Palo Alto Networks (Case Study)





Current Vendor :


titleBrocade SAN Advanced
days4
seo_title
seo_dec
seo_tkey
categorydatacenter-courses
vendorBrocade

techonogyDatacenter & Virtualization
overviewThis accelerated theory-only course builds upon the Brocade SAN Fundamentals (BRF) and teaches students advanced FC SAN topics such as virtualization, Data Center Interconnect via native FC and native FCIP as well as interesting Traffic Engineering techniques for Brocade "Adaptive Networking" (QoS, Top Talker, TI-Zoning). Other important topics deal with FC-FC Routing for more efficient and robust resource management within a SAN, Security features and the popular Access Gateway mode. This course covers troubleshooting, performance and monitoring techniques.
objective
outline
  • FC Adaptive Networking Overview (Top Talker, QoS, Ingress Rate Limiting, TI-Zones)
  • FCIP tunneling techniques
  • FC-FC Routing (EX-Ports, LSANs)
  • Security concepts of Brocade SAN Switches
  • Access Gateway Mode
  • FC Long Distance
  • Basic Troubleshooting SANs
  • Virtual Fabrics Overview

target_au
  • Experienced Brocade Switch administrators
  • System Integrators, Field / System Engineers and Support staff
  • SAN designer
  • Employees preparing for the Brocade Certified Fabric Professional (BCFP) certification

pre_req
titleBrocade SAN Fundamentals (BRF)
days3
seo_title
seo_dec
seo_tkey
categorydatacenter-courses
vendorBrocade

techonogyDatacenter & Virtualization
overviewIn this course students learn the basics of the FC protocol, get to know the Brocade platforms (8/16/32 Gbps) and new technologies of the 6th generation (32 Gbps) and learn how to implement and manage a typical enterprise SAN. Topics of this class cover Name Server, RSCN Delivery, FCIDs, WWNs, Domain IDs, Shared Area concepts, Fabric Principal, Merging conflicts and more. Single-CP (300, 5100, 65xx) and Dual-CP (DCX Backbones) Switches are covered for their high-availability and other special features. The course also covers the software features of FabricOS 7.x and 8.x as well as topics like zoning and administration, Non-Disruptive Firmware Upgrades and Config management. Other topics of this class include Load Balancing methods, FSPF, Trunking, DLS, DPS and Routing Policies. This course includes extensive hands-on lab excercises to deepen the theoretical knowledge learned in class.
objective
outline
  • 8, 16 & 32 Gbps Brocade Switch-Platform Overview
  • Fibre Channel theory and concepts
  • Brocade B-series Switch installation, configuration & verification
  • Maintenance tasks such as Firmware Upgrade & Configuration Management
  • Concepts & configuration of Zoning on Brocade B-Series Switches
  • Brocade switching/routing concepts in a fabric (Routing Policies, FSPF, Load Balancing)
  • Brocade trunking concepts

target_au
  • Brocade Switch administrator
  • System Integrators, Field / System Engineers and Support staff
  • Employees preparing for the Brocade Associate SAN Administrator (BASA) certification

pre_req

Knowledge in FC/SCSI Storage solutions and and/or LANs


titleProfessional Scrum Product Owner™ I (PSPO™)
days2
seo_title
seo_dec
seo_tkey
categoryleadership-management-courses
vendorSCRUM

techonogyLeadership Management
overviewProfessional Scrum Product Owner™ I (PSPO™ I) training provides knowledge on how to use Agile and Scrum to maximize that value. Become a Product Owner who takes real ownership of the product, as an entrepreneur with tactical and strategic directional authority for the product. .
objective
outline

Fundamentals of the Product Owner role

  • Values of agile development
  • Responsibilities of Product Owner
  • Appropriate meetings with the Product Owner
  • Compulsions of the Product Owner
  • Leadership qualities of the Product Owner
  • Understanding of business values incl. KPIs
  • Measuring business value

Practical Skill Development

  • Product build up
  • Relevance of user stories
  • Setting and achieving strategic product goals
  • Release strategies and planning with Scrum
  • Estimating and prioritizing requirements
  • Forecasting capability with Scrum
  • Product development involving multiple teams
  • Total cost of ownership

target_au
pre_req
titleIBM FileNet P8 Platform Essentials (V5.5.x) SPVC
days1
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course introduces you to the key concepts of IBM FileNet P8 Platform such as architecture, P8 domain structures, organizing the content across the enterprise, and security. Includes information to manage logging, auditing, and storage areas.
objective
  • Introduction to IBM FileNet P8 Platform
  • Architecture and domain structures
  • Configure logging• Configure auditing
  • Introduction to IBM FileNet P8 Platform security
  • Manage storage areas
  • Introduction to IBM FileNet P8 content services containers
  • Organize content across the enterprise

outline

Introduction to IBM FileNet P8 Platform 
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions Architecture and domain structures
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator  Configure logging
• View and archive system logs
• Configure trace logging Configure auditing
• Create audit definitions
• Prune audit entries  Introduction to IBM FileNet P8 Platform security
• Identify access issues
• Change direct security of an object
• Customize security access Manage storage areas
• Create a file storage area
• Create a storage policy
• Create an advanced storage area Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers Organize content across the enterprise
• Multitenancy considerations
• Isolating content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for administrating and configuring IBM FileNet P8 Platform.


pre_req

Familiarity with enterprise content management concepts.


titleIBM FileNet P8 Platform Administration (V5.5.x) SPVC
days5
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches.
objective
  • Introduction to IBM FileNet P8 Platform
  • IBM FileNet P8 Platform features
  • IBM FileNet P8 Platform integration options
  • IBM FileNet P8 Platform components
  • IBM FileNet P8 Platform solutions Architecture and domain structures
  • IBM FileNet P8 Platform Architecture
  • Explore the core IBM FileNet P8 Platform applications
  • Locate P8 domain structures
  • Use IBM Content Navigator Manage logging
  • View and archive system logs
  • Configure trace logging Configure auditing
  • Create audit definitions
  • Prune audit entries
  • Manage storage areas
  • Create a file storage area
  • Create a storage policy
  • Create an advanced storage area
  • Build an object store
  • Create JDBC data sources for an object store
  • Create an object store
  • Add the repository to an IBM Content Navigator desktop
  • Create property templates and classes
  • Create a choice list
  • Create property templates
  • Create document and folder classes Modify classes and properties
  • Change the property template name
  • Modify a choice list
  • Work with metadata dependencies
  • Use events to trigger actions
  • Create a subscription with an event action
  • Update the event action with new code module
  • Configure security for IBM FileNet P8 assets
  • Configure initial object store security
  • Use the Security Script wizard
  • Configure default instance security
  • Configure security inheritance
  • Implement designer group access
  • Configure role-based access
  • Use bulk operations
  • Use bulk actions to modify security for multiple documents
  • Use bulk operations to cancel checkout of documents
  • Configure content-based retrieval searches
  • Register IBM Content Search Services
  • Configure index partitioning
  • Configure content-based indexes
  • Create content-based searches
  • Work with sweeps
  • Configure a bulk move content job
  • Create a disposal policy
  • Create a content migration policy
  • Move IBM FileNet P8 Platform applications between environments
  • Configure a destination environment
  • Create a source environment
  • Export the FileNet P8 application assets
  • Convert and analyze the FileNet P8 assets
  • Import the application assets
  • Run a change impact analysis in command line
  • Introduction to IBM FileNet P8 content services containers
  • IBM FileNet P8 content services containers
  • Benefits of containers
  • Considerations when choosing containers
  • Organize content across the enterprise
  • Plan for Multitenancy
  • Isolate content in an IBM FileNet P8 platform system

outline

Introduction to IBM FileNet P8 Platform
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform integration options
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions

Architecture and domain structures
• IBM FileNet P8 Platform Architecture
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator

Manage logging
• View and archive system logs
• Configure trace logging

Configure auditing
• Create audit definitions
• Prune audit entries

Manage storage areas
• Create a file storage area
• Create a storage policy
• Create an advanced storage area

Build an object store
• Create JDBC data sources for an object store
• Create an object store
• Add the repository to an IBM Content Navigator desktop Create property templates and classes
• Create a choice list
• Create property templates
• Create document and folder classes

Modify classes and properties
• Change the property template name
• Modify a choice list
• Work with metadata dependencies Use events to trigger actions
• Create a subscription with an event action
• Update the event action with new code module

Configure security for IBM FileNet P8 assets
• Configure initial object store security
• Use the Security Script wizard
• Configure default instance security
• Configure security inheritance
• Implement designer group access
• Configure role-based access

+O35Use bulk operations
• Use bulk actions to modify security for multiple documents
• Use bulk operations to cancel checkout of documents

Configure content-based retrieval searches
• Register IBM Content Search Services
• Configure index partitioning
• Configure content-based indexes
• Create content-based searches Work with sweeps
• Configure a bulk move content job
• Create a disposal policy
• Create a content migration policy

Move IBM FileNet P8 Platform applications between environments
• Configure a destination environment
• Create a source environment
• Export the FileNet P8 application assets
• Convert and analyze the FileNet P8 assets
• Import the application assets
• Run a change impact analysis in command line  Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers

Organize content across the enterprise
• Plan for Multitenancy
• Isolate content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system.


pre_req

Familiarity with enterprise content management concepts.


titleIBM FileNet P8 Platform Essentials (V5.5.x)
days1
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course introduces you to the key concepts of IBM FileNet P8 Platform such as architecture, P8 domain structures, organizing the content across the enterprise, and security. Includes information to manage logging, auditing, and storage areas.
objective
  • Introduction to IBM FileNet P8 Platform
  • Architecture and domain structures
  • Configure logging
  • Configure auditing
  • Introduction to IBM FileNet P8 Platform security
  • Manage storage areas
  • Introduction to IBM FileNet P8 content services containers
  • Organize content across the enterprise

outline

Introduction to IBM FileNet P8 Platform
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions Architecture and domain structures
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator  Configure logging
• View and archive system logs
• Configure trace logging Configure auditing
• Create audit definitions
• Prune audit entries  Introduction to IBM FileNet P8 Platform security
• Identify access issues
• Change direct security of an object
• Customize security access Manage storage areas
• Create a file storage area
• Create a storage policy
• Create an advanced storage area Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers Organize content across the enterprise
• Multitenancy considerations
• Isolating content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for administrating and configuring IBM FileNet P8 Platform.


pre_req

Familiarity with enterprise content management concepts.


