASCS servers (Part 1)
Configure SAP NetWeaver database servers
Configure SAP NetWeaver Application servers


target_au
pre_req

This SAP NetWeaver on Azure training workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop:


titleCourse 20345-2B: Designing and Deploying Microsoft Exchange Server 2016/2019
days5
seo_titleDesigning and Deploying Microsoft Exchange Server 2016/2019
seo_decThis Designing and Deploying Microsoft Exchange Server 2016/2019 course provides the skills to implement an Exchange Server messaging environment.
seo_tkeyMicrosoft Exchange Server
categoryexchange-server
vendorMicrosoft

techonogyInternet of Technology
overviewThis Designing and Deploying Microsoft Exchange Server 2016/2019 (20345-2B) course provides experienced Exchange Server administrators with the knowledge to design and implement an Exchange Server messaging environment. The course covers how to design and configure advanced components in an Exchange Server deployment such as site resiliency, advanced security, compliance, archiving and discovery solutions, coexistence with other Exchange organizations or Exchange Online, and migration from previous versions of Exchange server. The course also provides guidelines, best practices, and considerations that will help optimize Exchange Server deployments.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Plan for Exchange Server deployments.
  • Plan and deploy Exchange Server hardware, virtualization, mailbox databases, and public folders.
  • Plan message transport in Exchange Server.
  • Plan and deploy Client Access services in Exchange Server.
  • Design and implement a highly available Exchange Server environment.
  • Maintain Exchange Server by using Managed Availability and Desired State Configuration (DSC).
  • Plan for messaging security and design and implement Active Directory Rights Management Services (AD RMS) and Microsoft Azure RMS in Exchange Server.
  • Design and implement message retention and archiving.
  • Design and implement data loss prevention policies, In-Place Hold, and eDiscovery.
  • Design and implement messaging coexistence among Exchange Server organizations.
  • Plan and implement the upgrade from previous versions of Exchange Server to Exchange Server 2019.
  • Plan a hybrid Exchange deployment.

outline

Module 1: Planning Exchange Server deployments

This module explains the key features of Exchange Server and explains how to gather business requirements. It also explains how to plan for an Exchange Server deployment and the migration of Unified Messaging to Cloud Voicemail.

Lessons

  • New features in Exchange Server 2019
  • Gathering business requirements for an Exchange Server deployment
  • Planning for an Exchange Server deployment
  • Planning the migration of Unified Messaging to Cloud Voicemail

Lab: Planning Exchange Server 2019 deployments

  • Evaluating an existing messaging infrastructure
  • Identifying requirements
  • Discussion: Deployment design for Exchange Server 2019

After completing this module, students will be able to:

  • Describe the new features in Exchange Server 2019.
  • Describe how to gather business requirements for an Exchange Server deployment.
  • Plan an Exchange Server deployment.
  • Plan how to migrate Exchange Server 2016 Unified Messaging (UM) to Cloud Voicemail.

 

Module 2: Planning and deploying Exchange Server Mailbox services

This module explains how to plan and implement Exchange Server hardware, Exchange Server virtualization, Azure integration, and public folders.

Lessons

  • Planning Exchange Server hardware requirements
  • Planning Exchange Server for virtualization and Microsoft Azure integration
  • Planning and implementing public folders

Lab: Planning and implementing Exchange Server mailbox servers, databases, and public folders

  • Planning mailbox server configuration and location
  • Planning for mailbox databases
  • Implementing mailbox databases
  • Planning and implementing public folders

After completing this module, students will be able to:

  • Plan and implement Exchange Server hardware.
  • Plan for Exchange Server virtualization and Microsoft Azure integration.
  • Plan and implement public folders.

 

Module 3: Planning message transport

This module explains how to plan and implement mail routing internally as well as from and to the internet. This module also describes transport-related tasks in the organization.

Lessons

  • Designing message routing
  • Designing transport services
  • Designing the message-routing perimeter
  • Designing transport compliance

Lab: Planning message transport

  • Planning for a redundant and secure message transport
  • Planning for transport compliance
  • Implementing transport compliance

After completing this module, students will be able to:

  • Design message routing.
  • Design transport services.
  • Design external message routing.
  • Design and implement transport compliance.

 

Module 4: Planning and deploying client access

This module explains how to plan and implement Exchange Server clients, client access, Microsoft Office Online Server, and coexistence of Microsoft SharePoint with Exchange Server. It also explains the design and implementation of the external client access.

Lessons

  • Planning for Exchange Server clients
  • Planning for client access
  • Planning and implementing Office Online Server
  • Planning and implementing coexistence of SharePoint 2019 with Exchange Server 2019
  • Designing external client access

Lab: Planning and deploying client access solutions

  • Planning and configuring namespaces
  • Planning and configuring client access services options
  • Planning and deploying Office Online Server
  • Planning and implementing a reverse proxy

After completing this module, students will be able to:

  • Plan for Exchange Server clients.
  • Plan for client access.
  • Plan and implement Office Online Server.
  • Plan and implement SharePoint and with Exchange Server coexistence.
  • Design external client access.

 

Module 5: Designing and implementing high availability

This module explains how to plan and implement high availability for Exchange Server. It also explains how to plan for load balancing. Finally, it explains how to plan and implement site resilience.

Lessons

  • Planning high availability for Exchange Server
  • Planning for load balancing
  • Planning for site resilience

Lab: Designing and implementing high availability

  • Planning high availability and site resilience
  • Creating a site-resilient DAG
  • Validating site resilience
  • Creating a lagged database copy
  • Recovering data from a lagged database copy

After completing this module, students will be able to:

  • Plan high availability for an Exchange Server.
  • Plan for load balancing in an Exchange Server deployment.
  • Plan for site resilience in an Exchange Server deployment.

 

Module 6: Maintaining Exchange Server

This module explains how to maintain Exchange Server by using Managed Availability and DSC.

Lessons

  • Using Managed Availability to improve high availability
  • Implementing DSC

Lab: Maintaining Exchange Server

  • Using Windows PowerShell to investigate and configure Managed Availability
  • Implementing DSC

After completing this module, students will be able to:

  • Use Managed Availability to improve high availability.
  • Implement DSC.

 

Module 7: Designing messaging security

This module explains how to plan for messaging security, and how to design and implement AD RMS and Azure RMS in an Exchange Server organization.

Lessons

  • Planning messaging security
  • Designing and implementing AD RMS and Azure RMS

Lab: Designing messaging security

  • Planning messaging security
  • Implementing AD RMS
  • Integrating AD RMS with Exchange Server
  • Creating a message transport rule to protect email

After completing this module, students will be able to:

  • Plan messaging security.
  • Design and implement AD RMS and Azure RMS.

 

Module 8: Designing and implementing message retention and archiving

This module explains the purpose of archiving and messaging records management. It also explains how to design and implement In-Place archiving and message retention.

Lessons

  • Overview of archiving and messaging records management
  • Designing In-Place Archiving
  • Designing and implementing message retention

Lab: Designing and implementing message retention and archiving

  • Designing message retention and archiving
  • Implementing message retention and archiving

After completing this module, students will be able to:

  • Explain the purpose of archiving and messaging records management.
  • Design and implement In-Place archiving.
  • Design and implement message retention.

 

Module 9: Designing and implementing messaging compliance

This module explains how to design and implement data loss prevention policies, In-Place Hold, and In-Place eDiscovery.

Lessons

  • Designing and implementing data loss prevention policies
  • Designing and implementing In-Place Hold
  • Designing and implementing In-Place eDiscovery

Lab: Designing and implementing messaging compliance

  • Designing messaging compliance
  • Implementing data loss prevention
  • Implementing In-Place eDiscovery
  • Comparing messaging policy and compliance options

After completing this module, students will be able to:

  • Design and implement data loss prevention.
  • Design and implement In-Place Hold.
  • Design and implement In-Place eDiscovery.

 

Module 10: Designing and implementing messaging coexistence

This module explains how to design and implement federation. It also explains how to design coexistence between Exchange Server organizations. Finally, it explains how to design and implement cross-forest mailbox moves.

Lessons

  • Designing and implementing federation
  • Designing coexistence between Exchange organizations
  • Designing and implementing cross-forest mailbox moves

Lab: Implementing messaging coexistence

  • Implementing message-routing coexistence
  • Migrating user mailboxes

After completing this module, students will be able to:

  • Design and implement federation.
  • Design the coexistence between Exchange Server organizations.
  • Design and implement cross-forest mailbox moves.

 

Module 11: Upgrading to Exchange Server 2019

This module provides an overview of the options you have when choosing to implement Exchange Server 2019, and provides details on how to upgrade an existing Exchange Server 2013 or Exchange Server 2016 organization to Exchange Server 2019.

Lessons

  • Planning an upgrade from previous Exchange Server versions
  • Implementing the upgrade from previous Exchange Server versions

Lab: Upgrading from Exchange Server 2013 to Exchange Server 2019

  • Documenting the Exchange Server 2013 organization
  • Deploying Exchange Server 2019
  • Upgrading from Exchange Server 2013 to Exchange Server 2019
  • Removing Exchange Server 2013

After completing this module, students will be able to:

  • Plan an upgrade to Exchange Server 2019.
  • Implement the upgrade to Exchange Server 2019.

 

Module 12: Planning a hybrid Exchange Server deployment

This module explains the basics of a hybrid deployment and how to plan for authentication in a hybrid deployment. It also explains how to implement the Microsoft Azure Active Directory (Azure AD) Connect, a hybrid development, and advanced functionality for hybrid deployments.

