Palo Alto Networks (Case Study)





Current Vendor :


titleCCSE Training – Security Engineering Check Point Certified Security Expert R77.30
days3
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCheck Point

techonogySecurity
overviewThis advanced 3-day course teaches how to build, modify, deploy and troubleshoot the R81.10 Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers. Validate and enhance your skills and optimally manage Check Point advanced security management systems.
objective

• Provide an overview of the upgrade service and options available.
• Explain how to perform management upgrade and migration.
• Articulate the process using CPUSE features.
• Articulate the purpose and function of Management High Availability.
• Explain Primary vs Secondary, Active vs Standby and Synchronization.
• Explain disaster recovery steps in case the primary management server becomes unavailable.
• Provide overview of Central Deployment in SmartConsole.
• Articulate an understanding of Security Gateway cluster upgrade methods.
• Explain about Multi Version Cluster (MVC) upgrades.
• Discuss Gaia Commands and how they are used.
• Explain the main processes on s and s.
• Describe how to work with scripts and SmartTasks to configure automatic actions.
• Explain the Management Data Plane Separation (MDPS).
• Explain kernel operations and traffic flow.
• Articulate Dynamic and Updatable Objects in Security Gateways.
• Explain the policy installation flow and files used.
• Describe the use of policy installation history.
• Explain concurrent and accelerated install policy.
• Describe an overview of APIs and ways to use and authenticate.
• Explain how to make changes in GAIA and management configuration.
• Explain how to install policy using API.
• Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
• Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
• Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
• Discuss Site-to-Site VPN basics, deployment and communities.
• Describe how to analyze and interpret VPN tunnel traffic.
• Explain Link Selection and ISP Redundancy options.
• Explain tunnel management features.
• Discuss Check Point Remote Access solutions and how they differ from each other.
• Describe how client security can be provided by Remote Access .
• Explain authentication methods including machine authentication.
• Explain Multiple Entry Point (MEP).
• Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections.
• Describe Mobile Access deployment options.
• Discuss various features in Mobile Access like Portals, Link Translation, running Native Applications, Reverse Proxy and more.
• Explain basic concepts of Clustering and ClusterXL.
• Explain about Cluster Control Protocol (CCP) and synchronization.
• Describe advanced ClusterXL functions and modes like Load Sharing, Active-Active, VMAC mode etc.
• Discuss Cluster Correction Layer (CCL) to provide connection stickyness.
• Advanced Logs and Monitoring
• Explain how to determine if the configuration is compliant with the best practices.
• Explain how to set action items to meet the compliance.
• Discuss how SmartEvent functions to identify critical security issues.
• Describe the components of SmartEvent and their deployment options.
• Discuss how SmartEvent can assist in reporting security threats.
• Explain how to customize event definitions and set an Event Policy.


outline

• Prepare for a Security Management Server Upgrade
• Upgrade the Security Management Server
• Deploy a Secondary Security Management Server
• Configure a Distributed Log Server
• Upgrade a Security Gateway from SmartConsole
• Work with the Command Line
• Use Scripts and SmartTasks
• Configure Dynamic Objects
• Monitor Traffic
• Verify Policy Installation and Status
• Work with Gaia and Management APIs
• Work with Acceleration Features
• Configure a Locally Managed Site to Site VPN
• Configure a Site to Site VPN with an Interoperable Device
• Configure Remote Access VPN
• Configure Mobile Access VPN
• Configure a High Availability Cluster
• Work with ClusterXL
• Configure Policy Compliance
• Deploy SmartEvent


target_au

Technical professionals who perform advanced deployment configurations of Check Point products.


pre_req

CCSA training and/or certification with a working knowledge of Windows and/or UNIX, networking technology, the Internet and TCP/IP.


titleForcepoint Web Security Administrator
days4
seo_title
seo_dec
seo_tkey
categoryweb-security
vendorForcepoint

techonogySecurity
overviewThe Forcepoint Web Security Administrator course is designed for people who will manage Forcepoint Web Security and perform standard administrative tasks such as policy administration, system monitoring, and incident management. Instructors deliver this class via a virtual (online) instructor-led training format (VILT) with dialog with students; hands-on walk-throughs to build administrative competencies, and lab scenarios for students to independently demonstrate competencies.
objective
  • Access, find, and modify key user interface options to accomplish administrative tasks.
  • Customize and manage Web Security policies to meet your organization’s filtering needs.
  • Extend and combine available reporting options to gain actionable insights related to Web Security detections.
  • Leverage Web Security

outline

Module 1: Understanding and Getting Started with Web Security

  • Describe features, components, and key integrations that enable Web Security functionalities.
  • Articulate the licensing structure for Web Security and related Modules.
  • Distinguish key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces.
  • Describe the differences between Super Administrators and delegated administrators.

Module 2: Policy Enforcement and Filtering

  • Describe the full scope and workflow of policy planning.
  • Identify standard and custom policies, including related filters.
  • Distinguish key settings in Security Manager.
  • Compare user identification and proxy authentication.
  • Explain how Web Security analyses user requests and enforces policies.

Module 3: Monitoring Web Security Activities

  • Itemize Web Security notifications and alerts.
  • Diagram the reporting flow.
  • Describe various reporting options to gain important insights about your environment.
  • Identify suspicious network activity using threats dashboard.
  • Compare reporting tools, including legacy and Report Center features.

Module 4: Disaster Response and Recovery

  • Explain how Web Security responds to incidents.
  • Compare and contrast Web Security update options.
  • Distinguish guidelines related to incident management and disaster recovery.
  • Identify system health monitoring capabilities.
  • Complete various tasks that help maintain a healthy Web Security environment.
  • Define best practice procedures for disaster recovery.

target_au
  • System administrators, network security administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations

pre_req
  • Basic knowledge of Active Directory/User Directory concepts
  • Basic knowledge of networking concepts (IP addresses, protocols, URLs, proxies, gateways, firewalls)
  • User experience with platforms on which Forcepoint Web Security will be deployed

titleForcepoint CASB: Cloud Access Security Broker Administrator
days3
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorForcepoint

techonogySecurity
overviewThe Forcepoint CASB Administrator course is designed for people who will manage deployed CASB systems on a day-today basis, performing standard administrative tasks, for example, user administration; managing which cloud accesses CASB brokers; running reports; and using reports to assess risk. The course also teaches administrators how to perform high-level troubleshooting. Instructors deliver this class via a virtual (online) instructor-led training format (VILT) with dialog with students; hands-on walk-throughs to build administrative competencies, and lab scenarios for students to independently demonstrate competencies.
objective
  • Describe Forcepoint CASB’s alignment to the Forcepoint Human Point strategy.
  • Locate and define the UI key elements used to accomplish administrative tasks.
  • Define the capabilities of Forcepoint CASB.
  • Diagram the Forcepoint CASB architecture, naming the main components and their function.
  • Discover cloud application usage within the organization’s networks.
  • Integrate Active Directory into a Forcepoint CASB instance.
  • Add discovered cloud applications as managed assets.
  • Configure cloud application access policies, reporting, and notifications.
  • Customize and enable DLP and anomaly detection policies.
  • Manage compliance and governance policies.
  • Perform forensic analysis using Forcepoint CASB.

outline

Module 1: Overview and Getting Started

  • Describe what CASB is, its capabilities, and how it protects an organization’s environment.
  • Diagram the Forcepoint CASB architecture, list the main components, and define their function.
  • List the Forcepoint CASB product requirements.
  • Identify the different pages of the Forcepoint CASB UI.
  • Create and manage CASB Administrator accounts.
  • Define where Forcepoint CASB fits in the Forcepoint Human Point System.

Module 2: Discovery & Definition

  • Discover cloud applications and the people in your organization that are using them.
  • Explain the purpose of the Add Scan and Remove Scan items in the App Discovery tab.
  • Identify the number of high, medium, and low-risk cloud applications detected on the App Discovery dashboard.
  • Compare the risk level of cloud applications using the Cloud Application Directory.

Module 3: Asset & Endpoint Management

  • Describe the available options for adding assets to CASB.
  • Use CASB to manage organizational cloud assets.
  • Manage assets using Forcepoint CASB’s API deployment option.
  • Configure Reverse Proxy.
  • Protect Endpoints with Forward Proxy.
  • Install and Configure the CASB endpoint agent (Skyfence Security Service).
  • Ensure endpoint traffic flows through the CASB Gateway.
  • Enroll endpoints using Self Enrollment and Administrative Enrollment.

Module 4: Managing Audit & Protect Policies

  • Create and configure cloud application access policies.
  • Block applications by domain name.
  • Customize and enable a DLP Quick Policy.
  • Customize and enable an Anomaly Detection Quick Policy.
  • Create a custom policy using the Custom Policy Editor.
  • Generate traffic to test each policy.
  • Disable Quick or Custom Policies.

Module 5: Managing Compliance & Governance Policies

  • Describe capabilities and limitations of compliance Data Classification and Governance policies.
  • Create and schedule a Data Classification policy scan.
  • Run the Data Classification policy scan.
  • Use the Dashboard and Reports to view sensitive files found.
  • Clone and modify a Governance policy.
  • Schedule and run a Governance policy scan.
  • Use the Governance Dashboard to identify issues surfaced by the scan and delegate via tasks.
  • Export a policy and review the policy information a downloaded XML file.

Module 6: Forensic Analysis

  • Describe predefined data types.
  • Explain the benefit of using built-in CASB data types.
  • Identify high risk users and take appropriate actions for compromised or misbehaving users.
  • Respond to potential threats from the Audit & Protect dashboard.
  • Perform forensic analysis to determine severity levels of anomalies.
  • Identify triggered incidents and apply workflow actions.
  • Monitor high risk users using the Watchlist.

Module 7: Configuring Notifications & Generating Reports

  • Describe notifications.
  • Modify an existing notification.
  • Create a new notification.
  • Add a new notification to an existing policy.
  • Describe reports.
  • Generate reports.

target_au
  • System administrators, data security administrators, IT staff
  • Sales engineers, consultants, implementation specialists
  • Forcepoint channel partners and IT staff

pre_req
  • General understanding of Software as a Service (SaaS) principles.
  • General knowledge of Cloud Applications.
  • Basic knowledge of Active Directory/User Directory concepts.
  • Basic knowledge of IPv4 networking concepts (IP addresses, routing, URLs, proxies, gateways, firewalls).
  • User experience with platforms on which Forcepoint CASB will be deployed.
  • Basic familiarity with privacy standard terminology and their acronyms (HIPPA, PII, GDPR, PCIDSS).

titleCortex XDR: Prevention and Deployment (EDU-260)
days3
seo_title
seo_dec
seo_tkey
categorysecurity-operations
vendorPalo Alto

techonogySecurity
overview(EDU-260) Cortex XDR - Prevention and Deployment helps you to : This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. It concludes by discussing basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment.
objective

Successful completion of this instructor-led course with hands-on lab activities
should enable you to:

  • Describe the architecture and components of the Cortex XDR family
    Use the Cortex XDR management console, including reporting
  • Create Cortex XDR agent installation packages, endpoint groups, and policies
  • Deploy Cortex XDR agents on endpoints
  • Create and manage Exploit and Malware Prevention profiles
  • Investigate alerts and prioritize them using starring and exclusion policies
  • Tune Security profiles using Cortex XDR exceptions
  • Perform and track response actions in the Action Center
  • Perform basic troubleshooting related to Cortex XDR agents
  • Deploy a Broker VM and activate the Local Agents Settings applet
  • Understand Cortex XDR deployment concepts and activation requirements
  • Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization

outline
  1. Cortex XDR Overview
  2. Cortex XDR Main Components
  3. Cortex XDR Management Console
  4. Profiles and Policy Rules
  5. Malware Protection
  6. Exploit Protection
  7. Cortex XDR Alerts
  8. Tuning Policies Using Exceptions
  9. Response Actions
  10. Basic Agent Troubleshooting
  11. Broker VM Overview
  12. Deployment Considerations

target_au

Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers.


pre_req

Participants must be familiar with enterprise product deployment, networking, and security concepts.


titleCortex XDR: Investigation and Response (EDU-262)
days2
seo_title
seo_dec
seo_tkey
categorysecurity-operations
vendorPalo Alto

techonogySecurity
overview(EDU-262) Cortex XDR - Investigation and Response helps you to:
  • Learn how to activate a Cortex XDR instance
  • Create agent-installation packages and Security policies and profiles to protect endpoints against multistage, fileless attacks built using malware and exploits.

objective

Successful completion of this instructor-led course with hands-on lab activities should enable participants to:

  • Investigate and manage incidents
  • Describe the Cortex XDR causality and analytics concepts
  • Analyze alerts using the Causality and Timeline Views
  • Work with Cortex XDR Pro actions such as remote script execution
  • Create and manage on-demand and scheduled search queries in the Query Center
  • Create and manage the Cortex XDR rules BIOC and IOC
  • Working with Cortex XDR assets and inventories
  • Write XQL queries to search datasets and visualize the result sets
  • Work with Cortex XDR’s external-data collection

outline
  1. Cortex XDR Incidents
  2. Causality and Analytics Concepts
  3. Causality Analysis of Alerts
  4. Advanced Response Actions
  5. Building Search Queries
  6. Building XDR Rules
  7. Cortex XDR Assets
  8. Introduction to XQL
  9. External Data Collection

target_au

Cybersecurity analysts and engineers, and security operations specialists


pre_req

Participants must have taken the course EDU-260 (Cortex XDR: Prevention and Deployment).


titleCortex XSOAR: Automation and Orchestration (EDU-380)
days4
seo_title
seo_dec
seo_tkey
categorysecurity-operations
vendorPalo Alto

techonogySecurity
overviewThe Cortex™ XSOAR 6.8: Automation and Orchestration (EDU-380) course is four days of instructor-led training that will help you:
  • Configure integrations, create tasks, and develop playbooks
  • Build incident layouts that enable analysts to triage and investigate incidents efficiently
  • Identify how to categorize event information and map that information to display fields
  • Develop automations, manage content, indicator data, and artifact stores, schedule jobs, organize users and user roles, oversee case management, and foster collaboration

objective

This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource orchestration, process automation, case management, and analyst workflow.

The course includes coverage of a complete playbook-development process for automating a typical analyst workflow to address phishing incidents. This end-to-end view of the development process provides a framework for more focused discussions of individual topics that are covered in the course.


outline
  1. Core Functionality and Feature Sets
  2. Enabling and Configuring Integrations
  3. Playbook Development
  4. Classification and Mapping
  5. Layout Builder
  6. Solution Architecture
  7. Docker
  8. Automation Development & Debugging
  9. The Marketplace and Content Management
  10. Indicators and Threat Intelligence Management
  11. Jobs and Job Scheduling
  12. Users and Role‑Based Access Controls (RBAC)
  13. Integration Development

target_au

Security-operations (SecOps), or security, orchestration, automation, and response (SOAR) engineers, managed security service providers (MSSPs), service delivery partners, system integrators, and professional services engineers


pre_req

Participants must complete the Cortex XSOAR Analyst digital learning. Participants who have experience with scripting, the use of Python and JavaScript, and the use of JSON data objects will likely be able to apply what they learn more quickly than participants without such experience. However, completion of the course does not require proficiency in writing code.


titlePanorama: Managing Firewalls at Scale (EDU-220)
days2
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorPalo Alto

techonogySecurity
overview
  • Learn how to configure and manage the next-generation Panorama management servers
  • Configure templates (including template variables) and device groups and gain experience with administration, log collection, and logging and reporting
  • Gain familiarity with planning and design considerations for Panorama deployment

objective

This course helps participants gain in-depth knowledge on configuring and managing a Palo Alto Networks Panorama management server. Administrators who complete this course become familiar with the Panorama management server’s role in managing and securing the overall network. Network professionals learn how to use Panorama aggregated reporting to provide a holistic view of a network of Palo Alto Networks next-generation firewalls.


outline
  1. Initial Configuration
  2. Adding Firewalls
  3. Templates
  4. Device Groups
  5. Log Collection and Forwarding
  6. Using Panorama Logs
  7. Panorama Administrative Accounts
  8. Reporting
  9. Troubleshooting

target_au

Security Administrators, Security Operations Specialists, Security Analysts, Security Engineers, and Security Architects


pre_req

Students must have completed the Firewall Essentials: Configuration and Management (EDU-210) class. Students must be familiar with Palo Alto Networks Next-Generation Firewall management and basic networking concepts, including routing and IP addressing.


titleFirewall: Troubleshooting (EDU-330)
days3
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorPalo Alto

techonogySecurity
overview
  • Use firewall tools, including the CLI, to investigate networking issues
  • Follow proven troubleshooting methodologies that are specific to individual features
  • Analyze advanced logs to resolve various real-life scenarios
  • Solve advanced, scenario-based challenges

objective

Successful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks next-generation firewalls. Participants will perform hands-on troubleshooting related to the configuration and operation of the Palo Alto Networks firewall. Completion of this class will help participants develop an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content.


outline
  1. Tools and Resources
  2. Flow Logic
  3. Packet Captures
  4. Packet-Diagnostics Logs
  5. Host-Inbound Traffic
  6. Transit Traffic
  7. System Services
  8. Certificate Management and SSL Decryption
  9. User-ID
  10. GlobalProtect
  11. Support Escalation and RMAs
  12. Next Steps

target_au

Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff


pre_req

Participants must complete the Firewall Essentials: Configuration and Management (EDU-210) course. Participants must have strong practical knowledge of routing and switching, IP addressing, and network security concepts, and at least six months of on-the-job experience with Palo Alto Networks firewalls.


titleCompTIA Data+
days5
seo_title
seo_dec
seo_tkey
categorydata-analytics
vendorComptia

techonogyAnalytics & Data Management
overviewAs the importance of data analytics grows, more job roles are required to set a context and better communicate vital business intelligence. Collecting, analysing, and reporting data can drive priorities and lead business decision-making. CompTIA Data+ certification validates professionals have the skills required to facilitate data-driven business decisions, including:
  • Mining data
  • Manipulating data
  • Visualising and reporting data
  • Applying basic statistical methods
  • Analysing complex datasets while adhering to governance and quality standards throughout the entire data life cycle
Examination Information
  • CompTIA DA0-001
  • Testing through Pearson VUE

objective

In this CompTIA Data+ course, you will learn:

  • Instruction from CompTIA approved Data+ Certification preparation course.
  • Receive a CompTIA Data+ Exam Voucher included upon completion of the course.
  • Identify Data Concepts and Environments important in analytics.
  • Execute techniques in Data Mining, Data Mining, and Visualisation.
  • Summarise the importance of Data Governance, Quality, and Controls.
  • Continue learning and face new challenges with after-course one-on-one instructor coaching.

outline

Module 1: Identifying Basic Concepts of Data Schemas

  • Identify Relational and Non-Relational Databases
  • Understand the Way We Use Tables, Primary Keys, and Normalisation

Module 2: Understanding Different Data Systems

  • Describe Types of Data Processing and Storage Systems
  • Explain How Data Changes

Module 3: Understanding Types and Characteristics of Data

  • Understand Types of Data
  • Break Down the Field Data Types

Module 4: Comparing and Contrasting Different Data Structures, Formats, and Markup Languages

  • Differentiate between Structured Data and Unstructured Data
  • Recognise Different File Formats
  • Understand the Different Code Languages Used for Data

Module 5: Explaining Data Integration and Collection Methods

  • Understand the Processes of Extracting, Transforming, and Loading Data
  • Explain API/Web Scraping and Other Collection Methods
  • Collect and Use Public and Publicly-Available Data
  • Use and Collect Survey Data

Module 6: Identifying Common Reasons for Cleansing and Profiling Data

  • Learn to Profile Data
  • Address Redundant, Duplicated, and Unnecessary Data
  • Work with Missing Values
  • Address Invalid Data
  • Convert Data to Meet Specifications

Module 7: Executing Different Data Manipulation Techniques

  • Manipulate Field Data and Create Variables
  • Transpose and Append Data
  • Query Data

Module 8: Explaining Common Techniques for Data Manipulation and Optimisation

  • Use Functions to Manipulate Data
  • Use Common Techniques for Query Optimisation

Module 9: Applying Descriptive Statistical Methods

  • Use Measures of Central Tendency
  • Use Measures of Dispersion
  • Use Frequency and Percentages

Module 10: Describing Key Analysis Techniques

  • Get Started with Analysis
  • Recognise Types of Analysis

Module 11: Understanding the Use of Different Statistical Methods

  • Understand the Importance of Statistical Tests
  • Break Down the Hypothesis Test
  • Understand Tests and Methods to Determine Relationships Between Variables

Module 12: Using the Appropriate Type of Visualisation

  • Use Basic Visuals
  • Build Advanced Visuals
  • Build Maps with Geographical Data
  • Use Visuals to Tell a Story

Module 13: Expressing Business Requirements in a Report Format

  • Consider Audience Needs When Developing a Report
  • Describe Data Source Considerations for Reporting
  • Describe Considerations for Delivering Reports and Dashboards
  • Develop Reports or Dashboards
  • Understand Ways to Sort and Filter Data

Module 14: Designing Components for Reports and Dashboards

  • Design Elements for Reports and Dashboards
  • Utilise Standard Elements
  • Creating a Narrative and Other Written Elements
  • Understand Deployment Considerations

Module 15: Distinguishing Different Report Types

  • Understand How Updates and Timing Affect Reporting
  • Differentiate Between Types of Reports

Module 16: Summarising the Importance of Data Governance

  • Define Data Governance
  • Understand Access Requirements and Policies
  • Understand Security Requirements
  • Understand Entity Relationship Requirements

Module 17: Applying Quality Control to Data

  • Describe Characteristics, Rules, and Metrics of Data Quality
  • Identify Reasons to Quality Check Data and Methods of Data Validation

Module 18: Explaining Master Data Management Concepts

  • Explain the Basics of Master Data Management
  • Describe Master Data Management Processes

target_au
pre_req
  • CompTIA recommends 18–24 months of experience in a report/business analyst job to succeed in this course.
  • Exposure to databases and analytical tools, a basic understanding of statistics, and data visualisation experiences, such as Excel, Power BI, and Tableau.

titleAdvanced Developing on AWS
days3
seo_title
seo_dec
seo_tkey
categoryapplication-development
vendorAWS

techonogyIT Services Management
overviewThe Advanced Developing on AWS course uses the real-world scenario of taking a legacy, on-premises monolithic application and refactoring it into a serverless microservices architecture. This three-day advanced course covers advanced development topics such as architecting for a cloud-native environment; deconstructing on-premises, legacy applications and repackaging them into cloud-based, cloud-native architectures; and applying the tenets of the Twelve-Factor Application methodology.
objective

In this course, you will learn how to:

  • Analyze a monolithic application architecture to determine logical or programmatic break points where the application can be broken up across different AWS services.
  • Apply Twelve-Factor Application manifesto concepts and steps while migrating from a monolithic architecture.
  • Recommend the appropriate AWS services to develop a microservices based cloud native application.
  • Use the AWS API, CLI, and SDKs to monitor and manage AWS services.
  • Migrate a monolithic application to a microservices application using the 6 Rs of migration.
  • Explain the SysOps and DevOps interdependencies necessary to deploy a microservices application in AWS.

outline

This course covers the following concepts:

  • Interfacing with AWS Services
  • Deconstructing a monolithic architecture
  • Migrating to the cloud
  • Creating an infrastructure
  • Declare and isolate dependencies
  • Storing configuration in the cloud
  • Establish a build, release, run model
  • Creating the codebase
  • Deploying an application
  • Evolution of architecture
  • Design patterns
  • I/O explosion and preventing it
  • Microservices

target_au

Experienced software developers who are already familiar with AWS services


pre_req

We recommend that attendees of this course have the following prerequisites:

  • In-depth knowledge of at least one high-level programming language
  • Working knowledge of core AWS services and public cloud implementation
  • Completion of the Developing on AWS course, and then a minimum of 6 months of application of those concepts in a real world environment.

titleHPE DevOps Essentials H0DS6S
days3
seo_title
seo_dec
seo_tkey
categorydevops
vendorHP

techonogyIT Services Management
overviewThis introductory course helps students explore and adopt DevOps to improve innovation, agility and quality to support business outcomes in their organization. It addresses the benefits and challenges in evolving a DevOps approach to the application and service development lifecycle.
objective

During this course, students will learn:

  • What is DevOps and who needs it
  • Goals and business benefits of DevOps
  • How DevOps fits with ITIL 4
  • Changes required for DevOps
    • Changes to job roles, culture, skills, metrics
    • Changes to processes
    • Changes to tools, infrastructure and technology
  • DevOps principles and techniques
    • Continuous Integration/Continuous Delivery/Continuous Deployment
    • The Three Ways (Flow, Feedback, Continuous Learning)
  • How to begin the DevOps journey
  • Where to start and how to scale
  • DevOps maturity models
  • Prepare for the EXIN DevOps Professional Exam

outline

Module 1: DevOps Adoption

  • Describe the basic reasons for DevOps adoption
  • DevOps myths
  • History of DevOps
  • Bi-model IT
  • Introduction to Agile.
  • Principles of the Three Ways

Module 2: Culture and People

  • Focus on business outcomes
  • Explain how the several DevOps roles work together to add value to the business
  • Explain the differences between I-shape, T-shape and E-shape in relationship to DevOps
  • Explain how to integrate operations into the daily work of development

Module 3: DevOps Principles and Concepts

  • Infrastructure as code
  • Immutable vs mutable servers
  • Cloud concepts
  • Microservices versus monolithic services
  • Configuration management practice
  • Service level management practice

Module 4: The First Way: The Technical Practice of Flow

  • Visualizing work
  • Kanban, handoff reduction, waste reduction
  • Deployment pipeline
  • Continuous Integration/Continuous Delivery (CI/CD)
  • Software development and management practice
  • Automated testing
  • Deployment management practice
  • Release management practice

Module 5: The Second Way: Feedback

  • Feedback loops, swarming, andon
  • Telemetry
  • Hypothesis-driven development
  • Code review techniques
  • Launch readiness
  • Low-risk releases

Module 6: The Third Way: Continuous Leaning and Experimentation

  • Explain how continual improvement helps an organization
  • Understand and conduct a blameless post-mortem
  • Differentiate between the several Simian Army Monkey types to improve learning
  • Explain how injection of production failure creates resilience
  • Explain when to use game days
  • Explain Kaizen Blitz

Module 7: Information Security, Change Enablement, and Governance

Module 8: Where to Start

  • Assessments
  • Pilots
  • Agile/Scrum/Kanban

target_au
  • Senior IT managers (CIO/CTO), IT development staff, IT operations staff, IT process owners, business managers, business process owners
  • Individuals who require an understanding of DevOps and how it can contribute to business success within an organization
  • IT professionals and teams implementing DevOps

pre_req

Before attending this course, students should have the following:

  • Understanding of Agile software development (beneficial, but not required)
  • Understanding of ITIL 4 framework (beneficial, but not required)
  • The official reference to the examination: The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations by Gene Kim, Jez Humble, Patrick Debois, John Willis (recommended for all students)

titleIntroduction to DevOps H9P61S
days1
seo_title
seo_dec
seo_tkey
categorydevops
vendorHP

techonogyIT Services Management
overviewThis course introduces the fundamentals of DevOps. It explains the key principles and practices that underpin DevOps and helps attendees to understand the benefits that a DevOps approach could have for their own organizations, and potential problems that should be addressed. The course includes discussion of people, process and technology aspects of DevOps, and provides practical suggestions of steps that attendees can take to start introducing DevOps.
objective

On successful completion of this course, candidates can expect to gain knowledge of:

  • Issues around organizational separation of IT development and IT operations, and how these can have a negative impact on both IT and the business
  • How DevOps builds on existing concepts and approaches such as ITIL, Agile, and Kanban
  • The role of continuous integration, continuous delivery, and continuous deployment in DevOps
  • Organizational issues relating to DevOps and understanding of options for DevOps organizational design
  • The role that tools play in DevOps
  • Possible approaches to get started on a DevOps journey

outline

Introduction

  • Describe the current business context
  • Recognize IT challenges
  • Define the origins of DevOps
  • Understand the definition of DevOps
  • Articulate the business reasons for using DevOps
  • Misconceptions of DevOps

DevOps Fundamentals

  • Value stream and value stream mapping
  • The three ways
  • Deployment pipeline
  • Version control
  • Configuration management

DevOps Techniques

  • Sprint events
  • User stories
  • Product backlog
  • Minimum Viable Product
  • Microservices
  • Deployment methods
  • Definition of done
  • Kanban
  • Improvement techniques

DevOps Practical Application

  • Applicability of DevOps
  • Potential issues
  • Multi-modal IT
  • ITIL 4 and DevOps
  • DevOps journey

target_au
  • Senior IT management, IT development staff, IT operations staff, IT process owners, business managers, business process owners
  • Individuals who require an understanding of DevOps and how it can contribute to the success of IT within an organization
  • IT professionals who are working in an organization that has adopted DevOps and need to be informed about DevOps so that they can operate effectively within the organization

pre_req

There are no specific prerequisites for this training, but knowledge and experience of how an IT organization works would be helpful.

Those attending this course could benefit from purchasing and reading the following book: DevOps – A Business Perspective by Oleg Skrynnik


titleImplementing HPE MSA Storage Solutions U4226S
days2
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewHPE MSA hybrid storage solutions provide the entry-point for SAN storage supported by HPE ProLiant servers. HPE MSA storage offers a portfolio of arrays, drives, and options that deliver a common set of features enabling flash-ready hybrid storage systems designed to deliver hands-free, affordable application acceleration for demanding SMB workloads. This course provides in-depth knowledge about HPE MSA storage virtualization capabilities and is perfectly set to equip storage administrators with the tools they need to optimize management, implementation, monitoring and maintenance functions on the HPE MSA storage solution.
objective

After completing this course, you should be able to:

  • Explain positioning, benefits, and features of the HPE MSA family of products
  • Implement HPE MSA virtual storage provisioning
  • Navigate and utilize the HPE MSA Storage Management Utility (SMU)
  • Use HPE MSA virtualized storage features
  • Execute operations via the HPE MSA command line interface (CLI)
  • Perform maintenance and support tasks on MSA systems

outline

Module 0: Course Overview

  • Learning objectives
  • Introductions
  • Course prerequisites
  • Agenda

Module 1: MSA Family Product Overview

  • List the current HPE MSA array generations and models
  • Explain the use cases for implementing HPE MSA storage solution
  • Describe the controller architecture and features that are included with HPE MSA
  • Categorize the various HPE MSA controller models and list their supported configurations
  • Identify the connectivity options for various MSA controllers

Module 2: MSA Virtual Storage

  • Explain the management/monitoring capabilities built-in to the Storage Management Utility (SMU) version 3 and version 4
  • Discuss MSA virtual storage terminology that is part of storage provisioning
    • Page
    • Disk group
    • Tier
    • Pool
    • Read cache
  • Recall the benefits of MSA-DP+ RAID
  • Describe MSA virtual storage automated tiering mechanism
  • Implement MSA virtual storage tier affinity

Module 3: Data Protection on MSA Storage

  • Explain how MSA fault tolerance is implemented for disk or controller failures
  • Discuss the MSA snapshot feature and illustrate the Redirect on Write (RoW) mechanism
  • Explain the volume copy feature and its implementation specifics
  • List the capabilities that are available through the MSA Remote Snapshot Replication feature

Module 4: MSA Maintenance and Support

  • Describe the maintenance tasks to be performed on disk groups and volumes
  • List the ways to track activities and monitor the health status of the MSA
  • Explain the procedure to save log files for troubleshooting complex issues1
  • Get the URL for the MSA Health Check tool
  • Discuss the options to set up notifications from MSA
  • Explain the firmware update process on MSA

 

Lab 0: Accessing the Lab Environment

Lab 1: Configure MSA Virtual Storage with SMU v3

  • Task 1: Verify the management IP address of the HPE MSA storage systems
  • Task 2: Launch HPE Storage Management Utility (SMU) v3
  • Task 3: Create disk groups using SMU v3
  • Task 4: Create volumes and map to hosts using SMU v3
  • Task 5: Install MPIO and initialize the disks in Windows Disk Management
  • Task 6: Map volumes to iSCSI hosts

Lab 2: Configure MSA Virtual Storage with SMU v4

  • Task 1: Initialize the MSA Gen6 via Out of Box Experience(OOBE)
  • Task 2: Storage Management Utility (SMU) V4
  • Task 3: Configure pools and disk groups in SMU v4
  • Task 4: Provision volumes and attach to hosts in SMU v4

Lab 3: Data Protection

  • Task 1: Create snapshots for data protection using SMU v3
  • Task 2: Use snapshots for data recovery in SMU v3
  • Task 3: Create snapshots for data protection using SMU v4
  • Task 4: Use snapshots for data recovery in SMU v4
  • Task 5: Copy volumes or snapshots for data protection

Lab 4: MSA Maintenance and Support

  • Task 1: General system health and event logs
  • Task 2: Set up alert notifications
  • Task 3: Download system logs for troubleshooting
  • Task 4: Perform a firmware upgrade

target_au

HPE MSA customers (current or potential)


pre_req
  • Basic knowledge of Storage Area Networks (SAN) is recommended.
  • Familiarity with Microsoft Windows Server 2012 or higher is an added benefit.

titleHPE Primera II: Monitoring and Replication HM9Q6S
days2
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewThis course provides knowledge of the advanced capabilities of the HPE Primera storage arrays, including lower level data reduction features, reporting, monitoring and alerting, QOS, and local and remote replication options. You gain practical understanding of HPE Primera array capabilities using extensive hands-on lab exercises.
objective

At the end of this course, the learner should be able to:

  • Describe the objectives and purpose of this course
  • Discuss the topics addressed in this course
  • Describe the benefits of data reduction technologies
  • Perform space reclamation
  • Describe data reduction technologies: deduplication, compression, and data packing
  • Perform a data reduction estimation
  • Perform an online virtual volume conversion
  • Describe System Reporter capabilities
  • Use SSMC and the CLI to run reports
  • Use the CLI stat commands to look at realtime statistics
  • Use HPE Primera app volume sets (AppVVset) in performance context
  • Use the SSMC Workload Insights feature for performance reasons to isolate application spikes and trends
  • Understand the SSMC Workload Insights concept of a performance score
  • Understand the advantages of the Topology Insights feature to pinpoint performance bottlenecks
  • Describe basic HPE Primera UI monitoring
  • View, interpret, and manage system events and alerts
  • Use the checkhealth command for troubleshooting
  • Work with alert notifications for System Reporter
  • Monitor and manage the event log
  • Forward events to syslog server
  • Explain SNMP settings and capabilities
  • Describe the SMI-S standard, WBEM initiative, and HPE Primera CIM support
  • Explain REST API use
  • Describe the advantages of Priority Optimization and Quality of Service (QoS)
  • Discuss the performance implications of Priority Optimization
  • Administer Priority Optimization
  • Monitor the impact of Priority Optimization
  • Create a scheduled and immediate snapshot
  • Export a snapshot
  • Perform a recovery using a snapshot
  • Work with a clone
  • Describe the key features, benefits, and advantages of Remote Copy
  • Explain different types of Remote Copy implementations
  • Explain the differences between synchronous and periodic asynchronous replication modes
  • Discuss different failure scenarios
  • Perform a failover of a Remote Copy group
  • Briefly describe data migration, high availability, and disaster tolerance solutions

outline

Module 0: Course Introduction

  • Introduction
  • Course agenda

Module 1: Thin Features and Data Reduction

  • Data reduction introduction and overview
  • Zero-detect and thin persistence
  • Space reclamation on Windows, Linux, VMware®
  • Block alignment
  • Thin persistence technology
  • Compaction and overprovisioning
  • Data reduction technologies
  • Deduplication, compression, and data packaging
  • Savings estimation
  • Online virtual volume conversion (dynamic optimization)

Module 2: Monitoring and Reporting

  • System Reporter introduction
  • Data retention
  • SSMC System Reporter options
  • Types of reports
  • Default reports in SSMC
  • Report controls
  • Report templates
  • Creating historical and real time reports
  • Scheduling/emailing reports
  • CLI reporting
  • Performance view
  • Analytics and workload Insights
  • Application volume sets
  • Topology Insights
  • On-node monitoring overview

Module 3: Events and Alerts

  • Alerts and events overview
  • Managing alerts—SSMC/CLI
  • Managing events—SSMC/CLI
  • Alerts and events tiering
  • Alert spare part notification
  • Syslog support
  • The checkhealth command overview and use
  • Troubleshooting
  • System Reporter performance alerts management
  • SNMP overview
  • SNMP use—MIBs, alert traps
  • SNMP management
  • CIM API overview
  • HPE Primera CIM API
  • About SMI-S
  • CIM standard
  • CIM management
  • REST API overview
  • REST API usage

Module 4: Priority Optimization/QoS

  • Introduction and features
  • How does it work
  • Examples
  • Configurable parameters and their meaning
  • Configuring and managing via SSMC
  • Configuring and managing via CLI
  • Monitoring via SSMC and CLI
  • Summary and best practices

Module 5: Snapshots and Clones

  • Snapshot introduction
  • Snapshot use cases
  • How snapshots work
  • Working with a snapshot using SSMC
  • Working with a snapshot using CLI
  • Clone introduction and how it works
  • Working with a clone using SSMC
  • Working with a clone using CLI

Module 6: Remote Replication

  • Remote Copy introduction
  • Supported protocols
  • Architecture, features and terminology
  • Replication modes
  • Supported maximums
  • Failure scenarios and failover
  • Remote Copy operations
  • Data migration options overview
  • Peer persistence overview
  • HPE Cluster Extension overview
  • VMware vSphere® Site Recovery Manager overview

Appendix 1: What’s New in HPE Primera

  • Remote Copy
  • HPE Primera Remote Copy feature set updates with 4.2
  • Peer motion and online import
  • Online import utility (OIU 2.4 ) .
  • VMware vVOLs support with HPE Primera
  • SSMC 3.7 enhancements
  • InfoSight update

 

Lab outline

Lab 0: vLabs Access and Initial Set up

  • Task 1: Accessing HPE vLabs
  • Task 2: Initial setup
    • Exercise 1: Log in to the HPE StoreServ management console
    • Exercise 2: Configuring hosts
    • Exercise 2a: Adding a host manually using the HBA WWPNs with SSMC
    • Exercise 2b: Adding a host using Host Explorer with SSMC
    • Exercise 3: Install Iometer
    • Exercise 4: Enabling advanced system performance analytics

Lab 1: Online Virtual Volume Conversion and Data Reduction Estimates

  • Exercise 1: Lab set up
  • Exercise 2: Data reduction savings estimate using CLI
    • Estimation analysis results
  • Exercise 3: Online conversion using SSMC

Lab 2: Monitoring and Reporting

  • Exercise 1: Initial lab set up
  • Exercise 2: SSMC default reports
  • Exercise 3: Custom reports using SSMC
    • Physical drives – performance statistic report
    • CPGs – capacity report
    • System capacity report
  • Exercise 4: Realtime information reports
  • Exercise 5: Monitoring app virtual volume sets using dashboard
  • Exercise 6: Using CLI to view real-time performance

Lab 3: Events and Alerts

  • Exercise 1: Viewing alerts (SSMC GUI)
  • Exercise 2: Viewing alerts (CLI)
  • Exercise 3: Viewing tasks (SSMC GUI)
  • Exercise 4: Viewing events (CLI)
  • Exercise 5: Syslog
  • Exercise 6: System Reporter alerts (SSMC GUI)
  • Exercise 7: SNMP traps
  • Exercise 8: Using REST API
    • Part 1—HPE Primera REST preparation and login
    • Part 2—Using the Postman client to create a resource
    • Part 3—Using the Postman client to delete a resource
    • Part 4—Using cURL to manage resources
  • Exercise clean-up

Lab 4: Priority Optimization (QoS)

  • Exercise 1: Initial lab set up
  • Exercise 2: Configuring Priority Optimization using SSMC
  • Exercise 3: Monitoring and managing Priority Optimization using SSMC
  • Exercise 4: Monitoring and managing Priority Optimization using CLI
    • QoS analysis results
    • Additional commands to manage QoS rules

Lab 5: Snapshots and Clones

  • Exercise 1: Initial lab set up
  • Exercise 2: Snapshot file recovery
  • Exercise 3: Snapshot full volume data recovery
  • Exercise 4: Restore data between two snapshots
  • Exercise 5: Schedule snapshots and snapshot expiration policies
    • Create a snapshot policy
    • Create scheduled snapshots using a snapshot policy
    • Exploring scheduled snapshots over time
  • Exercise 6: Create a clone
  • Exercise 7: Create a clone with resynchronization capability
  • Exercise 8: Working with snapshots and clones using CLI

Lab 6: Remote Replication

  • Planning and initial set up of Remote Copy
    • Exercise 1: Lab set up
    • Exercise 2: Verify RCIP ports and configuration set up using SSMC
    • Verifying the RCIP port configuration
    • Remote Copy configuration
    • Exercise 3: Creating and managing Remote Copy groups
    • Exercise 4: Add a volume pair to an existing Remote Copy group
  • Outage Scenarios: Failover to the remote site and failback
    • Exercise 5: Planned failover to the remote site
    • Exercise 6: Recovery of a Remote Copy group after the source system is back online
    • Exercise 7: Restore a Remote Copy group
  • Failover to the remote site for testing or off-site backup
    • Exercise 8: Stop and failover a Remote Copy group
    • Exercise 9: Revert a Remote Copy group and failover again
    • Revert
    • Failover again
    • Exercise 10: Revert the Remote Copy group and replicate in the original direction
    • Exercise 11: Delete a Remote Copy group
    • Exercise 12: Lab clean up
    • Exercise 13: Configuring Remote Copy using CLI

Lab A (Optional): Working with VMware®

  • Exercise 1: Switch between client VMs
  • Exercise 2: Adding the ESXi host and exporting a volume in SSMC
  • Exercise 3: Working with storage using VMware vCenter®

Lab B (Optional) Working with Linux

  • Exercise 1: Switch between client VMs
  • Exercise 2: Adding the RHEL Linux host and export a volume using SSMC
  • Exercise 3: Discovering devices and working with multipathing on the Linux host
  • Exercise 4: Create a partition, add the filesystem, and mount the volume

target_au

Storage administrators who desire additional training on the advanced features of HPE Primera


pre_req

One of the following courses:

  • HM9Q5S: HPE Primera I: Management and Connectivity
  • HN5B2S: Introduction to HPE Primera storage (with extended eLearning)
  • HN5A9S: Introduction to HPE Primera storage

titleHPE Primera I: Management and Connectivity HM9Q5S
days1
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewThe Managing HPE Primera Storage I course provides an overview of the HPE Primera portfolio. The course reviews how to perform common day-to-day management tasks with hands-on labs, including creating the right data efficient volumes on an all-flash HPE Primera array, and leveraging the power of HPE InfoSight. The course prepares learners for deeper follow-on training from HPE, including the HM9Q6S: Managing HPE Primera II course.
objective

After completing this course, the student should be able to:

  • Describe the objectives and purpose of this course
  • Discuss the topics addressed in this course
  • Discuss the HPE Primera family
  • Discuss HPE Primera hardware building blocks
  • Discuss the data-in-place upgrade
  • Describe controller enclosures, nodes, and HBA’s
  • Describe controller node architecture and port numbering
  • Describe high availability features of HPE Primera
  • Discuss HPE Primera software and management options
  • Describe data protection and security features
  • Explain provisioning terminology
  • Understand the concepts of chunklets and logical disks
  • Explain the HPE Primera concept of common provisioning groups (CPG)
  • Explain thin provisioned virtual volumes (VV)
  • Overview HPE Primera data reduction technologies
  • State HPE Primera management options
  • Describe Data Services Cloud Console and steps to onboard HPE Primera
  • Describe HPE Primera initial setup, HPE Primera UI, and customer self-update/repair options
  • Describe on-premises administration tools, features and the third-party integration portfolio
  • Prepare a host to access an HPE Primera storage array
  • Create hosts in an HPE Primera storage array
  • Explain how to add fibre channel (FC) ports to a host
  • Describe iSCSI configuration
  • Explain the advantages of HPE Smart SAN for HPE Primera
  • Export virtual volumes (VV) to a host as VLUNs
  • Unexport virtual volumes (VV) from a host
  • Use SSMC and the CLI to work with hosts and storage
  • Describe the advantages of host sets and volume sets
  • Create and maintain host sets and volume sets using Data Services Cloud Console, SSMC and CLI.
  • Discuss the guidelines and rules regarding host sets and volume sets
  • Describe application volume sets
  • Describe advantages of HPE InfoSight

outline

Module 0: Introduction

  • Course Introduction
  • Course agenda

Module 1: Solution Overview:

  • Part 1—Hardware
    • HPE Primera technical specifications
    • HPE Primera hardware building blocks
    • Data-in-place upgrade
    • HPE Primera persistency and high availability features
  • Part 2—Software and Features
    • Management options overview
    • HPE Primera and HPE 3PAR SSMC
    • HPE Primera storage management—HPE Primera UI
    • HPE Primera command line interface (CLI)
    • Data Services Cloud Console
    • Selected data protection and security features overview
    • HPE Primera leadership—replication
    • Peer persistence
    • HPE Cluster Extension CLX
    • VMware vSphere® disaster recovery with Site Recovery Manager

Module 2: Storage Concepts and Terminology

  • HPE Primera OS virtualization—logical view
  • HPE Primera OS virtualization concepts
  • HPE Primera OS virtualization advantages
  • Chunklet concepts
  • System wide sparing
  • Logical disk concepts
  • HPE Primera high availability
  • Common provisioning group (CPG) concepts
  • Virtual volume overview
  • Thin provisioning overview
  • HPE Primera data reduction overview

Module 3: HPE Primera Management

  • HPE Primera manageability
  • Data Services Cloud Console
  • HPE Primera initial setup and HPE Primera UI
  • Customer self-install
  • Customer self-update option
  • Customer self-repair option
  • HPE Primera application sets
  • Host creation
  • Filtering and sorting
  • Volume actions
  • Snapshots
  • HPE StoreServ Management Console (SSMC)
  • HPE Primera command line interface (CLI)
  • HPE Primera integration portfolio overview

Module 4: Host Connectivity and Storage

  • Host to HPE Primera front-end configuration: fibre channel (FC) example
  • HPE Primera block I/O connectivity
  • HPE Primera persistent ports
  • HPE Primera OS 4.x host OS support
  • Host bus adapters (HBAs) and worldwide names (WWN)s
  • HPE Primera—iSCSI support
  • HPE Smart SAN for HPE Primera
  • HPE Primera zoning overview
  • HPE Smart SAN for HPE Primera overview
  • Adding hosts in SSMC: Smart SAN
  • Making VLUNs visible to hosts
  • HPE Host Explorer
  • HPE LunInfo
  • Host configuration and storage allocation

Module 5: Host, Volume, and App Volume Sets

  • Host sets and virtual volume sets overview and advantage
  • Virtual volume set—other use cases
  • Host sets and virtual volume sets— SSMC and CLI examples
  • Data Services Cloud Console—host group and volumes
  • App volume sets overview
  • App volume sets— SSMC examples
  • SSMC dashboard—top app vol sets
  • App sets vs virtual volume (VV)sets

Module 6: HPE InfoSight Introduction

  • HPE InfoSight sees and predicts behind the scene
  • Get the full picture with HPE Primera and HPE InfoSight
  • The artificial intelligence (AI) process for HPE self-healing storage
  • HPE InfoSight—artificial intelligence operations (AIOps)
  • HPE Primera—PDF report
  • HPE InfoSight cross-stack analytics for VMware environments
  • HPE Primera UI—HPE InfoSight software recommendations
  • Managing HPE Primera software updates
  • HPE Primera wellness filters
  • HPE InfoSight unified tenancy

Appendix 1: HPE Primera Virtual Domains

  • HPE Virtual Domains software
  • HPE Virtual Domains for multitenancy security
  • What are the benefits of virtual domains?
  • Priority Optimization

 

Detailed lab outline

Lab 0: HPE vLabs Access

  • Task 1: Accessing the HPE vLab

Lab 1: Working with SSMC and CLI

  • Exercise 1: Reviewing the SSMC GUI and online help
  • Exercise 2: Reviewing the dashboard and changing output views
  • Exercise 3: Accessing the SSMC settings screen
  • Exercise 4: Adding a user
  • Exercise 5: Working with the SSMC activity screen
  • Exercise 6: SSMC hardware introduction
  • Exercise 7: Launching the CLI

Lab 2: Storage Configuration

  • Exercise 1: Log in to SSMC
  • Exercise 2: Working with CPGs in SSMC
  • Exercise 3: Working with virtual volumes (VV) in SSMC
    • Exercise 3-1: Creating thin provisioned virtual volumes
    • Exercise 3-2: Creating thin volumes (TPVV) with data reduction enabled
    • Exercise 3-3: Creating multiple virtual volumes using a count
    • Exercise 3-4: Displaying/editing/removing virtual volumes
  • Exercise 4: Working with VVs using the CLI

Lab 3: Host Configuration and Storage Allocation

  • Exercise 1: Identify the HBA type (Windows)
  • Exercise 2: Determining host port WWNs
  • Exercise 3: Adding a host using HBA WWNs in SSMC
    • Exercise 3-A: Adding a host using Host Explorer in SSMC
    • Exercise 3-B: Adding a host manually using HBA WWNs in SSMC
  • Exercise 4: Export/unexport VLUNs in SSMC
  • Exercise 5: Windows host configuration formatting and mounting VLUNs
  • Exercise 6: Online virtual volume increase
  • Exercise 7: Working with default reports
  • Exercise 8: Working with HPE LUNInfo for HPE Primera and HPE 3PAR
  • Exercise 9: Working with hosts and storage using the CLI

Lab 4: Host, Volume and App Volume Sets

  • Exercise 1: Working with host sets and virtual volume sets
    • Exercise 1-1: Working with host sets in SSMC
    • Exercise 1-2: Working with virtual volume sets in SSMC
    • Exercise 1-3: Export virtual volume sets to hosts sets in SSMC
    • Exercise 1-4: Unexport virtual volume sets from hosts sets in SSMC
    • Exercise 1-5: Delete virtual volume sets and hosts sets in SSMC
  • Exercise 2: Working with app volume sets using SSMC
  • Exercise 3: Working with host sets and volume sets using CLI

Lab 5: Using HPE InfoSight

  • Exercise 1: Logging in and dashboard
  • Exercise 2: Access HPE InfoSight support
  • Exercise 3: Array overview
  • Exercise 4: Physical disk details
  • Exercise 5: Reports
  • Exercise 6: HPE InfoSight scenarios (optional)
    • Exercise 6-1: Health check
    • Exercise 6-2: Planning for growth
    • Exercise 6-3: Using HPE InfoSight to troubleshoot

target_au

Customers, administrators and channel partner sales or technical sales


pre_req
  • An understanding of general storage concepts including fibre channel technology and RAID
  • Operator level functionality in a Windows environment

titleDesigning HPE Hybrid IT Solutions Rev. 19.21 (01122327) H9TJ5S
days5
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewThe Designing HPE Hybrid IT Solutions 19.21 course teaches students the intermediate level skills to plan, design, recommend, and demonstrate HPE Hybrid IT solutions and deliver a proof-of-concept for a given solution to a customer. The course includes lectures and activities in the ratio of approximately 25/75 (lecture/activities). Activities include sizing exercises using tools available from sources such as the HPE Partner Portal and exercises using HPE emulators.
objective

Upon successful completion of this course, you should be able to:

  • Describe, differentiate and apply industry standard architectures and technologies
  • Gather and analyze customer business and technical requirements
  • Recommend and position HPE Hybrid IT products, solutions, tools, and appropriate services for customer use cases
  • Architect and design an HPE solution based on customer needs
  • Present and demonstrate the solution to the customer and coordinate implementation planning

outline

Module 1: Introduction to a Hybrid World

  • An introduction to reference architectures and reference configurations
  • Activity: Synergy and 3PAR Reference Architectures
  • HPE overview
  • HPE Hybrid IT
  • Activity: Navigating the Hybrid IT portfolio at the HPE website

Module 2: Architecting and Designing Hybrid IT Solutions

  • Assessing the customer’s requirements and environment
  • Selecting the HPE platform
  • HPE tools for selecting solution components, including demos of
    • HPE Switch Selector
    • SSD Storage Selector
    • HPE Storage Sizer
    • HPE OneConfig Advanced
    • HPE 3PAR NinjaSTARS
  • Developing the proposal
  • Solution installation, configuration, and setup
  • Activity: Lab exercise (emulator)—Monitoring storage with HPE InfoSight

Module 3: Recommending Hybrid IT Compute Solutions for Customer Use Cases

  • HPE has it all
  • Customer scenario 1: Microsoft Exchange Server 2016 on HPE ProLiant DL380 Gen10 Server
    • Introducing the customer and customer requirements
    • Activity: Information resources
    • Reference Architecture
    • Exchange 2016 Preferred Architecture
    • Exchange Server Role Requirements Calculator
    • Ask the Perf Guy—Sizing Exchange 2016 Deployments
  • Building blocks of the solution
  • Security in HPE servers
  • Management tools, including activities
    • Activity: ProLiant server management technologies
    • Activity: Preboot environment
    • Demo: UEFI System Utilities and UEFI Shell
    • Activity: Performing basic shell operations in UEFI
  • HPE rack and power, including activities
    • Activity: HPE Reference Architecture for Microsoft Exchange Server 2016 on HPE ProLiant DL380 Gen10 Server
    • HPE Sizer for Exchange Server 2016
  • Alternative servers for smaller environments
  • Customer scenario 2: HPE Reference Architecture for Microsoft SQL Server 2017 on Red Hat Enterprise Linux with HPE ProLiant DL560 Gen10
    • Introducing the customer and customer requirements
    • Activity: Information resources
    • HPE Reference Architecture for Microsoft SQL Server 2017 on Red Hat Enterprise Linux with HPE ProLiant DL560 Gen10
    • The Exchange 2016 Preferred Architecture
    • ProLiant DL560 Gen10 Server QuickSpecs
    • Workload-based Performance and Tuning Guide for Gen10 servers and HPE Synergy
    • Operating System Support Matrix
  • Building blocks of the solution
  • Processors in HPE servers
  • Memory for HPE servers, including activities
    • Activity: HPE Persistent Memory
    • Demo: Memory configurator
  • Management tools, including activities
    • Activity: Full control over all user interfaces [iLO5]
    • Demo: Intelligent Provisioning
    • Demo: Smart Storage Administrator
    • Activity: HPE Reference Architecture for Microsoft SQL Server 2017 on Red Hat Enterprise Linux with HPE ProLiant DL560 Gen10
  • Alternative servers for smaller environments
  • Activity: Lab exercise (emulator)—Configuring ProLiant Gen10 and iLO 5 security

Module 4: Recommending HPE Data Center Networking Solutions for Customer Use Cases

  • Customer scenario 3: Optimize data center networking with Cloud-First approach
  • Introducing the customer and customer requirements
  • Activity: Information resources
    • HPE Cloud-First Reference Architecture Guide—2000 servers
    • HPE FlexFabric 12900E QuickSpecs
    • HPE FlexFabric 5940 QuickSpecs
  • Building blocks of the solution
  • Networking technologies and architectures
  • Management tools, including activities
  • Alternative components for smaller environments
  • Activity: Lab exercise (emulator)—Configuring HPE networking
  • Activity: Lab exercise (emulator)—Working with HPE Composable Fabric (Plexxi)

Module 5: Recommending Hybrid IT Storage Solutions for Customer Use Cases

  • Customer scenario 4: Red Hat OpenShift on HPE Synergy and HPE Nimble Storage
  • Introducing the customer and customer requirements
  • Activity: Information resources
    • HPE Reference Configuration for Red Hat OpenShift on HPE Synergy and HPE Nimble Storage
    • HPE Deployment Guide for Red Hat OpenShift Container Platform on HPE Synergy with HPE Nimble Storage
    • RHEL OpenShift Container Platform: Sizing Considerations
  • Building blocks of the solution
  • Management tools, including activities

Module 6: Recommending HPE Software-Defined and Cloud Solutions for Customer Use Cases

  • Customer scenario 6: Red Hat OpenShift on HPE Synergy and HPE Nimble Storage
    • Introducing the customer and customer requirements
    • Activity: Information resources
    • HPE Reference Configuration for Red Hat OpenShift on HPE Synergy and HPE Nimble Storage
    • HPE Deployment Guide for Red Hat OpenShift Container Platform on HPE Synergy with HPE Nimble Storage
    • RHEL OpenShift Container Platform: Sizing Considerations
  • Building blocks of the solution
    • HPE Synergy
  • Management tools, including activities
    • Activity: HPE Reference Configuration for Red Hat OpenShift on HPE Synergy and HPE Nimble Storage
  • Alternative components for different environments
  • Customer scenario 7: HPE ProLiant for Microsoft Azure Stack data protection with Veritas NetBackup, HPE StoreOnce, and Cloud Bank Storage
    • Introducing the customer and customer requirements
  • HPE Reference Architecture on VMware Cloud Foundation on HPE Synergy Reference Architecture
  • Software-defined infrastructure
  • Building blocks of the solution
    • HPE Synergy
  • HPE networking
  • Management tools
  • HPE RESTful API and PowerShell cmdlets, including activities
  • Activity: HPE Reference Architecture for VMware Cloud Foundation on HPE Synergy
  • Activity: Lab exercise (emulator)—Configuring composable infrastructure
  • Activity:Lab exercise (emulator)—Managing server, networking, and storage datacenter components with HPE OneView
  • Activity:Lab exercise (emulator)—Using HPE OneView Global Dashboard
  • Activity: Lab exercise (emulator)—Using PowerShell cmdlets to manage data center infrastructure
  • Activity: Lab exercise (emulator)—Using REST API for automation and integration
    • Activity: Information resources
    • HPE Nimble Storage
    • HPE FlexFabric
    • Storage technologies
    • Activity: HPE Reference Configuration for Red
    • Activity: HPE Cloud-First Reference Architecture Guide—2000 Servers Hat OpenShift on HPE Synergy

Module 7: Recommending Hybrid IT Hyperconverged Solutions for Customer Use Cases

  • Customer scenario 8: VMware Horizon on HPE SimpliVity 380 Gen10
    • Introducing the customer and customer requirements
    • Activity: Information resources
    • HPE Reference Architecture for VMware Horizon on HPE SimpliVity 380 Gen10
    • HPE SimpliVity 380 Gen10 QuickSpecs
    • HPE SimpliVity 2600 Gen10 QuickSpecs)
    • Activity: HPE SimpliVity efficiency
    • Industry standard architectures and drivers
  • Building blocks of the solution
  • Management tools, including activities
    • Activity: HPE Reference Architecture for VMware Horizon on HPE SimpliVity 380 Gen10
  • Alternative servers for other environments
  • Data virtualization platform

Module 8: Recommending HPE Density and Mission Critical Solutions for Customer Use Cases

  • Customer Scenario 9: Artificial Intelligence on HPE Elastic Platform for Analytics
    • Introducing the customer and customer requirements
    • Activity: Information resources
    • HPE Reference Architecture for AI on HPE Elastic Platform for Analytics (EPA) with TensorFlow and Spark
    • HPE Reference Configuration for Elastic Platform for Analytics (EPA)
    • HPE EPA Sizing Tool
  • Building blocks of the solution
  • High performance computing
  • Big data
  • HPE services
  • Management tools, including activities
    • Activity: HPE Sizer for the Elastic Platform for Analytics
  • Alternative servers for different environments
  • Customer scenario 10: HPE Reference Architecture for Oracle 18c OLTP and OLAP workloads on HPE Superdome Flex and HPE 3PAR Storage Reference Architecture
    • Introducing the customer and customer requirements
    • Activity: Information resources
    • HPE Reference Architecture for Oracle 18c OLTP and OLAP workloads on HPE Superdome Flex and HPE 3PAR Storage
    • HPE Superdome Flex Quickspecs,
    • HPE Superdome Flex server architecture and RAS
  • Building blocks of the solution
  • Management tools, including activities
    • Activity: Design Superdome Flex solution
  • Activity: Lab exercise (emulator)—Working with HPE Superdome Flex

Module 9: Validating and Presenting the Solution

  • Customer scenario: Configuring infrastructure for virtualization
    • Introducing the customer and customer requirements
    • Activity: Configuring infrastructure for virtualization and presenting recommended solution

target_au

The ideal candidate typically has a minimum of three years of design and/or operational experience or the equivalent in at least one of the core HPE areas (server, storage, networking), and six months design and/or operational experience in other HPE solutions and technologies.


pre_req

HPE ATP—Hybrid IT Solutions V1, or the Building HPE Hybrid IT Solutions , Rev. 18.41 (01120590) course


titleBuilding HPE Hybrid IT Solutions, Rev. 19.41 (01127445) H6LJ6S
days5
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewThe Building HPE Hybrid IT Solutions 19.41 includes lectures and activities in the ratio of approximately 25/75 (lecture/activities). This course is designed to expose participants to the fundamental principles required to architect hybrid IT solutions. The course focuses on HPE networking, server, and storage solutions for SMB customers. Through the use of customer scenarios and extensive hands-on labs, participants learn how to set up and configure a small data center to meet specific customer requirements.
objective

After you successfully complete this course, you should be able to:

  • Describe, differentiate, and apply industry standard, foundational SMB architectures, and technologies
  • Differentiate the functions, features, and capabilities of HPE product and solution specific components and offerings
  • Recommend and position HPE SMB products, solutions, and appropriate services for customer use cases (positioning/use cases)
  • Evaluate customer environment, and plan and design solutions using the HPE SMB portfolio to meet customer business requirements
  • Validate, install, configure, and upgrade HPE SMB solutions and their components
  • Troubleshoot and diagnose issues with HPE SMB solution components
  • Manage, monitor, administer, and operate HPE SMB solution components

outline

Describe, differentiate, and apply industry standard, foundational SMB architectures and technologies

  • Identify and describe processor technologies and describe their use cases
  • Identify and describe memory technologies and use cases
  • Identify and describe storage technologies and use cases
  • Identify and describe network technologies and their use cases
  • Identify and describe system management technologies and use cases
  • Identify and describe rack and power technologies and considerations

Differentiate the functions, features, and capabilities of HPE product and solution specific components and offerings

  • Describe the differences among HPE server solutions and the workloads for which they are optimized
  • Describe the differences among HPE storage solutions and the workloads for which they are optimized
  • Describe the differences among HPE networking solutions and the workloads for which they are optimized
  • Describe the differences among HPE management options

Recommend and position HPE SMB products, solutions, and appropriate services for customer use cases

  • Recommend an HPE server based on a customer workload
  • Given customer requirements/workload, identify the correct storage solution (HPE StoreOnce, HPE MSA, HPE Nimble)
  • Given a set of customer requirements, recommend the appropriate network solution
  • Given a customer need, which management tool should you recommend?
  • Explain the services offered by HPE as they apply to a data center infrastructure

Evaluate customer environment, and plan and design solutions using the HPE SMB portfolio to meet customer business requirements

  • Identify and describe planning, design and sizing tools and when to use them
  • Discover a customer’s business, technical requirements and the competitive landscape
  • Design the solution within the given constraints to meet customer business and technical objectives
  • Validate design, get sign-off, and document solution

Validate, install, configure, and upgradeHPE SMB solutions and their components

  • Perform the physical installation process
  • Configure each solution and subsystem
  • Validate that install/configuration is successful
  • Upgrade the solution and/or its subsystems

Troubleshoot and repair HPE SMB solution components.

  • Describe investigative steps and their importance
  • Identify and describe troubleshooting tools and their use cases
  • Troubleshoot issues
  • Perform repair/replace procedures
  • Apply proactive maintenance

Manage, monitor, administer, and operate HPE SMB solutions and their components.

  • Identify and describe management and administration tools and when to use them
  • Perform management and monitoring tasks
  • Administer and operate the solutions

target_au

Typical candidates for this course are IT professionals and solution architects who will design and plan solutions based on HPE products and solutions.


pre_req

None


titleCloud Computing Foundation HL973S
days2
seo_title
seo_dec
seo_tkey
categorycloud-computing
vendorHP

techonogyCloud Computing
overviewMany businesses and enterprises have embarked on a transformation journey to become more efficient, innovative and competitive. This transformation journey is from traditional, on-premise IT to a more service-focused, agile, and elastic environment called the cloud. This course covers foundational topics related to the cloud, including the disruptive waves and opportunities in today’s economy, cloud definition and benefits, and the steps to plan and transform your enterprise into an on-demand infrastructure. Experienced HPE instructors also share expert opinion on cloud opportunities, as well as the technologies, solutions, and services provided by cloud models to help the journey.
objective

After completing this course, students will be able to:

  • Describe the major trends in today’s economy that are changing business and IT, including what it takes to enable your enterprise for digital transformation
  • Explain the problems with traditional IT infrastructures and introduce the benefits and advantages of cloud computing
  • List and describe both pros and cons associated with cloud computing
  • Define major terms and concepts used with the cloud
  • Define and position the functional cloud reference architecture
  • Introduce OpenStack® technology
  • Explain how to develop a successful cloud strategy
  • Describe the HPE approach to cloud computing

outline

Module 0: Course Introduction

  • Class logistics and objectives
  • Course agenda
  • Introductions

Module 1: Enabling Enterprises for Digital Transformation

  • Describe the major trends that are changing business and IT
  • Name the four transformation areas customers are undertaking, and explain their challenges and objectives

Module 2: Moving to Cloud Computing

  • Explain how IT is becoming a utility and what cloud computing is at a high level
  • List and describe the advantages of cloud computing
  • List and describe the challenges and concerns with cloud computing
  • Explain when not to move to a public cloud
  • Describe cloud economics

Module 3: Defining Cloud Computing

  • Describe cloud, using your own understanding and definitions from Gartner, NIST, and Forrester
  • List, describe, and distinguish between cloud service modelsand cloud deployment models
  • List and define the key terms used in cloud computing

Module 4: Understanding the Functional Cloud Reference Architecture

  • Describe the purpose and components of the functional cloud reference architecture, including the cloud operations plane and the governance and management plane
  • Explain what infrastructure convergence is and its relationship to the cloud
  • Explain the business value of a converged infrastructure
  • List and describe the characteristics and requirements of a converged infrastructure
  • Explain how converged infrastructure building blocks drive simplicity across a modern data center

Module 5: Introducing OpenStack®

  • Explain how open source software is becoming the new standard for infrastructure, operating systems, and applications
  • Describe and position OpenStack, and explain how OpenStack cloud software meets today’s customer requirements
  • Describe high-level OpenStack architecture and list and describe OpenStack projects
  • Demonstrate navigating through public OpenStack resources
  • Explain HPE involvement with OpenStack and how it contributes to the OpenStack community

Module 6: Forming a Cloud Strategy

  • List and describe the general considerations for developing your cloud strategy
  • As a case study, describe and position the U.S. government’s decision framework for cloud migration
  • Explain how to deal with the management of change

Module 7: Executing Your Cloud Strategy

  • Describe how to choose the right cloud solution
  • Discuss different on-ramps to the cloud
  • Explain the purpose of maturity models and assessment services
  • Address cloud security
  • List and describe best practices for managing cloud services

Module 8: HPE’s Approach to the Cloud

  • Using typical transformation scenarios, explain what typical customers go through when moving toward hybrid infrastructure and on-demand IT
  • Use customer testimonials to describe how enterprises are moving forward to a hybrid infrastructure using HPE technologies
  • Explain the HPE GreenLake cloud solution, then list and describe the products and services representing each major category

target_au

This course is intended for anyone who has a limited knowledge of cloud technologies and wants to learn more about cloud fundamentals, vendor-neutral technologies such as OpenStack®, and HPE cloud solutions.


pre_req
titleManaging HPE StoreOnce Backup Solutions HK766S
days2
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewManaging HPE StoreOnce Backup Solutions covers the HPE StoreOnce backup products, including single node appliances, clustered appliances, and the Virtual SAN Appliance (VSA). In this course, we discuss the range of products in the product line, and explain concepts, installation, and use. The course includes hands-on labs using HPE StoreOnce appliances. This course is updated to include the new, advanced features of the products.
objective

After completing this course, students will be able to:

  • Describe major hardware and software components of the HPE StoreOnce product line
  • Describe important HPE StoreOnce product concepts
  • Explain the importance and advantages of deduplication
  • Configure HPE StoreOnce devices for initial use
  • Create Virtual Tape Libraries (VTL) and NAS shares
  • Configure replication between two HPE StoreOnce devices
  • Configure HPE StoreOnce Catalyst Stores
  • Perform basic troubleshooting and maintenance procedures

outline

Module 0: Managing HPE StoreOnce Backup Solutions

  • Course introduction
  • Managing HPE StoreOnce Solutions class agenda

Module 1: Product Introduction

  • HPE StoreOnce backup systems
  • New HPE StoreOnce product features and benefits
  • HPE StoreOnce family comparison—features in HPE StoreOnce models

Module 2: Installation

  • Installing HPE StoreOnce devices
  • Available connections
  • Network/iSCSI modes of operation
  • Single port and dual port modes
  • Fibre channel
  • Initial configuration process
  • HPE StoreOnce Gen4 firmware

Module 3: Web Management Interface

  • HPE StoreOnce GUI
  • HPE StoreOnce GUI—left-hand menu
  • HPE StoreOnce GUI—federation dashboard
  • HPE StoreOnce GUI—system dashboard
  • HPE StoreOnce GUI—event log
  • HPE StoreOnce GUI—settings
  • HPE StoreOnce GUI—hardware
  • HPE StoreOnce GUI—settings – security

Module 4: Virtual Tape Libraries

  • HPE StoreOnce (D2D) backup systems
  • Choosing VTL vs. NAS
  • Virtual Tape Libraries (VTL)
  • iSCSI and fibre channel connections to VTL
  • Flexible emulations

Module 5: Basic HPE StoreOnce Catalyst

  • HPE StoreOnce Catalyst overview and API
  • ISV control of replication
  • HPE StoreOnce Catalyst with Veeam
  • HPE StoreOnce Catalyst with Commvault
  • HPE StoreOnce Catalyst in Data Protector
  • Deduplication options for low and high bandwidth transfers
  • What is new in Catalyst?

Module 6: NAS Shares

  • NAS shares and server configuration
  • NAS share authentication
  • HPE StoreOnce NAS limitations

Module 7: HPE StoreOnce Deduplication

  • Deduplication—what is it and key benefits?
  • Deduplication—data locality and ratios
  • Housekeeping

Module 8: Replication of VTL and NAS Shares and HPE StoreOnce Catalyst Copy

  • Definition and replication granularity
  • Replication fan-out and fan-in
  • Bi-directional replication
  • Seeding the replication target
  • HPE StoreOnce Catalyst Copy
  • Replication recovery
  • Making replication targets visible to host
  • NAS replication and ‘seeding’
  • VTL and NAS replication and configuration
  • Low-bandwidth—multi-hop

Module 9: HPE StoreOnce Reporting and Appliance Federation

  • Reporting
  • Device selection example
  • Viewing reports
  • HPE Infosight
  • Next generation HPE StoreOnce—management federation
  • Overlapping federation scenario
  • Creating a federation
  • Different federation topologies
  • Recommended networking topology
  • System dashboard
  • HPE StoreOnce High Availability Manager overview

Module 10: Cloud Bank and HPE StoreOnce Catalyst Advanced Features

  • HPE StoreOnce Catalyst Cloud Bank and advanced features
  • CloudBank use cases
  • CloudBank configuration
  • CloudBank disaster recovery
  • HPE StoreOnce Catalyst Copy over fibre channel
  • HPE StoreOnceCatalyst Copy over fibre channel—use cases

Module 11: Best Practices

  • General best practices
  • Flexible emulations best practices
  • HPE StoreOnce replication best practices
  • NAS share best practices
  • Physical tape offload methods
  • Security
  • Active Directory

Module 12: Troubleshooting and Remote Support

  • Backup or disk space problems
  • Capacity thresholds
  • Remote support via STATS (RSvS)
  • Tools and updates
  • Configuration and software updates—improved processes
  • HPE StoreOnce Gen4 software upgrade
  • REST API developer kit
  • Reference documentation

Appendix A: StoreOnce Generation 3

  • HPE StoreOnce portfolio—comparing Gen4 and Gen3
  • HPE StoreOnce emulation specifications
  • HPE StoreOnce—web management GUI
  • HPE StoreOnce integrated graphical reporting
  • Discuss HPE StoreOnce B6000 operations
  • HPE StoreOnce B6000 terminology

Appendix B: HPE StoreOnce Recovery Manager Central (RMC)

  • HPE StoreOnce Recovery Manager Central—key benefits
  • What is HPE StoreOnce Recovery Manager Central (RMC)?
  • HPE StoreOnce Recovery Manager Central concepts and components
  • HPE StoreOnce Recovery Manager Central architecture
  • Element Recovery (ERT) with HPE StoreOnce data path
  • HPE StoreOnce Recovery Manager Central data protection deployment
  • HPE 3PAR/HPE StoreOnce storage integration
  • What is new in HPE StoreOnce Recovery Manager Central?