titleIBM FileNet P8 Platform Administration (V5.5.x)
days5
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorIBM

techonogyEnterprise Networking
overviewThis course teaches you the configuration and administration of an IBM FileNet P8 Platform 5.5.x system. It introduces you to the key concepts of IBM FileNet P8 Platform architecture and organizing the content across the enterprise. You will learn how to build content repositories, configure metadata, create storage areas, manage security, logging, and auditing, run bulk processing, use the sweep framework, extend the functionality with Events and Subscription, migrate and deploy FileNet P8 assets between environments, and configure content-based retrieval searches.
objective
  • Introduction to IBM FileNet P8 Platform
  • IBM FileNet P8 Platform features
  • IBM FileNet P8 Platform integration options
  • IBM FileNet P8 Platform components
  • IBM FileNet P8 Platform solutions Architecture and domain structures
  • IBM FileNet P8 Platform Architecture
  • Explore the core IBM FileNet P8 Platform applications
  • Locate P8 domain structures
  • Use IBM Content Navigator Manage logging
  • View and archive system logs
  • Configure trace logging Configure auditing
  • Create audit definitions
  • Prune audit entries
  • Manage storage areas
  • Create a file storage area
  • Create a storage policy
  • Create an advanced storage area Build an object store
  • Create JDBC data sources for an object store
  • Create an object store
  • Add the repository to an IBM Content Navigator desktop
  • Create property templates and classes
  • Create a choice list
  • Create property templates
  • Create document and folder classes Modify classes and properties
  • Change the property template name
  • Modify a choice list
  • Work with metadata dependencies Use events to trigger actions
  • Create a subscription with an event action
  • Update the event action with new code module Configure security for IBM FileNet P8 assets
  • Configure initial object store security
  • Use the Security Script wizard
  • Configure default instance security
  • Configure security inheritance
  • Implement designer group access
  • Configure role-based access Use bulk operations
  • Use bulk actions to modify security for multiple documents
  • Use bulk operations to cancel checkout of documents Configure content-based retrieval searches
  • Register IBM Content Search Services
  • Configure index partitioning
  • Configure content-based indexes
  • Create content-based searches Work with sweeps
  • Configure a bulk move content job
  • Create a disposal policy
  • Create a content migration policy Move IBM FileNet P8 Platform applications between environments
  • Configure a destination environment
  • Create a source environment
  • Export the FileNet P8 application assets
  • Convert and analyze the FileNet P8 assets
  • Import the application assets
  • Run a change impact analysis in command line Introduction to IBM FileNet P8 content services containers
  • IBM FileNet P8 content services containers
  • Benefits of containers
  • Considerations when choosing containers Organize content across the enterprise
  • Plan for Multitenancy
  • Isolate content in an IBM FileNet P8 platform system

outline

Introduction to IBM FileNet P8 Platform  
• IBM FileNet P8 Platform features
• IBM FileNet P8 Platform integration options
• IBM FileNet P8 Platform components
• IBM FileNet P8 Platform solutions

Architecture and domain structures
• IBM FileNet P8 Platform Architecture
• Explore the core IBM FileNet P8 Platform applications
• Locate P8 domain structures
• Use IBM Content Navigator

Manage logging 
• View and archive system logs
• Configure trace logging

Configure auditing  
• Create audit definitions
• Prune audit entries

Manage storage areas 
• Create a file storage area
• Create a storage policy
• Create an advanced storage area

Build an object store 
• Create JDBC data sources for an object store
• Create an object store
• Add the repository to an IBM Content Navigator desktop Create property templates and classes
• Create a choice list
• Create property templates
• Create document and folder classes

Modify classes and properties 
• Change the property template name
• Modify a choice list
• Work with metadata dependencies Use events to trigger actions
• Create a subscription with an event action
• Update the event action with new code module

Configure security for IBM FileNet P8 assets 
• Configure initial object store security
• Use the Security Script wizard
• Configure default instance security
• Configure security inheritance
• Implement designer group access
• Configure role-based access

+O35Use bulk operations
• Use bulk actions to modify security for multiple documents
• Use bulk operations to cancel checkout of documents

Configure content-based retrieval searches 
• Register IBM Content Search Services
• Configure index partitioning
• Configure content-based indexes
• Create content-based searches Work with sweeps
• Configure a bulk move content job
• Create a disposal policy
• Create a content migration policy

Move IBM FileNet P8 Platform applications between environments 
• Configure a destination environment
• Create a source environment
• Export the FileNet P8 application assets
• Convert and analyze the FileNet P8 assets
• Import the application assets
• Run a change impact analysis in command line  Introduction to IBM FileNet P8 content services containers
• IBM FileNet P8 content services containers
• Benefits of containers
• Considerations when choosing containers

Organize content across the enterprise 
• Plan for Multitenancy
• Isolate content in an IBM FileNet P8 platform system


target_au

This course is for administrators and users who are responsible for planning, administrating and configuring an IBM FileNet P8 Platform system.


pre_req

Familiarity with enterprise content management concepts.


titleITIL 4 Strategic Leader: Digital and IT Strategy (DITS)
days3
seo_title
seo_dec
seo_tkey
categoryit-services-management-courses
vendorITIL

techonogyIT Services Management
overviewITIL 4 provides practical and flexible guidance to support organizations on their journey to digital transformation. It provides an IT/digital operating model for the delivery and operation of tech-enabled products and services and enables IT teams to continue to play a crucial role in wider business strategy. ITIL provides a framework for quality IT service management (ITSM) through proven best practice. ITIL manages the creation of a service, its operation and its improvement. Organizations who adopt ITIL invariably adapt it to suit their specific requirements. This course is designed to take practitioners and organizations on a digital strategy journey. Its iterative, eight-step model moves from “vision” through to “actions” and is about creating sustainable, digital momentum; this fulfils the enterprise’s evolution into a digital enterprise and enables business value co-creation. The guidance also highlights four key capabilities to develop a holistic, digital capability framework: digital leadership, managing innovation and emerging technologies, risk management and structuring a digital enterprise. ITIL ®4 Leader: Digital and IT Strategy (DITS) is aimed at people in senior roles including CIOs, consultants and others involved in digital transformations, service and strategic delivery.
objective
  • The internal and external factors to consider while crafting digital strategy
  • How IT strategy differs from digital strategy and how they can be integrated
  • Create a digital strategy that achieves the most value from digital
  • Implementing and sustaining digital strategy.
  • Developing and nurturing digital capabilities for continual business innovation and value co-creation

outline

ITIL Guiding Principles to All Aspects of Digital and IT Strategy

  • Focus on Value
  • Start Where You Are
  • Progress Iteratively with Feedback
  • Collaborate and Promote Visibility
  • Think and Work Holistically
  • Keep It Simple and Practical
  • Optimise and Automate

 

Leverage Digital Strategy to React to Digital Disruption

  • Digital Technology
  • Digital Business
  • Digital Organisation
  • Digitisation
  • Digital Transformation
  • Business Strategy and Business Models
  • Digital and IT Strategy
  • Products
  • Services
  • Relationship Between Digital, IT Strategy and Components of ITIL SVS.

 

Relationship between Concepts of Digital and IT Strategy, Service Value System and Service Value Chain

  • Environmental Analysis
  • External Analysis: PESTLE
  • Internal Analysis: Four Dimensions of Service Management

 

How an Organisation Uses Digital and IT Strategy to Remain Viable in Environments

  • How an Organisation’s Viability is Related to Agile, Resilient, Lean, Continuous and Co-Creational it is
  • How to Analyse the VUCA Factors and Address them in a Digital and IT Strategy

Explain and Compare Three Levels of Digital Disruption:

  • Ecosystem
  • Industry/Market
  • Organisational
  • Organisation’s Position in a Particular Market or Industry

Influenced factors:

  • Achieving Customer/Market Relevance
  • Achieving Operational Excellence
  • Internal and External Focus
  • Balanced Approach
  • Digital Positioning Tool to Determine Appropriate Position for a Digital Organization

 

Strategic Approaches by Digital and IT to Achieve Customer/Market Relevance and Operational Excellence

  • How to Apply Approaches to Achieve Customer/Market Relevance:
  • Customer Journeys
  • Omnichannel Delivery and Support
  • Context-Sensitive Delivery and Support
  • Customer Analytics
  • Customer Feedback and 360° Approaches
  • How to Achieve Operational Excellence in the Four Dimensions of Service Management
  • Understand the Financial Aspects of Digital and IT Strategy in Terms of the Following:
  • Financial Policies
  • Portfolio Optimisation
  • Funding Projects, Products and Services
  • Balancing Cost of Innovation and Operation
  • Charging Models
  • Assess Strategic Approaches for Digital Organisations

 

Risks and Opportunities of Digital and IT Strategy

  • Concept of Risk Management in the Context of a Digital Organisation
  • Context of Digital and IT Strategy
  • Identify Risk
  • Assess Risk
  • Concept of Risk Posture and Show How to Determine an Acceptable Balance Between Opportunity and Risk
  • Explain the Concept of Innovation, Including its Key Elements and Techniques
  • Apply Techniques to Develop and Maintain a Culture of Innovation

 

Steps and Techniques Involved in Defining and Advocating for Digital and IT Strategy

  • How to Use Digital Readiness Assessment to Perform Gap Analysis Between an Organisation’s Current and Desired Positions Approaches for Scraping Data from Dynamic Websites
  • How to Define and Communicate a Vision and a Strategy
  • How to Use Business Cases to Advocate for a Digital and IT Strategy

 

Implementation of a Digital and IT Strategy

  • How to Define Operating Models for Digital Organisations
  • Major Skills Required of Leaders in Digital Organisation
  • Apply Approaches to Strategy Coordination and Implementation:
  • Large-Scale Transformation
  • Incremental Transformation
  • Mergers and Acquisitions
  • Individual Changes
  • Approaches to POMs (Parallel Operating Models)
  • How to Assess Success of a Digital and IT Strategy
  • Typical Activities of a Digital Transformation Programme

target_au
  • Individuals continuing their journey in service management
  • ITSM managers and aspiring ITSM managers
  • ITSM practitioners who are responsible for managing and integrating stakeholders, focus on the customer journey and experience, and/or are responsible for fostering relationships with partners and suppliers
  • Existing ITIL qualification holders wishing to develop their knowledge

pre_req
  • Have obtained ITIL 4 Foundation certificate or ITIL® 4 Managing Professional Transition certificate
  • Have attended an accredited training course
  • Complete and receive a passing score on the 4 Case Study Assignments included in the course (click here for more information)
  • Have a minimum of three years of IT managerial experience

titleECS – Campus Fabric Deploy
days2
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorExtreme

techonogyEnterprise Networking
overviewDeploying networks utilizing the Extreme Networks Campus Fabric networking environment. This knowledge will be reinforced through actual hands-on experience with networking equipment in a lab environment, where students will perform real world tasks. [dt_sc_button type="type1" link="https://dojo.extremenetworks.com/organizer/insoft-services/" size="medium" bgcolor="#8fbd85" target="_new" timeline_button="no"]Registration Link[/dt_sc_button]
objective
  • To deploy Extreme Networks Fabric Networking solutions based on reference architectures from Extreme Networks customer scenarios
  • Take the ECS Fabric Switching & Routing Exam

outline

Fabric Deployment Options

  • Automation and Onboarding Options​
  • Intelligent Ports ​

VSP Switch Management

  • Switching Portfolio​
  • Software Management and Upgrade​
  • Management Interfaces​