Lessons

  • Basics of a hybrid deployment
  • Planning and implementing a hybrid deployment
  • Implementing Azure AD Connect
  • Implementing a hybrid deployment
  • Implementing advanced functionality for hybrid deployments

Lab: Planning a hybrid Exchange deployment

  • Creating a plan for hybrid Exchange deployment

After completing this module, students will be able to:

  • Explain the basics of a hybrid deployment.
  • Plan for authentication in a hybrid environment.
  • Implement Azure AD Connect.
  • Implement a hybrid deployment.
  • Implement advanced functionality for hybrid deployments.

target_au

The audience for this course includes IT professionals who are experienced messaging administrators, messaging architects, or consultants. This course is designed for people in an enterprise environment who are responsible for designing and deploying Exchange Server solutions, including environments that contain previous versions of Exchange Server or Exchange Online.


pre_req
Students taking this course are expected to have experience with Exchange Server 2019 or previous versions of Exchange Server.
In addition to their professional experience, students who attend this Designing and Deploying Microsoft Exchange Server 2016/2019 training should already have the following technical knowledge:
  • Attended course 20345-1B: Administering Microsoft Exchange Server 2016/2019 or have equivalent knowledge
  • Minimum of two years of experience working with any version of Exchange Server
  • Minimum of six months of experience working with Exchange Server 2013 or Exchange Server 2016
  • Minimum of two years of experience administering the Windows Server operating system, including Windows Server 2016 or Windows Server 2019
  • Minimum of two years of experience working with Active Directory Domain Services (AD DS)
  • Minimum of two years of experience working with name resolution, including Domain Name System (DNS)
  • Experience working with certificates, including public key infrastructure (PKI) certificates
  • Experience working with Windows PowerShell

titleCourse WS-050T00-A: Migrating Application Workloads to Azure
days2
seo_titleMigrating Application Workloads to Azure | Insoft Services
seo_decThe Migrating Application Workloads to Azure workshop teaches you how to migrate existing on-premises workloads and assets to the cloud.
seo_tkeyMigrating Application Workloads to Azure
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Migrating Application Workloads to Azure workshop teaches IT Professionals how to migrate existing on-premises workloads and assets to the cloud, specifically to the Microsoft Azure platform. Students learn how to assess and evaluate an existing on-premises environment in preparation for cloud migration. Students also learn how to monitor and optimize their Azure-based workloads to maximize return on investment (ROI), and use Azure services to protect and manage your virtual machines, applications, and data.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Identify the tools and services specific to each phase of the migration.
  • Identify the tools and services specific to each phase of the migration
  • Discover and assess on-premises workloads for migration to Azure
  • Obtain deeper profiling of an environment using app dependency mapping and assessment customizations
  • Perform an end-to-end migration of on-premises workloads to Azure using Azure Migrate
  • Replicate data from an on-premises datacenter to Azure or to a secondary site
  • Migrate data from existing data sources to Azure data platforms using the Database Migration Service
  • Secure and manage migrated workloads using Azure Security Center, Azure Backup, and Log Analytics
  • Ensure an effective business continuity strategy that includes high availability, disaster recovery
  • Back up and protect Azure IaaS virtual machines from any location using the Azure Backup Service
  • Define a recovery plan to ensure virtual machines failover properly before running a full failover

outline

Module 1: Planning and Assessing and Azure Migration
In this module, you’ll learn about the key business and technical drivers leading to cloud migration, the phases of an Azure migration and tools and services used for each phase. You will learn how to discover and assess your on-premises environments in preparation to migrate the appropriate workloads to Azure.

Lessons

  • Cloud Migration – Business Motivations, Goals and Outcomes
  • Discovery and Assessment

Lab: Discover and Assess On-Premises Resources for Migration

 

Module 2: Introduction to Data Migration

In this module, you’ll learn about solutions you can use when you need to securely send terabytes of data to Azure. You will learn about the Azure Data Box family of products with both online and offline transfer options. You will then learn about migrating an on-premises SQL Server 2008R2 database to Azure SQL Database Managed Instance (MI), using the Azure Database Migration Service (DMS).

Lessons

  • Azure Data Box
  • Database Migration

Lab: Migrate On-Premises SQL Server Database to Azure SQL Managed Instance

 

Module 3: Implementing Migration using Azure Migrate Services

In this module, you’ll learn how to prepare the on-premises infrastructure and the Azure components ahead of the planned migration. You’ll also learn how to perform and end to end migration using Azure Migrate Services.

Lessons

  • Overview of Azure Migrate Server Migration
  • VMware – Agentless Migration
  • VMware – Agent-based Migration
  • Securing Migrated Workloads
  • Datacenter Migration using Microsoft Migration Factory

Lab: Replicate Virtual Machines to Azure

 

Module 4: Backup and Disaster Recovery in Azure

In this module, you’ll learn about the key components of a business continuity strategy and what is required for a highly available solution. You will also learn how to implement Azure IaaS virtual machine back up using the Azure Backup service. Additionally, you will learn how to replicate Azure VMs to any other Azure location using Azure Site Recovery.

Lessons

  • Azure Backup Overview
  • Implementing Azure IaaS Backup
  • Azure to Azure Site Recovery
  • Application Disaster Recovery

target_au

This workshop is for IT Administrators and staff who need to plan, implement and manage migrations of on-premises resources to Azure, or to replicate Azure virtual machines to other Azure locations. They take business requests from workload owners to migrate workloads to the cloud in order to take advantage of the benefits that a cloud-enabled strategy provides over a traditional datacenter approach. This role requires communicating and coordinating with different individuals within an organization’s IT department and business groups, as well as vendors.


pre_req
  • IT Administrators start this role with experience in operating systems, virtualization, cloud infrastructure, storage structures, and networking. In addition, IT administrators should have experience or equivalent knowledge in administering an IaaS Azure infrastructure.
  • Understanding of on-premises virtualization technologies, including VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
  • Understanding of resilience and disaster recovery, including backup and restore operations.
  • Familiarity with using Azure, including the Azure portal, Cloud Shell, Azure PowerShell, CLI and ARM template.
  • Understanding of Azure Active Directory and cloud identity management.
  • Understanding of management of subscriptions, users, groups, and billing, and Azure policies.

titleCourse MS-700T00-A: Managing Microsoft Teams
days5
seo_titleManaging Microsoft Teams - Microsoft 365 | Insoft Services
seo_decThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role.
seo_tkeyManaging Microsoft Teams
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. Microsoft Teams admins configure, deploy, and manage Office 365 workloads for Microsoft Teams that focus on efficient and effective collaboration and communication in an enterprise environment. This course covers six central elements - Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the environment for a Microsoft Teams deployment, deploying and managing teams, managing collaboration and managing communication in Microsoft Teams.   See other Microsoft courses
objective

By actively participating in this course, you will learn about the following:

  • What is Microsoft Teams and how the components work together
  • How to implement Governance, Security and Compliance for Microsoft Teams
  • How to prepare an organizations environment for a Microsoft Teams deployment
  • How to deploy and manage teams
  • Ways of managing collaboration in Microsoft Teams
  • Techniques to manage and troubleshoot communication in Microsoft Teams

outline

Module 1: Microsoft Teams Overview

In Microsoft Teams overview, you will get an overview of Microsoft Teams including Teams architecture and related Office 365 workloads. You will be provided with an overview of security and compliance in Microsoft Teams and finally get an overview of how to manage Microsoft Teams.

Lessons

  • Overview of Microsoft Teams
  • Overview of security and compliance in Microsoft Teams
  • Overview of managing Microsoft Teams

Lab: Manage roles and create teams

  • Prepare team roles and licenses
  • Create a new team

 

Module 2: Implement Microsoft Teams Governance, Security and Compliance

In implementing governance, security and compliance for Microsoft Teams, you will plan and configure governance for Office 365 groups including expiration and naming policies. Then you will implement security by configuring conditional access, MFA or Threat Management for Microsoft Teams. Finally, you will implement compliance for Teams by using DLP policies, eDiscovery cases or supervision policies.

Lessons

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing Security for Microsoft Teams
  • Implementing Compliance for Microsoft Teams

Lab: Configure Security and Compliance for teams and content

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing security for Microsoft Teams
  • Implementing compliance for Microsoft Teams

 

Module 3: Prepare the environment for a Microsoft Teams deployment

In preparing the environment for a Microsoft Teams deployment, you plan an upgrade from Skype for Business to Microsoft Teams by evaluating upgrade paths with coexistence and upgrade modes, manage meeting migrations and configuring coexistence and upgrade settings. Then you plan and configure network settings for Microsoft Teams, and finally, you will deploy and manage Microsoft Teams endpoints.

Lessons

  • Upgrade from Skype for Business to Microsoft Teams
  • Plan and configure network settings for Microsoft Teams
  • Deploy and Manage Microsoft Teams endpoints

Lab: Environment preparation for Teams

  • Calculate networking capabilities
  • Evaluate configuration profiles
  • Provide team resources

 

Module 4: Deploy and manage teams

In deploying and managing teams, you will learn how to create and manage teams, manage membership and access for both, internal and external users.

Lessons

  • Create and manage teams
  • Manage membership
  • Manage access for external users

Lab: Manage teams

  • Manage team resources
  • Manage sharing and access

 

Module 5: Manage collaboration in Microsoft Teams

In managing collaboration in Microsoft Teams, you will manage chat and collaboration experiences such as team settings or private channel creation policies. Finally, you will manage settings for Teams apps such as app setup policies, Apps, bots & connectors in Microsoft Teams or publish a custom app in Microsoft Teams.

Lessons

  • Manage chat and collaboration experiences
  • Manage settings for Teams apps

Lab: Modify collaboration settings for Teams

  • Configure channel and message policies
  • Manage app settings for team

 

Module 6: Manage communication in Microsoft Teams

This course concludes with managing communication in Microsoft Teams. You will learn how to manage Live event and meetings experiences, manage phone numbers or Phone System for Microsoft Teams and finally how to troubleshoot audio, video, and client issues.