Appendix C: High Availability Manager

  • High Availability Manager overview (version 4.2)
  • High Availability Manager concept
  • High Availability Manager limits
  • Validation pre-checks
  • Monitored status
  • High Availability Manager Warranty Serial

Number (WSN)

  • High Availability Manager failover check
  • High Availability VSA—failover triggers
  • Logging for High Availability Manager

 

lab outline

Lab 1: Configure an HPE StoreOnce backup system with storage and first-time configuration

Lab 2: Configure the HPE StoreOnce backup system

  • License the HPE StoreOnce appliance

Lab 3: Backup to a VTL on HPE StoreOnce using Veeam and NAS using Windows backup

  • HPE StoreOnce configuration using the management GUI
  • Creating a NAS share

Lab 3a: Back up to a VTL on the HPE StoreOnce using Veeam

Lab 3b. Back up the files in Veeam

  • Let’s do more backups

Lab 4: Data deduplication

Lab 5: Use the HPE StoreOnce GUI to create a HPE StoreOnce Catalyst Store and add it to Veeam as a backup repository

  • Introduction to HPE StoreOnce Catalyst
  • Terminology
  • Hands-on lab introduction
  • Hands-on lab sequence
  • HPE StoreOnce Catalyst licensing
  • Add the HPE StoreOnce Catalyst Store to Veeam and perform backups
  • Create a backup job to back up data to an HPE StoreOnce Catalyst store

Lab 6: Data replication

  • Overview
  • Creating VTL and NAS shares on the target replication appliance
  • Configure replication from your local HPE StoreOnce appliance
  • Virtual tape library (VTL) mapping
  • Configure replication of all the files on the NAS share
  • Testing the replication of NAS and VTL

Lab 7: HPE StoreOnce Catalyst Copy within Veeam

Lab 8: Reports and federation

  • Custom graphs
  • Federation

target_au

HPE StoreOnce customers, HPE services field engineers, call center personnel, presales and channel partners, and other field personnel who provide installation and/or operational support assistance


pre_req

Before attending this course, students must have:

  • Basic Windows administration experience
  • Basic understanding of SCSI, iSCSI, RAID, fibre channel, backup, and SAN technologies

titleHPE Storage: Containers and Automation HN5A3S
days2
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewThis course provides hands-on learning for developers and administrators who create automation and integration applications. The course focuses on:
  • Automating container applications using HPE storage arrays
  • HPE modules for Ansible-enabled automated storage provisioning
  • SDK to communicate with the HPE storage array over the WSAPI REST interface
  • Container Storage Interface that provides persistent storage for your containerized applications and popular container platforms like Docker, Kubernetes, and OpenShift
  • Tools and techniques to automate deployment of an application in Kubernetes with persistent storage

objective

Upon completion of this course, students will be able to:

  • Demonstrate the use of the WSAPI REST interface
  • Describe the use of storage in a Docker environment
  • Configure a Kubernetes environment that uses HPE Primera/HPE 3PAR or HPE Nimble Storage
  • Deploy applications that use persistent volumes in a Kubernetes environment

outline

Module 0: Course Overview

  • Course overview and objectives
  • Course benefits

Module 1: Overview of Automating HPE Storage for a Container Environment

  • Benefits of HPE storage for containers
  • Containers and storage plugins overview
    • Challenges in providing storage in a container environment
    • Use cases—DevOps CI/CD pipeline, IT operations, lift and shift, CaaS
    • Storage operations for containers
    • The need for a storage plug-in

 

Module 2: Using the Storage API

  • Storage API objects overview
  • Using the API for storage management
  • Exercise: Using Curl to make API calls to storage API
  • Exercise: Creating scripts to manage storage using the API

Module 3: Using PowerShell

  • Overview of PowerShell
  • Using PowerShell Invoke-RestMethod to access the storage API
  • Exercise: Create and run PowerShell scripts to access the storage API
  • Exercise: Install and use an HPE storage PowerShell toolkit to create scripts

Module 4: Using Ansible Automation for Storage Management

  • Installing and configuring Ansible modules for storage
  • Creating and managing storage volumes using Ansible playbooks
  • Exercise: Orchestrating storage with Ansible playbooks

Module 5: Docker and Storage

  • Docker and storage overview
  • Storage operations in Docker
    • Creating and managing volumes
    • File sharing operations
    • Cloning and snapshots
    • Troubleshooting storage in Docker

Module 6: Kubernetes and Storage

  • Kubernetes overview
    • Overview of the Kubernetes environment and architecture
    • Use cases for persistent storage
  • Storage in Kubernetes
    • HPE storage platforms for Kubernetes
    • Creating persistent storage
    • Managing the containerized volume plug-in
  • Storage plugins for Kubernetes
    • FlexVolume driver
    • Container Storage Interface
    • Exercise: Installing the Container Storage Interface for Kubernetes
  • Automated storage provisioning
    • Configuring automated volume management in Kubernetes
    • Exercise: Configuring automated volume management in Kubernetes
    • Deploying applications with automated volume creation and attachment
    • Common controls for persistent storage
    • Dynamic provisioning for Kubernetes
    • Access modes for PVCs
    • Advanced policy-based provisioning
    • Self-service zero-copy clones of PVCs
    • Setting the default storage class
  • Exercise: Creating persistent volume claims
  • Exercise: Setting the default storage class
  • Exercise: Deploying an application with automated volume creation and attachment
  • Exercise: Volume replication, backup and recovery operations
  • Exercise: Using storage in a CI/CD environment
  • Exercise: Using the NFS Server Provisioner for the HPE CSI
  • Exercise: Using host-based volume encryption

 

lab outline

Lab Exercise Overview Part 1: Using the HPE Storage APIs

  • Lab 1: Using the REST APIs with Linux and Curl
  • Lab 2: Using PowerShell scripts to allocate storage
  • Lab 3: Using Ansible with HPE storage

Part 2: Automating HPE storage for applications with Kubernetes

  • Lab 4: Deploying the HPE Container Storage Interface for Kubernetes
  • Lab 5: Configuring automated volume management in Kubernetes
  • Lab 6: Creating persistent volume claims
  • Lab 7: Setting the default storage class
  • Lab 8: Deploying an application with automated volume creation and attachment
  • Lab 9: Creating a snapshot and a clone
  • Lab 10: Storage in a CI/CD environment
  • Lab 11: Using the NFS Server Provisioner for the HPE CSI
  • Lab 12: Using host-based volume encryption

target_au

Developers and administrators who create automation and integration applications


pre_req

Prior to this course, students should have experience with:

  • Basic storage concepts
  • Virtualization concepts, including Docker and Kubernetes
  • Scripting or coding

titleHPE Nimble II: Remote Replication and Integrations HJ7C6S
days2
seo_title
seo_dec
seo_tkey
categorystorage-networking
vendorHP

techonogyDatacenter & Virtualization
overviewThis course provides additional knowledge of the advanced capabilities of HPE Nimble Storage arrays, including multi-array groups and pools, replication, disaster recovery, VMware® vVols, configuration of syslog and SNMP trap forwarding, and audit logs and event logs. Using extensive hands-on lab exercises that comprise over 70% of the course, you gain a practical understanding of HPE Nimble Storage integration with Microsoft Windows, Linux, VMware, Veeam, and Commvault.
objective

Upon completion of this course, students will be able to:

  • Review HPE Nimble Storage topics
  • Discuss and understand disaster terminology
  • Describe, configure and perform replication between groups for both planned and unplanned disaster recovery scenarios
  • Discuss peer persistence
  • Discuss and perform advanced administration features, including volume performance settings, SNMP, deduplication, encryption, and more
  • Configure and manage multi-member groups, storage pools and discuss scale-up and scale- out guidelines and requirements
  • Configure and perform volume moves between pools, and volume striping in a multi-member pool
  • Discuss network considerations, networking best practices and scenarios for HPE Nimble Storage
  • Describe integrations with Windows, Linux, VMware, Veeam, and Commvault

outline

Module 1: Course Introduction

  • Agenda
  • Course topics review
  • Access to array documentation

Module 2: Architecture and Advanced Features

  • AF-Series read and write operations
  • HF-Series read and write operations
  • HPE Nimble OS architecture
  • Triple+Parity RAID
  • Integrated spare rebuild operations
  • Deduplication and compression review
  • Volume pinning
  • Quality of service (QOS)
  • SmartSecure encryption
  • Data Services Cloud Console

Module 3: HPE Nimble Storage Replication and Peer Persistence

  • Business continuity (BC) and disaster recovery (DR) basics (planning, RPO, RTO, etc.)
  • Replication introduction
  • Replication use cases
  • Replication components
  • Replication considerations
  • SmartReplicate disaster recovery
  • Peer persistence architecture and operations

Module 4: Scale-out, Multi-Array Groups and Pools

  • Scale-to-fit review
  • Scale-out management groups
  • Scale-out pools
  • Scale-out operations
  • Scale-out limitations and rules
  • Group merge
  • Host operation in pools
  • Multi-array groups and pools

Module 5: Windows Integration

  • HPE Storage Toolkit and HPE Storage Connection Manager review
  • Microsoft Volume Shadow-Copy Service (VSS) overview
  • VSS components
  • VSS in use on HPE Nimble
  • Powershell CMDlets
  • Diagnostics utility
  • Space reclamation

Module 6: Linux Integration, Oracle and Docker Integration

  • HPE Nimble Storage Linux Toolkit (NLT)
  • HPE Nimble Storage Connection Manager (NCM) for Linux
  • HPE Nimble Storage Oracle Application Data Manager
  • HPE Nimble Host Tuning Utility (Nimbletune)
  • Linux space reclamation

Module 7: VMware Integration

  • VMware integration features
  • HPE Nimble Storage Connection Manager (NCM) for VMware
  • VMware vCenter® integration
  • vStorage APIs and space reclamation
  • Synchronized snapshots
  • vSphere Virtual Volumes (vVols)
  • SRM integration
  • HPE Nimble Storage dHCI introduction

Module 8: Backup Solution Integration

  • HPE Recovery Manager Central (RMC) overview and basic architecture
  • Veeam overview and basic architecture
  • Commvault overview and basic architecture
  • Additional data protection training

 

lab outline

Lab 1-1: HPE vLabs Access

  • Objectives
  • Accessing HPE vLabs

Lab 1-2: Environment Preparation

  • Task 1: Launch HPE Nimble graphical user interface (GUI)
  • Task 2: HPE Nimble array administration
  • Task 3: Creating an initiator in HPE Nimble Storage
  • Task 4: Working with users of different roles

Lab 2: Using and Understanding Advanced Volume Features

  • Task 1: Create a volume
  • Task 2: Working with volume pinning—volume performance attribute
  • Task 3: Create volumes using volume performance attribute
  • Task 4: Connect the server to the FSserver10 and FSserver11 volume
  • Task 5: Working with deduplication
  • Task 6: Working with volume limits–QoS
  • Task 7: Working with encryption

Lab 3: Replication and Disaster Recovery

  • Task 1: Configure the upstream array
  • Task 2: Configure the downstream array
  • Task 3: Create volume, volume collection and replicate
  • Task 4: Planned outage scenario—temporary transition to the remote DR site.
  • Task 5: Unplanned outage scenario—disaster recovery

Lab 4: Multi-Array Groups and Pools

  • Task 1: Review current pool status
  • Task 2: Adding an array to the default pool
  • Task 3: Observing capacity and volume behavior
  • Task 4: Connect the server to the HPE Nimble Storage volume
  • Task 5: Understanding how new volumes and data placement is managed
  • Task 6: Removing an array from a pool and assigning the array to a new pool
  • Task 7: Moving a volume between pools
  • Task 8: Merging two pools in a group
  • Task 9: Removing or evacuating an array from a pool and group

Lab 6: Working with Linux Integrations

  • Task 1: Logging into the Linux server
  • Task 2: Installing the HPE Nimble Storage Linux Toolkit (NLT)
  • Task 3: Working with HPE Nimble Connection Manager for Linux
  • Task 4: Working with settings—Nimbletune

Lab 7-1: Working with VMware Integrations

  • Task 1: Register the HPE Nimble plug-in
  • Task 2: HPE Nimble Connection Manager
  • Task 3: Create an HPE Nimble-backed datastore
  • Task 4: Clone an HPE Nimble-backed datastore
  • Task 5: Grow an HPE Nimble-backed datastore
  • Task 6: Create a virtual machine on an HPE Nimble-backed datastore

Lab 7-2: Working with VMware vSphere Virtual Volumes (vVols)

  • Task 1: Register the HPE Nimble Storage Protocol Endpoint with VMware vCenter
  • Task 2: Create a VMware vVol container on an HPE Nimble Storage array
  • Task 3: Create an HPE Nimble-backed vVol datastore
  • Task 4: Create a VM storage policy
  • Task 5: Create a VM based on a storage policy
  • Task 6: Delete and restore a vVol backed VM

Lab 8-1: Working with Veeam—HPE Nimble Integration

  • Task 1: Connect to the Veeam backup system
  • Task 2: Configure VMware vSphere as a managed server
  • Task 3: Add the HPE Nimble Storage array
  • Task 4: Create a backup job
  • Task 5: Remove a disk on a virtual machine
  • Task 6: Validate the recovery of the lost disk

Lab 8-2: Working with Commvault—HPE Nimble Integration

  • Task 1: Connect to the Commvault user interfaces
  • Task 2: Create a new client machine for backing up the VMware virtual machines
  • Task 3: Connect the HPE Nimble array
  • Task 4.1 Create a storage pool
  • Task 4.2 Create a snapshot enabled storage policy
  • Task 5: Enable the VMware client for IntelliSnap, create a new subclient, and assign the subclient to the snapshot enabled storage policy
  • Task 6: Prepare the HPE Nimble array for third-party snapshots
  • Task 7: Run a backup
  • Task 8: Perform an out of place restore of some files Optional: Do the Below Labs Only When Time Permits
  • Task 9: Remove a disk from the virtual machine
  • Task 10: Restore the virtual machine disk to the Windows 2019 server
  • Task 11: Check the restore of the disk

target_au

Storage administrators who desire additional training on the advanced features of HPE Nimble Storage


pre_req

Prior to attending this course, students should complete one of the following courses:

  • HJ7C5S: HPE Nimble I: Management and Local Replication
  • H6LH8S: HPE Nimble Storage Introduction and Administration
  • H9TH5S: HPE Nimble Storage Introduction and Administration (with extended lab time)
  • H9TH6AAE: Introduction to HPE Nimble Storage and InfoSight Analytics, Rev. 18.41
  • H9TH1S: Designing HPE Nimble Solutions, Rev. 18.21 (01113228)

titleHPE Nimble I: Management and Local Replication HJ7C5S
days1
seo_title
seo_dec
seo_tkey
categoryartificial-intelligence
vendorHP

techonogyDatacenter & Virtualization
overviewUsing hands-on labs, this course teaches students how to perform common management tasks, including array installation, volume creation, and data protection/recovery using snapshots. This course also covers system monitoring basics using HPE InfoSight.
objective

By the completion of this course, the learner will be able to complete the following tasks using the Nimble operating system:

  • Perform initial configuration of a new array with NSM and GUI
  • Perform post-installation tests
  • Create volumes and zero-copy clones
  • Attach and verify volumes/clones to Windows
  • Create and modify data protection policies for volumes
  • Restore volumes and individual files from a snapshot
  • Use the HPE Nimble GUI to monitor array capacity/performance

outline

Module 1: Course Introduction and Overview

  • Agenda
  • Documentation
  • Capacity units

Module 2: AF and HF-Series Hardware

  • Portfolio overview
  • AF-Series controllers and enclosures
  • HF-Series controllers and enclosures
  • Memory driven flash (SCM)

Module 3: Array Initialization and Setup

  • HPE Welcome Center
  • Networking overview
  • HPE Nimble Setup Manager
  • Initialization
  • Setup
  • Post-setup test
  • Firewall configuration
  • Data Services Cloud Console

Module 4: HPE Nimble Storage OS WebUI Introduction

  • How to access
  • Tour
  • User management
  • Basic monitoring
  • Updating HPE Nimble Storage OS
  • Data Services Cloud Console Data Ops Manager OS upgrade

Module 5: Working with HPE Nimble Storage Volumes

  • Volume Concepts
  • Provisioning and performance policies
  • Protection templates overview
  • Volume collections
  • Volume creation
  • Fibre channel zoning
  • Access control and initiator groups
  • Presentation
  • HPE Nimble Storage Windows Toolkit
  • HPE Nimble Storage Connection Manager

Module 6: HPE Nimble OS Advanced Features Overview

  • Deduplication
  • Compression
  • HF-Series volume pinning
  • Quality of service (QOS)
  • SmartSecure encryption

Module 7: Snapshots and Clones

  • How HPE Nimble Storage snapshots work
  • How HPE Nimble zero-copy clones work
  • Volume collections and scheduled snapshots
  • Manual snapshot creation
  • Zero-copy clones

Module 8: Introduction to HPE Nimble Storage Replication and Peer Persistence

  • Basic replication concepts
  • Replication use cases
  • How asynchronous replication works
  • Peer persistence overview
  • To learn more about replication

Module 9: Introduction to Scaling with HPE Nimble Storage

  • Scale-to-fit options overview
    • Scale-up
    • Scale-out
    • Scale-deep
  • HPE Timeless Storage
  • Next training direction

Module 10: Introduction HPE InfoSight

  • Concepts
  • Architecture
  • Benefits

lab outline

Lab 1: HPE vLabs Access

  • Objectives
  • Accessing HPE vLabs

Lab 2: Installing HPE Nimble Windows Toolkit

  • Background
  • Task 1: Launch NWT installer

Lab 3: Initialize an Array

  • Background
  • Lab topology
  • Task 1: Launch Nimble Setup Manager
  • Task 2: Subnet configuration
  • Task 3: Post setup testing

Lab 4: Update HPE Nimble Operating System

Lab 5-1: Basic Volume Creation

  • Task 1: Create a volume
  • Task 2: Create a volume collection
  • Task 3: Create an initiator and an initiator group

Lab 5-2: Windows Host SetUp using the HPE Nimble Connection Manager (NCM) Utility

  • Background
  • Task 1: Launch NCM and connect to a volume
  • Task 2: Examine the newly connected volume
  • Task 3: Return to the Windows host to prepare and mount the volume

Lab 7: Snapshots and Data Recovery

  • Background
  • Task 1: Create data
  • Task 2: Simulate a data loss event
  • Task 3: Create a zero-copy clone
  • Task 4: Connect to the clone and recover the data
  • Task 5: Disconnect and delete the clone

Lab 10-1: Correlate System Events/SNMP traps with lab activities

Lab 10-2: HPE Infosigh


target_au

Customers, administrators and channel partner sales or technical sales


pre_req
titleArtificial Intelligence Foundation – HQ7H8S
days3
seo_title
seo_dec
seo_tkey
categoryartificial-intelligence
vendorHP

techonogyDatacenter & Virtualization
overviewArtificial Intelligence (AI) is a methodology for using a non-human system to learn from experience and imitate human intelligent behavior. This training covers the potential benefits and challenges of ethical and sustainable robust Artificial Intelligence (AI); the basic process of Machine Learning (ML) – Building a Machine Learning (ML) Toolkit; the challenges and risks associated with an AI project, and the future of AI and Humans in work. This course prepares for the EXIN BCS Artificial Intelligence Foundation certification
objective

In this course, students will learn to:

  • Describe how artificial intelligence (AI) is part of ‘Universal Design’ and ‘The Fourth Industrial Revolution’
  • Demonstrate understanding of the artificial intelligence (AI) intelligent agent description
  • Explain the benefits of artificial intelligence (AI)
  • Describe how we learn from data—functionality, software and hardware
  • Demonstrate an understanding that artificial intelligence (AI) (in particular, machine learning—ML) will drive humans and machines to work together
  • Describe a ‘learning from experience’ Agile approach to projects

outline

Introduction and Course Outline

  • Course overview and structure
  • Exam information
  • Daily schedule

Human and Artificial Intelligence—Part 1

  • General definition of AI
  • Ethics
  • Sustainability
  • AI as part of Universal Design and The Fourth Industrial Revolution
  • Challenges and risks

Exercise 1

  • Opportunities for AI

Human and Artificial Intelligence—Part 2

  • Learning from experience
  • Applying the benefits of AI
  • Opportunities

Ethics and Sustainability – Trustworthy AI—Part 1

  • Roles and responsibilities of humans and machines

Ethics and Sustainability – Trustworthy AI—Part 2

  • Trustworthy AI

Sustainability, Universal Design, Fourth Industrial Revolution and Machine Learning

  • Learning from data, functionality, software and hardware

Exercise Two

  • Ethics and sustainability

Artificial Intelligent Agents and Robotics

  • AI intelligent agent description
  • What a robot is
  • What an intelligent robot is

Being Human, Conscious, Competent and Adaptable

  • AI project teams
  • Modelling humans

Exercise Three

  • Human plus machine mindmap

What is a Robot?

  • Definition of a robot
  • Robot paradigm

Applying the Benefits of AI

  • Benefits, challenges and risks

Applying the Benefits of AI

  • Opportunities and funding

Building a Machine Learning Toolbox

  • How do we learn from data?

Building a Machine Learning Toolbox

  • Types of machine learning Exercise Four
  • Define a simple ML problem

Exercise Four

  • Define a simple ML problem

Building a Machine Learning Toolbox – Two Case Studies

Building a Machine Learning Toolbox

  • Introduction to probability and statistics

Building a Machine Learning Toolbox

  • Introduction to linear algebra and vector calculus

Building a Machine Learning Toolbox

  • Visualising data

A Simple Neural Network Schematic

  • Introduction to neural networks

Exercise Five

  • Maturity and funding of an AI system

Open Source ML and Robotic Systems

  • Open source software for AI and robotics

Machine Learning and Consciousness

  • Introduction to machine learning and consciousness

The Future of Artificial Intelligence

  • The human + machine
  • What will drive humans and machines to work together

Exercise Six

  • Explore the future opportunities for AI and human systems

Learning from Experience

  • Agile projects

Conclusion

Exam Practice and Preparation

Examination


target_au

The EXIN BCS Artificial Intelligence Foundation certification is focused on individuals with an interest in (or need to implement) AI in an organization—especially those working in areas such as science, engineering, knowledge engineering, finance, education or IT services.


pre_req
titleePolicy Orchestrator Advanced Topics
days4
seo_title
seo_dec
seo_tkey
categorysecurity-analytics
vendorMcAfee

techonogySecurity
overviewThe ePolicy Orchestrator Advanced Topics course provides in-depth training on the advanced capabilities of ePolicy Orchestrator (ePO) software. Through lecture, hands-on labs, and class discussions, you will learn how to use ePolicy Orchestrator (ePO) advanced capabilities and practice using tools for upgrades and migrations, monitoring, maintenance and troubleshooting, and advanced policy configuration.
objective

Welcome

Become familiar with ePO information and support resources and feedback mechanisms.

Installation

Identify installation requirements, recommendations, and best practices; identify and distinguish between the different deployment options for a new installation; install the ePO software.

Migration

Identify options for migrating the ePO server and database to new servers; perform post-migration tasks.

Multiple ePO server features

Configure rollup in a multi-server environment; register a server onto a local server, set up rollup server task, and set up rollup queries; move managed systems between servers using the Transfer System features; share policies in a multi-server environment.

Monitoring and optimizing ePO performance

Identify and utilize the best practices for monitoring and optimizing McAfee ePO; explain how to use Perfor-mance Counters to monitor McAfee ePO server performance.

Performance Optimizer

Describe the key features and functionalities of Performance Optimizer; User the Performance Optimizer tool to troubleshoot a ePO performance issue; explain how to monitor the database health using Perfor-manceOptimizer.

ePolicy Orchestrator Support Center

Describe the features and capabilities of ePO Support Center; explain how to use Support Center features to determine useful information regarding your McAfee ePO servers and installed products.

Protection Workspace

Describe the Protection Workspace feature; explain how to check-in the Protection Workspace extension into McAfee ePO; explain how to use Protection Workspace to monitor your environment.

Logging and reporting

Describe and explain the functionality of the available ePO console log files; identify the commonly used agent, installation, and server log files; explain the basic troubleshooting for the agent, installation, and server log files; describe how to report on SNMP traps using ePO.

Agent

Describe and explain the functionality of the available McAfee Agent log files; identify the commonly used agent, installation, and server log files; explain the basic troubleshooting for the agent, installation, and server log files. Explain how to use the Single System Troubleshooting tool that is provided with the McAfee Agent.

SNMP Reporting & Data Channel Troubleshooting Describe how to report on SNMP traps from another server registered to your McAfee ePO server. Describe how to troubleshoot the Data Channel.

Monitoring SQL

Define the strategies for basic SQL server design; identify best practices for maintaining SQL databases; ex-plain how to manage database health using SQL tools and commands; define steps for identifying and man-aging large tables; use the ePO Purge Events Server task to reduce database size growth; explain how to run the main SQL queries used by Performance Optimizer; determine which SQL queries or services are utilizing the most resources in the SQL database.

SQL Maintenance

Define steps for backing up the ePO database in SQL; define steps for creating a maintenance plan for the ePO database.

ePO Web Application Program Interface (API)

Configure the McAfee ePO server for scripting; use Python scripting to extract data from SQL database; run advanced queries in scripts; explain how to get SIEM data from ePO using the Web API.

McAfee Agent Relay

Identify a use-case list of where a McAfee Agent RelayServer can be useful; identify the port(s) that need to be open for using a RelayServer; identify how to configure the agent policy so that it can use the RelayServer; identify how to install a Windows and Linux agent to use RelayServer on a remote subnet.

ePO Endpoint Deployment Kit (EEDK)

Explain how to create ad test ePO packages; explain how to get feedback in ePO CustomProps; identify how to use EEDK to deploy forensic tools; identify how to use EEDK to deploy Profiler for collection of perfor-mance reports; explain the process for ePO migration and consolidation using EEDK packaged McAfee Agent.

Disaster Recovery Describe the disaster recovery feature and how it works; explain how to use a server task to take a regular Snapshot; take a Snapshot from the Dashboard; identify the three main steps for manual disaster recovery; explain the procedures for manual disaster recovery.

Queries

Describe how to customize and design custom queries; explain the best practices when designing queries.

Indicators of Compromise (IOC)

Using ePO tools, find Indicators of Compromise; describe how to analyze Threat Events; identify the actions for verifying the source of the infection; identify the steps for optimizing the security and performance of your systems; explain how to use the GetSusp tool to help locate and log undetected malware; explain how to use the GetClean tool to help minimize false-positive detections.


outline

Day 1

  • Course Introduction
  • Installation and Cumulative Updater
  • Migration
  • Multiple ePolicy Orchestrator server features
  • Monitoring and optimizing ePolicy Orchestrator performance
  • Performance Optimizer

Day 2

  • ePolicy Orchestrator Support Center
  • Protection Workspace
  • Logging and reporting
  • Agent Logging and reporting
  • SNMP Reporting & Data Channel Troubleshooting
  • Monitoring SQL

Day 3

  • SQL Maintenance
  • Web Application Programming Interface (API)
  • Agent Relay
  • ePolicy Orchestrator Endpoint Deployment Kit (EEDK)
  • Disaster Recovery
  • Advanced Queries

Day 4

  • Customizing Queries – Result Types and Charts
  • Customizing Queries – Columns and Filtering
  • Indicators of Compromise (IOC)

target_au

This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with network and system security. A working knowledge of Microsoft Windows* and network administration is recommended. A basic understanding of computer security concepts, internet services, viruses, and antivirus technologies are also recommended, along with six months experience using ePO. Before taking this course, you should have completed the ePO Administration course.


pre_req
  • ePolicy Orchestrator Administrator course
  • Minimum of six months experience using ePO.

titleIPS Network Security Platform NSP Administration
days4
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogySecurity
overviewThe Network Security Platform Administration course is an essential component of implementing a successful intrusion prevention strategy. In hands-on lab sessions, you’ll learn how to deploy and configure a Network Security Platform solution to protect against real-world attacks. You can immediately apply your new skills to improve protection for your business and take full advantage of your investment in our McAfee Network Security Platform.
objective
  • Planning the deployment
  • Installing and configuring the Manager
  • Managing users and resources
  • Configuring and managing policies
  • Analyzing and responding to threats
  • Tuning your security policies for maximum effectiveness

outline

Day 1

  • Welcome
  • Introduction to Network Security Platform
  • Planning NSP Deployment
  • Getting Started
  • Manager Configuration
  • User Management

Day 2

  • Administrative Domains
  • Sensor Overview
  • Basic Sensor Setup
  • Advanced Sensor Setup
  • Policy Configuration
  • Policy Customization
  • Virtualization (Sub-Interfaces)

Day 3

  • Threat Explorer
  • Attack Log
  • DoS Attacks
  • Advanced Malware Detection
  • Advanced Callback Detection

Day 4

  • Inspection Options Policies
  • Web Server Protection
  • Firewall Policy Configuration
  • Policy Tuning
  • Report Generation
  • Operational Status
  • Database Maintenance

target_au

System and network administrators, security personnel, auditors, and/ or consultants concerned with network and system security should take this course.


pre_req
titleNDLP – Network Data Loss Prevention
days4
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogySecurity
overviewThe Network Data Loss Prevention Administration course provides in-depth training on the tools you need to design, implement, configure, and use Data Loss Prevention Endpoint to safeguard intellectual property and ensure compliance. The course details how this solution uses ePolicy Orchestrator (ePO) software for centralized management. It also explains how to monitor and address risky, day-to-day end-user actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more.
objective

Welcome

Become familiar with information and support resources and feedback mechanisms.

Data Loss Prevention Solution Overview

Describe the DLP solution, its features, and its functionality.

Network Data Loss Prevention Fundamentals

Describe the Network Data Loss Prevention solution, its key features, deployment architecture, and new features and enhancements for this release.

Network DLP Deployment

Describe the business, software, hardware, and component requirements to consider when planning deployment.

Prepare the enterprise environment

Prepare Active Directory, add a resource folder, and configure sharing, permissions, and security settings.

McAfee Network DLP management

Describe how to add DLPe extensions and packages to the McAfee ePO server and verify installation.

Install Network DLP

List requirements for appliance installation and describe the process to perform a basic installation.

Configure users and permission sets

Identify default permissions sets included with ePO and DLP, and create and assign custom permission sets; use Appliance Management to configure access and features.

DLP Policy Manager overview

Access the DLP Policy Manager and navigate through DLP Policy Manager tabs to become familiar with its design and use.

Classify Sensitive Content

Explain classification definitions and criteria and the Classification module features.

Content classification criteria rules

Explain how to create content classification criteria for use in data protection rules.

DLP data protection definitions

Identify data protection definitions and their associated data protection rules, create definitions used for data protection rules, and configure end-user notifications and justifications.

Configure data protection rules

Identify the building blocks for data protection, rules, build data protection rules to meet customer requirements, and provide examples of use cases for data protection rules.

Data Loss Prevention Monitor

Describe the functionality of a McAfee DLP Monitor, create traffic filters, and describe data protection rules as they apply to DLP Monitor.

Data Loss Prevention Capture

Describe the functionality of a McAfee DLP Capture. Use forensic search to identify content monitored by DLP.

Data Loss Prevention Discover

Describe key features and functionality of DLP Discover, discuss Discover scans and describe how to use Discover scans to help build rules for other appliances.

Data Loss Prevention Discover Policies

Describe scanning considerations, required policy components, and how to configure, manage, and analyze scans.

Data Loss Prevention Email Prevent

Describe the functionality, configuration, and deployment of DLP Email Prevent, criteria used for filtering an email, and actions that can be applied to traffic.

Data Loss Prevention Web Prevent

Describe deployment and configuration of DLP Web Prevent, and list actions that can be applied to web traffic.

Incidents and Case Management

Describe the use and functionality of Incident Manager and Case Management.

Use Cases

Describe major use cases for McAfee Network DLP.

Dashboards and Reporting

Describe DLP default dashboards and explain how to use queries and reports.

Upgrades and Migration

Describe upgrade and migration procedures for Network DLP.

Basic Troubleshooting

Use the appliance console for general maintenance tasks, describe troubleshooting options for appliances, and describe best practices for tuning rules.


outline

Day 1

  • Welcome
  • Data Loss Prevention Solution Overview
  • Network Data Loss Prevention Fundamentals
  • Network Data Loss Prevention Deployment
  • Prepare the enterprise environment
  • Network Data Loss Prevention management
  • Install Network Data Loss Prevention

Day 2

  • Configure users and permission sets
  • Data Loss Prevention Policy Manager overview
  • Classify sensitive content
  • Content classification criteria rules
  • DLP data protection definitions
  • Configure data protection rules

Day 3

  • Data Loss Prevention Monitor
  • Data Loss Prevention Capture
  • Data Loss Prevention Discover
  • Data Loss Prevention Discover policy
  • Data Loss Prevention Email Prevent

Day 4

  • Data Loss Prevention Web Prevent
  • Incidents and Case Management
  • Use cases
  • Dashboards and Reporting
  • Upgrades and Migration
  • Basic Troubleshooting

target_au

This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.


pre_req
  • Solid knowledge of Windows and system administration and network technologies
  • Solid knowledge of computer security, cloud security concepts, and web technologies
  • Prior experience using MVISION ePO software

titleEndpoint Security Expert Rules Course
days5
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogySecurity
overviewBuilding on the ENS Platform, ENS-Expert rules allow the advanced ENS administrator to add deeper security to their ENS Deployment. The program provides insights into our proprietary syntaxes, and an advanced view into Operating System concepts and references, needed to better understand how ENS works and fully comprehend how ENS Expert Rules can provide a more customized and secure environment.
objective
  • Microsoft Windows Operating System Concepts
  • AAC (Arbitrary Access Control)
  • Ability to understand what kinds of items can be protected with Expert Rules.
  • Ability to read Expert Rules
  • Understand how to create Expert Rules
  • Understand the system impact of expert rules

outline

Day 1-4 : Concepts, Technologies, and Expert Rules

  • Technology Module 1 (Microsoft)
  • Technology Module 2 (Proprietary)
  • Technology Module 3 (Tools)
  • Expert Rules Types
  • Expert Rules Syntax
  • Expert Rules Examples Module 1
  • Hands-on Quiz
  • Expert Rules Examples Module 2
  • Expert Rules Real-World Module
  • Wrap-Up
  • Recover Topics of Interest
  • Expand on Previous Material
  • Q&A

Day 5: Practical Application

  • Hands-on lab for participants to create custom rules.

target_au

This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security.


pre_req
  • Basic knowledge ENS user-interface and functionality
  • Basic knowledge of Windows Operating Systems
  • ENS Administration Course

titleEndpoint Detection Response Administration
days2
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogySecurity
overviewAdversaries maneuver in covert ways—camouflaging their actions within the most trusted components already in your environment. They don’t always install something tangible like malware, but they always leave behind a behavioral trail. Endpoint detection and response (EDR) continuously monitor and gather data to provide the visibility and context needed to detect and respond to threats. But current approaches often dump too much information on already stretched security teams. MVISION EDR helps to manage the high volume of alerts, empowering analysts of all skill levels to do more and investigate more effectively. This course prepares SOC Analysts to understand, communicate, and use the features provided by Endpoint Detection and Response. Through hands-on lab exercises, you will learn how to detect advanced device threats, fully investigate, and quickly respond.
objective

What is EDR?

  • Recall how MVISION EDR plays a part in the company portfolio
  • Define MVISION EDR components
  • Distinguish how MVISION EDR helps the SOC Mission
  • Identify MVISION EDR capabilities
  • Describe the MITRE ATT&CK Matrix

Architecture:

  • Describe the product/solution architecture
  • Distinguish between deployment options
  • Recall common log and product files
  • Identify product/solution communication paths and ports

Setup and Deployment:

  • Identify the supported platform, environment, or operating systems
  • Recall the first steps for adding MVISION EDR to your environment
  • Install MVISION EDR on an on-premise (local) or MVISION ePO deployment
  • Check in the required product extension(s)
  • Deploy the MVISION EDR Client to endpoints

Monitoring:

  • Recall what Cyber Threat Hunting is.
  • Identify different Threat Hunting styles.
  • Describe why Threat Hunting is required.
  • Recall Threat Hunting tips.
  • View threat events in the Monitoring dashboard.
  • Recall the MVISION EDR threat detection approach.
  • Recall how to take action from the Monitoring dashboard.

Alerting:

  • Leverage the Alerting dashboard to view the raw events from managed devices
  • View how alert events match to the MITRE observed tactics and techniques

Device Search:

  • Use device data to assist with analyzing how a threat occurred in the system and what triggered it.
  • Recall the Device Search investigation capabilities.

Historical Search:

  • Use historical data to assist with analyzing how a threat occurred in the system and what triggered it
  • Recall the Historical Search investigation capabilities

Real-time Search:

  • Obtain information about processes currently running on managed endpoints using real-time search queries
  • Leverage the query syntax to combine collectors and build powerful search expressions
  • Take action on search results to execute reaction code onto managed endpoints

Investigating:

  • Analyze an investigation using the key findings and key artifacts discovered.
  • View details to investigated items, linked investigations, i nvestigation guides, and similar cases in the investigation workspace.
  • Recall what is a cyber security incident.
  • Identify the different vectors of cyber incidents.
  • Describe what is Incident Response (IR) and its importance.

Catalog:

  • Navigate to the Catalog dashboard to view built-in collectors and reactions.
  • Use the Catalog dashboard to create or delete custom collectors and reactions.

Action History:

  • View the details of actions performed through the Action History dashboard.

Performance Metrics:

  • View the Performance Metrics page to analyze the amount of time spent on resolving investigations.

Troubleshooting:

  • Walk through actions to take if no events are seen in the Monitoring dashboard
  • View MVISION EDR tenancy status
  • Perform troubleshooting steps for Investigations
  • Troubleshoot DXL connectivity

Use Cases:

  • Use the monitoring dashboard to identify threats
  • Create an investigation
  • Quarantine a system or process
  • Perform in depth analysis using real-time search
  • Increase familiarity and workflow with MVISION EDR

outline

Day 1

  • Welcome
  • What is EDR?
  • Architecture
  • Setup and Deployment
  • Monitoring
  • Alerting
  • Device Search
  • Historical Search

Day 2

  • Real-time Search
  • Investigating
  • Catalog
  • Action History
  • Performance Metrics
  • Troubleshooting
  • Use Cases
  • Incident Response
  • Threat Hunting

target_au

This course is intended for customers, acting as either or both Analysts and Engineers, responsible for configuration, management, and monitoring activity on their systems, networks, databases and applications using the MVISION EDR solution. A working knowledge of networking, system administration, computer security concepts, and a general understanding of networking and application software.


pre_req

It is recommended that students have a working knowledge of:

  • Networking and system administration concepts
  • Computer security concepts
  • Network security concepts and practices
  • Malware analysis, forensics, tactics and techniques

titleMvision Endpoint + Mvision ePO Admin
days4
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogySecurity
overviewOur MVISION Endpoint with MVISION ePolicy Orchestrator Administration course provides an in-depth introduction to the tasks crucial to set up and administer MVSION Endpoint in an MVISION ePO managed customer environment. MVISION Endpoint leverages and enhances built-in Windows 10 Windows Defender security with advanced protection for Windows 10 and Windows Server 2016 and newer systems. MVISION ePO is a SaaS-based centralized security management console that enables management of Microsoft Defender along with McAfee security products. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with the MVISION Endpoint policies in the MVISION ePO user interface, as well as detailed instructions for the integration of this solution.
objective

M01 – Course Welcome

  • Introduce the course and course agenda
  • Introduce the training organization
  • Show common resources
  • Describe the lab environment and how to use the Lab Guide

M02 – MVISION ePO Product Introduction

  • Describe the MVISION ePolicy Orchestrator (MVISION ePO) offering.
  • Explain the MVISION ePO deployment model.
  • Describe the process for migrating from On-Prem ePO to MVISION ePO.
  • Discuss integration with Endpoint Security (ENS) with Advanced Threat Protection (ATP).
  • Discuss MVISION ePO integration with Security Information and Event Management (SIEM).
  • Describe the support model for MVISION ePO.

M03 – MVISION ePO Features and Architecture

  • Describe the basic features and functionalities for the MVISION ePO offering.
  • Describe MVISION ePO architecture.

M04 – MVISION ePO Role of an Administrator

  • Describe differences between Admin and user accounts in MVISION ePO.
  • Describe how to configure and manage users accounts in MVISION ePO.
  • Create a customized installation URL for system management in MVISON ePO.
  • Create an agent installer package to distribute to systems for system management in MVISION ePO.
  • Describe how to use custom queries and report in MVISION ePO.
  • Describe how to configure server and client tasks in MVISION ePO.
  • Describe how to remove product software using the existing product deployment task.

M05 – MVISION ePO Planning and Populating the System Tree

  • Provide an overview of the ePolicy Orchestrator System Tree.
  • Use different methods to create the System Tree.
  • Describe the various methods of organizing the System Tree.

M06 – MVISION ePO Using the Tag Catalog

  • Describe the purpose of tags and tag groups.
  • List the types of tags that ePO supports.
  • Access and navigate the Tag Catalog.
  • Launch and navigate the New Tag Builder.
  • Create and apply tags automatically, based on criteria and product properties.
  • Create and apply tags manually.
  • Restrict tag usage by permission set.
  • Edit, move, and clear tags.
  • Exclude systems from automatic tagging.

M07 – MVISION ePO Client Tasks

  • Describe the purpose of client tasks.
  • Communicate about client task concepts, such as inheritance.
  • Access and navigate the Client Task Catalog.
  • Identify client task types.
  • Add, duplicate, edit, schedule, and delete a client task.
  • Navigate and configure task using the Product Deployment Project.
  • Navigate and configure task using the Deploy tab.

M08 – MVISION ePO Managing Policies

  • Describe the purpose of policies.
  • Create and edit policy objects.
  • Manage policy configuration and assignment.
  • See policy inheritance in action.
  • Enforce policy changes on client machines (endpoints).

M09 – MVISION ePO Automatic Responses and Notifications

  • Use Automatic Response rules to create alerts and perform pre-determined actions.
  • Configure Automatic Responses.
  • Describe permission set definitions for Automatic Responses.
  • Describe how to configure contacts for notifications.

M10 – MVISION Endpoint Product Introduction

  • Describe the MVISION Endpoint product components.
  • Explain how MVISION Endpoint works with Microsoft Windows Defender®.
  • List other McAfee products that work with MVISON Endpoint.

M11 – MVISION Endpoint Product Installation

  • Determine the type of installation needed.
  • Plan the installation.
  • List the system requirements.
  • Perform pre-installation tasks.
  • Install MVISION Endpoint.
  • Confirm the product installation.
  • Upgrade to a new software version.
  • Remove the MVISION Endpoint software.

M12 – MVISION Endpoint General Policy

  • List the four default MVISION Endpoint policies available in ePO.
  • Configure general policy security setting for managed systems on MVISION Endpoint.
  • Use the MVISION Endpoint Updated extension to allow automatic updates on ePO and ePO on AWS managed installations.

M13 – MVISION Endpoint Firewall Policy

  • Manage Windows Defender Firewall rules using the MVSION Endpoint Firewall policy.

M14 – MVISION Endpoint Exclusions Policy, Evaluation Builds and Non- compliance Notifications

  • Configure and define exclusions for MVISION Endpoint and Windows Defender.
  • Describe how to use MVISION Endpoint Evaluation builds for On-Premises ePO and ePO on AWS man-aged systems.
  • Describe the Non-compliance notifications in MVISION Endpoint.

M15 – Exploit Guard and the MVISION Endpoint Exploit Protection Program Settings Policy

  • List the four components of Windows Defender Exploit Guard and can be managed by MVISION End-point.
  • Enable and configure Attack Surface Reduction rules in MVISION Endpoint.
  • Enable and configure Network Protection in MVISION Endpoint.
  • Enable and configure Controlled Folder Access in MVISION Endpoint.
  • Enable and configure Exploit Protection in MVISION Endpoint.

M16 – Protection Workspace Overview

  • List the elements of the Protection Workspace user interface.
  • Use the Protection Workspace.

M17 – MVISION Endpoint Quarantine Management

  • Describe MVISION Endpoint Quarantine Management.
  • List requirements for MVISION Endpoint Quarantine Management.
  • Demonstrate the operation of MVISION Endpoint Quarantine Management.

M18 – MVISION Endpoint Log Files

  • Use the MVISION Endpoint installation/uninstallation logs to troubleshoot software installation issues.
  • Use the MVISION Endpoint product logs to troubleshoot system issues.
  • Set the logging level and log file size in the MVISION Endpoint General policy.
  • Use the Story Graph feature to trace and troubleshoot MVISION Endpoint threat detections.

M19 – MVISION ePO Queries

  • Using ePO query tools, create your own custom queries.
  • Query the McAfee ePolicy Orchestrator database.
  • Use the Query Builder to create your own queries.
  • List the locations to find more details for your custom queries.

M20 – MVISION ePO Customizing Queries – Result Types and Charts

  • Use the Query Builder to create your own queries.
  • Define the different Chart types.
  • Define the Common Labels that can be used in a query.
  • Define the Common Values that can be used in a query.
  • Describe the best settings to use when creating a query.

outline

Day 1

  • Module 1: Welcome
  • Module 2: MVISION ePO: Product Introduction
  • Module 3: MVISION ePO: Features and Architecture
  • Module 4: MVISION ePO: Role of an Administrator
  • Module 5: MVISION ePO: Planning and Populating the System Tree

Day 2

  • Module 6: MVISION ePO: Using the Tag Catalog
  • Module 7: MVISION ePO: Client Tasks
  • Module 8: MVISION ePO: Managing Policies
  • Module 9: MVISION ePO: Automatic Responses and Notifications
  • Module 10: MVISION Endpoint: Product Introduction
  • Module 11: MVISION Endpoint: Product Deployment

Day 3

  • Module 12: MVISION Endpoint: General Policy
  • Module 13: MVISION Endpoint: Firewall Policy
  • Module 14: MVISION Endpoint: Exclusions Policy, Evaluation Builds and Non-compliance Notifications
  • Module 15: MVISION Endpoint: Exploit Guard and the MVISION Endpoint Exploit Protection Program Settings Policy
  • Module 16: MVISION Endpoint: Protection Workspace Overview

Day 4

  • Module 17: MVISION Endpoint: Quarantine Management
  • Module 18: MVISION Endpoint: Log Files
  • Module 19: MVISION ePO: Queries
  • Module 20: MVISION ePO: Queries and Reports

target_au

This course is intended for system and network administrators, security personnel, auditors, and/ or consultants concerned with administering MVISION Endpoint on MVISION ePO. It is recommended that the students have a working knowledge of Microsoft Windows

administration, Microsoft Windows Defender, system administration concepts, a basic understanding of computer security concepts, and a general understanding of viruses and anti-virus technologies.


pre_req
  • Working knowledge of Microsoft Windows administration including Microsoft Windows Defender.
  • Working knowledge of system administration concepts.
  • Basic understanding of computer security concepts, and a general understanding of viruses and anti-virus technologies.

titleDrive Encryption for PC Administration
days4
seo_title
seo_dec
seo_tkey
categorydata-protection
vendorMcAfee

techonogySecurity
overviewOur Drive Encryption Administration course provides an in-depth introduction to the tasks crucial to set up and administer Drive Encryption. Drive Encryption is full disk encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. It is designed to make all data on a system drive unintelligible to unauthorized persons, which in turn helps meet compliance requirements. This course combines lectures and practical lab exercises, with significant time allocated for hands-on interaction with virtual lab systems, as well as detailed instructions for the integration of this solution.
objective

M01 – Welcome

  • Introduce the course and course agenda
  • Introduce the training organization
  • Show common resources
  • Describe the lab environment and how to use the Lab Guide

M02 – ePO Overview

  • Describe the solution and its key features.
  • Identify new features and enhancements for this release.
  • Identify the components in a basic deployment architecture.
  • Explain the architecture and overview of ePO.

M03 – McAfee Agent

  • Define the Agent and explain its purpose, key characteristics,and functions.
  • Define and give examples of managed systems.
  • Identify platform requirements including hardware, software, and extensions.
  • Explain and give examples of Agent communications within the ePO environment.
  • Identify ways to convert an Agent to a managed mode.
  • Describe ways to remove an Agent.
  • Explain ways to use the command line to customize an Agent installation or upgrade.
  • Navigate the Agent interface.

M04 – Planning the MDE Deployment

  • What is a planning overview?
  • Requirements for ePO and the McAfee Agent
  • Supported Microsoft Server OS for MDE
  • Supported Microsoft Client OS for MDE
  • Required ports
  • The Tech Check
  • Planning the pilot
  • Change control

M05 – Encryption Technologies

  • State why data at rest requires safeguarding.
  • Explain the differences between disk and file encryption.
  • Differentiate the features and benefits of various authentication/token options.
  • Describe the computer boot process and give definitions for key computer terms used in the boot process.

M06 – MDE Overview

  • Identify the key features of McAfee Drive Encryption.
  • Draw a high-level MDE overview and describe the function of each component.
  • Describe how key management is handled in MDE.
  • Identify MDE documentation and online resources.

M07 – MDE Extensions and Packages

  • Install extensions and check packages in EPO.
  • Locate and navigate new menus used with DE.
  • Install the help files and use them to locate information.
  • Configure server settings.

M08 – Active Directory Configuration

  • Register an LDAP server in ePO
  • Configure ePO and MDE for LDAP synchronization
  • Verify synchronization task

M09 – MDE Users

  • Add a LDAP user in ePO and assign to a client system.
  • Add LDAP group users in ePO and assign to a client system.
  • Create a DE user group at the domain level for inheritance to child systems.

M10 – Drive Encryption Policies

  • Differentiate between the purposes of the DE Product Setting Policy and User Based Policy
  • Determine required DE user settings and configure the policy to match
  • Differentiate between methods of policy assignment to a user, system, or system group and explain inher-itance
  • Assign a policy to a user through a Policy Assignment Rule
  • Assign a policy to a system through the System Tree
  • Create an Add Local Domain User (ALDU) blacklist policy

M11 – Deployment Options

  • Differentiate between the various DE deployment methods
  • Perform Product deployment to client machines
  • Create a client deployment task in ePO
  • Perform a Wake up Agent Task

M12 – Deploying MDE to the Clients

  • Deploy the DE client to Endpoint systems and verify installation and function
  • Describe deployment best practice recommendations

M13 – MDE Permission Sets

  • Create and assign a DE permission set
  • Create a DE Administrative Use

M14 – MDE Troubleshooting Methods

  • Effectively research DE issues
  • Gather data for escalation
  • Locate server and client logs useful to troubleshooting
  • Match error codes to definitions

M15 – MDE Recovery Options

  • Configure systems for self recovery
  • Enable administrator recovery

M16 – Drive Recovery

  • Build a DETech Recovery CD
  • Build a DETech Standalone Recovery CD
  • Export recovery information from ePO
  • Use file or token authentication to remove encryption on a corrupt disk
  • Restore a Master Boot Record.

M17 – MDE Scripting

  • Install the Python Client
  • Use DE Scripting to perform basic DE Administrative Tasks

M18 – Endpoint Assistant and DPSSP

  • Understand Endpoint Assistant (EA)
  • Use EA for DE recovery
  • Understand McAfee Data Protection Self-Service Portal (DPSSP)
  • Use DPSSP with DE

M19 – MDE Dashboards, Queries, and Reports

  • Use the DE dashboard to view new client information
  • Build new monitors for the dashboard
  • Configure queries

M20 – MDE Offline Activation

  • Learn the components needed for a manual install

M21 – Upgrading MDE

  • Upgrade Drive Encryption to the current release

M22 – Deactivate and Uninstall MDE

  • Deactivate and uninstall Drive Encryption from managed systems.

M23 – File and Removable Media Protection

  • Describe the File and Removable Media Protection (FRP) solution
  • Identify solution requirements
  • Install FRP software
  • Describe supported encryption key types
  • Configure encryption key access
  • Manage FRP keys
  • Distinguish between FRP policies
  • Define FRP permission sets and user controls
  • View FRP dashboards and use FRP queries and reports
  • Explain how Data Loss Prevention Endpoint (DLPe) uses encryption for an extra layer of control

outline

Day 1

  • M01 Welcome
  • M02 ePO Overview
  • M03 The McAfee Agent
  • M04 MDE Planning
  • M05 Encryption Technologies
  • M06 McAfee Drive Encryption (MDE) Overview
  • M07 Extensions and Packages

Day 2

  • M08 Active Directory Configuration
  • M09 MDE Users
  • M10 MDE Policies
  • M11 Deployment Methods
  • M12 Deploying MDE Software
  • M13 MDE Permission Sets
  • M14 Troubleshooting MDE

Day 3

  • M15 Administrator Recovery
  • M16 Drive Recovery
  • M17 Scripting
  • M18 Password Recovery Tools
  • M19 MDE Dashboards and Queries
  • M20 MDE Offline Activation

Day 4

  • M21 Upgrading
  • M22 Uninstall
  • M23 File and Removable Media Protection (FRP)

target_au

This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security and drive encryption.


pre_req
  • Solid knowledge of Windows and system administration, network technologies
  • Solid knowledge of computer security, command line syntax, malware/anti-malware, virus/anti-virus, and web technologies
  • Prior experience using ePolicy Orchestrator (ePO)

titleAPSTRA – Data Center Automation Using Juniper Apstra
days5
seo_title
seo_dec
seo_tkey
categorydata-center
vendorJuniper

techonogyDatacenter & Virtualization
overviewThis five-day course provides students with the foundational knowledge required to manage data center networks with Juniper Apstra software. This class will provide attendees with the knowledge to operate and manage Juniper Apstra software. Attendees will be given a background on modern data center design and intent-based networking concepts. The course covers the Juniper Apstra architecture and its data center reference architecture including the designing, building, deploying, and automation of a three-stage IP fabric with Virtual Extensible LAN (VXLAN) overlay. The course goes on to cover navigation of the Juniper Apstra UI including creating resources, designs, templates, and instantiating blueprints (a running network). After teaching you to use Juniper Apstra to build a running data center, the course reviews the operational tools for managing a system with Juniper Apstra including basic troubleshooting, global and blueprint UI walkthroughs, role-based access control, drain mode, adding and removing nodes from a fabric, rolling back an entire network (Time Voyager), creating on-box and off-box agents, configuring security policies, connectivity templates, querying the graph database, and performing intent-based analytics (IBA). Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring an IP fabric using Juniper Apstra. This course is based on Juniper Apstra Release 4.0.1. Associated Certification: Data Center, Specialist (JNCIS-DC)
objective

After successfully completing this course, you should be able to:

  • Describe what is meant by intent-based networking.
  • Describe the Juniper Apstra architecture.
  • Navigate the global Juniper Apstra UI.
  • Configure role-based access control.
  • Describe an IP fabric architecture.
  • Explain VXLAN functions and operations.
  • Describe Ethernet VPN (EVPN) routing and bridging.
  • Describe the Juniper Apstra data center reference design.
  • Describe IP fabric usage in the data center reference design.
  • Describe host connectivity in the data center reference design.
  • Describe the life cycle of the management of devices using Juniper Apstra.
  • Create and use system agents to manage devices.
  • Configure resources.
  • Configure tags.
  • Describe basic device abstractions used by Apstra.
  • Describe logical devices.
  • Describe device profiles.
  • Describe interface maps.
  • Configure a rack type.
  • Configure templates.
  • Build and deploy a blueprint.
  • Navigate the blueprint UI.
  • Perform basic fabric device operations and troubleshooting.
  • Configure and apply property sets and configlets.
  • Configure connectivity templates.
  • Describe the multitenancy capabilities of Juniper Apstra.
  • Describe the purpose of root cause identification.
  • Create and manage security policies.
  • Describe the security policy functionality and terminology.
  • Describe the security policy workflow.
  • Describe the security policy conflict resolution.
  • Describe management of security policies.
  • Create a device profile.
  • Create a logical device.
  • Create an interface map.
  • Add a spine and a rack to an existing blueprint.
  • Add a generic system to an existing blueprint.
  • Use the Graph Explorer to traverse the graph datastore.
  • Describe the function of an IBA probe.
  • Create an IBA probe.
  • Configure logging to a remote syslog server.
  • Describe how Apstra integrates with vCenter.
  • Describe how Apstra can enable a DCI.

outline

DAY 1

1. Course Introduction

2. Intent-Based Networking

  • What do we mean by intent?
  • Where is Juniper Apstra positioned?

3. Juniper Apstra Overview

  • Juniper Apstra server
  • Juniper Apstra device agents

4. Apstra UI Walkthrough

  • Navigate the global Apstra UI

Lab 1: Apstra UI Walkthrough

5. Role-Based Access Control

  • Configure users, roles, and providers to enable local and remote authentication

Lab 2: Configuring RBAC

6. IP Fabric Architecture

  • IP fabric options including collapsed (spineless), three-stage, and five-stage fabrics
  • IP fabric routing strategy
  • EBGP fabric
  • IP fabric best practices

7. VXLAN Overview

  • VPN terminology—control planes and data planes
  • VXLAN broadcast domains
  • VXLAN control plane evolution
  • VXLAN fundamentals
  • Hardware VTEPs and software VTEPs

DAY 2

8. EVPN Protocol

  • Overview of the EVPN protocol in a VXLAN environment
  • Route targets (policy)
  • Route distinguishers
  • EVPN route types and usage
  • Edge routing using Type 2 routes
  • Edge routing using Type 5 routes

9. Data Center Reference Design

  • Overview of using rack types to design your network
  • Overview of using templates to design your network
  • Host connectivity options
  • Life-cycle management (design, build, deploy, validate)

10. Device Management

  • Device profiles as a hardware compatibility list
  • Install off-box agents
  • Install on-box agents
  • Perform ZTP

Lab 3: Managing Devices

11. Resources

  • Create IP, VNI, and ASN Pools

12. Tags

  • Create Tags

Lab 4: Configuring Resources and Tags

13. Logical Devices, Device Profiles, and Interface Maps

  • Describe Logical Devices
  • Describe Device Profiles
  • Describe Interface Maps

Lab 5: Logical Devices, Device Profiles, and Interface Maps

14. Design: Racks

  • Create Custom Rack Types

15. Design: Templates

  • Create Custom Templates

DAY 3

16. Build and Deploy: Blueprints

  • Build and deploy a blueprint

Lab 6: Design, Build, and Deploy a Blueprint

17. Navigating the Blueprint UI

  • Navigate the tabs—Dashboard, Analytics, Staged, Uncommitted, Active, and Time Voyager
  • Describe layered views of the staged and active networks
  • IBA probe versus service anomalies 18 Basic Blueprint Operation
  • Use the Active tab to determine the status of a blueprint
  • Select a node to see neighbors, links, headroom, telemetry, device, properties, tags, and virtual settings
  • Query the blueprint (MAC, ARP, and VM)
  • Find by tags
  • Troubleshooting example
  • Make changes to your blueprint
  • Revert changes
  • Use Time Voyager

Lab 7: Navigating and Operating a Blueprint

19. Property Sets and Configlets

  • Configure Property Sets
  • Configure and Deploy Configlets

20. Connectivity Templates

  • Connectivity templates overview
  • Example: Enable a BGP session between border leaf and external router 21 Virtual Networks
  • Configure overlay virtual networks

Lab 8: Configuring Configlets, Connectivity Templates, and Virtual Networks

DAY 4

22. Root Cause Identification

  • Explain and enable RCI

23. Security Policies

  • Describe security policy functionality and terminology
  • Describe the security policy workflow
  • Use conflict resolution

Lab 9: Configuring Root Cause Identification and Security Policies

24. Creating Device Profiles

  • Create a custom device profile

25. Creating Logical Devices

  • Create a custom logical device

26. Creating Interface Maps

  • Create a custom interface map

27. Post-Deployment: Adding a Spine and a Rack

  • Add a spine and a rack to an existing blueprint

28. Post-Deployment: Adding a Generic System

  • Get familiar with global versus embedded rack types
  • Add a generic system to an existing blueprint

Lab 10: Working with Interface Maps, Racks, and Generic Systems

DAY 5

29. Graph Database

  • Use Graph Explorer to visually inspect a blueprint’s graph and its schema
  • Use the Graph Explorer to learn to query the graph database

30. Intent-Based Analytics—Overview

  • Describe the basics of an IBA probe

31 Create an IBA Probe

  • Create a predefined IBA probe
  • Create a new IBA probe

32. Syslog

  • Configure and Monitor logging to a remote syslog server

33. VMware vCenter Integration

  • Integrate Apstra with vCenter

Lab 11: Configuring IBA Probes, Syslog, and vCenter Integration

34. Data Center Interconnect

  • Describe a L2 DCI
  • Describe a L3 DCI

Lab 12: Configuring DCI


target_au

The primary audience for this course includes:

  • Networking architects and operators, system engineers, DevOps professionals, IT professionals
  • Individuals responsible for configuring, monitoring, and troubleshooting modern spine-and-leaf data centers of any size, leveraging any networking vendor hardware or operating system

pre_req

The course prerequisites include:

  • Basic knowledge of networking and data center designs
  • Understanding of Clos IP fabric
  • Understanding of routing protocol design, configuration, and performance
  • Knowledge of overlay and underlay routing designs
  • Basic knowledge of automation design and workflows
  • Knowledge of network device configuration via CLI
  • Knowledge of BGP — recommended but not required
  • Completion of the Introduction to Juniper Data Center Networking (IJDC) course or equivalent knowledge

titleIJDC – Introduction to Juniper Data Center Networking
days3
seo_title
seo_dec
seo_tkey
categorydata-center
vendorJuniper

techonogyDatacenter & Virtualization
overviewThis three-day course provides introductory instruction on data center switching using Juniper products. This course does not cover Ethernet VPN–Virtual Extensible LAN (EVPN-VXLAN) architecture, but lays the foundational knowledge necessary to understand a data center that is built upon an IP fabric. In addition, this course covers Ethernet switching, VLANs, Layer 2 security features, routing policies, link aggregation, load balancing, filter-based forwarding (FBF), routing instances, BGP, graceful restart, and bidirectional forwarding detection (BFD). Associated Certification: Data Center, Associate (JNCIA-DC)
objective
  • Identify and describe how to configure a typical data center layout, including spine and leaf placements.
  • Describe an IP fabric architecture.
  • Explain and configure basic Ethernet switching.
  • Explain and configure virtual networks (VLANs).
  • Describe layer 2 security.
  • Implement link aggregation.
  • Describe and implement protocol independent routing and routing instances with Junos OS.
  • Configure load balancing within Junos OS.
  • Implement FBF using Junos OS.
  • Describe and deploy OSPF.
  • Describe and deploy BGP.
  • Implement graceful restart and BFD using Junos OS.

outline

DAY 1

1. Course Introduction

2. Traditional Data Center Architectures

  • Explain traditional multitier architecture, its benefits, and challenges
  • Describe a traditional data center-based scenario

3. Juniper’s Modern Data Center Architectures

  • Describe an IP fabric environment
  • Explain routing in an IP fabric environment
  • Explain using Juniper Apstra as a turnkey solution

4. Ethernet Switching Overview

  • Explain the basics of Ethernet switching
  • Provide an overview of enterprise switching platforms

5 Configuring Ethernet Switching

  • Manage and interpret the Ethernet switching table

Lab 1: Implementing Ethernet Switching

6. Virtual Networks Overview

  • Describe access and trunk port modes
  • Describe alternate VLAN and data VLAN concepts
  • Explain native VLAN routing operations

7. Configuring Virtual Networks

  • Configure and monitor VLANs
  • Configure and monitor inter-VLAN routing

Lab 2: Implementing Virtual Networks

DAY 2

8 Port Security

  • Identify MAC limiting
  • Review the basics of persistent MAC learning
  • Implement MACsec (QFX-centric)
  • Review storm control operational parameters

Lab 3: Implement Port Security

9 Link Aggregation

  • Describe and implement link aggregation
  • Identify link aggregation groups
  • Review graceful Routing Engine switchover
  • Explain nonstop active routing
  • Review nonstop bridging

Lab 4: Configuring and Monitoring Link Aggregation

10. Protocol-Independent Routing

  • Describe and configure static routes
  • Explain and configure aggregate routes
  • Explain and configure generated routes

11. Routing Instances

  • Describe routing instances
  • Configure and share routes between routing instances

Lab 5: Configuring Protocol-Independent Routing and Routing Instances

12. Load Balancing

  • Describe load-balancing concepts and operations
  • Implement and monitor Layer 3 load balancing

DAY 3

13 Filter-Based Forwarding

  • Explain the benefits of filter-based forwarding
  • Configure and monitor filter-based forwarding

Lab 6: Load Balancing and FBF

14 Fundamentals of OSPF

  • Provide an overview of OSPF
  • Explain OSPF scalability
  • Describe adjacency formation and designated router election
  • Configure and monitor OSPF
  • Perform OSPF troubleshooting

Lab 7: Configuring OSPF (Optional)

15 Fundamentals of BGP

  • Describe the basics of BGP
  • Explain BGP attributes

16 Deploying BGP

  • Compare IBGP versus EBGP
  • Configure and monitor BGP

Lab 8: Deploying BGP

17. Graceful Restart and Bidirectional ForwardingDetection

  • Configure graceful restart
  • Configure bidirectional forwarding detection (BFD)

Lab 9: Configuring Graceful Restart and BFD


target_au

This course benefits individuals responsible for configuring and managing network equipment in data centers.


pre_req

The following are the prerequisites for this course:

  • Knowledge of basic TCP/IP networking
  • Understanding basic layer 2
  • Familiarity with Data Center technologies
  • Completion of the Introduction to the Junos Operating System (IJOS) course or equivalent Junos OS configuration experience

titleExtreme Campus Controller Advanced
days1
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorExtreme

techonogyEnterprise Networking
overviewThis course provides knowledge to allow the student to integrate and optimize XCC into an existing solution. The class covers how to integrate XCC and XIQ-Se to take advantage of the advanced features in XIQ-SE or other “manager of managers” systems. It also covers how to manage applications in XCC, such as Extreme Scheduler and AirDefense Base. It teaches how to leverage API’s and postman to be able to create integrated solutions and how to create custom dashboards and reports to become more proactive.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Integrate XCC with XIQ and other manager of manger tools
  • Install and manage applications into XCC
  • Create custom reports and dashboards in XCC
  • Be able to call API’s to perform functions or retrieve data from XCC

outline

Integration

  • Lab 1: Integration with XIQ-SE

Applications

  • Lab 2: Install an application

Custom Dashboards and Reports

  • Lab 3: Create a new dashboard
  • Lab 4: Create a new Report

API’s

  • Lab 5: API Integration

User access and Integration Administration

  • Lab 6: System health fixes

target_au

This course is for partners and power users that want to be able to get the most value out of their investment in XCC and other tools.


pre_req

Students need to have attended XCC Manage and Deploy. A knowledge of XIQ-SE will be helpful but is not required. Programming skill will also be beneficial but is not needed.


titleExtreme Campus Controller Troubleshooting
days1
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewThis course provides guidance on troubleshooting common wireless issues using XCC. It also provides tips and tricks on troubleshooting common errors within XCC such as API errors, or issues with applications.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Understand wireless issues and how to detect them
  • More effectively troubleshoot wireless
  • How to diagnose common application problems
  • Diagnose API errors
  • Create custom reports and dashboards

outline

Troubleshooting Tips Device Connectivity

  • Lab 1 – AP connection issues

Wireless Client Issues

  • Lab 2 – User can’t connect to wifi
  • Lab 3 – User can’t access network
  • Lab 4 – RADIUS errors

Performance Issues

  • Lab 5 – Determine performance issues

Application Problems

  • Lab 6 – Application not working

API Issues

  • Lab 7 – API Errors

target_au

This course is for partners and power users that want to be able to get the most value out of their investment in XCC.


pre_req

Students need to have attended XCC Manage and Deploy. Knowledge of wireless and troubleshooting should also be understood. Programming skill will also be beneficial but is not needed.


titleCampus Fabric – Management
days1
seo_title
seo_dec
seo_tkey
categoryit-services-management-training
vendorExtreme

techonogyIT Services Management
overviewThe Management of Extreme Networks’ Fabric Connect is the goal of the course. Students will gain a detailed explanation of the fabric services and configure these in the lab. The latest automation features are covered including; auto-sense ports and self-forming fabric. And to provide an understanding of the management products that Extreme offers, students will experience on-boarding switches to both ExtremeCloud™ IQ and the campus solution ExtremeCloud IQ-SE (Site Engine). Lectures are supported equally with hands-on experience on VSPs, Universal Hardware 5520, ERS, and EXOS.
objective

Upon completion of this course, students will have gained the working knowledge to:

  •  To add/change fabric services and add devices to an existing Fabric Connect solution
  •  To utilize the new automation features including auto-sense and self-forming fabric.
  •  Understand Extreme’s management solutions: ExtremeCloud IQ and the campus solution ExtremeCloud IQ-SE (Site Engine) and on-board and manage switches successfully.

outline

Campus Fabric Services

  • Services Types
  • Uni Port Types
  • Multicast considerations

Principles of Automation

  • Zero Touch Capabilities
  • Self-Forming Fabric Configuration
  • Auto-Sense Port Configuration

Fabric Extend

  • XA1400
  • VXLAN
  • IPSec

ExtremeCloud IQ Management

  • On-Boarding
  • Network Policy
  • Device Configuration
  • Supplemental CLI

ExtremeCloud IQ-SE Management

  • ZTP+ and other device discovery methods
  • Secure Device Management
  • Discovery and Actions
  • Onboard VSP workflow
  • Device Management

target_au
pre_req

Students should good grasp of SPBM concepts and overall switch management. Students should have earned the certification ECS – Campus Fabric Deploy.


titleCampus Fabric – Advanced Configuration
days2
seo_title
seo_dec
seo_tkey
categoryrouting-switching
vendorExtreme

techonogyEnterprise Networking
overviewThis course provides an in-depth review of Extreme Networks’ Fabric Connect advanced features for integrating SPBM with other protocols and solution requirements. You will learn how expand the campus configuration by implementing Fabric Extend and Multi-Area SPBM. Also, how to redistribute routes from outside protocols into IS-IS and setting up a PIM gateway. You’ll also learn about how DvR provides Default Gateway Redundancy and optimizes traffic flows. Other topic include RADIUS, EAC integration, Fabric Attach and QoS. Lectures are supported with handson configuration of VSPs, Universal Hardware 5520, ERS, and EXOS.
objective

Upon completion of this course, students will have gained the working knowledge to:

  •  Integrate other protocols and services with Fabric Connect
  •  Implement a DvR network with Fabric Connect
  •  Understand how to expand the campus configuration by implementing Fabric Extend and Multi-Area SPBM

outline

IP Route Redistribution

  • L3VSN VRF redistribute to VRF
  • ISIS/OSPF Gateway
  • PIM Gateway

Fabric Attach

  •  Element Types and operation
  • Redundancy options
  • Configuration scenarios

Fabric Extend

  • XA1400
  • VXLAN
  • IPSec

IS-IS Areas

  • Architecture
  • Boundary Node Configuration

DVR

  • DVR Operation and topology
  • DVR Configuration

Quality of Service

  • QoS Models
  • Police and Shape traffic
  • ACL traffic management

RADIUS

  • Integration with VOSS
  • Auto-Sense port settings
  • Device Management Accounts

Extreme Control Integration

  • Auto-Sense Port considerations
  • Fabric Attach considerations

target_au
pre_req

A solid networking background. Working proficiency and experience with network security and an understanding basic concepts behind Active Directory and Digital Certificates.


titleCampus Fabric – Troubleshooting
days1
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewExtreme Networks’ Fabric Connect is an advanced, reliable, high performance network solution. This training course will review the technologies that support the fabric operation and services highlighting their proper operation and ways to determine misconfiguration. The VOSS tools will be used for identifying device failures along with assistance from the management platforms ExtremeCloud™ IQ and ExtremeCloud IQ-SE (Site Engine). Lectures are supported equally with hands-on troubleshooting activities on VSPs, Universal Hardware 5520, ERS, and EXOS.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Utilize VOSS specific tools for troubleshooting Fabric Connect.
  • Explain how to use the management tools for identifying issues and troubleshooting network issues: ExtremeCloud IQ and the campus solution ExtremeCloud IQ-SE (Site Engine).

outline

VSP Tools

  •  Switch Boot and Images
  • Switch Logs
  • Switch Services and KPI

Switch On-Boarding

  • VOSS Management IP Interfaces
  • Domain Name Services

ExtremeCloud IQ Management Tools

  • Proxy SSH
  • Analytics
  • Supplemental CLI

ExtremeCloud IQ-SE Management Tools

  • Secure Device Management Protocols
  • Onboard VSP workflow
  • Device Alarms and Events

Campus Fabric Services Troubleshooting

  • Control Plane
  • Services L2VSN L3VSN IP Shortcuts
  • Multicast Troubleshooting

vIST Core Switch Pair

  • SPBM traffic distribution
  • VLACP
  • SLPP

Auto-Sense and FA

  • Auto-Sense Port Configuration
  • Fabric Attach LLDP

target_au

This course is designed for network administrators, support engineers and integrators responsible for the management and troubleshooting of the Extreme Networks Campus Fabric Connect switches and devices.


pre_req

Students should have a good grasp of SPBM concepts and overall switch management. Students should have earned the certification ECS – Campus Fabric Deploy.


titleECS Extreme Campus Controller – Installation and Configuration and Management
days2
seo_title
seo_dec
seo_tkey
categoryit-services-management-training
vendorExtreme

techonogyIT Services Management
overviewThis course provides knowledge and skills necessary to deploy Extreme Networks’ Extreme Campus Controller. Students experience the deployment process from the beginning to completion learning all the essential steps and technologies. Lectures are supported equally with hands-on experience with XCCs and relevant access points. Successful completion results in an operational WLAN with Open SSIDs, encryption and authentication, configuration settings, encryption and authentication, AP discovery, and equipment profiles used in the creation and management of Sites in XCC.
objective
  • To deploy and manage Extreme Networks Campus Controllers based on reference architectures from Extreme Networks customer scenarios
  • Take the ECS – XCC Deploy and Manage Exam

outline

Fabric Deployment Options

  • Overview
  • Model Familiarization
  • Initial Setup

Initial XCC Configuration

  • Lab 1 XCC Initialization

Configuration Management

  • Lab 2 XC Management Access Point Adoption Sites
  • Lab 3 Creating Sites

Wireless LAN

  • Open SSID
  • Lab 4 Open WLAN

WLAN with Authentication

  • Lab 5 Secure WLAN (PSK)
  • Lab 6 Secure WLAN (802.1x)

Monitoring

  • Lab 7 Monitoring

Tools

  • Lab 8 Diagnostics

Management

  • Lab 9 Configure XCC Credentials

target_au

This course is designed as the first step for individuals responsible for the installation, configuration and management of the Extreme Networks Campus Controllers.


pre_req

Students should possess a solid grasp of WLAN concepts, including 802.11 Wifi standards, Ethernet, TCP/IP and have referenced and be comfortable with general wireless network topics.


titleECS Extreme Management Center
days4
seo_title
seo_dec
seo_tkey
categoryit-services-management-training
vendorExtreme

techonogyEnterprise Networking
overviewStudents will be introduced to Network Management and Visibility using the Extreme Networks Management tool, Extreme Management Center (XMC), for managing network devices. Using the Open Systems Interconnection (OSI) Network Management Model (NMM), students have these concepts reinforced with a hands-on lab experience working with a pre-configured network. Students will perform real world tasks around the areas of configuration, fault, performance, accounting, and security management functions.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage the Extreme Management Center network management tool
  • Take the Extreme Management Center Specialist certification exam

outline

Introduction

  • Extreme Management Center (XMC) Server requirements and licensing
  • XMC Client Server architecture
  • Accessing and navigating XMC including help and search tools
  • Application categorisation within XMC

Administration

  • Managing user’s authorization within XMC using groups
  • Administrative options to customize and define XMCs operational environment
  • Administration tools for basic tasks including performing backups, determining XMC system resource utilization, and diagnostics
  • XMC licensing management

Configuration Management

  • Mechanisms and protocols used by XMC
  • Automatic discovery of devices and using site templates and scripts
  • Zero Touch Provisioning (ZTP) to automate configuration
  • Manually add devices and change polling parameters
  • Utilizing device group categories and port/element groups

Management Tools

  • MIBs to manage devices
  • Pre-configured FlexViews to customize and create your own FlexViews
  • Use scripts to deploy immediately or via scheduling

Maps

  • Wired and wireless network maps
  • Network details identifying MLAG, EAPS etc. configuration
  • Wireless network maps to determine:
    • Signal strength using Heat maps
    • 2.4 or 5 Gig coverage
    • Client Data Rates

Inventory Management

  • Upload device firmware and upgrade devices
  • Backup and upload network device configurations
  • Compare Device Configurations
  • Manage device inventory within XMC using asset tracking, inventory events and reports

Accounting Management

  • Device and interface statistics collection
  • Network interrogation to see:
    • Number of flows for each application
    • Are they a threat to your network
  • Application Analytics and application response time and network response time
  • Reports for network and performance

Application Analytics

  • Extreme Application Analytics Deployment model and configuration
  • Interface deployment modes for collecting data
  • Best Practices for Port Mirroring, GRE tunnels and Traffic Domains.
  • Integration of XMC, Analytics, Extreme Control and Wireless features to provide network utilization and client details

Fault Management

  • Maps to locate devices, clients, threats
  • Compass as a search tool
  • PortView
  • FlexViews
  • Device and system alarms

Performance Management

  • Alarms and thresholds for system and network devices
  • Response times of Applications
    • For the application or for individual clients
  • Different flows

Reporting

  • Customizing your Dashboard
  • Pre-defined reports and creating custom reports
  • Report Designer for report scheduling
  • Scheduler to run reports and scripts
  • Applications and Flows to control traffic

Security Management

  • Policy Enabled Networks
  • What Policy is
  • Role based networks
  • Policy and QoS configuration using XMC
  • Domains
  • Save and import Policy domains
  • Traffic mirroring with Policy
  • Wireshark with Policy
  • Deploying policy via single or multiple domains
  • Network monitoring for rule hits using XMC

End-System Visibility

  • Managing end user network access with Extreme Access Control
  • Authentication types supported
  • Managing and tracking end users on the network
  • Managing devices through Policy or RFC3580
  • Refine network access using rules and profiles

target_au

This course is intended for Network Managers, Architects, and Systems Integrators responsible for network management.


pre_req

Students should possess an understanding of network fundamentals, and general network management

concepts, as well as network security concepts and technologies. In addition, Extreme Networks recommends the following course prior to enrolling in the Management Center course: Campus EXOS Switching and Routing and/or Campus Fabric Switching and Routing or Access Wireless


titleCampus Fabric – Installation and Configuration
days2
seo_title
seo_dec
seo_tkey
categorydata-center
vendorExtreme

techonogyDatacenter & Virtualization
overviewDeploying networks utilizing the Extreme Networks Campus Fabric networking environment. This knowledge will be reinforced through actual hands-on experience with networking equipment in a lab environment, where students will perform real world tasks.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • To deploy Extreme Networks Fabric Networking solutions based on reference architectures from Extreme Networks customer scenarios
  • Take the ECS Fabric Switching & Routing Exam

outline

Fabric Deployment Options

  • Automation and Onboarding Options​
  • Intelligent Ports â€‹

VSP Switch Management

  • Switching Portfolio​
  • Software Management and Upgrade​
  • Management Interfaces​

Fabric Connect Infrastructure

  • BVLANs​
  • IS-IS global parameters​
  • IS-IS interfaces and adjacencies​

Fabric Management

  • CFM​
  • IP Shortcuts​
  • Mgmt CLIP​

L2VSN

  • L2VSN Configuration​
  • UNI port configuration​
  • Multicast​

L3VSN

  • Inter-VSN Routing over Fabric Connect

Implementing IP Shortcuts

  • Fabric Connect services using IP Shortcut Routing

Implementing Layer 3 VSN

  • VRF routing​
  • Route Redistribution​
  • Inter-VSN Routing​

VIST Core Switch Pair

  • Redundancy on the edge of Fabric​
  • SMLT Configuration​
  • RSMLT​

target_au

This course is designed as the first step for individuals responsible for the installation, configuration and management of the Extreme Networks family of Fabric switches.


pre_req

Students should possess a solid grasp of LAN concepts, including advanced Ethernet and TCP/IP. .And have referenced and be comfortable with the concepts of Fabric networking Covered in the Campus Fabric Introduction Course.


titleExtreme Networks Sales Specialist (ESS) – Software
days1
seo_title
seo_dec
seo_tkey
categorybusiness-skills
vendorExtreme

techonogyBusiness/Technology Specialization
overviewThe Extreme Networks Sales Specialist (ESS) Software Certification provide sales professionals a baseline command of Extreme Networks, software portfolio and its business benefits. This information helps our partners, sales teams successfully position Extreme Networks infrastructure, mobility, software, and security solutions to customers as part of their overall value proposition.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Take the ESS – Software Sales Specialist certification exam

outline

Extreme Networks Sales Specialist (ESS) – Software is a four-lesson course, that will introduce participants to the Extreme Networks Software portfolio.