Fabric Connect Infrastructure

  • BVLANs​
  • IS-IS global parameters​
  • IS-IS interfaces and adjacencies​

Fabric Management

  • CFM​
  • IP Shortcuts​
  • Mgmt CLIP​

L2VSN

  • L2VSN Configuration​
  • UNI port configuration​
  • Multicast​

L3VSN

  • Inter-VSN Routing over Fabric Connect

Implementing IP Shortcuts

  • Fabric Connect services using IP Shortcut Routing

Implementing Layer 3 VSN

  • VRF routing​
  • Route Redistribution​
  • Inter-VSN Routing​

VIST Core Switch Pair

  • Redundancy on the edge of Fabric​
  • SMLT Configuration​
  • RSMLT​

target_au
  • This course is designed as the first step for individuals responsible for the installation, configuration and management of the Extreme Networks family of Fabric switches.

pre_req
  • Students should possess a solid grasp of LAN concepts, including advanced Ethernet and TCP/IP. .And have referenced and be comfortable with the concepts of Fabric networking Covered in the Campus Fabric Introduction Course.

titleMS-500T00-AC: Microsoft 365 Security Administration
days4
seo_title
seo_dec
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyEnterprise Networking
overviewLearn how to secure your Microsoft 365 deployment and comply with industry data protections. This course focuses on securing user identity and access, threat protection, information protection and data governance. This course was designed for IT Professionals who manage and deploy security technologies for Microsoft 365 in their organization. The course helps learners prepare for the Microsoft 365 Certified: Security Administrator Associate exam (MS-500).
objective
  • Administer user and group access in Microsoft 365.
  • Explain and manage Azure Identity Protection.
  • Plan and implement Azure AD Connect.
  • Manage synchronized user identities.
  • Explain and use conditional access.
  • Describe cyber-attack threat vectors.
  • Explain security solutions for Microsoft 365.
  • Use Microsoft Secure Score to evaluate and improve your security posture.
  • Configure various advanced threat protection services for Microsoft 365.
  • Plan for and deploy secure mobile devices.
  • Implement information rights management.
  • Secure messages in Office 365.
  • Configure Data Loss Prevention policies.
  • Deploy and manage Cloud App Security.
  • Implement Windows information protection for devices.
  • Plan and deploy a data archiving and retention system.
  • Create and manage an eDiscovery investigation.
  • Manage GDPR data subject requests.
  • Explain and use sensitivity labels.

outline

Module 1: User and Group Management

This module explains how to manage user accounts and groups in Microsoft 365. It introduces you to the Zero Trust concept as well as authentication. The module sets the foundation for the remainder of the course.

  • Identity and Access Management concepts
  • The Zero Trust model
  • Plan your identity and authentication solution
  • User accounts and roles
  • Password Management

Lab : Initialize your tenant – users and groups

  • Set up your Microsoft 365 tenant
  • Manage users and groups

Lab : Password management

  • Configure Self-service password reset (SSPR) for user accounts in Azure AD
  • Deploy Azure AD Smart Lockout

After completing this module, students will be able to:

  • Create and manage user accounts.
  • Describe and use Microsoft 365 admin roles.
  • Plan for password policies and authentication.
  • Describe the concepts of Zero Trust security.
  • Explain the Zero Trust model.

Module 2: Identity Synchronization and Protection

This module explains concepts related to synchronizing identities for Microsoft 365. Specifically, it focuses on Azure AD Connect and managing directory synchronization to ensure the right people are connecting to your Microsoft 365 system.

  • Plan directory synchronization
  • Configure and manage synchronized identities
  • Azure AD Identity Protection

Lab : Implement Identity Synchronization

  • Set up your organization for identity synchronization

After completing this module, students will be able to:

  • Explain directory synchronization.
  • Plan directory synchronization.
  • Describe and use Azure AD Connect.
  • Configure Azure AD Connect Prerequisites.
  • Manage users and groups with directory synchronization.
  • Describe Active Directory federation.
  • Enable Azure Identity Protection

Module 3: Identity and Access Management

This module explains conditional access for Microsoft 365 and how it can be used to control access to resources in your organization. The module also explains Role Based Access Control (RBAC) and solutions for external access. We discuss identity governance as a concept and its components.

  • Application Management
  • Identity Governance
  • Manage device access
  • Role Based Access Control (RBAC)
  • Solutions for external access
  • Privileged Identity Management

Lab : Use Conditional Access to enable MFA

  • MFA Authentication Pilot (require MFA for specific apps)
  • MFA Conditional Access (complete an MFA roll out)

Lab : Configure Privileged Identity Management

  • Manage Azure resources
  • Assign directory roles
  • Activate and deactivate PIM roles
  • Directory roles
  • PIM resource workflows
  • View audit history for Azure AD roles in PIM

After completing this module, students will be able to:

  • Describe the concept of conditional access.
  • Describe and use conditional access policies.
  • Plan for device compliance.
  • Configure conditional users and groups.
  • Configure role based access control
  • Describe the concepts of identity governance
  • Configure and use Privileged Identity Management

Module 4: Security in Microsoft 365

This module explains the various cyber-attack threats that exist. It then introduces you to the Microsoft solutions used to mitigate those threats. The module finishes with an explanation of Microsoft Secure Score and how it can be used to evaluate and report your organizations security posture.

  • Threat vectors and data breaches
  • Security strategy and principles
  • Microsoft security solutions
  • Secure Score

Lab : Use Microsoft Secure Score

  • Improve your secure score in the Microsoft 365 Security Center

After completing this module, students will be able to:

  • Describe several techniques attackers use to compromise user accounts through email.
  • Describe techniques attackers use to gain control over resources.
  • List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365.
  • Describe the benefits of Secure Score and what kind of services can be analyzed.
  • Describe how to use Secure Score to identify gaps in your current Microsoft 365 security posture.

Module 5: Threat Protection

This module explains the various threat protection technologies and services available for Microsoft 365. The module covers message protection through Exchange Online Protection, Microsoft Defender for Identity and Microsoft Defender for Endpoint.

  • Exchange Online Protection (EOP)
  • Microsoft Defender for Office 365
  • Manage Safe Attachments
  • Manage Safe Links
  • Microsoft Defender for Identity
  • Microsoft Defender for Endpoint

Lab : Manage Microsoft 365 Security Services

  • Implement Microsoft Defender Policies

After completing this module, students will be able to:

  • Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection.
  • Describe how Safe Attachments is used to block zero-day malware in email attachments and documents.
  • Describe how Safe Links protect users from malicious URLs embedded in email and documents that point
  • Configure Microsoft Defender for Identity.
  • Configure Microsoft Defender for Endpoint.

Module 6: Threat Management

This module explains Microsoft Threat Management which provides you with the tools to evaluate and address cyber threats and formulate responses. You will learn how to use the Security dashboard and Azure Sentinel for Microsoft 365.

  • Security dashboard
  • Threat investigation and response
  • Azure Sentinel
  • Advanced Threat Analytics

Lab : Using Attack Simulator

  • Conduct a simulated Spear phishing attack

After completing this module, students will be able to:

  • Describe how Threat Explorer can be used to investigate threats and help to protect your tenant.
  • Describe how the Security Dashboard gives C-level executives insight into top risks and trends.
  • Describe what Advanced Thread Analytics (ATA) is and what requirements are needed to deploy it.
  • Configure Advanced Threat Analytics.
  • Use the attack simulator in Microsoft 365.
  • Describe how Azure Sentinel can used for Microsoft 365.

Module 7: Microsoft Cloud Application Security

This module focuses on cloud application security in Microsoft 365. The module will explain cloud discovery, app connectors, policies, and alerts. You will learn how these features work to secure you cloud applications.

  • Deploy Cloud Application Security
  • Use cloud application security information

After completing this module, students will be able to:

  • Describe Cloud App Security.
  • Explain how to deploy Cloud App Security.
  • Control your Cloud Apps with Policies.
  • Use the Cloud App Catalog.
  • Use the Cloud Discovery dashboard.
  • Manage cloud app permissions.

Module 8: Mobility

This module focuses on securing mobile devices and applications. You will learn about Mobile Device Management and how it works with Microsoft Intune. You will also learn about how Intune and Azure AD can be used to secure mobile applications.

  • Mobile Application Management (MAM)
  • Mobile Device Management (MDM)
  • Deploy mobile device services
  • Enroll devices to Mobile Device Management

Lab : Device Management

  • Enable Device Management
  • Configure Azure AD for Intune
  • Create compliance and conditional access policies

After completing this module, students will be able to:

  • Describe mobile application considerations.
  • Manage devices with MDM.
  • Configure Domains for MDM.
  • Manage Device Security Policies.
  • Enroll devices to MDM.
  • Configure a Device Enrollment Manager Role.

Module 9: Information Protection and Governance

This module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data.

  • Information protection concepts
  • Governance and Records Management
  • Sensitivity labels
  • Archiving in Microsoft 365
  • Retention in Microsoft 365
  • Retention policies in the Microsoft 365 Compliance Center
  • Archiving and retention in Exchange
  • In-place records management in SharePoint

Lab : Archiving and Retention

  • Initialize compliance
  • Configure retention tags and policies

After completing this module, students will be able to:

  • Configure sensitivity labels.
  • Configure archiving and retention in Microsoft 365.
  • Plan and configure Records Management

Module 10: Rights Management and Encryption

This module explains information rights management in Exchange and SharePoint. The module also describes encryption technologies used to secure messages.

  • Information Rights Management (IRM)
  • Secure Multipurpose Internet Mail Extension (S-MIME)
  • Office 365 Message Encryption

Lab : Configure Office 365 Message Encryption

  • Configure Office 365 Message Encryption
  • Validate Information Rights Management

After completing this module, students will be able to:

  • Describe the various Microsoft 365 Encryption Options.
  • Describe the use of S/MIME.
  • Describe and enable Office 365 Message Encryption.

Module 11: Data Loss Prevention

This module focuses on data loss prevention in Microsoft 365. You will learn about how to create policies, edit rules, and customize user notifications to protect your data.

  • Data loss prevention fundamentals
  • Create a DLP policy
  • Customize a DLP policy
  • Create a DLP policy to protect documents
  • Policy tips

Lab : Implement Data Loss Prevention policies

  • Manage DLP Policies
  • Test MRM and DLP Policies

After completing this module, students will be able to:

  • Describe Data Loss Prevention (DLP).
  • Use policy templates to implement DLP policies for commonly used information.
  • Configure the correct rules for protecting content.
  • Describe how to modify existing rules of DLP policies.
  • Configure the user override option to a DLP rule.
  • Explain how SharePoint Online creates crawled properties from documents.

Module 12: Compliance Management

This module explains the Compliance center in Microsoft 365. It discusses the components of compliance score.

  • Compliance center

After completing this module, students will be able to:

  • Describe how to use compliance score to make organizational decisions.
  • Describe how assessments are used to determine compliance score.

Module 13: Insider Risk Management

This module focuses on insider risk related functionality within Microsoft 365. It covers not only Insider Risk Management in the compliance center but also information barriers and privileged access management as well.

  • Insider Risk
  • Privileged Access
  • Information barriers
  • Building ethical walls in Exchange Online

Lab : Privileged Access Management

  • Set up privileged access management and process a request

After completing this module, students will be able to:

  • Explain and configure Insider Risk Management in Microsoft 365.
  • Configure and approve privileged access requests for global administrators.
  • Configure and use information barriers to conform to organizational regulations.
  • Build ethical walls in Exchange Online
  • Configure Customer Lockbox

Module 14: Discover and Respond

This module focuses on content search and investigations. The module covers how to use eDiscovery to conduct advanced investigations of Microsoft 365 data. It also covers audit logs and discusses GDPR data subject requests.