Lessons

  • Manage Live event and meetings experiences
  • Manage phone numbers
  • Manage Phone System for Microsoft Teams
  • Troubleshoot audio, video, and client issues

Lab: Modify communication settings for Teams

  • Configure meeting policies
  • Manage Phone System for Microsoft Teams
  • Troubleshooting audio, video and client issues

target_au

Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam.


pre_req
  • A proficient understanding of basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices, including using PowerShell.

titleCourse MS-101T00-A: Microsoft 365 Mobility and Security
days5
seo_titleMicrosoft 365 Mobility and Security Training Course | Insoft Services
seo_decThis Microsoft 365 Mobility and Security (MS-101T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkeyMicrosoft 365 Mobility and Security
categorymicrosoft-365
vendorMicrosoft

techonogyIT Services Management
overviewThis Microsoft 365 Mobility and Security (MS-101T00-A) course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links.   See other Microsoft courses
objective

By actively participating in this course, you will learn about the following:

  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence
  • Data Governance in Microsoft 365
  • Archiving and Retention in Office 365
  • Data Governance in Microsoft 365 Intelligence
  • Search and Investigations
  • Device Management
  • Windows 10 Deployment Strategies
  • Mobile Device Management

outline

Module 1: Introduction to Microsoft 365 Security Metrics Lessons

  • Threat Vectors and Data Breaches
  • Security Solutions in Microsoft 365
  • Introduction to the Secure Score
  • Introduction to Azure Active Directory Identity Protection

 

Module 2: Managing Your Microsoft 365 Security Services Lessons

  • Introduction to Exchange Online Protection
  • Introduction to Advanced Threat Protection
  • Managing Safe Attachments
  • Managing Safe Links
  • Monitoring and Reports

 

Module 3: Lab 1 – Manage Microsoft 365 Security Services

Lab: Manage Microsoft 365 Security Services

  • Exercise 1 – Set up a Microsoft 365 Trial Tenant
  • Exercise 2 – Implement an ATP Safe Links policy and Safe Attachment policy

 

Module 4: Microsoft 365 Threat Intelligence Lessons

  • Overview of Microsoft 365 Threat Intelligence
  • Using the Security Dashboard
  • Configuring Advanced Threat Analytics
  • Implementing Your Cloud Application Security

 

Module 5: Lab 2 – Implement Alert Notifications Using the Security Dashboard

Lab: Implement Alert Notifications Using the Security Dashboard

  • Exercise 1 – Prepare for implementing Alert Policies
  • Exercise 2 – Implement Security Alert Notifications
  • Exercise 3 – Implement Group Alerts
  • Exercise 4 – Implement eDiscovery Alerts

 

Module 6: Introduction to Data Governance in Microsoft 365 Lessons

  • Introduction to Archiving in Microsoft 365
  • Introduction to Retention in Microsoft 365
  • Introduction to Information Rights Management
  • Introduction to Secure Multipurpose Internet Mail Extension
  • Introduction to Office 365 Message Encryption
  • Introduction to Data Loss Prevention

 

Module 7: Archiving and Retention in Office 365 Lessons

  • In-Place Records Management in SharePoint
  • Archiving and Retention in Exchange
  • Retention Policies in the SCC

 

Module 8: Lab 3 – Implement Archiving and Retention

Lab: Implement Archiving and Retention

  • Exercise 1 – Initialize Compliance in Your Organization
  • Exercise 2 – Configure Retention Tags and Policies
  • Exercise 3 – Implement Retention Policies

 

Module 9: Implementing Data Governance in Microsoft 365 Intelligence Lessons

  • Planning Your Security and Compliance Needs
  • Building Ethical Walls in Exchange Online
  • Creating a Simple DLP Policy from a Built-in Template
  • Creating a Custom DLP Policy
  • Creating a DLP Policy to Protect Documents
  • Working with Policy Tips

 

Module 10: Lab 4 – Implement DLP Policies

Lab: Implement DLP Policies

  • Exercise 1 – Manage DLP Policies
  • Exercise 2 – Test MRM and DLP Policies

 

Module 11: Managing Data Governance in Microsoft 365 Lessons

  • Managing Retention in Email
  • Troubleshooting Data Governance
  • Implementing Azure Information Protection
  • Implementing Advanced Features of AIP
  • Implementing Windows Information Protection

 

Module 12: Lab 5 – Implement AIP and WIP

Lab: Implement AIP and WIP

  • Exercise 1 – Implement Azure Information Protection
  • Exercise 2 – Implement Windows Information Protection

 

Module 13: Managing Search and Investigations Lessons

  • Searching for Content in the Security and Compliance Center
  • Auditing Log Investigations
  • Managing Advanced eDiscovery

 

Module 14: Lab 6 – Manage Search and Investigations

Lab: Manage Search and Investigations

  • Exercise 1 – Investigate Your Microsoft 365 Data
  • Exercise 2 – Configure and Deploy a Data Subject Request

 

Module 15: Planning for Device Management Lessons

  • Introduction to Co-management
  • Preparing Your Windows 10 Devices for Co-management
  • Transitioning from Configuration Manager to Intune
  • Introduction to Microsoft Store for Business
  • Planning for Mobile Application Management

 

Module 16: Lab 7 – Implement the Microsoft Store for Business

Lab: Implement the Microsoft Store for Business

  • Exercise 1 – Configure the Microsoft Store for Business
  • Exercise 2 – Manage the Microsoft Store for Business

 

Module 17: Planning Your Windows 10 Deployment Strategy Lessons

  • Windows 10 Deployment Scenarios
  • Implementing Windows Autopilot
  • Planning Your Windows 10 Subscription Activation Strategy
  • Resolving Windows 10 Upgrade Errors
  • Introduction to Windows Analytics

 

Module 18: Implementing Mobile Device Management Lessons

  • Planning a Mobile Device Management
  • Deploying Mobile Device Management
  • Enrolling Devices to MDM
  • Managing Device Compliance

 

Module 19: Lab 8 – Manage Devices with Intune

Lab: Manage Devices with Intune

  • Exercise 1 – Enable Device Management
  • Exercise 2 – Configure Azure AD for Intune
  • Exercise 3 – Create Intune Policies
  • Exercise 4 – Enroll a Windows 10 Device
  • Exercise 5 – Manage and Monitor a Device in Intune

target_au

This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleCourse MS-100T00-A: Microsoft 365 Identity and Services
days5
seo_titleMicrosoft 365 Identity and Services Training Courses | Insoft Services
seo_decThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkeyMicrosoft 365 Identity and Services
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management. In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management.   See other Microsoft courses
objective

By actively participating in this course, you will learn about the following:

  • Designing, configuring, and managing your Microsoft 365 tenant
  • Office 365 product functionality
  • Configuring Office 365
  • Managing Office 365 ProPlus deployments
  • Planning and implementing identity synchronization
  • Implementing application and external access

outline

Module 1: Designing Your Microsoft 365 Tenant

Lessons

  • Planning Microsoft 365 in your On-premises Infrastructure
  • Planning Your Identity and Authentication Solution
  • Planning Your Service Setup
  • Planning Your Hybrid Environment
  • Planning Your Migration to Office 365

 

Module 2: Configuring Your Microsoft 365 Tenant

Lessons

  • Planning  Your Microsoft 365 Experience
  • Configuring  Your Microsoft 365 Experience
  • Managing User Accounts and Licenses in Microsoft 365
  • Managing Security Groups in Microsoft 365
  • Implementing Your Domain Services
  • Leveraging FastTrack and Partner Services

 

Module 3: Lab 1 – Configuring your Microsoft 365 Tenant

Lab: Configuring your Microsoft 365 Tenant

  • Exercise 1 – Set up a Microsoft 365 Trial Tenant

 

Module 4: Managing Your Microsoft 365 Tenant

Lessons

  • Configuring Tenant Roles
  • Managing Tenant Health and Services

 

Module 5: Lab 2 – Managing your Microsoft 365 Tenant

Lab: Managing your Microsoft 365 Tenant

  • Exercise 1 – Manage Administration Delegation
  • Exercise 2 – Configure Office 365 Message Encryption (OME)
  • Exercise 3 – Monitor and Troubleshoot Office 365

 

Module 6: Office 365 Overview

Lessons

  • Exchange Online Overview
  • SharePoint Online Overview
  • Teams Overview
  • Additional Resources Overview
  • Device Management Overview

 

Module 7: Lab 3 – Office 365 Overview

Lab: Office 365 Overview

  • Exercise 1 – Exchange Online Overview
  • Exercise 2 – SharePoint Online Overview
  • Exercise 3 – Teams Overview

 

Module 8: Configuring  Office 365

Lessons

  • Office 365 Client Overview
  • Configuring Office Client Connectivity to Office 365

 

Module 9: Managing Office 365 ProPlus Deployments

Lessons

  • Managing User-Driven Client Installations
  • Managing Centralized Office 365 ProPlus Deployments
  • Configuring Office Telemetry
  • Configuring Microsoft Analytics

 

Module 10: Lab 4 – Managing Office 365 ProPlus installations

Lab: Managing Office 365 ProPlus installations

  • Exercise 1 – Prepare an Office 365 ProPlus Managed Installation
  • Exercise 2 – Manage a Centralized Office 365 ProPlus Installation
  • Exercise 3 – Deploy and Configure Office Telemetry Components

 

Module 11: Planning and Implementing Identity Synchronization

Lessons

  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities
  • Password Management in Microsoft 365

 

Module 12: Lab 5 – Implementing Identity Synchronization

Lab: Implementing Identity Synchronization

  • Exercise 1 – Set up your organization for identity synchronization
  • Exercise 2 – Implement Identity Synchronization

 

Module 13: Implementing Application and External Access

Lessons

  • Implementing Applications in Azure AD
  • Configuring Azure AD App Proxy
  • Designing Solutions for External Access

target_au

This Microsoft 365 Identity and Services course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleCourse MS-030T00-A: Office 365 Administrator
days5
seo_titleOffice 365 Administrator Training Course | Insoft Services
seo_decThis Office 365 Administrator (MS-030T00-A) course focuses on skills required to set up an Office 365 tenant and its users.
seo_tkeyOffice 365 Administrator
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThis Office 365 Administrator (MS-030T00-A) course is a five-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in evaluating, planning, deploying, and operating Microsoft Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to set up an Office 365 tenant, including federation with existing user identities, and skills required to sustain an Office 365 tenant and its users.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Plan an Office 365 deployment, configure the Office 365 tenant and plan a pilot deployment.
  • Manage Office 365 users, groups, and licenses, and configure delegated administration.
  • Plan and configure client connectivity to Office 365.
  • Plan and configure directory synchronization between Microsoft Azure AD and on-premises AD DS.
  • Plan and implement the Office 365 ProPlus deployment.
  • Plan and manage Microsoft Exchange Online recipients and permissions.
  • Plan and configure Exchange Online services.
  • Plan and configure Microsoft Teams
  • Plan and configure Microsoft SharePoint Online.
  • Plan and configure Office 365 collaboration solutions.
  • Plan and configure the integration between Office 365 and Microsoft Azure Information Protection.
  • Monitor and review Office 365 services, and troubleshoot Office 365 issues.
  • Plan and implement identity federation between on-premises AD DS and Azure AD.

outline

Module 1: Planning and provisioning Office 365

This module reviews the features of Office 365 and identifies recent improvements to the service, and describes the process of provisioning an Office 365 tenant. This module also identifies the challenges in deploying Office 365 and the benefits of the Microsoft FastTrack for Office 365 approach, as compared to the traditional plan, prepare, and migrate deployment process.