1. Selling Extreme Software

2. ExtremeManagement™

3. ExtremeControl™

4. ExtremeAnalytics™

Following completion of the course, students are entered into the certification exam, which comprises of 12 questions and requires a mark of 75% or more to pass.


target_au

Sales professionals who need to understand more about the Extreme Networks technology offerings.


pre_req
titleExtreme Networks Sales Specialist (ESS) – Data Center
days1
seo_title
seo_dec
seo_tkey
categorybusiness-skills
vendorExtreme

techonogyBusiness/Technology Specialization
overviewThe Extreme Networks Sales Specialist (ESS) Overview Certification provide sales professionals a baseline command of Extreme Networks value proposition, solution portfolio and customer business benefits. This information helps our partners, sales teams successfully position Extreme Networks infrastructure, mobility, software, and security solutions to customers as part of their overall value proposition.
objective
outline

Extreme Networks Sales Specialist (ESS) – Data Center is a four-lesson course, that will introduce participants to the Extreme Networks Data Center technologies.

1. Agile Data Center

2. Automation and Visibility

3. Fabrics and Architectures

4. Adaptable Platforms

Following completion of the course, students are entered into the certification exam, which comprises of 15 questions and requires a mark of 75% or more to pass.


target_au

Sales professionals who need to understand more about the Extreme Networks technology offerings


pre_req
titleExtreme Networks Sales Specialist (ESS) – Wireless
days1
seo_title
seo_dec
seo_tkey
categorybusiness-skills
vendorExtreme

techonogyBusiness/Technology Specialization
overviewIn this course, attendees will learn about the ExtremeWireless™ portfolio of wireless products, the key differentiators of these leading products and the primary use case examples of where ExtremeWireless solutions have delivered significant customer benefits in the marketplace.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Take the ESS – Wireless Sales Specialist certification exam

outline

Extreme Networks Sales Specialist (ESS) – Wireless is a 3 lesson course, that will introduce participants to the Extreme Networks Wireless portfolio.

1. Wireless Networking Challenges and Solutions

2. Extreme Networks Access Wireless Sales Overview

3. Extreme Networks Access Wireless WiNG Sales Overview

Following completion of the course, students are entered into the certification exam, which comprises of 12 questions and requires a mark of 75% or more to pass.


target_au

Sales professionals who need to understand more about the Extreme Networks technology offerings


pre_req
titleExtreme Networks Sales Specialist (ESS) – Switching
days1
seo_title
seo_dec
seo_tkey
categorybusiness-skills
vendorExtreme

techonogyBusiness/Technology Specialization
overviewThe Extreme Networks Sales Specialist (ESS) Switching Certification provide sales professionals a baseline command of Extreme Networks value proposition, solution portfolio and customer business benefits for our Switching technologies.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Take the ESS – Switching Sales Specialist certification exam

outline

Extreme Networks Sales Specialist (ESS) – Switching is a three-lesson course, that will introduce participants to the Extreme Networks Switching technologies.

1. Automated Campus and Extreme Fabric

2. Extreme Edge Switching

3. Extreme Campus Switching

Following completion of the course, students are entered into the certification exam, which comprises of 15 questions and requires a mark of 75% or more to pass.


target_au

Sales professionals who need to understand more about the Extreme Networks technology offerings.


pre_req
titleExtreme Networks Sales Specialist (ESS) – Overview
days1
seo_title
seo_dec
seo_tkey
categorybusiness-skills
vendorExtreme

techonogyBusiness/Technology Specialization
overviewThe Extreme Networks Sales Specialist (ESS) Overview Certification provide sales professionals a baseline command of Extreme Networks value proposition, solution portfolio and customer business benefits. This information helps our partners, sales teams successfully position Extreme Networks infrastructure, mobility, software, and security solutions to customers as part of their overall value proposition.
objective

Upon completion of this course, students will have gained the working knowledge to:

  • Take the ESS – Overview Sales Specialist certification exam

outline

Extreme Networks Sales Specialist (ESS) – Overview is a three-lesson course, that will introduce participants to the Extreme Networks and its services portfolio.

1. Extreme Networks Corporate Overview

2. Extreme Networks Maintenance Services

3. Extreme Networks Professional Services

 

Following completion of the course, students are entered into the certification exam, which comprises of 12 questions and requires a mark of 75% or more to pass.


target_au

Sales professionals who need to understand more about the Extreme Networks technology offerings.


pre_req
titleDEBIZ – Data Ethics for Business Professionals: Exam DEB-110
days1
seo_title
seo_dec
seo_tkey
categorydata-ethics
vendorCertNexus

techonogyAnalytics & Data Management
overviewThe power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we apply ethical principles to data driven technology? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology.
objective
outline

Each lesson includes activities, indicated in orange and may include resources for learners to integrate ethical practices into their own organization, indicated in blue.

Introduction to Data Ethics 

  • Define Ethics
  • Define Data
  • Define Data Ethics
  • Principles of Data Ethics
  • The Case for Data Ethics
  • Identifying Ethical Issues

Ethical Principles

  • Ethical Frameworks
  • Applying Ethical Frameworks
  • Privacy, Fairness, and Safety
  • Applying Privacy, Fairness, and Safety Principles
  • Algorithms and Human-Centered Values
  • Discussing True and False Positives and Negatives
  • Discussing Accuracy and Precision
  • Discussing Correlation and Causation
  • Transparency and Explainability: The Black Box Problem
  • Discussing Black Box Parallels
  • Inclusive Growth, Sustainable Development, and Well-Being
  • Examining a Tech for Good Organization
  • Improving Ethical Data Practices

Sources of Ethical Risk

  • Bias and Discrimination
  • Case Study: Allegheny Family Screening Tool
  • Data Surveillance
  • Safety and Security
  • Case Study: PredPol

Business Considerations

  • Data Legislation
  • Manage the Effects of Data
  • Case Study
  • Embed Organizational Values in the Data Value Chain
  • Building a Data Ethics Culture/Code of Ethics
  • Stakeholder Checklist

target_au

This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus® DEBIZ™ (Exam DEB-110) credential.


pre_req

To ensure your success in this course, you should have a working knowledge of general business concepts and practices. You should also have a basic understanding of Artificial Intelligence and or Data Science. You can obtain this level of skills and knowledge by taking the following CertNexus courses:

  • AIBIZ™ Artificial Intelligence for Business Professionals
  • DSBIZ™ Data Science for Business Professionals

titleCAIP – Certified Artificial Intelligence (AI) Practitioner: Exam AIP-110
days5
seo_title
seo_dec
seo_tkey
categoryartificial-intelligence
vendorCertNexus

techonogyCloud Computing
overviewArtificial intelligence (AI) and machine learning (ML) have become an essential part of the toolset for many organizations. When used effectively, these tools provide actionable insights that drive critical decisions and enable organizations to create exciting, new, and innovative products and services. This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users.
objective
  • Specify a general approach to solve a given business problem that uses applied AI and ML.
  • Collect and refine a dataset to prepare it for training and testing.
  • Train and tune a machine learning model.
  • Finalize a machine learning model and present the results to the appropriate audience.
  • Build linear regression models.
  • Build classification models.
  • Build clustering models.
  • Build decision trees and random forests.
  • Build support-vector machines (SVMs).
  • Build artificial neural networks (ANNs).
  • Promote data privacy and ethical practices within AI and ML projects.

outline

Lesson 1: Solving Business Problems Using AI and ML

  • Topic A: Identify AI and ML Solutions for Business Problems
  • Topic C: Formulate a Machine Learning Problem
  • Topic D: Select Appropriate Tools

Lesson 2: Collecting and Refining the Dataset

  • Topic A: Collect the Dataset
  • Topic B: Analyze the Dataset to Gain Insights
  • Topic C: Use Visualizations to Analyze Data
  • Topic D: Prepare Data

Lesson 3: Setting Up and Training a Model

  • Topic A: Set Up a Machine Learning Model
  • Topic B: Train the Model

Lesson 4: Finalizing a Model

  • Topic A: Translate Results into Business Actions
  • Topic B: Incorporate a Model into a Long-Term Business Solution

Lesson 5: Building Linear Regression Models

  • Topic A: Build a Regression Model Using Linear Algebra
  • Topic B: Build a Regularized Regression Model Using Linear Algebra
  • Topic C: Build an Iterative Linear Regression Model

Lesson 6: Building Classification Models

  • Topic A: Train Binary Classification Models
  • Topic B: Train Multi-Class Classification Models
  • Topic C: Evaluate Classification Models
  • Topic D: Tune Classification Models

Lesson 7: Building Clustering Models

  • Topic A: Build k-Means Clustering Models
  • Topic B: Build Hierarchical Clustering Models

Lesson 8: Building Advanced Models

  • Topic A: Build Decision Tree Models
  • Topic B: Build Random Forest Models

Lesson 9: Building Support-Vector Machines

  • Topic A: Build SVM Models for Classification
  • Topic B: Build SVM Models for Regression

Lesson 10: Building Artificial Neural Networks

  • Topic A: Build Multi-Layer Perceptrons (MLP)
  • Topic B: Build Convolutional Neural Networks (CNN)

Lesson 11: Promoting Data Privacy and Ethical Practices

  • Topic A: Protect Data Privacy
  • Topic B: Promote Ethical Practices
  • Topic C: Establish Data Privacy and Ethics Policies

Appendix A: Mapping Course Content to CertNexus® Certified Artificial Intelligence (AI) Practitioner (Exam AIP-100)


target_au

he skills covered in this course converge on three areas—software development, applied math and statistics, and business analysis. Target students for this course may be strong in one or two or these of these areas and looking to round out their skills in the other areas so they can apply artificial intelligence (AI) systems, particularly machine learning models, to business problems.

So the target student may be a programmer looking to develop additional skills to apply machine learning algorithms to business problems, or a data analyst who already has strong skills in applying math and statistics to business problems, but is looking to develop technology skills related to machine learning.

A typical student in this course should have several years of experience with computing technology, including some aptitude in computer programming.

This course is also designed to assist students in preparing for the CertNexus® Certified Artificial Intelligence (AI) Practitioner (Exam AIP-110) certification.


pre_req

To ensure your success in this course, you should have at least a high-level understanding of fundamental AI concepts, including, but not limited to: machine learning, supervised learning, unsupervised learning, artificial neural networks, computer vision, and natural language processing.

You can obtain this level of knowledge by taking the CertNexus AIBIZ™ (Exam AIZ-110) course. You should also have experience working with databases and a high-level programming language such as Python, Java, or C/C++. You can obtain this level of skills and knowledge by taking the following Logical Operations or comparable course:

  • Database Design: A Modern Approach
  • Python® Programming: Introduction
  • Python® Programming: Advanced

titleCybersecurity Essentials 1.1 Scope and Sequence
days5
seo_title
seo_dec
seo_tkey
categorycybersecurity
vendorInsoft Specials

techonogySecurity
overviewCybersecurity Essentials 1.1 helps students:
  • Understand the players in the cybersecurity world and the motivation of cyber criminals and cybersecurity specialists.
  • Learn to identify security attacks, symptoms, processes, and countermeasures.
  • Learn foundational knowledge in various security domains.
  • Build skills in security management, controls, protection, and mitigation technologies.
  • Learn security laws, ethics, and how to develop security policies.
  • Learn the roles of different cybersecurity professionals and career options.
The course has many features to help students understand these concepts:
  • Rich multimedia content, including interactive activities, videos, games, and quizzes, addresses a variety of learning styles and help stimulate learning and increase knowledge retention
  • Hands-on labs and Packet Tracer simulation-based learning activities help students develop critical thinking and complex problem solving skills
  • Innovative assessments provide immediate feedback to support the evaluation of knowledge and acquired skills
  • Technical concepts are explained using language that works well for learners at all levels and embedded interactive activities break up reading of the content and help reinforce understanding
  • The curriculum encourages students to consider additional IT education, but also emphasizes applied skills and hands-on experience
  • Cisco Packet Tracer activities are designed for use with Packet Tracer 6.3 or later.

objective

Cybersecurity Essentials 1.1 covers foundation knowledge and essentials skills in all security domains in the cyber world – information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense and mitigation techniques use in protecting businesses.

Upon completion of the Cybersecurity Essentials 1.1 course, students will be able to perform the following tasks:

  • Describe the characteristics of criminals and experts in the cybersecurity world.
  • Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.
  • Describe the tactics, techniques and procedures used by cyber criminals.
  • Describe how technologies, products and procedures are used to protect confidentiality.
  • Describe how technologies, products and procedures are used to ensure integrity.
  • Describe how technologies, products, and procedures provide high availability.
  • Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.
  • Explain the purpose of laws related to cybersecurity.

outline

Chapter 1. Cybersecurity: A World of Experts and Criminals

Describe the characteristics of criminals and experts in the cybersecurity world.

  • 1.1 The Cybersecurity World Describe the common characteristics comprising the cybersecurity world
  • 1.2 Cyber Criminals versus Cybersecurity Specialists Differentiate the characteristics of cyber criminals and cybersecurity specialists.
  • 1.3 Common Threats Compare how cybersecurity threats affect individuals, businesses, and organizations.
  • 1.4 Spreading Cybersecurity Threats Describe the factors that lead to the spread and growth of cybercrime.
  • 1.5 Creating More Experts Describe the organizations and efforts committed to expanding the cybersecurity workforce.

Chapter 2. The Cybersecurity Cube

Describe how the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures.

  • 2.1 The Three Dimensions of the Cybersecurity Cube Describe the three dimensions of the Cybersecurity Cube (McCumber Cube).
  • 2.2 CIA Triad Describe the principles of confidentiality, integrity, and availability.
  • 2.3 States of Data Differentiate the three states of data.
  • 2.4 Cybersecurity Countermeasures Compare the types of cybersecurity countermeasures.
  • 2.5 IT Security Management Framework Describe the ISO Cybersecurity Model

Chapter 3. Cybersecurity Threats, Vulnerabilities and Attacks

Describe the tactics, techniques and procedures used by cyber criminals.

  • 3.1 Malware and Malicious Code Differentiate the types of malware and malicious code.
  • 3.2 Deception Compare the different methods used in social engineering.
  • 3.3 Attacks Compare different types of cyberattacks.

Chapter 4. The Art of Protecting Secrets

Describe how technologies, products and procedures are used to protect confidentiality.

  • 4.1 Cryptography Explain how encryption techniques protect confidentiality.
  • 4.2 Access Controls Describe how access control techniques protect confidentiality.
  • 4.3 Obscuring Data Describe the concept of obscuring data.

Chapter 5. The Art of Ensuring Integrity

Describe how technologies, products and procedures are used to ensure integrity.

  • 5.1 Types of Data Integrity Controls Explain processes used to ensure integrity.
  • 5.2 Digital Signatures Explain the purpose digital signatures.
  • 5.3 Certificates Explain the purpose digital certificates.
  • 5.4 Database Integrity Enforcement Explain the need for database integrity enforcement.

Chapter 6. The Five Nines Concept

Describe how technologies, products, and procedures provide high availability.

  • 6.1 High Availability Explain the concept of high availability.
  • 6.2 Measures to Improve Availability Explain how high availability measures are used to improve availability.
  • 6.3 Incident Response Describe how an incident response plan improves high availability.
  • 6.4 Disaster Recovery Describe how disaster recovery planning plays an important role in implementing high availability.

Chapter 7. Protecting a Cybersecurity Domain

Explain how cybersecurity professionals use technologies, processes and procedures to defend all components of the network.

  • 7.1 Defending Systems and Devices Explain how processes and procedures protect systems.
  • 7.2 Server Hardening Explain how to protect servers on a network.
  • 7.3 Network Hardening Explain how to implement security measures to protect network devices.
  • 7.4 Physical and Environmental Security Explain how physical security measures are implemented to protect network equipment.

Chapter 8. Becoming a Cybersecurity Specialist

Explain the purpose of laws related to cybersecurity.

  • 8.1 Cybersecurity Domains Describe how cybersecurity domains are used within the CIA triad.
  • 8.2 Understanding the Ethics of Working in Cybersecurity Explain how ethics provide guidance.
  • 8.3 Next Step Explain how to take the next step to become a cybersecurity professional

target_au

The Cybersecurity Essentials 1.1 course is designed for students who are interested in pursuing more advanced studies the field of cybersecurity. This preparatory course provides with an overview of the cybersecurity field. The curriculum explores the characteristics of and tactics used by cyber criminals. It then delves into the technologies, products, and procedures cybersecurity professional use to combat cybercrime. The curriculum is appropriate for students at many education levels and types of institutions, including high schools, secondary schools, universities colleges, career and technical schools, and community centers.


pre_req
titleCertified Data Science Practitioner (CDSP) (Exam DSP-110)
days5
seo_title
seo_dec
seo_tkey
categorydata-science
vendorCertNexus

techonogyDatacenter & Virtualization
overviewFor a business to thrive in our data-driven world, it must treat data as one of its most important assets. Data is crucial for understanding where the business is and where it's headed. Not only can data reveal insights, it can also inform—by guiding decisions and influencing day-to-day operations. This calls for a robust workforce of professionals who can analyze, understand, manipulate, and present data within an effective and repeatable process framework. In other words, the business world needs data science practitioners. This course will enable you to bring value to the business by putting data science concepts into practice.
objective

In this course, you will implement data science techniques in order to address business issues.

You will:

• Use data science principles to address business issues.
• Apply the extract, transform, and load (ETL) process to prepare datasets.
• Use multiple techniques to analyze data and extract valuable insights.
• Design a machine learning approach to address business issues.
• Train, tune, and evaluate classification models.
• Train, tune, and evaluate regression and forecasting models.
• Train, tune, and evaluate clustering models.
• Finalize a data science project by presenting models to an audience, putting models into production, and monitoring model performance


outline

Lesson 1: Addressing Business Issues with Data Science

  • Topic A: Initiate a Data Science Project
  • Topic B: Formulate a Data Science Problem

Lesson 2: Extracting, Transforming, and Loading Data

  • Topic A: Extract Data
  • Topic B: Transform Data
  • Topic C: Load Data

Lesson 3: Analyzing Data

  • Topic A: Examine Data
  • Topic B: Explore the Underlying Distribution of Data
  • Topic C: Use Visualizations to Analyze Data
  • Topic D: Preprocess Data

Lesson 4: Designing a Machine Learning Approach

  • Topic A: Identify Machine Learning Concepts
  • Topic B: Test a Hypothesis

Lesson 5: Developing Classification Models

  • Topic A: Train and Tune Classification Models
  • Topic B: Evaluate Classification Models

Lesson 6: Developing Regression Models

  • Topic A: Train and Tune Regression Models
  • Topic B: Evaluate Regression Models

Lesson 7: Developing Clustering Models

  • Topic A: Train and Tune Clustering Models
  • Topic B: Evaluate Clustering Models

Lesson 8: Finalizing a Data Science Project

  • Topic A: Communicate Results to Stakeholders
  • Topic B: Demonstrate Models in a Web App
  • Topic C: Implement and Test Production Pipelines

 

Appendix A: Mapping Course Content to CertNexus® Certified Data Science Practitioner (CDSP) (Exam DSP-110)


target_au

This course is designed for business professionals who leverage data to address business issues. The typical student in this course will have several years of experience with computing technology, including some aptitude in computer programming.

However, there is not necessarily a single organizational role that this course targets. A prospective student might be a programmer looking to expand their knowledge of how to guide business decisions by collecting, wrangling, analyzing, and manipulating data through code; or a data analyst with a background in applied math and statistics who wants to take their skills to the next level; or any number of other data driven situations.

Ultimately, the target student is someone who wants to learn how to more effectively extract insights from their work and leverage that insight in addressing business issues, thereby bringing greater value to the business.

This course is also designed to assist students in preparing for the CertNexus® Certified Data Science Practitioner (CDSP) (Exam DSP-110) certification.


pre_req

To ensure your success in this course, you should have at least a high-level understanding of fundamental data science concepts, including, but not limited to: types of data, data science roles, the overall data science lifecycle, and the benefits and challenges of data science. You can obtain this level of knowledge by taking the CertNexus DSBIZ™ (Exam DSZ-110) course.

You should have also have experience with high-level programming languages like Python. Being comfortable using fundamental Python data science libraries like NumPy and pandas is highly recommended. You can obtain this level of skills and knowledge by taking the Logical Operations course Using Data Science Tools in Python® .

In addition to programming, you should also have experience working with databases, including querying languages like SQL. Several Logical Operations courses can help you attain this experience:

• Database Design: A Modern Approach
• SQL Querying: Fundamentals (Second Edition)
• SQL Querying: Advanced (Second Edition)


titleDSBIZ™ – Data Science for Business Professionals (Exam DSZ-110)
days1
seo_title
seo_dec
seo_tkey
categorydata-science
vendorCertNexus

techonogyDatacenter & Virtualization
overviewThe ability to identify and respond to changing trends is a hallmark of a successful business. Whether those trends are related to customers and sales, or to regulatory and industry standards, businesses are wise to keep track of the variables that can affect the bottom line. In today's business landscape, data comes from numerous sources and in diverse forms. By leveraging data science concepts and technologies, businesses can mold all of that raw data into information that facilitates decisions to improve and expand the success of the business.
objective
outline

Lesson 1: Data Science Fundamentals

  • Topic A: What is Data Science?
  • Topic B: Types of Data
  • Topic C: The Data Science Lifecycle

Lesson 2: Data Science Implementation

  • Topic A: Data Acquisition and Preparation
  • Topic B: Data Modeling and Visualization
  • Topic C: Data Science Roles

Lesson 3: The Impact of Data Science

  • Topic A: Benefits of Data Science
  • Topic B: Challenges of Data Science
  • Topic C: Business Use Cases for Data Science

target_au

This course is designed for business leaders and decision makers, including C-level executives, project managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who want to increase their knowledge of and familiarity with concepts surrounding data science. Other individuals who want to know more about basic data science concepts are also candidates for this course.

This course is also designed to assist learners in preparing for the CertNexus® DSBIZ™ (Exam DSZ-110) credential.


pre_req

To ensure your success in this course, you should have a working knowledge of general business concepts and practices. You should also have a basic understanding of information technology (IT) resources and systems, including networks, computers, and other digital devices used in an enterprise setting


titleATD with DXL, TIE and MAR Administration
days4
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogyIT Systems and Security
overviewIn this course, you will learn the tasks crucial to set up, administer, and manage Advanced Threat Defence (ATD), Data Exchange Layer (DXL), Threat Intelligence Exchange (TIE), and Active Response (MAR) solutions. Our ATD with DXL, TIE and MAR Administration course provides an indepth look at each of the products and how they integrate with each other. In this course, you will learn the tasks crucial to set up, administer, and manage Advanced Threat Defense (ATD), Data Exchange Layer (DXL), Threat Intelligence Exchange (TIE), and Active Response (MAR) solutions. This combined solution enables you to gain better visibility to your environment, protecting and limiting exposure to threats and vulnerabilities. This course combines lectures and practical lab exercises with significant time allocated for hands-on interaction with the ATD, TIE, DXL, and MAR user interfaces, as well as detailed instructions for the integration of this solution.
objective
  • Describe ATD solution purpose, key features, and benefits.
  • Install and configure ATD appliance settings.
  • Create VM and analyzer profiles in ATD to be used for analysis.
  • Submit content to ATD for analysis, interpret the results, generate reports, and manage the whitelist and blacklist.
  • Update security content and software in ATD.
  • Identify resources and tools useful for basic troubleshooting in ATD.
  • Describe the DXL, TIE, and MAR solutions, requirements, and key features.
  • Install and verify TIE, DXL, and MAR components.
  • Configure basic policies for DXL brokers and clients.
  • Configure the DXL broker in ePO.
  • Describe and perform basic troubleshooting tasks for DXL.
  • Identify and configure policies required for a TIE environment.
  • Analyze and manage threat reputation.
  • Explain how to configure the Active Response service from ePO.
  • Explain how to use MAR collectors, searches, reactions, and triggers.
  • Use Threat Workspace to investigate malware.
  • Integrate ATD with selected McAfee solutions and explain how to operationalize the solutions to deliver specific outcomes.

outline

Day 1

  • Welcome
  • Products Integration
  • Advanced Threat Defense Solution Overview
  • ATD Installation and Set up
  • Configuring ATD Appliance Settings
  • Creating Virtual Machines in ATD

Day 2

  • Malware Analysis in ATD
  • Configuring ATD Cluster
  • Managing Content and Basic Troubleshooting in ATD
  • Data Exchange Layer Overview
  • Threat Intelligence Exchange Overview
  • Active Response Overview

Day 3

  • DXL, TIE, and MAR Installation
  • Managing, Configuring, and Troubleshooting DXL
  • Configuring and Using TIE
  • Configuring and Using MAR

Day 4

  • Using MAR Threat Workspace, Health Status, and Remediation History
  • ATD Integration with ePO, DXL, TIE, and MAR
  • ATD Integration with MWG and NSP
  • ATD Integration with Email Connector and ESM

target_au

This course is intended for system and network administrators, security personnel, auditors, and/or consultants concerned with system endpoint security


pre_req
titleIntroduction to Microsoft Excel 2019
days1
seo_title
seo_dec
seo_tkey
categorymicrosoft-office-365
vendorMicrosoft

techonogyAnalytics & Data Management
overviewIn this Introduction to Microsoft Excel 2019 training class, students will create and edit basic worksheets and workbooks. This course is designed for students who want to gain the necessary skills to create, edit, format, and print basic Microsoft Excel 2019 worksheets.
objective
  • Create basic worksheets using Microsoft Excel 2019.
  • Perform calculations in an Excel worksheet.
  • Modify an Excel worksheet.
  • Modify the appearance of data within a worksheet.
  • Manage Excel workbooks.
  • Print the content of an Excel worksheet.
  • Learn how to use handy features new in 2019.

outline

Module 1: Creating a Microsoft Excel Workbook

This module explains how to create and start working with workbooks and worksheets.

Lessons

  • Starting Microsoft Excel
  • Creating a Workbook
  • Saving a Workbook
  • The Status Bar
  • Adding and Deleting Worksheets
  • Copying and Moving Worksheets
  • Changing the Order of Worksheets
  • Splitting the Worksheet Window
  • Closing a Workbook

Lab 1: Creating a Microsoft Excel Workbook

  • Creating a Microsoft Excel Workbook
After completing this module, students will be able to:
  • Start Microsoft Excel.
  • Create a Microsoft Excel workbook.
  • Save a Microsoft Excel workbook.
  • Understand the Status Bar.
  • Add and delete Microsoft Excel worksheets.
  • Copy and move worksheets.
  • Split the worksheet window.8. To close a Microsoft Excel workbook.

Module 2: The Ribbon

This module explains how to work with the Ribbon.

Lessons

  • Tabs
  • Groups
  • Commands

Lab 1: The Ribbon Exercises

  • Open a Workbook
  • Select, Open, and Save a Template Agenda
After completing this module, students will be able to:
  • Work with tabs.
  • Work with groups.
  • Work with commands.
  • Know which groups and commands are found on which tabs.

Module 3: The Backstage View (The File Menu)

This module explains how to work with the Backstage View.

Lessons

  • Introduction to the Backstage View
  • Opening a Workbook
  • Open a Workbook
  • New Workbooks and Excel Templates
  • Select, Open and Save a Template Agenda
  • Printing Worksheets
  • Print a Worksheet
  • Adding Your Name to Microsoft Excel
  • Adding a Theme to Microsoft Excel

Lab 1: Backstage View Exercises

  • Print a Worksheet
  • Open a Workbook
After completing this module, students will be able to:
  • Work with the Backstage view.
  • Open a Microsoft Excel workbook.
  • Start a new Microsoft Excel workbook.
  • Use Microsoft Excel templates.
  • Print a Microsoft Excel workbook.
  • Personalize your copy of Microsoft Excel

Module 4: The Quick Access Toolbar

This module explains how to work with the Quick Access Toolbar.

Lessons

  • Adding Common Commands
  • Adding Additional Commands with the Customize Dialog Box
  • Adding Ribbon Commands or Groups
  • Placement
  • Customize the Quick Access Toolbar

Lab 1: Customize the Quick Access Toolbar

  • Customize the Quick Access Toolbar
After completing this module, students will be able to:
  • Add common commands to the Quick Access Toolbar.
  • Add additional commands to the Quick Access Toolbar.
  • Move the Quick Access Toolbar.

Module 5: Entering Data in Microsoft Excel Worksheets

This module explains how to enter data in Microsoft Excel worksheets.

Lessons

  • Entering Text
  • Adding and Deleting Cells
  • Adding a Hyperlink
  • Add WordArt to a Worksheet
  • Using AutoComplete
  • Entering Text and Using AutoComplete
  • Entering Numbers and Dates
  • Using the Fill Handle
  • Entering Numbers and Dates

Lab 1: Entering Data Exercises

  • Entering Text and Using AutoComplete
  • Entering Numbers and Dates
After completing this module, students will be able to:
  • Enter text in Microsoft Excel worksheets.
  • Add or delete cells in worksheets.
  • Add an outline for your data.
  • Enter a hyperlink in a worksheet.
  • Use AutoComplete.
  • Enter numbers and dates in Microsoft Excel worksheets.
  • Use the Fill Handle to add data to cells.

Module 6: Formatting Microsoft Excel Worksheets

This module explains how to format Microsoft Excel worksheets.

Lessons

  • Selecting Ranges of Cells
  • Hiding Worksheets
  • Adding Color to Worksheet Tabs
  • Adding Themes to Workbooks
  • Customize a Workbook Using Tab Colors and Themes
  • Adding a Watermark
  • The Font Group
  • Working with Font Group Commands
  • The Alignment Group
  • Working with Alignment Group Commands
  • The Number Group
  • Working with Number Group Commands

Lab 1: Formatting Worksheets Exercises

  • Customize a Workbook Using Tab Colors and Themes
  • Working with Font Group Commands
  • Working with Alignment Group Commands
  • Working with Number Group Commands
After completing this module, students will be able to:
  • Understand various ways you can format Microsoft Excel worksheets.
  • Select a range of cells within a worksheet.
  • Hide worksheets.
  • Add color to workbook tabs.
  • Add themes to worksheets.
  • Bold, italicize and underline text.
  • Add borders to cells.
  • Change text and cell colors.
  • Change the font and font size.
  • Align text.
  • Wrap text.
  • Indent text.
  • Merge and center text.
  • Change number formats.
  • Change date formats.
  • Show decimals.

Module 7: Using Formulas in Microsoft Excel

This module explains how to work with formulas in Microsoft Excel.

Lessons

  • Math Operators and the Order of Operations
  • Entering Formulas
  • AutoSum (and Other Common Auto-Formulas)
  • Copying Formulas and Functions
  • Relative, Absolute, and Mixed Cell References
  • Working with Formulas

Lab 1: Working with Formulas

  • Working with Formulas
After completing this module, students will be able to:
  • Understand math operators and the order of operations in Excel.
  • Enter basic formulas.
  • Use AutoSum to sum data with one click.
  • Understand absolute, relative, and mixed cell references.
  • Copy formulas and functions.

Module 8: Working with Rows and Columns

This module explains how to work with rows and columns in Microsoft Excel.

Lessons

  • Inserting Rows and Columns
  • Deleting Rows and Columns
  • Transposing Rows and Columns
  • Setting Row Height and Column Width
  • Hiding and Unhiding Rows and Columns
  • Freezing Panes
  • Working with Rows and Columns

Lab 1: Working with Rows and Columns

  • Working with Rows and Columns
After completing this module, students will be able to:
  • Insert rows and columns in Microsoft Excel worksheets.
  • Delete rows and columns in Microsoft Excel worksheets.
  • Transpose rows and columns.
  • Change row heights.
  • Change column widths.
  • Hide and unhide rows and columns.
  • Freeze panes.

Module 9: Editing Worksheets

This module explains how to edit worksheets in Microsoft Excel.

Lessons

  • Find
  • Find and Replace
  • Using Find and Replace
  • Using the Clipboard
  • Using Format Painter
  • Managing Comments

Lab 1: Editing Worksheets Exercises

  • Using Find and Replace
  • Using the Clipboard
  • Using Format Painter
After completing this module, students will be able to:
  • Locate information in your worksheet using Find.
  • Use Find and Replace to quickly replace data with other data.
  • Use the Cut, Copy, Paste and Format Painter commands to edit worksheets.
  • Manage comments

Module 10: Finalizing Microsoft Excel Worksheets

This module explains how to finalize Microsoft Excel worksheets.

Lessons

  • Setting Margins
  • Setting Page Orientation
  • Setting the Print Area
  • Print Scaling (Fit Sheet on One Page)
  • Printing Headings on Each Page/Repeating Headers and Footers
  • Headers and Footers
  • Preparing to Print

Lab 1: Preparing to Print

  • Preparing to Print
After completing this module, students will be able to:
  • Set margins in Microsoft Excel worksheets.
  • Set the page orientation to portrait or landscape.
  • Set the print area in a worksheet.
  • Scale a worksheet so that all data prints on one page.
  • Add headers and footers to a worksheet.

target_au
pre_req
  • Familiarity with using a personal computer, mouse, and keyboard.
  • Comfortable in the Windows environment.
  • Ability to launch and close programs; navigate to information stored on the computer; and manage files and folders.

titleBrocade SAN Advanced
days4
seo_title
seo_dec
seo_tkey
categorydatacenter-courses
vendorBrocade

techonogyDatacenter & Virtualization
overviewThis accelerated theory-only course builds upon the Brocade SAN Fundamentals (BRF) and teaches students advanced FC SAN topics such as virtualization, Data Center Interconnect via native FC and native FCIP as well as interesting Traffic Engineering techniques for Brocade "Adaptive Networking" (QoS, Top Talker, TI-Zoning). Other important topics deal with FC-FC Routing for more efficient and robust resource management within a SAN, Security features and the popular Access Gateway mode. This course covers troubleshooting, performance and monitoring techniques.
objective
outline
  • FC Adaptive Networking Overview (Top Talker, QoS, Ingress Rate Limiting, TI-Zones)
  • FCIP tunneling techniques
  • FC-FC Routing (EX-Ports, LSANs)
  • Security concepts of Brocade SAN Switches
  • Access Gateway Mode
  • FC Long Distance
  • Basic Troubleshooting SANs
  • Virtual Fabrics Overview

target_au
  • Experienced Brocade Switch administrators
  • System Integrators, Field / System Engineers and Support staff
  • SAN designer
  • Employees preparing for the Brocade Certified Fabric Professional (BCFP) certification

pre_req
titleBrocade SAN Fundamentals (BRF)
days3
seo_title
seo_dec
seo_tkey
categorydatacenter-courses
vendorBrocade

techonogyDatacenter & Virtualization
overviewIn this course students learn the basics of the FC protocol, get to know the Brocade platforms (8/16/32 Gbps) and new technologies of the 6th generation (32 Gbps) and learn how to implement and manage a typical enterprise SAN. Topics of this class cover Name Server, RSCN Delivery, FCIDs, WWNs, Domain IDs, Shared Area concepts, Fabric Principal, Merging conflicts and more. Single-CP (300, 5100, 65xx) and Dual-CP (DCX Backbones) Switches are covered for their high-availability and other special features. The course also covers the software features of FabricOS 7.x and 8.x as well as topics like zoning and administration, Non-Disruptive Firmware Upgrades and Config management. Other topics of this class include Load Balancing methods, FSPF, Trunking, DLS, DPS and Routing Policies. This course includes extensive hands-on lab excercises to deepen the theoretical knowledge learned in class.
objective
outline
  • 8, 16 & 32 Gbps Brocade Switch-Platform Overview
  • Fibre Channel theory and concepts
  • Brocade B-series Switch installation, configuration & verification
  • Maintenance tasks such as Firmware Upgrade & Configuration Management
  • Concepts & configuration of Zoning on Brocade B-Series Switches
  • Brocade switching/routing concepts in a fabric (Routing Policies, FSPF, Load Balancing)
  • Brocade trunking concepts

target_au
  • Brocade Switch administrator
  • System Integrators, Field / System Engineers and Support staff
  • Employees preparing for the Brocade Associate SAN Administrator (BASA) certification

pre_req

Knowledge in FC/SCSI Storage solutions and and/or LANs


titleProfessional Scrum Product Owner™ I (PSPO™)
days2
seo_title
seo_dec
seo_tkey
categoryleadership-management-courses
vendorSCRUM

techonogyLeadership Management
overviewProfessional Scrum Product Owner™ I (PSPO™ I) training provides knowledge on how to use Agile and Scrum to maximize that value. Become a Product Owner who takes real ownership of the product, as an entrepreneur with tactical and strategic directional authority for the product. .
objective
outline

Fundamentals of the Product Owner role

  • Values of agile development
  • Responsibilities of Product Owner
  • Appropriate meetings with the Product Owner
  • Compulsions of the Product Owner
  • Leadership qualities of the Product Owner
  • Understanding of business values incl. KPIs
  • Measuring business value

Practical Skill Development

  • Product build up
  • Relevance of user stories
  • Setting and achieving strategic product goals
  • Release strategies and planning with Scrum
  • Estimating and prioritizing requirements
  • Forecasting capability with Scrum
  • Product development involving multiple teams
  • Total cost of ownership

target_au
pre_req
titleIBM FileNet P8 Platform Essentials (V5.5.x) SPVC
days1
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course introduces you to the key concepts of IBM FileNet P8 Platform such as architecture, P8 domain structures, organizing the content across the enterprise, and security. Includes information to manage logging, auditing, and storage areas.
objective
  • Introduction to IBM FileNet P8 Platform
  • Architecture and domain structures
  • Configure logging• Configure auditing
  • Introduction to IBM FileNet P8 Platform security
  • Manage storage areas
  • Introduction to IBM FileNet P8 content services containers
  • Organize content across the enterprise

outline

Introduction to IBM FileNet P8 Platform 
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions Architecture and domain structures
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator  Configure logging
• View and archive system logs
• Configure trace logging Configure auditing
• Create audit definitions
• Prune audit entries  Introduction to IBM FileNet P8 Platform security
• Identify access issues
• Change direct security of an object
• Customize security access Manage storage areas
• Create a file storage area
• Create a storage policy
• Create an advanced storage area Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers Organize content across the enterprise
• Multitenancy considerations
• Isolating content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for administrating and configuring IBM FileNet P8 Platform.


pre_req

Familiarity with enterprise content management concepts.


titleIBM FileNet P8 Platform Administration (V5.5.x) SPVC
days5
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches.
objective
  • Introduction to IBM FileNet P8 Platform
  • IBM FileNet P8 Platform features
  • IBM FileNet P8 Platform integration options
  • IBM FileNet P8 Platform components
  • IBM FileNet P8 Platform solutions Architecture and domain structures
  • IBM FileNet P8 Platform Architecture
  • Explore the core IBM FileNet P8 Platform applications
  • Locate P8 domain structures
  • Use IBM Content Navigator Manage logging
  • View and archive system logs
  • Configure trace logging Configure auditing
  • Create audit definitions
  • Prune audit entries
  • Manage storage areas
  • Create a file storage area
  • Create a storage policy
  • Create an advanced storage area
  • Build an object store
  • Create JDBC data sources for an object store
  • Create an object store
  • Add the repository to an IBM Content Navigator desktop
  • Create property templates and classes
  • Create a choice list
  • Create property templates
  • Create document and folder classes Modify classes and properties
  • Change the property template name
  • Modify a choice list
  • Work with metadata dependencies
  • Use events to trigger actions
  • Create a subscription with an event action
  • Update the event action with new code module
  • Configure security for IBM FileNet P8 assets
  • Configure initial object store security
  • Use the Security Script wizard
  • Configure default instance security
  • Configure security inheritance
  • Implement designer group access
  • Configure role-based access
  • Use bulk operations
  • Use bulk actions to modify security for multiple documents
  • Use bulk operations to cancel checkout of documents
  • Configure content-based retrieval searches
  • Register IBM Content Search Services
  • Configure index partitioning
  • Configure content-based indexes
  • Create content-based searches
  • Work with sweeps
  • Configure a bulk move content job
  • Create a disposal policy
  • Create a content migration policy
  • Move IBM FileNet P8 Platform applications between environments
  • Configure a destination environment
  • Create a source environment
  • Export the FileNet P8 application assets
  • Convert and analyze the FileNet P8 assets
  • Import the application assets
  • Run a change impact analysis in command line
  • Introduction to IBM FileNet P8 content services containers
  • IBM FileNet P8 content services containers
  • Benefits of containers
  • Considerations when choosing containers
  • Organize content across the enterprise
  • Plan for Multitenancy
  • Isolate content in an IBM FileNet P8 platform system

outline

Introduction to IBM FileNet P8 Platform
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform integration options
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions

Architecture and domain structures
• IBM FileNet P8 Platform Architecture
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator

Manage logging
• View and archive system logs
• Configure trace logging

Configure auditing
• Create audit definitions
• Prune audit entries

Manage storage areas
• Create a file storage area
• Create a storage policy
• Create an advanced storage area

Build an object store
• Create JDBC data sources for an object store
• Create an object store
• Add the repository to an IBM Content Navigator desktop Create property templates and classes
• Create a choice list
• Create property templates
• Create document and folder classes

Modify classes and properties
• Change the property template name
• Modify a choice list
• Work with metadata dependencies Use events to trigger actions
• Create a subscription with an event action
• Update the event action with new code module

Configure security for IBM FileNet P8 assets
• Configure initial object store security
• Use the Security Script wizard
• Configure default instance security
• Configure security inheritance
• Implement designer group access
• Configure role-based access

+O35Use bulk operations
• Use bulk actions to modify security for multiple documents
• Use bulk operations to cancel checkout of documents

Configure content-based retrieval searches
• Register IBM Content Search Services
• Configure index partitioning
• Configure content-based indexes
• Create content-based searches Work with sweeps
• Configure a bulk move content job
• Create a disposal policy
• Create a content migration policy

Move IBM FileNet P8 Platform applications between environments
• Configure a destination environment
• Create a source environment
• Export the FileNet P8 application assets
• Convert and analyze the FileNet P8 assets
• Import the application assets
• Run a change impact analysis in command line  Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers

Organize content across the enterprise
• Plan for Multitenancy
• Isolate content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system.


pre_req

Familiarity with enterprise content management concepts.


titleIBM FileNet P8 Platform Essentials (V5.5.x)
days1
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course introduces you to the key concepts of IBM FileNet P8 Platform such as architecture, P8 domain structures, organizing the content across the enterprise, and security. Includes information to manage logging, auditing, and storage areas.
objective
  • Introduction to IBM FileNet P8 Platform
  • Architecture and domain structures
  • Configure logging
  • Configure auditing
  • Introduction to IBM FileNet P8 Platform security
  • Manage storage areas
  • Introduction to IBM FileNet P8 content services containers
  • Organize content across the enterprise

outline

Introduction to IBM FileNet P8 Platform
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions Architecture and domain structures
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator  Configure logging
• View and archive system logs
• Configure trace logging Configure auditing
• Create audit definitions
• Prune audit entries  Introduction to IBM FileNet P8 Platform security
• Identify access issues
• Change direct security of an object
• Customize security access Manage storage areas
• Create a file storage area
• Create a storage policy
• Create an advanced storage area Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers Organize content across the enterprise
• Multitenancy considerations
• Isolating content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for administrating and configuring IBM FileNet P8 Platform.


pre_req

Familiarity with enterprise content management concepts.


titleIBM FileNet P8 Platform Administration (V5.5.x)
days5
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches.
objective
  • Introduction to IBM FileNet P8 Platform
  • IBM FileNet P8 Platform features
  • IBM FileNet P8 Platform integration options
  • IBM FileNet P8 Platform components
  • IBM FileNet P8 Platform solutions Architecture and domain structures
  • IBM FileNet P8 Platform Architecture
  • Explore the core IBM FileNet P8 Platform applications
  • Locate P8 domain structures
  • Use IBM Content Navigator Manage logging
  • View and archive system logs
  • Configure trace logging Configure auditing
  • Create audit definitions
  • Prune audit entries
  • Manage storage areas
  • Create a file storage area
  • Create a storage policy
  • Create an advanced storage area Build an object store
  • Create JDBC data sources for an object store
  • Create an object store
  • Add the repository to an IBM Content Navigator desktop
  • Create property templates and classes
  • Create a choice list
  • Create property templates
  • Create document and folder classes Modify classes and properties
  • Change the property template name
  • Modify a choice list
  • Work with metadata dependencies Use events to trigger actions
  • Create a subscription with an event action
  • Update the event action with new code module Configure security for IBM FileNet P8 assets
  • Configure initial object store security
  • Use the Security Script wizard
  • Configure default instance security
  • Configure security inheritance
  • Implement designer group access
  • Configure role-based access Use bulk operations
  • Use bulk actions to modify security for multiple documents
  • Use bulk operations to cancel checkout of documents Configure content-based retrieval searches
  • Register IBM Content Search Services
  • Configure index partitioning
  • Configure content-based indexes
  • Create content-based searches Work with sweeps
  • Configure a bulk move content job
  • Create a disposal policy
  • Create a content migration policy Move IBM FileNet P8 Platform applications between environments
  • Configure a destination environment
  • Create a source environment
  • Export the FileNet P8 application assets
  • Convert and analyze the FileNet P8 assets
  • Import the application assets
  • Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers
  • IBM FileNet P8 content services containers
  • Benefits of containers
  • Considerations when choosing containers Organize content across the enterprise
  • Plan for Multitenancy
  • Isolate content in an IBM FileNet P8 platform system

outline

Introduction to IBM FileNet P8 Platform  
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform integration options
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions

Architecture and domain structures
• IBM FileNet P8 Platform Architecture
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator

Manage logging 
• View and archive system logs
• Configure trace logging

Configure auditing  
• Create audit definitions
• Prune audit entries

Manage storage areas 
• Create a file storage area
• Create a storage policy
• Create an advanced storage area

Build an object store 
• Create JDBC data sources for an object store
• Create an object store
• Add the repository to an IBM Content Navigator desktop Create property templates and classes
• Create a choice list
• Create property templates
• Create document and folder classes

Modify classes and properties 
• Change the property template name
• Modify a choice list
• Work with metadata dependencies Use events to trigger actions
• Create a subscription with an event action
• Update the event action with new code module

Configure security for IBM FileNet P8 assets 
• Configure initial object store security
• Use the Security Script wizard
• Configure default instance security
• Configure security inheritance
• Implement designer group access
• Configure role-based access

+O35Use bulk operations
• Use bulk actions to modify security for multiple documents
• Use bulk operations to cancel checkout of documents

Configure content-based retrieval searches 
• Register IBM Content Search Services
• Configure index partitioning
• Configure content-based indexes
• Create content-based searches Work with sweeps
• Configure a bulk move content job
• Create a disposal policy
• Create a content migration policy

Move IBM FileNet P8 Platform applications between environments 
• Configure a destination environment
• Create a source environment
• Export the FileNet P8 application assets
• Convert and analyze the FileNet P8 assets
• Import the application assets
• Run a change impact analysis in command line  Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers

Organize content across the enterprise 
• Plan for Multitenancy
• Isolate content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system.


pre_req

Familiarity with enterprise content management concepts.


titleITIL 4 Strategic Leader: Digital and IT Strategy (DITS)
days3
seo_title
seo_dec
seo_tkey
categoryit-services-management-courses
vendorITIL

techonogyIT Services Management
overviewITIL 4 provides practical and flexible guidance to support organizations on their journey to digital transformation. It provides an IT/digital operating model for the delivery and operation of tech-enabled products and services and enables IT teams to continue to play a crucial role in wider business strategy. ITIL provides a framework for quality IT service management (ITSM) through proven best practice. ITIL manages the creation of a service, its operation and its improvement. Organizations who adopt ITIL invariably adapt it to suit their specific requirements. This course is designed to take practitioners and organizations on a digital strategy journey. Its iterative, eight-step model moves from “vision” through to “actions” and is about creating sustainable, digital momentum; this fulfils the enterprise’s evolution into a digital enterprise and enables business value co-creation. The guidance also highlights four key capabilities to develop a holistic, digital capability framework: digital leadership, managing innovation and emerging technologies, risk management and structuring a digital enterprise. ITIL ®4 Leader: Digital and IT Strategy (DITS) is aimed at people in senior roles including CIOs, consultants and others involved in digital transformations, service and strategic delivery.
objective
  • The internal and external factors to consider while crafting digital strategy
  • How IT strategy differs from digital strategy and how they can be integrated
  • Create a digital strategy that achieves the most value from digital
  • Implementing and sustaining digital strategy.
  • Developing and nurturing digital capabilities for continual business innovation and value co-creation

outline

ITIL Guiding Principles to All Aspects of Digital and IT Strategy

  • Focus on Value
  • Start Where You Are
  • Progress Iteratively with Feedback
  • Collaborate and Promote Visibility
  • Think and Work Holistically
  • Keep It Simple and Practical
  • Optimise and Automate

 

Leverage Digital Strategy to React to Digital Disruption

  • Digital Technology
  • Digital Business
  • Digital Organisation
  • Digitisation
  • Digital Transformation
  • Business Strategy and Business Models
  • Digital and IT Strategy
  • Products
  • Services
  • Relationship Between Digital, IT Strategy and Components of ITIL SVS.

 

Relationship between Concepts of Digital and IT Strategy, Service Value System and Service Value Chain

  • Environmental Analysis
  • External Analysis: PESTLE
  • Internal Analysis: Four Dimensions of Service Management

 

How an Organisation Uses Digital and IT Strategy to Remain Viable in Environments

  • How an Organisation’s Viability is Related to Agile, Resilient, Lean, Continuous and Co-Creational it is
  • How to Analyse the VUCA Factors and Address them in a Digital and IT Strategy

Explain and Compare Three Levels of Digital Disruption:

  • Ecosystem
  • Industry/Market
  • Organisational
  • Organisation’s Position in a Particular Market or Industry

Influenced factors:

  • Achieving Customer/Market Relevance
  • Achieving Operational Excellence
  • Internal and External Focus
  • Balanced Approach
  • Digital Positioning Tool to Determine Appropriate Position for a Digital Organization

 

Strategic Approaches by Digital and IT to Achieve Customer/Market Relevance and Operational Excellence

  • How to Apply Approaches to Achieve Customer/Market Relevance:
  • Customer Journeys
  • Omnichannel Delivery and Support
  • Context-Sensitive Delivery and Support
  • Customer Analytics
  • Customer Feedback and 360° Approaches
  • How to Achieve Operational Excellence in the Four Dimensions of Service Management
  • Understand the Financial Aspects of Digital and IT Strategy in Terms of the Following:
  • Financial Policies
  • Portfolio Optimisation
  • Funding Projects, Products and Services
  • Balancing Cost of Innovation and Operation
  • Charging Models
  • Assess Strategic Approaches for Digital Organisations

 

Risks and Opportunities of Digital and IT Strategy

  • Concept of Risk Management in the Context of a Digital Organisation
  • Context of Digital and IT Strategy
  • Identify Risk
  • Assess Risk
  • Concept of Risk Posture and Show How to Determine an Acceptable Balance Between Opportunity and Risk
  • Explain the Concept of Innovation, Including its Key Elements and Techniques
  • Apply Techniques to Develop and Maintain a Culture of Innovation

 

Steps and Techniques Involved in Defining and Advocating for Digital and IT Strategy

  • How to Use Digital Readiness Assessment to Perform Gap Analysis Between an Organisation’s Current and Desired Positions Approaches for Scraping Data from Dynamic Websites
  • How to Define and Communicate a Vision and a Strategy
  • How to Use Business Cases to Advocate for a Digital and IT Strategy

 

Implementation of a Digital and IT Strategy

  • How to Define Operating Models for Digital Organisations
  • Major Skills Required of Leaders in Digital Organisation
  • Apply Approaches to Strategy Coordination and Implementation:
  • Large-Scale Transformation
  • Incremental Transformation
  • Mergers and Acquisitions
  • Individual Changes
  • Approaches to POMs (Parallel Operating Models)
  • How to Assess Success of a Digital and IT Strategy
  • Typical Activities of a Digital Transformation Programme

target_au
  • Individuals continuing their journey in service management
  • ITSM managers and aspiring ITSM managers
  • ITSM practitioners who are responsible for managing and integrating stakeholders, focus on the customer journey and experience, and/or are responsible for fostering relationships with partners and suppliers
  • Existing ITIL qualification holders wishing to develop their knowledge

pre_req
  • Have obtained ITIL 4 Foundation certificate or ITIL® 4 Managing Professional Transition certificate
  • Have attended an accredited training course
  • Complete and receive a passing score on the 4 Case Study Assignments included in the course (click here for more information)
  • Have a minimum of three years of IT managerial experience

titleECS – Campus Fabric Deploy
days2
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorExtreme

techonogyEnterprise Networking
overviewDeploying networks utilizing the Extreme Networks Campus Fabric networking environment. This knowledge will be reinforced through actual hands-on experience with networking equipment in a lab environment, where students will perform real world tasks. [dt_sc_button type="type1" link="https://dojo.extremenetworks.com/organizer/insoft-services/" size="medium" bgcolor="#8fbd85" target="_new" timeline_button="no"]Registration Link[/dt_sc_button]
objective
  • To deploy Extreme Networks Fabric Networking solutions based on reference architectures from Extreme Networks customer scenarios
  • Take the ECS Fabric Switching & Routing Exam

outline

Fabric Deployment Options

  • Automation and Onboarding Options​
  • Intelligent Ports ​

VSP Switch Management

  • Switching Portfolio​
  • Software Management and Upgrade​
  • Management Interfaces​

Fabric Connect Infrastructure

  • BVLANs​
  • IS-IS global parameters​
  • IS-IS interfaces and adjacencies​

Fabric Management

  • CFM​
  • IP Shortcuts​
  • Mgmt CLIP​

L2VSN

  • L2VSN Configuration​
  • UNI port configuration​
  • Multicast​

L3VSN

  • Inter-VSN Routing over Fabric Connect

Implementing IP Shortcuts

  • Fabric Connect services using IP Shortcut Routing

Implementing Layer 3 VSN

  • VRF routing​
  • Route Redistribution​
  • Inter-VSN Routing​

VIST Core Switch Pair

  • Redundancy on the edge of Fabric​
  • SMLT Configuration​
  • RSMLT​

target_au
  • This course is designed as the first step for individuals responsible for the installation, configuration and management of the Extreme Networks family of Fabric switches.

pre_req
  • Students should possess a solid grasp of LAN concepts, including advanced Ethernet and TCP/IP. .And have referenced and be comfortable with the concepts of Fabric networking Covered in the Campus Fabric Introduction Course.

titleMS-500T00-AC: Microsoft 365 Security Administration
days4
seo_title
seo_dec
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyEnterprise Networking
overviewLearn how to secure your Microsoft 365 deployment and comply with industry data protections. This course focuses on securing user identity and access, threat protection, information protection and data governance. This course was designed for IT Professionals who manage and deploy security technologies for Microsoft 365 in their organization. The course helps learners prepare for the Microsoft 365 Certified: Security Administrator Associate exam (MS-500).
objective
  • Administer user and group access in Microsoft 365.
  • Explain and manage Azure Identity Protection.
  • Plan and implement Azure AD Connect.
  • Manage synchronized user identities.
  • Explain and use conditional access.
  • Describe cyber-attack threat vectors.
  • Explain security solutions for Microsoft 365.
  • Use Microsoft Secure Score to evaluate and improve your security posture.
  • Configure various advanced threat protection services for Microsoft 365.
  • Plan for and deploy secure mobile devices.
  • Implement information rights management.
  • Secure messages in Office 365.
  • Configure Data Loss Prevention policies.
  • Deploy and manage Cloud App Security.
  • Implement Windows information protection for devices.
  • Plan and deploy a data archiving and retention system.
  • Create and manage an eDiscovery investigation.
  • Manage GDPR data subject requests.
  • Explain and use sensitivity labels.

outline

Module 1: User and Group Management

This module explains how to manage user accounts and groups in Microsoft 365. It introduces you to the Zero Trust concept as well as authentication. The module sets the foundation for the remainder of the course.

  • Identity and Access Management concepts
  • The Zero Trust model
  • Plan your identity and authentication solution
  • User accounts and roles
  • Password Management

Lab : Initialize your tenant – users and groups

  • Set up your Microsoft 365 tenant
  • Manage users and groups

Lab : Password management

  • Configure Self-service password reset (SSPR) for user accounts in Azure AD
  • Deploy Azure AD Smart Lockout

After completing this module, students will be able to:

  • Create and manage user accounts.
  • Describe and use Microsoft 365 admin roles.
  • Plan for password policies and authentication.
  • Describe the concepts of Zero Trust security.
  • Explain the Zero Trust model.

Module 2: Identity Synchronization and Protection

This module explains concepts related to synchronizing identities for Microsoft 365. Specifically, it focuses on Azure AD Connect and managing directory synchronization to ensure the right people are connecting to your Microsoft 365 system.

  • Plan directory synchronization
  • Configure and manage synchronized identities
  • Azure AD Identity Protection

Lab : Implement Identity Synchronization

  • Set up your organization for identity synchronization

After completing this module, students will be able to:

  • Explain directory synchronization.
  • Plan directory synchronization.
  • Describe and use Azure AD Connect.
  • Configure Azure AD Connect Prerequisites.
  • Manage users and groups with directory synchronization.
  • Describe Active Directory federation.
  • Enable Azure Identity Protection

Module 3: Identity and Access Management

This module explains conditional access for Microsoft 365 and how it can be used to control access to resources in your organization. The module also explains Role Based Access Control (RBAC) and solutions for external access. We discuss identity governance as a concept and its components.

  • Application Management
  • Identity Governance
  • Manage device access
  • Role Based Access Control (RBAC)
  • Solutions for external access
  • Privileged Identity Management

Lab : Use Conditional Access to enable MFA

  • MFA Authentication Pilot (require MFA for specific apps)
  • MFA Conditional Access (complete an MFA roll out)

Lab : Configure Privileged Identity Management

  • Manage Azure resources
  • Assign directory roles
  • Activate and deactivate PIM roles
  • Directory roles
  • PIM resource workflows
  • View audit history for Azure AD roles in PIM

After completing this module, students will be able to:

  • Describe the concept of conditional access.
  • Describe and use conditional access policies.
  • Plan for device compliance.
  • Configure conditional users and groups.
  • Configure role based access control
  • Describe the concepts of identity governance
  • Configure and use Privileged Identity Management

Module 4: Security in Microsoft 365

This module explains the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions used to mitigate those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture.

  • Threat vectors and data breaches
  • Security strategy and principles
  • Microsoft security solutions
  • Secure Score

Lab : Use Microsoft Secure Score

  • Improve your secure score in the Microsoft 365 Security Center

After completing this module, students will be able to:

  • Describe several techniques attackers use to compromise user accounts through email.
  • Describe techniques attackers use to gain control over resources.
  • List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365.
  • Describe the benefits of Secure Score and what kind of services can be analyzed.
  • Describe how to use Secure Score to identify gaps in your current Microsoft 365 security posture.

Module 5: Threat Protection

This module explains the various threat protection technologies and services available for Microsoft 365. The module covers message protection through Exchange Online Protection, Microsoft Defender for Identity and Microsoft Defender for Endpoint.

  • Exchange Online Protection (EOP)
  • Microsoft Defender for Office 365
  • Manage Safe Attachments
  • Manage Safe Links
  • Microsoft Defender for Identity
  • Microsoft Defender for Endpoint

Lab : Manage Microsoft 365 Security Services

  • Implement Microsoft Defender Policies

After completing this module, students will be able to:

  • Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection.
  • Describe how Safe Attachments is used to block zero-day malware in email attachments and documents.
  • Describe how Safe Links protect users from malicious URLs embedded in email and documents that point
  • Configure Microsoft Defender for Identity.
  • Configure Microsoft Defender for Endpoint.

Module 6: Threat Management

This module explains Microsoft Threat Management which provides you with the tools to evaluate and address cyber threats and formulate responses. You will learn how to use the Security dashboard and Azure Sentinel for Microsoft 365.

  • Security dashboard
  • Threat investigation and response
  • Azure Sentinel
  • Advanced Threat Analytics

Lab : Using Attack Simulator

  • Conduct a simulated Spear phishing attack

After completing this module, students will be able to:

  • Describe how Threat Explorer can be used to investigate threats and help to protect your tenant.
  • Describe how the Security Dashboard gives C-level executives insight into top risks and trends.
  • Describe what Advanced Thread Analytics (ATA) is and what requirements are needed to deploy it.
  • Configure Advanced Threat Analytics.
  • Use the attack simulator in Microsoft 365.
  • Describe how Azure Sentinel can used for Microsoft 365.

Module 7: Microsoft Cloud Application Security

This module focuses on cloud application security in Microsoft 365. The module will explain cloud discovery, app connectors, policies, and alerts. You will learn how these features work to secure you cloud applications.

  • Deploy Cloud Application Security
  • Use cloud application security information

After completing this module, students will be able to:

  • Describe Cloud App Security.
  • Explain how to deploy Cloud App Security.
  • Control your Cloud Apps with Policies.
  • Use the Cloud App Catalog.
  • Use the Cloud Discovery dashboard.
  • Manage cloud app permissions.

Module 8: Mobility

This module focuses on securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Microsoft Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications.

  • Mobile Application Management (MAM)
  • Mobile Device Management (MDM)
  • Deploy mobile device services
  • Enroll devices to Mobile Device Management

Lab : Device Management

  • Enable Device Management
  • Configure Azure AD for Intune
  • Create compliance and conditional access policies

After completing this module, students will be able to:

  • Describe mobile application considerations.
  • Manage devices with MDM.
  • Configure Domains for MDM.
  • Manage Device Security Policies.
  • Enroll devices to MDM.
  • Configure a Device Enrollment Manager Role.

Module 9: Information Protection and Governance

This module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data.

  • Information protection concepts
  • Governance and Records Management
  • Sensitivity labels
  • Archiving in Microsoft 365
  • Retention in Microsoft 365
  • Retention policies in the Microsoft 365 Compliance Center
  • Archiving and retention in Exchange
  • In-place records management in SharePoint

Lab : Archiving and Retention

  • Initialize compliance
  • Configure retention tags and policies

After completing this module, students will be able to:

  • Configure sensitivity labels.
  • Configure archiving and retention in Microsoft 365.
  • Plan and configure Records Management

Module 10: Rights Management and Encryption

This module explains information rights management in Exchange and SharePoint. The module also describes encryption technologies used to secure messages.

  • Information Rights Management (IRM)
  • Secure Multipurpose Internet Mail Extension (S-MIME)
  • Office 365 Message Encryption

Lab : Configure Office 365 Message Encryption

  • Configure Office 365 Message Encryption
  • Validate Information Rights Management

After completing this module, students will be able to:

  • Describe the various Microsoft 365 Encryption Options.
  • Describe the use of S/MIME.
  • Describe and enable Office 365 Message Encryption.

Module 11: Data Loss Prevention

This module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data.

  • Data loss prevention fundamentals
  • Create a DLP policy
  • Customize a DLP policy
  • Create a DLP policy to protect documents
  • Policy tips

Lab : Implement Data Loss Prevention policies

  • Manage DLP Policies
  • Test MRM and DLP Policies

After completing this module, students will be able to:

  • Describe Data Loss Prevention (DLP).
  • Use policy templates to implement DLP policies for commonly used information.
  • Configure the correct rules for protecting content.
  • Describe how to modify existing rules of DLP policies.
  • Configure the user override option to a DLP rule.
  • Explain how SharePoint Online creates crawled properties from documents.

Module 12: Compliance Management

This module explains the Compliance center in Microsoft 365. It discusses the components of compliance score.

  • Compliance center

After completing this module, students will be able to:

  • Describe how to use compliance score to make organizational decisions.
  • Describe how assessments are used to determine compliance score.

Module 13: Insider Risk Management

This module focuses on insider risk related functionality within Microsoft 365. It covers not only Insider Risk Management in the compliance center but also information barriers and privileged access management as well.

  • Insider Risk
  • Privileged Access
  • Information barriers
  • Building ethical walls in Exchange Online

Lab : Privileged Access Management

  • Set up privileged access management and process a request

After completing this module, students will be able to:

  • Explain and configure Insider Risk Management in Microsoft 365.
  • Configure and approve privileged access requests for global administrators.
  • Configure and use information barriers to conform to organizational regulations.
  • Build ethical walls in Exchange Online
  • Configure Customer Lockbox

Module 14: Discover and Respond

This module focuses on content search and investigations. The module covers how to use eDiscovery to conduct advanced investigations of Microsoft 365 data. It also covers audit logs and discusses GDPR data subject requests.