  • Content Search
  • Audit Log Investigations
  • Advanced eDiscovery

Lab : Manage Search and Investigation

  • Investigate your Microsoft 365 Data
  • Conduct a Data Subject Request

After completing this module, students will be able to:

  • Conduct content searches in Microsoft 365
  • Perform and audit log investigation.
  • Configure Microsoft 365 for audit logging.
  • Use Advanced eDiscovery

target_au

The Microsoft 365 Security administrator collaborates with the Microsoft 365 Enterprise Administrator, business stakeholders and other workload administrators to plan and implement security strategies and to ensures that the solutions comply with the policies and regulations of the organization.     This role proactively secures Microsoft 365 enterprise environments. Responsibilities include responding to threats, implementing, managing and monitoring security and compliance solutions for the Microsoft 365 environment. They respond to incidents, investigations and enforcement of data governance.     The Microsoft 365 Security administrator is familiar with Microsoft 365 workloads and hybrid environments. This role has strong skills and experience with identity protection, information protection, threat protection, security management and data governance.


pre_req
  • Basic conceptual understanding of Microsoft Azure.
  • Experience with Windows 10 devices.
  • Experience with Office 365.
  • Basic understanding of authorization and authentication.
  • Basic understanding of computer networks.
  • Working knowledge of managing mobile devices.

titleSDAFND 1.0 – Understanding Cisco SDA Fundamentals
days3
seo_title
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco® Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks. You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFND will introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks.
objective

After taking this course, you should be able to:

  • Describe Cisco SD-Access architecture and its components
  • Explain Cisco DNA Center deployment models, scaling, and high availability
  • Identify Cisco SD-Access fabric protocols and node roles
  • Understand the Cisco SD-Access Wireless deployment models
  • Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP
  • Deploy simple Cisco SD-Access fabric networks
  • Monitor health and performance of the network with Cisco DNA Center Assurance
  • Interact with the Cisco DNA Center Platform Intent APIs

outline
  • Introducing Cisco SD-Access
  • Introducing Cisco DNA Center
  • Exploring Cisco SD-Access Solution Components
  • Exploring Cisco SD-Access Wireless Architecture
  • Automating Network Changes with Cisco DNA Center
  • Deploying Fabric Networks with Cisco DNA Center
  • Exploring Cisco DNA Center Assurance
  • Exploring Cisco DNA Center Programmability

Lab Outline

  • Explore Cisco DNA Center User Interface
  • Verify Location Identifier Separation Protocol (LISP) Operation in Cisco SD-Access
  • Integrate Cisco DNA Center and Cisco Identity Services Engine (Cisco ISE)
  • Provision Access Points in Cisco DNA Center
  • Provision Underlay Networks with Cisco DNA Center LAN Automation
  • Provision Underlay Networks with Cisco DNA Center LAN Automation (cont.)
  • Deploy Cisco SD-Access Single Site Fabric
  • Deploy Cisco SD-Access Single Site Fabric (cont.)
  • Explore Cisco DNA Center Assurance
  • Cisco DNA Assurance Issues and Guided Remediation
  • Interact with Cisco DNA Center Intent APIs Using Python

target_au
  • Field engineers
  • Network engineers
  • Network administrators
  • System engineers

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • CCNP® level core networking knowledge
  • Ability to use Windows and Linux CLI tools such as ping, SSH, or running scripts

These are the recommended Cisco offerings that may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA®0
  • Implementing Cisco Enterprise Network Core Technologies (ENCOR)

titleSEGRTE201 v2.0 – Implementing Segment Routing on Cisco IOS XR
days4
seo_title
seo_dec
seo_tkey
categorycybersecurity-courses
vendorCisco

techonogySecurity
overviewThe Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of segment routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement topology-independent loop-free alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP).
objective
outline

Introduction to Segment Routing

  • Examining Unified Fabric Routing
  • Exploring Segment Routing Concepts
  • Examining Segment Types
  • Examining the Segment Routing Global Block (SRGB)

IGP Segment Routing Implementation and Verification

  • Examining the IGP Control Plane
  • Examining SRGB and IGP Interactions
  • Examining Prefix and Adjacency SIDs
  • Intermediate System to Intermediate System (IS-IS) Multilevel and Open Shortest Path First (OSPF) Multi-Area
  • Configuring and Verifying IS-IS SR Operation
  • Configuring and Verifying OSPF SR Operation

Segment Routing and LDP Interworking

  • SR and LDP Interworking Data Plane
  • Mapping Server Function and Configuration
  • Interworking Deployment Models

Topology Independent – Loop Free Alternate

  • Examining Classic LFA
  • Examining TI-LFA Fundamentals
  • Implementing and Verifying TI-LFA for SR Traffic
  • Implementing and Verifying SR TI-LFA for LDP Traffic
  • TI-LFA and SR LDP Interworking

Segment Routing Policies – Traffic Engineering (SR-TE)

  • Exploring SR Policies
  • Introducing the Anycast and Binding SIDs
  • Enabling and Verifying SR Policies
  • Instantiating SR Policies
  • Instantiating SR Policies using BGP Dynamic

Multidomain SR Policies

  • Configuring and Verifying a Path Computation Element (PCE)
  • Configuring and Verifying BGP Link-State (LS)
  • Configuring Multidomain SR Policies with a PCE
  • Configuring Multidomain SR Policies with On Demand Next-Hop (ODN) h

Segment Routing–Based Services

  • Examining the BGP Prefix-SID Operation
  • Configuring and Verifying the BGP Prefix SID
  • Examining Egress Peer Engineering
  • Examining the BGP Prefix-SID Operation
  • SR Flexible Algorithm and Performance Measurement (PM) Delay
  • SR-Enabled VPNs

target_au
  • Systems engineers
  • Network engineers
  • Field engineers
  • Technical support personnel
  • Channel partners and resellers

pre_req
  • Basic experience with the Cisco Internetwork Operating System (IOS®) XR CLI is helpful.

titleIOSXR100 v2.0 – Introduction to Cisco IOS XR
days4
seo_title
seo_dec
seo_tkey
categoryservice-provider-courses
vendorCisco

techonogyService Provider Training
overviewThe Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco® Internetwork Operating System (Cisco IOS®) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting. Through a combination of lecture and hands-on lab exercises, you gain an understanding of all major aspects of the operating system, including the architecture, high-availability components, scalability features, configuration basics, basic software operations, configuration file overview, Authentication, Authorization, and Accounting (AAA) services, Network Time Protocol (NTP) configuration, packet filtering, and management plane protection.
objective
  • Describe the Cisco IOS XR software architecture, high availability components, and scalability features
  • Perform basic configurations on a Cisco IOS XR router
  • Describe Cisco IOS XR software operations
  • Describe the configuration file system
  • Perform Cisco IOS XR software installations
  • Configure AAA services
  • Configure NTP
  • Configure Simple Network Management Protocol (SNMP), telemetry, and logging
  • Configure routing protocols
  • Monitor processes
  • Use error messages and core dumps

outline

Cisco IOS XR Software Overview

  • Platform Overview
  • Cisco IOS XR Architecture
  • Cisco IOS XR High Availability

Cisco IOS XR Software Configuration Basics

  • Cisco IOS XR Configuration Operations
  • Cisco IOS XR Initial Configuration
  • Reviewing the Configuration

Cisco IOS XR Software Operations

  • Examining Configuration Operations
  • Examining Configuration Rollback and Recovery

Configuration File System Overview

  • Examining the Binary Configuration
  • Examining the Commit Database
  • Examining the ASCII Configuration
  • Examining the Nonvolatile Generation (NVgen) Files
  • Verifying CiscoFabric Services (CFS) Integrity

Cisco IOS XR Software Installation

  • Software Package Basics
  • Installing Software Packages

AAA Security

  • AAA Fundamentals
  • Task-Based Security
  • Configuring a User Security Policy
  • Authentication with Remote Servers
  • Configuring Router to AAA Server Communication
  • Configuring Authentication
  • Terminal Access Controller Access-Control System Plus (TACACS+) Command Authorization
  • Configuring Accounting
  • AAA Troubleshooting

Network Time Synchronization

  • Network Time Protocol

SNMP, Telemetry, and Logging

  • Examining SNMP
  • Examining Telemetry
  • Examining Logging

Basic Routing Configuration

  • Configuring Intermediate System to Intermediate System (IS-IS)
  • Configuring Open Shortest Path First (OSPF)
  • Configuring Border Gateway Protocol (BGP)
  • Configuring Routing Protocol for LLN (RPL) Policy

Packet Filtering

  • Access Control Lists
  • Unicast Reverse Path Forwarding
  • Management Plane Protection

Monitoring Process

  • Examining Processes and Threads
  • Process Crashes
  • Commands for Debugging Processes
  • Restartability of Processes
  • Process Monitoring
  • Identifying Memory Problems
  • Memory Depletion

Core Dumps

  • Core Dump Fundamentals
  • Using Core Dump Information

target_au
  • System installers
  • System integrators
  • System administrators
  • Network administrators
  • Solution designers

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Experience working with command-line interface (CLI)–based network devices
  • Knowledge of general routing concepts

titleH9TB0S – Configuring Data Center Networks with Aruba OS-CX
days3
seo_title
seo_dec
seo_tkey
categorydatacenter-courses
vendorHP

techonogyDatacenter & Virtualization
overviewThe Configuring Data Center Networks with Aruba OS CX course provides the skills and knowledge to design, implement, and configure complex data center solutions based on the Aruba AOS CX switches. Data center networks are at a breaking point. Aruba offers a new architectural approach that provides simplified, scalable and automated connectivity for virtualized compute, storage and cloud. Data center networking requirements have evolved rapidly, with emerging technologies increasingly focused on supporting more automation and simplified operations in virtualized data centers. Aruba data center solutions and technologies such as Virtual Switching Extension (VSX) allow the grouping of data center switches for simpler management, but keep control and data planes separate for better high availability. Ethernet Virtual Private Networks (EVPN) allow the creation of modern two-layered data centers for business resilience and high availability.
objective
  • Understand the components of the Aruba OS CX switching architecture
  • Describe common data center networking requirements
  • Describe the benefits of VSX implementation in a data Center
  • Understand, describe and configure VRF which enables a switch to run multiple routing instances in a network
  • Understand, describe and configure VXLAN functionality; VXLAN provides an alternative to the traditional VLAN concept
  • Understand, describe and configure EVPN to transport VXLAN thru the data center
  • Understand, describe and configure Data Center Bridging (DCB), a technology that enables the consolidation of IP-based LAN traffic and block-based storage traffic onto a single converged Ethernet network, helping to eliminate the need to build separate infrastructures for LAN systems that carry typical end user data traffic, and SAN systems that carry storage-specific communications
  • Understand, describe and configure Ethernet Ring Protection Switching (ERPS) which enables Ethernet ring topologies with a fast convergence
  • Describe requirements for a data center network design
  • Describe different data center deployment models
  • Understand various data center technologies and their impact on a design Certifications and related examinations

outline

Module 1: Introduction to Data Center Technologies

  • Data center networking evolution
  • Data center networking design
  • AOS CX switches overview
  • Data center networking technology