Lessons

  • Overview of Office 365
  • Provisioning an Office 365 tenant
  • Planning a pilot deployment

Lab: Provisioning Office 365

  • Configuring an Office 365 tenant
  • Configuring a custom domain
  • Exploring the Office 365 administrator interfaces

After completing this module, students will be able to:

  • Describe the features and benefits of Office 365.
  • Provision of new tenant accounts.
  • Plan a pilot deployment of Office 365.

 

Module 2: Managing Office 365 users and groups

This module explains how to manage users, groups, and licenses, and configure administrative access by using the Office 365 console and the Windows PowerShell command-line interface. This module also explains how to manage user passwords and configure multi-factor authentication.

Lessons

  • Managing user accounts and licenses
  • Managing passwords and authentication
  • Managing security groups in Office 365
  • Managing Office 365 users and groups with Windows PowerShell
  • Configuring administrative access

Lab: Managing Office 365 users and passwords

  • Managing Office 365 users and licenses by using the Microsoft 365 admin centre
  • Managing Office 365 password policies

Lab: Managing Office 365 groups and administration

  • Managing Office 365 groups
  • Managing Office 365 users and groups by using Windows PowerShell
  • Configuring service administrators

After completing this module, students will be able to:

  • Manage user accounts and licenses by using the Microsoft 365 admin centre.
  • Manage passwords and authentication.
  • Manage security and distribution groups by using the Microsoft 365 admin centre.
  • Manage Office 365 users and groups by using Windows PowerShell.
  • Configure administrative access.

 

Module 3: Configuring client connectivity to Microsoft Office 365

This module covers the different types of client software that you can use to connect to Office 365. It also explains the infrastructure requirements that the clients need to connect to Office 365, in addition to how to configure different types of Office 365 clients.

Lessons

  • Planning for Office 365 clients
  • Planning connectivity for Office 365 clients
  • Configuring connectivity for Office 365 clients

Lab: Configuring client connectivity to Office 365

  • Configuring DNS records for Office 365 clients
  • Running the Office 365 connectivity analyzer tools
  • Connecting Office apps

After completing this module, students will be able to:

  • Plan for the deployment of Office 365 clients.
  • Plan for, and troubleshoot, connectivity for Office 365 clients.
  • Configure connectivity for Office 365 clients.

 

Module 4: Planning and configuring directory synchronization

This module explains how to plan, prepare, and implement directory synchronization as a methodology for user and group management in an Office 365 deployment. It explains how to prepare an on-premises environment, and install and configure directory synchronization. It also explains how to manage Office 365 identities after you enable directory synchronization.

Lessons

  • Planning and preparing for directory synchronization
  • Implementing directory synchronization by using Azure AD Connect
  • Managing Office 365 identities with directory synchronization

Lab: Configuring directory synchronization

  • Preparing for directory synchronization
  • Configuring directory synchronization
  • Managing Active Directory users and groups

After completing this module, students will be able to:

  • Plan and prepare for directory synchronization.
  • Implement directory synchronization by using Microsoft Azure Active Directory Connect (AD Connect).
  • Manage Office 365 identities with directory synchronization.

 

Module 5: Planning and deploying Office 365 ProPlus

This module explains how to plan for client deployment and ensure that users receive the tools that they need to interact with Office 365 effectively. It also explains the planning process, how to make Office 365 ProPlus directly available to end-users, and how to deploy it as a managed package. Finally, it describes how to set up Office telemetry so that administrators can track how users are interacting with Microsoft Office.

Lessons

  • Overview of Office 365 ProPlus
  • Planning and managing user-driven Office 365 ProPlus deployments
  • Planning and managing centralized deployments of Office 365 ProPlus
  • Office Telemetry and reporting

Lab: Managing Office 365 ProPlus installations

  • Preparing an Office 365 ProPlus managed installation
  • Managing user-driven Office 365 ProPlus installations
  • Managing centralized Office 365 ProPlus installations

After completing this module, students will be able to:

  • Describe Office 365 ProPlus.
  • Plan and manage user-driven Office 365 ProPlus deployments.
  • Plan and manage centralized deployments for Office 365 ProPlus.
  • Describe Office Telemetry and reporting.

 

Module 6: Planning and managing Exchange Online recipients and permissions

This module describes Exchange Online and explains how to create and manage recipient objects, and how to manage and delegate Exchange security.

Lessons

  • Overview of Exchange Online
  • Managing Exchange Online recipients
  • Planning and configuring Exchange Online permissions

Lab: Managing Exchange Online recipients and permissions

  • Configuring Exchange Online recipients
  • Configuring role-based access control

After completing this module, students will be able to:

  • Describe Exchange Online.
  • Manage Exchange Online recipients.
  • Plan and configure delegated administration.

 

Module 7: Planning and configuring Exchange Online services

This module explains how to plan for and configure email flow, in addition to anti-malware and anti-spam settings in Office 365. It also explains how to plan and configure policies for Exchange clients. Additionally, it describes how to plan and configure a migration to Exchange Online.

Lessons

  • Planning and configuring email flow in Office 365
  • Planning and configuring email protection in Office 365
  • Planning and configuring client access policies
  • Migrating to Exchange Online

Lab: Configuring message transport in Exchange Online

  • Configuring message transport settings

Lab: Configuring email protection and client policies

  • Configuring email protection
  • Configuring client access policies

After completing this module, students will be able to:

  • Plan and configure email flow in Office 365.
  • Plan and configure anti-malware and anti-spam settings in Office 365.
  • Plan and configure policies for Exchange clients.
  • Plan and configure a migration to Exchange Online.

 

Module 8: Planning and deploying Microsoft Teams

This module explains how to plan and configure Teams. It explains how to configure Teams user settings and clients, and plan for voice integration. It also explains how to transition from Skype for Business to Teams and how Teams integrates with other Office 365 services.

Lessons

  • Teams Explained
  • Deploying Teams
  • Authentication and Access
  • Transitioning Skype For Business to Microsoft Teams
  • Management and Reporting

Lab: Teams Overview

  • Manage Meeting Settings
  • Manage Messaging Policies
  • Manage Voice Settings
  • Manage Org-Wide Settings

After completing this module, students will be able to:

  • Plan and Configure Teams
  • Configure teams user settings and channels
  • manage Voice intergration
  • Configure Organisation-wide settings in teams

 

Module 9: Planning and configuring SharePoint Online

This module describes how to configure SharePoint Online services. It explains how to plan and configure SharePoint site collections and external user sharing. It also provides a brief overview of additional portals, such as the video portal.

Lessons

  • Configuring SharePoint Online services
  • Planning and configuring SharePoint Online site collections
  • Planning and configuring external user sharing

Lab: Configuring SharePoint Online

  • Configuring SharePoint Online settings
  • Creating and configuring SharePoint Online site collections
  • Configuring and verifying external user sharing

After completing this module, students will be able to:

  • Configure SharePoint Online services.
  • Plan and configure SharePoint Online site collections.
  • Plan and configure external user sharing.

 

Module 10: Planning and configuring an Office 365 collaboration solution

This module describes how to enable and configure Yammer Enterprise. It also explains how to configure OneDrive for Business and Office 365 groups.

Lessons

  • Planning and managing Yammer Enterprise
  • Planning and configuring OneDrive for Business
  • Configuring Office 365 groups

Lab: Planning and configuring an Office 365 collaboration solution

  • Configuring Yammer Enterprise
  • Configuring OneDrive for Business
  • Configuring Office 365 groups

After completing this module, students will be able to:

  • Enable and configure Yammer Enterprise.
  • Enable and configure Yammer Enterprise.
  • Configure Office 365 groups.

 

Module 11: Planning and configuring security and compliance in Office 365

This module describes the compliance features in Office 365 and how to manage them. It explains how to plan and configure Azure Information Protection. Additionally, it explains the security features in Office 365.

Lessons

  • Overview of the compliance features in Office 365
  • Planning and configuring Azure Information Protection in Office 365
  • Managing the compliance features in Office 365

Lab: Configuring Rights Management and compliance

  • Configuring Rights Management in Office 365
  • Configuring compliance features

After completing this module, students will be able to:

  • Describe the compliance features in Office 365.
  • Configure Azure Information Protection in Office 365.
  • Manage the compliance features in Office 365

 

Module 12: Monitoring and troubleshooting Microsoft Office 365

This module explains how to troubleshoot issues with Office 365 connectivity and services, and how to monitor Office 365 service health.

Lessons

  • Troubleshooting Office 365
  • Monitoring Office 365 service health

Lab: Monitoring and troubleshooting Office 365

  • Monitoring Office 365
  • Monitoring service health and analyzing reports

After completing this module, students will be able to:

  • Troubleshoot Office 365 connectivity and service issues.
  • Monitor Office 365 service health.

target_au

This course is intended for IT professionals who are responsible for planning, configuring, and managing an Office 365 environment. Students who attend this course are expected to have a fairly broad understanding of several on-premises technologies such as Domain Name System (DNS) and Active Directory Domain Services (AD DS). In addition, they should have a general understanding of Microsoft Exchange Server, Microsoft Lync Server or Skype for Business Server, and Microsoft SharePoint Server.


pre_req

Before attending this course, students must have:

  • A minimum of two years of experience administering the Windows Server operating system, including Windows Server 2012 or later.
  • A minimum of one year of experience working with AD DS.
  • A minimum of one year of experience working with name resolution, including DNS.
  • Experience working with certificates, including public key infrastructure (PKI) certificates.
  • Experience working with Windows PowerShell.
  • Experience working with Exchange Server 2013 or later, Lync Server 2013 or Skype for Business Server 2015, and SharePoint Server 2013 or later is beneficial, but not required.

titleCourse MD-101T00-A: Managing Modern Desktops
days5
seo_titleManaging Modern Desktops Training | Insoft Services
seo_decIn the Managing Modern Desktops (MD-101T00-A) course, you will be introduced to key components of modern management and co-management strategies.
seo_tkeyManaging Modern Desktops
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Managing Modern Desktops (MD-101T00-A) course, students will learn how to plan and implement an operating system deployment strategy using modern deployment methods, as well as how to implement an update strategy. Students will be introduced to key components of modern management and co-management strategies. This course also covers what it takes to incorporate Microsoft Intune into your organization. Students will also learn about methods for deployment and management of apps and browser-based applications. Students will be introduced to the key concepts of security in modern management including authentication, identities, access, and compliance policies. Students will be introduced to technologies such as Azure Active Directory, Azure Information Protection and Windows Defender Advanced Threat Protection, as well as how to leverage them to protect devices and data.   See other Microsoft courses
objective

After completing this course, learners should be able to:

  • Plan, develop, and implement an Operating System deployment, upgrade, and update strategy.
  • Understand the benefits and methods of co-management strategies.
  • Plan and implement device enrollment and configuration.
  •  Manage and deploy applications and plan a mobile application management strategy.
  •  Manage users and authentication using Azure AD and Active Directory DS.
  •  Describe and implement methods used to protect devices and data.

outline

Module 1: Planning an Operating System Deployment Strategy

This module explains how to plan and implement a deployment strategy. Students will learn about the concepts of supporting the desktop through its entire lifecycle. This module also covers assessing an existing environment and the tools used to prepare a deployment strategy. Finally, students will be introduced to the tools and strategies used for desktop deployment.