  • Content Search
  • Audit Log Investigations
  • Advanced eDiscovery

Lab : Manage Search and Investigation

  • Investigate your Microsoft 365 Data
  • Conduct a Data Subject Request

After completing this module, students will be able to:

  • Conduct content searches in Microsoft 365
  • Perform and audit log investigation.
  • Configure Microsoft 365 for audit logging.
  • Use Advanced eDiscovery

target_au

The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization.     This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance.     The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.


pre_req
  • Basic conceptual understanding of Microsoft Azure.
  • Experience with Windows 10 devices.
  • Experience with Office 365.
  • Basic understanding of authorization and authentication.
  • Basic understanding of computer networks.
  • Working knowledge of managing mobile devices.

titleSDAFND 1.0 – Understanding Cisco SDA Fundamentals
days3
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco® Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks. You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFND will introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks.
objective

After taking this course, you should be able to:

  • Describe Cisco SD-Access architecture and its components
  • Explain Cisco DNA Center deployment models, scaling, and high availability
  • Identify Cisco SD-Access fabric protocols and node roles
  • Understand the Cisco SD-Access Wireless deployment models
  • Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP
  • Deploy simple Cisco SD-Access fabric networks
  • Monitor health and performance of the network with Cisco DNA Center Assurance
  • Interact with the Cisco DNA Center Platform Intent APIs

outline
  • Introducing Cisco SD-Access
  • Introducing Cisco DNA Center
  • Exploring Cisco SD-Access Solution Components
  • Exploring Cisco SD-Access Wireless Architecture
  • Automating Network Changes with Cisco DNA Center
  • Deploying Fabric Networks with Cisco DNA Center
  • Exploring Cisco DNA Center Assurance
  • Exploring Cisco DNA Center Programmability

Lab Outline

  • Explore Cisco DNA Center User Interface
  • Verify Location Identifier Separation Protocol (LISP) Operation in Cisco SD-Access
  • Integrate Cisco DNA Center and Cisco Identity Services Engine (Cisco ISE)
  • Provision Access Points in Cisco DNA Center
  • Provision Underlay Networks with Cisco DNA Center LAN Automation
  • Provision Underlay Networks with Cisco DNA Center LAN Automation (cont.)
  • Deploy Cisco SD-Access Single Site Fabric
  • Deploy Cisco SD-Access Single Site Fabric (cont.)
  • Explore Cisco DNA Center Assurance
  • Cisco DNA Assurance Issues and Guided Remediation
  • Interact with Cisco DNA Center Intent APIs Using Python

target_au
  • Field engineers
  • Network engineers
  • Network administrators
  • System engineers

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • CCNP® level core networking knowledge
  • Ability to use Windows and Linux CLI tools such as ping, SSH, or running scripts

These are the recommended Cisco offerings that may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA®0
  • Implementing Cisco Enterprise Network Core Technologies (ENCOR)

titleSEGRTE201 v2.0 – Implementing Segment Routing on Cisco IOS XR
days4
seo_title
seo_dec
seo_tkey
categorycybersecurity
vendorCisco

techonogySecurity
overviewThe Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of segment routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement topology-independent loop-free alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP).
objective
outline

Introduction to Segment Routing

  • Examining Unified Fabric Routing
  • Exploring Segment Routing Concepts
  • Examining Segment Types
  • Examining the Segment Routing Global Block (SRGB)

IGP Segment Routing Implementation and Verification

  • Examining the IGP Control Plane
  • Examining SRGB and IGP Interactions
  • Examining Prefix and Adjacency SIDs
  • Intermediate System to Intermediate System (IS-IS) Multilevel and Open Shortest Path First (OSPF) Multi-Area
  • Configuring and Verifying IS-IS SR Operation
  • Configuring and Verifying OSPF SR Operation

Segment Routing and LDP Interworking

  • SR and LDP Interworking Data Plane
  • Mapping Server Function and Configuration
  • Interworking Deployment Models

Topology Independent – Loop Free Alternate

  • Examining Classic LFA
  • Examining TI-LFA Fundamentals
  • Implementing and Verifying TI-LFA for SR Traffic
  • Implementing and Verifying SR TI-LFA for LDP Traffic
  • TI-LFA and SR LDP Interworking

Segment Routing Policies – Traffic Engineering (SR-TE)

  • Exploring SR Policies
  • Introducing the Anycast and Binding SIDs
  • Enabling and Verifying SR Policies
  • Instantiating SR Policies
  • Instantiating SR Policies using BGP Dynamic

Multidomain SR Policies

  • Configuring and Verifying a Path Computation Element (PCE)
  • Configuring and Verifying BGP Link-State (LS)
  • Configuring Multidomain SR Policies with a PCE
  • Configuring Multidomain SR Policies with On Demand Next-Hop (ODN) h

Segment Routing–Based Services

  • Examining the BGP Prefix-SID Operation
  • Configuring and Verifying the BGP Prefix SID
  • Examining Egress Peer Engineering
  • Examining the BGP Prefix-SID Operation
  • SR Flexible Algorithm and Performance Measurement (PM) Delay
  • SR-Enabled VPNs

target_au
  • Systems engineers
  • Network engineers
  • Field engineers
  • Technical support personnel
  • Channel partners and resellers

pre_req
  • Basic experience with the Cisco Internetwork Operating System (IOS®) XR CLI is helpful.

titleIOSXR100 v2.0 – Introduction to Cisco IOS XR
days4
seo_title
seo_dec
seo_tkey
categoryservice-provider-courses
vendorCisco

techonogyService Provider Training
overviewThe Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco® Internetwork Operating System (Cisco IOS®) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting. Through a combination of lecture and hands-on lab exercises, you gain an understanding of all major aspects of the operating system, including the architecture, high-availability components, scalability features, configuration basics, basic software operations, configuration file overview, Authentication, Authorization, and Accounting (AAA) services, Network Time Protocol (NTP) configuration, packet filtering, and management plane protection.
objective
  • Describe the Cisco IOS XR software architecture, high availability components, and scalability features
  • Perform basic configurations on a Cisco IOS XR router
  • Describe Cisco IOS XR software operations
  • Describe the configuration file system
  • Perform Cisco IOS XR software installations
  • Configure AAA services
  • Configure NTP
  • Configure Simple Network Management Protocol (SNMP), telemetry, and logging
  • Configure routing protocols
  • Monitor processes
  • Use error messages and core dumps

outline

Cisco IOS XR Software Overview

  • Platform Overview
  • Cisco IOS XR Architecture
  • Cisco IOS XR High Availability

Cisco IOS XR Software Configuration Basics

  • Cisco IOS XR Configuration Operations
  • Cisco IOS XR Initial Configuration
  • Reviewing the Configuration

Cisco IOS XR Software Operations

  • Examining Configuration Operations
  • Examining Configuration Rollback and Recovery

Configuration File System Overview

  • Examining the Binary Configuration
  • Examining the Commit Database
  • Examining the ASCII Configuration
  • Examining the Nonvolatile Generation (NVgen) Files
  • Verifying CiscoFabric Services (CFS) Integrity

Cisco IOS XR Software Installation

  • Software Package Basics
  • Installing Software Packages

AAA Security

  • AAA Fundamentals
  • Task-Based Security
  • Configuring a User Security Policy
  • Authentication with Remote Servers
  • Configuring Router to AAA Server Communication
  • Configuring Authentication
  • Terminal Access Controller Access-Control System Plus (TACACS+) Command Authorization
  • Configuring Accounting
  • AAA Troubleshooting

Network Time Synchronization

  • Network Time Protocol

SNMP, Telemetry, and Logging

  • Examining SNMP
  • Examining Telemetry
  • Examining Logging

Basic Routing Configuration

  • Configuring Intermediate System to Intermediate System (IS-IS)
  • Configuring Open Shortest Path First (OSPF)
  • Configuring Border Gateway Protocol (BGP)
  • Configuring Routing Protocol for LLN (RPL) Policy

Packet Filtering

  • Access Control Lists
  • Unicast Reverse Path Forwarding
  • Management Plane Protection

Monitoring Process

  • Examining Processes and Threads
  • Process Crashes
  • Commands for Debugging Processes
  • Restartability of Processes
  • Process Monitoring
  • Identifying Memory Problems
  • Memory Depletion

Core Dumps

  • Core Dump Fundamentals
  • Using Core Dump Information

target_au
  • System installers
  • System integrators
  • System administrators
  • Network administrators
  • Solution designers

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Experience working with command-line interface (CLI)–based network devices
  • Knowledge of general routing concepts

titleH9TB0S – Configuring Data Center Networks with Aruba OS-CX
days3
seo_title
seo_dec
seo_tkey
categorydatacenter-courses
vendorHP

techonogyDatacenter & Virtualization
overviewThe Configuring Data Center Networks with Aruba OS CX course provides the skills and knowledge to design, implement, and configure complex data center solutions based on the Aruba AOS CX switches. Data center networks are at a breaking point. Aruba offers a new architectural approach that provides simplified, scalable and automated connectivity for virtualized compute, storage and cloud. Data center networking requirements have evolved rapidly, with emerging technologies increasingly focused on supporting more automation and simplified operations in virtualized data centers. Aruba data center solutions and technologies such as Virtual Switching Extension (VSX) allow the grouping of data center switches for simpler management, but keep control and data planes separate for better high availability. Ethernet Virtual Private Networks (EVPN) allow the creation of modern two-layered data centers for business resilience and high availability.
objective
  • Understand the components of the Aruba OS CX switching architecture
  • Describe common data center networking requirements
  • Describe the benefits of VSX implementation in a data Center
  • Understand, describe and configure VRF which enables a switch to run multiple routing instances in a network
  • Understand, describe and configure VXLAN functionality; VXLAN provides an alternative to the traditional VLAN concept
  • Understand, describe and configure EVPN to transport VXLAN thru the data center
  • Understand, describe and configure Data Center Bridging (DCB), a technology that enables the consolidation of IP-based LAN traffic and block-based storage traffic onto a single converged Ethernet network, helping to eliminate the need to build separate infrastructures for LAN systems that carry typical end user data traffic, and SAN systems that carry storage-specific communications
  • Understand, describe and configure Ethernet Ring Protection Switching (ERPS) which enables Ethernet ring topologies with a fast convergence
  • Describe requirements for a data center network design
  • Describe different data center deployment models
  • Understand various data center technologies and their impact on a design Certifications and related examinations

outline

Module 1: Introduction to Data Center Technologies

  • Data center networking evolution
  • Data center networking design
  • AOS CX switches overview
  • Data center networking technology

Module 2: NetEdit

  • Features
  • Device discovery
  • Plans

Module 3: Virtual Switching Extension (VSX)

  • VSX components and features
  • VSX software upgrade
  • VSX at the data center

Module 4: Data Center Bridging (DCB)

  • DCB configuration
  • DCB components

Module 5: Virtual Routing and Forwarding (VRF)

  • VRF Lite
  • VRF use cases
  • VRF configuration
  • Data center networking

Module 6: VXLAN

  • VXLAN concepts
  • Operations
  • Traffic flow

Module 7: EVPN

  • Dynamic tunneling
  • Forwarding
  • Centralized routing

Module 8: DCI

  • DCI solutions at AOS-CX
  • ERPS

Module 9: NAE

  • Agents
  • Scripts
  • Upgrade
  • Troubleshooting
  • Use cases

Module 10: Data Center Networks Design

  • zDCN requirements
  • DCN design
  • AOS-CX technologies for DCN

 

Lab Outline

Lab 1: Initial Lab Setup

  • Configure switches access
  • System and hardware status

Lab 2: NetEdit

  • Setup environment
  • NetEdit users and passwords
  • Import and manage devices
  • Create change and conformance validation
  • Create a configuration plan for switches

Lab 3: VSX

  • Configuring VSX ISL
  • VSX LAG
  • Configuring VSX keepalive
  • Configuring VSX active-gateway
  • VSX redundancy
  • VSX linkup-delay
  • VSX split-brain

Lab 4: DCBX

  • Enabling DCBX
  • Priority Flow Control (PFC) and APP TLV
  • Enhanced Traffic Selection (ETS)

Lab 5: VRF

  • Setup environment
  • Inter-Virtual Routing and Forwarding

Lab 6: VXLAN

  • Prepare the base configuration for the lab
  • VXLAN configuration

Lab 7: EVPN

  • Setup environment
  • Configure L2 EVPN

Lab 8: ERPS

  • Prepare lab environment
  • Configure ERPS
  • ERPS operations

Lab 9: NAE

  • Setup environment
  • Upload a NAE script and create an agent
  • Update a NAE script
  • NAE troubleshoot

target_au

This course is ideal for Aruba partners, customers and employees who have a minimum of 3 years of experience implementing and designing enterprise level networks. Students should demonstrate an ability to understand, configure and implement modern data centers based on Aruba switching solutions that provide a simplified, scalable and automated Ethernet fabric that connects virtualized compute, storage, and cloud services.


pre_req

It is strongly recommended that the candidate first complete the Configuring Aruba OS CX (Course ID: 01123901) course


titleImplement Citrix ADC 13.x with Citrix Gateway (CNS 226)
days2
seo_titleImplement Citrix ADC with Citrix Gateway (CNS 226) Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCitrix

techonogy
overviewLearn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
objective
  • Configure Authentication and Authorization
  • Define End User Access and Experience
  • Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources
  • Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues

outline

Module 1: Citrix Gateway

  • Introduction to Citrix Gateway
  • Advantages and Utilities of Citrix Gateway
  • Citrix Gateway Configuration
  • Common Deployments

Module 2: AppExpert Expressions

  • Introduction to AppExpert Policies
  • Default Policies
  • Explore Citrix ADC Gateway Policies
  • Policy Bind Points
  • Using AppExpert with Citrix Gateway

Module 3: Authentication, Authorization, and Secure Web Gateway

  • Authentication and Authorization
  • Multi-Factor Authentication
  • nFactor Visualizer
  • SAML authentication

Module 4: Managing Client Connections

  • Introduction to Client Connections
  • Session Policies and Profiles
  • Pre and Post Authentication Policies
  • Citrix Gateway Deployment Options
  • Managing User Sessions

Module 5: Integration for Citrix Virtual Apps and Desktops

  • Virtual Apps and Desktop Integration
  • Citrix Gateway Integration
  • Citrix Gateway WebFront
  • ICA Proxy
  • Clientless Access and Workspace App
  • Access Fallback
  • SmartControl and SmartAccess for ICA

Module 6: Configuring Citrix Gateway

  • Working with Apps on Citrix Gateway
  • RDP Proxy
  • Portal Themes and EULA

target_au

Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments.


pre_req

This course requires little to no previous experience with Citrix ADC; however, Citrix recommends a basic understanding of TCP/IP, HTTP, the OSI model, network devices, and networking protocols.


titleDeploy and Manage Citrix ADC 13.x with Citrix Gateway (CNS 227)
days5
seo_titleDeploy and Manage Citrix ADC with Citrix Gateway (CNS 227) Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCitrix

techonogy
overviewExpand your Citrix networking knowledge and skills by enrolling in this course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway.
objective
  • Identify the functionality and capabilities of Citrix ADC and Citrix Gateway
  • Explain basic Citrix ADC and Gateway network architecture
  • Identify the steps and components to secure Citrix ADC
  • Configure Authentication, Authorization, and Auditing
  • Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components

outline

Module 1: Getting Started

  • Introduction to Citrix ADC
  • Feature and Platform Overview
  • Deployment Options
  • Architectural Overview
  • Setup and Management

Module 2: Basic Networking

  • Networking Topology
  • Citrix ADC Components
  • Routing
  • Access Control Lists

Module 3: ADC Platforms

  • Citrix ADC MPX
  • Citrix ADC VPX
  • Citrix ADC CPX
  • Citrix ADC SDX
  • Citrix ADC BLX

Module 4: High Availability

  • Citrix ADC High Availability
  • High Availability Configuration
  • Managing High Availability
  • In Service Software Upgrade
  • Troubleshooting High Availability

Module 5: Load balancing

  • Load Balancing Overview
  • Load Balancing Methods and Monitors
  • Load Balancing Traffic Types
  • Load Balancing Protection
  • Priority Load Balancing
  • Load Balancing Troubleshooting

Module 6: SSL Offloading

  • SSL Overview
  • SSL Configuration
  • SSL Offload
  • Troubleshooting SSL Offload
  • SSL Vulnerabilities and Protections

Module 7: Security

  • Authentication, Authorization, and Auditing
  • Configuring External Authentication
  • Admin Partitions

Module 8: Monitoring and Troubleshooting

  • Citrix ADC Logging
  • Monitoring with SNMP
  • Reporting and Diagnostics
  • AppFlow Functions
  • Citrix Application Delivery Management
  • Troubleshooting

Module 9: Citrix Gateway

  • Introduction to Citrix Gateway
  • Advantages and Utilities of Citrix Gateway
  • Citrix Gateway Configuration
  • Common Deployments

Module 10: AppExpert Expressions

  • Introduction to AppExpert Policies
  • Default Policies
  • Explore Citrix ADC Gateway Policies
  • Policy Bind Points
  • Using AppExpert with Citrix Gateway

Module 11: Authentication, Authorization, and Secure Web Gateway

  • Authentication and Authorization
  • Multi-Factor Authentication
  • nFactor Visualizer
  • SAML authentication

Module 12: Managing Client Connections

  • Introduction to Client Connections
  • Session Policies and Profiles
  • Pre and Post Authentication Policies
  • Citrix Gateway Deployment Options
  • Managing User Sessions

Module 13: Integration for Citrix Virtual Apps and Desktops

  • Virtual Apps and Desktop Integration
  • Citrix Gateway Integration
  • Citrix Gateway WebFront
  • ICA Proxy
  • Clientless Access and Workspace App
  • Access Fallback
  • SmartControl and SmartAccess for ICA

Module 14: Configuring Citrix Gateway

  • Working with Apps on Citrix Gateway
  • RDP Proxy
  • Portal Themes and EULA

target_au

Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments.


pre_req

This course requires little to no previous experience with Citrix ADC; however, Citrix recommends a basic understanding of of TCP/IP, HTTP, and of the OSI model, network devices, and networking protocols.


titleDCNX v1.0 – Implementing Cisco NX-OS Switches and Fabrics in the Data Center
days5
seo_titleDCNX - Implementing Cisco NX-OS Switches and Fabrics in the Data Center Course Training
seo_dec
seo_tkey
categorydatacenter-courses
vendorCisco

techonogy
overviewThe Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX) v1.0 course gives you a detailed understanding of the Cisco® Nexus switch platform and teach you how to install, configure, and manage Cisco Nexus® switch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) modes.
objective

After taking this course, you should be able to:

  • Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families
  • Describe Cisco Nexus platform implementations
  • Explain Cisco Nexus platform management
  • Describe Port Channels and Virtual Port Channels
  • Configure First Hop Redundancy protocols
  • Configure security features of Cisco Nexus devices
  • Describe the Cisco Nexus devices routing and forwarding
  • Describe Virtual Extensible LAN (VXLAN)
  • Describe Quality of Service (QoS) on Cisco Nexus Devices
  • Explain system management and monitoring processes
  • Describe Cisco NX-OS programmability
  • Describe Cisco Nexus storage services
  • Configure device aliases and zoning
  • Configure FCoE
  • Configure NPIV and NPV modes

outline
  • Describing Cisco Nexus Series Switches
  • Describing Cisco Nexus Platforms Implementation
  • Describing Cisco Nexus Platforms Management
  • Describing Port Channels and Virtual Port Channels
  • Configuring First Hop Redundancy Protocols
  • Configuring Cisco Nexus Security Features
  • Describing Cisco NX-OS Routing and Forwarding
  • Describing Virtual Extensible LAN
  • Describing QoS on Cisco Nexus Devices
  • Configuring System Management and Monitoring
  • Describing Cisco NX-OS Programmability
  • Describing Cisco Nexus Storage Services
  • Configuring Fibre Channel Over Ethernet
  • Describing Device Aliases and Zoning
  • Configuring NPIV and NPV Modes

 

Lab outline

  • Test Cisco Nexus Platforms
  • Configure User Management
  • Configure vPC
  • Configure First Hop Redundancy Protocol (FHRP) Protocols
  • Configure Cisco Nexus Security Features
  • Configure Open Shortest Path First (OSPF)
  • Configure VXLAN
  • Configure QoS
  • Configure System Management
  • Configure Cisco NX-OS On-Box Programmability
  • Configure Containers on Cisco NX-OS
  • Configure Cisco NX-OS Using Ansible
  • Configure Basic Fibre Channel Features
  • Configure FCoE
  • Configure Fiber Channel Device Aliases and Zoning
  • Configure NPV

target_au
  • Data center systems engineers
  • Field engineers
  • Architects
  • Cisco partners using Cisco Nexus Series switch platforms

pre_req
  • Be familiar with Cisco data center technologies
  • Understand networking protocols, routing, and switching

titleSecure Wireless LAN
days2
seo_titleSecure Wireless LAN Course Training | Fortinet NSE 6 Certification
seo_decIn this course, you will learn how to deploy, configure, and troubleshoot secure wireless LAN using an integrated wireless solution.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogy
overviewIn this course, you will learn how to deploy, configure, and troubleshoot secure wireless LAN using an integrated wireless solution. Using interactive labs, you will enforce your knowledge of deploying a secure wireless LAN centrally managed from the FortiGate wireless controller. Product Versions
  • FortiOS 6.4.1
  • FortiAP 6.4.2
  • FortiAP Cloud 20.3
  • FortiPlanner 2.6.4
  • FortiPresence 20.4

objective

After completing this course, you will be able to:

  • Explore FortiPresence, FortiPlanner, and FortiAP Cloud
  • Deploy a wireless network using the FortiGate integrated wireless controller
  • Learn about different SSIDs traffic modes
  • Deploy multiple wireless SSIDs
  • Offer secure wireless access with 802.1x authentication
  • Deploy wireless networks with VLANs
  • Thwart hotspot hackers and rogue APs
  • Understand fast roaming and wireless client load balancing
  • Troubleshoot signal loss, slow connection, and authentication issues

outline
  1. Introduction to FortiOS Integrated Wireless
  2. Wireless Controller
  3. Access Point Profile
  4. Advanced Configuration
  5. Troubleshooting

target_au
  • This course is intended for networking and security professionals involved in the management, configuration, administration, and monitoring of the Fortinet integrated and/or cloud wireless solution.

pre_req
  • Understanding of basic wireless networks
    • Review the supplementary Wireless Network Fundamentals lesson
  • Understanding of the topics covered in the following courses:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure
    • Understanding of the topics covered in the NSE 6 FortiAuthenticator course is also recommended.

titleFortiAnalyzer
days2
seo_titleFortiAnalyzer Course Training | Fortinet NSE 5 Certification
seo_decIn this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging and reporting.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging and reporting. You will learn how to configure and deploy FortiAnalyzer, and identify threats and attack patterns through logging, analysis, and reporting. Finally, you will examine the management of events, incidents, playbooks, and some helpful troubleshooting techniques. Product Versions
  • FortiAnalyzer 7.0.2

objective

After completing this course, you should be able to:

  • Describe key features and concepts of FortiAnalyzer
  • Deploy an appropriate architecture
  • Use administrative access controls
  • Monitor administrative events and tasks
  • Configure high availability
  • Understand HA synchronization and load balancing
  • Upgrade the firmware of an HA cluster
  • Verify the normal operation of an HA cluster
  • Manage ADOMs
  • Manage RAID
  • Register supported devices
  • Troubleshoot communication issues
  • Manage disk quota
  • Manage registered devices
  • Protect log information
  • View, search, manage, and troubleshoot logs
  • Monitor and manage events
  • Manage and customize event handlers
  • Create and manage incidents
  • Explore tools used for threat hunting
  • Create, run, and troubleshoot playbooks
  • Import and export playbooks
  • Generate and customize reports
  • Customize charts and datasets
  • Manage and troubleshoot reports

outline
  1. Introduction and Initial Configuration
  2. Administration and Management
  3. Device Registration and Communication
  4. Logging
  5. FortiSoC—Incidents and Events
  6. FortiSoC—Playbooks
  7. Reports

target_au

Anyone who is responsible for the day-to-day management of FortiAnalyzer devices and FortiGate security information.


pre_req
  • Familiarity with all topics presented in the NSE 4 FortiGate Security and NSE 4 FortiGate Infrastructure courses
  • Knowledge of SQL SELECT syntax is helpful, but not required

titleESM 201 – Advanced Enterprise Security Manager SIEM Administration
days4
seo_titleMcAfee Enterprise Security Manager Administration 201 Course Training
seo_dec
seo_tkey
categorysecurity-analytics
vendorMcAfee

techonogySecurity
overviewEnterprise Security Manager—the heart of our security information and event management (SIEM) solution—provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This enables you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. This course prepares Enterprise Security Manager engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Through demonstration, explanation, and hands-on lab exercises, you will learn how to utilize the Enterprise Security Manager by using recommended best practices and methodologies.
objective

Contextual Configurations

Utilize Asset Manager and how to manage assets and asset groups. Define and configure data enrichment using the Data Enrichment Wizard and Integrate vulnerability assessment (VA) tool with ESM.

Advanced Data Sources

Configure Auto Learn to listen to incoming events after installing and configuring the SIEM Collector Agent.

Alarms, Actions, and Notifications

Describe alarms, Build and edit templates, use remote commands, create report queries, Configure notifications

Data Streaming Bus

Display adding Data Streaming Databus (DSB) and configuring Data Routing, Data Sharing, and creating Message Forwarding Rules.

Advanced Syslog Parser

Understand Regex and available resources. Discussion on handling of unknown events and creating custom parsing rules.

Aggregation

Customize event and flow aggregation fields on a per- signature basis, and define the advantages and nuances associated with event and flow aggregation.

Current Threat and Vulnerability Use Cases

Research current threats and vulnerabilities. Create use cases from current threats and vulnerabilities.

ESM and Tuning Best Practice

Learn Event Tuning methodology. Configure events filtering on ERC and Identify key strategies for tuning correlation rules. Learn best practice to enhance ESM performance.

Advanced Correlation

Utilize advanced rule correlation options and deviation-based rule correlation and risk correlation.

Analyst Tasks

Make tuning recommendations according to your analysis while Identifying events for immediate action, delayed action and no action (triage).

Use Case Overview

Define use cases and follow a process to develop well defined use cases.

Management Event Use Cases

Create use cases from management directives.

Organizational Use Case Policies

Create use cases from organizational policies

Compliance Use Cases

Create use cases from regulations to validate compliance.

Incident Identification Use Cases

Create use cases to quickly identify previously remediated incidents.


outline

Day 1

  • Welcome
  • Contextual Configurations
  • Advanced Data Source Options
  • Alarms, Actions, Notifications, and Reports

Day 2

  • Data Streaming Bus
  • Advanced Syslog Parser
  • ESM Tuning and Best Practice
  • Performance Troubleshooting

Day 3

  • Advanced Correlation
  • Analyst Tasks
  • Use Case Overview
  • Management Directives Use Cases

Day 4

  • Organizational Policies Use Cases
  • Compliance Use Cases
  • Current Threats and Vulnerabilities Use Cases
  • Incident Identification Use cases

target_au

This course is aimed at Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security Manager solution. Attendees should have a working knowledge of networking and system administration concepts, a good understanding of computer security concepts, and a general understanding of networking and application software.


pre_req

It is recommended that students have a working knowledge of networking and system administration concepts.


titleESM 101 – Enterprise Security Manager SIEM Administration
days4
seo_titleMcAfee Enterprise Security Manager Administration 101 Course Training
seo_dec
seo_tkey
categorysecurity-analytics
vendorMcAfee

techonogySecurity
overviewEnterprise Security Manager—the heart of our security information and event management (SIEM) solution—provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This enables you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. This course prepares Enterprise Security Manager engineers and analysts to understand, communicate, and use the features provided by Enterprise Security Manager. Through hands-on lab exercises, you will learn how to optimize the Enterprise Security Manager by using recommended best practices and methodologies.
objective

Enterprise Security Manager Overview

Define Enterprise Security Manager and SIEM concepts, identify appliances and their features, and describe the Enterprise Security Manager solution component architecture.

Devices

Configure and customize receiver data sources and data source profiles.

Enterprise Log Manager and Enterprise Log Search

Configure Enterprise Log Manager settings and mirror Enterprise Log Manager data storage.

Enterprise Security Manager Views

Effectively navigate the Enterprise Security Manager dashboard and create custom Enterprise Security Manager data views.

Data Sources

Locate events and manage cases using a variety of data sources, assets, and enriched data

Aggregation

Customize event and flow aggregation fields on a per- signature basis, and define the advantages and nuances associated with event and flow aggregation.

Policy Editor

Create, modify, and delete Enterprise Security Manager policies within the policy editor.

Query Filters

Apply filters in views, create filter sets, use string normalization, and understand the basic syntax of regular expressions.

Correlation

Configure and deploy custom correlation rules within the correlation editor.

Watch Lists and Alarms

Create and configure watch lists and alarms.

Reports

Create and configure reports.

System Management

Perform routine maintenance on Enterprise Security Manager, including updates and clearing policy modifications and rule updates.

Troubleshooting

Perform troubleshooting steps associated with login issues, operating systems and browser-specific issues, hardware issues, and Enterprise Security Manager dashboard issues.

Use Case Design

Understand how the Enterprise Security Manager interface dashboards and views are used to identify specific events and incidents.


outline

Day 1

  • Course Introduction
  • Architecture Overview
  • Devices and Settings
  • ESM Interface and Views

Day 2

  • Data Sources
  • Working with the ELM and ELS
  • Event Analysis
  • Aggregation

Day 3

  • Watchlists and Policy Editor
  • Query Filters
  • Rule Correlation
  • Alarms

Day 4

  • Workflow and Analysis
  • Reports
  • System Maintenance and Troubleshooting
  • Intro to Use Case Design

target_au

This course is aimed at Enterprise Security Manager users, responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the Enterprise Security Manager solution. Attendees should have a working knowledge of networking and system administration concepts, a good understanding of computer security concepts, and a general understanding of networking and application software.


pre_req

It is recommended that students have a working knowledge of networking and system administration concepts.


titleForcepoint NGFW Administrator
days4
seo_titleForcepoint NGFW Administrator Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorForcepoint

techonogySecurity
overview

In this 16-hour hands-on virtual instructor-led training (VILT) course, you will learn the skills needed to practice as a system administrator responsible for installation, configuration, administration, and support of Forcepoint NGFW.

Through instructional content, demonstrations, and hands-on lab practice exercises, you will learn the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments. You will develop expertise in creating security rules and policies, managing users and authentication, configuring VPNs, performing deep traffic inspection, and accomplishing common administration tasks including status monitoring and reporting.


objective
  • Access the virtual training environment, class materials and labenvironment.
  • Articulate the NGFW System benefits and differentiators.
  • Identify the components of the SMC and their roles.
  • Administer the SMC components and use them to manage and monitor NGFW firewalls.
  • Configure security policies and access control.
  • Configure network address translation.
  • Configure a Sidewinder Proxy.
  • Implement deep inspection through policies and templates.
  • Implement file filtering and malware detection.
  • Implement alerting and notification.
  • Manage users and authentication.
  • Configure mobile VPN solutions.
  • Configure a site-to-site VPN.
  • Manage log collection and storage.
  • Utilize monitoring, statistics, and reporting.
  • Make use of policy management tools.
  • Perform basic troubleshooting of NGFW.

outline

Module 0: Introduction

  • Prepare to use the virtual training environment.

Module 1: NGFW Overview

  • List NGFW benefits and/or differentiators.
  • Explain the differences between the operating roles.
  • Describe the NGFW engine and appliances.
  • Describe at least one of the installation methods.
  • Explain the three platforms on which the NGFW can be deployed.

Module 2: SMC Overview

  • Describe the Security Management Center and its key features.
  • Describe the NGFW system architecture.
  • Identify the ports used for communication between SMC components.
  • Explain the use of locations and contact addresses.
  • Explain the use of SMC Domains.

Module 3: Getting Started with SMC

  • Describe the management client and how it works.
  • Create system backups.
  • Describe SMC high availability options.
  • Configure SMC Administrator Access
  • Apply configuration to NGFW engines.
  • Describe how logs work.

Module 4: NGFW Policies and Templates

  • Describe the types of NGFW policies.
  • Define firewall policy templates.
  • Create a firewall policy hierarchy.
  • Describe the benefits of aliases and continue rules.

Module 5: Access Control and NAT

  • Explain how traffic is matched in access rules.
  • Explain the different types of access rules.
  • Describe the actions for processing traffic in access rules.
  • Explain the different types of NAT.
  • Configure NAT rules.

Module 6: Traffic Inspection.

  • Explain the difference between service, service with protocol, and proxy.
  • Explain enhanced access control methods.
  • Explain different ways to control applications.
  • List the detection methods used in the NGFW Inspection.
  • Describe AETs and normalization.
  • Describe TLS Inspection.
  • Configure Snort inspection on the NGFW.
  • List the Forcepoint products that integrate with the NGFW.

Module 7: Inspection Policies

  • Explain how to send traffic for deep packet inspection.
  • Describe Situations and how to use them.
  • Define the different type of rules in the inspection policy.
  • Tune an inspection policy.

Module 8: Malware Detection and File Filtering Policies

  • List the different options for detecting malware.
  • Explain how to send traffic for malware detection.
  • Configure a file filtering policy.
  • Integrate the NGFW with a Data Loss Prevention system

Module 9: Alerting and Notifications

  • Explain the alert escalation process in the NGFW system.
  • Create an alert policy and alert chain to escalate an alert.

Module 10: Users and Authentication

  • Identify supported directory servers and authentication methods.
  • Explain the browser-based user authentication mechanism.
  • Configure user authentication.
  • Differentiate between user authentication and user identification.
  • Explain the difference between the Forcepoint FUID and ECA.
  • Configure user behavior monitoring

Module 11: Mobile VPN and SSL VPN Portal

  • List NGFW Mobile VPN Access options.
  • Describe the SSL VPN Portal and the URL Rewrite translation method.
  • Configure an SSL VPN Portal.

Module 12: Site-to-Site VPN

  • Define the terms used in NGFW VPN Terminology.
  • Explain how Site-to-site VPNs work
  • Describe Full Mesh, Star and Hub VPN topologies
  • List SD-WAN features supported by the NGFW.
  • Configure a Policy-Based VPN.
  • Describe How a Route-based VPN Works.

Module 13: Using Logs

  • Describe the log entry types available in the NGFW.
  • Use the interface to interpret and analyze logs.
  • Configure and Manage Logs.
  • Create permanent filters.
  • Analyze how pruning filters affect log data.
  • Configure the log server to forward logs to third-party SIEM systems.
  • Describe the methods available for managing the space consumed by log data.

Module 14: Monitoring, Statistics, and Reporting

  • Describe the benefits of Policy Snapshots.
  • Search rules in an NGFW Policy.
  • Analyze policy structure and apply tools to optimize the access rules.

Module 15: Policy Tools

  • Monitor the system and firewall activity.
  • Describe the use of overviews in the SMC user interface.
  • Configure and generate reports.
  • Monitor third-party components.

Module 16: Troubleshooting

  • Explain the troubleshooting process.
  • Use the SMC to troubleshoot your systems.
  • Explain how to collect diagnostics for Support.
  • Resolve common SMC issues.
  • Explain how NGFW packet processing works.

Module 17: Single Firewall Installation (classroom only)

  • Describe NGFW deployment options.
  • List features specific to single firewalls.
  • Configure a single firewall in the SMC.
  • Configure an NGFW engine for initial contact with the SMC.
  • Establish the trust between SMC and a newly installed NGFW engine.

Module 18: What’s new in NGFW

  • Identify key features new to the NGFW in version 6.10.
  • Locate the documentation needed to implement these features.

target_au
  • New and existing customers of Forcepoint NGFW
  • Forcepoint channel partners
  • Forcepoint NGFW end users

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleIBNTRN 1.1 – Transforming to a Cisco Intent Based Network
days5
seo_titleIBNTRN - Transforming to a Cisco Intent Based Network Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended.
objective
  • Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components.
  • Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance.
  • Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access.
  • Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding.
  • Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network.
  • Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access.
  • Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes.
  • Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network.
  • Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless.
  • Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution
  • Describe the use cases and migration scenarios for migrating users from traditional campus to SD

outline
  • Introducing Cisco DNA Architecture
  • Cisco DNA Center Design
  • Cisco DNA Center Inventory
  • Cisco DNA Center Automation
  • Explore Cisco DNA Center and Automating Network Changes
  • Introducing Cisco Software-Defined Access
  • Deploying Cisco Software-Defined Access
  • Deploy Wired Fabric Networks with Cisco DNA Center
  • Cisco SD-Access for Wireless
  • Cisco SD-Access Extension for IoT
  • Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
  • Migrating to Cisco SD-Access
  • Cisco SD-Access Multicast
  • Integrating Cisco DNA Center
  • Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications
  • Understanding Programmable Network Infrastructure
  • Operating and Managing Cisco DNA Infrastructure
  • Test Drive Cisco DNA Center APIs

 

Lab exercises

  • Explore Cisco DNA Center and Automate Network Changes
  • Deploy Wired Fabric Networks with Cisco DNA Center
  • Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
  • Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications
  • Test Drive Cisco DNA Center APIs

target_au
  • Channel partners and resellers
  • Network administrators
  • Network engineers
  • Sales engineers
  • System engineers
  • Technical architects
  • Technical support personnel

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Understanding of network routing and switching principles equivalent to a CCNP® Enterprise level
  • Experience with Cisco Unified Wireless Network technologies
  • Experience with Cisco ISE, 802.1x, and Cisco TrustSec
  • Understanding of segmentation technologies such as VLANs and Virtual Routing and Forwarding (VRF)
  • Basic understanding of overlay technologies such as Virtual Extensible LAN (VXLAN)
  • Basic understanding of Locator ID Separation Protocol (LISP)

Recommended Cisco courses that may help you meet these prerequisites:

  • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
  • Configuring Cisco ISE Essentials for SD-Access (ISESDA)
  • Understanding Cisco Wireless Foundations (WLFNDU)

titleDNAAS v2.1 – Leveraging Cisco Intent-Based Networking DNA Assurance
days2
seo_titleDNAAS - Leveraging Cisco Intent-Based Networking DNA Assurance Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure using Cisco® Digital Network Architecture (Cisco DNA™) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer. This course will help you:
  • Monitor, identify, and respond to changing network and wireless conditions
  • Automate manual operations to reduce the costs associated with human errors, resulting in more uptime and improved security
  • Save time by using a single dashboard to manage and automate your network

objective

After taking this course, you should be able to:

  • Explain the benefits of using Cisco DNA Center in a traditional, enterprise network
  • Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts
  • Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance
  • Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends
  • Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause
  • Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications

outline
  • Introducing Cisco DNA Center Assurance
  • Monitoring Health and Performance with Cisco DNA Center Assurance
  • Troubleshooting Issues, Observing Insights and Trends
  • Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools

Lab outline

  • Prepare Cisco DNA Center for Assurance
  • Monitor Overall Health and the Health of Network Devices
  • Monitor the Health of Clients and Applications
  • Troubleshoot Network, Client, and Application Issues
  • Observer Assurance AI Network Analytics
  • Analyze Wireless Allocation, Capabilities, and Threats
  • Monitor Wireless Networks with Advanced Assurance Tools

target_au

This course is designed for network and software engineers who hold the following job roles:

  • Network administrators
  • Network operators

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Internet web browser usability knowledge
  • Working knowledge of TCP/IP networking
  • Familiarity with network management concepts such as Simple Network Management Protocol (SNMP), Syslog, and NetFlow

The following Cisco courses can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)

titleCBRCOR 1.0 – Performing CyberOps Using Cisco Security Technologies
days5
seo_titleCBRCOR - Performing CyberOps Using Cisco Security Technologies
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity. This course also earns you 30 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam. This course will help you:
  • Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
  • Configure common tools and platforms used by security operation teams via practical application
  • Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
  • Prepare for the 350-201 CBRCOR core exam
  • Earn 30 CE credits toward recertification
What to expect in the exam 350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR) is a 120-minute exam associated with the Cisco CyberOps Professional Certification. The multiple-choice format tests knowledge of core cybersecurity operations including cybersecurity fundamentals, techniques, policies, processes, and automation. The exam will test for knowledge in the following areas:
  • Monitoring for cyberattacks
  • Analyzing high volume of data using automation tools and platforms—both open source and commercial
  • Accurately identifying the nature of attack and formulate a mitigation plan
  • Scenario-based questions; for example, using a screenshot of output from a tool, you may be asked to interpret portions of output and establish conclusions

objective

After taking this course, you should be able to:

  • Describe the types of service coverage within a SOC and operational responsibilities associated with each.
  • Compare security operations considerations of cloud platforms.
  • Describe the general methodologies of SOC platforms development, management, and automation.
  • Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
  • Describe Zero Trust and associated approaches, as part of asset controls and protections.
  • Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
  • Use different types of core security technology platforms for security monitoring, investigation, and response.
  • Describe the DevOps and SecDevOps processes.
  • Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
  • Describe API authentication mechanisms.
  • Analyze the approach and strategies of threat detection, during monitoring, investigation, and response.
  • Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
  • Interpret the sequence of events during an attack based on analysis of traffic patterns.
  • Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
  • Analyze anomalous user and entity behavior (UEBA).
  • Perform proactive threat hunting following best practices.

outline
  • Understanding Risk Management and SOC Operations
  • Understanding Analytical Processes and Playbooks
  • Investigating Packet Captures, Logs, and Traffic Analysis
  • Investigating Endpoint and Appliance Logs
  • Understanding Cloud Service Model Security Responsibilities
  • Understanding Enterprise Environment Assets
  • Implementing Threat Tuning
  • Threat Research and Threat Intelligence Practices
  • Understanding APIs
  • Understanding SOC Development and Deployment Models
  • Performing Security Analytics and Reports in a SOC
  • Malware Forensics Basics
  • Threat Hunting Basics
  • Performing Incident Investigation and Response

Lab outline

  • Explore Cisco SecureX Orchestration
  • Explore Splunk Phantom Playbooks
  • Examine Cisco Firepower Packet Captures and PCAP Analysis
  • Validate an Attack and Determine the Incident Response
  • Submit a Malicious File to Cisco Threat Grid for Analysis
  • Endpoint-Based Attack Scenario Referencing MITRE ATTACK
  • Evaluate Assets in a Typical Enterprise Environment
  • Explore Cisco Firepower NGFW Access Control Policy and Snort Rules
  • Investigate IOCs from Cisco Talos Blog Using Cisco SecureX
  • Explore the ThreatConnect Threat Intelligence Platform
  • Track the TTPs of a Successful Attack Using a TIP
  • Query Cisco Umbrella Using Postman API Client
  • Fix a Python API Script
  • Create Bash Basic Scripts
  • Reverse Engineer Malware
  • Perform Threat Hunting
  • Conduct an Incident Response

 


target_au

Although there are no mandatory prerequisites, the course is particularly suited for the following audiences:

  • Cybersecurity engineer
  • Cybersecurity investigator
  • Incident manager
  • Incident responder
  • Network engineer
  • SOC analysts currently functioning at entry level with a minimum of 1 year of experience

 


pre_req

Although there are no mandatory prerequisites, to fully benefit from this course, you should have the following knowledge:

  • Familiarity with UNIX/Linux shells (bash, csh) and shell commands
  • Familiarity with the Splunk search and navigation functions
  • Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar.

Recommended Cisco offerings that may help you prepare for this course:

  • Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
  • Implementing and Administering Cisco Solutions (CCNA)

Recommended third-party resources:

  • Splunk Fundamentals 1
  • Blue Team Handbook: Incident Response Edition by Don Murdoch
  • Threat Modeling- Designing for Security y Adam Shostack
  • Red Team Field Manual by Ben Clark
  • Blue Team Field Manual by Alan J White
  • Purple Team Field Manual by Tim Bryant
  • Applied Network Security and Monitoring by Chris Sanders and Jason Smith

 


titleSSFRULES v2.1 – Securing Cisco Networks with Snort Rule Writing Best Practices
days3
seo_titleSSFRULES - Securing Cisco Networks with Snort Rule Writing Best Practices Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. This course will help you:
  • Gain an understanding of characteristics of a typical Snort rule development environment
  • Gain hands-on practices on creating rules for Snort
  • Gain knowledge in Snort rule development, Snort rule language, standard and advanced rule options

objective

After taking this course, you should be able to:

  • Describe the Snort rule development process
  • Describe the Snort basic rule syntax and usage
  • Describe how traffic is processed by Snort
  • Describe several advanced rule options used by Snort
  • Describe OpenAppID features and functionality
  • Describe how to monitor the performance of Snort and how to tune rules

outline
  • Introduction to Snort Rule Development
  • Snort Rule Syntax and Usage
  • Traffic Flow Through Snort Rules
  • Advanced Rule Options
  • OpenAppID Detection
  • Tuning Snort

Lab outline

  • Connecting to the Lab Environment
  • Introducing Snort Rule Development
  • Basic Rule Syntax and Usage
  • Advanced Rule Options
  • OpenAppID
  • Tuning Snort

target_au

This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes:

  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel using open source IDS and IPS
  • Channel partners and resellers

pre_req

To fully benefit from this course, you should have:

  • Basic understanding of networking and network protocols
  • Basic knowledge of Linux command-line utilities
  • Basic knowledge of text editing utilities commonly found in Linux
  • Basic knowledge of network security concepts
  • Basic knowledge of a Snort-based IDS/IPS system

titleSSFSNORT v2.1 – Securing Cisco Networks with Open Source Snort
days4
seo_titleSSFSNORT - Securing Cisco Networks with Open Source Snort Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more. This course will help you:
  • Learn how to implement Snort, an open-source, rule-based, intrusion detection and prevention system
  • Gain leading-edge skills for high-demand responsibilities focused on security

objective

After taking this course, you should be able to:

  • Describe Snort technology and identify resources available for maintaining a Snort deployment
  • Install Snort on a Linux-based operating system
  • Describe the Snort operation modes and their command-line options
  • Describe the Snort intrusion detection output options
  • Download and deploy a new rule set to Snort
  • Describe and configure the snort.conf file
  • Configure Snort for inline operation and configure the inline-only features
  • Describe the Snort basic rule syntax and usage
  • Describe how traffic is processed by the Snort engine
  • Describe several advanced rule options used by Snort
  • Describe OpenAppID features and functionality
  • Describe how to monitor Snort performance and how to tune rules

outline
  • Introduction to Snort Technology
  • Snort Installation
  • Snort Operation
  • Snort Intrusion Detection Output
  • Rule Management
  • Snort Configuration
  • Inline Operation and Configuration
  • Snort Rule Syntax and Usage
  • Traffic Flow Through Snort Rules
  • Advanced Rule Options
  • OpenAppID Detection
  • Tuning Snort

Lab outline

  • Connecting to the Lab Environment
  • Snort Installation
  • Snort Operation
  • Snort Intrusion Detection Output
  • Pulled Pork Installation
  • Configuring Variables
  • Reviewing Preprocessor Configurations
  • Inline Operations
  • Basic Rule Syntax and Usage
  • Advanced Rule Options
  • OpenAppID
  • Tuning Snort

target_au

This course is for technical professionals who need to know how to deploy open source, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), and how to write Snort rules.

  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel
  • Channel partners and resellers

pre_req

To fully benefit from this course, you should have:

  • Technical understanding of TCP/IP networking and network architecture
  • Proficiency with Linux and UNIX text editing tools (vi editor is suggested but not required)

titleSSFAMP v6.0 – Protecting Against Malware Threats with Cisco AMP for Endpoints
days3
seo_titleSSFAMP - Protecting Against Malware Threats with Cisco AMP for Endpoints Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. This class will help you:
  • Learn how to deploy and manage Cisco AMP for Endpoints
  • Succeed in today’s high-demand security operations roles

objective

After taking this course, you should be able to:

  • Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP)
  • Recognize the key features and concepts of the AMP for Endpoints product
  • Navigate the AMP for Endpoints console interface and perform first-use setup tasks
  • Identify and use the primary analysis features of AMP for Endpoints
  • Use the AMP for Endpoints tools to analyze a compromised host
  • Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports
  • Configure and customize AMP for Endpoints to perform malware detection
  • Create and configure a policy for AMP-protected endpoints
  • Plan, deploy, and troubleshoot an AMP for Endpoints installation
  • Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors.
  • Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use
  • Describe all the features of the Accounts menu for both public and private cloud installations

outline
  • Introducing to Cisco AMP Technologies
  • Introducing AMP for Endpoints Overview and Architecture
  • Navigating the Console Interface
  • Using Cisco AMP for Endpoints
  • Identifying Attacks
  • Analyzing Malware
  • Managing Outbreak Control
  • Creating Endpoint Policies
  • Working with AMP for Endpoint Groups
  • Using Orbital for Endpoint Visibility
  • Introducing AMP REST API
  • Navigating Accounts

Lab outline

  • Amp Account Self-Registration
  • Accessing AMP for Endpoints
  • Attack Scenario
  • Analysis Tools and Reporting
  • Outbreak Control
  • Endpoint Policies
  • Groups and Deployment
  • Testing Your Configuration
  • Endpoint Visibility Using Orbital
  • REST API
  • Endpoint Isolation Using Cisco AMP API
  • User Accounts

target_au
  • Cisco integrators, resellers, and partners
  • Network administrators
  • Security administrators
  • Security consultants
  • Systems engineers
  • Technical support personnel

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Technical understanding of TCP/IP networking and network architecture
  • Technical understanding of security concepts and protocols

The recommended Cisco offering may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA)

titleAWS Cloud Practitioner Essentials
days1
seo_titleAWS Cloud Practitioner Essentials Course Training
seo_dec
seo_tkey
categorycloud-computing
vendorAWS

techonogyCloud Computing
overviewThe fundamental-level full day course is intended for individuals who seek an overall understanding of the AWS Cloud, independent of specific technical roles. It provides a detailed overview of cloud concepts, AWS services, security, architecture, pricing, and support. It includes lab exercises reinforcing some of the core concepts of the lecture. This course also helps you prepare for the AWS Certified Cloud Practitioner exam.
objective

In this course, you will learn how to:

  • Define what the cloud is and how it works
  • Differentiate between cloud computing and deployment models
  • Describe the AWS Cloud value proposition
  • Describe the basic global infrastructure of the cloud
  • Compare the different methods of interacting with AWS
  • Describe and differentiate between AWS service domains
  • Given a scenario, identify an appropriate solution using AWS Cloud services
  • Describe the Well-Architected Framework
  • Describe basic AWS Cloud architectural principles
  • Explain the Shared Responsibility model
  • Describe security services with the AWS cloud
  • Define the billing, account management, and pricing models for the AWS platform
  • Identify future services and developments built on the cloud

outline

This course covers the following concepts:

  • Introduction to the AWS Cloud
  • Getting Started in the Cloud
  • Building in the Cloud
  • Security
  • Pricing Models and Cloud Application Support
  • Architecture

target_au

This course is intended for:

  • Sales
  • Legal
  • Marketing
  • Business analysts
  • Project managers
  • AWS Academy students
  • Other IT-related professionals

pre_req

We recommend that attendees of this course have the following prerequisites:

  • General IT technical knowledge
  • General IT business knowledge

titleU4180S – HPE NonStop SQL/MP Database Management
days5
seo_titleU4180S - HPE NonStop SQL/MP Database Management Course Training
seo_dec
seo_tkey
categorydata-center
vendorHP

techonogyDatacenter & Virtualization
overviewThis course introduces the tasks and tools used by a database administrator or system manager who is responsible for the daily management and protection of NonStop SQL/MP database, programs that access the database, and other associated database elements. Hands-on labs give you practical experience in performing management tasks against a database with applications.
objective
  • Review of the NonStop SQL/MP environment
  • SQL/MP installation and version management
  • Creating SQL/MP database base objects
  • Loading, copying, appending, and reorganizing data
  • DataLoader/MP
  • Updating SQL/MP statistics
  • Managing SQL/MP embedded programs
  • Altering SQL/MP database objects
  • Moving SQL/MP database objects
  • Removing SQL/MP database objects
  • Managing database protection and recovery using NonStop
  • Transaction Manager/MP (TM/MP)
  • Backing up and restoring SQL/MP database objects
  • Database security management
  • Tools for monitoring performance
  • Enhancing DP2 performance
  • Managing sorts
  • Controlling SQL/MP processes

outline

Module 1: NonStop SQL/MP Environment

  • Processes, structure, and objects of the NonStop SQL/MP environment
  • Locating the SQL/MP system catalog
  • Determining the number and location of SQL/MP catalogs on a system
  • Identifying and locating the objects registered in an SQL/MP database
  • Related products and additional tables they can create in the SQL/MP system catalog

Lab Exercise (30 minutes)

NonStop SQL/MP Environment

  • Locate the system catalog
  • Locate all user catalogs on a system
  • Identify the objects in the PERSNL database and their dependent objects
  • Identify what SQL/MP processes you have running for your session
  • Create a user catalog

 

Module 2: installation and Version Management

  • Identifying the system requirements for NonStop SQL/MP
  • Installation and initialization process of SQL/MP software
  • Version management for SQL/MP objects
  • Managing the migration of SQL/MP from one NonStop Kernel operating system release to another
  • Compatibility of SQL/MP software versions within a network

Lab Exercise (30 minutes)

Installation and Version Management

  • Identify the versions of NonStop SQL/MP, the catalog, and several objects on your system

 

Module 3: Creating NonStop SQL/MP Database Objects

  • Planning and creating NonStop SQL/MP database objects
  • Performance considerations and guidelines for creating SQL/MP database objects
  • Query metadata for the SQL/MP objects that have been created

Lab Exercise (1.5 hours)

Creating SQL/MP Database Objects

 

Module 4: Copying, Loading, Appending, Reorganizing, and Converting Data

  • Converting an Enscribe database to a NonStop SQL/MP database
  • Use the COPY utility to load, extract, or display data
  • Using the LOAD or APPEND utilities to load data
  • Re-organizing data in key-sequenced tables and indexes
  • Archiving data from the database
  • Checking the referential integrity of the database

Lab Exercise (1 hour)

Using Copy, Load and Append Utilities

Lab Exercise (40 minutes)

Reorganizing Data

Lab Exercise (40 minutes)

Converting an Enscribe Database to an SQL/MP Database

 

Module 5: DataLoader/MP

  • How DataLoader/MP can be used to load and maintain database data
  • Components of DataLoader/MP (main logic, library routines, and user exits)
  • Building customized DataLoader/MP processes
  • Running DataLoader/MP processes

 

Module 6: Updating NonStop SQL/MP Statistics

  • Creating DataLoader/MP processes to load the data given a data loading scenario
  • NonStop SQL/MP statistics
  • Statistics for partitioned tables
  • How the optimizer uses statistics to calculate selectivity for predicates
  • How to update statistics
  • When to update statistics
  • Testing the impact of updating statistics in a test environment or the production environment
  • Querying the catalog for statistical information
  • Copying the production system statistics to the development system
  • Statistics performance degradation

Lab Exercise (30 minutes)

Updating SQL/MP Statistics

 

Module 7: Managing NonStop SQL/MP Embedded Programs

  • Explicit compilation and automatic recompilation of NonStop SQL/MP programs
  • SQL/MP program run-time environment
  • Compiling COBOL and C embedded SQL programs in the Guardian and Open System Services (OSS) environments using native and non-native compilers
  • SQL/MP compiler options
  • Creating, implementing, and testing a compilation strategy for an SQL/MP program
  • Determining what actions make an SQL/MP program invalid
  • Detecting invalid SQL/MP programs
  • Detecting auto-recompiling SQL/MP programs

Lab Exercise (45 minutes)

Managing SQL/MP Embedded Programs

  • Plan and implement different compiler options using two scenarios

 

Module 8: Altering NonStop SQL/MP Database Objects

  • Altering NonStop SQL/MP objects and the impact to the database environment
  • Methods for partitioning tables and indexes
  • SQL/MP Format 2 Enabled objects and Format 1 and Format 2 partitions

Lab Exercise (45 minutes)
Altering SQL/MP Database Objects

 

Module 9: Moving NonStop SQL/MP Database Objects

  • Process for moving NonStop SQL/MP objects
  • Methods to move SQL/MP objects (Re-create and Load, ALTER MOVE, DUP, Backup and Restore)

Lab Exercise 9.1 (30 minutes)
Moving SQL/MP Database Objects

Lab Exercise 9.2 (30 minutes)
Moving SQL/MP Embedded Programs

 

Module 10: Removing NonStop SQL/MP Database Objects

  • Removing NonStop SQL/MP objects
  • Removing objects using the DROP command and PURGE and CLEANUP utilities
  • Removing data from a table or a partition of a table using PURGEDATA utility
  • Dropping a partition of a table using ALTER TABLE … DROP PARTITION
  • Dropping a partition of an index using ALTER INDEX … DROP PARTITION
  • TACL GOAWAY command

Lab Exercise (1 hour, 15 minutes)
Removing SQL/MP Database Objects

 

Module 11: Managing Database Protection and Recovery

  • NonStop Transaction Manager/MP (TM/MP) methods of protection and recovery
  • TM/MP considerations for NonStop SQL/MP objects
  • Protecting SQL/MP database with TM/MP
  • Online dump strategy
  • Recovery strategy
  • TM/MP recovery of SQL/MP objects and their catalog
  • TM/MP recovery of SQL/MP objects without recovering their catalog
  • Using licensed copy of SQLCI2 to insert, update, or delete metadata

 

Module 12: Backing up and Restoring NonStop SQL/MP Database Objects

  • File-mode BACKUP and RESTORE options that can be used with NonStop SQL/MP objects
  • Developing protection strategies with the BACKUP and RESTORE utilities for SQL/MP objects
  • Volume-mode options of the BACKUP and RESTORE utilities
  • Using the tape simulator program to implement BACKUP and RESTORE options
  • Possible causes for objects becoming unusable
  • Locating unusable objects
  • Removing unusable objects
  • Identifying the appropriate tools to make objects usable
  • Using the simulator program to implement Backup and Restore options

Lab Exercise (Optional, 45 minutes)
Backing Up and Restoring SQL/MP Database Objects

 

Module 13: Managing NonStop SQL/MP Database Security

  • Process for securing the Nonstop SQL/MP environment
  • Authorization requirements for SQL/MP operations
  • SQL/MP security commands and utilities
  • SQL/MP protection views
  • NonStop Kernel security and the Safeguard product security characteristics
  • Security for the production and development environment

Lab Exercise (1 hour)
Managing SQL/MP Database Security

 

Module 14: Tools for Monitoring Performance

  • Performance tools: SQLCI, Measure product, Tandem Performance Data Collector (TPDC), and basic guidelines for monitoring performance

 

Module 15: Disk process (DP2) Performance Enhancements

  • Methods to enhance the performance of the disk process

 

Module 16: Managing Sorts

  • Sorts available to NonStop SQL/MP
  • Managing sort processes to control system resources
  • Configuring serial and parallel sort operations

 

Module 17: Controlling NonStop SQL/MP Processes

  • Controlling the impact of NonStop SQL/MP processes on performance

target_au
  • Database administrators
  • System managers
  • People responsible for the availability of NonStop SQL/MP databases and applications

pre_req
  • Concepts and Facilities course
  • NonStop SQL/MP Essentials course
  • Solid understanding of systems, application areas, and daily operations for both systems and applications
  • Understanding of the database environment at your business

titleSystem Operator for IBM i
days4
seo_titleSystem Operator for IBM i Course Training
seo_dec
seo_tkey
categoryibm-system
vendorIBM

techonogyEnterprise Networking
overviewThis introductory course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i. Focus is given to using the GUI (IBM i Access Client Solutions and IBM Navigator for i) as well as 5250 emulation sessions to perform tasks including job control, monitoring, sending messages, managing systems devices, and more. Hands-on exercises reinforce the lecture topics and prepare the student to successfully operate a Power System with IBM i.
objective
  • Use the online help and references
  • Send, display, and reply to messages
  • Monitor and control jobs, devices, and job and output queues
  • Start and stop the system
  • Create and change user profiles
  • Use authorization lists and group profiles
  • Manage system configuration  –> this could be the replacement for Manage system devices, user display stations, and printers
  • Save and restore objects, libraries, and the system
  • Monitor job and history logs
  • Diagnose a system problem
  • Order, receive, and apply PTFs
  • Perform all of these functions using a 5250 emulation session as well as IBM i Access Client Solutions and IBM Navigator for i

outline

Day 1

  •  Unit 1: Power Systems and IBM i concepts and overview
  •  Unit 2: Reference material and support
  •  Unit 3: Overview of IBM i Access Client Solutions
  •  Exercise 1: Using the keyboard and system displays
  •  Unit 4: Overview of 5250 emulation and help
  •  Exercise 2: Overview of IBM i Access Client Solutions
  •  Unit 5: Overview of IBM Navigator for i
  •  Exercise 3: Overview of IBM Navigator for i
  •  Unit 6: Messaging concepts
  •  Unit 7: Messaging with 5250 emulation
  •  Exercise 4: Messages with 5250 emulation
  •  Unit 8: Messaging with IBM Navigator for i
  •  Exercise 5: Messaging with IBM Navigator for i
  •  Unit 9: CL command concepts
  •  Unit 10: CL commands with 5250 emulation
  •  Unit 11: Concepts: Object, library, and the IFS

 

Day 2

  • Unit 12: Object management with 5250 emulation
  • Exercise 6: Object management with 5250 emulation
  • Unit 13: Object management with IBM Navigator for i
  • Exercise 7: Object management with IBM Navigator for i
  • Unit 14: Introduction to work management
  • Unit 15: Work management with 5250 emulation
  • Exercise 8: Work management with 5250 emulation
  • Exercise 9: Work management with IBM Navigator for i (Optional)
  • Unit 16: Job control with 5250 emulation
  • Exercise 10: Job control with 5250 emulation
  • Unit 17: Job control with IBM Navigator for i
  • Exercise 11: Job control with IBM Navigator for i (Optional)
  • Unit 18: Print concepts
  • Unit 19: Print control with 5250 emulation
  • Exercise 12: Print control with 5250 emulation
  • Unit 20: IBM i Access Client Solutions printer output
  • Exercise 13: Print with IBM i Access Client Solutions
  • Unit 21: Print control with IBM Navigator for i
  • Exercise 14: Print control with IBM Navigator for i (Optional)

 

Day 3

  • Exercise 15 Creating your own subsystem description
  • Exercise 16 Special work management functions
  • Unit 22: Starting and stopping the system
  • Exercise 17: System values with 5250 emulation
  • Exercise 18: System values with IBM Navigator for i (Optional)
  • Unit 23: System security concepts
  • Unit 24: System security with 5250 emulation
  • Exercise 19: System security with 5250 emulation
  • Unit 25: System security with IBM Navigator for i
  • Exercise 20: System security with IBM Navigator for i (Optional)
  • Unit 26: System configuration overview
  • Unit 27: Configuration with 5250 emulation
  • Exercise 21: Managing your system configuration
  • Unit 28: Configuration with IBM Navigator for i
  • Unit 29: Control language programming
  • Exercise 22: Write a basic CL program

 

Day 4

  • Unit 30: IBM DB2 for i introduction
  • Unit 31: Save concepts
  • Unit 32: Save with 5250 emulation
  • Exercise 23: Save with 5250 emulation
  • Unit 33: Save with IBM Navigator for i
  • Unit 34: Restore concepts and overview
  • Exercise 24: Restore with 5250 emulation
  • Unit 35: Problem determination with 5250 emulation
  • Exercise 25: Problem determination
  • Unit 36: Overview of the PTF process
  • Unit 37: PTFs with 5250 emulation
  • Unit 38: Storage management
  • Unit 39: Introduction to system tuning
  • Unit 40: Class summary

target_au
  • This course is intended for the person who has responsibility for daily system operations.
  • It is not intended for technical audiences who are seeking an in-depth look at how the Power System with IBM i works. This audience should instead attend the IBM i Technical Introduction (OL4AG).

pre_req
  • There are no prerequisites for this course.

titleFortiSwitch
days3
seo_titleFortiSwitch Course Training | Fortinet NSE 6 Certification
seo_decIn this course, you will learn about FortiSwitch when managed by FortiGate using FortiLink.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this three days course, you will learn about FortiSwitch when managed by FortiGate using FortiLink. You will also learn about the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly or from FortiSwitch Cloud. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features available on FortiSwitch. In interactive labs, you will explore the administrative tasks necessary to deploy, provision, and manage FortiSwitch. You will also explore advanced deployment topologies, such as FortiGate full mesh high availability (HA) with MCLAG, to showcase the full potential of FortiSwitch. Product Versions:
  • FortiGate 6.4.6
  • FortiSwitch 6.4.6
  • FortiAnalyzer 6.4.5
  • FortiManager 6.4.5
  • FortiAuthenticator 6.1.1

objective

After completing this course, candidates should be able to:

  • Explore the FortiSwitch portfolio and identify the supported management modes
  • Describe and deploy FortiSwitch in managed switch mode (FortiLink mode)
  • Understand Ethernet switching, VLANs, link aggregation (LAG), MCLAG, and Layer 2 discovery
  • Identify the most common FortiSwitch topologies when deploying FortiSwitch in managed switch mode
  • Understand Spanning Tree Protocol (STP), Rapid Spanning Tree protocol (RSTP), and Multiple Spanning Tree protocol (MSTP) operation and configuration, as well as other loop protection features
  • Describe and configure Layer 2 security to filter unwanted traffic and perform antispoofing
  • Configure Layer 2 authentication using 802.1.X, and leverage 802.1X to assign dynamic VLANs to endpoints
  • Implement advanced features to increase port density, control network access, forward multicast traffic more effectively, and quarantine compromised devices
  • Prioritize traffic on FortiSwitch by using QoS marking, queuing, and rate limiting features
  • Simplify endpoint deployment by using Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED)
  • Share FortiSwitch ports across different VDOMs using multi-tenancy
  • Monitor FortiSwitch using SNMP, sFlow, and flow sampling
  • Describe the most useful troubleshooting tools available on FortiSwitch

outline
  1. Managed Switch
  2. Switch Fundamentals
  3. Layer 2 Design
  4. Layer 2 Security
  5. Advanced Features
  6. Monitoring
  7. Standalone Switch
  8. Troubleshooting

target_au
  • This course is intended for networking and security professionals involved in the management, configuration, administration, and monitoring of FortiSwitch devices used to provide secure network access to endpoints.

pre_req

Basic knowledge in networking

Understanding of layer 2 switching

Understanding of the topics covered in the following courses:

    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure

titleFortiSOAR Design and Development
days3
seo_titleFortiSOAR Course Training | Fortinet NSE 7 Certification
seo_decIn this course, you will learn to create your own dashboards using various built-in widgets, and install widgets from the widget library.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overview
In this course, you will learn how to use FortiSOAR to design simple to complex playbooks. You will learn to create your own dashboards using various built-in widgets, and install widgets from the widget library. You will review the dashboards that are built-in to FortiSOAR and learn to edit them according to your requirements. In practical labs, you will explore the role of FortiSOAR in mitigating malicious indicators and creating interactive dashboards to display relevant information about alerts and incidents. You will design a playbook to extract indicators from a phishing email alert. You will also design a playbook to enrich those indicators using connectors to query threat intelligence platforms, such as FortiGuard. You will also design a playbook to mitigate malicious indicators by blocking them on FortiGate. You will configure a FortiSIEM connector to ingest incidents into FortiSOAR. Product Versions:
  • FortiSOAR 6.4.3
  • FortiSIEM 6.1.1
  • FortiGate 6.4.4
  • FortiMail 6.4.3

objective

After completing this course, you should be able to:

  • Identify the role of FortiSOAR in a SOC environment
  • Plan a FortiSOAR deployment
  • Manage incidents and alerts in a SOC environment
  • Explore, create, and customize dashboards
  • Explore the structure of a template
  • Create, customize, and analyze various dashboard widgets
  • Create, customize, and publish modules
  • Search for records and filter search records
  • Analyze field-type options in the field editor
  • Categorize playbook trigger types
  • Build a user prompt from a manual trigger step
  • Understand the basics of Jinja syntax
  • Define variables and dictionaries in Jinja
  • Configure step utilities within a playbook step
  • Configure various core steps of a playbook
  • Use the advanced editor within a playbook step
  • Analyze the details of an approval record
  • Review the connector store
  • Understand connector configuration
  • Configure different modes of data ingestion
  • Configure data ingestion from FortiSIEM
  • Install and configure connectors and apply them to a playbook
  • Configure various utility steps
  • Configure referenced playbooks
  • Configure and use dynamic variables and values
  • Use expressions to customize playbook input and outputs
  • Use common Jinja filters and functions
  • Use the json_query filter to extract data from complex data structures
  • Configure for loop functions and if statements

outline
  1. Introduction to FortiSOAR
  2. Dashboard Templates and Widgets
  3. Module Templates and Widgets
  4. Application Editor
  5. Dynamic Variables and Values
  6. Jinja Filters, Functions, and Conditions
  7. Introduction to Playbooks
  8. Playbook Core Steps
  9. Playbook Evaluate Steps
  10. Playbook Connectors, Data Ingestion, and Execution Steps

target_au

This course is intended for cybersecurity professionals responsible for planning, designing, and customizing FortiSOAR deployments, integrating FortiSOAR with FortiGate, FortiSIEM, and FortiMail, and FortiSOAR playbook design and development.


pre_req

Familiarity with Python programming, and the Jinja2 templating language for Python is required to benefit from this course.

Familiarity with the following Fortinet products is beneficial:

  • FortiGate
  • FortiSIEM
  • FortiMail

titleOT Security
days3
seo_titleOT Security Course Training | Fortinet NSE 7 Certification
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overview
In this interactive course, you will learn how to secure your OT infrastructure using Fortinet solutions. You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of how to design, implement, and operate an OT security solution based on Fortinet products. Product Versions
  • FortiOS 6.4.3
  • FortiAnalyzer 6.4.3
  • FortiSIEM 5.3.1

objective

After completing this course, you should be able to:

  • Understand the fundamentals of an OT infrastructure
  • Secure an OT infrastructure using the Purdue model
  • Use FortiGate and FortiNAC to identify and manage devices
  • Implement segmentation and microsegmentation in an OT network
  • Authenticate users
  • Secure your OT network traffic using a FortiGate device
  • Use FortiAnalyzer for logging and reporting
  • Use FortiSIEM to centralize security information and event management
  • Generate real-time analysis of security events using FortiSIEM

outline
  1. Introduction
  2. Asset Management
  3. Access Control
  4. Segmentation
  5. Protection
  6. Logging and Monitoring
  7. Risk Assessment

target_au

Networking and security professionals involved in the design, implementation, and administration of an OT infrastructure using Fortinet devices should attend this course.


pre_req

You must have an understanding of the topics covered in the following courses, or have equivalent experience:

  • NSE 4 FortiGate Security
  • NSE 4 FortiGate Infrastructure

It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:

  • NSE 5 FortiSIEM
  • NSE 5 FortiAnalyzer

titleTrend Micro™ Deep Discovery
days3
seo_titleTMCPDD - Trend Micro™ Deep Discovery Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorTrend Micro

techonogyIT Systems and Security
overviewTrend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solution using: Trend Micro™ Deep Discovery Inspector Trend Micro™ Deep Discovery Analyzer Trend Micro™ Deep Discovery Email Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management, and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by TrendMicro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery.
objective

Trend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solution using:

• Trend Micro™ Deep Discovery Inspector
• Trend Micro™ Deep Discovery Analyzer
• Trend Micro™ Deep Discovery Email Inspector


outline
  • Module 1: Introduction
  • Module 2: Deep Discovery Solution Overview
  • Module 3: Deep Discovery Inspector
  • Module 4: Deep Discovery Inspector Installation and Configuration
  • Module 5: Threat Detect Technologies
  • Module 6: Deep Discovery Inspector Management and Administration
  • Module 7: Deep Discovery Inspector Logs and Reports
  • Module 8: Virtual Analyzer
  • Module 9: Deep Discovery Analyzer Installation and Configuration
  • Module 10: Deep Discovery Analyzer Administration
  • Module 11: Deep Discovery Email Inspector
  • Module 12: Deep Discovery Email Inspector Installation and Configuration
  • Module 13: Deep Discovery Email Inspector Administration
  • Module 14: Threat Connect

target_au

This course is designed for IT professionals who are responsible for protecting networks from any kinds of networked, endpoint, or cloud security threats.