Module 2: NetEdit

  • Features
  • Device discovery
  • Plans

Module 3: Virtual Switching Extension (VSX)

  • VSX components and features
  • VSX software upgrade
  • VSX at the data center

Module 4: Data Center Bridging (DCB)

  • DCB configuration
  • DCB components

Module 5: Virtual Routing and Forwarding (VRF)

  • VRF Lite
  • VRF use cases
  • VRF configuration
  • Data center networking

Module 6: VXLAN

  • VXLAN concepts
  • Operations
  • Traffic flow

Module 7: EVPN

  • Dynamic tunneling
  • Forwarding
  • Centralized routing

Module 8: DCI

  • DCI solutions at AOS-CX
  • ERPS

Module 9: NAE

  • Agents
  • Scripts
  • Upgrade
  • Troubleshooting
  • Use cases

Module 10: Data Center Networks Design

  • zDCN requirements
  • DCN design
  • AOS-CX technologies for DCN

 

Lab Outline

Lab 1: Initial Lab Setup

  • Configure switches access
  • System and hardware status

Lab 2: NetEdit

  • Setup environment
  • NetEdit users and passwords
  • Import and manage devices
  • Create change and conformance validation
  • Create a configuration plan for switches

Lab 3: VSX

  • Configuring VSX ISL
  • VSX LAG
  • Configuring VSX keepalive
  • Configuring VSX active-gateway
  • VSX redundancy
  • VSX linkup-delay
  • VSX split-brain

Lab 4: DCBX

  • Enabling DCBX
  • Priority Flow Control (PFC) and APP TLV
  • Enhanced Traffic Selection (ETS)

Lab 5: VRF

  • Setup environment
  • Inter-Virtual Routing and Forwarding

Lab 6: VXLAN

  • Prepare the base configuration for the lab
  • VXLAN configuration

Lab 7: EVPN

  • Setup environment
  • Configure L2 EVPN

Lab 8: ERPS

  • Prepare lab environment
  • Configure ERPS
  • ERPS operations

Lab 9: NAE

  • Setup environment
  • Upload a NAE script and create an agent
  • Update a NAE script
  • NAE troubleshoot

target_au

This course is ideal for Aruba partners, customers and employees who have a minimum of 3 years of experience implementing and designing enterprise level networks. Students should demonstrate an ability to understand, configure and implement modern data centers based on Aruba switching solutions that provide a simplified, scalable and automated Ethernet fabric that connects virtualized compute, storage, and cloud services.


pre_req

It is strongly recommended that the candidate first complete the Configuring Aruba OS CX (Course ID: 01123901) course


titleMcAfee ePolicy Orchestrator 5.10 Essentials
days1
seo_title
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogySecurity
overviewThe McAfee® ePolicy Orchestrator® 5.10 Essentials Course from McAfee Education Services provides attendees with hands-on learning about using the tools needed to efficiently install, configure, operate, and troubleshoot issues relating to McAfee ePolicy Orchestrator (McAfee® ePO™) software to safeguard intellectual property and ensure compliance and identify its components, architecture, and communications. Please note:
  • This is self-paced course
  • The content is for 8 hours and the student has 30 days to complete this course.

objective
  • Define the McAfee ePO software and McAfee® Agent, and explain its purpose, key characteristics, and functions.
  • Install, upgrade, and uninstall McAfee ePO software.
  • Deploy and configure McAfee products to endpoints.
  • Configure server tasks and permission sets.
  • Create and manage policies and rules.
  • Describe the new policy, task approval, and new policy catalog functionality.
  • Create and interpret important McAfee ePO software reports.
  • Perform basic trouble shooting for McAfee ePO software.
  • Identify McAfee ePO software components, architecture, and communications.
  • Describe basic navigation within the McAfee ePO software console.
  • Define and give examples of managed systems.
  • Navigate the McAfee Agent interface.
  • Identify best practices.
  • Describe the new McAfee ePO Support Center Health Check functionality.

outline

Module 1: McAfee ePolicy Orchestrator (On Premises) 5.10

  • Course Introduction
  • McAfee ePO Software Overview
  • McAfee Agent Overview

Module 2: Installation and Upgrade Overview

  • Installation and Upgrade Overview: Student Guide
  • Installation: Student Guide
  • McAfee ePO 5.10 Software (On Premises): Installation
  • Upgrade: Student Guide
  • McAfee ePO Updater Tool for McAfee ePO 5.10 Software
  • Upgrade to McAfee ePO 5.10 Software

Module 3: Server Configuration

  • Server Configuration: Student Guide
  • Menu Bar Notifications
  • Registered Servers Functionality
  • New User Interface Functionality
  • Server Configuration Features Overview
  • Creating a Tag

Module 4: Product Management

  • Product Management: Student Guide
  • Client Task Assignments
  • Client Task Comparison Tool
  • Client Task Approvals Process
  • Software Extension Installation: Manual
  • Software Extension Update: Manual
  • Software Package Installation: Manual
  • Software Package Update: Manual
  • Software Catalog New Features and Functionality
  • Software Catalog Package/Extension Check-In
  • Software Catalog Package/Extension Update
  • Software Catalog Package/Extension Removal
  • Product Deployment Project

Module 5: Policy Management

  • Policy Management: Student Guide
  • Policy Catalog Refresh
  • Policy Assignments Functionality
  • Policy Assignment Rules Functionality
  • Create, Update, and Manage Policies
  • Policy Comparison Tool
  • Policy History
  • Approval Management

Module 6: Dashboards, Queries, and Reports

  • Dashboards, Queries, and Reports: Student Guide
  • Dashboards Overview
  • Queries Overview
  • Reporting Overview
  • Reviewing the Audit Log

Module 7: User Accounts and Permissions

  • User Accounts and Permissions: Student Guide
  • Creating a User Account
  • Permission Sets

Module 8: Disaster Recovery

  • Disaster Recovery: Student Guide
  • Disaster Recovery Snapshot

Module 9: Troubleshooting Basics

  • Troubleshooting Basics: Student Guide

Module 10: McAfee ePO Support Center Health Check Student Guide

  • McAfee ePO Support Center Extension: Extension CheckIn Process
  • McAfee ePO Support Center Extension: McAfee ePO Server Health Topic Overview
  • McAfee ePO Support Center Extension: Support Notifications (SNS) Topic Overview
  • McAfee ePO Support Center Extension: Product Information Topic Overview
  • McAfee ePO Support Center Extension: Search Support Topic Overview

target_au
pre_req
titleImplement Citrix ADC 13.x with Citrix Gateway (CNS 226)
days2
seo_titleImplement Citrix ADC with Citrix Gateway (CNS 226) Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCitrix

techonogy
overviewLearn the skills required to configure and manage Citrix Gateway features. At the end of the course, students will be able to configure their Citrix Gateway environments to address remote access requirements for Apps and Desktops.
objective
  • Configure Authentication and Authorization
  • Define End User Access and Experience
  • Integrate Citrix Gateway with Citrix Virtual Apps and Desktops and additional resources
  • Employ recommended tools and techniques to troubleshoot common Citrix Gateway network and connectivity issues

outline

Module 1: Citrix Gateway

  • Introduction to Citrix Gateway
  • Advantages and Utilities of Citrix Gateway
  • Citrix Gateway Configuration
  • Common Deployments

Module 2: AppExpert Expressions

  • Introduction to AppExpert Policies
  • Default Policies
  • Explore Citrix ADC Gateway Policies
  • Policy Bind Points
  • Using AppExpert with Citrix Gateway

Module 3: Authentication, Authorization, and Secure Web Gateway

  • Authentication and Authorization
  • Multi-Factor Authentication
  • nFactor Visualizer
  • SAML authentication

Module 4: Managing Client Connections

  • Introduction to Client Connections
  • Session Policies and Profiles
  • Pre and Post Authentication Policies
  • Citrix Gateway Deployment Options
  • Managing User Sessions

Module 5: Integration for Citrix Virtual Apps and Desktops

  • Virtual Apps and Desktop Integration
  • Citrix Gateway Integration
  • Citrix Gateway WebFront
  • ICA Proxy
  • Clientless Access and Workspace App
  • Access Fallback
  • SmartControl and SmartAccess for ICA

Module 6: Configuring Citrix Gateway

  • Working with Apps on Citrix Gateway
  • RDP Proxy
  • Portal Themes and EULA

target_au

Built for IT Professionals working with Citrix Gateway, with little or no previous Citrix Gateway experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix Gateway environments.


pre_req

This course requires little to no previous experience with Citrix ADC; however, Citrix recommends a basic understanding of TCP/IP, HTTP, the OSI model, network devices, and networking protocols.


titleDeploy and Manage Citrix ADC 13.x with Citrix Gateway (CNS 227)
days5
seo_titleDeploy and Manage Citrix ADC with Citrix Gateway (CNS 227) Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCitrix

techonogy
overviewExpand your Citrix networking knowledge and skills by enrolling in this course. It covers Citrix ADC essentials, including secure load balancing, high availability and operations management, and also focuses on Citrix Gateway. You will learn to deliver secure remote access to apps and desktops integrating Citrix Virtual Apps and Citrix Desktops with Citrix Gateway.
objective
  • Identify the functionality and capabilities of Citrix ADC and Citrix Gateway
  • Explain basic Citrix ADC and Gateway network architecture
  • Identify the steps and components to secure Citrix ADC
  • Configure Authentication, Authorization, and Auditing
  • Integrate Citrix Gateway with Citrix Virtual Apps, Citrix Virtual Desktops and other Citrix components

outline

Module 1: Getting Started

  • Introduction to Citrix ADC
  • Feature and Platform Overview
  • Deployment Options
  • Architectural Overview
  • Setup and Management

Module 2: Basic Networking

  • Networking Topology
  • Citrix ADC Components
  • Routing
  • Access Control Lists

Module 3: ADC Platforms

  • Citrix ADC MPX
  • Citrix ADC VPX
  • Citrix ADC CPX
  • Citrix ADC SDX
  • Citrix ADC BLX

Module 4: High Availability

  • Citrix ADC High Availability
  • High Availability Configuration
  • Managing High Availability
  • In Service Software Upgrade
  • Troubleshooting High Availability

Module 5: Load balancing

  • Load Balancing Overview
  • Load Balancing Methods and Monitors
  • Load Balancing Traffic Types
  • Load Balancing Protection
  • Priority Load Balancing
  • Load Balancing Troubleshooting

Module 6: SSL Offloading

  • SSL Overview
  • SSL Configuration
  • SSL Offload
  • Troubleshooting SSL Offload
  • SSL Vulnerabilities and Protections

Module 7: Security

  • Authentication, Authorization, and Auditing
  • Configuring External Authentication
  • Admin Partitions

Module 8: Monitoring and Troubleshooting

  • Citrix ADC Logging
  • Monitoring with SNMP
  • Reporting and Diagnostics
  • AppFlow Functions
  • Citrix Application Delivery Management
  • Troubleshooting