Lessons

  • The Enterprise Desktop
  • Assessing Deployment Readiness
  • Deployment Tools & Strategies

Lab: Practice Lab – Planning Windows 10 deployment

After completing this module, students will be able to:
  • Describe the enterprise desktop lifecycle.
  • Describe how to assess an existing environment.
  • Describe methods for mitigating deployment blockers.
  • Describe the different tools and methods for deployment.

 

Module 2: Implementing Windows 10

This module covers the modern methods of Windows deployment used in common scenarios such as upgrading and migrating to Windows 10, as well as deploying new devices and refreshing existing devices. Students will also learn about alternate methods of OS deployment as well as considerations when choosing methods of deployment.

Lessons

  • Upgrading Devices to Windows 10
  • Deploying New Devices and Refreshing
  • Migrating Devices to Windows 10
  • Alternate Deployment Methods
  • Imaging Considerations

Lab: Practice Lab – Implementing Windows 10

  • Creating and deploying the provisioning package
  • Migrating user settings
  • Deploying Windows 10 with AutoPilot

After completing this course, learners should be able to:

  • Develop an Operating System deployment and upgrade strategy.
  • Understand the different methods of deployment.
  • Understand which scenarios on-premise and cloud-based solutions can be used for.
  • Deploy and migrate desktops to Windows 10.

 

Module 3: Managing Updates for Windows 10

This module covers managing updates to Windows. This module introduces the servicing options for Windows 10. Students will learn the different methods for deploying updates and how to configure windows update policies. Finally, students will learn how to ensure and monitor update compliance using Windows Analytics.

Lessons

  • Updating Windows 10
  • Windows Update for Business
  • Introduction to Windows Analytics

Lab: Practice Lab – Managing Updates for Windows 10

  • Manually configuring Windows Update settings
  • Configuring Windows Update by using GPOs

After completing this module, students will be able to:

  • Describe the Windows 10 servicing channels.
  • Configure a Windows update policy using Group Policy settings.
  • Configure Windows Update for Business to deploy OS updates.
  • Use Windows Analytics to assess upgrade readiness and update compliance.

 

Module 4: Device Enrollment

In this module, students will examine the benefits and prerequisites for co-management and learn how to plan for it. This module will also cover Azure AD join and will be introduced to Microsoft Intune, as well as learn how to configure policies for enrolling devices. The module will conclude with an overview of device inventory in Intune and reporting using the Intune console, Power BI and Microsoft Graph.

Lessons

  • Device management options
  • Microsoft Intune Overview
  • Manage Intune device enrollment and inventory
  • Managing devices with Intune

Lab: Practice Lab – Device Enrollment and Management

After completing this module, students will be able to:

  • Describe the benefits and methods for migrating to co-management.
  • Deploy an MDM with Microsoft Intune.
  • Configure device enrollment.
  • Enrol desktop and mobile devices in Windows Intune.
  • Configure and downloads inventory reports.

 

Module 5: Configuring Profiles

This module dives deeper into Intune device profiles including the types of device profiles and the difference between built-in and custom profiles. The student will learn about assigning profiles to Azure AD groups and monitoring devices and profiles in Intune. The module will conclude with an overview of using Windows Analytics for health and compliance reporting.

Lessons

  • Configuring device profiles
  • Managing user profiles
  • Monitoring devices

Lab: Practice Lab – Managing profiles

After completing this module, students will be able to:
  • Describe the types of device profiles.
  • Create and assign device profiles.
  • Configure the user profile and folder redirection.
  • Monitor and report on devices using Intune and Windows Analytics.

 

Module 6: Application Management

In this module, students learn about application management on-premise and cloud-based solutions. This module will cover how to manage Office 365 ProPlus deployments in Intune as well as how to manage apps on non-enrolled devices. The module will conclude with an overview of Enterprise Mode with Internet Explorer and Microsoft Edge and tracking your installed applications, licenses, and assigned apps using Intune.

Lessons

  • Implement Mobile Application Management (MAM)
  • Deploying and updating applications
  • Administering applications

Lab: Practice Lab – Managing Applications

After completing this module, students will be able to:

  • Describe the methods for application management.
  • Deploy applications using Intune and Group Policy.
  • Configure Microsoft Store for Business.
  • Deploy Office365 ProPlus using Intune.
  • Manage and report application inventory and licenses.

 

Module 7: Managing Authentication in Azure AD

In this module, students will are introduced to the concept of a directory in the cloud with Azure AD. Students will learn the similarities and differences between Azure AD and Active Directory DS and how to synchronize between the two. Students will explore identity management in Azure AD and learn about identity protection using Windows Hello for Business, as well as Azure AD Identity Protection and multi-factor authentication.

Lessons

  • Azure AD Overview
  • Managing identities in Azure AD
  • Protecting identities in Azure AD
  • Managing device authentication

Lab: Practice Lab – Managing objects and authentication in Azure AD

After completing this module, students will be able to:
  • Describe the capabilities of Azure AD.
  • Manage users using Azure AD with Active Directory DS.
  • Implement Windows Hello for Business.
  • Join devices to Azure AD.

 

Module 8: Managing Device Access and Compliance

In this module, students will be introduced to managing device security. The module will cover securely accessing corporate resources and introduce concepts such as Always On VPN and remote connectivity in Windows 10. Students will learn how to create and deploy compliance policies and use compliance policies for conditional access. The module concludes with monitoring devices enrolled in Intune.

Lessons

  • Microsoft Intune Overview
  • Implement device compliance policies

Lab: Practice Lab – Managing Access and Compliance

After completing this module, students will be able to:

  • Describe methods of enabling access from external networks.
  • Deploy compliance and conditional access policies.
  • Use Intune to monitor device compliance.

 

Module 9: Managing Security

In this module, students will learn about data protection. Topics will include Windows & Azure Information Protection, and various encryption technologies supported in Windows 10. This module also covers key capabilities of Windows Defender Advanced Threat Protection and how to implement these capabilities on devices in your organization. The module concludes using Windows Defender and using functionalities such as antivirus, firewall and Credential Guard.

Lessons

  • Implement device data protection
  • Managing Windows Defender ATP
  • Managing Windows Defender in Windows 10

Lab: Practice Lab – Managing Security in Windows 10

After completing this module, students will be able to:

  • Describe the methods of protecting device data.
  • Describe the capabilities and benefits of Windows ATP.
  • Deploy and manage settings for Windows Defender clients.

target_au

The Modern Desktop Administrator deploys, configures, secures, manages, and monitors devices and client applications in an enterprise environment. Responsibilities include managing identity, access, policies, updates, and apps. The MDA collaborates with the M365 Enterprise Administrator to design and implement a device strategy that meets the business needs of a modern organization.

The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring and maintaining Windows 10 and non-Windows devices. The MDA role focuses on cloud services rather than on-premises management technologies.


pre_req

The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 10 and non-Windows devices. The MDA role focuses on cloud services rather than on-premises management technologies. It is recommended students complete course MD-100, Windows 10, prior to taking this course.


titleCourse MB-500T00-A: Microsoft Dynamics 365: Finance and Operations Apps Developer
days5
seo_titleCourse MB-500T00-A: Dynamics 365 Finance Operations Apps Developer
seo_decIn the Dynamics 365 Finance Operations Apps Developer (MB-500T00-A) course you will learn how to implement and extend apps to meet business requirements.
seo_tkeyMB-500T00-A
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365: Finance and Operations Apps Developer (MB-500T00-A) course is a five-day instructor-led training for developers. In this course, you will learn how to implement and extend applications to meet the requirements of the business. Candidates provide fully realized solutions by using standardized application coding patterns, extensible features, and external integrations.   See other Microsoft courses
objective
outline

Module 1: Overview & Architecture

  • Describe the Dynamics 365 ecosystem and major components of the Dynamics 365 Finance and Operations (FO) software, describe the architecture of D365FO, describe relevant D365FO design and deployment considerations
  • Lab: Development Environment configuration and Project/Model Creation

Module 2: Developer Tools

  • Manage system implementations by using Lifecycle Services, Customize D365FO by using Visual Studio, Manage source code and artefacts by using version control, Work with other development tools to complete tasks
  • Lab: Source Control using DevOps

Module 3: Solution Design

  • Determine the required application stack components and server architecture, Implement Application Lifecycle Management (ALM), Design a solution for D365FO
  • Lab: Data Structure Development

Module 4: AOT Elements

  • Create forms, Create and extend tables, Create Extended Data Types (EDT) and enumerations, Create classes and extend AOT elements
  • Lab: Metadata Extension & Development

Module 5: Code Development & Testing

  • Develop X++ code, Develop object-oriented code, Extend D365 FO functionality, Describe test framework and tools, Perform Unit Testing
  • Lab: Code Extension & Development

Module 6: Data Migration

  • Describe migration tools and methodologies, Plan Migration strategy, Prepare data for migration and migrate data
  • Lab: Data Export/Import using Data Entity
  • Lab: Recurring Data Transfer

 

Module 7: Frameworks

  • Implement D365 FO functionality
  • Lab: SysExtension Framework

Module 8: Integration

  • Identify Data integration patterns and scenarios, Implement Data integration concepts and solutions, Implement Recurring integrations, Integrate D365FO with Microsoft Azure, Troubleshoot integration errors, Implement the Data Management Package API
  • Lab: OData Integration
  • Lab: Logic App Integration
  • Lab: Calling an External Web Service