The individuals who will typically benefit the most includes:

  • System administrators
  • Network engineers
  • Support engineers
  • Integration engineers
  • Solution & security architects

pre_req

Before you take this course, trend micro recommends that you have a working knowledge of their products and services as well as basic networking concepts and principles. You should also have a working knowledge of the following products:

  • Windows servers and clients
  • Firewalls, Web Application Firewalls, Packet Inspection devices
  • General understanding of malware

titleCCET 1.0 – Troubleshooting Cisco Contact Center Enterprise
days2
seo_titleCCET - Troubleshooting Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center
vendorCisco

techonogyCollaboration
overviewThe Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco® PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues.   This class will help you:
  • Learn the troubleshooting techniques to maximize the benefits the prepackaged deployment model PCCE
  • Anticipate and rectify possible deployment issues by learning the tools and processes that provide solutions for deployment issues

objective

After taking this course, you should be able to:

  • Describe CCE flows and processes required to support and troubleshoot the PCCE deployment
  • Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment
  • Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE Deployment

outline
  • CCE Flows and Process Review
  • Troubleshooting and Support Methodology
  • PCCE Components
  • PCCE Call Flow Review
  • CCE Diagnostic Tools
  • Diagnostic Framework Suite
  • Run Analysis Manager
  • Run Unified System Command-Line Interface (CLI)
  • Troubleshooting CCE
  • Troubleshooting Certificates
  • Troubleshooting Cisco Finesse
  • Troubleshooting a PCCE Deployment

 

Lab Exercises

  • Configure Access to Discovery Environment
  • Explore CCE Components
  • Explore Diagnostic Framework Suite
  • Analyze Peripheral Gateway (PG) Logs
  • Navigate Certificate Store
  • View Cisco Finesse Logs

target_au
  • Account manager
  • Deployment engineer
  • Deployment project manager
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Strong knowledge of computer networking components: Windows A/D, SQL Server, and components (servers, routers, switches)
  • Strong understanding of IP networks
  • Advanced experience administering of Cisco Packaged Contact Center Enterprise
  • Experience deploying Cisco Packaged Contact Center Enterprise
  • Experience administering and troubleshooting Cisco Unified Communications Manager and Voice Gateways

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding Cisco Collaboration Foundations (CLFNDU)
  • Implementing and Administering Cisco Solutions (CCNA®)
  • Administering Cisco Contact Center Enterprise (CCEA)
  • Administering Advanced Cisco Contact Center Enterprise (CCEAA)
  • Implementing Cisco Contact Center Enterprise (CCEI)

titleCCER 1.0 – Reporting Cisco Contact Center Enterprise
days5
seo_titleCCER - Reporting Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center
vendorCisco

techonogyCollaboration
overviewThe Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. The course explains the nuances of analyzing and troubleshooting in various deployment scenarios: Designed Tier 2/Day 2 Support. The Cisco® Contact Center Enterprise (CCE) solution helps businesses deliver a connected digital experience, enabling you to provide contextual, continuous, and capability-rich journeys for your customers, across time and channels. The course teaches you the business application of the CCE solution providing the framework of interrelationship between both core and optional components required to configure the CCE solution.   This class will help you:
  • Consolidate disparate data into manageable, comprehensive reports
  • Understand the business application of the CCE solution and how it provides a framework of correlation between core and optional components

objective

After taking this course, you should be able to:

  • Explain the Cisco Unified Intelligence Center including the benefits and features of the system and describe the high-level architecture of Cisco Unified Intelligence Center in the UCCE environment
  • Understand the Cisco Unified Intelligence Center administration console to perform Cisco Unified Intelligence Center administrative, maintenance and provisioning functions
  • Discuss the functional attributes of the Cisco Unified Intelligence Center
  • Customize Cisco Unified Intelligence Center Reports and Views

outline
  • Cisco Unified Intelligence Center Foundations
    • Cisco Unified Intelligence Center – Basics
    • Cisco Unified Intelligence Center – Deployment Models

     

    Cisco Unified Intelligence Center Administration and Operations Console

    • Operations Console (OAMP) Console Introduction
    • Admin User Management

     

    Cisco Unified Intelligence Center Attributes

    • Stock Reporting
    • Dashboard Features

     

    Cisco Unified Intelligence Center Custom Reports and Views

    • Creating Views
    • Building Report Definitions

     

    Lab outline

    • Exploring Cisco Unified Intelligence Center (CUIC) OAMP
    • Working with Stock Reports
    • Working with Dashboards
    • Value Lists and Collections
    • Exploring Supervisor Defaults
    • Using Groups
    • Editing Report Views Pt 1 of 2
    • Editing Report Views Pt 2 of 2
    • Report Definitions and Drilldowns
    • Create Custom Route Call Detail (RCD) Report Definition (Database Query) and Report
    • Value Lists and Drilldowns

target_au
  • Administrators
  • Business liaisons
  • Deployment engineers
  • Managers overseeing CCE deployments

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of computer networking components: Windows Active Directory (AD) SQL Server and components (servers, routers, switch) is helpful but not required
  • Understanding of Cisco Packaged Contact Center Enterprise components and call flows
  • Experience administering Cisco Packaged Contact Center Enterprise

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Administering Cisco Contact Center Enterprise (CCEA)
  • Cisco Certified Network Associate (CCNA®)
  • Understanding Cisco Foundation Collaborations (CLFNDU)

titleCCEF 1.0 – Understanding Cisco Contact Center Enterprise Foundations
days1
seo_titleCCEF - Understanding Cisco Contact Center Enterprise Foundations Course Training
seo_dec
seo_tkey
categoryunified-contact-center
vendorCisco

techonogyCollaboration
overviewThe Understanding Cisco Contact Center Enterprise Foundations (CCEF) v1.0 course gives you an overview of the Cisco® Packaged Contact Center Enterprise (PCCE) and Unified Contact Center Enterprise solutions. You will gain an understanding of contact center basics and describe the available Cisco contact center solutions and intended target customers. You will also focus on the Cisco Contact Center Enterprise (CCE) family of products and explore key features and functionality of the solution including architecture, major system components, and tools used for administration and reporting. This course is the foundation for additional courses required to deploy, configure, support, and troubleshoot Cisco CCE solutions.   This class will help you:
  • Learn how to manage timely, disparate data using CCER as a reporting solution
  • Apply the CCE as a business solution to deploy, troubleshoot, and tailor application usage to support business processes.
  • Understand the foundational components of Contact Center Enterprise solutions

objective

After taking this course, you should be able to:

  • Provide a high-level overview of the Cisco Contact Center portfolio
  • List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions
  • Describe how calls flow through PCCE using appropriate terms and naming conventions
  • Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment
  • Identify advanced features available within the PCCE solution

outline
  • Introduction to CCE
  • Cisco Contact Center Basics
  • Cisco Contact Center Fundamentals
  • Functionality of PCCE Components
  • Public Switched Telephone Network (PSTN) and Voice Gateways
  • Cisco Unified Border Element (CUBE)
  • Terms and Naming Conventions Used in CCE
  • CCE Access Environment
  • CCE Routing Configuration
  • Access Tools Available in CCE
  • Single Pane of Glass (SPOG)
  • Cisco Intelligent Contact Management (ICM) Configuration Manager
  • Discovering CCE Features Beyond Default
  • Agent Management
  • Agent Efficiency

 

Lab outline

  • This class does not have any labs.

target_au
  • Account and project managers
  • Business liaisons
  • Deployment engineers
  • Managers overseeing CCE deployments
  • Technical sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
  • Working knowledge of Unified Communications Manager and Voice Gateways
  • Basic understanding of IP networks

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • CCNA®
  • Understanding Cisco Foundation Collaborations (CLFNDU)

titleCCEI 1.0 – Implementing Cisco Contact Center Enterprise
days3
seo_titleCCEI - Implementing Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center
vendorCisco

techonogyCollaboration
overviewThe Implementing Cisco Contact Center Enterprise (CCEI) v1.0 course teaches you how to build and implement a Cisco® Packaged Contact Center Enterprise (PCCE) solution, including advanced integration of external data, Single Sign-On (SSO), and process detail for the Contact Center Enterprise (CCE) solution with examples of the various deployment models. This integration process enables businesses and organizations to deliver a connected digital experience of continuous and capability-rich journeys for your customers, across time and channels. This course teaches you to install the CCE solution and provide Tier 2–3 solution support. The focus is on Day 1 support for a new CCE deployment.   This class will help you:
  • Learn how to optimize management of CCE solutions for smooth, connected, and efficient digital experiences across multiple channels
  • Manage the effects of using CCE solutions for scalability, flexibility, and growth to support larger contact center enterprises

objective

After taking this course, you should be able to:

  • Examine components, protocols, and variables that influence selection of the design and sizing of a PCCE deployment
  • Identify concepts necessary to create CCE system design specifications and deployment plans
  • Configure an advanced VXML application implementing DB lookup functionality and digit collection; use Call Studio and CCE Scripting tools to present call data collected from the caller to the gent desktop
  • Discover how to install CCE software
  • Administer CA signed security certificates to support the successful addition of a PCCE site
  • Identify the tasks associated with adding Remote Site functionality to the PCCE environment
  • Discuss integration of the CUIC, LiveData, and Finesse reporting environments
  • Configure the PCCE Dial Plan end-to-end, incorporating the use of Cisco Unified Border Element (CUBE), Cisco Unified SIP Proxy (CUSP), Cisco Virtualized Voice Browsers (VVBs), Voice XML (VXML) Gateways (GW), and Significant Digits
  • Examine concepts necessary to create CCE system design specifications and deployment plans
  • Create a series of routing scripts using PCCE
  • Configure Single sign-on for Unified CCE

outline

Planning a Cisco Packaged Contact Center Enterprise Deployment

  • Packaged CCE Component Overview
  • Call Flows Review

 

Staging a Packaged CCE Deployment

  • PCCE Deployment Planning and System Design Specification
  • Software Compatibility and OS Requirements

 

Preparing CCE Software for Installation

  • General Considerations and System Requirements
  • Active Directory Considerations

 

Administering Security Certificates

  • Security Certificate Overview
  • Install and Configure Certificate Authority

 

Introducing the Packaged CCE Integration Wizard

  • PCCE Inventory and Service Accounts
  • Run the PCCE Wizard Adding a Site to Packaged CCE

 

Adding a Site to Packaged CCE

  • PCCE Remote Site Overview
  • Remote Site Security Certificate Considerations

 

Integrating Cisco Unified Intelligence Center, LiveData, and Finesse

  • Compare Real Time vs. Live Data
  • Complete Cisco Unified Intelligence Center Integration

 

Personalizing the Packaged CCE Dial Plan

  • CCE Dial Plan Components
  • Ingress Gateway and Cisco Unified Border Element Dial Plans Configuring to Validate Deployment

 

Configuring to Validate Deployment

  • Confirm Configuration Readiness
  • Cisco Unified Communications Manager Administration

 

Scripting for Packaged Contact Center Enterprise

  • Configure Script Editor
  • Use Microapps

 

Configuring Single Sign-On

  • SSO Overview
  • Configure SSO Prerequisites

 

Lab Practice

  • Navigate CCE Discovery Architecture and Components
  • Explore ICM Configuration Tools
  • Observe Installed CCE Software
  • Navigate Certificate Store
  • Add a Remote Site to PCCE
  • Personalize Finesse Server
  • Configure Site Dial Plan
  • Verify Configuration Details for Final Testing
  • Build a Series of Test Scripts
  • Enable Single Sign-On

target_au
  • Deployment engineer
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Advanced knowledge of computer networking components: Windows A/D, SQL Server, and components
  • Understanding of IP networks
  • Strong understanding of Cisco Packaged Contact Center Enterprise functionality
  • Advanced experience administering of Cisco Packaged Contact Center Enterprise
  • Working knowledge of Unified Communications Manager and Voice Gateways

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Administering Cisco Contact Center Enterprise (CCEA)
  • Administering Advanced Cisco Contact Center Enterprise (CCEAA)
  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Understanding Cisco Collaboration Foundations (CLFNDU)
  • Implementing and Administering Cisco Solutions (CCNA®)

titleCCEAA 1.0 – Administering Advanced Cisco Contact Center Enterprise
days3
seo_titleCCEAA - Administering Advanced Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center
vendorCisco

techonogyCollaboration
overviewThe Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco® Contact Center Enterprise (CCE) solution through an in-depth examination of technical and operational requirements, and of the tools used to configure and ensure CCE solution functionality.   This class will help you:
  • Learn how to optimize management of CCE solutions for proactive management of contact centers tasks
  • Manage the effects of using CCE solutions for scalability and interaction between the solution components for centralized application management

objective

After taking this course, you should be able to:

  • Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities.
  • Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration.
  • Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop.
  • Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new.
  • Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop.
  • Successfully deploy Mobile Agent in a CCE Environment.
  • Successfully deploy Post Call Survey in a CCE Environment.

outline

PCCE Review

  • Review PCCE Architecture and Components
  • Review PCCE Protocols

 

Introducing Bulk Import Tools

  • Use the PCCE Bulk Import Tool
  • Use Bulk Import Templates

 

Configuring Advanced Scripting and CCE Data Exchange

  • Design for Advanced Scripting
  • CCE Data Exchange

 

Cisco Unified Communications Manager Initiated Call Flows

  • Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models
  • Describe Subsequent Transfers

 

Using Gadgets to Customize the Finesse Desktop

  • Obtain Finesse Custom Gadgets
  • Deploy Finesse Custom Gadgets

 

Implementing Mobile Agent

  • Examine Mobile Agent Functionality
  • Identify Mobile Agent Architecture and Components

 

Implementing Post Call Survey

  • Examine Post Call Survey Functionality
  • Configure Post Call Survey

 

Lab Practice

  • Review Discovery
  • Navigate CCE Discovery Architecture and Components
  • Import Bulk Data
  • Create a VXML Application Using Call Studio
  • Configure Precision Queues
  • Create a CCE Routing Script
  • Customize the Finesse Desktop
  • Test Your Call Flow
  • Configure Cisco Unified Communications Manager (CUCM) as Routing Client and Agent Transfers
  • Deploy Cisco Finesse Gadgets
  • Implement Mobile Agent

target_au
  • Deployment engineer
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required.
  • Working knowledge of Unified Communications Manager and voice gateways
  • Basic understanding of Cisco Unified Contact Center Enterprise architecture and operation

 

 Recommended Cisco offerings that may help you meet these prerequisites:

  • Administering Cisco Contact Center Enterprise (CCEA)
  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding CiscoCollaboration Foundations (CLFNDU)

titleCCEA 1.0 – Administering Cisco Contact Center Enterprise
days4
seo_titleCCEA - Administering Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center
vendorCisco

techonogyCollaboration
overviewThe Administering Cisco Contact Center Enterprise (CCEA) v1.0 course teaches you the contextual information around call flow between components in the Cisco® Unified Contact Center Enterprise (UCCE) solution including intelligent contact routing, call treatment, network-to-desktop Computer Telephony Integration (CTI), and multichannel contact management over an IP infrastructure. You receive hands-on practice using administrative tools to perform routine adds, moves, and changes in an inbound contact center environment.   This class will help you:
  • Leverage the Cisco Unified Contact Center Enterprise (UCCE) for a smooth integration of inbound and outbound voice applications to support multiple communication channels.
  • Manage a multichannel contact functionality with IP telephony as a unified solution to rapidly deploy within a distributed contact center infrastructure.

objective

After taking this course, you should be able to:

  • Navigate CCE configuration and scripting tools
  • Configure a dialed number, call type, and media routing domain
  • Build a basic Cisco Intelligent Contact Management (ICM) script
  • Configure agents and skill groups
  • Configure basic Interactive Voice Response (IVR) functionality
  • Implement attributes and precision queues
  • Configure Ring-No-Answer (RONA) using CCE configuration tools
  • Configure and populate an agent team and primary supervisor
  • Improve agent efficiency through finesse enhancements
  • Build and test a basic Voice XML (VXML) application
  • Implement roles, departments, and business hours
  • Run Cisco Unified Intelligence Center (CUIC) reports using the Reporting tool

outline

Cisco Unified Contact Center Review

  • Contact Center Basics
  • Components and Architecture

 

Deploying Basic Call Settings

  • Associate Basic Call Settings
  • Explore Media Routing Domains

 

Building a Basic Cisco Unified Contact Center Enterprise Script

  • Introduce Script Editor
  • Use Script Editor Nodes

 

Configuring Basic Agent Functionality

  • Introduce Agent Functionality
  • Configure Agent Desk Settings

 

Configuring Basic Call Treatment and Queuing

  • Explore Media Server and Files
  • Introduce Microapps

 

Implementing Precision Routing

  • Introduce Precision Routing Basics
  • Examine the Migration Path

 

Configuring RONA Support

  • Introduce RONA Functionality
  • Identify RONA Timeout Considerations

 

Configuring Agent Teams and Supervisors

  • Configuring Teams and Supervisors
  • Explore Agent Roles

 

Administering the Cisco Finesse Desktop

  • Administering Cisco Finesse Desktop
  • Introduce Cisco Finesse Administration

 

Implementing Voice XML Applications

  • Introduce VXML
  • Build a Basic Call Studio Project

 

Configuring Roles, Departments, and Business Hours

  • Examine Post-Call Survey Functionality
  • Configure Post-Call Survey

 

Running Unified CC Enterprise Reports with Unified Intelligence Center (IC)

  • Configure Unified CC Enterprise Administrators
  • Configure Departments

 

Lab Exercises

  • Navigate CCE Discovery Architecture and Components
  • Explore ICM Configuration Tools
  • Administering ICM Dialed Numbers and Call Types
  • Prepare a Basic Label Script
  • Using ICM Tools for ICM Scripts
  • Configure ICM for Basic Agent and Skill Group Functionality
  • Configure UCM for Agent Functionality
  • Test Basic Skill Group Functionality in an ICM Script
  • Examine Media Files and Variables in ICM Scripts
  • Build Basic ICM Scripts with MicroApps
  • Configure and Implement Precision Routing
  • Configure RONA
  • Configure Agent Teams and Supervisors
  • Cisco Finesse Administration
  • Configure VXML Server and Install Call Studio
  • Create and Deploy a Call Studio Project
  • Integrate VXML Applications with a Unified CC Enterprise Script
  • Configuring Roles, Departments, and Business Hours
  • Run Unified IC Stock Reports

target_au
  • Account and project managers
  • Contact Center Enterprise (CCE) administrators
  • Deployment engineers
  • Technical sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
  • Working knowledge of Unified Communications Manager and voice gateways
  • Basic understanding of Cisco Unified Contact Center Enterprise architecture and operation

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding Cisco Collaboration Foundations (CLFNDU)

titleCLFNDU v1.1 – Understanding Cisco Collaboration Foundations
days5
seo_titleCLFNDU - Understanding Cisco Collaboration Foundations Course Training
seo_dec
seo_tkey
categoryunified-communications
vendorCisco

techonogyCollaboration
overviewThe Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. The course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several professional-level collaboration courses and exams:
NO Id Course NameVendor seo titlekeywords seo description
Collaboration Courses Collaboration Exams
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) 350-801 Implementing Cisco Collaboration Core Technologies (CLCOR)
Implementing Cisco Collaboration Applications (CLICA) 300-810 Implementing Cisco Collaboration Applications (CLICA)
Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM)
Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) 300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)
Implementing Automation for Cisco Collaboration Solutions (CLAUI) 300-835 Implementing Automation for Cisco Collaboration Solutions (CLAUI)

objective

After taking this course, you should be able to:

  • Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model
  • Configure and modify required parameters in Cisco Unified Communications Manager (CM) including service activation, enterprise parameters, CM groups, time settings, and device pool
  • Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM

outline
  • Define Collaboration Technology and Benefits
  • Administering Initial Parameters for Cisco Unified Communications Manager
  • Exploring Endpoints and the Registration Process
  • Exploring Codecs and Call Signaling
  • Managing Users in Cisco Unified Communication Manager
  • Describing a Basic Dial Plan
  • Describing Class of Service
  • Enabling Endpoints and Features
  • Describing the Cisco ISR as a Voice Gateway
  • Exploring Cisco Unified Communication Manager Media Resources
  • Reporting and Maintenance
  • Exploring Additional Requirements for Video Endpoints
  • Describing Cisco Unity Connection

Lab outline

  • Configure Cisco Unified Communication Manager Initial Parameters
  • Configure the Cisco Unified CM Core System Settings
  • Configure an Access Switch for an Endpoint
  • Deploy an IP Phone Through Auto and Manual Registration
  • Administer Endpoints in Cisco Unified Communications Manager
  • Create a Local User Account and Configure LDAP
  • Adding Users in Cisco Unified Communications Manager Create a Basic Dial Plan
  • Explore Partitions and Call Search Spaces
  • Explore Private Line Automatic Ringdown (PLAR)
  • Deploy an On-Premise Cisco Jabber® Client for Windows
  • Implement Common Endpoint Features
  • Implement Single-Site Extension Mobility Configure Jabber
  • Configure Voice over Internet Protocol (VoIP) Dial Peers
  • Configure Integrated Service Digital Network (ISDN) Circuits and Plain Old Telephone Service (POTS) Dial Peers
  • Control Access to Media Resources
  • Use Reporting and Maintenance Tools
  • Explore Endpoint Troubleshooting Tools
  • Examine the Integration between Unity Connection and Cisco Unified CM
  • Manage Unity Connection Users

target_au
  • Students preparing to take the CCNP Collaboration certification
  • Network administrators
  • Network engineers
  • Systems engineers

pre_req

This course is intended to be an entry-level course. While there are no specific prerequisite Cisco courses; however, the following skills are required:

  • Internet web browser usability knowledge and general computer usage
  • Knowledge of Cisco Internetwork Operating System (Cisco IOS®) command line

titleDCNXA 1.0 – Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced
days4
seo_titleDCNXA - Implementing Cisco Nexus 9000 Switches in NX-OS Mode - Advanced Course Training
seo_dec
seo_tkey
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features. This course will help you:
  • Learn how you can integrate Cisco Nexus 9000 Switches in NX-OS mode to manage your enterprise IT environment
  • Understand the common platform architecture and key features of the Cisco Nexus 9000 Series in NX-OS mode to provide a consistent set of provisioning, management, and diagnostic capabilities for applications

objective

After taking this course, you should be able to:

  • Configure VXLAN EVPN in a single site using Cisco DCNM
  • Configure a Multi-Site VXLAN EVPN
  • Configure L4-L7 service redirection
  • Configure external connectivity from a VXLAN EVPN
  • Configure tenant-level features and Tenant-Routed Multicast (TRM) in VXLAN EVPN
  • Configure Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD)

outline
  • Describing VXLAN EVPN in Single Site
    • Describe VXLAN EVPN Control Plane
    • Describe VXLAN EVPN Data Plane
  • Describing Multi-Site VXLAN EVPN
    • Describe VXLAN EVPN Multi-Site Features
    • Describe Supported Multi-Site Topologies
  • Describing Layer 4-Layer 7 Service Redirection
    • Describe Layer 4-Layer 7 Service Integration Options
    • Describe Integration of Active/Standby and Active/Active Service Devices
  • Describing External Connectivity from VXLAN EVPN
    • Describe External VRF-Lite Connectivity
  • Describing VXLAN EVPN Functionality Enhancements
    • Describe Fabric Management Options
    • Describe Tenant-Level Dynamic Host Configuration Protocol (DHCP) Relay
  • Describing Cisco NX-OS Enhanced Policy-Based Redirect and Intelligent Traffic Director
    • Describe Enhanced Policy-Based Redirect
    • Describe Tenant-Level DHCP Relay

Labs

  • Import an Existing VXLAN Border Gateway Protocol (BGP) EVPN Fabric into Cisco DCNM
  • Configure vPC and Layer 3 Connectivity
  • Configure Multi-Site VXLAN EVPN
  • Configure Routed Firewall Integration into VXLAN EVPN Using PBR
  • Configure External VRF Lite Connectivity and Endpoint Locator
  • Configure Tenant DHCP Relay
  • Configure Tenant-Routed Multicast
  • Configure Enhanced Policy-Based Redirect
  • Configure Traffic Load-Balancing Using the ITD

target_au

Basic knowledge in the following areas can help you get the most from this course:

  • Networking protocols, routing, and switching
  • General Cisco data center technologies
  • Virtualization fundamentals
  • Cisco Nexus platform management

The following course offerings may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Implementing Cisco Nexus 9000 Switches in NX-OS Mode (DCNX)

pre_req

IT professionals interested in understanding the capabilities of Cisco Nexus 9000 Series Switches including:

  • Data center engineer
  • Field engineer
  • Network designer
  • Network administrator
  • Network engineer
  • Systems engineer
  • Technical solutions architect

titleDCMDSO 1.5 – Cisco MDS 9000 Series Switches Overview
days1
seo_titleDCMDSO - Cisco MDS 9000 Series Switches Overview Course Training
seo_dec
seo_tkey
categorystorage-networking
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.5 course gives you a technical overview of how Cisco Multilayer Director Switch (MDS) 9000 Series, can be used to build highly available and scalable storage networks with advanced security and unified management. The course is for technical decision makers and IT professionals who architect, implement, and manage data center Storage Area Network (SAN) environments. In this course, you’ll learn about key capabilities of the MDS 9000 Series, including platforms, architecture, software, management, and key features that contribute to performance, high availability, flexibility, and operational simplicity of storage environments. This course will help you:
  • Learn how you can use Cisco MDS Series 9000 Multilayer Switches to manage your enterprise SAN environment
  • Understand the common platform architecture and key features of the MDS 9000 Series, which provide a consistent set of provisioning, management, and diagnostic capabilities and lead to flexibility, speed, lower operational costs and more benefits

objective

After taking this course, you should be able to:

  • Describe Cisco MDS SAN features and advantages
  • Define fixed and modular platforms
  • Understand Cisco MDS architecture and high-availability mechanisms
  • Identify technologies used in modern SANs
  • Describe SAN management with Cisco Data Center Network Manager (DCNM)
  • Explain key value-add features that distinguish Cisco MDS switches

outline
  • Define Cisco MDS Platform Overview
  • Introduction and Advantages of Cisco MDS
  • Fixed Platforms
  • Modular Platforms
  • Describe Cisco MDS Architecture
  • Store-and-Forward Architecture
  • High Availability
  • Redundancy
  • Explore Cisco MDS Key Features
  • Virtual Storage Area Networks
  • Port Channels
  • Slow Drain Device and Path Analysis Using Congestion Control Mechanisms
  • Cisco DCNM SAN Insights for SAN Analytics
  • Zoning
  • Smart Zoning
  • Other Differentiating Features
  • Examine Cisco MDS Management
  • Cisco Data Center Network Manager

target_au

IT professionals interested in understanding the capabilities of the MDS 9000 Series, including:

  • Data center architects
  • Data center engineers
  • IT directors
  • IT managers
  • Network architects
  • Network engineers
  • Solutions architects
  • Systems engineers

pre_req

Understanding the following information can help you get the most from this course:

  • Experience managing data center deployments
  • Grasping the fundamentals of SAN technologies
  • Understanding business and application requirements

titleDCIT v7.0 – Troubleshooting Cisco Data Center Infrastructure
days5
seo_titleDCIT - Troubleshooting Cisco Data Center Infrastructure Course Training
seo_dec
seo_tkey
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 course shows you how to troubleshoot LAN, SAN, Cisco® Data Center Unified Fabric, Cisco Unified Computing System™ (Cisco UCS®), and Cisco Application-Centric Infrastructure (Cisco ACI®).You will learn methodologies and tools to identify issues that may occur in data center network architecture. You will get extensive hands-on practice troubleshooting installation, configuration and interconnectivity issues on Cisco Multilayer Director Switch (MDS) switches, Cisco Nexus® switches, Cisco Fabric Extenders (FEXs), Cisco UCS, Cisco ACI, and more. This course helps prepare you to take the exam:
  • 300-615 Troubleshooting Cisco Data Center Infrastructure (DCIT)
This course will help you:
  • Learn how to deploy and troubleshoot various components of Cisco data center infrastructure to support performance, resiliency, scalability needs
  • Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
  • Earn 50 CE credits toward recertification

objective

After taking this course, you should be able to:

  • Describe how to troubleshoot the data center network, troubleshooting tools and methodologies available from the Command-Line Interface (CLI) that are used to identify and resolve issues in a Cisco data center network architecture
  • Identify and resolve issues that are related to: Virtual LANs (VLANs) and private VLANs (PVLANs); port channels and virtual port channels; Overlay Transport Virtualization (OTV); and Virtual Extensible LAN (VXLAN)
  • Describe troubleshooting of routing protocols such as Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Protocol-Independent Multicast (PIM), and LAN security features
  • Identify and resolve issues that are related to a single device
  • Identify and resolve issues that are related to Fibre Channel interface operation
  • Identify and resolve Fibre Channel switching issues when the Cisco NX-OS Software is used in switched mode, and in N-Port Virtualization (NPV) mode
  • Identify and resolve issues that are related to Fibre Channel over Ethernet (FCoE) and FCoE Initialization Protocol (FIP), including FCoE performance
  • Describe Cisco UCS architecture, initial setup, tools, and service aids that are available for Cisco UCS troubleshooting and interpretation of the output
  • Describe Cisco UCS configuration, Cisco UCS B-Series Blade Server operation and troubleshoot related issues
  • Describe LAN, SAN, and Fibre Channel operations, including in-depth troubleshooting procedures
  • Describe Cisco Integrated Management Controller (IMC) tools for validating performance and facilitating data-gathering activities for Cisco UCS C-Series server troubleshooting, and the troubleshooting approach for hardware and firmware failures
  • Define the proper procedures for configuring LAN and SAN connectivity, avoiding issues with the VIC, troubleshooting connectivity issues and Cisco UCS C-Series server integration with Cisco UCS Manager
  • Identify the tools, protocols, and methods to effectively troubleshoot Cisco ACI

outline
  • Describing the Troubleshooting Process
  • Understanding CLI Troubleshooting Tools
  • Troubleshooting VLANs and PVLANs
  • Troubleshooting Port Channels and Virtual Port Channels
  • Troubleshooting Cisco Overlay Transport Virtualization (OTV)
  • Troubleshooting Virtual Extensible LAN (VXLAN)
  • Troubleshooting Routing and High-Availability Protocols
  • Troubleshoot Data Center LAN Security
  • Troubleshooting Platform-Specific Issues
  • Troubleshooting Fibre Channel Interfaces
  • Troubleshooting Fibre Channel Fabric Services
  • Troubleshooting NPV Mode
  • Troubleshooting FCoE
  • Troubleshooting Cisco UCS Architecture and Initialization
  • Troubleshooting Cisco UCS Configuration
  • Troubleshooting Cisco UCS B-Series Servers
  • Troubleshooting Cisco UCS B-Series LAN and SAN Connectivity
  • Troubleshooting Cisco UCS C-Series Servers
  • Troubleshooting Cisco UCS C-Series LAN and SAN Connectivity
  • Troubleshooting Cisco UCS C-Series and Cisco UCS Manager Integration
  • Exploring the Tools and Methodologies for Troubleshooting Cisco ACI
  • Troubleshoot Automation and Scripting Tools
  • Troubleshooting Programmability

Lab outline

  • Document the Network Baseline
  • Troubleshoot Rapid PVST+
  • Troubleshoot Link Aggregation Control Protocol (LACP)
  • Troubleshoot vPC
  • Troubleshoot OTV
  • Troubleshoot VXLAN
  • Troubleshoot OSPF
  • Troubleshoot FHRP
  • Troubleshoot Cisco Fabric Services
  • Troubleshoot VRF
  • Troubleshoot Cisco FEX
  • Troubleshoot Fibre Channel Interfaces
  • Troubleshoot Fibre Channel VSANs, Zones, and Domain Services
  • Troubleshoot NPV Mode
  • Troubleshoot FCoE
  • Troubleshoot DCB
  • Troubleshoot Cisco UCS Management and Service Profile Deployment
  • Troubleshoot Cisco UCS C-Series Server LAN Connectivity
  • Troubleshoot Cisco UCS C-Series Server Boot from the Fibre Channel LUN
  • Troubleshoot Cisco UCS C-Series Server Management Connectivity
  • Troubleshoot Cisco ACI Integration with VMware vCenter
  • Troubleshoot Contracts in Cisco ACI
  • Troubleshoot Cisco ACI External Layer 3 Connectivity
  • Troubleshoot Cisco ACI External Layer 2 Connectivity

target_au
  • Network designers
  • Network administrators
  • Network engineers
  • System engineers
  • Data center engineers
  • Consulting systems engineers
  • Technical solutions architects
  • Server administrators
  • Network managers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Configure, secure, and maintain LAN and SAN based on Cisco Nexus and MDS switches
  • Configure, secure, and maintain Cisco Unified Computing System
  • Configure, secure, and maintain Cisco ACI

 

The following Cisco courses may help you meet these prerequisites:

  • Implementing and Administering Cisco Networking Technologies (CCNA®)
  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Introducing Cisco NX-OS Switches and Fabrics in the Data Center (DCINX)
  • Configuring Cisco NX-OS Switches and Fabrics in the Data Center (DCCNX)
  • Introducing Cisco Unified Computing System (DCIUCS)
  • Configuring Cisco Unified Computing System (DCCUCS)

titleDCACIA 1.1 – Implementing Cisco Application Centric Infrastructure – Advanced
days5
seo_titleDCACIA - Implementing Cisco Application Centric Infrastructure - Advanced Course Training
seo_dec
seo_tkey
categorydata-center
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Application Centric Infrastructure–Advanced (DCACIA) v1.1 course shows you how to integrate the capabilities of the Cisco® Nexus® 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI®) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode providing enhanced management and policy framework, along with the protocols used in the underlying fabric. The course also covers how to use Cisco ACI as a policy-driven solution that integrates software and hardware, and how to implement Cisco ACI Multi-Pod and Nexus Dashboard Orchestrator (NDO) deployments. You will gain hands-on practice implementing advanced ACI capabilities such as Rogue Endpoint Feature, Transit Routing, VRF Route Leaking, Contracts and Zoning Rules, Policy Based Redirect to Layer 4–7 Service Node, Multi-Pod Fabric and Cisco ACI® Nexus Dashboard Orchestrator.
objective

After taking this course, you should be able to:

  • Explain Cisco ACI advanced fabric packet forwarding
  • Explain advanced ACI policy and tenant configuration
  • Demonstrate Cisco ACI Multi-Pod deployment
  • Explain the details and consideration of implementing and integrating traditional network with Cisco ACI
  • Describe Cisco ACI Service Graph Policy-Based Redirect (PBR)
  • Describe Cisco ACI Nexus Dashboard Orchestrator deployment

outline

Cisco ACI Advanced Packet Forwarding

  • Packet Forwarding Between Leaf Switches
  • Endpoint Learning

 

Using Advanced Cisco ACI Policy and Tenant Configuration

  • Layer 3 Outside Transit Routing
  • Using Tenant Common for Shared Services

 

Implementing Traditional Network in Cisco ACI

  • Integrating Switched Network with Cisco ACI
  • Migrating Existing Switched Network to Cisco ACI

 

Cisco ACI Service Graph PBR

  • Service Graph PBR Overview
  • PBR End-to-End Packet Flow

 

Cisco ACI Multi-Pod Deployment

  • Cisco ACI Multi-Pod Overview
  • Inter-Pod Network Overview

 

Cisco Nexus Dashboard Deployment

  • Cisco Nexus Dashboard Overview
  • Cisco Nexus Dashboard Orchestrator

 

Lab Outline

  • Examine Local and Remote Endpoint Learning
  • Verify Bounce Entries
  • Validate IP Learning
  • Mitigate IP and MAC Flapping with the Rogue Endpoint Feature
  • Enable Transit Routing
  • Implement VRF Route Leaking
  • Configure VRF Route Leaking with L3Out
  • Examine Contracts and Zoning Rules
  • Configure Policy-Based Redirect to Layer 4–7 Service Node
  • Deploy Multi-Pod Fabric
  • Provision Policies with Cisco ACI Nexus Dashboard Orchestrator

target_au
  • Network designers
  • Network administrators
  • Network engineers
  • Systems engineers
  • Data center engineers
  • Consulting systems engineers
  • Technical solutions architects
  • Field engineers
  • Server administrators
  • Network managers
  • Storage administrators
  • Cisco integrators and partners
  • Program managers
  • Project managers

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Basic understanding of Cisco ACI
  • Understanding of Cisco data center architecture
  • Familiarity with virtualization fundamentals

 

These are the recommended Cisco offerings that may help you meet these prerequisites:

  • Implementing Cisco Application Centric Infrastructure (DCACI) v1.1
  • Implementing and Administering Cisco Solutions (CCNA®) v1.0
  • Understanding Cisco Data Center Foundations (DCFNDU) v1.0

titleVMware Horizon 8: Deploy and Manage (V8.0)
days5
seo_titleVH8DM - VMware Horizon 8: Deploy and Manage (V8.0) Training
seo_dec
seo_tkey
categorydesktop-mobility
vendorVMware

techonogyWireless
overviewVMware Horizon 8: Deploy and Manage is a five days course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
objective

Upon completing this course, the learner will be able to meet these objectives:

  • Recognize the features and benefits of Horizon
  • Use VMware vSphere® to create VMs to be used as desktops for Horizon
  • Create and optimize Windows VMs to create Horizon desktops
  • Install and configure Horizon Agent on Horizon desktop
  • Configure and manage the VMware Horizon® Client™ systems and connect the client to a VMware Horizon desktop
  • Configure, manage, and entitle desktop pools of full VMs
  • Configure, manage, and entitle pools of instant-clone desktops
  • Create and use Remote Desktop Services (RDS) desktops and application pools
  • Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool
  • Identify Horizon Connection Server installation, architecture, and requirements.
  • Describe the authentication and certification options for a Horizon environment
  • Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8
  • Discuss performance and scalability options available in Horizon 8
  • Describe different security options for the Horizon environment

outline

Module 1: Course Introduction

  • Introductions and course logistics
  • Course objectives

Module 2: Introduction to VMware Horizon

  • Recognize the features and benefits of Horizon
  • Describe the conceptual and logical architecture of Horizon

Module 3: Introduction to Use Case

  • Define a use case for your virtual desktop and application infrastructure
  • Convert customer requirements to use-case attributes

Module 4: vSphere for Horizon 8

  • Explain basic virtualization concepts
  • Use VMware vSphere® Client™ to access your vCenter Server system and VMware ESXi™ hosts
  • Create, provision, and remove a virtual machine

Module 5: VMware Horizon Desktops

  • Create a Windows and a Linux virtual machine using vSphere
  • Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs

Module 6: VMware Horizon Agents

  • Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines
  • Create a gold master for Windows Horizon desktops

Module 7: VMware Horizon Pools

  • Identify the steps to set up a template for desktop pool deployment
  • List the steps to add desktops to the VMware Horizon® Connection Server™ inventory
  • Compare dedicated-assignment and floating-assignment pools
  • Outline the steps to create an automated pool
  • Define user entitlement
  • Explain the hierarchy of global, pool-level, and user-level policies

Module 8: VMware Horizon Client Options

  • Describe the different clients and their benefits
  • Access Horizon desktop using various Horizon clients and HTML
  • Configure integrated printing, USB redirection, and the shared folders option
  • Configure session collaboration and media optimization for Microsoft Teams

Module 9: Creating and Managing Instant-Clone Desktop Pools

  • List the advantages of instant clones
  • Explain the provisioning technology used for instant clone desktop pools
  • Set up an automated pool of instant clones
  • Push updated images to instant clone desktop pools

Module 10: Creating RDS Desktop and Application Pools

  • Explain the difference between an RDS desktop pool and an automated pool
  • Compare and contrast an RDS session host pool, a farm, and an application pool
  • Create an RDS desktop pool and an application pool
  • Access RDS desktops and application from Horizon Client
  • Use the instant clone technology to automate the build-out of RDSH farms
  • Configure load-balancing for RDSHs on a farm

Module 11: Monitoring VMware Horizon

  • Monitor the status of the Horizon components using the Horizon Administrator console dashboard
  • Monitor desktop sessions using the HelpDesk tool

Module 12: Course Introduction

  • Introductions and course logistics
  • Course objectives

Module 13 : Horizon Connection Server

  • Recognize VMware Horizon reference architecture
  • Identify the Horizon Connection Server supported features
  • Identify the recommended system requirements for Horizon Connection Server
  • Configure the Horizon event database
  • Outline the steps for the initial configuration of Horizon Connection Server
  • Discuss the ADAM database as a critical component of Horizon Connection Server installation

Module 14: VMware Horizon Authentication and Certificates

  • Compare the authentication options that Horizon Connection Server supports
  • Describe the Smartcard authentication options that Horizon Connection Server supports
  • Outline the steps to create a Horizon administrator and custom roles
  • Describe the roles available in a Horizon environment
  • Explain the role that certificates play for Horizon Connection Server
  • Install and configure certificates for Horizon Connection Server
  • Install and configure True SSO in a Horizon environment

Module 15: Workspace ONE Access & Virtual Application Management

  • Recognize the features and benefits of Workspace ONE Access
  • Recognize the Workspace ONE Access console features
  • Explain identity management in Workspace ONE Access
  • Explain access management in Workspace ONE Access
  • Describe the Workspace ONE Access directory integration
  • Describe the Workspace ONE Access directory integration
  • Deploy virtual applications with Workspace services

Module 16: VMware Horizon Performance and Scalability

  • Describe the purpose of a replica connection server
  • Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
  • Describe the 3D rendering options available in Horizon 8
  • List the steps to configure graphics cards for use in a Horizon environment
  • Configure a load balancer for use in a Horizon environment
  • Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
  • Explain Horizon Cloud Pod Architecture scalability options

Module 17: Managing VMware Horizon Security

  • Explain concepts relevant to secure Horizon connections
  • Describe how to restrict Horizon connections.
  • Discuss the benefits of using Unified Access Gateway
  • List the two-factor authentication options that are supported by Unified Access Gateway
  • List Unified Access Gateway firewall rules
  • Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces

target_au

The primary audience for this course is as follows:

  • Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization’s end-user computing infrastructure.

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Use VMware vSphere® Web Client to view the state of virtual machines, datastores, and networks
  • Open a virtual machine console on VMware vCenter Server® and access the guest operating system
  • Create snapshots of virtual machines
  • Configure guest customization specifications
  • Modify virtual machine properties
  • Convert a virtual machine into a template
  • Deploy a virtual machine from a template

Attendees should also have the following Microsoft Windows system administration experience:

  • Configure Active Directory services, including DNS, DHCP, and time synchronization
  • Restrict user activities by implementing Group Policy objects
  • Configure Windows systems to enable Remote Desktop Connections
  • Build an ODBC connection to an SQL Server database

titleBuilding Web Applications with React and Redux (REACT)
days4
seo_titleBuilding Web Applications with React and Redux (REACT) Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewReact is an open-source JavaScript library from Facebook used for building HTML5 web applications. In this training course, you learn how to develop a complete application by building high-performance User Interfaces (UIs) with JSX components targeting a virtual DOM, and creating Flux applications, which provide complementary architectural patterns to construct client-side application functionality.
objective
  • Create an isomorphic web application using Facebook React and Flux
  • Compose a UI using React JavaScript and JSX components
  • Integrate React forms with Ajax and back-end REST services
  • Apply the Flux application pattern (dispatcher, stores, and actions)
  • Exploit React animation components with CSS3 transitions

outline

Introduction and Overview

  • Features of React and Flux
  • Benefits of the virtual DOM
  • Configuring the development and build environment

Designing Custom React Components

Displaying React content

  • Employing React.createElement() and React.DOM.* factories
  • Rendering the application with ReactDOM.render()
  • Constructing the UI on the server with renderToString()

Leveraging JSX for UI design

  • Coding custom components with React.createClass()
  • Generating component output with the render method
  • Composing a JSX component hierarchy
  • Incorporating third-party components

Activating React Components

Parameterising components

  • Disambiguating component properties and state
  • Inserting properties into rendered output with this.props
  • Passing property values using JSX { } expressions
  • Initialising default values with getDefaultProps()

Manipulating component state

  • Setting starting state values with getInitialState()
  • Reading application data with this.state
  • Mutating data with this.setState()
  • Harnessing React autobinding and event aggregation

Integrating into the component life cycle

  • Attaching and detaching logic and event handlers in componentDidMount and componentWillUnmount
  • Enhancing performance with componentShouldUpdate
  • Responding to changes with componentWillReceiveProps

Developing React Forms

Manipulating form input components

  • Working with interactive properties
  • value
  • defaultValue
  • checked
  • selected
  • Capturing form component updates with onChange
  • Comparing controlled and uncontrolled components

Simulating two-way binding

  • Applying the onChange / setState() convention
  • Employing the LinkedStateMixin
  • Passing ReactLink objects through the props hierarchy

Connecting React to REST services

  • Making Ajax calls from React
  • Mapping CRUD access to REST actions
  • GET
  • POST
  • PUT
  • DELETE

Creating Flux Applications

Modelling client-side data interactivity

  • Identifying Flux participants
  • Actions
  • Dispatcher
  • Stores
  • Views
  • Harnessing unidirectional data flow
  • Comparing Flux to Model View Controller, Redux and Relay

Coding a Flux application

  • Extending the Facebook Dispatcher
  • Utilising Node.js EventEmitter with custom stores
  • Integrating REST access with Flux action creators

Integrating routing into Flux

  • Exploiting the react-router for semantic URLs
  • Mapping URL paths and parameters to components

Analysing React Applications

Developer tools

  • Inspecting React components with browser extensions
  • Identifying and debugging rendering errors

Unit testing

  • Running tests with Jest
  • Simulating event dispatch with ReactTestUtils.Simulate

Performance testing

  • Establishing a baseline
  • Profiling React execution with Perf.start() and stop()
  • Optimising component reconciliation with key

Animating React Applications

  • Including the react-css-transition-group add-on
  • Employing the ReactCS component
  • Writing CSS transitions and animations

target_au
pre_req

Experience developing web pages with JavaScript, HTML, and CSS at the level of:

  • JavaScript for Modern Web Development

titlePython Programming 2 (PYP2)
days3
seo_titlePython Programming 2 Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewThe Python Programming 2 course comprises sessions dealing with advanced object orientation, iterators and generators, comprehensions, decorators, multithreading, functional programming, web services, and unit testing. The delegate will learn how to exploit advanced features of the Python language to build complex and efficient applications. Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
objective

This course aims to provide the delegate with the knowledge to be able to interpret, write, and troubleshoot complex Python applications exploiting inheritance and polymorphism, mixins, composition and aggregation, iterators, generators, decorators, comprehension, concurrency, functional programming, and RESTful web services.

The delegate will learn and acquire skills as follows:

  • Encapsulating classes
  • Exploiting polymorphism using inheritance and mixins
  • Associating objects via composition and aggregation
  • Working with static members
  • Using iterators as an alternative to for
  • Constructing custom iterators
  • Constructing functions that yield generators
  • Manipulating lists, sets, and dictionaries using comprehension
  • Exploiting aspect oriented programming using decorators
  • Writing multithreaded code
  • Sharing data between threads
  • Processing collections using lambdas
  • Building RESTful clients
  • Building RESTful APIs
  • Testing units of code

outline

Day 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: ADVANCED OBJECT ORIENTATION

  • The self Keyword
  • Constructors and Destructors
  • Encapsulation
  • Inheritance
  • Polymorphism
  • Abstract Classes
  • Multiple Inheritance and Mixins
  • Composition and Aggregation
  • Static Members

Session 2: ITERATORS & GENERATORS

  • Iterables
  • Iterators
  • Custom Iterators
  • Generators
  • Yield vs. Return

Session 3: COMPREHENSIONS

  • List Comprehension
  • Set Comprehension
  • The zip Function
  • Dictionary Comprehension

Day 2

Session 4: FUNCTIONAL PROGRAMMING

  • Functional Programming
  • Lambdas
  • Immutability
  • Mapping
  • Filtering
  • Reducing

Session 5: DECORATORS

  • Decorators
  • Decorator Functions
  • Decorator Annotations
  • Decorator Use Cases
  • Labs

Session 6: MULTITHREADING

  • Threads
  • Multithreading
  • Thread Construction
  • Thread Execution
  • Thread Sleep
  • Joins
  • Data Sharing
  • Synchronisation
  • Multithreading vs. Multiprocessing

Day 3

Session 7: WEB SERVICES

  • RESTful Web Services
  • JSON Data
  • CRUD and HTTP
  • RESTful Clients
  • RESTful APIs

Session 8: UNIT TESTING

  • Unit Testing Terminology
  • Test Classes
  • Test Fixtures
  • Test Cases
  • Assertions
  • Test Runners

target_au

The Python Programming 2 course is designed for existing Python developers who have a good grounding in the basics and want to exploit some of the advanced features of the language.

For the delegate for whom Python is their first programming language, we recommend taking the Python Programming 1 (PYP1) course first, then taking some time to practice the skills gained, before returning to take the Python Programming 2 course.


pre_req

Students should be able to build Python applications that exploit all fundamental elements of the language including variables and expressions, conditions and loops, functions, objects, and lists.

This knowledge can be gained by attendance on the pre-requisite Python Programming 1 (PYP1) course.


titlePython Programming 1 (PYP1)
days4
seo_titlePython Programming 1 Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewPython is an object oriented rapid development language deployed in many scenarios in the modern world. This Python Programming 1 course is designed to give delegates the knowledge to develop and maintain Python scripts using the current version (V3) of Python. There are many similarities between Python V2 and Python V3. The skills gained on this course will allow the delegate to develop their own skills further using Python V2 or V3 to support the development and maintenance of scripts. The Python Programming 1 course comprises sessions dealing with syntax, variables and data types, operators and expressions, conditions and loops, functions, objects, collections, modules and packages, strings, pattern matching, dates, exception handling, files, and databases. Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
objective

This course aims to provide the delegate with the knowledge to be able to produce Python scripts and applications that exploit all core elements of the language including variables, expressions, selection and iteration, functions, objects, collections, strings, modules, pattern matching, exception handling, I/O, and classes.

The delegate will learn and acquire skills as follows:

  • Writing and testing simple scripts
  • Representing data using built-in and custom data types
  • Building expressions
  • Building conditional and iterative statements
  • Declaring and calling functions
  • Using objects
  • Creating and manipulating collections including lists, tuples, and dictionaries
  • Creating and manipulating strings
  • Creating modules and packages, and using third-party libraries
  • Pattern matching
  • Working with date and time objects
  • Handling exceptions
  • Reading from and writing to files and databases
  • Coding in an OOP manner

outline

Day 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: GETTING STARTED

  • About Python
  • Python versions
  • Python documentation
  • Python runtimes
  • Installing Python
  • The REPL shell
  • Python editors

Session 2: PYTHON SCRIPTS & SYNTAX

  • Script naming
  • Comments
  • Docstring
  • Statements
  • The backslash
  • Code blocks
  • Whitespace
  • Console IO (to enable the writing of simple programs)
  • A first Python program
  • Script execution

Session 3: VARIABLES & DATA TYPES

  • Literals
  • Identifiers
  • Assignment
  • Numbers (bool, int, float, complex)
  • Binary, octal, and hexadecimal numbers
  • Collections (str, list, tuple, set, dict)
  • None
  • Implicit and explicit type conversion (casting)
  • The type function

Session 4: OPERATORS & EXPRESSIONS

  • Arithmetic Operators
  • Assignment Operators
  • Comparison Operators
  • Logical Operators
  • Membership Operators
  • Bitwise Operators
  • Identity Operators

Session 5: CONDITIONS & LOOPS

  • Conditional statements (if, elif, else)
  • Short hand if/if else
  • Python’s alternative to the ternary operator
  • Iterative statements (while, for, else)
  • The range function
  • Iterating over a list
  • Break
  • Continue
  • Nested conditional/iterative statements

Day 2

Session 6: FUNCTIONS

  • Declaration
  • Invocation
  • Default values for parameters
  • Named arguments
  • args and kwargs
  • Returning multiple values
  • Nested functions
  • Functions as data
  • Introduction to lambda expressions
  • Variable scope
  • The pass keyword

Session 7: OBJECTS AND CLASSES

  • About objects
  • Attributes and the dot notation
  • The dir function
  • Dunder attributes
  • Mutability
  • The id function
  • Pass by reference
  • Introduction to Classes
  • Class Declaration and Instantiation
  • Data attributes
  • Methods
  • Composition

Session 8: LISTS

  • About lists
  • List syntax including slicing
  • Getting and setting list elements
  • Iterating over a list
  • Checking for the presence of a value
  • The len function
  • List methods incl. append, insert, remove, pop, clear, copy, sort, reverse etc.
  • The del keyword
  • Appending to and combining lists
  • List comprehension

Session 9: TUPLES

  • About tuples
  • Tuple syntax
  • Getting tuple elements including unpacking
  • Iterating over a tuple
  • Checking for the presence of a value
  • The len function
  • Appending to and combining tuples

Session 10: SETS

  • About Sets
  • Dictionary syntax
  • Creating, adding and removing set elements
  • Iterating over a set
  • Membership Testing
  • Sorting
  • Copying
  • Set methods incl. union, intersection, difference, symmetric_difference etc.

Day 3

Session 11: DICTIONARIES

  • About dictionaries
  • Dictionary syntax
  • Getting and setting dictionary elements
  • Iterating over a dictionary (keys, values, and items)
  • Checking for the presence of a key
  • The len function
  • Dictionary methods incl. keys, values, items, get, pop, popitem, clear etc.
  • The del keyword
  • Dictionary comprehension

Session 12: STRINGS

  • About strings
  • String syntax including slicing
  • Escape characters
  • Triple-quoted strings
  • Concatenation
  • Placeholders
  • The format method
  • Other methods e.g. endswith, find, join, lower, replace, split, startswith, strip, upper etc.
  • A string as a list of bytes

Session 13: MODULES & PACKAGES

  • About modules
  • The module search path
  • Importing modules
  • Namespaces
  • Importing module objects
  • The import wildcard
  • Aliases
  • Importing within a function
  • Executable modules
  • Reloading a module
  • About packages
  • Importing packaged modules
  • Importing packaged module objects
  • Package initialisation
  • Subpackages
  • Referencing objects in sibling packages
  • The Standard Library
  • Installing modules and packages using pip

Session 14: PATTERN MATCHING

  • About regular expressions
  • Regular expression special characters
  • Raw strings
  • About the re module
  • re module functions incl. match, search, findall, full match, split, sub

Day 4

Session 15: DATES

  • About the datetime module
  • datetime object attributes
  • Creating a datetime object
  • Date arithmetic
  • Formatting dates

Session 16: EXCEPTION HANDLING

  • About exceptions and exception handling
  • Handling exceptions (try, except, else, finally)
  • Exception types
  • The exception object
  • Raising exceptions
  • Custom exception types

Session 17: FILES & THE FILESYSTEM

  • The open function
  • Methods for seeking (seekable, seek)
  • Methods for reading from a file (readable, read, readline, readlines)
  • Iterating over a file
  • Methods for writing to a file (writable, write, writelines)
  • Introduction to context managers
  • File parsing for files of type CSV, XML, JSON, YAML
  • About the os module
  • os module functions incl. getcwd, listdir, mkdir, chdir, remove, rmdir etc.
  • Session 18: DATABASES
  • The DB-API
  • DP-API implementations
  • Establishing a connection
  • Creating a cursor
  • Executing a query
  • Fetching results
  • Transactions
  • Inserting, updating, and deleting records

target_au

The Python Programming 1 course is aimed at anyone who wants to learn Python as a first language, and developers/engineers who want to migrate to Python from another language, particularly those with little or no object-oriented knowledge.


pre_req

Students attending this course should be able to define general programming concepts including compilation and execution, variables, arrays, sequence, selection and iteration, navigate the filesystem (on the command line ideally), edit and save text files and browse the web.


titleIntroduction to Python Certification Training
days4
seo_titleIntroduction to Python Certification Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overview55284A Python instructional class, understudies provides knowledge on how to program in Python. The course is gone for understudies new to the language who could conceivably have involvement in other programming dialects. This Python course is shown utilizing Python 3; be that as it may, contrasts between Python 2 and Python 3 are noted. For private Python classes, our educator can concentrate explicitly on Python 2 whenever wanted.
objective

After completion of this course, you will learn how to :

  • Understand how Python functions and what it’s useful for
  • Understand Python’s place in the realm of programming dialects
  • Work with and control strings in Python
  • Perform math tasks with Python
  • Work with Python arrangements: records, clusters, word references, and sets
  • Collect client info and yield results
  • Perform stream control preparing in Python
  • Write to and read from records utilizing Python
  • Write works in Python
  • Handle special cases in Python
  • Work with dates and times in Python

outline

Module 1: Python Basics

  • Running Python
  • Hello, World!
  • Literals
  • Python Comments
  • Variables
  • WRiting a Python Module
  • print Function
  • Collecting User Input
  • Getting Help
  • Lab : Exercises in this Lesson
  • Hello, World
  • Exploring Types
  • A Simple Python Script

Module 2: Functions and Modules

  • Defining Functions
  • Variable Scope
  • Global Variables
  • Function Parameters
  • Returning Values
  • Importing Modules
  • Lab : Exercises in this Lesson
  • A Function with Parameters
  • Parameters with Default Values

 

Module 3: Math

  • Arithmetic Operators
  • Assignment Operators
  • Built-in Math Functions
  • The math Module
  • The randon Module
  • Lab : Exercises in this Lesson
  • Floor and Modulus
  • How Many Pizzas Do We Need

Module 4: Python Strings

  • Quotation Marks and Special Characters
  • String Indexing
  • Slicing Strings
  • Concatentaion and Repetition
  • Common String Methods
  • String Formatting
  • Formatted String Literals (f-strings)
  • Built-in String Functions
  • Lab : Exercises in this Lesson
  • Indexing Strings
  • Slicing Strings
  • Repetition
  • Playing with Formatting
  • Getting Acquainted with f-strings
  • Outputting Tab-delimited Text

Module 5: Iterables: Sequences, Dictionaries, and Sets

  • Definitions
  • Sequences
  • Unpacking Sequences
  • Dictionaries
  • The len Function
  • Sets
  • *args and **kwargs
  • Lab : Exercises in this Lesson
  • Remove and Return Random Element
  • Simple Rock, Paper, Scissors Game
  • Slicing Sequences
  • Creating a Dictionary from User Input

Module 6: Flow Control

  • Conditional Statements
  • Loops in Python
  • break and continue
  • The enumerate() Function
  • Generators
  • List Comprehensions
  • Lab : Exercises in this Lesson
  • All True and Any True
  • Word Guessing Game
  • Find the Needle
  • Rolling Dice

Module 7: Virtual Environments

  • Virtual Environmen
  • Lab : Exercises in this Lesson
  • Working with a Virtual Environment

Module 8: Regular Expressions

  • Regular Expression Syntax
  • Python’s Handling of Regular Expressions

Module 9: Unicode and Encoding

  • Bits and Bytes
  • Hexadecimal Numbers
  • Encoding
  • Lab : Exercises in this Lesson
  • Converting Numbers between Number Systems
  • Finding Confusables

Module 10: File Processing

  • Opening Files
  • The os and os.path Modules
  • Lab : Exercises in this Lesson
  • Finding Text in a File
  • Writing to FilesList CreatorAfter completing this module, students will be able to:Read files on the operating system.
  • Create and write to files on the operating system.
  • Access and work with directories on the operating system.
  • Work with the os and os.path modules.

Module 11: Handling

  • Wildcard except Clauses
  • Getting Information on Exceptions
  • The else Clause
  • The finally Clause
  • Using Exceptions for Flow Control
  • Raising your Own Exceptions
  • Exception Hierarchy
  • Lab : Excercises in this Lesson
  • Raising Exceptions
  • Running Sum

Module 12: Python Dates and Times

  • Understanding Time
  • The time Module
  • The datetime Module
  • Lab : Exercises in this Lesson
  • Report on Amtrack Departure Times

Module 13: Running Python Scripts from the Command Line

  • sys.arg
  • sys.path
  • Lab : Exercises in this Lesson
  • Migrating Settings by using Windows Easy Transfer
  • Configuring a Reference Image of Windows 7
  • Configuring a Reference Image

target_au

This course is planned for understudies who need to learn Python. Some programming experience is useful yet not required.


pre_req
  • Some programming experience is useful, yet not required.

titleBeginning Frontend Development with React
days1
seo_titleBeginning Frontend Development with React Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewThis is a 1 day course packed with the perfect balance of theory and hands-on activities that will help you get started with React. React is widely used to create fast and reusable user interface components. It has been remarkably successful in recent years, since it is easy to use and offers a coherent design model. React's ease of use depends on an actual understanding of the core concepts of the library. By exploiting these concepts, you can build a high-quality design interface. You'll find helpful tips and tricks, as well as useful self-assessment material, exercises, and activities to help benchmark your progress and reinforce what you’ve learned.
objective
  • Create components and combine them together to build other components
  • Use JSX declaratives to describe how a component should look
  • Manage a component’s internal state
  • Manage interaction events
  • Exploit component lifecycle events
  • Manage navigation between high-level components
  • Design user interfaces by making the most of React’s features

outline

Lesson 1: Introducing React and UI Design

  • What is React?
  • How to Set Up a React-Based Application
  • How to Design a UI

Lesson 2: Creating Components

  • Definition of a Component
  • Using JSX
  • Composing Components
  • Data Propagation
  • Managing the Internal State

Lesson 3: Managing User Interactivity

  • Managing User Interaction
  • Component Lifecycle Events

Managing Routing


target_au
pre_req

Hardware

For successful completion of this course, students will require computer systems with the following:

  • Processor: Pentium 4 (or equivalent)
  • 2 GB RAM
  • Hard disk space: 10 GB
  • A projecting device (for the instructor only)
  • An Internet Connection

A keyboard and mouse or other pointing device

Software

  • Operating System: Windows 10 version, 1507
  • The latest version of Node.js (https://nodejs.org/en/)
  • The latest version of Chrome or the penultimate version

titleDeploy and Manage Citrix ADC 13.x with Traffic Management (CNS 225)
days5
seo_titleDeploy and Manage Citrix ADC 13.x with Traffic Management Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCitrix

techonogyEnterprise Networking
overviewBuild your Citrix ADC knowledge and skills by enrolling in this course. It covers Citrix ADC essentials-- platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB). You will learn about key ADC capabilities such as high availability, security and performance, and explore SSL offload, load balancing and monitoring. The traffic management curriculum will cover the AppExpert policy engine, the Rewrite and Responder features, and Content Switching.
objective
  • Understand the functionalities and capabilities of Citrix ADC
  • How to obtain, install, and manage Citrix ADC licenses
  • Comprehend basic ADC network architecture
  • Understand how SSL is used to secure Citrix ADC
  • Optimize the ADC system for traffic handling and management

outline

Module 1: Getting Started

  • Introduction to Citrix ADC
  • Feature and Platform Overview
  • Deployment Options
  • Architectural Overview
  • Setup and Management

Module 2: Basic Networking

  • Networking Topology
  • Citrix ADC Components
  • Routing
  • Access Control Lists

Module 3: ADC Platforms

  • Citrix ADC MPX
  • Citrix ADC VPX
  • Citrix ADC CPX
  • Citrix ADC SDX
  • Citrix ADC BLX

Module 4: High Availability

  • Citrix ADC High Availability
  • High Availability Configuration
  • Managing High Availability
  • In Service Software Upgrade
  • Troubleshooting High Availability

Module 5: Load balancing

  • Load Balancing Overview
  • Load Balancing Methods and Monitors
  • Load Balancing Traffic Types
  • Load Balancing Protection
  • Priority Load Balancing
  • Load Balancing Troubleshooting

Module 6: SSL Offloading

  • SSL Overview
  • SSL Configuration
  • SSL Offload
  • Troubleshooting SSL Offload
  • SSL Vulnerabilities and Protections

Module 7: Security

  • Authentication, Authorization, and Auditing
  • Configuring External Authentication
  • Admin Partitions

Module 8: Security

  • Citrix ADC Logging
  • Monitoring with SNMP
  • Reporting and Diagnostics
  • AppFlow Functions
  • Citrix Application Delivery Management
  • Troubleshooting

Module 9: Advanced Policies

  • Default Policy Overview
  • Default Expression Syntax
  • Policy Bindings
  • AppExpert Additional Features

Module 10: Rewrite Responder URL Transformation

  • Rewrite Policies
  • Responder Policies
  • DNS Rewrite and Responder
  • URL Transformation

Module 11: Content Switching

  • Content Switching Overview
  • Content Switching Configuration

Module 12: Optimization

  • Citrix ADC Optimization Overview
  • HTTP Compression
  • Integrated Caching
  • Front-End Optimization

Module 13: Global Server Load Balancing

  • GSLB Overview
  • GSLB Architecture
  • Content-Switching GSLB
  • GSLB MEP and Monitoring
  • Customizing GSLB

target_au

Built for IT Professionals working with Citrix ADC, with little to no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to implement and manage Citrix ADC features using leading practices.


pre_req

This course requires little to no previous experience with Citrix ADC; however, Citrix recommends a basic understanding of of TCP/IP, HTTP, and of the OSI model, network devices, and networking protocols.


titleVMware Horizon 8: Infrastructure Administration [V8.0]
days2
seo_titleVMware Horizon 8: Infrastructure Administration Training
seo_dec
seo_tkey
categorydesktop-mobility
vendorVMware

techonogyWireless
overviewThis two days, hands-on course gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon® through a combination of lecture and hands-on labs. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Identify Horizon Connection Server installation, architecture, and requirements.
  • Describe the authentication and certification options for a Horizon environment.
  • Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8.
  • Discuss performance and scalability options available in Horizon 8.
  • Describe different security options for the Horizon environment.

outline

Module 1: Course Introduction

  • Introductions and course logistics
  • Course objectives

 

Module 2: Horizon Connection Server

  • Recognize VMware Horizon reference architecture
  • Identify the Horizon Connection Server supported features
  • Identify the recommended system requirements for Horizon Connection Server
  • Configure Horizon event database
  • Outline the steps for the initial configuration of Horizon Connection Server
  • Discuss the ADAM database as a critical component of Horizon Connection Server installation

 

Module 3: VMware Horizon Authentication and Certificates

  • Compare the authentication options that Horizon Connection Server supports
  • Describe the Smartcard authentication options that Horizon Connection Server supports
  • Outline the steps to create a Horizon administrator and custom roles
  • Describe the roles available in a Horizon environment
  • Explain the role that certificates play for Horizon Connection Server
  • Install and configure certificates for Horizon Connection Server
  • Install and configure True SSO in a Horizon environment

 

Module 4: Workspace ONE Access & Virtual Application Management

  • Recognize the features and benefits of Workspace ONE Access
  • Recognize the Workspace ONE Access console features
  • Explain identity management in Workspace ONE Access
  • Explain access management in Workspace ONE Access
  • Describe the Workspace ONE Access directory integration
  • Describe the Workspace ONE Access directory integration
  • Deploy virtual applications with Workspace services

 

Module 5: VMware Horizon Performance and Scalability

  • Describe the purpose of a replica connection server
  • Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
  • Describe the 3D rendering options available in Horizon 8
  • List the steps to configure graphics cards for use in a Horizon environment
  • Configure a load balancer for use in a Horizon environment
  • Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
  • Explain Horizon Cloud Pod Architecture scalability options

 

Module 6: Managing VMware Horizon Security

  • Explain concepts relevant to secure Horizon connections
  • Describe how to restrict Horizon connections.
  • Discuss the benefits of using Unified Access Gateway
  • List the two-factor authentication options that are supported by Unified Access Gateway
  • List Unified Access Gateway firewall rules
  • Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces

target_au

The primary audience for this course is as follows:

  • Administrators and architects for VMware Horizon should enroll in this course. These individuals are responsible for the implementation, maintenance, and administration of an organization’s end-user computing infrastructure.

pre_req

For attending this course you should have these VMware infrastructure skills:

  • Use VMware vSphere® Web Client to view the state of virtual machines, datastores, and networks.
  • Open a virtual machine console on VMware vCenter Server® and access the guest operating system.
  • Create snapshots of virtual machines.
  • Configure guest customization specifications.
  • Modify virtual machine properties.
  • Convert a virtual machine into a template.
  • Deploy a virtual machine from a template.

 

Students should also have the following Microsoft Windows system administration experience:

  • Configure Active Directory services, including DNS, DHCP, and time synchronization.
  • Restrict user activities by implementing Group Policy objects.
  • Configure Windows systems to enable Remote Desktop Connections.
  • Build an ODBC connection to an SQL Server database.

titleNetwork Automation with Python and Ansible
days5
seo_titlePython NETPYA: Network Automation with Python and Ansible Course Training
seo_dec
seo_tkey
categorynetworking
vendorVendor Neutral

techonogyEnterprise Networking
overviewThis course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day’s topics and demonstrations. Class is appropriate for those interested in automation, specifically network automation, and those looking to marry a Python and Ansible skillset.
objective
outline

Critical Python Catch Up & Review

  • Overview of Python and Ansible
  • Python whitespace rules & best practices
  • Conditional expressions
  • Relational and Boolean operators
  • Lists, Tuples, Dictionaries
  • Indexing and slicing
  • Built-in functions
  • Writing custom functions
  • Getting at methods
  • Iterating with Loops (for and while)
  • Working with files
  • Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.)
  • Getting at RESTful interfaces with Python
  • Working with JSON
  • Python, Ansible and Paramiko
  • Using Paramiko to SSH with keys and passwords

 

Python and Network Automation

  • RESTful API review
  • API keys
  • Paramiko Review
  • Using Paramiko to SFTP with keys and passwords
  • Introduction to Netmiko (automating routers and switches)
  • Using Netmiko to send commands to / from network devices
  • Working with YAML
  • Converting JSON to YAML with Python

 

Critical Ansible Catchup & Review

  • Ansible keywords
  • YAML and JSON for data exchange
  • Ansible and YAML
  • Ansible Playbook components
  • Tying together Python and Ansible – Using Python within Ansible
  • Ansible Network Modules
  • What is new in Ansible (most current updates / release notes)
  • Network Agnostic modules
  • Writing network playbooks
  • Reviewing the construction of network playbooks
  • Writing Ansible playbooks that respond to network failures

 

Blending Python and Ansible Skillsets

  • Review how to use Python within Ansible
  • Calling Python scripts with Ansible
  • Jinja2 Templating Engine for Python (and Ansible)
  • Using Templates in Ansible playbooks
  • Jinja2 filters, looping, and other useful tricks for automating with Ansible
  • Playbook tagging for selective runs
  • When to use Python and when to use Ansible
  • “Big Picture” options for using Python & Ansible within your Network
  • Ansible Roles

 

Customizing Ansible with Python

  • Review – Running Scripts with Ansible
  • Prompting for Ansible user input
  • Ansible Galaxy & Getting at Roles
  • Writing a custom Ansible Module with Python
  • Ansible “Engine” vs Ansible “Tower” – marketing hype, capabilities, costs, etc.
  • Case Study: Automate your Enterprise Network
  • When to use Python and when to use Ansible
  • Writing your own Ansible modules in Python
  • “Big Picture” options for using Python & Ansible within your Network
  • Overview – NETCONF / YANG and what they mean for Python and Ansible
  • Molecule – Testing your roles

 

Lab Outline

  • 1. Using vim
  • 2. Using & Installing Python
  • 3. Making a Github account
  • 4. Data within mixed lists
  • 5. Understanding More about Lists
  • 6. Python Dictionaries
  • 7. Getting dir(obj) help() and pydoc
  • 8. Copying Files and Folders
  • 9. Moving and Renaming Files and Folders
  • 10. IPv4 Testing with if
  • 11. Paramiko – SSH with RSA Keys
  • 12. Paramiko – SFTP with UN and PW
  • 13. Space APIs the Final Frontier
  • 14. More APIs – Final Frontier is Vast
  • 15. Interaction with APIs – NASA 01
  • 16. Interaction with APIs – NASA 02
  • 17. Install GNS3
  • 18. Setup for GNS networking
  • 19. Configure the Switches
  • 20. Running Netmiko
  • 21. Running your first Playbook
  • 22. Debug Module
  • 23. Playbook Prompts
  • 24. register and when
  • 25. EOS Get Config and Archive
  • 26. Agnostic Network Modules
  • 27. Network Playbook Error Handling
  • 28. Network Playbook Precheck
  • 29. Network Playbooks with Roles and Rollbacks
  • 30. Securing Playbooks with Vault
  • 31. Network Playbooks, Set Fact, and Fail
  • 32. Debug, Loops, and YAML Lists
  • 33. Running a script with Ansible
  • 34. Jinja Filters
  • 35. Ansible, Python Methods, and Jinja Filters
  • 36. Ansible and APIs
  • 37. Python and Ansible
  • 38. Writing an Ansible Module with Python
  • 39. AWX Tower
  • 40. Molecule – Testing Roles

target_au
  • Network Administrators
  • Administrators interested in Automation
  • Individuals interested in devops, specifically for networking

pre_req
titleCLCNF v1.0 – Implementing Cisco Collaboration Conferencing
days5
seo_titleCLCNF - Implementing Cisco Collaboration Conferencing Course Training
seo_dec
seo_tkey
categoryunified-communications
vendorCisco

techonogyCollaboration
overviewThe Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco® on-premises conferencing architecture and solutions. You will get knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.
objective

This class will help you:

  • Learn how to configure and troubleshoot on-premises conferencing solutions with Cisco Meeting Server.
  • Integrate on-premises conferencing solutions with other collaboration components to meet the needs of modern-day workplaces.

After taking this course, you should be able to:

  • Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing
  • Describe the physical deployment options and deployment models for Cisco Meeting Server, including Cisco Meeting Server 1000, 2000, and virtual machine
  • Configure a Cisco Meeting Server single combined deployment for Web-Real Time Communications (WebRTC) endpoints within the enterprise
  • Use APIs and the Cisco Meeting Server API Guide to configure profiles using Postman and the Webadmin API tool
  • Configure a scalable and resilient deployment of Cisco Meeting Server with three servers for WebRTC endpoints within the enterprise
  • Configure a scalable and resilient deployment of Cisco Meeting Server to support standard Session Initiation Protocol (SIP) and WebRTC connectivity outside the enterprise
  • Configure a scalable and resilient deployment of Cisco Meeting Server to support recording and streaming of conferences
  • Configure Cisco Unified Communications Manager and Cisco Meeting Server to support Rendezvous, Scheduled, and Ad-hoc conferencing for Cisco Unified CM registered endpoints
  • Configure Cisco Meeting Server to integrate with a preconfigured on-premise Microsoft Skype for Business installation
  • Install Cisco TelePresence Management Suite (Cisco TMS) and Cisco TelePresence Management Suite for Microsoft Exchange (Cisco TMSXE) on a single Microsoft Windows 2012 server and connect to an existing SQL environment
  • Install and integrate Cisco Meeting Management with Cisco TMS and Cisco Meeting Server
  • Set up and manage a scheduled conference with Cisco TMS and Cisco Meeting Management
  • Capture and analyze logs from Cisco Meeting Server and Cisco Meeting Manager to diagnose faults, including a SIP connection error

outline
  • Describing Cisco Conferencing Architecture
  • Configuring a Single Combined Deployment
  • Installing Cisco Meeting Server
  • Using APIs with Cisco Meeting Server
  • Configuring a Cisco Meeting Server Scalable and Resilient Deployment
  • Configuring Business to Business (B2B) and WebRTC Firewall Traversal Connectivity for Cisco Meeting Server
  • Configuring Recording and Streaming with Cisco Meeting Server
  • Troubleshooting Cisco Meeting Server
  • Integrating Cisco Meeting Server with Cisco Unified CM
  • Integrating Cisco Meeting Server with Microsoft Skype for Business
  • Installing and Operating Cisco TMS and Cisco TMSXE
  • Installing and Integrating Cisco Meeting Management

Lab Practice

  • Cisco Meeting Server Initial Configuration
  • Cisco Meeting Server Single Combined Deployment
  • Install a Cisco Meeting Server Virtual Machine
  • Using Postman with Cisco Meeting Server
  • Using Cisco Meeting Server Webadmin API Tool
  • Cluster Cisco Meeting Server Databases
  • Cluster Cisco Meeting Server Call Bridges
  • Configure Cisco Meeting Server Distributed Spaces and Active Directory
  • Configure Cisco Meeting Server Scalable and Resilient Web Bridges
  • Configure External WebRTC Connectivity for Cisco Meeting Server
  • Configure External B2B Connectivity for Cisco Meeting Server
  • Configure Cisco Meeting Server Recording
  • Capturing Log Files in Cisco Meeting Server
  • Troubleshoot Cisco Meeting Server
  • Configure Cisco Meeting Server Integration with Cisco Unified CM Using a SIP Trunk
  • Configure Cisco Meeting Server Integration with Cisco Unified CM as a Conference Resource
  • Install, Upgrade, and Maintain Cisco TMS and TMSXE
  • Configure Cisco TMS for Scheduled Conferences
  • Manage Endpoints in Cisco TMS Part 1
  • Manage Endpoints in Cisco TMS Part 2
  • Cisco Meeting Management Initial Installation
  • Integrate Cisco Meeting Management
  • Manage Conferences in Cisco TMS and Cisco Meeting Management
  • Specific Lab Issues

target_au
  • Deployment engineer
  • Network engineer
  • Sales engineer

pre_req

o fully benefit from this course, you should have the following knowledge:

  • PC skills
  • Addition and management of devices and users in Cisco Unified CM
  • SIP signaling fundamentals
  • Video endpoint operation and configuration
  • Management of media resources in Cisco Unified CM
  • Familiarity with Cisco Expressway ideal but not required
  • Familiarity with APIs ideal but not required

Recommended Cisco offerings that may help you meet these prerequisites:

  • Cisco Collaboration Fundamentals (CLFNDU)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)

titleVMware vSphere: Install, Configure, Manage [V7]
days5
seo_titleVSICM70 - VMware vSphere: Install, Configure, Manage [V7.0] Course Training
seo_dec
seo_tkeyVSICM70
categorydatacenter-courses
vendorVMware

techonogyDatacenter & Virtualization
overviewThis course features hands-on training on installing, configuring, and managing VMware vSphere® 7, which includes VMware ESXi™ 7 and VMware vCenter Server® 7. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most of the other VMware technologies in the software-defined data center. Certifications: Attending this course meets the training requirement to achieve the following certification:
objective
  • Describe the software-defined data center (SDDC)
  • Explain the vSphere components and their function in the infrastructure
  • Describe the benefits and capabilities of VMware Skyline
  • Install and configure ESXi hosts
  • Deploy and configure VMware vCenter® Server Appliance™
  • Use VMware vSphere® Client™ to manage the vCenter Server inventory and the vCenter Server configuration
  • Manage, monitor, back up, and protect vCenter Server Appliance
  • Create virtual networks with vSphere standard switches
  • Describe the storage technologies supported by vSphere
  • Configure virtual storage using iSCSI and NFS storage
  • Create and manage VMware vSphere® VMFS datastores
  • Use the vSphere Client to create virtual machines, templates, clones, and snapshots
  • Create a content library and deploy virtual machines from templates in the library
  • Manage virtual machine resource use
  • Migrate virtual machines with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
  • Create and manage a vSphere cluster that is enabled with VMware vSphere® High Availability and VMware vSphere® Distributed Resource Scheduler™
  • Discuss solutions for managing the vSphere life cycle
  • Use VMware vSphere® Lifecycle Manager™ to perform upgrades to ESXi hosts and virtual machines

outline

Course Introduction

  • Introductions and course logistics
  • Course objectives

Introduction to vSphere and the Software-Defined Data Center

  • Explain basic virtualization concepts
  • Describe how vSphere fits into the software-defined data center and the cloud infrastructure
  • Explain how vSphere interacts with CPUs, memory, networks, and storage
  • Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts
  • Describe the ESXi host architecture
  • Navigate the Direct Console User Interface (DCUI) to configure an ESXi host
  • Recognize ESXi host user account best practices
  • Install an ESXi host
  • Use VMware Host Client™ to configure ESXi host settings
  • Describe how to proactively manage your vSphere environment using VMware Skyline

Virtual Machines

  • Create and provision a virtual machine
  • Explain the importance of VMware Tools™
  • Install VMware Tools
  • Identify the files that make up a VM
  • Recognize the components of a VM
  • Recognize virtual devices supported by a VM
  • Describe the benefits and use cases for containers
  • Identify the parts of a container system

vCenter Server

  • Describe the vCenter Server architecture
  • Discuss how ESXi hosts communicate with vCenter Server
  • Deploy and configure vCenter Server Appliance
  • Use vSphere Client to manage the vCenter Server inventory
  • Add data center, organizational objects, and hosts to vCenter Server
  • Use roles and permissions to enable users to access objects in the vCenter Server inventory
  • Back up vCenter Server Appliance
  • Monitor vCenter Server tasks, events, and appliance health
  • Use VMware vCenter Server® High Availability to protect a vCenter Server Appliance

Configuring and Managing Virtual Networks

  • Create and manage standard switches
  • Describe the virtual switch connection types
  • Configure virtual switch security, traffic-shaping, and load-balancing policies
  • Compare vSphere distributed switches and standard switches

Configuring and Managing Virtual Storage

  • Identify storage protocols and storage device types
  • Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
  • Create and manage VMFS and NFS datastores
  • Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage
  • Recognize the components of a VMware vSAN™ configuration

Virtual Machine Management

  • Use templates and cloning to deploy new virtual machines
  • Modify and manage virtual machines
  • Create a content library and deploy virtual machines from templates in the library
  • Use customization specification files to customize a new virtual machine
  • Perform vSphere vMotion and vSphere Storage vMotion migrations
  • Describe the Enhanced vMotion Compatibility feature
  • Create and manage virtual machine snapshots
  • Examine the features and functions of VMware vSphere® Replication™
  • Describe the benefits of VMware vSphere® Storage APIs – Data Protection

Resource Management and Monitoring

  • Discuss CPU and memory concepts in a virtualized environment
  • Describe what over commitment of a resource means
  • Describe methods for optimizing CPU and memory usage
  • Use various tools to monitor resource use
  • Create and use alarms to report certain conditions or events

vSphere Clusters

  • Describe the functions of a vSphere DRS cluster
  • Create a vSphere DRS cluster
  • Monitor a vSphere cluster configuration
  • Describe options for making a vSphere environment highly available
  • Explain the vSphere HA architecture
  • Configure and manage a vSphere HA cluster
  • Examine the features and functions of VMware vSphere® Fault Tolerance
  • Describe the function of the vSphere® Cluster Service

vSphere Lifecycle Management

  • Recognize the importance of vCenter Server Update Planner
  • Describe how VMware vSphere® Lifecycle Manager™ works
  • Describe how to update ESXi hosts using baselines
  • Validate ESXi host compliance using a cluster image
  • Describe how to upgrade VMware Tools and VM hardware
  • Describe VMware vSphere® Lifecycle Manager™ and VMware vSAN™ integration

target_au
  • System administrators
  • System engineers

pre_req
  • System administration experience on Microsoft Windows or Linux operating systems

titleACUCM/AUC v12.5 – Administering Cisco Unified Communication Manager and Unity Connection
days5
seo_titleACUCM/AUC - Administering Cisco Unified Communication Manager and Unity Connection Course Training
seo_dec
seo_tkey
categorynetworking
vendorCisco

techonogyEnterprise Networking
overview

Administering Cisco Unified Communications Manager (ACUCM) v12.5 provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. This course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network


objective
outline

Module 1: Introduction to IP Telephony

  • Exploring IP Telephony
  • Describing Deployment Models
  • Understanding Advanced Multisite Features

Module 2: Defining the Basic Configuration

  • Logging In to Cisco Unified Communications Manager
  • Examining Basic Server Configuration
  • Describing Multilevel Administration
  • Configuring DRS Backup and Restore Procedures

Module 3: User Administration

  • Understanding User Configuration
  • Using the User Web Pages

Module 4: Exploring Phone Registration and Cisco Unified IP Phones

  • Configuring System Parameters
  • Supporting Cisco Unified IP Phones
  • Exploring Phone Registration and IP Phone Communications
  • Utilizing the Bulk Administration Tool (BAT)

Module 5: Basic Route Plan Configuration

  • Implementing Dial Plan Connectivity
  • Creating Route Plans

Module 6: Route Filters and Digit Manipulation

  • Configuring Translation Patterns and Route Filters
  • Implementing Digit Manipulation

Module 7: Class of Control

  • Defining Class of Control
  • Using Class of Control Features

Module 8: Understanding Media Resources

  • Defining Media Resources
  • Exploring Media Resource Management

Module 9: Features and Services

  • Describing Basic Features
  • Exploring Hunt Groups
  • Describing Phone Services

Labs for ACUCM:

  • Lab 2-1: Navigating Cisco Unified Communications Manager
  • Lab 2-2: Configuring CUCM Basic Settings
  • Lab 3-1: Working with User Accounts
  • Lab 4-1: Configuring the System to Support Cisco IP Phones and Jabber Clients
  • Lab 4-2: Using the CUCM Bulk Administration Tool to Add Phones
  • Lab 5-1: Configuring Basic Dial Plan Elements
  • Lab 6-1: Configuring Simple Digit Manipulation in CUCM
  • Lab 7-1: Implementing Calling Privileges and Restrictions
  • Lab 8-1: Configuring Media Resources, MeetMe and Conference Now
  • Lab 9-1: Configuring User Features, Call Pickup and Intercom
  • Lab 9-2: Configuring Hunt Groups and Call Coverage

 

Appendix: Integrating CUCM with Cisco Unity Connection Voice-Mail AUC

Module 1: Introduction to Cisco Unity Connection

  • Overview of Cisco Unity Connection
  • Navigating Cisco Unity Connection
  • Understanding Call Handlers, Users, and Call Flow

Module 2: Configuration of Users and Contacts

  • Explaining Users and Contacts
  • Managing Multiple Users

Module 3: Implementation of Features

  • Implementing the Dial Plan
  • Understanding User Features
  • Accessing Voice Messaging and User Features
  • Managing Distribution Lists

Module 4: Use of Cisco Unity Connection Applications, Tools and Reports

  • Designing an Audiotext Application
  • Using Cisco Unity Connection Tools and Reports
  • Using the DRS

Labs for AUC:

  • Lab 1-1: Verifying Connectivity and Call Flow
  • Lab 1-2: Verifying and Configuring Call Handlers
  • Lab 1-3: Working with Users and Extensions in Voice Mail
  • Lab 2-1: Preparing to Configure Users and Contacts
  • Lab 2-2: Managing Users and Contacts
  • Lab 2-3: Managing Multiple Users
  • Lab 3-1: Implementing the Dial Plan
  • Lab 3-2: Understanding User Features
  • Lab 3-3: Implementing Integrated Messaging and User Features
  • Lab 4-1: Implementing an Audiotext Application
  • Lab 4-2: Using Cisco Unity Connection Tools and Reports

target_au

The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments.