Module 9: Citrix Gateway

  • Introduction to Citrix Gateway
  • Advantages and Utilities of Citrix Gateway
  • Citrix Gateway Configuration
  • Common Deployments

Module 10: AppExpert Expressions

  • Introduction to AppExpert Policies
  • Default Policies
  • Explore Citrix ADC Gateway Policies
  • Policy Bind Points
  • Using AppExpert with Citrix Gateway

Module 11: Authentication, Authorization, and Secure Web Gateway

  • Authentication and Authorization
  • Multi-Factor Authentication
  • nFactor Visualizer
  • SAML authentication

Module 12: Managing Client Connections

  • Introduction to Client Connections
  • Session Policies and Profiles
  • Pre and Post Authentication Policies
  • Citrix Gateway Deployment Options
  • Managing User Sessions

Module 13: Integration for Citrix Virtual Apps and Desktops

  • Virtual Apps and Desktop Integration
  • Citrix Gateway Integration
  • Citrix Gateway WebFront
  • ICA Proxy
  • Clientless Access and Workspace App
  • Access Fallback
  • SmartControl and SmartAccess for ICA

Module 14: Configuring Citrix Gateway

  • Working with Apps on Citrix Gateway
  • RDP Proxy
  • Portal Themes and EULA

target_au

Built for IT Professionals working with Citrix ADC and Gateway, with little or no previous Citrix networking experience. Potential students include administrators, engineers, and architects interested in learning how to deploy or manage Citrix ADC or Citrix Gateway environments.


pre_req

This course requires little to no previous experience with Citrix ADC; however, Citrix recommends a basic understanding of of TCP/IP, HTTP, and of the OSI model, network devices, and networking protocols.


titleDCNX v1.0 – Implementing Cisco NX-OS Switches and Fabrics in the Data Center
days5
seo_titleDCNX - Implementing Cisco NX-OS Switches and Fabrics in the Data Center Course Training
seo_dec
seo_tkey
categorydatacenter-courses
vendorCisco

techonogy
overviewThe Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX) v1.0 course gives you a detailed understanding of the Cisco® Nexus switch platform and teach you how to install, configure, and manage Cisco Nexus® switch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) modes.
objective

After taking this course, you should be able to:

  • Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families
  • Describe Cisco Nexus platform implementations
  • Explain Cisco Nexus platform management
  • Describe Port Channels and Virtual Port Channels
  • Configure First Hop Redundancy protocols
  • Configure security features of Cisco Nexus devices
  • Describe the Cisco Nexus devices routing and forwarding
  • Describe Virtual Extensible LAN (VXLAN)
  • Describe Quality of Service (QoS) on Cisco Nexus Devices
  • Explain system management and monitoring processes
  • Describe Cisco NX-OS programmability
  • Describe Cisco Nexus storage services
  • Configure device aliases and zoning
  • Configure FCoE
  • Configure NPIV and NPV modes

outline
  • Describing Cisco Nexus Series Switches
  • Describing Cisco Nexus Platforms Implementation
  • Describing Cisco Nexus Platforms Management
  • Describing Port Channels and Virtual Port Channels
  • Configuring First Hop Redundancy Protocols
  • Configuring Cisco Nexus Security Features
  • Describing Cisco NX-OS Routing and Forwarding
  • Describing Virtual Extensible LAN
  • Describing QoS on Cisco Nexus Devices
  • Configuring System Management and Monitoring
  • Describing Cisco NX-OS Programmability
  • Describing Cisco Nexus Storage Services
  • Configuring Fibre Channel Over Ethernet
  • Describing Device Aliases and Zoning
  • Configuring NPIV and NPV Modes

 

Lab outline

  • Test Cisco Nexus Platforms
  • Configure User Management
  • Configure vPC
  • Configure First Hop Redundancy Protocol (FHRP) Protocols
  • Configure Cisco Nexus Security Features
  • Configure Open Shortest Path First (OSPF)
  • Configure VXLAN
  • Configure QoS
  • Configure System Management
  • Configure Cisco NX-OS On-Box Programmability
  • Configure Containers on Cisco NX-OS
  • Configure Cisco NX-OS Using Ansible
  • Configure Basic Fibre Channel Features
  • Configure FCoE
  • Configure Fiber Channel Device Aliases and Zoning
  • Configure NPV

target_au
  • Data center systems engineers
  • Field engineers
  • Architects
  • Cisco partners using Cisco Nexus Series switch platforms

pre_req
  • Be familiar with Cisco data center technologies
  • Understand networking protocols, routing, and switching

titleSecure Wireless LAN
days2
seo_titleSecure Wireless LAN Course Training | Fortinet NSE 6 Certification
seo_decIn this course, you will learn how to deploy, configure, and troubleshoot secure wireless LAN using an integrated wireless solution.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogy
overviewIn this course, you will learn how to deploy, configure, and troubleshoot secure wireless LAN using an integrated wireless solution. Using interactive labs, you will enforce your knowledge of deploying a secure wireless LAN centrally managed from the FortiGate wireless controller.
objective

After completing this course, you will be able to:

  • Explore FortiPresence, FortiPlanner, and FortiAP Cloud
  • Deploy a wireless network using the FortiGate integrated wireless controller
  • Learn about different SSIDs traffic modes
  • Deploy multiple wireless SSIDs
  • Offer secure wireless access with 802.1x authentication
  • Deploy wireless networks with VLANs
  • Thwart hotspot hackers and rogue APs
  • Understand fast roaming and wireless client load balancing
  • Troubleshoot signal loss, slow connection, and authentication issues

outline
  1. Introduction to FortiOS Integrated Wireless
  2. Wireless Controller
  3. Access Point Profile
  4. Advanced Configuration
  5. Troubleshooting

target_au
  • This course is intended for networking and security professionals involved in the management, configuration, administration, and monitoring of the Fortinet integrated and/or cloud wireless solution.

pre_req

Understanding of basic wireless networks

  • Review the supplementary Wireless Network Fundamentals lesson

Understanding of the topics covered in the following courses:

  • NSE 4 FortiGate Security
  • NSE 4 FortiGate Infrastructure
  • Understanding of the topics covered in the NSE 6 FortiAuthenticator course is also recommended.

titleFortiAnalyzer
days2
seo_titleFortiAnalyzer Course Training | Fortinet NSE 5 Certification
seo_decIn this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging and reporting.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging and reporting. You will learn how to configure and deploy FortiAnalyzer, and identify threats and attack patterns through logging, analysis, and reporting. Finally, you will examine the management of events, incidents, playbooks, and some helpful troubleshooting techniques.
objective

After completing this course, you should be able to:

  • Describe key features and concepts of FortiAnalyzer
  • Deploy an appropriate architecture
  • Use administrative access controls
  • Monitor administrative events and tasks
  • Configure high availability
  • Understand HA synchronization and load balancing
  • Upgrade the firmware of an HA cluster
  • Verify the normal operation of an HA cluster
  • Manage ADOMs
  • Manage RAID
  • Register supported devices
  • Troubleshoot communication issues
  • Manage disk quota
  • Manage registered devices
  • Protect log information
  • View, search, manage, and troubleshoot logs
  • Monitor and manage events
  • Manage and customize event handlers
  • Create and manage incidents
  • Explore tools used for threat hunting
  • Create, run, and troubleshoot playbooks
  • Import and export playbooks
  • Generate and customize reports
  • Customize charts and datasets
  • Manage and troubleshoot reports

outline
  1. Introduction and Initial Configuration
  2. Administration and Management
  3. Device Registration and Communication
  4. Logging
  5. FortiSoC—Incidents and Events
  6. FortiSoC—Playbooks
  7. Reports

target_au
  • Anyone who is responsible for the day-to-day management of FortiAnalyzer devices and FortiGate security information.

pre_req
  • Familiarity with all topics presented in the NSE 4 FortiGate Security and NSE 4 FortiGate Infrastructure courses
  • Knowledge of SQL SELECT syntax is helpful, but not required

titleMcAfee Enterprise Security Manager Administration 201
days4
seo_titleMcAfee Enterprise Security Manager Administration 201 Course Training
seo_dec
seo_tkey
categorycybersecurity-courses
vendorMcAfee

techonogySecurity
overviewMcAfee® Enterprise Security Manager—the core of our security information and event management (SIEM) solution—provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This enables you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. This course provides attendees with hands-on training on the design, setup, configuration, communication flow, and data source management of the ESM appliances. In addition, the course prepares McAfee ESM analysts to use and communicate the features provided by the solution. Through hands-on lab exercises and use case scenarios, you will learn how to optimize the McAfee Enterprise Security Manager by using McAfee-recommended best practices and methodologies.
objective

Contextual Configurations:

  • Review ESM architecture and configuration tasks. Define Asset manager and how to manage assets and asset groups. Define and configure data enrichment using the Data Enrichment Wizard. Integrate vulnerability assessment (VA) tool with ESM.

Advanced Data Source Options:

  • Configure Auto Learn to listen to incoming events. Install and configure the SIEM Collector Agent.

Alarms, Actions, Notifications, and Reports:

  • Build and edit advanced alarms. Build and edit templates. Use remote commands. Create report queries. Configure notifications.

Data Streaming Bus:

  • Review the benefits of the Data Streaming Bus device. Add Data Streaming Databus (DSB). Configure Data Routing. Configure Data Sharing. Create Message Forwarding Rules.

Advanced Syslog Parser:

  • Understand Regex and available resources. Understand how to handle unknown events. Create custom parsing rules.

ESM Tuning and Best Practice:

  • Understand Event Tuning methodology. Configure events filtering on ERC. Identify key strategies for tuning correlation rules. Apply best practice to enhance ESM performance.

Performance Troubleshooting:

  • Discuss common performance issues. Describe possible causes and fixes. Learn how to avoid performance issues.

Advanced Correlation:

  • Utilize advanced rule correlation options. Configure deviation-based rule correlation. Configure risk correlation.

Analyst Tasks:

  • Make tuning recommendations according to your analysis. Identify events for immediate action, delayed action and no action (triage). Perform actions to maximize the usefulness of ESM output.

Use Cases Overview:

  • Define and discuss use cases. Follow a process to develop well defined use cases.

Management Directives Use Cases:

  • Create use cases from management directives.

Compliance Use Cases:

  • Create use cases from regulations to validate compliance.

Current Threat and Vulnerability Use Cases:

  • Research current threats and vulnerabilities. Create use cases from current threats and vulnerabilities.