Module 9: Reporting

  • Describe the capabilities and limitations of reporting tools in D365FO, Design, create, and revise Dynamics Reports, Design, create, and revise Dynamics workspaces, Design, create and revise data sources that connect to data stores external to D365FO
  • Lab: Power BI reporting from F&O

Module 10: Security & Performance

  • Describe and implement performance tools and LCS Environment Monitoring tools, Implement role-based security policies and requirements, Apply fundamental performance optimization techniques, Optimize performance for batch processes, Optimize user interface performance, Enhance Integration performance, Optimize Report Performance
  • Lab: Async & Sandbox Functionality

target_au

The MB-500T00-A course is meant for Microsoft Dynamics 365 Finance and Operations Apps Developers.


pre_req
titleCourse MB-400T00-A: Microsoft Power Apps + Dynamics 365 Developer
days3
seo_titleCourse MB-400T00-A: Microsoft Power Apps + Dynamics 365 Developer
seo_decThe Microsoft Power Apps + Dynamics 365 Developer (MB-400T00-A) course provides you with the skills to help organisations optimize their operations.
seo_tkeyMB-400T00-A
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyIT Systems and Security
overviewThe Microsoft Power Apps + Dynamics 365 Developer (MB-400T00-A) course is a three-day training that provides you with the skills to use Microsoft Power Platform to help organisations optimize their operations by automating routine tasks and standardizing business best practices. A PowerApps Developer is a professional software developer who extends the Power Platform to solve complex business problems. In this course, PowerApps Developers will build on their existing knowledge of the Power Platform, Microsoft stack, and standard development tools and practices. PowerApps Developers will learn how to estimate effort and scope; validate requirements and design technical architecture; create data models; determine implementation tools, and document their technical design. Broad topics will include implementing user security and accessibility; managing environments; extending the Common Data Service; creating and using web resources, and working with plug-ins.   See other Microsoft courses
objective

After completing the MB-400T00-A course, students will be able to:

  • Create and document a data model
  • Implement entities and fields
  • Create and maintain solutions
  • Automate business processes
  • Extend the user experience
  • Develop integrations

outline

Module 1: Introduction to developing with the Power Platform

In this module, students will learn about developer resources and how to leverage them to extend the Power Platform.Lessons

  • Introduction to Power Platform developer resources
  • Use developer tools to extend the Power Platform
  • Introduction to extending the Power Platform

After completing this module, students will be able to:

  • Identify the functionality of developer tools
  • Use developer tools

 

Module 2: Extending the Power Platform Common Data Service

In this module, students will learn how and when to use plug-ins or other tools to extend the Common Data Service.Lessons

  • Introduction to Common Data Service for developers
  • Extend plug-ins

After completing this module, students will be able to:

  • Write a plug-in
  • Use a plug-in to extend the Common Data Service

 

Module 3: Extending the Power Platform user experience

In this module, students will learn how to leverage web resources and client script to extend the Power Platform user experience.Lessons

  • Introduction to web resources
  • Performing common actions with client script
  • Automate Business Process Flows with client script

After completing this module, students will be able to:

  • Use web resources
  • Write client script
  • Extend business process flows

target_au

A PowerApps Developer is responsible for designing, developing, securing, extending, and integrating a platform implementation. The developer implements components of the solution that include application enhancements, custom user experience, system integrations, data conversions, custom process automation, and custom visualizations.


pre_req
Before attending the MB-400T00-A course, students must have:
  • A basic understanding of the Power Platform.
  • Experience in software development against the Microsoft stack and Visual Studio.
  • Experience in administering solutions in Azure (preferred).

titleCourse MB-240T00-A: Microsoft Dynamics 365 Field Service
days3
seo_titleCourse MB-240T00-A: Microsoft Dynamics 365 Field Service
seo_decThe Dynamics 365 Field Service (MB-240T00-A) course provides skills to configure key components that are used to deliver Field Service and mobile solutions.
seo_tkeyDynamics 365 Field Service
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365 Field Service (MB-240T00-A) course provides is a three-day instructor-led training. This course will equip students with the skills necessary to identify and configure the key components that are used to deliver Field Service and mobile solutions. Key topics include identifying the organizational considerations that will drive configuration decisions and common configuration aspects. This course helps students better understand the bigger picture and end goals focused around implementations that aid in designing more efficient solutions that align with customer and organizational goals. The Dynamics 365 Field Service helps organisations better position themselves in the market by providing a variety of tools that assist in identifying and scheduling resources and managing workloads for mobile workers.   See other Microsoft courses
objective

After completing the MB-240T00-A course, you will be able to:

  • Identify the key components involved in Field Service Implementations.
  • Define the products and services that will be delivered to customers.
  • Determine which pricing options to use in specific scenarios.
  • Determine which resources are required.

outline

Module 1: Configure Field Service

In this introductory module, we will introduce key concepts of Dynamics 365 Field Service, including products, services, and tax codes.

  • Introduction to configuring Field Service
  • Defining products and services
  • Defining tax codes

After completing this module you will be able to:

  • Create and manage products and services
  • Configure tax codes for your organization

 

Module 2: Resource Scheduling Configuration

In this module, we will explore the concept of resource scheduling, and learn how to configure the system to schedule resources efficiently.

  • Mapping and location information
  • Configuring resource components
  • Defining account preferences

After completing this module you will be able to:

  • Configure resource scheduling for your organization
  • Define account preferences
  • Enable location mapping

 

Module 3: Defining and Configuring Bookable Resources

In this module, we will learn how to create and manage bookable resources, including resource pools and crews.

  • Defining bookable resources
  • Resource pools, crews and facilities

After completing this module you will be able to:

  • Define bookable resources
  • Create pools and crews
  • Manage facility records

 

Module 4: Configure Incidents

In this module, we will learn how incidents can improve the scheduling efficiency and consistency of your organization.

  • Creating an incident
  • Using service tasks

After completing this module you will be able to:

  • Create an incident for common service tasks
  • Schedule using incidents

 

Module 5: Inventory and Work Order Management

In this module, we will learn how to create and use work orders to schedule resources.

  • Configure Field Service work orders
  • Creating work orders
  • Managing work orders

After completing this module you will be able to:

  • Configure work orders
  • Schedule resources using work orders

 

Module 6: Field Service Agreements

In this module, we will introduce agreements, and learn how to configure them for your organization.

  • Using Field Service agreements
  • Set up bookings
  • Set up invoices

After completing this module you will be able to:

  • Use an agreement to schedule work orders
  • Generate invoices for customers

 

Module 7: Inventory and Purchasing

In this module, we will learn about the management of customer assets.

  • Manage customer assets
  • Manage inventory
  • Purchasing and returns

After completing this module you will be able to:

  • Create customer asset records
  • Manage inventory, purchasing and returns

 

Module 8: Field Service Mobile

In this module, we will learn how to use and configure the Field Service Mobile application for a mobile workforce.

  • Mobile client overview
  • Install and deploy Field Service mobile projects
  • Manage mobile projects
  • Deploy the mobile client

After completing this module you will be able to:

  • Manage mobile projects
  • Install and deploy the mobile client
  • Describe the value of the mobile app for a mobile workforce

 

Module 9: Universal Resource Scheduling

In this module, we will introduce the concept of Universal Resource Scheduling, and describe how it can be leveraged for an organization.

  • URS overview and configuration
  • Enabling entities for URS
  • Customize entities for URS

After completing this module you will be able to:

  • Describe Universal Resource Scheduling
  • Enable an entity for URS

 

Module 10: Managing Scheduling Options

In this module, we will learn how to use the schedule board to reschedule, substitute resources, and schedule pools and crews.

  • Using the schedule board
  • Schedule items
  • Rescheduling and substituting resources
  • Crew and pool scheduling

After completing this module you will be able to:

  • Configure and use the schedule board to schedule resources
  • Reschedule work orders
  • Substitute resources

 

Module 11: Customizing the Schedule Board

In this module, we will learn how to configure the schedule board to best meet the organization or scheduler’s needs.

  • Configure the board
  • Create additional schedule boards
  • Use views to enhance the schedule board
  • Configuring schedule board queries and filters
  • Working with requirement groups

After completing this module you will be able to:

  • Customize the schedule board
  • Create additional boards
  • Add views to a schedule board

 

Module 12: Advanced Scheduling Options

In this module, we will dive deeper into the options for customizing the scheduling of work orders based on unique business requirements.

  • Working with resource scheduling optimization
  • Defining optimization goals
  • Defining optimization scopes
  • Defining optimization profiles
  • Single resource scheduling

After completing this module you will be able to:

  • Define optimization for an organization
  • Schedule single resources

target_au

The MB-240T00-A course is designed for IT professionals with experience or interest in delivering Field Service solutions for large-scale customers.


pre_req
titleCourse MB-220T00-A: Microsoft Dynamics 365 Marketing
days4
seo_titleCourse MB-220T00-A: Microsoft Dynamics 365 Marketing
seo_decThe Microsoft Dynamics 365 Marketing (MB-220T00-A) course will review the marketing application configuration needed to drive business growth.
seo_tkeyDynamics 365 Marketing
categorymicrosoft-dynamics-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365 Marketing (MB-220T00-A) course will review the marketing application configuration needed to drive business growth. It will also dive into lead management, marketing forms and pages, segmentation, and email marketing messages. All these pieces are tied together through interactive customer journey design, including event and survey configuration.   See other Microsoft courses
objective

After completing this course, you will be able to:

  • Configure advanced settings
  • Manage marketing content, templates and integrations
  • Create and manage leads
  • Design and create marketing forms and pages
  • Create and manage segments
  • Set up and launch customer journeys
  • Create and manage events
  • Distribute and analyze surveys

outline

Module 1: Marketing Application Configuration

In this module, you will learn about advanced settings, marketing content, templates and integrations in Dynamics 365 for Marketing.

Lessons

  • Configure advanced settings
  • Manage marketing content and templates
  • Manage LinkedIn and Power BI integrations

After completing this module you will be able to:

  • Configure advanced settings such as organization, business management, and content.
  • Manage marketing content and templates.

 

Module 2: Leads

This module will review how to create, manage and score leads.

Lessons

  • Create and manage leads
  • Assess sales readiness

After completing this module you will be able to:

  • Create and manage leads.
  • Synchronize leads from LinkedIn.
  • Assess sales readiness using lead scoring models.

 

Module 3: Marketing Forms and Pages

This module will cover how to create marketing forms and pages.