The course does not cover issues of initial deployment, new cluster deployment or international deployments.

Also, the course does not cover issues with the underlying network that involve routers, switches, or Cisco IOS software configuration.


pre_req
  • Basic knowledge of IP and networking or voice networks is suggested, but not required
  • Basic knowledge of the Windows desktop environment
  • Basic understanding of fundamental terms and concepts of computer networking, including LANs, WANs, and IP switching and routing
  • Basic knowledge of traditional PSTN operations and technologies, including PBX and voice-mail administration tasks
  • Basic understanding of Cisco Unified Communications Manager

titleDCIHX – Implementing Cisco HyperFlex v1.3
days4
seo_titleDCIHX - Implementing Cisco HyperFlex Course Training
seo_dec
seo_tkey
categoryhyperflex
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco HyperFlex (DCIHX) v1.3 course shows you how to deploy and use the Cisco® HyperFlex™ data platform to support multicloud workloads. You will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.™
objective
  • Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex
  • Explain the Cisco Unified Computing System™ (Cisco UCS®) and what makes it valuable to business
  • Describe how Cisco HyperFlex Data Platform (HXDP) works
  • Describe the physical components of Cisco HyperFlex
  • Describe Cisco Intersight and introduce functionalities relevant to HyperFlex
  • Install standard ESXi-based vSphere Cisco HyperFlex
  • Manage your Cisco HyperFlex VMware ESXi-based cluster
  • Describe how to maintain Cisco HyperFlex
  • Design a Cisco HyperFlex solution
  • Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption
  • Describe a stretched cluster and how is it different from a standard cluster
  • Describe an Edge cluster and how is it different from a standard cluster
  • Perform basic troubleshooting tasks and explain Cisco Intersight

outline

Introducing Hyperconvergence and Cisco HyperFlex

  • Traditional Data Center Design
  • What Is Hyperconvergence?

Describing Cisco UCS: The Foundation of Cisco HyperFlex

  • Cisco Server Deployment Models: Standalone Versus Managed
  • Cisco UCS Managed Model Benefits

Describing Cisco HyperFlex Software Components

  • Virtual Machine Hypervisor
  • Log-Structured File System

Describing Cisco HyperFlex Hardware Components

  • Introducing Cisco HyperFlex Servers
  • Storage Technologies in Cisco HyperFlex

Introducing Cisco Intersight

Installing and Expanding Standard ESXi Cisco HyperFlex

  • Installation Summary
  • Software Prerequisites

Managing Cisco HyperFlex in vSphere Environment

  • Management Interfaces Overview
  • Cisco HyperFlex Plugin for vCenter

Maintaining Cisco HyperFlex

  • Cisco HyperFlex Upgrade Overview
  • Cisco HyperFlex Online Upgrade

Designing Cisco HyperFlex

  • Cluster Resiliency: VM-Level
  • Cluster Resiliency: HXDP-Level

Protecting Your Data

  • Disaster Recovery Overview
  • Third-Party Data Restore Solutions

Introducing Cisco HyperFlex Stretched Deployment

  • Stretched Cluster Overview
  • Prerequisites

Introducing Cisco HyperFlex EDGE

  • Cisco HyperFlex EDGE Cluster Overview
  • Prerequisites and Recommendations

Troubleshooting Cisco HyperFlex

  • Troubleshooting Guidelines
  • Generating Tech Support Bundles

Lab outline

  • Investigate Software Components of Cisco HyperFlex
  • Investigate Cisco UCS Part of HyperFlex
  • Investigate Cisco Intersight
  • Install Cisco HyperFlex
  • Manage Cisco HyperFlex
  • Protect Your HyperFlex VMs
  • Investigate Stretched Group
  • Install and Manage Stretched HyperFlex Group
  • Investigate HyperFlex Edge

target_au
  • Data center engineers
  • Engineers (design, implementation, pre sales, post sales)
  • Product managers and sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Cisco CCNA®–level knowledge about data center architecture and products technologies (network, compute, storage network)
  • Familiarity with VMware vCenter and ESXi
  • Familiarity with public cloud offerings, primarily AWS, but also Azure and GCP

Recommended Cisco learning offerings that may help you meet these prerequisites:

  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Introducing Cisco Data Center Technologies (DCICT)
  • Cisco CCNP Data Center specialization modules: DCID, DCIT, DCACI, DCSAN, DCACIA, DCAUTO.

titleC98WF6 – Configuring Cisco Catalyst 9800 and Intro to WIFI6
days3
seo_titleC98WF6 - Configuring Cisco Catalyst 9800 and Intro to WIFI6 Course Training
seo_decThis course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
seo_tkeyC98WF6
categorywireless-courses
vendorInsoft Specials

techonogyWireless
overviewC98WF6 - Configuring Cisco Catalyst 9800 and Intro to WIFI6 course provides knowledge regarding how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits. This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
objective

After completing this course you should be able to:

  • Describe Cisco Catalyst 9800
  • Understand the Benefits for Catalyst 9800
  • Configure Catalyst 9800
  • Migrate to the Catalyst 9800
  • Troubleshoot the Catalyst 9800
  • Understand and Discuss WIFI6

outline

Introduction

  • Cisco Catalyst 9800 Overview
  • Intent Based Networking (IBN)
  • Cisco Catalyst Next Gen Wireless Architecture
  • Cisco Catalyst 9800 Wireless – Platform Support

Cisco Catalyst 9800 Wireless Controller Appliances

  • Cisco Catalyst 9800 Wireless Controller Series: C9800-80-K9
  • Cisco Catalyst 9800 Wireless Controller Series: C9800-40-K9
  • Cisco Catalyst 9800 Wireless Controller Cloud Series: C9800-CL-K9

Cisco Catalyst 9800 use in Private and Public Cloud Environments

  • Private
  • Public
  • Hybrid

What is WiFi 6 and Why do we need it?

  • Use Cases – how WiFi 6 will change Buisness and Industry
  • WIFI6 technical – a leap from previous WiFi technologies
  • Design Considerations
  • Cisco WiFi6 Portfolio and Interoperability
  • Configure WiFi6 on Cat 9800

Cisco Catalyst 9800 Series Embedded Controller for SDA

  • SD-Access Everywhere
  • Wireless Assurance with DNA Center
  • Catalyst 9800 SD-Access Wireless
  • Catalyst 9800 SD-Access Embedded Wireless Controllers

High Availability

  • Reducing downtime for Upgrades and Unplanned Events
  • High Availability (Client SSO)
  • High Availability (AP & Client SSO)

Software Updates

  • Software Updates
  • SSO
  • Patching
  • Rolling Upgrades
  • Wireless Controller SMU
  • Rolling AP Update
  • Image Upgrade

Programmability and Telemetry

  • Flexible management options with Cisco Catalyst 9800 Wireless Controllers
  • Wireless Programmability “Stack”
  • Config vs Operational YANG data models
  • Model Driven Telemetry
  • Security and Threat Detection
  • Intent-based wireless networks Security
  • Security and Threat Mitigation

Catalyst 9800 Wireless Controller Configuration Model

  • New Configuration Model
  • AireOS vs. Catalyst 9800 Config Model
  • Catalyst 9800 Config Model

Wireless Basic Setup

  • Wireless Basic Configuration Model
  • Adding Local Site
  • Adding Remote Site
  • Provisioning APs to Site
  • Day 0
  • AP PnP

Wireless Advanced

  • Guided UI Configuration Workflow
  • WLAN Profile
  • Policy Profile
  • AP Join profile
  • RF Profile
  • Static and Rule-Based AP Tagging

Migration

  • AireOS Config Translator
  • Using the Tool
  • Migration using Prime
  • AireOS Config Translator on PI 3.5

Troubleshooting

  • IOS-XE logging architecture
  • Packet tracing and packet captures
  • Embedded Packet Capture web interface
  • Useful commands and tools

Lab Outline:

  • Configure Windows 10 Client Access
  • Configure Centralized WLAN Deployment with Catalyst 9800
  • Configure Security in Centralized WLAN Deployment with Catalyst 9800 using ISE
  • Configuring Guest Access using Catalyst 9800 and Anchor AirOS
  • Implement Flex-Connect WLAN Deployment with Catalyst 9800
  • High Availability SSO with Catalyst 9800
  • Migrating Configuration from AireOS to Catalyst 9800 WLC using WebUI and Prime Infrastructure
  • Catalyst 9800 Software Upgrade

target_au

The primary audience for this course is as follows:

  • Cisco Partners and customers interested in the Catalyst 9800 wireless controller

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Understanding of Wi-Fi technologies (CCNA Level)

titleINCVDO – Cisco CyberVision Deployment & Operation
days3
seo_titleINCVDO - Cisco CyberVision Deployment & Operation Course Training
seo_decINCVDO, Cisco CyberVision Deployment and Operation, is a 3-day instructor-led course. Security is every enterprise€™s top priority in today€™s connected world and keeping enterprise architecture secure will protect business values and outcomes.
seo_tkeyINCVDO
categorydata-center-security
vendorInsoft Specials

techonogySecurity
overviewINCVDO, Cisco CyberVision Deployment and Operation, is a 3 days instructor-led course. Security is every enterprise’s top priority in today’s connected world and keeping enterprise architecture secure will protect business values and outcomes. Thus, a critical element to the success of any network is ensuring and maintaining security – it’s a need that is applicable to all networks and network devices, including those that power Cisco Internet of Things technologies and solutions. In an effort to simplify cybersecurity and increase device visibility within systems utilized by our IoT customers and partners, Cisco introduces Cisco Cyber Vision – a software cybersecurity solution for Operations Technology (OT). This course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays IoT Extended Enterprise and IT – OT integration using Cyber Vision. The goal of this course is to help the student understand the types of attacks, the types of targets and the tools available to protect the Industrial IoT architecture and to use Cyber Vision to keep the IoT infrastructure safe. Practical skills will be achieved using real-world scenarios and examples in a lab developed for such a purpose. Cisco Cyber Vision provides organizations the ability to gain visibility into industrial environments including full details of what assets are on the network, how those assets are communicating, and application level understanding of operational information. As a result, Cisco Cyber Vision provides views and capabilities, including integrations, that can be leveraged by security teams, IT infrastructure teams, and operational teams to ensure system integrity and protect against cyber risks.
objective
  • Explain the common vulnerabilities in the IoT deployments.
  • Explain the cybersecurity approach for IoT architectures.
  • Define the Cyber Vision main concepts.
  • Describe Cyber Vision solution portfolio.
  • Describe and use the Cyber Vision GUI.
  • Identify and explain Cyber Vision Installation and Support procedures.
  • Define Cyber Vision Assessment.
  • Identify Cyber Vision Assessment components.
  • Explain and use Cyber Vision Asset solution.
  • Describe and use Cyber Vision API for Automation.
  • Identify Cyber Vision use cases.

outline

Industrial Internet of Things Security Threats

  • Describe security threats and potential impacts on the network
  • Understand the security challenges faced by the IIoT staff on a daily basis
  • Explain why Cisco Validated Designs lead to a more secure infrastructure
  • Describe security threats in the Extended Enterprise network

Introducing Cyber Vision

  • Cybersecurity overview in IIoT deployments
  • Cyber Vision overview
  • Cyber Vision solution components
  • Cyber Vision installation procedure

Cyber Vision Concepts

  • Preset
  • Filters
  • Component
  • Activity
  • Flow
  • Time span
  • Tags
  • Properties
  • Vulnerabilities
  • Events
  • Credentials
  • Variable accesses

Cyber Vision GUI Exploration

  • General Dashboard
  • Preset Views
  • Panels
  • Reports
  • Events
  • Monitor
  • Search
  • Admin
  • Systems Statistics
  • My Settings

Cyber Vision Operation

  • Using General Dashboard
  • Explore Preset Views and Panels
  • Examine and generate Reporting features
  • Working with Events, Alerts and Audits.
  • Using Monitor Mode and its Views
  • Describing and Exploring Monitor Mode Differences
  • Creating Baselines from default preset and from groups
  • Defining with Weekend Baselines
  • Enabling and using Baselines
  • Cyber Vision Use Cases
  • Administering Cyber Vision System and Data Management
  • Cyber Vision Center and Sensors general administration
  • Administering Users
  • Administering Events
  • Administering Licensing
  • Working with RBAC and LDAP Settings
  • Exploring and using Cyber Vision API
  • Cyber Vision Context Information Exchange with pxGrid
  • IDS functionality with SNORT
  • Cyber Vision Integrations and Extensions
  • Working with My Settings

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco Security.
  • Sound knowledge of Internet of Things Concepts.
  • Sound knowledge of IIoT Architectures.

titleNXEWS – Networking Express for Engineers Workshop
days2
seo_titleNXEWS - Networking Express for Engineers Workshop Course Training
seo_decThis Cisco Express Networking training course does require some fundamental knowledge. Students should be familiar with network operation, basic network security, and wireless.
seo_tkeyNXEWS
categorynetworking
vendorInsoft Specials

techonogyEnterprise Networking
overviewWith NXEWS - Networking Express for Engineers Workshop course, you will get knowledge on Meraki technologies as a point of entry into the Cisco portfolio and gain exposure to foundational Cisco technologies. This Cisco Express Networking training course does require some fundamental knowledge. Students should be familiar with network operation, basic network security, and wireless. Course modules cover Cisco Networking, Portfolio and Switching Solutions, Routing Portfolio and Solutions, Wireless Portfolio and Solutions, Security Portfolio and Solution, and more. This Networking Express for Engineers Workshop is intended for channel partners. Find additional course information below!
objective

After you complete this course you should be able to pass the Networking Express for Engineers exam which includes:

  • Describe and explain networking express
  • Describe, explain, and identify switching product portfolio
  • Explain and identify switching positioning
  • Describe and explain routing features
  • Describe and explain Mobility Express features
  • Explain and identify wireless tools and resources
  • Describe, explain, and identify security product portfolio
  • Describe, explain, and identify Cisco Active Advisor SE programs
  • Describe, explain, and identify FindIT SE programs
  • Describe and explain Meraki cloud architecture design
  • Describe and explain Meraki datacenter reliability and security
  • Describe and explain the Meraki WLAN (MR) platform and features
  • Describe and explain the Meraki security appliance (MX) platform and features
  • Describe and explain the Meraki switching (MS) platform and features
  • Describe and explain the Meraki security cameras (MV) platform and feature
  • Describe and explain the Meraki licensing model
  • Describe and explain the Meraki support model

outline

Day 1: Routing and Switching

Module 1: Introduction to Cisco Networking

  • Lesson 1: Overview
  • Lesson 2: Market Trends and Drivers

Module 2: Portfolio and Switching Solutions

  • Lesson 1: Switching Overview
  • Lesson 2: Cisco Switching Solutions
  • Lesson 3: Switching Product Portfolio
  • Lesson 4: Positioning Cisco Switching Solutions and Products
  • Lesson 5: Cisco Switching Tools and Resources

Module 3: Introduction to Routing Portfolio and Solutions

  • Lesson 1: Routing Overview
  • Lesson 2: Routing Product Portfolio
  • Lesson 3: Positioning Cisco Routing
  • Lesson 4: Cisco Routing Tools and Resources

Module 4: Introduction to Wireless Portfolio and Solutions

  • Lesson 1: Build or Expand a Wireless Practice
  • Lesson 2: Mobility Express Overview
  • Lesson 3: Mobility Express Products and Features
  • Lesson 4: Cisco Wireless Products RF Planner
  • Lesson 5: Wireless Resources

Module 5: Introduction to Security Portfolio and Solution

  • Lesson 1: Branch Threat Defense Umbrella
  • Lesson 2: Security in the Digital Age
  • Lesson 3: Security Portfolio Overview
  • Lesson 4: Security Sales Resources

Module 6: Programs, Support, Services, Software, and Resources

  • Lesson 1: Programs – Cisco Active Advisor
  • Lesson 2:  Programs – FindIT
  • Lesson 3: Support Services

Day 2: Meraki

Module 7: Meraki Overview

  • Lesson 1: The Meraki Mission
  • Lesson 2: Cloud Based Management
  • Lesson 3: Zero Touch Provisioning

Module 8: Meraki MR – Wireless LAN

  • Lesson 1: Overview
  • Lesson 2: Features
  • Lesson 3: Models
  • Lesson 4: Performance

Module 9: Meraki MX – Security Appliances

  • Lesson 1: Overview
  • Lesson 2: Dashboard
  • Lesson 3: Intrusion Prevention
  • Lesson 4: Threat protection

Module 10: Meraki MS – Switches

  • Lesson 1: Access and Aggregation
  • Lesson 2: Zero Touch Provisioning
  • Lesson 3: Deployment
  • Lesson 4: Management

Module 11: Meraki SM – Mobility Management

  • Lesson 1: Cloud Based Enterprise Mobility Management
  • Lesson 2: Device On Boarding
  • Lesson 3: Policy Automation

Module 12: Meraki MC – Collaboration

  • Lesson 1: Cloud Managed Communication
  • Lesson 2: Products
  • Lesson 3: Features

Module 13: Meraki MV – Surveillance

  • Lesson 1: Automatic Network Detection
  • Lesson 2: MV Cameras
  • Lesson 3: Video Sharing

Module 14: Meraki APIs – Developer Platforms

  • Lesson 1: Meraki developers’ platform and community (APIs)
  • Lesson 2: API Integration

Module 15: Meraki Sales Cycle

  • Lesson 1: Sales Resources
  • Lesson 2: Meraki opportunities
  • Lesson 3: Meraki demos

Module 16: Meraki Licensing, Support, and Warranty

  • Lesson 1: Meraki licensing model
  • Lesson 2: Meraki support mode

target_au

The primary audience for this course is as follows:

  • Channel Partners

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Familiarity with Wireless
  • Familiarity with Network operation
  • Understanding of basic network security

titleHXIAVR – HyperFlex Implementation and Administration with VR
days3
seo_titleHXIAVR - HyperFlex Implementation and Administration with VR Course Training
seo_decThis HyperFlex training course provides an introduction to hyper-converged infrastructure and presents the Cisco HyperFlex (HX) hardware and software architecture.
seo_tkeyHXIAVR
categorydata-center
vendorInsoft Specials

techonogyDatacenter & Virtualization
overviewHyperFlex Implementation and Administration with Virtual Reality (HXIAVR) is a 3 days instructor-led course. This HyperFlex training course provides an introduction to hyper-converged infrastructure and presents the Cisco HyperFlex (HX) hardware and software architecture. HX use cases and solutions based on Cisco Validated Designs (CVD) are presented as well as performance advantages of the HX platform over competing vendors. Pre-installation requirements, best practices and post installation requirements are delivered in conjunction with the HX Data Platform Installer as a utility to streamline cluster creation and validation. The learner will also get virtual hands on experience with racking and connecting HyperFlex devices in a virtual environment. Additional topics include troubleshooting and upgrading HX, creating HyperFlex stretched clusters and installing HX within Hyper-V environments.
objective

Upon completion of this course, the student will be able to meet these overall objectives:

  • Define the concept of Software Defined Storage in Hyperconverged Infrastructure
  • Describe the architecture, components, features and operation of Cisco HyperFlex Systems
  • Rack HyperFlex family devices.
  • Install, configure, deploy, manage and monitor Cisco HyperFlex Systems
  • Describe pre-installation, best practices and post-installation requirements for Cisco HyperFlex Systems
  • Configure a Cisco HyperFlex Stretched Cluster
  • Describe Cisco HyperFlex Systems Use Cases

outline

Lesson 1: Introduction to Hyper-converged Infrastructure (HCI)

  • Identify the components of a Hyper-converged Infrastructure (HCI)
  • Understand the challenges that are being addresses by Hyper-converged Infrastructure
  • Explain the benefits of an HCI solution
  • Present the components and physical topology of the Cisco HyperFlex with Application Centric Infrastructure (ACI) solution

Lesson 2: Cisco HyperFlex Systems Hardware and Software Architecture

  • What’s New in HX v4.x
  • Describe the Virtualization Platforms options for HypeFlex: VMWare, Hyper-V, Containers with Kubernetes
  • Understand the capabilities and functionality of the HyperFlex Hybrid, All-Flash and NVMe server platform
  • Describe the HyperFlex HX Compute Only solution
  • Describe the HyperFlex HX Edge solution
  • Present the Cisco HyperFlex HX Data Platform hardware components
  • Describe the Cisco HyperFlex system architecture
  • Understand the advanced storage features and performance enhancements of the HyperFlex cluster
  • Identify the hardware functionality of the Hyperflex HX server nodes
  • Describe the management and connectivity details for various HyperFlex HX cluster deployments

Lesson 3: Cisco HyperFlex Systems Use Cases, Solutions and Performance

  • Introduce the Cisco Validated Design (CVD) guides that are available for the HyperFlex HX Data Platform solution
  • Describe the Cisco HyperFlex All-Flash Systems for Deploying Microsoft SQL Server Database validated design details
  • Present the Cisco HyperFlex M5 All-Flash Hyperconverged System with up to 600 Citrix XenDesktop Users validated design details
  • Identify and compare the performance advantages of the Cisco HyperFlex HCI solution with other vendors for Oracle OLTP, SQL Server and mixed workload operating environments

Lesson 4: HyperFlex Pre-installation Requirements in VMware

  • Review the software requirements for VMware ESXi
  • Describe the physical requirements for successful HX cluster deployment
  • Present the network requirements for HX Data Platform installation
  • Define the port requirements for VMware ESXi and vCenter
  • Identify the HyperFlex external connections
  • Provide the deployment information and variables required when using the HX Data Platform installer

Lesson 5: HyperFlex HX Data Platform Installation Best Practices

  • Confirm the configuration requirements of the northbound switches that are connected to the HyperFlex cluster
  • Present the Cisco UCS configuration parameters required for the HyperFlex Data Installer utility
  • Describe the VMware vCenter host, licensing and networking parameters that support successful of the HX Data Platform

Lesson 6: Installing Cisco HyperFlex Systems Using the HX Installer

  • Present the benefits of the HX Data Platform automation function to streamline Cisco UCS and VMware vCenter configuration
  • Describe the HyperFlex factory pre-installed hardware and software options
  • Identify the steps required to install, deploy and launch the HX Data Platform Installer
  • Describe HyperFlex cluster creation validation using UCS Manager and VMware vSphere Client/Web Client
  • Review installation procedures using Intersight

Lesson 7: Post-Installation Requirements for HX Data Platform

  • Describe the post installation capabilities of the HX Installer command line interface
  • Present the post install script as a streamlined to perform cluster administrative functions such as Auto Support, email alerts and password changes
  • Identify the HX vSphere Plug-in and the HX Connect utility as two methods to create and manage HyperFlex cluster datastores
  • Explain the use of the HX vSphere Plug-in to create snapshots and ReadyClone VM clones
  • Using Cisco Workload Optimization Manager to improve operation.

Lesson 8: Troubleshooting HX Data Platform Installation and Upgrades

  • Present issues that are commonly encountered during HX cluster creation and upgrade activities
  • Describe troubleshooting steps to validate and correct network connectivity problems due to misconfiguration of VLAN, frame size and quality of service parameters across vCenter, UCS and northbound switch platforms
  • Identify issues that cause virtual machine migration (vMotion) failure
  • Present the issues that prevent successful completion of HX cluster and node upgrades and provide corrective measures to complete the operations

Lesson 9: Upgrading the HX Data Platform

  • Present the upgrade features for HX Data Platform
  • Describe the HX Data Platform upgrade guidelines and recommendations
  • Identify the Cisco HX Data Platform upgrade matrix including Cisco UCS manager and VMware ESXi
  • Present the upgrade validations, pre-installation checks and pre-upgrade procedures
  • Describe the process to upgrade the Cisco UCS Infrastructure using UCS Manager
  • Describe the process to upgrade the HX Data Platform, Cisco UCS Server and VMware ESXi using the HX Connect utility

Lesson 10: HyperFlex Stretched Cluster Overview and Configuration

  • Introduce the HyperFlex Stretched Cluster architecture and pre-installation checklist requirements
  • Describe the process to download the witness VM installation image file and complete the configuration and deployment within vCenter
  • Present the process to create the Stretched Cluster Sites and run the Configure Site workflow for Sites A and B
  • Explain the required steps to create the HyperFlex Stretched Cluster and run the Create Stretch Cluster workflow

Lesson 11: HX Data Platform for the Hyper-V Environment

  • Describe the hardware, software network services and port requirements that support the installation of the HX Data Platform for the Hyper-V environment
  • Present the guidelines and limitations for creating the HyperFlex cluster using the HX Data Installer as well as DNS and Active Directory
  • Present the process to download the HX Data Installer VM and install the image onto a Hyper-V server
  • Define the steps required to deploy the HyperFlex cluster for Hyper-V using the HX Data Installer

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems and Hyperconvergence
  • Basic knowledge of servers and storage

titleDCSVR – Data Center Security with Virtual Reality
days2
seo_titleDCSVR - Data Center Security with Virtual Reality Course Training
seo_decThis course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays advanced Data Centers.
seo_tkeyDCSVR
categorydata-center-security
vendorInsoft Specials

techonogyDatacenter & Virtualization
overviewData Center Security with Virtual Reality (DCSVR) is an instructor-led course. Security is every enterprise’s top priority and keeping Data Center secure will protect business values. This course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays advanced Data Centers. The goal of this course is to help the student understand the types of attacks, the types of targets and the tools available to protect the DC. The learner will get virtual hands on experience with racking and connecting security appliances in a virtual environment. We will also discuss newer security solutions such as Application Centric Infrastructure (ACI), Stealth watch and Tetration to understand how logical separation, data mining and anomaly detection can help us protect the infrastructure.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Explain the common vulnerabilities in the Data Center
  • Understand Data Center Cisco Validated Designs
  • Identify the common attack vectors in the Data Center
  • Identify malicious activities
  • Identify patterns of suspicious behaviors across the Data Center
  • Secure device management in the Data Center
  • Explain Zero Trust Networking
  • Describe Firewall Features for the Data Center
  • Explain the advantages of AMP protection
  • Secure the Network with Umbrella
  • Understand the reports and information available from Stealthwatch
  • Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data

outline

Lesson 1: DC Security Threats

  • Describe security threats and potential impacts on the network
  • Understand the security challenges faced by the DC staff on a daily basis
  • Explain why Cisco Validated Designs lead to a more secure infrastructure
  • Describe security threats in the storage network
  • Explain Zero Trust Networking

Lesson 2: Protecting the Management Network

  • Discuss options for in band and out of band management
  • Describe role-based access control
  • Explain the role of TACACS and Identity Services Engine (ISE) for device administration control

Lesson 3: Firewalling the Data Center

  • Positioning the Firewall Within Data Center Networks
  • Cisco Firepower Portfolio
  • Describe advanced policy configuration and Firepower system configuration options
  • Configure policies to find and stop Ransomware
  • Configure Correlation events, white rules, traffic profiles, and create respective events and remediate them
  • Understand network and host based AMP on a server
  • Configure and analyze host based AMP on a server
  • Firewall Virtualization
  • Design for Threat Mitigation
  • Threat Mitigation Integration with other Cisco products

Lesson 4: Umbrella Integration

  • Umbrella and Available Features Overview
  • Destination Lists
  • Content Categories
  • Application Settings
  • Tenant Controls
  • Security Settings
  • Integrations
  • Selective Decryption Lists
  • DNS Policies
  • Firewall Policies
  • Virtual Appliance
  • Core Reports
  • Management Reports
  • Integrating Umbrella within Cisco SecureX

Lesson 5: Stealthwatch in the Data Center

  • Explain what Cisco Stealthwatch is and how it works.
  • Describe the goals of using Cisco Stealthwatch in the proactive and operational modes.
  • Define basic concepts of investigation and detection of potential security issues using the Cisco Stealthwatch System.
  • Complete workflows to identify indicators of compromise in your network.
  • Describe alarm types and alarm notification within Cisco Stealthwatch.
  • Explain the utility of maps in the Cisco Stealthwatch System.
  • Describe how the Cisco Stealthwatch System contributes to successful incident handling

Lesson 6: Utilizing Tetration in the Data Center

  • Enable pervasive visibility of traffic across datacenter infrastructure
  • Uses long term data retention for forensics and analysis
  • Create communication and dependencies for all applications within the datacenter
  • Empower the company to utilize a whitelist policy model
  • Identify behavior deviation in real time
  • Perform forensics operations

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco Security
  • Basic knowledge of Cisco Data Center Architecture
  • Basic knowledge of servers, storage, and security appliances

titleICUCSVR – Installation and Configuration of the Cisco Unified Computing System with Virtual Reality
days3
seo_titleInstallation and Configuration of the Cisco Unified Computing System with Virtual Reality Course Training
seo_decIn this Cisco UCS server training course, you will become experienced with the installation, configuration, and troubleshooting of Cisco Unified Computing System (UCS) B-Series.
seo_tkeyICUCSVR
categoryunified-computing
vendorInsoft Specials

techonogyDatacenter & Virtualization
overviewICUCSVR - Installation and Configuration of the Cisco Unified Computing System with Virtual Reality is a 3 days instructor-led course. In this Cisco UCS server training course, you will become experienced with the installation, configuration, and troubleshooting of Cisco Unified Computing System (UCS) B-Series. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager as the primary interface. This Cisco training course will explore all of the components of the UCS B-Series from a day to day administrative point of view. Learn UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central.
objective

Upon completing this course, the learner will be able to meet the following overall objectives:

  • Understand the B-Series product line similarities and differences
  • Describe UCS managed architectures
  • Install and rack UCS family devices.
  • Understand the process for upgrading B-Series Firmware
  • Administering service profiles, pools, and policies
  • Understanding RBAC with Active Directory integration
  • Administering backup and restores in UCS Manager
  • Learn and discuss the various management tools for Cisco UCS
  • Perform basic troubleshooting of B-Series in normal operations

outline

Module 1: UCS Infrastructure Components

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: Exploring Cisco UCS User Interfaces
  • Lesson 3: Cisco UCS Management Framework and Features
  • Lesson 4: Rack, Stack, Power, and Console

Module 2: Configuring Cisco B-Series Servers

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: RBAC, Organizations, and Active Directory Integration
  • Lesson 3: Configuring Compute Node LAN Connectivity
  • Lesson 4: Configuring Compute Node SAN Connectivity
  • Lesson 5: Creating Identity and Resource Pools
  • Lesson 6: Creating Service Profiles with VMware
  • Lesson 7: Creating Templates and Cloning Service Profiles
  • Lesson 8: Managing Service Profiles
  • Lesson 9: Operating System Installation Options
  • Lesson 10: Backing Up and Restoring UCSM Database
  • Lesson 11: Upgrading UCS B-Series Firmware
  • Lesson 12: Troubleshooting Cisco UCS B-Series Configuration
  • Lesson 13: Troubleshooting Cisco UCS B-Series Operation

Module 3: UCS Management Tools Essentials

  • Lesson 1: UCS Management Tool Overview
  • Lesson 2: Introduction to UCS Central
  • Lesson 3: Introduction to Cisco Intersight

target_au

The primary audience for this course are as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems
  • Basic knowledge of servers, storage, and VMware

titleNS303 – Cisco NSO Administration and DevOps v3.0
days4
seo_titleNS303 - Cisco NSO Administration and DevOps Course Training
seo_dec
seo_tkey
categorynetworking
vendorCisco

techonogyDatacenter & Virtualization
overviewThis four days course, Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v3.0, provides knowledge regarding Cisco® NSO development, operation, and administration tasks. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and you will learn best practices for using DevOps.
objective
outline

Section 1: Cisco NSO Administration

  • Introducing Network and IT Convergence
  • Introducing Cisco NSO Architecture
  • Introducing Linux
  • Explaining Setup
  • Explaining Access Control
  • Describing Integration Options

Section 2: Scalability

  • Introducing Scalability and High Availability
  • Describing Scalable System Management

Section 3: DevOps Fundamentals

  • Describing Software Development Methodologies
  • Explaining Version Control System
  • Describing Continuous Integration and Continuous Delivery

Section 4: Cisco NSO Operations

  • Introducing Service Maintenance
  • Performing Network Element Driver (NED) Upgrades
  • Introducing Configuration Management
  • Describing Change Management
  • Explaining Service Problem Management
  • Explaining Service Monitoring and Compliance Reporting
  • Cisco NSO and DevOps
  • Introducing Inventory Management
  • Describing Cisco NSO Use Cases

target_au

The primary audience for this course is as follows:

  • System installers
  • System integrators
  • System administrators
  • Network administrators
  • Solution designers

pre_req

Before you take this course, we recommend that you have the knowledge and skills obtainable by attending the Cisco Network Services Orchestrator Foundation (NSO201) class, including:

  • Basic knowledge of the command line of UNIX-like operating systems.
  • Basic knowledge of Network Configuration Protocol (NETCONF).
  • Basic knowledge of Yet Another Next Generation (YANG) data modelling.
  • Basic knowledge of Python software development.

titleDCNML v1.1 – Managing LAN Infrastructure with Cisco Data Center Network Manager
days3
seo_titleDCNML - Managing LAN Infrastructure with Cisco Data Center Network Manager Course Training
seo_dec
seo_tkey
categoryunified-computing
vendorCisco

techonogyDatacenter & Virtualization
overviewThis course enhances your knowledge of managing LAN Infrastructure with Cisco Data Center Network Manager (DCNM) implementing a spine-and-leaf network fabric using DCNM with Virtual Extensible LAN (VXLAN), Ethernet VPN (EVPN), and Border Gateway Protocol (BGP). You will learn how the integration of spine-and-leaf network fabric with Cisco Data Center Network Manager increases overall data center infrastructure uptime and reliability, thereby improving business continuity. It provides a robust framework and comprehensive feature set that meets the routing, switching, and storage administration needs of data centers. Cisco DCNM streamlines the provisioning for the unified fabric and monitors the SAN (Storage area network) and LAN (Local area network) components. This course will help you:
  • Acquire the advanced skills and techniques to use spine-leaf topologies to provide better scalability and more seamless capacity and support for devices and lines.
  • Gain the necessary skills to maximize the benefits of DCNM by integrating automation, and greater visibility into network infrastructure and elimination of configuration errors with templated deployment models.

objective
  • Describe the components and functionality of DCNM.
  • Describe the software define network protocols of VXLAN, eVPN and BGP.
  • Deploy a DCNM environment in high-availability environment.
  • Operate the DCNM discovery process to acquire management of all devices.
  • List high lever navigation features of DCNM and utilize the DCNM GUI (Graphical User Interface) to optimize data center topologies.
  • Manage and monitor data center LAN fabric from DCNM.
  • Program RESTful APIs native to DCNM to perform any network management task.
  • Troubleshoot and monitor the network using DCNM troubleshooting tools.
  • Describe the benefits of DCNM Network Insights.

outline

Introducing Cisco DCNM LAN

  • Cisco DCNM Introduction
  • Cisco DCNM LAN Solution Overview

Deploying VXLAN EVPN with Cisco DCNM LAN

  • VXLAN Overlays and Underlays
  • Easy Fabric VXLAN EVPN Underlay Model

Deploying Cisco DCNM

  • Cisco DCNM High Availability
  • Cisco DCNM Installation Requirements

Discovering Existing Network Devices with Cisco DCNM

  • Configure Switches for Discovery

Exploring the Data Center with Cisco DCNM Topology

  • Access Topology View in the GUI
  • Navigate the Map Views and Layouts

Managing and Monitoring the Data Center with Cisco DCNM LAN

  • Manage the Configuration Archive
  • Deploy Changes to the Fabric

Automating Cisco DCNM Programmatically

  • Explore APIs for the Network
  • REST API Tool

Troubleshooting and Monitoring Cisco DCNM

  • Troubleshoot and Monitor Cisco DCNM

Describing Network Insights

  • Network Insights Advisor

 

Lab outline

  • Access the Lab Devices
  • Explore and Test DCNM Lab Topology
  • Configure Nexis Series Operating System (NX-OS) VXLAN with BGP Control Plane Using CLI
  • Configure and Execute DCNM POAP
  • Managing the Network Using DCNM
  • Managing the Data Center Using DCNM Templates
  • Troubleshooting VXLAN with DCNM

target_au

This course is ideal for the following professionals:

  • Data Network Engineers and Administrators
  • Data Center Technical Managers

pre_req

Before enrolling in this course, you should have knowledge in the following areas:

  • Understanding of Cisco routing and switching in a data center.
  • CCNA certification recommended.
  • Fundamentals of network management.

 

The following course may help you meet these prerequisites:


titleIOT – Essentials Sales and Technical Training
days1
seo_titleIOT - Essentials Sales and Technical Course Training
seo_decIn this course, IoT Essentials: Sales & Technical Training, we€™ll dive into Cisco€™s high-level strategy and vision for IoT.
seo_tkey
categoryinternet-of-things-courses
vendorInsoft Specials

techonogyCisco
overviewIn this course, IoT Essentials: Sales & Technical Training, we’ll dive into Cisco’s high-level strategy and vision for IoT, and explore the underlying guiding principles which will help you in your customer engagements as you become an advisor in their IoT journey. In addition, we will explore the IoT Portfolio, where we cover ‘what to sell’ with a high-level overview of Cisco’s entire landscape of offerings for the infrastructure, applications, and resources that serve as the building blocks for your customers’ IoT solutions. Finally, we will break down the ‘where to sell’ question. The student will learn how, as a Cisco Partner, to create awareness of how you can help your customer navigate their IoT journey. You will be able to position yourself and your organization to support your customers in their IoT journey by leveraging Cisco’s Portfolio of IoT products, solutions, and services. This course will help prepare the student to take the 700-825 exam.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand the guiding principles to help in the customer engagements.
  • Understand an overview of the Cisco IoT product offerings.
  • Understand how to assist customers in their IoT journey.

outline

IoT Portfolio Overview

  • Delivering Value Now
  • Industrial Switching Portfolio
  • Industrial Routing Portfolio
  • Industrial Wireless Portfolio
  • Industrial Security Portfolio
  • Cisco DNA & Intent-based Networking
  • Cisco Industrial Network Director
  • IOx and Edge Computing
  • Kinetic Portfolio
  • DevNet Resources

Sales Play: Extended Enterprise Opportunity

  • Extended Enterprise Opportunity
  • Sales Plays and Use Cases
  • Key Takeaways

Sales Play: Remote and Mobile Assets Opportunity

  • Remote and Mobile Assets Opportunity
  • Customer Use Cases

Sales Play: Industry Solutions Opportunity

  • Opportunities with Industry Plays
  • Manufacturing Sales Plays
  • Transportation and Roadways Plays
  • Oil and Gas Plays
  • Utilities Sales Plays

target_au

The primary audience for this course is as follows:

  • Individuals preparing for the Cisco IoT Essentials for Account Managers (700-825) exam.

pre_req

This course has no formal prerequisites, but it is recommended that students have the following:

  • Experience with and interest in working with customers to determine, measure, and deliver business outcomes through the implementation of technology.
  • Time spent in a customer facing role, including technical sales, system engineering, or similar will be especially helpful.

titleOEMBST – Catalyst 9K, Nexus 9K, VXLAN Implementation & Administration
days5
seo_titleCatalyst 9K, Nexus 9K, VXLAN Implementation & Administration Course Training
seo_decThe purpose of the VXLAN IPv6 Networking training is to provide implementation and administration knowledge.
seo_tkeyOEMBST
categorynetwork-virtualization
vendorInsoft Specials

techonogyEnterprise Networking
overviewThe purpose of the OEMBST training is to provide implementation and administration knowledge on the hardware and software, geared towards VA technical staff.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Learn how to Implement and Administer a next generation network leveraging the latest Cisco Catalyst 9000 series switches, Cisco Nexus 9000 switches and VXLAN.

outline

Section 1: OSPF basics

Section 2: BGP basics

Section 3: IPv6 basics

Section 4: Overview of VXLAN

Section 5: Intro to Spine, Leaf, Border Leaf, Intermediary

Section 6: VXLAN Underlay

Section 7: VXLAN Overlay

Section 8: VXLAN Overlay

Section 9: Layer 2 VNI for isolated networks segments

Section 10: Layer 3 VNI for non-isolated networks segments

Section 11: VXLAN Troubleshooting


target_au

The primary audience for this course is as follows:

  • Network engineers
  • Network administrators
  • Network support technicians
  • Help desk technicians

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic understanding of enterprise routing and switching

titleFortiEDR
days2
seo_titleFortiEDR Course Training | Fortinet NSE 5 Certification
seo_decIn this course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time. Product Versions:
  • FortiEDR 5.0

objective

After completing this course, you should be able to:

  • Explain the FortiEDR approach and how it works
  • Identify the communicating components and how they are configured
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, deploy multi-tenant environment and viewing system events
  • Carry out basic troubleshooting steps, including: verifying that FortiEDR is installed and actively blocking malware, identifying whether FortiEDR has blocked a process or connection, finding logs, and contacting FortiEDR Support
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, and viewing system events
  • Recognize what Fortinet Cloud Service is and how it works
  • Complete basic tasks in of each area of the management console: the Dashboard, the Event Viewer, the Forensics tab, the Threat Hunting module, Communication Control, Security Policies, Playbooks, Inventory, and the Administration tab
  • Manage security events and their status
  • Block communication from applications that are risky or unwanted, but not inherently malicious
  • Find and remove malicious executables from all the devices in your environment
  • Understand how FortiEDR integrates with Fortinet Security Fabric, and how FortiXDR works
  • Use RESTful API to manage your FortiEDR environment
  • Prioritize, investigate, and analyze security events
  • Remediate malicious events and create exceptions to allow safe processes
  • Carry out basic troubleshooting tasks on all FortiEDR components
  • Obtain collector logs and memory dumps

outline
  1. Product Overview and Installation
  2. Administration
  3. Security Policies
  4. Fortinet Cloud Security and Playbooks
  5. Communication Control
  6. Events and Alerting
  7. Threat Hunting and Forensics
  8. RESTful API
  9. Troubleshooting

target_au

IT and security professionals involved in the administration and support of FortiEDR should attend this course.


pre_req
  • A basic understanding of cybersecurity concepts

titleSD-WAN
days4
seo_titleSD-WAN Course Training | Fortinet NSE 7 Certification
seo_decIn this course, you will learn about common SD-WAN deployment scenarios using Fortinet Secure SD-WAN solutions.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this course, you will learn about common SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will explore different situations, from a single enterprise site to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments.   Product Versions
  • FortiOS 7.0.3
  • FortiManager 7.0.2

objective

After completing this course, you will be able to:

  • Describe the capabilities of the Fortinet Secure SD-WAN solution
  • Deploy FortiOS SD-WAN solutions with FortiManager and FortiAnalyzer
  • Configure basic SD-WAN features
  • Configure advanced SD-WAN features
  • Understand the SD-WAN route and rule lookup process
  • Understand the different rule criteria and strategies available to steer traffic using SD-WAN and how SD-WAN responds to changing link conditions
  • Deploy SD-WAN using basic IPsec and routing configuration
  • Deploy SD-WAN using advanced IPsec and routing configuration
  • Troubleshoot SD-WAN routing and rule matching issues

outline
  1. Introduction
  2. Centralized Management
  3. Members, Zones, and Performance SLAs
  4. Routing and Sessions
  5. Rules
  6. Advanced IPsec
  7. Traffic Shaping

target_au

Anyone responsible for the day-to-day management of a Fortinet SD-WAN deployment and network operation.


pre_req
  • Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager
  • It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure
    • NSE 5 FortiManager

titleAdvanced Analytics
days3
seo_titleAdvanced Analytics Course Training | Fortinet NSE 6 Certification
seo_decIn this course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn to add various organizations to FortiSIEM and discover devices from each organization.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different methods of remediation available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM. Product Versions
  • FortiSIEM 6.3.0
  • FortiSOAR 7.0.1
  • FortiGate 7.0.1

objective

After completing this course, you should be able to:

  • Identify various implementation requirements for a multi-tenant FortiSIEM deployment
  • Deploy FortiSIEM in a hybrid environment with and without collectors
  • Design multi-tenant solutions with FortiSIEM
  • Deploy collectors in a multi-tenant environment
  • Manage EPS assignment and restrictions on FortiSIEM
  • Manage resource utilization of a multi-tenant FortiSIEM cluster
  • Maintain and troubleshoot a collector installation
  • Deploy and manage Windows and Linux agents
  • Create rules by evaluating security events
  • Define actions for a single pattern security rule
  • Identify the incident attributes that trigger an incident
  • Identify multiple pattern security rules and define conditions and actions for them
  • Differentiate between a standard and baseline report
  • Create your own baseline profiles
  • Examine the MITRE ATT&CK framework integration on FortiSIEM and FortiSOAR
  • Deploy FortiSIEM UEBA agents
  • Examine UEBA rules, reports, event types, and windows template
  • Configure clear conditions on FortiSIEM
  • Analyze some out-of-the-box remediation scripts
  • Configure various remediation methods on FortiSIEM
  • Integrate FortiSOAR with FortiSIEM
  • Remediate incidents from FortiSOAR

outline
  1. Introduction to Multi-Tenancy
  2. Defining Collectors and Agents
  3. Operating Collectors
  4. Windows and Linux Agents
  5. Rules
  6. Single Subpattern Security Rule
  7. Multiple Subpattern Rules
  8. Introduction to Baseline
  9. Baseline
  10. UEBA
  11. MITRE ATT&CK
  12. Clear Conditions
  13. Remediation

target_au

Security professionals involved in the management, configuration, administration, and monitoring of FortiSIEM and FortiSOAR devices in an enterprise or service provider deployment used to monitor and secure the networks of customer organizations.


pre_req

You must have an understanding of the topics covered in the following courses, or have equivalent experience:

  • NSE 4 FortiGate Security
  • NSE 4 FortiGate Infrastructure
  • NSE 5 FortiSIEM

It is also highly recommended that you have an understanding, or equivalent experience with, Python programming, Jinja2 template language for Python, Linux systems, and SOAR technologies.


titleSecure Access
days3
seo_titleSecure Access Course Training | Fortinet NSE 7 Certification
seo_decIn this course, you will learn how FortiGate, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity over wired and wireless networks.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this three days course, you will learn how FortiGate, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity over wired and wireless networks. You will also learn how to provision, administer, and monitor FortiAP and FortiSwitch devices using FortiManager. This course covers the deployment, integration, and troubleshooting of advanced authentication scenarios, as well as best practices for securely connecting wireless and wired users. You will learn how to keep the network secure by leveraging Fortinet Security Fabric integration between FortiGate, FortiSwitch, FortiAP, and FortiAnalyzer to automatically quarantine risky and compromised devices using IOC triggers. Product Versions:
  • FortiGate 6.4.1
  • FortiAP 6.4.2
  • FortiSwitch 6.4.2
  • FortiAnalyzer 6.4.2
  • FortiAuthenticator 6.1.1

objective

After completing this course, you should be able to:

  • Configure advanced user authentication and authorization scenarios using RADIUS and LDAP
  • Troubleshoot user authentication and authorization problems
  • Implement two-factor authentication using digital certificates
  • Implement and troubleshoot RADIUS and syslog single sign-on solutions
  • Provision, configure, and manage FortiSwitch using FortiManager over FortiLink
  • Configure Layer 2 authentication for wired and wireless users using 802.1.x
  • Provision, deploy, and manage FortiAP using FortiManager over FortiLink
  • Deploy complex wireless networks with dynamic VLAN assignments
  • Implement and deploy wireless network with IoT segmentation
  • Secure the wired and wireless network
  • Provide secure access to guest users
  • Monitor and analyze wireless clients and traffic using Wireless Manager
  • Automatically quarantine wired and wireless clients using IOC triggers

outline
  1. RADIUS and LDAP
  2. Certificate-Based Authentication
  3. Radius and Syslog Single Sign-On
  4. Centralized Management
  5. FortiSwitch
  6. Port Security
  7. Integrated Wireless
  8. Guest Access
  9. Enhanced Wireless

target_au

This course is intended for networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate, FortiManager, FortiAP, FortiSwitch, and Wireless Manager devices used to secure access to their organizations’ resources.


pre_req
  • Knowledge of network authentication protocols
  • Knowledge of Layer 2 switching
  • Understanding of wireless networks
  • Understanding of the topics covered in the following courses:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure
  • An understanding of the topics covered in the following courses is also recommended:
    • NSE 5 FortiManager
    • NSE 6 FortiAuthenticator
    • NSE 6 Integrated and Cloud Wireless

titleWindows Server 2019 Administration
days5
seo_titleWindows Server 2019 Administration Training
seo_dec
seo_tkey
categorywindows-server
vendorMicrosoft

techonogy
overviewThis five days instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations.
objective
outline

Module 1: Windows Server Administration Overview
This module describes how to distinguish different Windows Server 2019 editions and techniques for deployment, servicing and activation. The module also introduces Windows Server Core and compares it with the Desktop Experience version. The module describes tools and concepts for adminstering Windows Server, such as Windows Admin Center, PowerShell, and delegation of privileges.
Lessons

  • Overview of Windows Server administration principles and tools
  • Introducing Windows Server 2019
  • Windows Server Core Overview

Lab : Deploying and configuring Windows Server

  • Deploying and configuring Server Core
  • Implementing and using remote server administration

After completing this module, students will be able to:

  • Describe Windows Server as well as techniques for deployment, servicing and activation.
  • Describe Windows Server Core, its specifics and ways to administer it.

Module 2: Identity Services in Windows Server
This module introduces identity services and describes Active Directory Domain Services (AD DS) in a Windows Server environment. The module describes how to deploy domain controllers in AD DS, as well as the Azure Active Directory (AD) and the benefits of integrating Azure AD with AD DS. The module also covers Group Policy basics and how to configure group policy objects (GPOs) in a domain environment. Finally, the modules describes the role of Active Directory certificate services and certificate usage.

Lessons

  • Overview of AD DS
  • Deploying Windows Server domain controllers
  • Overview of Azure AD
  • Implementing Group Policy
  • Overview of Active Directory Certificate Services

Lab : Implementing identity services and Group Policy

  • Deploying a new domain controller on Server Core
  • Configuring Group Policy
  • Deploying and using certificate services

After completing this module, students will be able to:

  • Describe AD DS in a Windows Server environment.
  • Deploy domain controllers in AD DS.
  • Describe Azure AD and benefits of integrating Azure AD with AD DS.
  • Explain Group Policy basics and configure GPOs in a domain environment
  • Describe the role of Active Directory certificate services and certificate usage

Module 3: Network Infrastructure services in Windows Server
This module describes how to implement core network infrastructure services in Windows Server. The modules covers how to deploy, configure and manage DNS and IPAM. The modules also describes how to use Remote Access Services.
Lessons

  • Deploying and managing DHCP
  • Deploying and managing DNS services
  • Deploying and managing IPAM

Lab : Implementing and configuring network infrastructure services in Windows Server

  • Deploying and configuring DHCP
  • Deploying and configuring DNS

After completing this module, students will be able to:

  • Describe, deploy and configure DHCP service.
  • Deploy, configure and manage DNS.
  • Describe, deploy and manage IPAM.

Module 4: File Servers and Storage management in Windows Server
This modules describes how to configure file servers and storage in Windows Server. The module covers file sharing and deployment of Storage Spaces technology. The module describes how to implement data deduplication, iSCSI based storage in Windows Server, and finally, how to deploy DFS.

Lessons

  • Volumes and file systems in Windows Server
  • Implementing sharing in Windows Server
  • Implementing Storage Spaces in Windows Server
  • Implementing Data Deduplication
  • Implementing iSCSI
  • Deploying Distributed File System

 

  • Implementing Data Deduplication
  • Configuring iSCSI storage
  • Configuring redundant storage spaces
  • Implementing Storage Spaces Direct

After completing this module, students will be able to:

  • Implement sharing in Windows Server
  • Deploy Storage Spaces technology
  • Implement the data deduplication feature
  • Implement iSCSI based storage
  • Deploy and manage Distributed File System (DFS)

Module 5: Hyper-V virtualization and containers in Windows Server
This modules describes how to implement and configure Hyper-V VMs and containers. The module covers key features of Hyper-V in Windows Server, describes VM settings, and how to configure VMs in Hyper-V. The module also covers security technologies used with virtualization, such as shielded VMs, Host Guardian Service, admin-trusted and TPM-trusted attestation, and KPS.

Lessons

  • Hyper-V in Windows Server
  • Configuring VMs
  • Securing virtualization in Windows Server
  • Containers in Windows Server
  • Overview of Kubernetes

Lab : Implementing and configuring virtualization in Windows Server

  • Creating and configuring VMs
  • Installing and configuring containers

After completing this module, students will be able to:

  • Describe the key features of Hyper-V in Windows Server.
  • Describe VM settings and deploy and configure VMs in Hyper-V.
  • Explain the use of security technologies for virtualization.
  • Describe and deploy containers in Windows Server.
  • Explain the use of Kubernetes on Windows.

Module 6: High Availablity in Windows Server
This module describes current high availability technologies in Windows Server. The module describes failover clustering and considerations for implementing it, and how to create and configure failover clustering. The module also explains stretch clusters and options for achieving high availability with Hyper-V VMs.

Lessons

  • Planning for failover clustering implementation
  • Creating and configuring failover cluster
  • Overview of stretch clusters
  • High availability and disaster recovery solutions with Hyper-V VMs

Lab : Implementing failover clustering

  • Configuring iSCSI storage
  • Configuring a failover cluster
  • Deploying and configuring a highly available file server
  • Validating the deployment of the highly available file server

After completing this module, students will be able to:

  • Describe failover clustering and the considerations for implementing it.
  • Create and configure failover clusters.
  • Describe stretch clusters.
  • Describe options to achieve high availability with Hyper-V VMs.

Module 7: Disaster recovery in Windows Server
This module describes disaster recovery technologies in Windows Server and how to implement them. The module covers how to configure and use Hyper-V Replica and describes Azure Site Recovery. The module also covers how to implement Windows Server backup and describes the Azure Backup service.
Lessons

  • Hyper-V Replica
  • Backup and restore infrastructure in Windows Server

Lab : Implementing Hyper-V Replica and Windows Server Backup

  • Implementing Hyper-V Replica
  • Implementing backup and restore with Windows Server Backup

After completing this module, students will be able to:

  • Describe and implement Hyper-V Replica.
  • Describe Azure Site Recovery.
  • Describe and implement Windows Server backup.
  • Describe the Azure Backup service.

Module 8: Windows Server security
This module describes Windows Server security features and how to implement them. The module covers credentials used in Windows Server and explains how to implement privileged access protection. In addition to describing methods and technologies for hardening Windows Server security, the module explains how to configure Just Enough Administration (JEA) and how to secure SMB traffic. Finally, the module covers Windows Update, its deployment and management options.

Lessons

  • Credentials and privileged access protection in Windows Server
  • Hardening Windows Server
  • Just Enough Administration in Windows Server
  • Securing and analyzing SMB traffic
  • Windows Server update management

Lab : Configuring sercurity in Windows Server

  • Configuring Windows Defender Credential Guard
  • Locating problematic accounts
  • Implementing LAPS

After completing this module, students will be able to:

  • Describe credentials used in Windows Server.
  • Explain how to implement privileged access protection.
  • Describe methods and technologies to harden security in Windows Server.
  • Describe and configure Just Enough Administration (JEA).
  • Secure SMB traffic in Windows Server.
  • Describe Windows Update and its deployment and management options.

Module 9: Remote Desktop Services in Windows Server
This module describes key Remote Desktop Protocol (RDP) and Virtual Desktop Infrastructure (VDI) features in Windows Server. The modules covers how to deploy session-based desktops and describes personal and poled virtual desktops.

Lessons

  • Remote Desktop Services Overview
  • Configuring a session-based desktop deployment
  • Overview of personal and pooled virtual desktops

Lab : Implementing RDS in Windows Server

  • Implementing RDS
  • Configuring RemoteApp collection settings
  • Configuring a virtual desktop template

After completing this module, students will be able to:

  • Describe Remote Desktop Services (RDS) in Windows Server.
  • Describe and deploy session-based desktops.
  • Describe personal and pooled virtual desktops.

Module 10: Remote access and web services in Windows Server
This module describes how to implement virtual private networks (VPNs), Network Policy Server (NPS), and Microsoft Internet Information Services (IIS). The module provides an overview of remote access services and describes Always On VPN functionality, as well as how to configure NPS and Web Server (IIS) in Windows Server.

Lessons

  • Overview of RAS in Windows Server
  • Implementing VPNs
  • Implementing NPS
  • Implementing Always On VPN
  • Implementing Web Server in Windows Server

Lab : Deploying network workloads

  • Implementing Web Application Proxy
  • Implementing VPN in Windows Server
  • Deploying and Configuring Web Server

After completing this module, students will be able to:

  • Describe VPN options in Windows Server.
  • Describe Always On VPN functionality.
  • Describe and configure NPS.
  • Describe and configure Web Server (IIS).

Module 11: Monitoring, performance, and troubleshooting
This module describes how to implement service and performance monitoring, and apply troubleshooting in Windows Server. The module highlights monitoring tools and describes how to monitor performance, including event logging and how to perform event logging monitoring for troubleshooting purposes.

Lessons

  • Overview of Windows Server monitoring tools
  • Using Performance Monitor
  • Monitoring event logs for troubleshooting

Lab : Monitoring and troubleshooting Windows Server

  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs
  • Identifying the source of a performance problem
  • Describe monitoring tools in Windows Server.
  • Describe performance monitoring and use it in Windows Server.
  • Describe event logging and perform event logging monitoring for troubleshooting purposes.

Module 12: Upgrade and migration in Windows Server
This module describes how to perform upgrades and migrations for AD DS, Storage, and Windows Server. The module covers tools to use for AD DS migration. The module also covers the Storage Migration Service, and finally, Windows Server migration tools and usage scenarios.

Lessons

  • AD DS migration
  • Storage Migration Service
  • Windows Server migration tools

Lab : Migrating Server workloads

  • Selecting a process to migrate server workloads
  • Planning how to migrate files by using Storage Migration Service

After completing this module, students will be able to:

  • Describe tools to use for AD DS migration.
  • Describe the Storage Migration Service.
  • Describe Windows Server migration tools and their usage scenarios.

target_au

This course is intended for Information Technology (IT) Professionals who have some experiencing working with Windows Server and are looking for a single five-day course that covers core administration components and technologies in Windows Server 2019. This course also helps server administrators from previous Windows Server versions to update their knowledge and skills related to Windows Server 2019. Additionally, this course can help individuals looking for preparation materials to pass exams related to Windows Server. The course is also to individuals from a service desk role who wish to transition into server maintenance.


pre_req
  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
  • Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
  • An awareness of basic security best practices.
  • Experience working hands-on with Windows client operating systems such as Windows 8, Windows 8.1 or Windows 10.
  • Basic experience with Windows PowerShell.

titleIJAUT – Introduction to Junos Platform Automation and DevOps
days3
seo_titleIJAUT - Introduction to Junos Platform Automation and DevOps Course Training
seo_dec
seo_tkey
categorydevops
vendorJuniper

techonogyJuniper
overviewThis three-day course demonstrates how to automate the Junos OS using DevOps automation tools, protocols, and technologies. This course introduces basic DevOps principles, Junos APIs, and the Network Configuration Protocol (NETCONF). It focuses on using Python, Junos PyEZ, Ansible, and the Junos Representational State Transfer (REST) API to automate Junos platforms. Extensible Markup Language (XML), JavaScript Object Notation (JSON), and YAML Ain't Markup Languate (YAML) are introduced as data formats that facilitate Junos automation. Through demonstrations and hands-on labs, students will gain experience automating the Junos operating system. This course uses Junos OS Release 20.2R2.11, Python 3.6.8, Junos PyEZ 2.54, and Ansible 2.9.5. Associated Certification: Automation and DevOps, Associate (JNCIA-DevOps)
objective
  • Describe DevOps principles and practices.
  • Explain how DevOps benefits an IT organization.
  • Discuss Network Reliability Engineering.
  • List and describe the various APIs Junos provides for automation.
  • Discuss the frameworks, libraries and tools used to automate Junos devices.
  • Describe XML document format.
  • Explain how the Junos OS uses XML.
  • Use XPath to navigate a Junos XML document.
  • Describe the NETCONF protocol.
  • Use NETCONF and the XML API to issue Junos RPCs.
  • List available XML API programming languages.
  • Configure Junos device using NETCONF.
  • Describe JSON syntax.
  • Explain how JSON is used in Junos.
  • Describe YAML syntax.
  • Explain how Junos automation tools use YAML.
  • Use JSON and YAML documents.
  • Verify an Ansible installation.
  • Retrieve information from Junos devices using Ansible.
  • Use Ansible to configure Junos devices.
  • Explain fundamental Python concepts.
  • Use the Python 3 interactive interpreter.
  • Modify and run Python scripts.
  • Install Junos PyEZ.
  • Use Junos PyEZ to connect to Junos devices and retrieve facts.
  • Use Junos PyEZ to execute Junos RPCs.
  • Use Junos PyEZ to modify Junos device configuration.
  • Describe Python exception handling with PyEZ.
  • Describe the capabilities of the Junos OS REST API.
  • Generate REST API RPC queries.
  • Use the REST API Explorer.
  • Describe the Junos operating system and its basic design architecture.
  • Explain transit and exception traffic processing.
  • Describe the Junos CLI and its features.
  • List and perform initial configuration tasks.
  • Describe interface types and perform basic interface configuration tasks.

outline

DAY 1

1. Course Introduction

2. Introduction to DevOps

  • Why DevOps?
  • The Benefits of DevOps

3. Junos Automation

  • The Junos Automation Stack
  • Junos XML API Overview
  • Junos REST API Overview
  • Junos JET API Overview
  • Overview of Junos Automation Tools

4. XML and XPath

  • Basic XML Syntax
  • XML in the Junos OS
  • Navigating XML using XPath

Lab 1: XML and XPath

DAY 2

5. XML and NETCONF

  • NETCONF
  • Junos XML API
  • Junos XML API Programming Languages

Lab 2: XML and NETCONF

6. Python Fundamentals

  • Python Basics
  • Data Types and Variables
  • Lists, Dictionaries, Sets, and Tuples
  • Python Libraries
  • Python Script Examples

Lab 3: Python Fundamentals

7. Junos PyEZ Operations

  • Junos PyEZ
  • Execute Junos RPCs
  • Perform Device Operations

Lab 4: Junos PyEZ Operations

DAY 3

8. Junos PyEZ Configuration

  • Junos PyEZ Configuration
  • Junos PyEZ Exception Handling
  • Junos PyEZ and Jinja2

Lab 5: Junos PyEZ Configurationm

9. JSON and YAML

  • Data Formatting
  • JSON Basics
  • JSON Support in Junos
  • YAML Basics
  • Junos Automation and YAML

Lab 6: JSON and YAML

10. Junos REST API

  • REST API Overview
  • Configuring the REST API
  • Using the REST API
  • REST API Explorer

Lab 7: Junos REST API

A Appendix: Introduction to Junos

  • Junos OS Basic Design Architecture
  • Traffic Processing
  • CLI Modes and Features
  • Initial Configuration Tasks
  • Interface Types and Configuration

Lab 8: Introduction to Junos

B. Appendix: Introduction to Ansible

  • Ansible Architecture and Capabilities
  • Ansible Playbook Basics
  • Using Ansible to Retrieve Junos Status Information
  • Using Ansible to Retrieve and Modify Configuration

Information

Lab 9: Ansible


target_au

Individuals responsible for configuring and monitoring devices running the Junos OS


pre_req
  • Basic understanding of the OSI model and the TCP/IP protocol suite
  • Basic understanding of computer networking concepts

titleIJSEC – Introduction to Juniper Security
days3
seo_titleIJSEC - Introduction to Junos Security Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorJuniper

techonogyJuniper
overviewThis three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos security devices. The course provides a brief overview of the Juniper security products and discusses the key architectural components of the Junos software. Key topics include UI options with a heavy focus on CLI, configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos Security devices. The course then delves into foundational knowledge of security objects, security policies, and configuration examples including types of security objects, security policies, security services NAT, site-to-site IPsec VPN, and Juniper Secure Connect VPN. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring Junos OS and monitoring basic device operations on the SRX Series device. This course is based on Junos OS Release 21.2R1.10. Associated Certification: Security, Associate (JNCIA-SEC)
objective
  • Describe Juniper Networks connected security device framework
  • Describe SRX Series device features
  • Describe initial and basic configuration
  • Describe and demonstrate the Junos CLI options
  • Configure security zone and screen objects
  • Configure address and service objects
  • Implement security policies
  • Describe IPS and implement IPS policies
  • Describe user-based firewall and implement integrated user-based firewall
  • Describe UTM—antivirus and antispam
  • Describe UTM—content filtering and Web filtering
  • Describe JATP Cloud features
  • Implement Source NAT
  • Implement Destination and Static NAT
  • Implement site-to-site IPsec VPN
  • Describe SSL VPN by using Juniper Secure Connect
  • Administer and troubleshoot security services on an SRX Series device
  • Describe monitoring and reporting features on the SRX Series device

outline

DAY 1

1. Course Introduction

2. Juniper Connected Security

  • Identify the high-level security challenges in today’s network
  • Describe basic network security design
  • Identify the key factors in Juniper Networks security focus

3. Juniper SRX Series Overview

  • Describe the Junos architecture and SRX features
  • Explain the traffic processing and logical packet flow on an SRX Series device
  • Describe the Junos J-Web UI and its features

4. Juniper SRX Initial Configuration

  • List and perform initial configuration tasks
  • Perform basic interface configuration tasks

Lab 1: Initial System Configuration

5. UI Options – The Junos CLI

  • Perform Junos CLI basics
  • Describe Junos operational mode
  • Describe Junos configuration mode

6. Security Zones and Screen Objects

  • Describe and configure security zones objects
  • Describe and configure screen objects

7. Address Objects and Service Objects

  • Describe and configure address objects
  • Describe and configure service objects

Lab 2: Creating Security Objects

DAY 2

8. Security Policies

  • Describe the purpose and types of security policies
  • Define the security policy components
  • Configure an application firewall with unified security policies
  • Implement security policy for a given use case

Lab 3: Creating Security Policies

9 Security Services—IPS

  • Explain the purpose of IPS
  • Define the IPS policy components
  • Configure IPS policies

10. Security Services—Integrated User-Based Firewall

  • Explain the purpose of user-based firewall
  • Configure integrated user-based firewall

Lab 4: Security Services—IPS Integrated User Firewall

11. UTM—Antivirus and Antispam

  • Describe the purpose of UTM services
  • Explain antispam and its functionality

12. UTM—Content Filtering and Web Filtering

  • Explain the functionality of Content filtering
  • Explain the functionality of Web filtering

Lab 5: Implementing UTM Virtual SRX

13. Juniper Connected Security—JATP Cloud

  • Explain the purpose of JATP
  • Describe the features of JATP
  • Describe the process to enroll devices with JATP Cloud
  • Monitor JATP

Lab 6: JATP Overview

DAY 3

14. Source Network Address Translation

  • Describe the purpose and functionality of NAT and PAT
  • Configure and monitor source NAT
  • Explain the purpose of proxy ARP

15. Destination Network Address Translation and Static Network Address Translation

  • Configure and monitor destination NAT
  • Configure and monitor static NAT

Lab 7: Implementing NAT

16 Site-to-Site IPsec VPN

  • Describe the high-level overview and configuration options for IPsec VPN
  • Implement IPsec VPN for a given use case
  • Describe the functionality of proxy-id and traffic selectors
  • Monitor site-to-site IPsec VPN

Lab 8: Implementing IPsec VPN

17. Juniper Secure Connect

  • Describe Juniper Secure Connect features
  • Explain Juniper Secure Connect UI options
  • Deploy Juniper Secure Connect
  • Monitor Juniper Secure Connect

Lab 9: Implementing Juniper Secure Connect

18. SRX Troubleshooting

  • Discuss SRX and vSRX licensing
  • Describe how to use packet capture
  • Describe the traceoptions on the SRX Series device
  • Discuss how to verify Content Security policy usage

19. Monitoring and Reporting

  • Explain the basic monitoring features
  • Explain the use of network utility tools on the SRX Series device
  • Describe the procedure of maintaining Junos OS
  • Identify the various reports available on SRX J-Web interface

Lab 10: Monitoring and Reporting

APPENDICES

A. SRX Series Hardware and Interfaces

B. Virtual SRX

C. Juniper Sky Enterprise

D. IPsec VPN Concepts


target_au

This course benefits individuals responsible for configuring and monitoring Juniper Security devices


pre_req
  • Basic networking knowledge
  • Basic understanding of the Open Systems Interconnection (OSI) reference model
  • Basic understanding of the TCP/ IP protocol suite

titleJCF – Juniper Cloud Fundamentals
days3
seo_titleJCF - Juniper Cloud Fundamentals Course Training
seo_dec
seo_tkey
categorycloud-computing
vendorJuniper

techonogyCloud Computing
overviewThis three-day course is designed to provide students with the foundational knowledge required to work with Juniper Contrail. The course summarizes cloud concepts, virtual networks, and cloud management. Key topics include fundamental cloud concepts, Linux virtualization, network virtualization, software defined networking (SDN), Network Functions Virtualization (NFV), and an introduction to OpenStack, Kubernetes, and Contrail. Associated Certification: Cloud, Associate (JNCIA-Cloud)
objective
  • Identify fundamental cloud concepts
  • Identify the concepts of Linux virtualization
  • Identify the concepts of Linux namespaces
  • Identify the concepts of containerization
  • Identify the basics of Network Virtualization
  • Introduction to NFV and SDN
  • Introduction to OpenStack
  • Identify the key concepts of OpenStack Configuration
  • Identify the basics of OpenStack Networking
  • Identify the basics of Kubernetes
  • Describe Kubernetes interfaces Identify the key concepts of Kubernetes configuration
  • Introduction to Juniper Cloud Native Contrail Networking
  • Identify the basics of Cloud Native Contrail Networking configuration

outline

DAY 1

1. Course Introduction

2. Fundamental Cloud Concepts

  • Identify key cloud concepts
  • Describe components of cloud architecture
  • Identify Juniper solutions for cloud infrastructure