Incident Use Cases:

  • Investigate incidents. Create use cases to quickly identify previously remediated incidents.

outline

Day 1:

  • Welcome
  • Contextual Configurations
  • Advanced Data Source Options
  • Alarms, Actions, Notifications, and Reports

Day 2:

  • Data Streaming Bus
  • Advanced Syslog Parser
  • ESM Tuning and Best Practice
  • Performance Troubleshooting

Day 3:

  • Advanced Correlation
  • Analyst Tasks
  • Use Case Overview
  • Management Directives Use Cases

Day 4:

  • Organizational Policies Use Cases
  • Compliance Use Cases
  • Current Threats and Vulnerabilities Use Cases
  • Incident Identification Use cases

target_au

This course is aimed at McAfee customers acting as McAfee ESM engineers who are responsible for configuration and management of the solution and also for ESM analysts who are responsible for monitoring activity on systems, networks, databases, and applications. Attendees should have a good understanding of computer security concepts and a general understanding of networking and application software. Attendees should have at least one year of experience managing the McAfee Enterprise Security Manager Solution.


pre_req

It is recommended that students have a working knowledge of:

  • McAfee Enterprise Security Manager (ESM / SIEM)
  • Networking and system administration concepts
  • Moderate understanding of computer security concepts
  • Experience with network security concepts and practices

titleMcAfee Enterprise Security Manager Administration 101
days4
seo_titleMcAfee Enterprise Security Manager Administration 101 Course Training
seo_dec
seo_tkey
categorycybersecurity-courses
vendorMcAfee

techonogySecurity
overviewMcAfee® Enterprise Security Manager—the core of our security information and event management (SIEM) solution—provides near real-time visibility into the activity on all your systems, networks, databases, and applications. This enables you to detect, correlate, and remedy threats in minutes across your entire IT infrastructure. This course prepares McAfee Enterprise Security Manager engineers and analysts to understand, communicate, and use the features provided by McAfee Enterprise Security Manager. Through hands-on lab exercises, you will learn how to optimize the McAfee Enterprise Security Manager by using McAfee-recommended best practices and methodologies
objective

McAfee Enterprise Security Manager Overview

  • Define McAfee Enterprise Security Manager and SIEM concepts, identify appliances and their features, and describe the McAfee Enterprise Security Manager solution component architecture.

Devices

  • Configure and customize receiver data sources and data source profiles.

McAfee Enterprise Log Manager and McAfee Enterprise Log Search

  • Configure McAfee Enterprise Log Manager settings, and mirror McAfee Enterprise Log Manager data storage.

McAfee Enterprise Security Manager Views

  • Effectively navigate the McAfee Enterprise Security Manager dashboard, and create custom McAfee Enterprise Security Manager data views.

Data Sources

  • Locate events, and manage cases using a variety of data sources, assets, and enriched data.

Aggregation

  • Customize event and flow aggregation fields on a persignature basis, and define the advantages and nuances associated with event and flow aggregation.

Policy Editor

  • Create, modify, and delete McAfee Enterprise Security Manager policies within the policy editor.

Query Filters

  • Apply filters in views, create filter sets, use string normalization, and understand the basic syntax of regular expressions.

Correlation

  • Configure and deploy custom correlation rules within the correlation editor.

Watch Lists and Alarms

  • Create and configure watch lists and alarms.

Reports

  • Create and configure reports.

System Management

  • Perform routine maintenance on McAfee Enterprise Security Manager, including updates and clearing policy modifications and rule updates.

Troubleshooting

  • Perform troubleshooting steps associated with login issues, operating systems and browser-specific issues, hardware issues, and McAfee Enterprise McAfee Security Manager dashboard issues.

Use Case Design

  • Understand how the McAfee Enterprise Security Manager interface dashboards and views are used to identify specific events and incidents.

outline

Day 1

  • Course Introduction
  • Architecture Overview
  • Devices and Settings
  • McAfee Enterprise Security Manager Interface and Views

Day 2

  • Data Sources
  • Working with McAfee® Enterprise Log Manager and McAfee® Enterprise Log Search
  • Event Analysis
  • Aggregation

Day 3

  • Watch Lists and Policy Editor
  • Query Filters
  • Rule Correlation
  • Alarms

Day 4

  • Workflow and Analysis
  • Reports
  • System Maintenance and Troubleshooting
  • Introduction to Use Case Design

target_au

This course is aimed at McAfee Enterprise Security Manager users responsible for monitoring activity on systems, networks, databases, applications, and for configuration and management of the McAfee Enterprise Security Manager solution. Attendees should have a working knowledge of networking and system administration concepts, a good understanding of computer security concepts, and a general understanding of networking and application software.


pre_req

It is recommended that students have a working knowledge of networking and system administration concepts.


titleForcepoint NGFW Administrator
days4
seo_titleForcepoint NGFW Administrator Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorForcepoint

techonogyEnterprise Networking
overviewIn this course, you will learn the skills needed to practice as a system administrator responsible for installation, configuration, administration, and support of the Forcepoint NGFW. Through instructional content, demonstrations, and hands-on lab practice exercises, you will learn the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments. You will develop expertise in creating security rules and policies, managing users and authentication, configuring VPNs, traffic deep inspection, performing common administration tasks including status monitoring and reporting. Duration: 4 days (4 hours per day)
objective
  • Understand the fundamentals of NGFW
  • Articulate the NGFW System Architecture
  • Differentiate the various NGFW operating modes
  • Administer the SMC components and use them to manage and monitor
  • Perform common administration tasks
  • Configure security policies and access control
  • Manage users and authentication
  • Understand monitoring capabilities
  • Create and edit reporting of the traffic processed by NGFWs
  • Integrate NGFW with other Forcepoint solutions
  • Perform basic troubleshooting of NGFW

outline

Module 1: Introduction

  • Welcome to the course
  • Understand and prepare to use the virtual training environment

Module 2: NGFW Overview

  • Articulate NGFW key benefits and differentiators from other firewall products
  • Differentiate the various NGFW operating modes
  • Describe the NGFW Hardware Platform and Virtualization options
  • Describe different installation methods
  • Understand different NGFW deployment options

Module 3: SMC Overview

  • Articulate the NGFW system architecture
  • Describe the components of the SMC and its supported platforms
  • Identify the properties of the Management & Log server
  • Identify the properties of the Web Portal Server
  • Articulate the SMC Deployment options
  • Understand communication between SMC components and NGFW
  • Understand locations and contact addresses

Module 4: Getting Started with SMC

  • Describe a high-level overview of the functionality of the management client
  • Prepare to perform system backups
  • Describe SMC High Availability solutions
  • Understand different SMC Administrator roles and access limitation
  • Articulate SMC logging approach and how to utilize Logs view

Module 5: NGFW Policies and Templates

  • Describe the types of NGFW policies
  • Understand firewall policy templates
  • Explain automatic rules
  • Understand a firewall policy hierarchy

Module 6: Access Control and NAT

  • Utilize the policy editor to customize NGFW policies
  • Configure Access Control Rules
  • Understand Rules Options
  • Describe the supported types of NAT
  • Configure the Network Address Translation

Module 7: Traffic Inspection

  • Understand the difference between stateful and proxy mode
  • Configure web filtering
  • Explain different ways to control applications
  • Configure Sidewinder Proxy on the NGFW
  • Describe integration with external solutions

Module 8: Inspection Policies

  • Describe the Inspection Policies and Inspection Policy hierarchy
  • Configure the system policies and utilize the template for deep packet inspection
  • Articulate the different inspection policy components and options.
  • Modify Inspection rules to react with various traffic
  • Understand how to tune the Inspection Policy

Module 9: Malware Detection and File Filtering Policies

  • Explain the malware detection process in the NGFW
  • Articulate the different options for detecting malware
  • Configure a File Filtering Policy
  • Explain the detection methods used in the NGFW Inspection

Module 10: Alerting and Notifications

  • Explain the alert escalation process in the NGFW system
  • Create an alert policy and alert chain to escalate an alert
  • Configure alert notifications channels

Module 11: Users and Authentication

  • Identify supported directory servers and authentication methods
  • Explain and configure user authentication
  • Comprehend user identification
  • Understand how to integrate active directory interacts with the FUID agent
  • Understand ECA agent integration in windows environments

Module 12: Mobile VPN and SSL VPN Portal

  • Understand client based and clientless remote access
  • Articulate the different Forcepoint options for remote access
  • Perform the SSL VPN Portal configuration

Module 13: Site-to-Site VPN

  • Understand NGFW VPN Terminology
  • Differentiate between policy-based VPN and route-based VPN
  • Understand different site-to-site VPN topologies
  • Configure a policy-based VPN

Module 14: Using Logs

  • Describe the log entry types available in the NGFW
  • Analyze how pruning filters affect log data
  • Create permanent filters
  • Illustrate the analysis and visualization tools for logs
  • Configure log data management tasks

Module 15: Monitoring, Statistics, and Reporting

  • Understand status monitoring views and dashboards
  • Understand Overviews and alert thresholds
  • Create customizable reports from log data
  • Comprehend the different third-party probing methods

Module 16: Policy Tools

  • Understand policy snapshots within the Management Server
  • Run the Rule Search tool available for Access rules, NAT rules, and Inspection Policies
  • Utilize the Policy Validation tool
  • Understand the Rule Counter Analysis
  • Comprehend the Policy Activation process in NGFW

Module 17: Troubleshooting

  • Understand the full troubleshooting process
  • Recognize the different kinds of logs that SMC provides to perform troubleshooting
  • Utilize various logs for troubleshooting and understand their meaning
  • Capture traffic and run diagnostics
  • Learn what to provide support when troubleshooting
  • Apply knowledge through three common problem scenarios

Module 18: What’s new in NGFW 6.7

  • Describe the new features added in 6.7 to the Forcepoint NGFW

target_au
  • New and existing customers of Forcepoint NGFW
  • Forcepoint Channel Partners
  • Forcepoint NGFW end users

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleCloud & Data Center Monitoring with System Center Operations Manager
days5
seo_titleCloud & Data Center Monitoring with System Center Operations Manager Course Training
seo_dec
seo_tkey
categorydata-center-insoft-specials
vendorMicrosoft

techonogyDatacenter & Virtualization
overviewThis course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations Manager. Using hands-on labs, students learn the following:
  • How to architect and implement a System Center 2012 R2 Operations Manager Management Group.
  • How to upgrade and migrate from an existing Operations Manager 2007 R2 Management Group to System Center 2012 Operations Manager, System Center 2012 SP1 Operations Manager and System Center 2012 R2 Operations Manager.
  • Understand the key elements of Management Packs including Object Discoveries, Rules, Monitors, Targeting and Run As Accounts and Run As Profiles. This includes authoring Management Packs.
  • How to configure fabric and application monitoring in System Center 2012 R2 Operations Manager including both datacenter and cloud resources such as networking, storage and compute.
  • How to configure monitoring of .NET and Java based applications using Application Performance Monitoring.
  • How to configure end-to-end service monitoring including synthetic transactions and Distributed Application Diagrams.
  • How to configure Dashboards, Service Level Tracking Reporting and the SharePoint Web Part to enable visualization of key performance and availability metrics.
  • How to customize the Operations Manager Console to meet the needs of different application support teams.
  • How to integrate Operations Manager with other System Center 2012 R2 components and extend monitoring to include key business processes and procedures.
  • How to troubleshoot an Operations Manager Management Group and perform disaster recovery procedures such as database and management server recovery.
  • How to use new features in System Center 2012 R2 including: Integration with System Center Advisor, Integration with Team Foundation Server, IntelliTrace, and Managing Windows Azure.

objective
outline

Module 1: Overview and Architecture

Before implementing Operations Manager it is important you understand the key features and functionality that it provides. This will help you understand how Operations Manager can be used to solve many common problems that arise in the cloud or datacenter such as ensuring service levels are maintained, and critical line-of –business applications are available and performing at optimum levels.