Lessons

  • Create marketing forms
  • Create marketing pages
  • Manage internet marketing

After completing this module you will be able to:

  • Create marketing forms and embed them on marketing pages.
  • Create a marketing page.
  • Preview, validate and go live with a marketing page.
  • Create a marketing form and page templates.

 

Module 4: Segments and Lists

This module will cover how to manage segments, subscription centres, lists and double opt-in.

Lessons

  • Create and manage segments
  • Create and manage subscription centres
  • Double opt-in

After completing this module you will be able to:

  • Configure static and dynamic segments.
  • Create a subscription list.
  • Set up a subscription centre page.
  • Set up and enable a double opt-in process.

 

Module 5: Marketing Emails

This module will cover how to create email messages in Dynamics 365 Marketing.

Lessons

  • Create Email Message

After completing this module you will be able to:

  • Create and design email messages.
  • Preview, validate and go live with email messages.
  • Save an email message as a template.

 

Module 6: Customer Journeys

This module will review the customer journey creation process.

Lessons

  • Create customer journeys

After completing this module you will be able to:

  • Create a customer journey from a template.
  • Identify customer journey tiles and properties.
  • Validate and go live with a customer journey.
  • Create an account-based customer journey.
  • Understand the marketing calendar features.

 

Module 7: Insights

This module will demonstrate how to view, understand and manage customer insights.

Lessons

  • Marketing insights
  • Customer insights
  • Marketing execution insights
  • Lead management insights
  • Internet marketing insights

After completing this module you will be able to:

  • Locate insights.
  • Understand marketing insights such as contact, segment, customer journey, marketing email and leads.

 

Module 8: Events

In this module, you will learn how to manage event planning and execution in Dynamics 365 for Marketing.

Lessons

  • Manage event planning
  • Manage event execution

After completing this module you will be able to:

  • Create in-person and webinar events.
  • Set up event planning features such as sessions, speakers, event passes, waitlists, and venues.
  • Create and manage recurring events.

 

Module 9: Surveys

In this module, you will review how to configure, design and distribute surveys in Dynamics 365 for Marketing.

Lessons

  • Create surveys

After completing this module you will be able to:

  • Create a reusable survey theme.
  • Create, design, preview and publish a survey.

 

Module 10: Results

In the Results module, you will review marketing event and survey insights.

Lessons

  • Review event and survey results

After completing this module you will be able to:

  • Utilize the event dashboard to assess the outcome of your events.

target_au

This course is designed for IT or marketing professionals who want to learn how to leverage Dynamics 365 for Marketing for businesses.


pre_req

Knowledge of the Dynamics 365 platform and an understanding of basic marketing principles.


titleCourse DP-070T00-A: Migrate Open Source Data Workloads to Azure
days1
seo_titleCourse DP-070T00-A: Migrate Open Source Data Workloads to Azure
seo_decThe Migrate Open Source Data Workloads to Azure (DP-070T00-A) course will enable you to migrate MySQL and PostgreSQL workloads to Azure SQL Database.
seo_tkeyMigrate Data Workloads to Azure
categorysql-server
vendorMicrosoft

techonogyDatacenter & Virtualization
overviewThe Migrate Open Source Data Workloads to Azure (DP-070T00-A) course will enable the students to understand Azure SQL Database, and educate the students on what is required to migrate MySQL and PostgreSQL workloads to Azure SQL Database.   See other Microsoft courses
objective

At the end of the Migrate Open Source Data Workloads to Azure (DP-070T00-A) course, the students will have learned:

  • Migrate on-premises MySQL to Azure SQL DB for MySQL
  • Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL

outline

Module 1: Migrate to Azure SQL DB for MySQL & PostgreSQL

This module describes the benefits and architecture of Azure SQL DB.

Lessons

  • OSS databases overview
  • Common OSS database workloads
  • Customer challenges in migration

Lab: Creating source OSS databases

  • Installation of Postgres migration DB server
  • Installation of MySQL migration DB server
  • Backups / data dumps from Postgres / MySQL
  • Restore from data dumps

At the end of this module, the students will be able to:

  • OSS databases overview
  • Common OSS database workloads
  • Customer challenges in migration

 

Module 2: Migrate on-premises MySQL to Azure SQL DB for MySQL

This module describes the benefits and process of migrating MySQL workloads to Azure SQL DB.

Lessons

  • Configure and Manage Azure SQL DB for MySQL
  • Migrate on-premises MySQL to SQL DB for MySQL
  • Application Migration
  • Post-migration considerations

Lab: Migrating MySQL DB Workloads to Azure SQL DB

  • Migrating MySQL DB Workloads to Azure SQL DB
  • Define Source and Target DBS
  • Perform Migration
  • Verify Migration

At the end of this module, the students will be able to:

  • Configure and Manage Azure SQL DB for MySQL
  • Migrate on-premises MySQL to SQL DB for MySQL
  • Application Migration
  • Post-migration considerations

 

Module 3: Migrate on-premises PostgreSQL to Azure SQL DB for PostgreSQL

This module describes the benefits and process of migrating PostgreSQL DB workloads to Azure SQL DB.

Lessons

  • Configure and Manage Azure SQL DB for PostgreSQL
  • Migrate on-premises MySQL to SQL DB for PostgreSQL
  • Application Migration
  • Post-migration considerations

Lab: Migrating PostgreSQL DB Workloads to Azure SQL DB

  • Configure Azure SQL DB for PostgreSQL
  • Define Source and Target DBS
  • Perform Migration
  • Verify Migration

At the end of this module, the students will be able to:

  • Configure and Manage Azure SQL DB for PostgreSQL
  • Migrate on-premises MySQL to SQL DB for PostgreSQL
  • Application Migration
  • Post-migration considerations

target_au
  • The primary audience for this course is database developers who plan to migrate their MySQL or Postgres DB workloads to Azure SQL DB.
  • The secondary audience for this course is MySQL/Postgres administrators to raise awareness of the features and benefits of Azure SQL DB.

pre_req
In addition to their professional experience, students who attend this training should already have the following technical knowledge:
  • Some knowledge of open-source relational database management systems such as Postgres;
  • and/or MySQL, SQL administration, backup and recovery techniques i.e. dumping table data.

titleCourse DP-060T00-A: Migrate NoSQL workloads to Azure Cosmos DB
days1
seo_titleCourse DP-060T00-A: Migrate NoSQL workloads to Azure Cosmos DB
seo_decThe Migrate NoSQL workloads to Azure Cosmos DB (DP-060T00-A) course will teach you how you can migrate MongoDB and Cassandra workloads to Cosmos DB.
seo_tkeyMigrate NoSQL workloads to Azure Cosmos DB
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Migrate NoSQL workloads to Azure Cosmos DB (DP-060T00-A) course will teach the students what is Cosmos DB and how you can migrate MongoDB and Cassandra workloads to Cosmos DB.   See other Microsoft courses
objective

At the end of the Migrate NoSQL workloads to Azure Cosmos DB (DP-060T00-A) course, the students will have learned:

  • Building Globally Distributed Applications with Cosmos DB
  • Migrate MongoDB Workloads to Cosmos DB
  • Migrate Cassandra DB Workloads to Cosmos DB

outline

Module 1: Building Globally Distributed Applications with Cosmos DB

This module describes the benefits and architecture of Cosmos DB.

Lessons

  • Cosmos DB overview
  • Cosmos DB APIs
  • Provisioning Throughput
  • Partitioning/Sharding Best Practices

At the end of this module, the students will be able to describe:

  • Cosmos DB overview
  • Cosmos DB APIs
  • Provisioning Throughput
  • Partitioning/Sharding Best Practices

 

Module 2: Migrate MongoDB Workloads to Cosmos DB

Migrate MongoDB Workloads to Cosmos DB.

Lessons

  • Understand Migration Benefits
  • Migration Planning
  • Data Migration
  • Application Migration
  • Post-migration considerations

Lab: Migrating MongoDB Workloads to Cosmos DB

  • Create a Migration Project
  • Define Source and Target
  • Perform Migration
  • Verify Migration

At the end of this module, the students will be able to:

  • Understand Migration Benefits
  • Perform Migration Planning
  • Perform Data Migration
  • Perform Application Migration
  • Undertake Post-migration considerations

Module 3: Migrate Cassandra DB Workloads to Cosmos DB
This module describes the benefits and process of migrating Cassandra DB workloads to Cosmos DB.Lessons

  • Understand Migration Benefits
  • Migration Planning
  • Data Migration
  • Application Migration
  • Post-migration considerations

Lab : Migrating Cassandra DB Workloads to Cosmos DB

  • Export the Schema
  • Move Data Using CQLSH COPY
  • Move Data Using Spark
  • Verify Migration

At the end of this module, the students will be able to:

  • Understand Migration Benefits
  • Perform Migration Planning
  • Perform Data Migration
  • Perform Application Migration
  • Undertake Post-migration considerations

target_au

The primary audience for this course is database developers who plan to migrate their MongoDB or Cassandra DB workloads to Azure using Cosmos DB.


pre_req

In addition to their professional experience, students who attend this training should already have the following technical knowledge:

  • The fundamental concepts of partitioning, replication, and resource governance for building and configuring scalable NoSQL applications that are agnostic of a Cosmos DB API.

titleCourse DP-050T00-A: Migrate SQL workloads to Azure
days2
seo_titleCourse DP-050T00-A: Migrate SQL workloads to Azure
seo_decIn the Migrate SQL workloads to Azure (DP-050T00-A) course, you will explore the objectives of data platform modernization.
seo_tkeyMigrate SQL workloads to Azure
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Migrate SQL workloads to Azure (DP-050T00-A) course, the students will explore the objectives of data platform modernization and how it is suitable for given business requirements. They will also explore each stage of the data platform modernization process and define what tasks are involved at each stage, such as the assessment and planning phase. In this course, students will also learn the available migration tools and how they are suitable for each stage of the data migration process. The student will learn how to migrate to the three target platforms for SQL based workloads; Azure Virtual Machines, Azure SQL Databases and Azure SQL Database Managed Instances. The student will learn the benefits and limitations of each target platform and how they can be used to fulfil both business and technical requirements for modern SQL workloads. The student will explore the changes that may need to be made to existing SQL based applications so that they can make the best use of modern data platforms in Azure.   See other Microsoft courses
objective

After completing the Migrate SQL workloads to Azure (DP-050T00-A) course, students will be able to:

  • Understand Data Platform Modernization
  • Choose the right tools for Data Migration
  • Migrate SQL Workloads to Azure Virtual Machines
  • Migrate SQL Workloads to Azure SQL Databases
  • Migrate SQL Workloads to Azure SQL Database Managed Instance

outline

Module 1: Introducing Data Platform Modernization

In this module, the students will learn the purpose of Data Platform Modernization and they will outline the benefits that data platform modernization can bring to an organization. The students will then learn the various stages of a data platform migration projects to understand what is involved in each stage to maximise the chances of a successful Data Platform Modernization Projects. Finally, students will explore the various data migration paths to understand how each approach is different and why you would choose one migration approach over another.