3. Linux Virtualization

  • Overview of the Linux architecture
  • Describe the concept of Linux virtualization

Lab 1: Linux Virtualization

4. Linux Namespaces

  • Overview of the Linux containment features
  • Describe the concept of network namespaces
  • Describe the concept of Linux bridging

Lab 2: Linux Namespaces

5. Containerization

  • Describe containerization using Docker
  • Describe Docker networking

Lab 3: Containerization Lab 4: cSRX

6. Network Virtualization

  • Describe concepts of virtual networks
  • Describe how to extend virtual network

Lab 5: Network Virtualization

DAY 2

7. Network Functions Virtualization and Software-Defined Networking

  • Describe the concepts of Software-defined networking (SDN)
  • Describe the concepts of Network Functions Virtualization (NFV)

8. Introduction to OpenStack

  • Describe the OpenStack fundamentals
  • Describe OpenStack UI

Lab 6: OpenStack Configuration—WebUI

9. OpenStack Configuration

  • Identify the OpenStack interfaces
  • Describe the OpenStack orchestration concepts
  • Describe how to create instances in OpenStack

Lab 7: OpenStack Configuration—CLI

10. OpenStack Networking

  • Describe OpenStack networks and security groups
  • Describe OpenStack routing
  • Describe the concept of Floating IP addresses and load balancing

Lab 8: OpenStack Networking

DAY 3

11. Introduction to Kubernetes

  • Overview of Kubernetes fundamentals

Lab 9: Kubernetes Basics

12 Kubernetes Networking

  • Describe how to provision a Kubernetes cluster
  • Describe Kubernetes networking

Lab 10: Kubernetes Networking

13. Introduction to Cloud Native Contrail Networking

  • Overview of Contrail Networking
  • Describe the features of Contrail Networking

14. Contrail Basic Configuration

  • Overview of the installation requirements
  • Explore the Contrail UI
  • Describe how to create a virtual network in Contrail
  • Describe how to create basic security controls

Lab 11: Contrail Basic Configuration


target_au

Individuals responsible for planning and coordinating cloud enabled networks and services in data center, private cloud, public cloud, hybrid cloud, service provider, and enterprise WAN environments.


pre_req
  • Basic TCP/IP skills
  • Basic network understanding
  • General understanding of data center environments
  • General understanding of enterprise WAN environments
  • Basic understanding of virtualization
  • Completion of the Getting Started with Cloud eLearning course

titleCAC – Cloud Automation Using Contrail
days5
seo_titleCAC - Cloud Automation Using Contrail Course Training
seo_dec
seo_tkey
categorycloud-computing
vendorJuniper

techonogyCloud Computing
overviewThis five-day course is designed to provide students with the knowledge required to work with the Juniper Contrail Enterprise Multicloud (CEM) solution. Students will gain in-depth knowledge of how to use the Contrail Command user interface, Contrail Networking, Contrail’s fabric management and administration features, Contrail Security, and the analytics features of Contrail Insights. Students will also learn to use APIs and the CLI to perform the Contrail configuration tasks. Through demonstrations and hands-on labs, students will gain experience with the features of Contrail and Insights. This course is based on Contrail Release 2011. Associated Certification: Cloud, Specialist (JNCIS-Cloud)
objective
  • Explain the role of Contrail SDN Controller.
  • List available Contrail solutions.
  • Describe the purpose of an orchestrator.
  • Describe the basics of Kubernetes.
  • Describe the basics of VMware vCenter
  • Identify the function of each of the main OpenStack Projects.
  • Describe the purpose of Contrail.
  • Explain how the versions of Contrail differ.
  • Discuss Contrail related solutions.
  • Describe the functions of the Contrail vRouter and Contrail Controller.
  • Explain the role of the control, configuration, and analytic nodes.
  • Describe how to monitor the Contrail cluster health.
  • Configure and deploy virtual DNS and IPAMs.
  • Create virtual networks.
  • Create network policies to control the flow of traffic.
  • Explain the routing behavior of an IP Fabric.
  • Describe the steps to onboard a Brownfield IP Fabric.
  • Describe the steps to onboard a Greenfield IP Fabric.
  • Describe the steps to add a device to an existing fabric.
  • Describe the various commands to troubleshoot the onboarding of an IP Fabric.
  • Explain the benefits of VXLAN in the data center.
  • Describe EVPN signaling for VXLAN.
  • Describe how CEM can bridge between a VM and a BMS.
  • Implement bridging between VMs and BMSs using VXLAN and EVPN signaling.
  • Describe EVPN signaling for VXLAN routing in the Spine.
  • Describe how to enable central routing using CEM.
  • Describe EVPN signaling for DCI.
  • Describe how to enable DCI using CEM.
  • Create physical gateways.
  • Connect to a third-party physical device.
  • Implement fabric administration operations.
  • Describe architecture and capabilities of Contrail Security.
  • Configure main Contrail Security Tags.
  • Configure Contrail Security Policies and Policy Sets.
  • Explain the benefits of Contrail Insights.
  • Explain the operation and use of Contrail Insights.
  • Explain the purpose and use of the different Insights features.
  • Configure Contrail Insights alarms and composite alarms.
  • Describe how to use the Contrail Insights dashboard to examine the state of the network.
  • Use Contrail Insights Charts to monitor Contrail and OpenStack workloads.
  • Explain the benefits of Contrail Insights capacity planning.
  • Explain how to use Contrail Insights heat maps.
  • Create Contrail Insights reports and service monitoring functionalities.
  • Create Contrail Insights alarms and Composite alarms.
  • Explain the purpose of JTI.
  • Discuss native JTI sensors.
  • Explain OpenConfig and gRPC sensors.
  • Configure native JTI and OpenConfig sensors to work with Contrail Insights.

outline

DAY 1

1. Course Introduction

2. Describe SDN and Contrail Basics

  • Describe the main principles of software-defined networks
  • List the features and advantages of Contrail
  • List Contrail family of products

3. Describe Contrail Use Cases and Use Contrail

  • Describe Contrail Use Case
  • Demonstrate the Basic Functions of Contrail Command

LAB 1: Contrail Command Walk-Through

4. Describe Orchestration Fundamentals Command

  • Describe the purpose of an orchestrator
  • Describe the basics of Kubernetes
  • Describe the basics of VMware vCenter

5. Describe OpenStack Basics

  • Identify the function of the primary OpenStack Projects

LAB 2: Instantiating Virtual Workloads

DAY 2

6. Describe Contrail Architecture Fundamentals

  • Describe the functions of the Contrail vRouter
  • Describe the functions of the Contrail SDN Controller
  • Describe containerized Contrail modules

7. Describe Contrail Communication Fundamentals

  • Describe Contrail Control Plane Communications
  • Describe Contrail Data Plane Communications

8. Describe Basic Contrail Troubleshooting

  • Perform Basic Contrail Troubleshooting

LAB 3: Exploring and Troubleshooting the Contrail vRouter and SDN Controller

9. Describe Contrail Configuration Basics

  • Explain Contrail Configuration Methods
  • Describe Configuring the Metadata Service
  • Describe Contrail Configuration API

10. Configure Tenant Communications

  • Configure DNS and IPAM
  • Implement Virtual Networks
  • Implement Network Policies and Security Groups

LAB 4: Configuring Virtual Networks and Policies

11. Describe an IP Fabric and Implement Greenfield Automation

  • Describe an IP Fabric
  • Describe a Greenfield Fabric Automated Creation

LAB 5: Greenfield Automation

12. Implement IP Brownfield Automation and Fabric Modification

  • Describe a Brownfield Fabric Automated Creation
  • Describe How to Modify Existing Fabrics
  • Describe Troubleshooting a Fabric Automation

LAB 6: Modify a Greenfield Automation

DAY 3

13. Describe VXLAN

  • Describe VXLANs
  • Describe EVPN Signaling for BMS to BMS VXLAN Forwarding

14. Describe VM to BMS Bridging

  • Describe Contrail VM to BMS Bridging
  • Implement a Server/Instance Example
  • Implement Virtual Port Groups

LAB 7: VM to BMS Bridging

15. Implement VXLAN Central Routing

  • Describe EVPN Signaling for Central Routing
  • Configure a Central Routing Example

LAB 8: VXLAN Central Routing

16. Implement VXLAN Edge Routing

  • Describe EVPN Signaling for Edge Routing
  • Configure an Edge Routing Example

LAB 9: VXLAN Edge Routing

17. Implement a Data Center Interconnect

  • Describe Data Center Interconnect
  • Describe DCI Options for a VXLAN Overlay Using Contrail Automation
  • Configure a DCI Example Using Contrail Automation

LAB 10: Data Center Interconnect

DAY 4

18. Describe Interacting With External Networks

  • Describe a DC Gateway Use Case
  • Implementing a DC Gateway
  • Describe Connecting to a Third-Party Device Use Case
  • Configure Connecting to a Third-Party Device

Lab 11: DC Gateway

19. Implement Fabric Administration

  • Use Contrail Command Fabric Administration Functions
  • Path Finder
  • Telemetry Profile
  • Onboard Devices
  • View Fabric Configurations
  • Custom Actions

Lab 12: Fabric Administration

20. Implement Fabric Maintenance

  • Use Contrail Command Fabric Maintenance Functions
  • Remove Fabric device
  • Return Material Authorization
  • Maintenance Mode
  • Hitless Fabric Upgrade

Lab 13: Maintenance Mode and Fabric Device Upgrade

21. Describe Contrail Security

  • Describe the Need for Contrail Security
  • Configure Contrail Security

Lab 14: Contrail Security

DAY 5

22 Describe Contrail Insights

  • Describe Contrail Insights
  • Use Contrail Insights
  • Describe Contrail Insights API

23. Implement Contrail Insights Alarms

  • Implement Alarms
  • Implement Composite Alarms

LAB 15: Implementing insights Features

24. Describe Junos Telemetry Interface

  • Describe JTI
  • Describe Native Sensors for JTI
  • Describe OpenConfig and gRPC Sensor

target_au

This course benefits individuals responsible for working with software-defined networking solutions in data center, service provider, and enterprise network environments.


pre_req
  • Basic TCP/IP skills
  • General understanding of data center virtualization
  • Basic understanding of the Junos operating system
  • Completion of the Junos Cloud Fundamentals (JCF) course or equivalent knowledge
  • Recommended: Completion of the Data Center Fabric with EVPN and VXLAN (ADCX) course or equivalent knowledge
  • Recommended: Basic knowledge of object- oriented programming and Python scripting

titleJND-DC – Juniper Networks Design – Data Center
days5
seo_titleJND-DC - Juniper Networks Design - Data Center Course Training
seo_dec
seo_tkey
categorydata-center
vendorJuniper

techonogyDatacenter & Virtualization
overviewThis five-day course is designed to cover best practices, theory, and design principles for data center design including data center architectures, data center interconnects, security considerations, virtualization, and data center operations. Associated Certification: Data Center Design, Specialist (JNCDS-DC)
objective
  • Describe high-level concepts about different data center architectures.
  • Identify features used to interconnect data centers.
  • Describe key high-level considerations about securing and monitoring a data center deployment.
  • Outline key high-level concepts when implementing different data center approaches.
  • Describe data center cooling designs and considerations.
  • Explain device placement and cabling requirements.
  • Outline different data center use cases with basic architectures.
  • Describe a traditional multitier data center architecture.
  • Explain link aggregation and redundant trunk groups.
  • Explain multichassis link aggregation.
  • Summarize and discuss key concepts and components of a Virtual Chassis.
  • Summarize and discuss key concepts and components of a VCF.
  • Summarize and discuss key concepts and components of Junos Fusion.
  • Describe the reasons for the shift to IP fabrics.
  • Describe the design considerations for routing in an IP Fabric.
  • Describe how to scale an IP fabric.
  • Describe the design considerations for an Overlay network.
  • Define the term Data Center Interconnect.
  • List differences between the different Layer 2 and Layer 3 DCIs.
  • Summarize and discuss the benefits and use cases for EVPN.
  • Discuss the security requirements and design principles of the data center.
  • Identify the security elements of the data center.
  • Describe network security implementation options in the data center.
  • Discuss network security functionality in the data center.
  • Explain the purpose of SDN.
  • Explain the function of Contrail.
  • Describe the purpose of NFV.
  • Discuss the purpose and function of vSRX and vMX.
  • Explain how to collect analytics in the SDN data center.
  • Discuss the importance of understanding the baseline behaviors in our data center.
  • Describe the Junos Space Network Management Platform and its deployment options.
  • Describe the importance of analytics.
  • Discuss automation in the data center.
  • Discuss the benefits of QoS and CoS.
  • Describe the benefits of a converged network.
  • Identify general aspects of data center migration.
  • Describe some best practices for migration planning.
  • Outline some common migration scenarios.
  • Describe high availability design considerations in the data center.
  • Provide an overview of high availability offerings and solutions in the data center.

outline

DAY 1

1. Course Introduction

2. Overview of Data Center Design

  • Initial Considerations
  • Architectures and Design Considerations
  • Connecting Data Centers
  • Security and Operation
  • Implementation Considerations

3. Initial Design Considerations

  • Physical Layout and Placement
  • Environmental Conditions
  • Cabling Options
  • Data Center Use Cases

4. Traditional Data Center Architecture

  • Traditional Multitier Architecture
  • Link Aggregation and Redundant Trunk Groups
  • Multichassis Link Aggregation

Lab: Designing a Multitier Architecture

DAY 2

5. Ethernet Fabric Architectures

  • Virtual Chassis
  • Virtual Chassis Fabric
  • Junos Fusion
  • Ethernet Fabric Design Consideration

Lab: Ethernet Fabric Architectures

DAY 3

6. IP Fabric Architecture

  • The Shift to IP Fabrics
  • IP Fabric Routing Design
  • IP Fabric Scaling
  • Overlay Netowrk

Lab: IP Fabric Architecture

7. Data Center Interconnect

  • DCI Overview
  • Layer 2 DCI
  • EVPN Use Cases
  • Layer 3 DCI

Lab: Data Center Interconnect

DAY 4

8. Securing the Data Center

  • Overview of Data Center Security
  • Network Security Elements
  • Network Security in the Data Center
  • Network Security Functions in the Data Center

Lab: Securing the Data Center

9. SDN and Virtualization in the Data Center

  • SDN Overview
  • Using Contrail in the Data Center
  • Using NFV in the Data Center
  • Understanding Contrail in the Data Center
  • Virtual Environments in the Data Center
  • Collecting Analytics with AppFormix

Lab: SDN and Virtualization

10 Data Center Operation

  • Understanding Baseline Behaviors
  • Junos Space and JSA
  • Understanding Logging and Analytics
  • Deploying Automation in the Data Center

Lab: Operating a Data Center

DAY 5

11. Traffic Prioritization for Converged Networks

  • Understanding QoS and CoS
  • Converging Networks

Lab: Prioritizing Data in the Data Center

12. Migration Strategies

  • Migration Overview
  • Common Scenarios
  • Migration Case Study

13 High Availability

  • Data Center High Availability Overview
  • Link Level and Physical Device Redundancy
  • Device-Level Redundancy

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of design for the data center.


pre_req
  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Basic knowledge of hypervisors and load balancers.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

titleJND-SEC – Juniper Networks Design – Security
days5
seo_titleJND-SEC - Juniper Networks Design Security Course Training
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for security design, including traditional and modern security principles such as security design specifics for campus and branch, enterprise wide area network (WAN), service provider WAN, and data center deployments. This course also includes design principles for security management, automation, and virtualization. Associated Certification: Automation and DevOps, Associate (JNCIA-DevOps)
objective
  • Identify high level security challenges with different design architectures.
  • Explain the value of implementing security solutions in any network design.
  • Identify key factors in Juniper Networks security focus.
  • List and describe the security platforms and solutions offered by Juniper Networks.
  • Perform the steps necessary to identify customer security requirements.
  • Explain what is required to define the scope of the security design.
  • Identify the data required to perform a data analysis of the customer’s existing network and use that information in the design.
  • Describe traditional security practices used to secure a network.
  • Explain the added capabilities that next generation firewalls provide.
  • Explain the evolution of modern security models.
  • Describe intelligent networks.
  • Explain how Software-Defined Secure Networking improves security in network design.
  • Explain the need for centralized Security Management.
  • Describe what Junos Space Security Director can do to manage network security.
  • Describe the function of Juniper Secure Analytics in managing network security.
  • List the main components of the Juniper Automation Stack.
  • Explain Juniper Networks automation solutions.
  • Describe the benefits of automating security.
  • Describe how security works in a virtualized environment.
  • Explain the benefits of service chaining.
  • Describe Juniper Virtual SRX and Container SRX products.
  • Describe network virtualization with VMware NSX.
  • Describe the benefits of HA with security devices.
  • Discuss how to handle asymmetric traffic with security devices.
  • Describe different options for SRX chassis cluster deployments.
  • Describe the main security concerns for the campus and the branch networks.
  • Explain end-to-end security concepts.
  • Describe security functions at different network layers.
  • Explain network authentication and access control concepts.
  • Describe common campus and branch network security design examples.
  • Describe security considerations for the enterprise WAN.
  • Explain when to use IPsec and NAT in the enterprise WAN.
  • Explain virtual router applications for the enterprise WAN.
  • Discuss security best practices in the enterprise WAN.
  • Describe security in the service provider WAN.
  • Discuss security best practices for the service provider WAN.
  • Discuss the security requirements and design principles of the data center.
  • Describe the security elements of the data center.
  • Describe network security implementation options in the data center.
  • Discuss network security functionality in the data center.

outline

Day 1

1. COURSE INTRODUCTION

2. Security in Network Design

  • The Value of Security in Network Design
  • Juniper’s Security Focus

3. Assessing Security in Network Design

  • Overview
  • Customer Security Requirements
  • Customer Scope
  • Data Analysis

4. Traditional Security Architectures

  • Traditional Security Practices
  • NAT
  • IPsec VPNs
  • Next Generation Firewalls
  • Unified Threat Management

Lab: Designing a Traditional Security Architecture

Day 2

5. Modern Security Principles

  • Modern Security Models
  • Designing an Intelligent Network
  • Use Cases
  • Modularity in Security Design

Lab: Designing for Security Intelligence

6. Managing Security

  • Security Management Challenges
  • Junos Space Security Director
  • Juniper Secure Analytics

Lab: Security Management

Day 3

7. Automating Security

  • Automating Security Introduction
  • Juniper Automation Stack
  • Juniper Automation Tools
  • Automating Security

Lab: Automating Security

8. Virtualizing Security

  • Security in a Virtualized Environment
  • Virtual SRX
  • Security with SDN and NFV
  • Container SRX
  • Network Virtualization with VMware NSX

Lab: Virtualizing Security

9. Providing High Availability in Security Design

  • Benefits of High Availability with Security Devices
  • Implementing Physical High Availability
  • Assymmetrical Traffic Handling
  • SRX Chassis Clustering

Lab: High Availability

Day 4

10. Securing the Campus and Branch

  • Campus and Branch Security: An Overview
  • Network Segmentation and Perimeter Security
  • Application-Level Security
  • Access Control and Authentication
  • Layer 2 Security Functions
  • Case Studies and Example Architectures

Lab: Designing for Campus and Branch Security

11. Securing the Enterprise WAN

  • Security in the Enterprise WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures

Lab: Designing for Enterprise WAN Security

Day 5

12. Securing the Service Provider WAN

  • Security in the Service Provider WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures

Lab: Designing for Service Provider WAN Security

A. Appendix A: Juniper Security Solutions

  • Security Products and Solutions

13. Securing the Data Center

  • Overview of Data Center Security
  • Security Elements
  • Network Security in the Data Center
  • Network Security Functions in the Data Center

Lab: Securing the Data Center


target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design.


pre_req
  • Knowledge of network security concepts, including:
  • Traditional and next-generation firewalls;
  • IPsec VPNs;
  • Network Address Translation (NAT); and
  • Security intelligence.
  • Knowledge of Juniper Networks products and solutions.
  • Network automation and virtualization concepts.
  • Basic knowledge of hypervisors and high availability concepts.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

titleJND-SP – Juniper Networks Design-Service Provider
days5
seo_titleJND-SP - Juniper Networks Design-Service Provider Course Training
seo_dec
seo_tkey
categoryservice-provider
vendorJuniper

techonogyService Provider Training
overviewThis five-day course is designed to cover best practices, theory, and design principles for Wide Area Network (WAN) design including WAN interconnects, security considerations, virtualization, and management/operations. This course covers both service provider and enterprise WAN design. Associated Certification: Service Provider Design, Specialist (JNCDS-SP)
objective
  • Describe high level concepts about the different WAN architectures.
  • Identify key features used to interconnect WANs.
  • Describe key high level considerations about securing and monitoring a WAN deployment.
  • Outline high level concepts for implementing WANs.
  • Explain various methods of WAN connectivity.
  • Describe basic MPLS concepts as they are related to WANs.
  • Identify basic Ethernet concepts as they are related to WANs.
  • Describe key concepts of network availability.
  • Explain high availability features and protocols.
  • Describe the key aspects of class of service.
  • Describe how core WAN technologies are used to solve specific problems facing network designers.
  • Discuss core routing requirements.
  • Explain how to design a high performance MPLS WAN core.
  • Define CoS requirements for the WAN core.
  • Discuss BGP peering and path selection.
  • Design MPLS Layer 2 and Layer 3 services.
  • Design metro Ethernet networks.
  • Understand role of class of service in provider edge.
  • Describe Next-generation MVPNs.
  • Explain how enterprise WAN technologies are used to solve specific problems facing network designers.
  • Outline various solutions regarding campus and branch WANs.
  • Explain how data centers are interconnected through WANs.
  • Identify various solutions regarding data center WAN interconnection.
  • Describe the benefits and use cases for EVPN.
  • Describe security concepts regarding WANs.
  • Explain the differences between LAN security concepts and WAN security concepts.
  • Explain VPN-related concepts regarding WANs.
  • Describe methods to manage WANs.
  • Discuss key concepts related to WAN management.
  • Explain how virtualization and SDN can be leveraged in the WAN.
  • Describe various SDN products and how they are used in the WAN.
  • Describe MX, SRX, T, PTX, ACX, QFX, EX, and NFX Series devices and the basics of how they relate to WAN solutions

outline

Day 1

1. COURSE INTRODUCTION

2. Overview of WAN Design

  • WAN Design Overview
  • WAN Domains
  • Management, Operations, and Security
  • Implementation Considerations

3. WAN Connectivity

  • Public and Private
  • Service Provider
  • Enterprise

4. Network Availability and Traffic Prioritization

  • Network Availability
  • Class of Service

LAB: Network Availability and CoS Design

Day 2

5. Service Provider Core WAN

  • WAN Core Overview
  • Core Routing
  • MPLS Design
  • CoS Considerations

Lab : WAN Core Design

Day 3

6. Service Provider Edge WAN

  • Provider Edge
  • Lab: Service Provider Edge-VPN Design
  • Access and Aggregation Edge
  • Services
  • CoS Considerations
  • Multicast

Lab : Service Provider Edge-Services Design

Day 4

7. Enterprise WAN

  • Enterprise WAN Overview
  • WAN Topologies
  • Campus and Branch
  • CoS Considerations
  • Large Enterprise Designs

LAB: Enterprise WAN Design

8. Data Center WAN

  • WAN Overview
  • EVPN

LAB: Data Center WAN Design

9. WAN Security

  • Security Overview
  • WAN Versus LAN
  • Service Provider Core WAN Security
  • Service Provider Edge WAN Security
  • Enterprise WAN Security

LAB: Security Design

Day 5

10. WAN Management

  • Best Practices and Considerations
  • OoB Management Design
  • Junos Space
  • Juniper WAN Automation

LAB: WAN Management Design

11. WAN Virtualization and SDN

  • SDN Overview
  • NorthStar
  • Contrail
  • SD-WAN

LAB: SDN Design

12. WAN Device Portfolio

  • Platform and Junos Overview
  • MX Series
  • SRX Series
  • PTX and T Series
  • ACX Series
  • QFX Series
  • EX Series
  • NFX Series

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of WAN design.


pre_req
  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

titleNSE 4 – FortiGate v7.2 Bundle Training
days5
seo_titleFortiGate v6.4 Bundle Course Training | Fortinet NSE 4 Certification
seo_decIn this course, you will learn how to use basic FortiGate features, including security profiles, advanced FortiGate networking and security.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn the FortiGate Security course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. In the FortiGate Infrastructure course, you will learn how to use the most common FortiGate networking and infrastructure features. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, redundant infrastructure, virtual domains (VDOMs), zero trust network access (ZTNA), SSL VPN, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics. Product Versions
  • FortiOS 7.2
This FortiGate Bundle Training course help participants prepare for the NSE 4 certification exam.
objective

After completing this course, you will be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Collect and interpret log entries
  • Identify the characteristics of the Fortinet Security Fabric
  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load-balanced deployments
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Understand the fundamentals and benefits of using ZTNA
  • Offer an SSL VPN for secure access to your private network
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Diagnose and correct common problems

outline

FortiGate Security:

  1. Introduction and Initial Configuration
  2. Firewall Policies
  3. Network Address Translation
  4. Firewall Authentication
  5. Logging and Monitoring
  6. Certificate Operations
  7. Web Filtering
  8. Application Control
  9. Antivirus
  10. Intrusion Prevention and Denial of Service
  11. Security Fabric

 

FortiGate Infrastructure:

  1. Routing
  2. Virtual Domains
  3. Fortinet Single Sign-On
  4. ZTNA
  5. SSL VPN
  6. IPsec VPN
  7. High Availability
  8. Diagnostics

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network

titleNSE 4 – FortiGate Infrastructure v7.2
days2
seo_titleFortiGate Infrastructure v6.4 Course Training | Fortinet NSE 4 Certification
seo_decIn this FortiGate Infrastructure course, you will learn how to use advanced FortiGate networking and security.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this course, you will learn how to use the most common FortiGate networking and infrastructure features. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, redundant infrastructure, virtual domains (VDOMs), zero trust network access (ZTNA), SSL VPN, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics. Product Versions:
  • FortiOS 7.2

objective

After completing this course, you will be able to:

  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load-balanced deployments
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Understand the fundamentals and benefits of using ZTNA
  • Offer an SSL VPN for secure access to your private network
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Diagnose and correct common problems

outline
  1. Routing
  2. Virtual Domains
  3. Fortinet Single Sign-On
  4. ZTNA
  5. SSL VPN
  6. IPsec VPN
  7. High Availability
  8. Diagnostics

target_au

Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate devices should attend this course.

This course assumes knowledge of basic FortiGate fundamentals. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network
  • Knowledge of the fundamentals of FortiGate, as presented in the FortiGate Security course

titleNSE 4 – FortiGate Security v7.2
days3
seo_titleFortiGate Security v6.4 Course Training | Fortinet NSE 4 Certification
seo_decIn this FortiGate Security course, you will learn how to use basic FortiGate features, including security profiles.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this course, you will learn how to use the most common FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Versions:
  • FortiOS 7.2

objective

After completing this course, you will be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Collect and interpret log entries
  • Identify the characteristics of the Fortinet Security Fabric

outline
  1. Introduction and Initial Configuration
  2. Firewall Policies
  3. Network Address Translation
  4. Firewall Authentication
  5. Logging and Monitoring
  6. Certificate Operations
  7. Web Filtering
  8. Application Control
  9. Antivirus
  10. Intrusion Prevention and Denial of Service
  11. Security Fabric

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.

You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts

titleCompTIA A+
days5
seo_titleCompTIA A+ Certification Course Training
seo_dec
seo_tkey
categoryit-services-management-training
vendorComptia

techonogyIT Services Management
overview

Start your IT career on the right foot with CompTIA A+ certification. Earning A+ certification demonstrates that you possess the skills necessary to support enterprise IT infrastructures. This CompTIA A+ training course provides foundational knowledge of today’s most relevant technologies, so you can confidently conduct the tasks necessary to maintain your organization’s IT environment.

In addition to preparing for the CompTIA A+ Core 1 (220-1001) and Core 2 (220-100-2) exams — required for CompTIA A+ Certification — this training provides the skills to install, configure, and optimize personal computer hardware and operating systems. This course also includes a CompTIA A+ EBook, practice assessment questions, short video clips and examples and exam vouchers.


objective

You Will Learn How To:

  • Prepare to pass the CompTIA A+ 220-1001 and 220-1002 certification exams
  • Apply tools and troubleshooting techniques for PCs and laptops
  • Configure and optimise personal computers and laptops
  • Evaluate Windows configuration and upgrading options

outline

Lesson 1: Supporting Operating Systems

  • Identify Common Operating Systems
  • Troubleshooting Methodology
  • Use Windows Features and Tools
  • Manage Files in Windows
  • Manage Disks in Windows
  • Manage Devices in Windows

Lesson 2: Installing and Configuring PC Components

  • Use Appropriate Safety Procedures
  • PC Components
  • Common Connection Interfaces
  • Install Peripheral Devices

Lesson 3: Installing, Configuring and Troubleshooting Display and Multimedia Devices

  • Install and Configure Display Devices
  • Troubleshoot Display Devices
  • Install and Configure Multimedia Devices

Lesson 4: Installing, Configuring and Troubleshooting Storage Devices

  • Install System Memory
  • Install and Configure Mass Storage Devices
  • Install and Configure Removable Storage
  • Configure RAID
  • Troubleshoot Storage Devices

Lesson 5: Installing, Configuring and Troubleshooting Internal System Components

  • Install and Upgrade CPUs
  • Configure and Update BIOS/UEFI
  • Install Power Supplies
  • Troubleshoot Internal System Components
  • Configure a Custom PC

Lesson 6: Installing, Configuring and Maintaining Operating Systems

  • Configure and Use Linux
  • Configure and Use MacOS
  • Install and Upgrade Operating Systems
  • Maintain Operating Systems

target_au
pre_req

At least six months of on-the-job experience in PC configuration and troubleshooting


titleSESA v3.1 – Securing Email with Cisco Email Security Appliance
days4
seo_titleSESA - Securing Email with Cisco Email Security Appliance Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications. This class will help you
  • Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
  • Gain leading-edge career skills focused on enterprise security
  • Earn 24 Cisco CE credits toward recertification

objective

After taking this course, you should be able to:

  • Describe and administer the Cisco Email Security Appliance (ESA)
  • Control sender and recipient domains
  • Control spam with Talos SenderBase and anti-spam
  • Use anti-virus and outbreak filters
  • Use mail policies
  • Use content filters
  • Use message filters to enforce email policies
  • Prevent data loss
  • Perform LDAP queries
  • Authenticate Simple Mail Transfer Protocol (SMTP) sessions
  • Authenticate email
  • Encrypt email
  • Use system quarantines and delivery methods
  • Perform centralized management using clusters
  • Test and troubleshoot

outline
  • Describing the Cisco Email Security Appliance
  • Administering the Cisco Email Security Appliance
  • Controlling Sender and Recipient Domains
  • Controlling Spam with Talos SenderBase and Anti-Spam
  • Using Anti-Virus and Outbreak Filters
  • Using Mail Policies
  • Using Content Filters
  • Using Message Filters to Enforce Email Policies
  • Preventing Data Loss
  • Using LDAP
  • SMTP Session Authentication
  • Email Authentication
  • Email Encryption
  • Using System Quarantines and Delivery Methods
  • Centralized Management Using Clusters
  • Testing and Troubleshooting
  • References

Lab outline

  • Verify and Test Cisco ESA Configuration
  • Perform Basic Administration
  • Advanced Malware in Attachments (Macro Detection)
  • Protect Against Malicious or Undesirable URLs Beneath Shortened URLs
  • Protect Against Malicious or Undesirable URLs Inside Attachments
  • Intelligently Handle Unscannable Messages
  • Leverage AMP Cloud Intelligence Via Pre-Classification Enhancement
  • Integrate Cisco ESA with AMP Console
  • Prevent Threats with Anti-Virus Protection
  • Applying Content and Outbreak Filters
  • Configure Attachment Scanning
  • Configure Outbound Data Loss Prevention
  • Integrate Cisco ESA with LDAP and Enable the LDAP Accept Query
  • Domain Keys Identified Mail (DKIM)
  • Sender Policy Framework (SPF)
  • Forged Email Detection
  • Configure the Cisco SMA for Tracking and Reporting

target_au
  • Security engineers
  • Security administrators
  • Security architects
  • Operations engineers
  • Network engineers
  • Network administrators
  • Network or security technicians
  • Network managers
  • System designers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have one or more of the following basic technical competencies:

  • Cisco certification (Cisco CCENT® certification or higher)
  • Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
  • Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
  • Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], CompTIA (A+, Network+, Server+)

The knowledge and skills that a student must have before attending this course are:

  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
  • Experience with IP routing

Cisco learning offerings that contribute to recommended skills and knowledge:


titleCBROPS v1.0 – Understanding Cisco Cybersecurity Operations Fundamentals
days5
seo_titleCBROPS - Understanding Cisco Cybersecurity Operations Fundamentals Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC.
objective

After taking this course, you should be able to:

  • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
  • Explain the data that is available to the network security analyst.
  • Describe the basic concepts and uses of cryptography.
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
  • Understand common endpoint security technologies.
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
  • Identify resources for hunting cyber threats.
  • Explain the need for event data normalization and event correlation.
  • Identify the common attack vectors.
  • Identify malicious activities.
  • Identify patterns of suspicious behaviors.
  • Conduct security incident investigations.
  • Explain the use of a typical playbook in the SOC.
  • Explain the use of SOC metrics to measure the effectiveness of the SOC.
  • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
  • Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
  • Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.

 


outline
  • Defining the Security Operations Center
  • Understanding Network Infrastructure and Network Security Monitoring Tools
  • Exploring Data Type Categories
  • Understanding Basic Cryptography Concepts
  • Understanding Common TCP/IP Attacks
  • Understanding Endpoint Security Technologies
  • Understanding Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
  • Understanding Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
  • Using a Playbook Model to Organize Security Monitoring
  • Understanding SOC Metrics
  • Understanding SOC Workflow and Automation
  • Describing Incident Response
  • Understanding the Use of VERIS
  • Understanding Windows Operating System Basics
  • Understanding Linux Operating System Basics

Lab outline

  • Use SIEM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Explore TCP/IP Attacks
  • Explore Endpoint Security
  • Investigate Hacker Methodology
  • Hunt Malicious Traffic
  • Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
  • Investigate Browser-Based Attacks
  • Analyze Suspicious Domain Name System (DNS) Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks
  • Explore the Windows Operating System
  • Explore the Linux Operating System

target_au

This course is designed for individuals seeking a role as an associate-level cybersecurity analyst, IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:

  • Students pursing a technical degree
  • Current IT professionals
  • Recent college graduates with a technical degree

pre_req

 

Before taking this course, you should have the following knowledge and skills:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows and Linux operating systems
  • Familiarity with basics of networking security concepts

The following Cisco course can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)

titleECS – ExtremeWireless Cloud
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewECS - ExtremeWireless Cloud course provides Extreme Networks customers and partners theoretical and practical hands-on training to give students a better understanding of Extreme Networks Cloud WiFi technologies. Students will also learn how to manage and orchestrate ExtremeWireless Cloud from within the ExtremeCloud IQ management platform. [dt_sc_button type="type1" link="https://dojo.extremenetworks.com/organizer/insoft-services/" size="medium" bgcolor="#8fbd85" target="_new" timeline_button="no"]Registration Link[/dt_sc_button]
objective
  • Have the ability to onboard devices and configure WLANS using the powerful cloud based solution that is ExtremeCloud IQ.
  • Gain basic wireless skills and be able to utilize the knowledge gained to deploy real world solutions.
  • Prepare students to take the Extreme Wireless Cloud ECS exam.

outline

Solution Overview

  • Global Data Centers
  • Regional Data Centers
  • ISO 27001
  • GDPR and Privacy
  • Private Cloud
  • Local Cloud
  • Wireless Hardware
  • Distributed Architecture
  • Understanding the evolution of distributed architecture
  • Distributed Control
  • Cooperative Control Protocols

 

ExtremeCloud IQ

  • Taking a first look at ExtremeCloud IQ
  • Logging in for the first time

 

WLAN Design Concepts

  • Coverage Design
  • Roaming
  • Layer 2 Retransmissions
  • Capacity Design
  • Airtime Consumption
  • Co-Channel Interference
  • Antennas

 

Device Discovery and Provisioning

  • Device Redirection Services and Auto-Discovery
  • Auto-discovery for on-premises
  • Management Protocols and Device Updates
  • Adding Devices into ExtremeCloud IQ

 

Guided Configuration and Object Management

  • Guided Configuration of Objects
  • Clone Tool

 

Monitoring Clients, Users and Client 360

  • Monitoring Clients
  • Monitoring Devices

 

User Profiles

  • Defining VLANs
  • Firewalls
  • Tunnelling
  • Rate Limiting
  • URL Filtering
  • Availability Schedule
  • Assignment Rules

 

Troubleshooting 802.1x

  • IEEE 802.1X with EAP
  • 802.1X Troubleshooting

 

Network 360

  • Monitor View
  • Device Health
  • Client Health
  • WiFi Health
  • Network Health
  • Services Health
  • Application Health
  • Security Health

 

Private Pre-Shared Key (PPSK)

  • Understanding PPSK
  • 802.1X/EAP
  • Mapping User Profiles to User Groups
  • User Groups
  • PPSK Credential storage
  • RadSec Proxies
  • Secure Access with Cloud PPSK
  • RadSec Troubleshooting

 

Radio Profiles

  • Showing Radio Profiles through a Lab

 

Device Templates

  • AP Device Templates
  • Radio Settings
  • Radio Usage
  • Mesh
  • Exclude Channels
  • Transmit Power Control

 

Software Defined Radio (SDR)

  • Dual Band APs
  • Dual 5GHz WLAN design
  • SDR Radio Profile

 

Cloud Config Groups and Classification Rules

  • Cloud Config Groups – What are they?
  • Classification Rules
  • Joining CCGs and Classification Rules

 

Classification Rules

  • VLAN Objects
  • Captive Web Portals
  • Time Zone Objects
  • Use Cases
  • Server Objects
  • AP Device Templates
  • SSIDs

 

Deployment Optimization

  • Management and Native VLANs
  • Using Trunked Ports and VLANs
  • AP and VLAN guidelines
  • Configuring rollback timer

 

ExtremeCloud IQ Diagnostic Tools

  • Device Diagnostic Tools
  • Ping
  • Points of Failure
  • VLAN Probe
  • Common CLI Commands

 

Dashboards

  • Network
  • Reports
  • Diagnostics
  • Inventory
  • Insights – Comparative Analysis
  • Insights – Proximity
  • Insights – Presence

 

ExtremeCloud IQ Administration

  • Communications
  • Account Management
  • Administrator Accounts
  • Internal Admin Accounts
  • External Admin Accounts
  • Role Based Access Control
  • Global Settings – Logs
  • Global Settings – Audit Logs

 

Firmware Updates

  • How to do firmware updates using ExtremeCloud IQ

 

ExtremeWireless Cloud Exam

  • What you need to know about the ExtremeWireless Cloud Exam

target_au
pre_req

Students should have a working knowledge of networking concepts and a basic understanding of WiFi technologies although prior experience of WLAN design and deployment is helpful.


titleECS ExtremeWireless Cloud Troubleshooting
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewDesigned for networking professionals responsible for supporting and troubleshooting wireless LAN networks. This course is an advanced level class building upon the student’s real working experiences with ExtremeWireless Cloud and ExtremeCloud IQ. Please read the pre-requisites before enrolling on the class as prior experience with ExtremeCloud IQ and ExtremeWireless Cloud is expected. The class is a fast paced, fault-based scenario lab which immerses the student in real life situations requiring fault diagnosis and remedial actions. It provides students with the information and skills necessary to troubleshoot common WLAN issues using ExtremeCloud IQ tools and networking solutions.
objective

This challenging course is a blend of theory and real-world troubleshooting scenarios.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Cloud installations and common wireless issues using the in-built tools and the Wireshark protocol analyzer.


outline
  • Troubleshooting Theory and Best practices
  • Opening a support case
  • Techdata File
  • Co-Operative Control Protocols
  • CAPWAP and Provisioning
  • RF Troubleshooting
  • Network Performance Troubleshooting
  • ExtremeWireless Cloud troubleshooting tools
  • Authentication and Roaming
  • Private Pre-shared Key

target_au
pre_req

To gain the maximum learning experience from this class, it is extremely important that attendees adhere to the following requirements prior to attending this course:

  • Have attend the ExtremeWireless Cloud training and hold the relevant ECS ExtremeWireless Cloud certification, or, to have been grandfathered from the Aerohive ACMA qualification onto ExtremeWireless Cloud ECS.
  • Possess significant working experience with Extreme/Aerohive products as well as wireless networking. Attendees need to be able to navigate and configure the current version of XIQ confidently with minimal or no instruction.
  • Have access to the internet to connect to XIQ for the virtual instructor-led classes or bring their own laptop to classroom based instructor-led classes.

titleECS Extreme NAC
days2
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorExtreme

techonogyEnterprise Networking
overviewExtremeNAC (A3) is Extreme’s Secure Access Management Solution with enterprise-grade features for onboarding, authentication, and network access control (NAC). This training class covers the essentials of deploying ExtremeNAC (A3). It provides the theoretical knowledge and hands-on experience that will enable you to successfully deploy, configure and maintain the ExtremeNAC (A3) solution.
objective

To deploy Extreme A3 Cloud Network Access Control to build unique workflows and requirements to fit unique environments. Integrate ExtremeNAC (A3) into third party systems, implement controls and checks to help ensure compliance to regulations and policies and be able to leverage custom workflows and alarms to proactively resolve network issues.


outline
  • What is ExtremeNAC (A3)?
  • Qualifying Questions
  • Product capabilities
  • Deployment Modes and Options
  • Enforcement
  • Guest Authentication and Registration
  • Radius and 802.1x
  • Active Directory Integration and Authentication
  • Self-Registration
  • Portal Modules and Modifications
  • PKI and Certificates

target_au
pre_req

A solid networking background. Working proficiency and experience with network security and understanding basic concepts behind Active Directory and Digital Certificates.


titleECS Extreme Wireless Core
days4
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewThis class will give the students a good technical understanding of the ExtremeWireless CORE technologies. There will also be practical, hands-on-labs, where the students will get to setup and configure this type of technology to supplement the theoretical learning.
objective

This course is a blend of both theoretical and hands-on Lab experience.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Core.

 


outline

Solution Overview

  • ExtremeWireless Landscape
  • WiNG at a glance
  • What’s New In WiNG 7
  • 11ax Introduction
  • WPA3 Introduction
  • Dual Mode Capability
  • ExtremeWireless WiNG hardware overview
  • Configuration Model
  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration

 

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links

 

AP Adoption

  • Finding a controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption

 

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

 

Supported Deployments and Provisioning

  • Reference designs for single and central site/multi-site deployments
  • Scalability considerations
  • General best practices and common design mistakes

 

Clustering

  • Clustering overview
  • Clustering setup

 

Virtual Controller

  • VC overview
  • VC configuration

 

Initial Configuration

  • Initial device setup
  • Resetting APs to factory defaults
  • Configure management access settings via Management Policy

 

Software Management

  • Mixed mode
  • Image types
  • Software upgrade

 

Wireless LANs

  • WLAN configuration
  • WLAN forwarding modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy
  • QoS policies and mappings

 

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features

 

Integrated Services

  • DHCP server
  • Radius server
  • Role Based Access Control (RBAC)
  • IPsec VPN

 

Captive Portal

  • Hotspot deployment options and defining policies
  • Authentication methods used to verify user registrations
  • Enforcing authentication methods
  • User and device registration and notification methods

 

Security Features

  • Stateful L2+ Distributed Firewall features
  • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
  • Variations of Wireless IPS (WIPS)

 

Mesh Features

  • MeshConnex overview
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex

 

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Opening GTAC case

 

NSight

  • NSight overview
  • Using NSight for monitoring and troubleshooting

 

Extreme Guest

  • Extreme Guest overview and features

 

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

 

What’s new?

  • Recent firmware releases overview

target_au
pre_req

A thorough understanding of wireless networking, wired networking and associated protocols. Highly recommended to have completed the Extreme Wireless EDS class.


titleSAUI v1.0 – Implementing Automation for Cisco Security Solutions
days3
seo_titleSAUI - Implementing Automation for Cisco Security Solutions Course Training
seo_dec
seo_tkey
categorydata-center
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Automation for Cisco Security Solutions (SAUI) v1.0 course teaches you how to design advanced automated security solutions for your network. Through a combination of lessons and hands-on labs, you will master the use of modern programming concepts, RESTful application program interfaces (APIs), data models, protocols, firewalls, web, Domain Name System (DNS), cloud, email security, and Cisco® Identity Services Engine (ISE) to strengthen cybersecurity for your web services, network, and devices. You will learn to work within the following platforms: Cisco Firepower® Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch® Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella®, Cisco Advanced Malware Protection (AMP), Cisco Threat grid, and Cisco Security Management Appliances. This course will teach you when to use the API for each Cisco security solution to drive network efficiency and reduce complexity. This course prepares you for 300-735 Automating and Programming Cisco Security Solutions (SAUTO) certification exam.
objective

After taking this course, you should be able to:

  • Describe the overall architecture of the Cisco security solutions and how APIs help enable security
  • Know how to use Cisco Firepower APIs
  • Explain how pxGrid APIs function and their benefits
  • Demonstrate what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes
  • Describe the features and benefits of using Cisco Stealthwatch Cloud APIs
  • Learn how to use the Cisco Umbrella Investigate API
  • Explain the functionality provided by Cisco AMP and its APIs
  • Describe how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats

outline
  • Introducing Cisco Security APIs
  • Consuming Cisco Advanced Malware Protection APIs
  • Using Cisco ISE
  • Using Cisco pxGrid APIs
  • Using Cisco Threat Grid APIs
  • Investigating Cisco Umbrella Security Data Programmatically
  • Exploring Cisco Umbrella Reporting and Enforcement APIs
  • Automating Security with Cisco Firepower APIs
  • Operationalizing Cisco Stealthwatch and the API Capabilities
  • Using Cisco Stealthwatch Cloud APIs
  • Describing Cisco Security Management Appliance APIs

target_au

This course is designed primarily for professionals in job roles such as:

  • Network engineer
  • Systems engineer
  • Wireless engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network administrator
  • Wireless design engineer
  • Network manager
  • Sales engineer
  • Account manager

pre_req

Before enrolling in this course, you should have professional level knowledge in the following areas:

  • Basic programming language concepts
  • Basic understanding of virtualization
  • Ability to use Linux and Command Line Interface (CLI) tools, such as Secure Shell (SSH) and bash
  • CCNP level core networking knowledge
  • CCNP level security networking knowledge

The following Cisco courses can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Introducing Automation for Cisco Solutions (CSAU)
  • Programming Use Cases for Cisco Digital Network Architecture (DNAPUC)
  • Introducing Cisco Network Programmability (NPICNP)
  • Implementing and Operating Cisco Security Technologies (SCOR)

titleCSAU 1.1 – Introducing Automation for Cisco Solutions
days3
seo_titleCSAU - Introducing Automation for Cisco Solutions Course Training
seo_dec
seo_tkey
categorydata-center
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Introducing Automation for Cisco Solutions (CSAU) v1.1 course gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) protocols. The course also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain’t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git. This course is a requirement prior to enrolling in professional-level automation courses and exams because it provides crucial foundational knowledge essential to success:
Automation Courses Automation Exams
Implementing Automation for Cisco Enterprise Solutions (ENAUI) 300-435 Automating and Programming Cisco Enterprise Solutions (ENAUTO)
Implementing Automation for Cisco Data Center Solutions (DCAUI) 300-635 Automating and Programming Cisco Data Center Solutions (DCAUTO)
Implementing Automation for Cisco Security Solutions (SAUI) 300-735 Automating and programming Cisco Security Solutions (SAUTO)
Implementing Automation for Cisco Service Provider Solutions (SPAUI) 300-535 Automating and programming Cisco Service Provider Solutions (SPAUTO)
Implementing Automation for Cisco Collaboration Solutions (CLAUI) 300-835 Automating and Programming Cisco Collaboration Solutions (CLAUTO)
This course will help you:
  • Gain an overview of the skills you need to become a next-generation engineer
  • Prepare to accelerate network automation in your organization
  • Increase collaboration across internal and external teams using version control systems
  • Earn 16 CE credits toward recertification

objective

After taking this course, you should be able to:

  • Articulate the role network automation and programmability play in the context of end-to-end network management and operations
  • Define and differentiate between waterfall and agile software development methodologies
  • Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
  • Describe how DevOps principles, tools, and pipelines can be applied to network operations
  • Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
  • Understand and construct HTTP-based API calls to network devices
  • Articulate the differences among and common use cases for XML, JSON, YAML, and protobuf
  • Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs
  • Understand the role YANG plays in network automation
  • Understand that a number of tools exist to simplify working with YANG models
  • Describe the functionality of RESTCONF and NETCONF and the differences between them
  • Construct Ansible playbooks to configure network devices and retrieve operational state data from them
  • Build Jinja2 templates and

outline
  • Examining Network Management and Operations
  • Exploring Software Development Methodologies
  • Using Python for Network Automation
  • Describing NetDevOps: DevOps for Networking
  • Managing Automation Development Environments
  • Introducing HTTP Network APIs
  • Reviewing Data Formats and Data Encoding
  • Using Python Requests to Automate HTTP-Based APIs
  • Exploring YANG
  • Using YANG Tools
  • Automating Model-Driven APIs with Python
  • Introducing Ansible for Network Automation
  • Templating Configurations with Jinja2

Lab outline

  • Use Network Automation Scripts
  • Enforce Python Fundamentals on the Interactive Interpreter
  • Automate Networks with Netmiko
  • Use the Git Version-Control System and Collaborate on an Internal Project
  • Build Reproduceable Automation Environments
  • Use HTTP-Based APIs with Postman
  • Explore YAML and JSON Data
  • Consume HTTP-Based APIs with Python Requests
  • Explore YANG Tools
  • Explore RESTCONF with Python
  • Explore NETCONF with Python
  • Configure Network Devices with Ansible
  • Collect Network Data with Ansible
  • Build and Deploy Configurations with Ansible

target_au

This course is designed primarily for customer engineers and systems engineers in the following job roles:

  • Automation architect
  • Automation engineer
  • Consulting systems engineer
  • DevOps engineer
  • Network administrator
  • Network architect
  • Network consulting engineer
  • Network design engineer
  • Network engineer
  • Network operator
  • Network reliability engineer
  • Sales engineer
  • Site reliability engineer
  • Systems engineer
  • Technical solutions architect

This course would also be useful for network manager job roles such as:

  • Application developer
  • Collaboration developer
  • Collaboration solutions architect
  • IT director
  • Mobile developer
  • Network Operations Center (NOC) manager
  • Software architect
  • Web developer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Routing and switching including Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and basic configuration features such as interfaces, Simple Network Management Protocol (SNMP), and static routes
  • Fundamentals of Python data structures and programming constructs such as loops, conditionals, and classes, or the equivalent of 3–6 months of experience writing Python scripts
  • Basic Linux commands for navigating the file system and executing scripts
  • Knowledge of working with text editors

title(802.1X) 1.0 – Introduction to 802.1X Operations for Cisco Security Professionals
days3
seo_title(802.1X) - Introduction to 802.1X Operations for Cisco Security Professionals Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Introduction to 802.1X Operations for Cisco Security Professionals Course shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.
objective

Upon completing this course, the learner should be able to meet these overall objectives:

  • Provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1X protocol and the ability to configure the Cisco Identity Services Engine (ISE) for 802.1X operation.
  • The course will introduce the architecture, components, and features of a Cisco TrustSec network designed around the IEEE 802.1X and RADIUS protocols.
  • The student will gain hands-on experience with configuring a network for 802.1X-based network services using the Cisco ISE, Cisco Catalyst switches, and Cisco wireless products.

outline
  • Describe Cisco TrustSec concepts
  • Describe IEEE 802.1X concepts, architecture, and requirements for deployment
  • Describe how the RADIUS authentication protocol is used for Cisco TrustSec
  • Configure Cisco ISE for 802.1X operation
  • Describe IEEE 802.1X supplicants for Microsoft, Apple, and Cisco
  • Configure IEEE 802.1X for a wired network
  • Configure IEEE 802.1X for a wireless network
  • Describe how to provide secure guest access in a Cisco TrustSec network
  • Build a high-level design of a Cisco TrustSec network using IEEE 802.1X.

target_au
  • Channel Partner / Reseller
  • Customer
  • Employee

pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • Cisco Certified Network Associate (CCNA).
  • Attendance of Securing Networks with Routers and Switches (SNRS) or equivalent knowledge.
  • Knowledge of Microsoft Windows Server 2008 Active Directory.
  • Knowledge of Cisco Wireless LAN Controllers and Lightweight Access Points.
  • Knowledge of basic command-line configuration of Cisco Catalyst switches.The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

titleEnterprise Architecture Foundation Training
days2
seo_titleTOGAF Enterprise Architecture Foundation - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Foundation helps utilize resources more efficiently and effectively, and realize a greater return on investment.
seo_tkeyTOGAF Enterprise Architecture Foundation
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This two-day course is intended as a foundational introduction to the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

The course examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 exam (foundation). During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • The basic concepts of Enterprise Architecture and TOGAF
  • The core concepts of TOGAF 9
  • The key terminology of TOGAF 9
  • The ADM cycle and the objectives of each phase, and how to adapt and scope the ADM
  • The concept of the Enterprise Continuum; its purpose and constituent parts
  • How each of the ADM phases contributes to the success of enterprise architecture
  • The ADM guidelines and techniques
  • How Architecture Governance contributes to the Architecture Development Cycle
  • The concepts of views and viewpoints and their role in communicating with stakeholders
  • The concept of building blocks
  • The key deliverables of the ADM cycle
  • The TOGAF reference models
  • The TOGAF certification program
  • Foundation Exam Preparation

outline

Module 1 – Course overview and introduction
Module 2 – TOGAF 9.1 Introduction and Core Concepts
Module 3 – The Enterprise Continuum and Tools
Module 4 – The Architecture Development Method (ADM)
Module 5 – Architecture Governance
Module 6 – ADM Guidelines and Techniques
Module 7 – TOGAF Reference Models
Module 8 – Group Activities and Buzz Exercises


target_au

The TOGAF Enterprise Architecture Foundation would suit candidates working in the following professions or areas:

  • Individuals who require a basic understanding of the TOGAF 9 framework
  • Professionals who are working in roles associated with an architecture project
  • Individuals responsible for planning, execution, development, delivery, and operation
  • Architects who are looking for a first introduction to TOGAF 9
  • Architects who want to achieve Level 2 certification

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this course, although it is recommended that candidates should have at least two years of professional experience working in Enterprise Architecture.


titleISO27001:2013 Information Security Practitioner
days2
seo_titleISO27001:2013 Information Security Practitioner Course | Insoft Services
seo_decISO27001:2013 Information Security Practitioner develops a deeper understanding of how to apply the standard for implementation, management and improvement.
seo_tkeyISO27001:2013 Information Security Practitioner
categoryit-services-management-training
vendorAPMG

techonogyIT Services Management
overviewISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. This two-day course expands on the foundational overview of this recently revised version of 2013. The ISO27001:2013 Information Security Practitioner training develops a deeper understanding of how to actually apply the standard for implementation, management, and improvement. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources.
  • ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Practitioner course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology
  • Apply your knowledge to business scenarios to enhance control of information
  • Establish a structured approach to information security management to secure information assets
  • Improve information security through the adoption of best practices
  • Understand how ISO/IEC 27001 provides a competitive differentiator when tendering for business contracts
  • Build a reputation with the secure management of confidential and sensitive information
  • Demonstrate compliance with an internationally recognized standard and the ability to satisfy customer security requirements

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – Practitioner examination preparation


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation and Practitioner would suit candidates working in the following professions or areas:

  • Both IT and business people will benefit from this course
  • Those requiring a basic understanding of the Information Security
  • IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • Anyone involved in or contributing to an on-going service improvement program
  • The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates are required to have attended an accredited training course and have successfully passed their foundation examination. It is strongly recommended that candidates should have a good understanding of security management.


titleISO27001:2013 Information Security Foundation
days3
seo_titleISO27001:2013 Information Security Foundation Course | Insoft Services
seo_decISO27001:2013 Information Security Foundation provides the basis for effective management of confidential information and application of information security controls.
seo_tkeyISO27001:2013 Information Security Foundation
categoryinformation-systems-security
vendorAPMG

techonogyIT Systems and Security
overviewThis three-day ISO27001:2013 Information Security Foundation course overviews the recently revised version of 2013. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources. ISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Foundation course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – ISMS implementation

Module 7 – ISMS audit and certification


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation would suit candidates working in the following professions or areas:

  • · Both IT and business people will benefit from this course
  • · Those requiring a basic understanding of the Information Security
  • · IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • · Anyone involved in or contributing to an on-going service improvement program
  • · The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite for attending this course. It is strongly recommended that candidates should have a good understanding of security management.


titleLean IT Leadership
days3
seo_title
seo_decLean IT Leadership shows how to establish and maintain a sustainable approach to long term improvement of value delivery from IT.
seo_tkeyLean IT Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation and Lean IT Leadership exam. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This three-day course leads to the Lean IT Leadership exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a deep understanding of what skills are needed and what it takes to be a Lean IT Leader, this includes:

  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organisation
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 2 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 3 – Helping Others to Develop

  • Definition of Genchi Genbutsu/ Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 4 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 5 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 6 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 7 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Kaizen
days3
seo_title
seo_decThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives.
seo_tkeyLean IT Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives. The course teaches students how to effectively use the Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) improvement model leveraging the Lean A3 problem identification and planning tool to complete a full improvement cycle. This certification course provides you with the knowledge, skills, and methodology required to identify, plan and implement incremental service and process improvements focused on improving the efficiency and effectiveness of any process or value stream. It also prepares you for the Lean IT Association Kaizen certification exam. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Kaizen level certification.   See other courses available
objective
outline

This three-day course leads to the Lean IT Kaizen certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to be a highly effective Lean Kaizen Lead.

During the course you will:

  • Understand Lean principles related specifically to leading a Kaizen event
  • Understand how to apply the Lean A3 tool to support continual improvement
  • Gain practical how-to knowledge of how to use of the Six Sigma DMAIC improvement model as a structured improvement methodology
  • Learn about improvement scoping and validation
  • Learn how to gain the voice of customer input and establish critical to quality requirements
  • Learn how to apply and use Value Stream Mapping (VSM) techniques to identify process waste and speed improvement opportunities
  • Understand how to use root cause analysis techniques to support problem analysis
  • Learn how to identify, select and use various improvement options
  • Understand how to establish effective controls
  • Understand how to establish methods to improve quality and mistake proof future process activities

target_au

The course is designed for IT practitioners interested in expanding their practical knowledge and skills to lead targeted Lean improvement initiatives focused on continual service improvement, including:

  • Managers tasked with department level process improvements
  • Business analysts
  • Project managers
  • Software developers
  • Quality assurance managers
  • IT Consultants
  • Any roles responsible for quality, efficiency and continual service improvement

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req
titleLean IT Foundation with Six Sigma Overview
days3
seo_titleLean IT Foundation with Six Sigma Overview | Insoft Services
seo_decLean IT Foundation with Six Sigma Overview course shows how to apply the Lean IT approach to address customer value requirements.
seo_tkeyLean IT Foundation with Six Sigma Overview
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation exam followed by an overview of Six Sigma. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.   See other courses available
objective

Lean IT Foundation with Six Sigma Overview is a three-day course that leads to the Lean IT Association foundation exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organisation
  • Lean IT Dimensions: Behaviour & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • High-level overview of Six Sigma

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behaviour & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviours
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Six Sigma

  • Meaning of Six Sigma
  • History of Six Sigma
  • Common roles in six sigma
  • Six Sigma methods
  • Six Sigma tools
  • Control charts
  • The Six Sigma organization
  • Process capability and measures

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of IT processes.


titleLean IT Foundation & Leadership
days5
seo_titleLean IT Foundation and Leadership - IT Training | Insoft Services
seo_decLean IT Foundation and Leadership provides practical appreciation of how to apply Lean IT Principles to specific business problems and pain points.
seo_tkeyLean IT Foundation and Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain both a foundational understanding of all the key parts of the Lean It approach and a more in-depth focus in IT Lean Leadership, this includes:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organization
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behavior & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviors
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 9 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 10 – Helping Others to Develop

  • Definition of Genchi Genbutsu/Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 11 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 12 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 13 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 14 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Foundation & Kaizen
days5
seo_titleLean IT Foundation and Kaizen - IT Training | Insoft Services
seo_decLean IT Foundation and Kaizen course will show how to implement and apply Kaizen improvement activities into the enterprise, use it for client initiatives.
seo_tkeyLean IT Foundation and Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewLean IT Foundation and Kaizen course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

Lean IT Foundation and Kaizen two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleLean IT Foundation
days2
seo_title
seo_decLean IT Foundation training is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.
seo_tkeyLean IT Foundation
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis two-day course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

This two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleEnterprise Architecture Foundation & Advanced Training
days4
seo_titleTOGAF Enterprise Architecture Training | Insoft Services
seo_decTOGAF Enterprise Architecture Training is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts.
seo_tkeyTOGAF Enterprise Architecture Training
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This four-day course is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Training examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 & 2 exams (foundation and certified). During the course delegates will get the opportunity to prepare for the exams and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • Course Introduction
  • TOGAF Basic Concepts
  • Architecture Governance
  • Architecture Views and Viewpoints
  • The ADM Phases
  • Building Blocks and the ADM
  • Key ADM Deliverables
  • ADM Guidelines and Techniques
  • The Architecture Development Method (ADM) – architecture process
  • Guidelines and techniques for using and adapting the ADM
  • The Architecture Content Framework – how to describe the architecture
  • The Enterprise Continuum – a classification system for architecture assets
  • TOGAF 9 Reference Models – the ‘building blocks’ of an Information System
  • Architectural Governance and Capability – governance, skills and maturity
  • Foundation & Certified Exam Preparation

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – The Enterprise Continuum and Core Concepts

Module 4 – The Architecture Development Method

Module 5 – Architecture Governance

Module 6 – ADM Guidelines and Techniques

Module 7 – TOGAF Reference Models

Module 8 – The ADM in Detail

Module 9 – Adapting the ADM Using Iterations and Levels

Module 10 – Security and the ADM

Module 11 – Service Orientated Architecture (SOA)

Module 12 – Architecture Content Framework (Metamodel)

Module 13 – Certified (Part 2) Examination Preparation

Module 14 – Group Activities and Buzz Exercices


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this taking the TOGAF Certified (Level 2) exam. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleEnterprise Architecture Advanced Training
days2
seo_titleTOGAF Enterprise Architecture Advanced - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Advanced training contains guidance on what to do to establish an architecture practice and use it for transformation.
seo_tkeyTOGAF Enterprise Architecture Advanced
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. Enterprise Architecture Advanced Training is a two-day course that is intended as an advanced exploration of the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Advanced training is designed as a follow-on course from the TOGAF Level 1 examination. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain an advanced understanding of all the key parts of the TOGAF Framework:

  • How to apply the ADM phases in the development of an enterprise architecture
  • How to apply Architecture Governance in the development of an enterprise architecture
  • How to apply the TOGAF Architecture Content Framework
  • How to apply the concept of Building Blocks
  • How to apply the Stakeholder Management Technique
  • How to apply the TOGAF Content Metamodel
  • How to apply TOGAF recommended techniques when developing an enterprise architecture
  • The TOGAF Technical Reference Model and how to customize it to meet an organizations needs
  • The Integrated Information Infrastructure Reference Model
  • The content of the key deliverables of the ADM cycle
  • How an enterprise architecture can be partitioned to meet the specific needs of an organization
  • The purpose of the Architecture Repository
  • How to apply iteration and different levels of architecture with the ADM
  • How to adapt the ADM for security
  • SOA as a style of architecture
  • The role of architecture maturity models in developing an enterprise architecture
  • The purpose of the Architecture Skills Framework and how to apply it within an organization

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – TOGAF Reference Models

Module 4 – The Architecture Development method in detail

Module 5 – Adapting the ADM Using Iterations and Levels

Module 6 – Security and the ADM

Module 7 – Service Orientated Architecture (SOA)

Module 8 – Architecture Content Framework (Metamodel)

Module 9 – Certified (Part 2) Examination Preparation

Module 10 – Group Activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleCOBIT 5 Foundation & NIST Cyber Security Framework
days5
seo_titleCOBIT 5 Foundation and NIST CyberSecurity Framework | Insoft Services
seo_decCOBIT 5 Foundation and NIST Cybersecurity Framework prepare candidates to manage cybersecurity in a structured way using the NIST Cybersecurity Framework.
seo_tkeyCOBIT 5 Foundation and NIST CyberSecurity
categorycybersecurity
vendorPeoplecert

techonogyCOBIT
overviewThis 5-day COBIT 5 Foundation and Implementing NIST Cybersecurity Framework using COBIT® 5 course, builds from the foundation level of COBIT, what it is and what it does, to preparing candidates to manage cybersecurity in a controlled and structured way using the NIST Cybersecurity Framework. The second part of the course is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information.
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business
  • Introduction to the Cybersecurity Framework

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise End-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Critical Security Framework Structure

  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow
  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 7: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 8: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 9: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 10: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 11: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 12: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 13: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts, IT organizational management, and a basic knowledge of cybersecurity concepts.


titleCOBIT 5 & NIST Cybersecurity Framework
days2
seo_titleCOBIT 5 and NIST Cybersecurity Framework - IT Training | Insoft Services
seo_decCOBIT 5 and NIST Cybersecurity Framework provides knowledge and understanding of the CSF, its goals, and the ability to apply this information.
seo_tkeyCOBIT 5 and NIST Cybersecurity
categorycybersecurity
vendorPeoplecert

techonogyCOBIT
overviewThis 2-day Implementing NIST Cybersecurity Framework using COBIT® 5 course, is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information. Delegates will also prepare for and sit an 80 minute, multiple-choice foundation Information is a key resource for all enterprises, and technology plays a significant role.
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: Course Overview and Introduction

  • COBIT 5 Overview
  • The Five Principles of COBIT 5
  • The Goals Cascade
  • The Seven Enterprise Enablers
  • COBIT 5 Process Reference Model
  • Process Capability Levels
  • Executive Order 13636
  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow

Lesson 2: Critical Security Framework Structure

  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 3: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 4: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 5: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 6: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 7: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 8: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 9: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

The recommended prerequisites for this course are:

  • Completed COBIT 5 Foundation Course (for obtaining the CSF Implementation Enhanced Qualification)
  • Basic Knowledge of COBIT 5
  • Basic knowledge of cybersecurity concepts

titleCOBIT 5 Foundation and Assessor for Security
days5
seo_titleCOBIT 5 Foundation and Assessor for Security Training | Insoft Services
seo_decCOBIT 5 Foundation and Assessor for Security provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities.
seo_tkeyFoundation and Assessor for Security
categorycybersecurity
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Foundation and Assessor for Security course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.
objective

The COBIT 5 Foundation and Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How to use the self-assessment guide
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  •  The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Program
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 7: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 8: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 9: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 10: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 11: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 12: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 13 – Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Foundation and Assessor for Security course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Assessor for Security
days3
seo_titleCOBIT 5 Assessor for Security - IT Training | Insoft Services
seo_decThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model.
seo_tkeyCOBIT 5 Assessor for Security
categorycybersecurity
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.
objective

The COBIT 5 Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  •  How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  •  How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: Foundation Review

  • Process Capability Assessment
  • COBIT Assessment Program
  • Process Capability Program
  • Advantages of the ISO/IEC15504 Approach
  • Key Definitions
  • Process Reference Model
  • Assessing Process Capability
  • COBIT Process Assessment Attributes
  • Consequences of Capability Gaps

Lesson 2: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 3: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 4: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 5: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 6: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 7: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 8: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 9: Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Assessor Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleOWASP Top 10 Bootcamp
days2
seo_titleOWASP Top 10 Bootcamp - IT Training | Insoft Services
seo_decOWASP Top 10 Bootcamp course shows how to identify and exploit general vulnerabilities, and how to fix existing holes and prevent new ones from occurring.
seo_tkeyOWASP Top 10 Bootcamp
categoryweb-applications
vendorOWASP

techonogyOpen-Source
overviewIn OWASP Top 10 Bootcamp course you will learn about the most common security risks for web applications (OWASP Top 10). Find out how to identify and exploit general vulnerabilities in applications, and how to fix existing holes and prevent new ones from occurring.   See other courses available
objective

After successfully completing the OWASP Top 10 Bootcamp course, you will:

  • Recognize the causes behind and the consequences of common coding errors and mistakes
  • Understand the methods for discovery and exploitation of these issues
  • Understand the basic practices that help prevent the most common mistakes and lead to more secure software

outline

This training follows the structure of the OWASP Top 10 list of the most critical web application security risks. For each risk, it provides its description, common examples of vulnerabilities and ways the attackers can use to exploit them, and explains the potential consequences of a successful attack.

Basic guidance on how to avoid each risk is also provided, which is delivered in engaging, seminar-style lecture format with hands-on lab exercises for you to complete. This hands-on approach keeps you engaged and ensures the knowledge transfer of critical secure coding techniques.

Labs

The OWASP Top 10 Boot Camp features several hands-on labs, that includes:

  • Exploiting SQL injection
  • Attacking authentication
  • Cross-site scripting exploitation
  • Source code auditing
  • CMS identification
  • Attacking web services
  • Client-side attacks
  • Open-source analysis & Google hacking
  • Exploiting web application with w3a

target_au

OWASP Top 10 course applies to a broad audience. Primarily designed for professionals whose job function includes creating web applications, it will also be highly beneficial for other IT and information security professionals, as well as managers who want to know more about web application security risks and what they mean to an organization.


pre_req
titleOWASP Application Threat Modeling
days2
seo_titleOWASP Application Threat Modeling - IT Training | Insoft Services
seo_decThe OWASP Application Threat Modeling gives the best training possible and the templates to incorporate threat modeling best practices in the daily work.
seo_tkeyOWASP Application Threat Modeling
categorynetwork-security-courses
vendorOWASP

techonogyOpen-Source
overviewAs skilled and experienced professionals we know that there is a gap between academic knowledge of threat modeling and the real world. To close that gap, we developed practical use cases, based on real-world projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using the OWASP Application Threat Modeling methodology, we provide our students with the best training possible and the templates to incorporate threat modeling best practices in their daily work. Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on:
  • B2B web and mobile applications, sharing the same REST back-end
  • An IoT deployment with a gateway and a cloud-based update service
  • OAuth scenarios for an HR application
  • Privacy of a new face recognition system in an airport
  • Get into the defenders’ head, attacking a nuclear facility
  See other courses available
objective
outline

Day 1

  • Threat modelling introduction
  • Threat modelling in a secure development lifecycle
  • What is threat modelling?
  • Why perform threat modelling?
  • Threat modelling stages
  • Different threat modelling methodologies
  • Document a threat model
  • Diagrams –what are you building?
  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Sequence and state diagrams
  • Advanced diagrams
  • Hands-on: diagram B2B web and mobile applications, sharing the same REST backend
  • Identifying threats –what can go wrong?
  • STRIDE introduction
  • Spoofing threats
  • Tampering threats
  • Repudiation threats
  • Information disclosure threats
  • Denial of service threats
  • Elevation of privilege threats
  • Attack trees
  • Attack libraries
  • Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on-premise gateway and secure update service

Day 2

  • Addressing each threat
  • Mitigation patterns
  • Authentication: mitigating spoofing
  • Integrity: mitigating tampering
  • Non-repudiation: mitigating repudiation
  • Confidentiality: mitigating information disclosure
  • Availability: mitigating denial of service
  • Authorization: mitigating elevation of privilege
  • Specialist mitigations
  • Hands-on: threat mitigations OAuth scenarios for web and mobile applications

target_au

Threat modeling is a crucial technique to assure more secure software and systems. The OWASP Application Threat Modeling training will provide our students with the know-how, templates, and exercises to start threat modeling themselves. Key takeaways are:

  • becoming a better (security) professional
  • understanding the process and technique of threat modeling
  • knowing when and how to introduce and improve threat modeling

pre_req

Students should be familiar with basic knowledge of web and mobile applications, databases & Single sign-on (SSO) principles


titleWeb Hacking Check Point Certified PenTesting Expert
days2
seo_titleWeb Hacking Check Point Certified PenTesting Expert | Insoft Services
seo_decIn this Web Hacking Check Point PenTesting course you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing.
seo_tkeyWeb Hacking Check Point
categorycybersecurity
vendorCheck Point

techonogySecurity
overviewThe Web Hacking Check Point Certified PenTesting Expert course is an entry-level web application security testing training. This course works as a prerequisite for the Advanced Web Hacking course. In two days, you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing with a focus on web applications.
objective
  • This curriculum introduces you to Web Application Hacking.
  • Practical focus
  • Learn how web application security flaws are found
  • Discover leading industry standards and approaches
  • Use this foundation to enhance your knowledge
  •  Prepare for more advanced web application topics

outline

Day 1

Information gathering, profiling and cross-site scripting

  • Understand HTTP protocol
  • Identify the attack surface
  • Username enumeration
  • Information disclosure
  • Issues with SSL / TLS
  • Cross-site scripting

Day 2

Injection, flaws, files and hacks

  • SQL injection
  • XXE attacks
  • OS code injection
  • Local/remote file include?
  • Cryptographic weakness
  • Business logic flaws
  • Insecure file uploads

target_au
  • System administrators
  • Web developers
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next level

pre_req

Before attending the Web Hacking Check Point Certified PenTesting Expert course, you should have:

  • Laptop with Windows Operating System installed (either natively or running in a VM)
  • Administrative access to perform tasks such as installing software, disabling antivirus etc..
  • Ethernet/wired network for this class (Or supported adapter).

titleInfrastructure Hacking Check Point Certified Pen Testing Expert
days3
seo_titleInfrastructure Hacking Check Point Certified PenTesting Expert | Insoft UK
seo_decThe Infrastructure Hacking Check Point Certified Pen Testing Expert course will give you what is necessary to start or formalise your pen testing career.
seo_tkeyInfrastructure Hacking Check Point
categorynetwork-security-courses
vendorCheck Point

techonogySecurity
overviewIn this Three days course you will learn foundations of Pen Testing and how to find and exploit vulnerabilities within different technologies (web and infrastructure) and provides insight to how the mind-set of a hacker works. It moves on to provide you with the basics of network hacking, laying a foundation by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.
objective

This curriculum familiarizes you with hacking tools and techniques.