Lessons

  • Understand Data Platform Modernization
  • Understanding the stages of migration
  • Data Migration Paths

Lab: Introducing Data Platform Modernization

  • Understand Data Platform Modernization
  • Understand the Stages of Migration
  • Data Migration Paths

After completing this module, students will be able to:

  • Understand Data Platform Modernization
  • Understand the Stages of Migration
  • Data Migration Paths

 

Module 2: Choose the right tools for Data Migration

In this module, the student will be introduced to the Data Migration Guide as a starting point for the source of information that your organization should use for step by step guidance for modernizing your existing data platform. They will then learn the value of the Microsoft Assessment and Planning Toolkit to help discover the data assets that currently exist in their environments. The students will then learn the tools that can be used to help them to asses for compatibility or workload issues using both the Data Migration and Data Experimentation Assistant. The students will then see how the Azure Database Migration Service can be used to aid the online migration of databases to reduce the amount of downtime. Finally, an overview of the SQL Migration assistant is provided to show the student how to migrate no-SQL Server workloads.

Lessons

  • Discover the Database Migration Guide
  • Build your data estate inventory using Map Toolkit
  • Identify Migration candidates using Data Migration Assistant
  • Evaluate a Data workload using Database Experimentation Assistant
  • Data Migration using Azure Database Migration Service
  • Migrate non-SQL Server workloads to Azure using SQL Migration Assistant

Lab: Choose the right Tools for Data Migration

  • Identify Migration candidates using Data Migration Assistant
  • Evaluate a Data workload using Database Experimentation Assistant

After completing this module, students will be able to:

  • Identify Migration candidates using Data Migration Assistant
  • Evaluate a Data workload using Database Experimentation Assistant

 

Module 3: Migrating SQL Workloads to Azure Virtual Machines

In this module, the student will learn how to migrate on-premises SQL workloads to Azure Virtual Machines that are running SQL Server. Students will first explore the migration consideration when migrating from on-premises SQL Server to Azure Virtual Machines and the benefits they can gain by performing the migration. They will then learn the different migration options that can be performed when migrating to Azure Virtual Machines. This will include a look at the benefits and limitations of each approach. The students will finally look at SQL Server workloads that include High Availability and Disaster Recovery to ensure service continuity.

Lessons

  • Considerations of SQL Server to Azure VM Migrations
  • SQL Workloads to Azure VM Migration Options
  • Implementing High Availability and Disaster Recovery Scenarios

Lab: Migrating SQL Workloads to Azure Virtual Machines

After completing this module, students will be able to:

  • Considerations of SQL Server to Azure VM Migrations
  • SQL Workloads to Azure VM Migration Options
  • Implementing High Availability and Disaster Recovery Scenarios

 

Module 4: Migrate SQL Workloads to Azure SQL Databases

In this module, the students will explore what is Azure SQL Database and why it is a suitable target for SQL based workloads. It teaches students how to choose the appropriate SQL Server instance option and why it can fulfil business requirements for data platform modernization. The modules will also show students how they can perform both offline and online migrations to Azure SQL Database. By doing so, they can assess which method may be appropriate to their scenarios at work. It will also show the tools that can be used to enable the data migration process. Finally, they will explore the methods that can be used to load data into Azure SQL Database from an on-premises instance.

Lessons

  • Choose the right SQL Server Instance option in Azure
  • Migrate SQL Server to Azure SQL DB offline
  • Load and Move data to Azure SQL Database

Lab: Migrate SQL Workloads to Azure SQL Databases

After completing this module, students will be able to:

  • Choose the right SQL Server Instance option in Azure
  • Migrate SQL Server to Azure SQL DB online
  • Load and Move data to Azure SQL Database

 

Module 5: Migrate SQL Workloads to Azure SQL Database Managed Instance

This module will explore what is an Azure SQL Database Managed Instance and why it is a suitable target for SQL based workloads. They also learn how the Azure SQL Database Managed Instance can fulfil the business requirements for data platform modernization. The students will then explore the tools that can be used to enable the data migration process to Azure SQL Database Managed Instance. They will then explore the methods and tools that can be used to load data into Azure SQL Database Managed Instance from an on-premises instance. Finally, they will learn some of the changes that may need to be made to existing SQL based applications so that they can use Azure SQL Database Managed Instance.

Lessons

  • Evaluate migration scenarios to SQL Database Managed Instance
  • Migrate to SQL Database Managed instance
  • Load and Move data to SQL Database Managed instance
  • Application Configuration and Optimization

Lab: Migrate SQL Workloads to Azure SQL Database Managed Instance

After completing this module, students will be able to:

  • Evaluate migration scenarios to SQL Database Managed Instance
  • Migrate to SQL Database Managed instance
  • Load and Move data to SQL Database Managed instance
  • Application Configuration and Optimization

target_au
  • The audience for this course is data professionals and data architects who want to learn about migrating data platform technologies that exist on Microsoft Azure and how existing SQL based workloads can be migrated and modernized.
  • The secondary audience for this course is individuals who manage data platforms or develop applications that deliver content from the existing data platform technologies.

pre_req

In addition to their professional experience in SQL Server, students who take this training should have technical knowledge equivalent to the following courses:


titleCourse AZ-500T00-A: Microsoft Azure Security Technologies
days4
seo_titleCourse AZ-500T00-A: Microsoft Azure Security Technologies
seo_decIn the Microsoft Azure Security Technologies (AZ-500T00-A) course covers configuring and deploying security solutions for cloud N-tier architecture.
seo_tkeyAZ-500T00-A
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Azure Security Technologies (AZ-500T00-A) course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediation of vulnerabilities by using a variety of security tools. The AZ-500T00-A course covers configuring and deploying security solutions for cloud N-tier architecture.   See other Microsoft courses
objective

After completing the Microsoft Azure Security Technologies (AZ-500T00-A) course, students will be able to:

  • Describe specialized data classifications on Azure
  • Identify Azure data protection mechanisms
  • Implement Azure data encryption methods
  • Secure Internet protocols and how to implement them on Azure
  • Describe Azure security services and features

outline

Module 1: Manage Identity and Access

Gone are the days when security focused on a strong perimeter defence to keep malicious hackers out. Anything outside the perimeter was treated as hostile, whereas inside the wall, an organization’s systems were trusted. Today’s security posture is to assume breach and use the Zero Trust model. Security professionals no longer focus on perimeter defence. Modern organizations have to support access to data and services evenly from both inside and outside the corporate firewall. This module will serve as your roadmap as you start building more security into your Azure solutions.

Lessons

  • Configure Azure AD PIM
  • Configure and manage Azure Key Vault
  • Configure Azure AD for Azure workloads
  • Security for an Azure subscription
After completing this module, students will be able to:
  • Understand the Zero Trust Model.
  • Configure Azure Active Directory for workloads.
  • Configure Azure AD Privileged Identity Management.
  • Configure Azure tenant security.
  • Configure and manage Key Vault.

 

Module 2: Implement Platform Protection

We know that security is job one in the cloud and how important it is that you find accurate and timely information about Azure security. One of the best reasons to use Azure for your applications and services is to take advantage of its wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on the secure Azure platform.

Lessons

  • Understand cloud security
  • Azure networking
  • Secure the network
  • Implementing host security
  • Implement platform security
  • Implement subscription security
After completing this module, students will be able to:
  • Implement network security.
  • Implement host security.
  • Configure container Security.
  • Implement Azure Resource Manager security.

 

Module 3: Secure Data and applications

Azure security for data and applications offers a comprehensive solution that helps organizations take full advantage of the promise of cloud applications while maintaining control with improved visibility into activity. It also increases protection of critical data across cloud applications. With tools to help uncover Shadow IT, assess risk, enforce policies, investigate activities and stop threats, organizations can safely move to the cloud while maintaining control of critical data.

Lessons

  • Configure security policies to manage data
  • Configure security for data infrastructure
  • Configure encryption for data at rest
  • Understand application security
  • Implement security for application lifecycle
  • Secure applications
  • Configure security policies to manage data.
  • Configure security for data infrastructure.
  • Configure encryption for data at rest.
  • Implement security for application delivery.
  • Configure application security.

 

Module 4: Manage Security Operations

Azure provides security mechanisms to aid administrators who manage Azure cloud services and virtual machines. These mechanisms include:

  • Authentication and role-based access control.
  • Monitoring, logging, and auditing.
  • Certificates and encrypted communications.
  • A web management portal.

Lessons

  • Configure security services
  • Configure security policies using Azure Security Center
  • Manage security alerts
  • Respond to remediation of security issues
  • Create security baselines

After completing this module, students will be able to:

  • Configure security services.
  • Configure security policies.
  • Manage security alerts.

target_au
pre_req

Before attending the Microsoft Azure Security Technologies (AZ-500T00-A) course, it is strongly encouraged that:

  • Students have at least one year of hands-on experience securing Azure workloads and experience with security controls for workloads on Azure.
  • Learners acquire the knowledge equivalent to what is assessed as part of the Microsoft Azure Administrator Associate certification.

titleCourse AZ-204T00-A: Developing Solutions for Microsoft Azure
days5
seo_titleCourse AZ-204T00-A: Developing Solutions for Microsoft Azure
seo_decThe Developing Solutions for Microsoft Azure (AZ-204T00-A) course teaches developers how to create end-to-end solutions in Microsoft Azure.
seo_tkeyDeveloping Solutions for Microsoft Azure
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Developing Solutions for Microsoft Azure (AZ-204T00-A) course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.   See other Microsoft courses
objective
outline

Module 1: Creating Azure App Service Web Apps

Students will learn how to build a web application on the Azure App Service platform. They will learn how the platform functions and how to create, configure