  • Gain practical experience with tools that will serve you in the future
  • Learn tools and techniques to hack various components involved in infrastructure hacking
  • Develop a critical understanding of the concepts behind these

outline
target_au
  • IT Managers
  • Security enthusiasts, anyone interested in Pen Testing and ethical hacking
  • Security enthusiasts
  • Anybody who wishes to make a career in this domain and gain knowledge of networks and applications
  • System Administrators
  • SOC Analysts
  • Network Engineers
  • Pen Testers who are wanting to level up their skills

pre_req
  • Knowledge of networking and operating systems

titleHacking 101 Check Point Certified PenTesting
days1
seo_titleHacking 101 Check Point Certified PenTesting Training | Insoft Services
seo_decThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing and Reverse Engineering.
seo_tkeyHacking 101
categorycybersecurity
vendorCheck Point

techonogySecurity
overviewThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing, by providing knowledge and skills in areas of network, system, network, web and applications hacking, as well as in Reverse Engineering.
objective

Discover the world of Pen Testing Begin your journey with proven hacking techniques. The Hacking 101 Check Point Certified PenTesting course trains IT professionals in the skills of Pen Testing. You will become familiar with the risks and vulnerabilities of corporate networks.

You will learn hacking skills for:

  • Systems
  • Networks
  • Web
  • Applications
  • Reverse software engineering

outline
  • Pen Test Methodology
  • Website architecture
  • Attack vectors
  • SQL injection
  • XSS (Cross-site scripting)
  • Burp (Proxy tool)

Learn Hacking techniques for infrastructure devices and systems. These skills are critical for penetration testing and managing vulnerabilities in your environment. Students will become familiar with scanning, testing and hacking networks.

There are live demonstrations that feature a variety of defensive hacking techniques.


target_au

Students with a background in programming and networking.


pre_req

Students should bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks such as installing software, disabling antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported. Also, note that we will use an Ethernet/wired network for this class. If your laptop does not support this, please carry the correct adaptor to ensure you are able to connect to the wired network.


titleForcepoint Web Security System Engineer
days5
seo_titleForcepoint Web Security System Engineer Course Training
seo_decIn this Forcepoint Web Security System Engineer course, you will gain core skills as a system engineer for handling Forcepoint Web Security.
seo_tkey
categoryweb-security
vendorForcepoint

techonogySecurity
overviewThe Forcepoint Web Security System Engineer course is designed for people who will manage or lead system engineering development of Forcepoint Web Security that involves deployment planning, advanced configuration, troubleshooting, and debugging procedures. Instructors deliver this class with dialog with students, hands-on walkthroughs to build competencies and lab scenarios for students to independently demonstrate competencies.
objective
  • Given a set of environmental, acceptable usage, and user requirements, deploy Web Security in various enterprise environments.
  • Configure Web Security options to tune and balance settings to respond to system needs.
  • Demonstrate troubleshooting and debugging steps.

outline

Module 1: Deployment

  • Identify which services and components to install.
  • Follow best practices to review installation prerequisites.
  • Describe the Forcepoint appliance architecture.
  • Complete a Web Security installation on a Windows host.
  • Find relevant logs if deployment issues arise.
  • Apply guidelines related to component placement, limits, ratios, and supported configurations.
  • Complete an initial appliance setup.
  • Identify features of Forcepoint appliances.
  • Define methods of traffic redirection using Content Gateway.
  • Identify explicit and transparent proxies.
  • Describe methods of configuring the proxy for high availability.
  • Explain deployment strategies for simple, medium, and advanced network deployments.
  • Utilize the recommended sizing guidelines and list deployment recommendations for small, medium, and large networks.
  • Identify supported Forcepoint solutions and third-party products for integration.
  • Describe hybrid deployment.
  • Explain policy migration from Web Security on-premises to Web Security Cloud.
  • List considerations and required components needed for disaster recovery.
  • Follow applicable disaster recovery guidelines.

Module 2: Configuration

  • Identify Web Security components and their interconnectivity.
  • Specify the components that support bare minimum deployments.
  • Explain key services and settings that support Web Security components.
  • Install and use Forcepoint Security Appliance Manager.
  • Identify and analyze filtering and policy enforcement components.
  • Articulate essential features and functions about the Content Gateway architecture.
  • Design and implement proxy authentication based on a customer’s network size and Directory Service options.
  • Implement user identification components in single and multi-domain environments.
  • Describe User Service.
  • Explain SIEM integration.

Module 3: Troubleshooting

  • Identify Web Security configuration files, diagnostic tools, tuning parameters, and verbose logging.
  • List general recommendations when troubleshooting issues and formulating workarounds.
  • Locate specific Web Security logs.
  • Follow steps to use Visual Diagnostic Tool.
  • Describe available options and tools when gathering diagnostic data for Web Security components.
  • Interpret debug.txt results.
  • Demonstrate appliance CLI commands and operations.

target_au
  • Channel partners: sales engineers, implementation specialists, deployment specialists, network architects, technical support
  • Customers: deployment specialists, implementation specialists, system engineers
  • Forcepoint: sales engineers, professional services, technical support

pre_req
  • Completion of the Forcepoint Web Security Administrator Course and Certification
  • Intermediate knowledge of networking concepts (IP addresses, routing, URLs, proxies, gateways, firewalls)
  • User experience with platforms on which Web Security will be deployed
  • User experience with other Forcepoint products that support Web Security integration

titleForcepoint NGFW System Engineer
days5
seo_titleForcepoint NGFW System Engineer Course Training
seo_decIn the Forcepoint NGFW System Engineer course you will learn how to install, configure, administer and support Forcepoint NGFW into the security ecosystem.
seo_tkey
categorynetwork-security-courses
vendorForcepoint

techonogySecurity
overview

In this five-day instructor-led course, you will learn the skills needed to practice as a system engineer with responsibilities for design, installation, configuration, administration, and support of the Forcepoint NGFW. Through instruction, demonstrations, and hands-on lab practice exercises, you will understand the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments.

You will then develop expertise in topics that include, but are not limited to, clustering the NGFW, creating security rules and policies, integrating the NGFW with other Forcepoint technologies, inbound and outbound traffic management, understanding multi-link technology, configuring VPNs, traffic deep inspection, and controlling endpoint activity with the Endpoint Context Agent. This course prepares engineers or other professionals who need to manage or lead system engineering development of a Forcepoint NGFW deployment from concept creation to production.


objective
  • Describe the fundamentals of the NGFW solution.
  • Plan and execute the deployment of a NGFW engine and Security Management Center.
  • Configure the routing for a NGFW deployment.
  • Configure security policies and access control.
  • Configure the system for a distributed environment using NAT, locations, and contact addresses.
  • Deploy and configure a firewall cluster.
  • Review an example of the deployment and configuration of an MSSP architecture.
  • Configure and utilize multiple internet connections.
  • Define Multi-Link Policy-based VPNs.
  • Integrate with Active Directory to manage users and authentication.
  • Create a mobile VPN and deploy a VPN client.
  • Perform traffic inspection and recognition of Network Applications.
  • Customize and fine-tune Inspection policies.
  • Implement file filtering and malware detection.
  • Describe the concepts of traffic normalization and the use of situations.
  • Configure TLS decryption.
  • Define key features and distinctives of the IPS and Layer 2 Firewall roles.
  • Integrate the NGFW with Forcepoint cloud solutions.
  • Troubleshoot the NGFW engines, clusters, and SMC.

outline

Module 1: System Architecture Overview

  • Articulate the NGFW System Architecture.
  • Understand how to size a firewall and management environment.
  • Understand Management and Log Server high availability.
  • Become familiar with upgrading Management Server, Log Server, and engines.
  • Articulate the Forcepoint NGFW license model.

Module 2: Firewall/VPN Role and Single Firewall Deployment

  • Describe basic network defence strategies.
  • Define the capabilities and key features of the NGFW.
  • Understand and learn the process of defining and deploy a single firewall.
  • Identify additional features of the NGFW.

Module 3: Routing and Anti-spoofing

  • Configure static routing.
  • Describe additional special routing capabilities of the NGFW.
  • Understand route metrics and route monitoring.
  • Summarize the origin and function of Anti-spoofing.

Module 4: NGFW Policies

  • Describe different NGFW policy types.
  • Define NGFW policy templates and policy structure.
  • Identify the anatomy of a security policy and the objects used in policies.
  • Detail the process of policy installation and activation.

Module 5: Distributed System Configuration

  • Describe system communication in a distributed firewall environment.
  • Identify locations and contact addresses in distributed systems.
  • Describe system communication between management and engines.
  • Configure Network Address Translation (NAT).

Module 6: Firewall/VPN Role and Clustering technology

  • Describe the firewall clustering architecture and theory.
  • Configure a firewall cluster in the SMC (management).
  • Employ NGFW interface options.
  • Deploy a firewall cluster.

Module 7: MSSP and Virtual Contexts

  • Describe the SMC Domain Architecture.
  • Detail the function of the Web Portal Server.
  • Define Virtual Contexts.
  • Relate Master Engines and Virtual Engines.
  • Relate clustering and performance.
  • Review a configuration and deployment example of an MSSP architecture.

Module 8: Outbound Multi-Link Technology

  • Describe Outbound Traffic Management and its capabilities.
  • Explain ISP link selection.
  • Classify when to use a particular link selection method.
  • Configure Outbound Multi-Link.

Module 9: Site-to-Site VPNs

  • Define Forcepoint NGFW VPN capabilities.
  • Define Forcepoint NGFW VPN terminology.
  • Identify supported VPN topologies.
  • Relate Multi-Link and VPNs.
  • Test VPN-related tools in the SMC.
  • Configure a Multi-Link Policy-Based VPN.
  • Investigate Route-Based VPNs and when to use them.
  • Design VPN Hub configuration.

Module 10: Active Directory Integration

  • Define network user management.
  • Integrate Active Directory with the SMC (management).
  • Categorize the role of NPS, LDAP authentication, RADIUS, and TACAC+ in the authentication process.
  • Deploy Forcepoint User Identification.
  • Configure and deploy the Endpoint Context Agent.
  • Monitor network users.

Module 11: VPN Client

  • Describe Mobile VPN connections.
  • Distinguish IPSec and SSL VPN tunnelling.
  • Configure an NGFW engine for Mobile VPN connections.
  • Configure the VPN Client for an endpoint.
  • Demonstrate tools for Mobile VPN troubleshooting.

Module 12: Traffic Inspection

  • Review connection control and the role of Deep Inspection.
  • Differentiate between Services, Protocol Agents, and Proxy Modules.
  • Configure a Sidewinder Proxy service.
  • Establish Network Application Identification.
  • Differentiate Network Applications and Client Applications.

Module 13: Inspection Policies

  • Relate firewall and inspection policies.
  • Illustrate the anatomy of Inspection Policies.
  • Differentiate the predefined Inspection Policy templates.
  • Define the concept of Situations.
  • Define the function of the Inspection Rules tree.
  • Fine-tune inspection policies.
  • Analyze the role and function of Inspection Exception rules.
  • Analyze the use and function of Blacklisting.

Module 14: Malware Detection and File Filtering

  • Explain the process of Malware Detection.
  • Illustrate the anatomy of a File Filtering Policy.
  • Define the process of using File Reputation services.
  • Configure built-in Anti-Malware scanning.
  • Describe the role of Advance Malware Detection.

Module 15: NGFW Inspection Techniques

  • Define techniques used by the NGFW to identify threats.
  • Detail the traffic inspection process.
  • Explain the role of Advanced Evasion Techniques and the process of traffic normalization.
  • Describe misuse detection with Fingerprints.
  • Describe concept of Situations and their role in traffic inspection.
  • Analyze Regular Expression syntax.
  • Review examples of fingerprints.

Module 16: TLS Inspection

  • Articulate the purpose of TLS inspection.
  • Describe TLS inspection exceptions.
  • Define the process of Server and Client-Side TLS inspection.
  • Configure the TLS inspection.

Module 17: NGFW in Layer 2 Roles and Multi-Layer Deployment

  • Identify NGFW Operating Roles.
  • Define key features of the IPS and Layer 2 Firewall roles.
  • Understand the difference between the Firewall and IPS.
  • Describe a Layer 2 Policy.
  • Configure and deploy a multi-layer NGFW.
  • Analyze the role of High Availability in multi-layer deployments.

Module 18: Forcepoint Integration

  • Configure integration with Forcepoint Web Security Cloud.
  • Detail how to integrate with Forcepoint Advanced Malware Detection.
  • Review the Malware Detection process.
  • Understand information exchange using Syslog or other SIEM solutions.

Module 19: Troubleshooting

  • Detail the NGFW packet inspection process.
  • Review the troubleshooting process and learn troubleshooting tips.
  • Define the role of sgInfo in troubleshooting.
  • Explore how to troubleshooting with logs.
  • Understand how to troubleshoot a VPN.
  • Analyze the role of monitoring in troubleshooting.
  • Troubleshoot the NGFW engine.

target_au
  • End-user/customers: system administrators, network security administrators, network engineers, IT staff
  • Channel partners: consultants, system architects, integrators and planners who help customers with forcepoint NGFW implementations
  • Forcepoint: sales engineers, professional services, technical support

pre_req
  • Completion of the Forcepoint NGFW Administrator Course and certification
  • General understanding IPv4 networking concepts (TCP/IP, routing, firewall functionalities, VPN, deep packet inspection)
  • Basic knowledge of Active Directory/User Directory concepts

titleForcepoint Insider Threat System Engineer Course
days5
seo_titleForcepoint Insider Threat System Engineer Course Training
seo_decIn the Forcepoint Insider Threat System Engineer course, you will gain an understanding of the key core competencies and skills needed to practice as a SE.
seo_tkey
categorysystem-engineer
vendorForcepoint

techonogyIT Systems and Security
overviewIn the Forcepoint Insider Threat System Engineer 5 days course, students will gain an understanding of the key core competencies and skills needed to practice as a System Engineer handling Forcepoint Insider Threat. The core competencies are design, deployment, integration, maintenance, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Insider Threat from concept creation to production.
objective
  • Understand key deployment types.
  • Learn about sizing and performance considerations.
  • Understand how Insider Threat integrates with other Forcepoint products and third-party products.
  • Perform common maintenance activities to keep system performance high in fast-evolving real-world environments.
  • Troubleshoot and debug each major component.

outline

Day 1&2–Design and Deployment

1. Components and communication

  • Describe the responsibilities of each component
  • Understand protocols and ports used for communication between components

2. Planning

  • Identify and confirm key System Requirements
  • Provide sizing guidelines based on number of agents and policy weight
  • Accommodate for growth and redundancy specifications

3. Installation

  • Perform demos, POCs, and simple deployments
  • Perform intermediate appliance-based deployments
  • Perform advanced clustered deployments for large enterprises

4. Initial configuration

  • Complete global setup checklist
  • Complete Administration Workbench agent setup checklist
  • Complete Policy Workbench checklist

5. Phased rollout deployments

  • Implement best practices for initial rollout
  • Configure and Install Windows Agent
  • Configure and Install Mac OS X Agent

6. Tuning

  • Create, test, and tune advanced level policies to address a variety of customer’s insider threat concerns

7. Advanced Agent deployment

  • Complete roll out using remote Agent deployment solutions

8. Backup and Disaster Recovery

  • Set up backups and confirm them with a test recovery

9. Monitoring

  • Track deployed Agents using Administration Workbench
  • Run and review reports to preempt potential performance issues

Day 3–Integrations

1. Perform AP-DATA integration

  • Test and tune AP-DATA triggered policies

2. Set up group mapping via LDAP integration

3. Understand the capabilities of Convergence and Spotlight APIs

Day 4–Upgrades and Hotfixes

1. Server upgrades

  • Prepare deployment and database for hotfix
  • Install Hotfix
  • Reinitialize database and test deployment

2. Agent Bundle upgrades and compatibility packs

  • Upgrade using agent commands
  • Upgrade using remote install utility

3. Verification

  • Confirm HF and Agent Bundles perform as expected

Day 5–Troubleshooting and Debugging

1. Troubleshooting methodology

  • Correctly identify the root cause
  • Apply and confirm a solution

2. Perform critical server diagnostics

  • Enable and review verbose logging
  • Access appliance using debug account

3. Database diagnostics and maintenance

  • Administer Oracle databases using sqlplus
  • Manage database using Oracle Enterprise Manager (OEM)

4. Agent monitoring and troubleshooting

  • Run Agent Tool diagnostics locally and remotely
  • Use Agent Tool to test for configuration issues
  • Manage Agents remotely
  • Enable and view verbose logging

 


target_au
  • Channel Partners: Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support
  • Forcepoint: Sales Engineers, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint Insider ThreatAdministrator Course(Previously “SVIT Administrator”)
  • Basic understanding of computer systems and networking

titleForcepoint DLP System Engineer
days5
seo_titleForcepoint DLP System Engineer Course Training
seo_decThe Forcepoint DLP System Engineer course is a five-day instructor-led training, where you will create and test a Forcepoint DLP deployment.
seo_tkey
categorydlp-system
vendorForcepoint

techonogyIT Systems and Security
overview

During this five-day hands-on instructor-led course, you will create and test a Forcepoint DLP deployment, perform indepth analysis of DLP component architecture, integrate Forcepoint DLP with other products, build policies, and leverage configurable script classifiers. Using the knowledge you have gained from the Forcepoint DLP Administrator course, you will create and fine tune fingerprint and machine learning classifiers; configure discovery tasks to crawl files and databases; build, install, and manage DLP endpoints; and use data endpoints for application control, encryption, and discovery.

You will perform advanced incident data management and maintenance tasks through Security Manager, such as dealing with failovers, upgrades and troubleshooting, including advanced debugging of DLP logs.


objective
  • Summarize the history of Forcepoint DLP.
  • Identify the primary Forcepoint DLP components.
  • Describe the Forcepoint DLP installation process.
  • Configure the DLP base environment.
  • Install the Analytics Engine to enable data analysis.
  • Install Protector for web scanning.
  • Describe DLP Policy Engine architecture and event lifecycle.
  • Summarize the DLP Policy structure and test a DLP policy.
  • Describe the Analytics Engine architecture
  • Explain and test incident data flow.
  • Describe the benefits of deploying a Supplemental Server.
  • Install and configure a Supplemental Server.
  • Create and test Fingerprinting and Machine Learning.
  • Install F1E to protect your sensitive data.
  • Test F1E anti-tampering and temporary bypass functions.
  • Identify Endpoint log files.
  • Trace Endpoint agent issues.
  • Exclude applications from DLP Endpoint.
  • Debug F1E using log files.
  • Create and run a Network Discovery task and an Endpoint Discovery task.
  • Run DLP reports.
  • Configure DLP roles.
  • Generate Discovery reports and troubleshoot the crawler.
  • Identify and run remediation scripts.
  • Describe the DLP component update process.
  • Describe automatic DLP component synchronization.
  • Configure backup and restore procedures.
  • Use the upgrade validation tool and upgrade DLP.
  • Describe the infrastructure database.
  • Investigate Policy Engine timeouts.

outline

Module 1: The Evolution of Forcepoint DLP

  • Data security story
  • Forcepoint story

Module 2: Installing Forcepoint DLP

  • Identifying the primary Forcepoint DLP components
  • Preparing for installation
  • Installing Forcepoint Security Manager
  • Configuring DLP base environment
  • Configuring Protector for email scanning
  • Performing initial testing of DLP

Module 3: Installing Additional DLP Components

  • DLP Module review
  • Installing Analytics Engine
  • Installing Protector for web

Module 4: DLP Policy Engine

  • Describing Policy Engine architecture and event life cycle
  • Summarizing DLP policy structure
  • Testing Policy Engine

Module 5: Analyzing data

  • Describing the Analytics Engine architecture and algorithm
  • Running Analytics Engine manually
  • Testing Analytics Engine

Module 6: Supplemental Server

  • Describing the benefits of deploying Supplemental Server.
  • Installing Supplemental Server.

Module 7: Configuring Fingerprinting and Machine Learning

  • Describing the classifiers created by crawlers
  • Configuring advanced file fingerprint
  • Configuring advanced database fingerprinting
  • Configuring machine learning

Module 8: Forcepoint One Endpoint (F1E)

  • Describing Endpoint Server architecture and endpoint communication
  • Installing Forcepoint One Endpoint (F1E) to include anti-tampering
  • Using Forcepoint One Endpoint (F1E)

Module 9: Troubleshoot DLP Endpoint Scanning

  • Troubleshooting endpoint agents
  • Tracing endpoint agent issues
  • Excluding applications from DLP endpoint
  • Debugging F1E

Module 10: DLP Discovery tasks

  • Discovering hidden data
  • Load balancing the crawler
  • Creating a Network Discovery task
  • Using Endpoint Discovery

Module 11: DLP Maintenance

  • Identifying and running reports
  • Configuring DLP roles
  • Generating Discovery task reports
  • Deleting a discovery job
  • Identifying types of remediation script
  • Running a remediation script
  • Inspecting a remediation script
  • Updating DLP components
  • Moving and replacing forensics
  • Describing automatic DLP component synchronization
  • Recording fingerprint task
  • Configuring DLP backup and DSS restore procedures
  • Performing a DLP backup
  • Using the upgrade validation tool
  • Fixing common SQL issues
  • Describing the Forcepoint infrastructure
  • Investigating Policy Engine timeouts

Module 12: Complex Classifiers

  • Identifying types of classifier
  • Building a data security policy
  • Combining multiple classifiers
  • Describing nested transactions logic

target_au
  • System Engineers, high-level System Administrators, and IT professionals assisting with DLP deployment, configuration, and administration
  • Consultants, system architects, integrators and planners who help customers with Forcepoint DLP implementations
  • Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint DLP Administrator Course and certification
  • Intermediate knowledge of networking and computer security concepts

titleForcepoint CASB System Engineer
days3
seo_titleForcepoint CASB System Engineer Course Training
seo_decThe Forcepoint CASB System Engineer training course enables CASB administrators, network security administrators, IT staff and Forcepoint CASB operators.
seo_tkey
categorycloud-security
vendorForcepoint

techonogyIT Systems and Security
overviewThe Forcepoint CASB System Engineer training course focuses on enabling CASB administrators, network security administrators, IT staff and Forcepoint CASB operators, as well as consultants, system architects, integrators and planners who help customers with Forcepoint CASB implementations. Forcepoint CASB training is available in a two-tier learning path. The first course, Forcepoint CASB Administrator is focused on how to use and administer the Forcepoint CASB solution after implementation. The second course, Forcepoint CASB SE is focused on how to deploy, tune, and troubleshoot the Forcepoint CASB solution. The Forcepoint CASB Administrator and Forcepoint CASB SE training is available separately or can be taken at one time through the Forcepoint CASB Service Professional Bootcamp.   See other Forcepoint courses
objective

The Forcepoint CASB Administrator course provides in-depth instruction for students looking to learn the features, components, and key integrations that enable Forcepoint CASB capabilities. Students will develop skills in system architecture, Active Directory integration, cloud app discovery, managing assets, DLP integration, compliance and governance, forensic analysis, reporting, and health assessment and maintenance of the Forcepoint CASB system.


outline

During the three days, students will gain an understanding of the core competencies and skills needed to practice as a System Engineer handling Forcepoint CASB. The core competencies are sizing, deployment, product tuning, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint CASB from concept creation to production.


target_au
pre_req
titleForcepoint Web Security
days3
seo_titleForcepoint Web Security Course Training
seo_decIn the Forcepoint Web Security course you will gain an understanding of the key core competencies to manage Forcepoint Web Security.
seo_tkey
categorycybersecurity
vendorForcepoint

techonogySecurity
overviewThe Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.
objective
  • Understand the Forcepoint Web Security components and architecture
  • Articulate common deployment topologies
  • Access anduse Security Manager, including other available user interfaces
  • Execute updates and upgrades on Forcepoint Web Security
  • Understand delegated administration
  • Comprehend and perform policy and filter basics
  • Create effective web policies
  • Understand exception management
  • Recognize different user management methods
  • Configure user identification and policy enforcement
  • Create notifications and alerts
  • Understand report types and utilization
  • Create various reports
  • Understand system health alerts and usage monitoring
  • Understand system disaster recovery procedures
  • Learn how to respond to incidents

outline

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security
  • Describe features, components, and key integrations that enable Web Security functionalities
  • Compare the advantages and disadvantages of various deployment methodologies
  • Articulate the licensing structure and how and when to enter the key within the Content Gateway
  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning
  • Identify standard and custom policies (and related filters) based on your organizations needs
  • Distinguish the key settingsin Security Manager
  • Compare user identification and proxy authentication
  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts
  • Explain the reporting flow
  • Describe the various reporting options to gain important insights about your environment
  • Identify suspicious network activity using threats dashboard
  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents
  • Compare and contrast the available update options
  • Distinguish the guidelines related to incident management and disaster recovery
  • Identify system health monitoring capabilities
  • Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery

target_au
  • System Administrators, Network Security Administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint Email Security Administrator
days3
seo_titleForcepoint Email Security Administrator Course Training
seo_decDuring the Forcepoint Email Security Administrator course, you will develop skills in creating email policies and system architecture and maintenance.
seo_tkey
categoryemail-security
vendorForcepoint

techonogySecurity
overviewIn this three-day course, you will learn the features, components, and key integrations that enable Forcepoint Email Security functionality: how to administer policies, handle incidents, and upgrade, manage and assess the health of the Forcepoint Email Security system. You will develop skills in creating email policies, configuring email encryption, incident management, reporting, and system architecture and maintenance.
objective
  • Describe the key capabilities of Forcepoint Email Security.
  • Understand the required product hardware and add-on components.
  • Understand multiple deployment scenarios.
  • Perform initial setup functions of Email Security.
  • Define connection level controls and secure message controls.
  • Configure user account authentication activities.
  • Create antispam email policies to control inbound email traffic.
  • Configure traffic management with various block/permit lists and manage message quarantines.
  • Demonstrate how to configure email DLP policies, rules, and actions.
  • Configure and customize PEM portal.
  • Activate email and transport layer encryption methods.
  • Schedule, run, and interpret reports and configure message logs.
  • Describe how to perform appliance system upgrades and disaster recovery procedures.

outline

Module 1: Features & Components
1. Forcepoint solution overview

  • Forcepoint solution introduction
  • Forcepoint Email Security key features and new features

2. Understanding the deployment solution

  • Communicate the Email Security key features.
  • Articulate Email Security key benefits and differentiators from other email security products.
  • Describe the Email Security Hardware Platform and Virtualization options.
  • Identify the appropriate installation method and sizing requirements to follow.
  • Describe the components of the Email Security and its supported platforms.
  • Administer the Appliance management tools.

3. Understanding the Product Deployment

  • Describe a high-level overview of email delivery with the security appliance.
  • Plan for appliance and email server network integration.
  • Configure physical and/or virtual appliance settings and plan for network host name and routing.
  • Review and Configure Appliance Internal Daemons.
  • Identify and Configure Communication Points With External Services.
  • Review Planned Hardware Resources and User Loads.

4. Getting started with Forcepoint Email Security

  • Describe the Fundamental Email Security Concepts and System Usage Models.
  • Setup the Email Security System and Review First Boot procedures.
  • Customize the Forcepoint Manager Console and Integrate the Email Module.
  • Complete Initial V-Series Appliance Configuration and Install Manager Console.

5. Setting up users and defining email routing

  • Configure User Directories and Customized User Groups.
  • Describe Domain Group Integration with Active Directory server.
  • Define User Directories for Authentication within Domain.
  • Define a User Directory filter for specific users and groups.
  • Direct Outbound Emails To Email Security via Smart Host.
  • Verify Outbound Email delivery to Remote Recipients.

Module 2: Traffic & Policies
6. Managing Traffic – Antispam Related Configurations

  • Explain the Pre-Filtering Concept and Bulk Email Elimination Tools.
  • Describe the Message Processing Flow for an SMTP system.
  • Create a Global IP Block List and edit the Trusted Host List.
  • Configure usage model for Real-Time Black List and Reputation Service checks.
  • Integrate Reverse DNS Lookup and Sender Policy Framework checks.
  • Verify Recipient Validation and Implement Directory Harvest Attack Prevention.
  • Determine whether SMTP Authentication is a suitable resource for your organization.
  • Compare trusted IP group and Allow Access List.

7. Managing Traffic – Advanced Configurations

  • Identify supported SMTP Port usage for appliance and hybrid modes.
  • Configure IP Address Group for Trusted and Allowed systems.
  • Enable SMTP VRFY command on the test system.
  • Explain how the System Administrator manages the Message Quarantine.
  • Describe the differences in permissions between Trusted IP and Allow Access List.
  • Enable and Monitor the Appliance Quarantine system.
  • Enable the Archive queue and move it to a remote SAMBA share.

8. Configuring Email Security Policies

  • Understand how Email Policy Flow, Types, and Conditions affect message flow.
  • Describe the Policies combine Rules, Filters and Actions in the Email Security appliance.
  • Configure default Action Types and Options.
  • Configure the Integration and Merging of Message Action Options.
  • Integrate Data Loss Protection (DLP) Tools with Email Security appliance.
  • Configure the Global IP and Global Address Permit Lists.
  • Verify policy behavior with test message generation tool.
  • Configure Email Security Antivirus and Antispam policy and verify detection.
  • Configure Email Data Loss Protection (DLP) action and policy rules.
  • Confirm Email DLP functionality with test message capture and log reviews.

Module 3: PEM & Advanced Configurations & Maintenance

9. Personal Email Manager (PEM) operations

  • Understand Personal Email Manager (PEM) architecture and use cases.
  • Configure the PEM portal and complete PEM configurations.
  • Describe Admin vs end user PEM and Quarantine activities.
  • Customize PEM Notification message and schedule.
  • Differentiate between Personal and Global address block/permit lists.
  • Perform Advanced PEM Configuration for key user accounts.
  • Manage Multiple Mailboxes within PEM portal.

10. Traffic shaping and threat protection

  • Configure the Email Sandbox Module and test its performance on test messages.
  • Analyze how Secure Message Delivery and Transport Layer Security increase message security.
  • Identify Traffic Shaping parameters and customize URL Sandbox solutions.
  • Configure Threat Protection Cloud.
  • Five parameters of traffic shaping, and how they function.

11. Transfer Layer Security (TLS)

  • Configure Secure Message Delivery for Email and DLP modules.
  • Verify Secure Message Delivery via Secure Portal message pickup.
  • Describe the Secure Message Delivery End User Experience for an external recipient.
  • Enforced/Mandatory TLS vs opportunistic TLS.
  • Enable enforced TLS for incoming/outgoing connections.
  • Enforced TLS security level and encryption strength.
  • Describe the TLS certification process.
  • Enable mandatory TLS and opportunistic TLS.

12. Email Security Reporting and Maintenance

  • Describe the overall requirements for Log Database Rollover and Maintenance.
  • Identify how Dashboard tools, Health Alerts, and Logs indicate appliance performance.
  • Activate and customize the Email Security Real-Time Monitor.
  • Manage the Presentation Reports and the Reporting Engine tools.
  • Explore Log Server Architecture and Database Partition Rollover and Deployment

target_au
  • System administrators, network security administrators, IT staff
  • Sales engineers, consultants, implementation specialists
  • Forcepoint channel partners

pre_req
  • General understanding of system administration and internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleCourse 55285A: Advanced Python
days2
seo_title55285A: Advanced Python Course Training
seo_decIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques.
seo_tkey
categoryprogramming
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques. This advanced Python course is taught using Python 3; however, differences between Python 2 and Python 3 are noted. For private Python classes, our instructor can focus specifically on Python 2 if desired.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Work with the Collections module.
  • Understand mapping and filtering and lambda functions.
  • Perform advanced sorting.
  • Work with regular expressions in Python.
  • Work with databases, CSV files, JSON, and XML.
  • Write object-oriented code in Python.
  • Test and debug your Python code

outline

Module 1: Advanced Python Concepts

In this lesson, you will learn about some Python functionality and techniques that are commonly used but require a solid foundation in Python to understand.

Lessons

  • Lambda Functions
  • Advanced List Comprehensions
  • Collections Module
  • Mapping and Filtering
  • Mutable and Immutable Built-in Objects
  • Sorting
  • Unpacking Sequences in Function Calls

Lab: Exercises in this Lesson

  • Rolling Five Dice
  • Creating a defaultdict
  • Creating an OrderedDict
  • Creating a Counter
  • Working with a deque
  • Converting list.sort() to sorted(iterable)
  • Converting a String to a DateTime.date Object

After completing this module, students will be able to:

  • Work with lambda functions.
  • Write more advanced list comprehensions.
  • Work with the collections module to create named tuples, defaultdicts, ordereddicts, counters, deque
  • Use mapping and filtering.
  • Sort sequences.
  • Unpack sequences in function calls.
  • Create modules and packages.

 

Module 2: Working with Data

Data is stored in many different places and in many different ways. There are Python modules for all of the most common ways.

Lessons

  • Relational Databases
  • CSV
  • Getting Data from the Web
  • JSON

Lab: Exercises in this Lesson

  • Querying an SQLite Database
  • Inserting File Data into a Database
  • Comparing Data in a CSV File
  • Requests and Beautiful Soup
  • Using JSON to Print Course Data

After completing this module, students will be able to:

  • Access and work with data stored in a relational database.
  • Access and work with data stored in a CSV file.
  • Get data from a web page.
  • Access and work with data stored as HTML and XML.
  • Access an API.
  • Access and work with data stored as JSON.

 

Module 3: Testing and Debugging

This module explains how to test and debug using Python.

Lessons

  • Testing for Performance
  • The unittest Module

Lab: Exercises in this Lesson

  • Fixing Functions

After completing this module, students will be able to:

  • Test performance with timers and using the time it module.
  • To write unit tests using the unittest module.

 

Module 4: Classes and Objects

An object is something that has attributes and/or behaviours, meaning it is certain ways and does certain things. In the real world, everything could be considered an object. Some objects are tangible, like rocks, trees, tennis racquets, and tennis players. And some objects are intangible, like words, colours, tennis swings, and tennis matches.

Lessons

  • Attributes
  • Behaviours
  • Classes vs. Objects
  • Attributes and Methods
  • Private Attributes
  • Properties
  • Documenting Classes
  • Inheritance
  • Static Methods
  • Class Attributes and Methods
  • Abstract Classes and Methods
  • Understanding Decorators

Lab: Exercises in this Lesson

  • Adding a roll() Method to Die
  • Properties
  • Documenting the Die Class
  • Extending to Die, Class
  • Extending the roll() Method

After completing this module, students will be able to:

  • Create classes and objects in Python.
  • Write instance methods, class methods, and static methods.
  • Define properties.
  • Create subclasses using inheritance.
  • Create abstract classes.
  • Appropriately document Python classes.
  • Understand how decorators work.

target_au
pre_req

Experience in the following is required for this Python class:

  • Basic Python programming experience. In particular, you should be very comfortable with:
    1. Working with strings.
    2. Working with lists, tuples and dictionaries.
    3. Loops and conditionals.
    4. Writing your own functions.

Experience in the following would be useful for this Python class:

  • Some exposure to HTML, XML, JSON, and SQL.

titleCourse 55278A: Advanced Microsoft Outlook 2019
days1
seo_title55278A: Advanced Microsoft Outlook 2019 Course Training
seo_decThe Advanced Microsoft Outlook 2019 (55278A) course teaches how to work with some of the more advanced features of Outlook.
seo_tkey
categorymicrosoft-office-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Advanced Microsoft Outlook 2019 (55278A) training course builds on basic skills in Outlook and teaches students to work with some of the more advanced features of Outlook.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tasks and notes.
  • Learn to work with signatures and themes.
  • Manage your inbox including filtering, creating search folders, and archiving.
  • Work with multiple accounts.

outline

Module 1: Working with Tasks and Notes

This module explains how to work with tasks and notes in Microsoft Outlook.

Lessons

  • Create a Task
  • Print a Task
  • Update a Task
  • Search for Tasks
  • Assign a Task
  • Reply to a Task Request
  • Track Tasks
  • Change Your Task View
  • Work with Notes
  • Lab: Work with Tasks
After completing this module, students will be able to:
  • Change your Task view.
  • Create a task.
  • Print a task.
  • Update a task.
  • Assign a task.
  • Search for tasks.
  • Reply to a task request.
  • Track tasks.
  • Work with notes.

 

Module 2: Using Signature and Themes

This module explains how to use signatures and themes.

Lessons

  • Create a Signature
  • Automatically Add a Signature to Messages
  • Modify a Signature
  • Format Outgoing Messages
  • Create and Apply a Theme
  • Lab: Adding a Theme and Signature to Your Messages
After completing this module, students will be able to:
  • Create a signature.
  • Learn how to automatically add the signature to email messages.
  • Modify a signature.
  • Create and apply a theme

 

Module 3: Managing Your Inbox

This module explains how to manage your inbox in Microsoft Outlook.

Lessons

  • Search for Messages
  • Create Search Folders
  • Sort Messages
  • Add New Local Folders
  • Move Messages between Folders
  • Group Your Mailbox Items
  • Filter Messages
  • Organize Messages
  • Create and Manage Rules
  • Manage Your Junk Email
  • Archive Your Messages
  • Create an Outlook Data File
  • Create a Quick-Step
  • Add Protection to Your Outgoing Messages
  • Create Auto-replies
  • Lab: Managing Your Inbox Exercises
  • Organizing Your Messages
  • Managing Your Mail by Creating a Quick-Step
After completing this module, students will be able to:
  • Search for messages.
  • Create search folders.
  • Group your mailbox items.
  • Filter messages.
  • Organize messages.
  • Manage your junk mail.
  • Archive your messages.
  • Create an Outlook data file.
  • Create a Quick Step to easily and quickly apply multiple actions to emails.
  • Add protection to outgoing emails.

 

Module 4: Working with Multiple Email Accounts

This module explains how to work with multiple email accounts in Microsoft Outlook.

Lessons

  • Setting Up Multiple Accounts in Outlook
  • Send Emails from Different Accounts
  • POP vs. IMAP Email Programs
  • Lab: Working with Multiple Email Accounts
After completing this module, students will be able to:
  • Set up multiple accounts in Outlook.
  • Send emails from different accounts.
  • Learn the differences between POP and IMAP email programs.

target_au

This course is intended for students who have basic skills with Microsoft Outlook 2019 who want to learn higher level skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Experience in the following is required for this Microsoft Outlook class:
  • Familiarity with Windows.
  • Introductory level knowledge of Outlook.

titleCourse 55274A: Advanced Microsoft Word 2019
days1
seo_title55274A: Advanced Microsoft Word 2019 Course Training
seo_decIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents and footnotes.
seo_tkey
categorymicrosoft-office-365
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents, footnotes, and endnotes, adding comments, tracking changes, comparing and combining documents, creating envelopes and labels, using Mail Merge, and protecting documents. This class is for Word 2019 on Windows.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tables of contents.
  • Learn to work with footnotes and endnotes.
  • Learn to insert bibliographies and indexes.
  • Learn to use comments.
  • Learn to use track changes including accepting and rejecting changes.
  • Learn to compare and combine documents.
  • Learn to use Mail Merge and create envelopes and labels.
  • Learn to protect documents.
  • Learn to use bookmarks, add watermarks, and customize the Ribbon.

outline

Module 1: Working with Long Documents

This module explains how to work with long documents in Microsoft Word.

Lessons

  • Adding a Table of Contents
  • Updating the Table of Contents
  • Deleting the Table of Contents
  • Footnotes and Endnotes
  • Inserting citations and a Bibliography
  • Adding an Index
  • Inserting a Table of Figures
  • Inserting and Updating a Table of Authorities
  • Creating an Outline
  • Lab: Working with Long Documents Exercises
  • Insert and Update a Table of Contents
  • Working with Footnotes
  • Insert Citations and a Bibliography
After completing this module, students will be able to:
  • Add a table of contents to a Microsoft Word document.
  • Update the table of contents.
  • Add footnotes to a Microsoft Word document.
  • Add endnotes to a Microsoft Word document.
  • Insert citations into a Microsoft Word document.
  • Insert a bibliography.
  • Update the bibliography.
  • Mark entries in a document.
  • Insert an index into a Microsoft Word document.
  • Create an outline in Word.

 

Module 2: Review and Collaborating on Documents

This module explains how to review and collaborate on Microsoft Word documents.

Lessons

  • Adding Comments
  • Tracking Changes
  • Viewing Changes, Additions, and Comments
  • Accepting and Rejecting Changes
  • Lab: Reviewing and Collaborating Exercises
  • Adding Comments to a Document
  • Tracking Changes
  • Viewing Markup
  • Accepting and Rejecting Changes
After completing this module, students will be able to:
  • Add and work with comments.
  • Track changes and set and change tracking options.
  • View changes, additions and comments.
  • Use the Reviewing pane.
  • Choose what changes to show.
  • Accept and reject changes.

 

Module 3: Comparing and Combining Documents

This module explains how to compare and combine documents in Microsoft Word.

Lessons

  • Comparing Documents
  • Combining Documents
  • Lab: Comparing and Combining Documents Exercises
  • Comparing Documents
  • Combining Documents
After completing this module, students will be able to:
  • Compare documents to find out what has changed between different versions of a document.
  • Combine documents to gather revisions made by various individuals into a single document.

 

Module 4: Managing Mailings

This module explains how to manage mailings in Microsoft Word.

Lessons

  • Creating Envelopes and Labels
  • Using Mail Merge
  • Lab: Managing Mailings Exercises
  • Printing an Envelope
  • Using Mail Merge
After completing this module, students will be able to:
  • Create and print envelopes in Microsoft Word.
  • Create and print labels in Microsoft Word.
  • Use Mail Merge to print or email form letters to multiple recipients.
  • Select mail Merge recipients from an existing list

 

Module 5: Protecting Documents

This module explains how to protect documents in Microsoft Word.

Lessons

  • Making Word Documents Read Only
  • Password Protect Word Documents
  • Removing Metadata from Files
  • Restrict Formatting and Editing
  • Lab: Protecting a Document
After completing this module, students will be able to:
  • Mark documents as final and makes them read-only.
  • Password protect Microsoft Word documents.
  • Restrict formatting options before sharing a document with others.
  • Restrict editing options before sharing a document with others

 

Module 6: Random Useful Items

This module goes over several random and useful features in Microsoft Word.

Lessons

  • Using Bookmarks
  • Adding Watermarks
  • Adding Titles to Sections
  • Inserting Built-in Fields
  • Using the Go To Feature
  • Using Macros
  • Copy Macros From Document to Document
  • Macro Security
  • Recording a Macro
  • Assigning Shortcut Keys
  • Customizing the Ribbon
  • Preparing a Document for Internationalization and Accessibility
  • Sharing
  • Lab: Random Useful Items Exercises
  • Using Bookmarks
  • Adding Custom Watermarks
  • Recording a Macro
  • Customizing the Ribbon
  • Using the Cloud
After completing this module, students will be able to:
  • Add bookmarks to a Microsoft Word document and to use them to jump around the document.
  • Add watermarks to a Microsoft Word document.
  • Add titles to sections.
  • Insert built-in fields.
  • Use the Go-To feature.
  • Customize the ribbon.
  • Prepare a document for internationalization and accessibility.
  • Learn how to use the Cloud.

target_au

This course is intended for students who have intermediate skills with Microsoft Word 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req

Intermediate-level experience in Microsoft Word.


titleCourse 55270A: Advanced Microsoft Excel 2019
days1
seo_title55270A: Advanced Microsoft Excel 2019 Course Training
seo_decIn this Advanced Microsoft Excel 2019 (55270A) training class you will gain skills to use pivot tables, audit and analyze worksheet data and manage macros.
seo_tkey
categorymicrosoft-office-365
vendorMicrosoft

techonogyInternet of Technology
overviewThis Advanced Microsoft Excel 2019 (55270A) training class is designed for students to gain the skills necessary to use pivot tables, audit and analyze worksheet data, utilize data tools, collaborate with others, and create and manage macros.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Create pivot tables and charts.
  • Learn to trace precedents and dependents.
  • Convert text and validate and consolidate data.
  • Collaborate with others by protecting worksheets and workbooks.
  • Create, use, edit, and manage macros.
  • Import and export data.

outline

Module 1: Using Pivot Tables

This module explains how to use pivot tables in Microsoft Excel.

Lessons

  • Creating Pivot Tables
  • More PivotTable Functionality
  • Inserting Slicers
  • Multi-Select Option in Slicers
  • PivotTable Enhancements
  • Working with Pivot Tables
  • Inserting Pivot Charts
  • More Pivot Table Functionality
  • Working with Pivot Tables
  • Lab: Working with Pivot Tables
After completing this module, students will be able to:
  • Use pivot tables to analyze data.
  • Edit pivot tables.
  • Format pivot tables.
  • Insert pivot charts.
  • Use Slicers.

 

Module 2: Auditing Worksheets

This module explains how to audit worksheets.

Lessons

  • Tracing Precedents
  • Tracing Dependents
  • Showing Formulas
  • Lab: Auditing Worksheets Exercises
  • Tracing Precedents
  • Tracing Dependents
After completing this module, students will be able to:
  • Audit formulas.
  • Trace precedents to determine which cells impact a specific cell.
  • Trace dependents to determine which cells are impacted by a specific cell.
  • Remove precedent and dependent arrows.
  • Show formulas.
  • Check for errors frequently found in formulas

 

Module 3: Data Tools

This module explains how to work with data tools.

Lessons

  • Converting Text to Columns
  • Linking to External Data
  • Controlling Calculation Options
  • Data Validation
  • Using Data Validation
  • Consolidating Data
  • Goal Seek
  • Using Goal Seek
  • Lab: Data Tools Exercises
  • Converting Text to Columns
  • Using Data Validation
  • Consolidating Data
  • Using Goal Seek
After completing this module, students will be able to:
  • Convert text to columns.
  • Use Data Validation to restrict the type of data that can be entered into a cell.
  • Consolidate data from a number of different ranges into one new range.
  • Use Goal Seek to figure out the value to input to obtain a specific result

 

Module 4: Working with Others

This module explains how to work with others in Microsoft Excel.

Lessons

  • Protecting Worksheets and Workbooks
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
  • Marking a Workbook as Final
  • Lab: Working with Others Exercises
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
After completing this module, students will be able to:
  • Password protect a workbook.
  • Password protect a worksheet.
  • Password protect ranges in a worksheet.
  • Track changes.
  • Accept and reject changes.
  • List all changes on a new sheet

 

Module 5: Recording and Using Macros

This module explains how to record and use macros.

Lessons

  • Recording Macros
  • Recording a Macro
  • Running Macros
  • Editing Macros
  • Adding Macros to the Quick Access Toolbar
  • Adding a Macro to the Quick Access Toolbar
  • Lab: Recording and Using Macros Exercises
  • Recording a Macro
  • Adding a Macro to the Quick Access Toolbar
After completing this module, students will be able to:
  • Record macros.
  • Run macros.
  • Edit macros (kind of).
  • Add macros to the Quick Access Toolbar

 

Module 6: Random Useful Items

This module explains how to use sparklines and other useful random features.

Lessons

  • Sparklines
  • Inserting and Customizing Sparklines
  • Using Microsoft Translator
  • Preparing a Workbook for Internationalization and Accessibility
  • Importing and Exporting Files
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
  • Lab: Random Useful Items Exercises
  • Inserting and Customizing Sparklines
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
After completing this module, students will be able to:
  • Insert sparklines into worksheets.
  • Customize sparklines by:
  • Change the type of sparkline.
  • Highlight key points.
  • Change colours.
  • Change the axis.
  • Prepare a workbook for internationalization, accessibility, and compatibility.
  • Import text files into Microsoft Excel.
  • Copy cells from a worksheet into Microsoft Word.
  • Copy and paste a chart into Microsoft Word.

 

Module 7: Cloud

This module explains how to save, share, and collaborate with others using the cloud.

Lessons

  • Using the Cloud.
  • Lab: Using the Cloud
After completing this module, students will be able to:
  • Use Excel in the Cloud.

target_au

Students who have intermediate skills with Microsoft Excel 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Before attending this course, students must have:
  • Basic and Intermediate Excel experience.

titleMS-700T00-A: Managing Microsoft Teams
days5
seo_titleManaging Microsoft Teams - Microsoft 365 Course Training
seo_decThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. Microsoft Teams admins configure, deploy, and manage Office 365 workloads for Microsoft Teams that focus on efficient and effective collaboration and communication in an enterprise environment. This course covers six central elements - Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the environment for a Microsoft Teams deployment, deploying and managing teams, managing collaboration and managing communication in Microsoft Teams.
objective

By actively participating in this course, you will learn about the following:

  • What is Microsoft Teams and how the components work together
  • How to implement Governance, Security and Compliance for Microsoft Teams
  • How to prepare an organizations environment for a Microsoft Teams deployment
  • How to deploy and manage teams
  • Ways of managing collaboration in Microsoft Teams
  • Techniques to manage and troubleshoot communication in Microsoft Teams

outline

Module 1: Microsoft Teams Overview

In Microsoft Teams overview, you will get an overview of Microsoft Teams including Teams architecture and related Office 365 workloads. You will be provided with an overview of security and compliance in Microsoft Teams and finally get an overview of how to manage Microsoft Teams.

Lessons

  • Overview of Microsoft Teams
  • Overview of security and compliance in Microsoft Teams
  • Overview of managing Microsoft Teams

Lab: Manage roles and create teams

  • Prepare team roles and licenses
  • Create a new team

 

Module 2: Implement Microsoft Teams Governance, Security and Compliance

In implementing governance, security and compliance for Microsoft Teams, you will plan and configure governance for Office 365 groups including expiration and naming policies. Then you will implement security by configuring conditional access, MFA or Threat Management for Microsoft Teams. Finally, you will implement compliance for Teams by using DLP policies, eDiscovery cases or supervision policies.

Lessons

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing Security for Microsoft Teams
  • Implementing Compliance for Microsoft Teams

Lab: Configure Security and Compliance for teams and content

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing security for Microsoft Teams
  • Implementing compliance for Microsoft Teams

 

Module 3: Prepare the environment for a Microsoft Teams deployment

In preparing the environment for a Microsoft Teams deployment, you plan an upgrade from Skype for Business to Microsoft Teams by evaluating upgrade paths with coexistence and upgrade modes, manage meeting migrations and configuring coexistence and upgrade settings. Then you plan and configure network settings for Microsoft Teams, and finally, you will deploy and manage Microsoft Teams endpoints.

Lessons

  • Upgrade from Skype for Business to Microsoft Teams
  • Plan and configure network settings for Microsoft Teams
  • Deploy and Manage Microsoft Teams endpoints

Lab: Environment preparation for Teams

  • Calculate networking capabilities
  • Evaluate configuration profiles
  • Provide team resources

 

Module 4: Deploy and manage teams

In deploying and managing teams, you will learn how to create and manage teams, manage membership and access for both, internal and external users.

Lessons

  • Create and manage teams
  • Manage membership
  • Manage access for external users

Lab: Manage teams

  • Manage team resources
  • Manage sharing and access

 

Module 5: Manage collaboration in Microsoft Teams

In managing collaboration in Microsoft Teams, you will manage chat and collaboration experiences such as team settings or private channel creation policies. Finally, you will manage settings for Teams apps such as app setup policies, Apps, bots & connectors in Microsoft Teams or publish a custom app in Microsoft Teams.

Lessons

  • Manage chat and collaboration experiences
  • Manage settings for Teams apps

Lab: Modify collaboration settings for Teams

  • Configure channel and message policies
  • Manage app settings for team

 

Module 6: Manage communication in Microsoft Teams

This course concludes with managing communication in Microsoft Teams. You will learn how to manage Live event and meetings experiences, manage phone numbers or Phone System for Microsoft Teams and finally how to troubleshoot audio, video, and client issues.

Lessons

  • Manage Live event and meetings experiences
  • Manage phone numbers
  • Manage Phone System for Microsoft Teams
  • Troubleshoot audio, video, and client issues

Lab: Modify communication settings for Teams

  • Configure meeting policies
  • Manage Phone System for Microsoft Teams
  • Troubleshooting audio, video and client issues

target_au

Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam.


pre_req
  • A proficient understanding of basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices, including using PowerShell.

titleMS-101T00: Microsoft 365 Mobility and Security
days5
seo_titleMicrosoft 365 Mobility and Security Course Training
seo_decThis Microsoft 365 Mobility and Security (MS-101T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyIT Services Management
overviewThis course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center. Now that you understand the key aspects of data governance, you will examine how to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection. You will conclude this section by learning how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. At this point, you will transition from planning to implementing device management; specifically, your Windows 10 deployment strategy. This includes learning how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.
objective
  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence
  • Data Governance in Microsoft 365
  • Archiving and Retention in Office 365
  • Data Governance in Microsoft 365 Intelligence
  • Search and Investigations
  • Device Management
  • Windows 10 Deployment Strategies
  • Mobile Device Management

outline

Module 1: Explore security metrics in Microsoft 365

In this learning path, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Identity Protection and Microsoft Defender for Office 365.

Lessons

  • Examine threat vectors and data breaches
  • Explore the Zero Trust security model
  • Explore security solutions in Microsoft 365
  • Examine Microsoft Secure Score
  • Examine Privileged Identity Management
  • Examine Azure Identity Protection

Lab : Tenant Setup and Privileged Identity Management

  • Initialize your Microsoft 365 Tenant
  • PIM Resource Workflows

After completing this module, students will be able to:

  • Describe several techniques hackers use to compromise user accounts through email
  • Describe techniques hackers use to gain control over resources
  • Describe techniques hackers use to compromise data
  • Describe the Zero Trust approach to security in Microsoft 365.
  • Describe the components of Zero Trust security.
  • Describe and five steps to implementing a Zero Trust model in your organization.
  • Explain Zero Trust networking
  • List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365
  • Describe how Microsoft 365 Threat Intelligence can be benefit your organization
  • Monitor your organization through auditing and alerts
  • Describe how ASM enhances visibility and control over your tenant through three core areas
  • Describe the benefits of Secure Score and what kind of services can be analyzed
  • Describe how to collect data using the Secure Score API
  • Know where to identify actions that will increase your security by mitigating risks
  • Explain how to determine the threats each action will mitigate and the impact it has on use
  • Explain Privileged Identity Management (PIM) in Azure administration
  • Configure PIM for use in your organization
  • Audit PIM roles
  • Explain Microsoft Identity Manager
  • Explain Privileged Access Management in Microsoft 365
  • Describe Azure Identity Protection and what kind of identities can be protected
  • Understand how to enable Azure Identity Protection
  • Know how to identify vulnerabilities and risk events
  • Plan your investigation in protecting cloud-based identities
  • Plan how to protect your Azure Active Directory environment from security breaches

Module 2: Manage your Microsoft 365 security services

This learning path examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Microsoft Defender for Office 365, Safe Attachments, and Safe Links. You will also be introduced to the various reports that help an organization monitor its security health.

Lessons

  • Examine Exchange Online Protection
  • Examine Microsoft Defender for Office 365
  • Manage Safe Attachments
  • Manage Safe Links
  • Explore reporting in the Microsoft 365 security services

Lab : Manage Microsoft 365 Security Services

  • Implement a Safe Attachments policy
  • Implement a Safe Links policy

After completing this module, students will be able to:

  • Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection
  • List several mechanisms used to filter spam and malware
  • Describe additional solutions to protect against phishing and spoofing
  • Describe the benefits of the Spoof Intelligence feature
  • Describe how Safe Attachments is used to block zero-day malware in email attachments and documents
  • Describe how Safe Links protect users from malicious URLs embedded in email and documents
  • Create and modify a Safe Attachments policy in the Security & Compliance Center
  • Create a Safe Attachments policy by using Windows PowerShell
  • Configure a Safe Attachments policy to take certain actions
  • Understand how a transport rule can be used to disable the Safe Attachments functionality
  • Describe the end-user experience when an email attachment is scanned and found to be malicious
  • Create and modify a Safe Links policy in the Security & Compliance Center
  • Create a Safe Links policy by using Windows PowerShell
  • Understand how a transport rule can be used to disable the Safe Links functionality
  • Describe the end-user experience when Safe Links identifies a link to a malicious website or file
  • Describe how the Microsoft 365 security reports show how your organization is being protected
  • Understand where to access reports generated by EOP and Microsoft Defender for Office 365
  • Understand how to access detailed information from the generated reports generated

Module 3: Implement threat intelligence in Microsoft 365

In this learning path, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard, Microsoft Defender for Identity, and Microsoft Cloud Application Security to stay ahead of potential security breaches.

Lessons

  • Explore threat intelligence in Microsoft 365
  • Explore the Security Dashboard
  • Implement Microsoft Defender for Identity
  • Implement Microsoft Cloud Application Security

Lab : Implement Threat Intelligence

  • Conduct a Spear Phishing attack using the Attack Simulator
  • Conduct Password attacks using the Attack Simulator
  • Prepare for Alert Policies
  • Implement a Mailbox Permission Alert
  • Implement a SharePoint Permission Alert
  • Test the Default eDiscovery Alert

After completing this module, students will be able to:

  • Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph
  • Describe how the threat dashboard can benefit C-level security officers
  • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant
  • Describe how the Security Dashboard displays top risks, global trends, and protection quality
  • Describe what Microsoft Defender for Identity is and what requirements are needed to deploy it
  • Configure Microsoft Defender for Identity
  • Manage the Microsoft Defender for Identity services
  • Describe Cloud App Security
  • Explain how to deploy Cloud App Security
  • Control your Cloud Apps with Policies
  • Troubleshoot Cloud App Security

Module 4: Introduction to Data Governance in Microsoft 365

This learning path examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Office 365 message encryption, In-place Records Management in SharePoint, and data loss prevention (DLP).

Lessons

  • Explore archiving in Microsoft 365
  • Explore retention in Microsoft 365
  • Explore Information Rights Management
  • Explore Office 365 Message Encryption
  • Explore In-place Records Management in SharePoint
  • Explore Data Loss Prevention in Microsoft 365

Lab : Implement Data Governance

  • Configure Microsoft 365 Message Encryption
  • Validate Information Rights Management
  • Initialize Compliance
  • Configure Retention Tags and Policies

After completing this module, students will be able to:

  • Understand Data Governance in Microsoft 365
  • Describe the difference between In-Place Archive and Records Management
  • Explain how data is archived in Exchange
  • Recognize the benefits of In Place Records Management in SharePoint
  • Understand how Messaging Records Management works in Exchange
  • List the types of retention tags that can be applied to mailboxes
  • Know the different Microsoft 365 Encryption Options
  • Understand how Information Rights Management (IRM) can be used in Exchange
  • Configure IRM protection for Exchange mails
  • Explain how IRM can be used in SharePoint
  • Apply IRM protection to SharePoint documents
  • Tell the differences between IRM protection and AIP classification
  • Understand how message encryption works
  • Perform encryption on a message
  • Accomplish decryption of a message
  • Understand the co-operation of signing and encryption simultaneously
  • Explain what triple-wrapped messages are
  • Describe when you can use Office 365 Message Encryption
  • Explain how Office 365 Message Encryption works
  • Describe Data Loss Prevention (DLP)
  • Understand what sensitive information and search patterns are that DLP is using
  • Know what a DLP policy is and what it contains
  • Recognize how actions and conditions work together for DLP
  • Express how actions contain functions to send emails on matches
  • Show policy tips to the users if a DLP rule applies
  • Use policy templates to implement DLP policies for commonly used information
  • Explain document finger
  • Understand how to use DLP to protect documents in Windows Server FCI

Module 5: Implement data governance in Microsoft 365

This learning path examines how to implement the key aspects of data governance, including the building of information barriers in Microsoft 365 and ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips.

Lessons

  • Evaluate your compliance readiness
  • Implement compliance solutions
  • Create information barriers in Microsoft 365
  • Create a DLP policy from a built-in template
  • Create a custom DLP policy
  • Create a DLP policy to protect documents
  • Implement policy tips for DLP policies

Lab : Implement DLP Policies

  • Manage DLP Policies
  • Test MRM and DLP Policies

After completing this module, students will be able to:

  • Describe the Microsoft 365 Compliance Center and how to access it
  • Describe the purpose and function of Compliance score
  • Explain the components of of how an organization’s Compliance score is determined
  • Explain how assessments are used to formulate compliance scores
  • Explain how Microsoft 365 helps address Global Data Protection Regulation
  • Describe insider risk management functionality in Microsoft 365
  • Configure insider risk management policies
  • Configure insider risk management policies
  • Explain the communication compliance capabilities in Microsoft 365
  • Describe what an ethical wall in Exchange is and how it works
  • Explain how to create information barriers in Microsoft 365
  • Identify best practices for building and working with ethical walls
  • Understand the different built-in templates for a DLP policies
  • Determine how to choose the correct locations for a DLP policy
  • Configure the correct rules for protecting content
  • Enable and review the DLP policy correctly
  • Describe how to modify existing rules of DLP policies
  • Explain how to add and modify custom conditions and action to a DLP rule
  • Describe how to change user notifications and policy tips
  • Configure the user override option to a DLP rule
  • Explain how incident reports are sent by a DLP rule violation
  • Describe how to work with managed properties for DLP policies
  • Explain how SharePoint Online creates crawled properties from documents
  • Describe how to create a managed property from a crawled property in SharePoint Online
  • Explain how to create a DLP policy with rules that apply to managed properties via PowerShell
  • Describe the user experience when a user creates an email or site containing sensitive information
  • Explain the behavior in Office apps when a user enters sensitive information

Module 6: Manage data governance in Microsoft 365

This learning path focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement sensitivity labels and Windows Information Protection.

Lessons

  • Manage retention in email
  • Troubleshoot data governance
  • Explore sensitivity labels
  • Implement sensitivity labels
  • Implement Data Governance

Lab : Implement Data Governance

  • Implement sensitivity labels
  • Implement Windows Information Protection

After completing this module, students will be able to:

  • Determine when and how to use retention tags in mailboxes
  • Assign retention policy to an email folder
  • Add optional retention policies to email messages and folders
  • Remove a retention policy from an email message
  • Explain how the retention age of elements is calculated
  • Repair retention policies that do not run as expected
  • Understand how to systematically troubleshoot when a retention policy appears to fail
  • Perform policy tests in test mode with policy tips
  • Describe how to monitor DLP policies through message tracking
  • Manage data protection using sensitivity labels
  • Describe the requirements to create a sensitivity label
  • Develop a data classification framework for your sensitivity labels
  • Create, publish, and remove sensitivity labels
  • Describe WIP and what it is used for
  • Plan a deployment of WIP policies
  • Implement WIP policies with Intune and SCCM
  • Implement WIP policies in Windows desktop apps

Module 7: Manage content search and investigations in Microsoft 365

This learning path conclude this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.

Lessons

  • Search for content in the Microsoft 365 Compliance center
  • Conduct audit log investigations
  • Manage Advanced eDiscovery

Lab : Manage Search and Investigations

  • Conduct a data search
  • Investigate Your Microsoft 365 Data

After completing this module, students will be able to:

  • Describe how to use content search
  • Design your content search
  • Configure search permission filtering
  • Explain how to search for third-party data
  • Describe when to use scripts for advanced searches
  • Describe what the audit log is and the permissions required to search a Microsoft 365 audit
  • Configure Audit Policies
  • Enter criteria for searching the audit log
  • View, sort, and filter search results
  • Export search results to a CSV file
  • Search the unified audit log by using Windows PowerShell
  • Describe Advanced eDiscovery
  • Configure permissions for users in Advanced eDiscovery
  • Create Cases in Advanced eDiscovery
  • Search and prepare data for Advanced eDiscovery

Module 8: Prepare for device management in Microsoft 365

This learning path provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management.

Lessons

  • Explore Co-management of Windows 10 device
  • Prepare your Windows 10 devices for Co-management
  • Transition from Configuration Manager to Intune
  • Examine the Microsoft Store for Business
  • Plan for application management

Lab : Implement the Microsoft Store for Business

  • Configure the Microsoft Store for Business
  • Manage the Microsoft Store for Business

After completing this module, students will be able to:

  • Describe the benefits of Co-management
  • Plan your organization’s Co-management Strategy
  • Describe the main features of Configuration Manager
  • Describe how Azure Active Directory enables co-management
  • Identify the prerequisites for using Co-management
  • Configure Configuration Manager for Co-management
  • Enroll Windows 10 Devices to Intune
  • Modify your co-management settings
  • Transfer workloads to Intune
  • Monitor your co-management solution
  • Check compliance for co-managed devices
  • Describe the feature and benefits of the Microsoft Store for Business
  • Configure the Microsoft Store for Business
  • Manage settings for the Microsoft Store for Business

Module 9: Plan your Windows 10 deployment strategy

This learning path focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Desktop Analytics, and planning your Windows 10 subscription activation service.

Lessons

  • Examine Windows 10 deployment scenarios
  • Explore Windows Autopilot deployment models
  • Plan your Windows 10 Subscription Activation strategy
  • Resolve Windows 10 upgrade errors
  • Analyze Windows 10 diagnostic data using Desktop Analytics

After completing this module, students will be able to:

  • Plan for Windows as a Service
  • Plan a Modern Deployment
  • Plan a Dynamic Deployment
  • Plan a Traditional Deployment
  • Describe Windows Autopilot requirements
  • Configure Autopilot
  • Describe Autopilot Self-deployments, Pre-provisioned deployments, and User-driven deployments
  • Deploy BitLocker Encryption for Autopiloted Devices
  • Understand Windows 10 Enterprise E3 in CSP
  • Configure VDA for Subscription Activation
  • Deploy Windows 10 Enterprise licenses
  • Describe common fixes for Windows 10 upgrade errors
  • Use SetupDiag
  • Troubleshooting upgrade errors
  • Describe Windows error reporting
  • Understand the upgrade error codes and resolution procedure
  • Describe Desktop Analytics
  • Describe Device Health
  • Describe Update Compliance
  • Determine Upgrade Readiness

Module 10: Implement Mobile Device Management in Microsoft 365

This learning path focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.

Lessons

  • Explore Mobile Device Management
  • Deploy Mobile Device Management
  • Enroll devices to Mobile Device Management
  • Manage device compliance

Lab : Manage devices with Intune

  • Enable device management
  • Configure Azure AD for Intune
  • Create Intune policies
  • Enroll a Windows 10 device
  • Manage and monitor a device in Intune

After completing this module, students will be able to:

  • Manage devices with MDM
  • Compare MDM for Microsoft 365 and Intune
  • Understand policy settings for mobile devices
  • Control Email and Document Access
  • Activate Mobile Device Management Services
  • Deploy Mobile Device Management
  • Configure Domains for MDM
  • Configure an APNs Certificate for iOS devices
  • Manage Device Security Policies
  • Define a Corporate Device Enrollment Policy
  • Enroll devices to MDM
  • Understand the Apple Device Enrollment Program
  • Understand Enrollment Rules
  • Configure a Device Enrollment Manager Role
  • Describe Multi-factor Authentication considerations
  • Plan for device compliance
  • Configure conditional users and groups
  • Create Conditional Access policies
  • Monitor enrolled devices

target_au

This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleMS-100T00-A: Microsoft 365 Identity and Services
days5
seo_titleMicrosoft 365 Identity and Services Course Training
seo_decThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management. In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management.
objective

By actively participating in this course, you will learn about the following:

  • Designing, configuring, and managing your Microsoft 365 tenant
  • Office 365 product functionality
  • Configuring Office 365
  • Managing Office 365 ProPlus deployments
  • Planning and implementing identity synchronization
  • Implementing application and external access

outline

Module 1: Designing Your Microsoft 365 Tenant

Lessons

  • Planning Microsoft 365 in your On-premises Infrastructure
  • Planning Your Identity and Authentication Solution
  • Planning Your Service Setup
  • Planning Your Hybrid Environment
  • Planning Your Migration to Office 365

 

Module 2: Configuring Your Microsoft 365 Tenant

Lessons

  • Planning  Your Microsoft 365 Experience
  • Configuring  Your Microsoft 365 Experience
  • Managing User Accounts and Licenses in Microsoft 365
  • Managing Security Groups in Microsoft 365
  • Implementing Your Domain Services
  • Leveraging FastTrack and Partner Services

 

Module 3: Lab 1 – Configuring your Microsoft 365 Tenant

Lab: Configuring your Microsoft 365 Tenant

  • Exercise 1 – Set up a Microsoft 365 Trial Tenant

 

Module 4: Managing Your Microsoft 365 Tenant

Lessons

  • Configuring Tenant Roles
  • Managing Tenant Health and Services

 

Module 5: Lab 2 – Managing your Microsoft 365 Tenant

Lab: Managing your Microsoft 365 Tenant

  • Exercise 1 – Manage Administration Delegation
  • Exercise 2 – Configure Office 365 Message Encryption (OME)
  • Exercise 3 – Monitor and Troubleshoot Office 365

 

Module 6: Office 365 Overview

Lessons

  • Exchange Online Overview
  • SharePoint Online Overview
  • Teams Overview
  • Additional Resources Overview
  • Device Management Overview

 

Module 7: Lab 3 – Office 365 Overview

Lab: Office 365 Overview

  • Exercise 1 – Exchange Online Overview
  • Exercise 2 – SharePoint Online Overview
  • Exercise 3 – Teams Overview

 

Module 8: Configuring  Office 365

Lessons

  • Office 365 Client Overview
  • Configuring Office Client Connectivity to Office 365

 

Module 9: Managing Office 365 ProPlus Deployments

Lessons

  • Managing User-Driven Client Installations
  • Managing Centralized Office 365 ProPlus Deployments
  • Configuring Office Telemetry
  • Configuring Microsoft Analytics

 

Module 10: Lab 4 – Managing Office 365 ProPlus installations

Lab: Managing Office 365 ProPlus installations

  • Exercise 1 – Prepare an Office 365 ProPlus Managed Installation
  • Exercise 2 – Manage a Centralized Office 365 ProPlus Installation
  • Exercise 3 – Deploy and Configure Office Telemetry Components

 

Module 11: Planning and Implementing Identity Synchronization

Lessons

  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities
  • Password Management in Microsoft 365

 

Module 12: Lab 5 – Implementing Identity Synchronization

Lab: Implementing Identity Synchronization

  • Exercise 1 – Set up your organization for identity synchronization
  • Exercise 2 – Implement Identity Synchronization

 

Module 13: Implementing Application and External Access

Lessons

  • Implementing Applications in Azure AD
  • Configuring Azure AD App Proxy
  • Designing Solutions for External Access

target_au

This Microsoft 365 Identity and Services course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleCourse MD-101T00-A: Managing Modern Desktops
days5
seo_titleManaging Modern Desktops Course Training
seo_decIn the Managing Modern Desktops (MD-101T00-A) course, you will be introduced to key components of modern management and co-management strategies.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Managing Modern Desktops (MD-101T00-A) course, students will learn how to plan and implement an operating system deployment strategy using modern deployment methods, as well as how to implement an update strategy. Students will be introduced to key components of modern management and co-management strategies. This course also covers what it takes to incorporate Microsoft Intune into your organization. Students will also learn about methods for deployment and management of apps and browser-based applications. Students will be introduced to the key concepts of security in modern management including authentication, identities, access, and compliance policies. Students will be introduced to technologies such as Azure Active Directory, Azure Information Protection and Windows Defender Advanced Threat Protection, as well as how to leverage them to protect devices and data.   See other Microsoft courses
objective

After completing this course, learners should be able to:

  • Plan, develop, and implement an Operating System deployment, upgrade, and update strategy.
  • Understand the benefits and methods of co-management strategies.
  • Plan and implement device enrollment and configuration.
  •  Manage and deploy applications and plan a mobile application management strategy.
  •  Manage users and authentication using Azure AD and Active Directory DS.
  •  Describe and implement methods used to protect devices and data.

outline

Module 1: Planning an Operating System Deployment Strategy

This module explains how to plan and implement a deployment strategy. Students will learn about the concepts of supporting the desktop through its entire lifecycle. This module also covers assessing an existing environment and the tools used to prepare a deployment strategy. Finally, students will be introduced to the tools and strategies used for desktop deployment.

Lessons

  • The Enterprise Desktop
  • Assessing Deployment Readiness
  • Deployment Tools & Strategies

Lab: Practice Lab – Planning Windows 10 deployment

After completing this module, students will be able to:
  • Describe the enterprise desktop lifecycle.
  • Describe how to assess an existing environment.
  • Describe methods for mitigating deployment blockers.
  • Describe the different tools and methods for deployment.

 

Module 2: Implementing Windows 10

This module covers the modern methods of Windows deployment used in common scenarios such as upgrading and migrating to Windows 10, as well as deploying new devices and refreshing existing devices. Students will also learn about alternate methods of OS deployment as well as considerations when choosing methods of deployment.

Lessons

  • Upgrading Devices to Windows 10
  • Deploying New Devices and Refreshing
  • Migrating Devices to Windows 10
  • Alternate Deployment Methods
  • Imaging Considerations

Lab: Practice Lab – Implementing Windows 10

  • Creating and deploying the provisioning package
  • Migrating user settings
  • Deploying Windows 10 with AutoPilot

After completing this course, learners should be able to:

  • Develop an Operating System deployment and upgrade strategy.
  • Understand the different methods of deployment.
  • Understand which scenarios on-premise and cloud-based solutions can be used for.
  • Deploy and migrate desktops to Windows 10.

 

Module 3: Managing Updates for Windows 10

This module covers managing updates to Windows. This module introduces the servicing options for Windows 10. Students will learn the different methods for deploying updates and how to configure windows update policies. Finally, students will learn how to ensure and monitor update compliance using Windows Analytics.

Lessons

  • Updating Windows 10
  • Windows Update for Business
  • Introduction to Windows Analytics

Lab: Practice Lab – Managing Updates for Windows 10

  • Manually configuring Windows Update settings
  • Configuring Windows Update by using GPOs

After completing this module, students will be able to:

  • Describe the Windows 10 servicing channels.
  • Configure a Windows update policy using Group Policy settings.
  • Configure Windows Update for Business to deploy OS updates.
  • Use Windows Analytics to assess upgrade readiness and update compliance.

&nb