Operations Manager is a comprehensive monitoring solution that requires careful planning before it is deployed into any IT environment. You must understand the hardware and software requirements of the solution and any security implications that may arise, such as monitoring computers in a trust boundary, perimeter network or public cloud. When you configure the storage for the Operations Manager databases, you should have a good understanding of the number of computers and devices that are monitored to appropriately size the databases.

This module introduces students to the components contained in an Operations Manager Management Group and describes the dependency and relationships between the various components. Students will be shown how to plan for and design an Operations Manager Management Group.

Lessons

  • Overview of Operations Manager
  • Overview of Key Features in Operations Manager
  • Overview of Core Components and Topology
  • Addressing Cloud and Datacenter Issues by Using Operations Manager
  • Planning and Sizing System Center 2012 R2 Operations Manager

Lab : Using the System Center 2012 Operations Manager Sizing Helper Tool

After completing this module, students will be able to:

  • Describe the purpose and functionality of System Center 2012 R2 Operations Manager.
  • Describe the key features of System Center 2012 R2 Operations Manager.
  • Describe the System Center 2012 R2 Operations Manager components and topology.
  • Describe the key cloud and datacenter problems that Operations Manager addresses.
  • Describe how to design and size an Operations Manager Management Group.

Module 2: Deploying a new System Center 2012 R2 Operations Manager Management Group

When planning a new deployment of Operations Manager, as well as the hardware and sizing requirements that you may have, you should also consider other factors. Factors including the security accounts that Operations Manager requires and the design of the Management Group should also be considered. For example, you may have a requirement to install two separate Management Groups in order to scale Operations Manager to meet your monitoring requirements.

After installing Operations Manager you should also be aware of some of the most common settings that should be configured such as data retention (database grooming) settings and manual agent installation approval settings. You should also be aware of the agent deployment methods that are available including when you should use the console (or push) method or manual installation method of deploying an agent in Operations Manager.

Lessons

  • Overview of Security Considerations
  • Designing the Management Group
  • Installing System Center 2012 R2 Operations Manager
  • Configuring Operations Manager Default Settings
  • Deploying the Operations Manager Agent
  • Configuring Agentless Exception Monitoring (AEM)
  • Configuring Audit Collection Services

Lab : Installing System Center 2012 R2 Operations Manager and Deploying Agents

After completing this module, students will be able to:

  • Know the security considerations when deploying Operations Manager.
  • Know the Management Group design considerations.
  • Install System Center 2012 R2 Operations Manager.
  • Configure common settings in System Center 2012 R2 Operations Manager.
  • Deploy agents in System Center 2012 R2 Operations Manager.
  • Configure Agentless Exception Monitoring in System Center 2012 R2 Operations Manager.
  • Configure Audit Collection Services in System Center 2012 R2 Operations Manager.

Module 3: Upgrading Operations Manager

If you have already made investments in Operations Manager 2007 R2 it is important that you understand the upgrade path from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager.

Upgrading the core components to System Center 2012 R2 Operations Manager can only be performed on an Operations Manager 2007 R2 or later environment. Earlier versions of Operations Manager such as Operations Manager 2007 SP1 must be upgraded to Operations Manager 2007 R2 before they can be upgraded to System Center 2012 Operations Manager. Additionally the Operations Manager 2007 R2 installation must be running at least Cumulative Update 4.

Before upgrading to System Center 2012 Operations Manager there are several important tasks that must be performed. In this module we will cover the upgrade order that should be applied when you upgrade to System Center 2012 Operations Manager.

Before the upgrade to System Center 2012 R2 Operations Manager can be performed, the Management Group must be running System Center 2012 SP1 Operations Manager.

Lessons

  • Overview of Migration and Upgrade Planning
  • Upgrading to System Center 2012 R2 Operations Manager
  • Migrating to System Center 2012 R2 Operations Manager

Lab : Upgrading to System Center 2012 R2 Operations Manager

After completing this module, students will be able to:

  • Plan an upgrade or migration to System Center 2012 R2 Operations Manager.
  • Upgrade from Operations Manager 2007 R2 to System Center 2012 R2 Operations Manager.
  • Migrate to System Center 2012 R2 Operations Manager.

Module 4: Configuring Fabric and Application Monitoring

With Operations Manager deployed and agents installed on the computers hosting the applications and services you need to monitor you must now install Management Packs to start monitoring them. Before you install Management Packs you should understand Management Pack concepts including all elements of a Management Pack.

You should also understand how to configure fabric and application monitoring in Operations Manager for both your private and public cloud environments including how Operations Manager and Virtual Machine Manager is integrated and how you integrate Operations Manager with Windows Azure.

You should also understand how to configure Management Packs to monitor applications that are running on your fabric such as Microsoft SQL Server, IIS Server and SharePoint Server. Finally, you should understand how to configure integration between Operations Manager and System Center Advisor so you can view Advisor alerts relating to your fabric components and applications.

Lessons

  • Introduction to Management Packs
  • Configuring Network Device Monitoring
  • Configuring Fabric Monitoring
  • Configuring Application Monitoring

Lab : Configuring Application and Fabric Monitoring

After completing this module, students will be able to:

  • Describe Management Packs fundamentals in Operations Manager.
  • Configure Network Device Monitoring in Operations Manager.
  • Configure Fabric monitoring in Operations Manager.
  • Configure Application monitoring in Operations Manager.

Module 5: Application Performance Monitoring

Most organizations utilize the Microsoft .NET Framework to build custom applications such as for intranet web sites. As there will not be an available Management Pack for these custom applications you should understand how Application Performance Monitoring (APM) is configured in Operations Manager. APM provides extensive monitoring for .NET and Java based applications that include both Server and Client side monitoring.

In addition to monitoring .NET applications directly through Operations Manager it is important that you understand how APM can be used with the full functionality of Visual Studio IntelliTrace Collector for gathering full application profiling traces. With System Center 2012 you can also integrate Operations Manager with Team Foundation Server. It is important that you understand how this integration is configured so that Operations Manager can be used to synchronize alerts with work items in Team Foundation Server.

Lessons

  • Application Performance Monitoring
  • Using IntelliTrace
  • Team Foundation Server Integration

Lab : Monitoring .NET Framework Applications

After completing this module, students will be able to:

  • Configure Application Performance Monitoring.
  • Configure IntelliTrace with APM to debug .NET applications.
  • Integrate Operations Manager with Team Foundation Server.

Module 6: End to End Service Monitoring

When monitoring key line of business applications, monitoring should be performed from both a data center perspective and an end-user perspective. In this module you will learn how you can create synthetic transactions to measure end-user performance.

You will also learn how to combine component monitoring with synthetic transactions in distributed application models that describe the relationship between the various components of an application. This provides a single view for identifying route cause and impact of any potential service outage.

Finally you will learn how to build rich Visio dashboards to show real-time health to external users.

Lessons

  • Management Pack Templates
  • Distributed Application Models
  • Global Service Monitor
  • Real-time Visio Dashboards

Lab : Configuring End to End Service Monitoring

After completing this module, students will be able to:

  • Configure Management Packs Templates.
  • Create Distributed Application Models.
  • Use Global Service Monitor.
  • Create Real-time Visio Dashboards.

Module 7: Scorecards, Dashboards and Reporting

Visualizing service and application health in Operations Manager is a key feature that enables at-a-glance views to be quickly and easily created. These views (or dashboards) can instantly display performance and availability for one or more applications in a single pane.

It is important that you understand how to create scorecards and dashboards in order to provide different types of users within the business with a view into how the monitored environment is performing. For example a Service Owner may just require a high-level view showing whether or not end users are able to access a service whereby an executive may just require a view showing whether a service is in or out of SLA.

Reporting is also important in understanding how the monitored environment is performing. Certain personnel may not have access to the Operations Console or receive alerts by email, but they may still require access to important information about the health and performance of key applications and services. In this scenario, reports can be used to provide an interface into collected Operations Manager data.

Service and application owners must also know that services supplied to the business are meeting service level agreements for performance and availability. Therefore, you must know how Service Level Tracking is configured and displayed in Operations Manager.

Lessons

  • Configuring and Managing Reporting in Operations Manager
  • Configuring Service Level Tracking
  • Configuring the Operations Manager SharePoint WebPart
  • Configuring Dashboards and Widgets
  • Creating Custom Dashboards

Lab : Configuring Reporting, Dashboards and Service Level Tracking

After completing this module, students will be able to:

  • Configure and Manage Reporting in Operations Manager.
  • Configure Service Level Tracking.
  • Configure Operations Manager SharePoint Web Part.
  • Configure Dashboards and Widgets.
  • Create Custom Dashboards.

Module 8: Configuring and Customizing the Console

Application support teams that use Operations Manager can do so either via a locally installed console or through the Web Console. Typically within an application support team there are a number of roles that require different levels of permissions when using the Operations Console. These range from read-only users through to advanced operators. Further to this, all of these roles must be limited to only display data about the computers and applications that the operators are responsible for. In this module you will learn how to use the inbuilt role-based security within Operations Manager to provide granular access to data, views and tasks in Operations Manager.

Application support teams typically require customized views within the console for their key applications. You will also learn how to design and provision these views to relevant support teams.

Whilst some team members may always have the console open, other teams may require a notification to be sent when an issue is detected. Operations manager uses Notifications and Notification Channels to achieve this functionality. This module describes how to configure these and send email alerts to key teams.

Finally, in order to reduce workload on the various application support teams you will learn how to configure Diagnostic and Recovery tasks in Operations Manager. This will provide a method of diagnosing and automating the remediation of issues that have been detected.

Lessons

  • Security, Scoping and User Roles
  • Creating Custom Views and Alert Resolution States
  • Configuring Notification Subscriptions
  • Creating Diagnostic and Recovery Tasks

Lab : Customizing the Operations Console

After completing this module, students will be able to:

  • Configure Security, Scoping and User Roles.
  • Create Custom Views and Alert Resolution States.
  • Configure Notification Subscriptions.
  • Create Diagnostic and Recovery Tasks.

Module 9: Management Pack Authoring

For common applications such as Microsoft SQL Server and Microsoft Exchange Server there is already a fully developed Management Pack available. You can extend the default monitoring contained in Operations Manager by creating rules, monitors and groups within the Operators console.

However it may be necessary to author a completely new management pack to monitor custom applications. To achieve this you would author the management pack in Visual studio, seal the management pack and the deploy it. The management pack should then automatically discover and monitor the components of the application.

Management Pack authoring is a detailed topic that requires a base understanding of the core concepts before proceeding. This module will cover these topics including how you create a Management Pack in both the console and Visual Studio.

Lessons

  • Management Packs Authoring Concepts
  • Authoring Management Packs by using the Operations Console
  • Authoring Management Packs by using the Visual Studio Authoring Extensions

Lab : Authoring Management Packs

After completing this module, students will be able to:

  • Describe Management Pack Authoring Concepts.
  • Author a Management Pack by using the Operations Console.
  • Author a Management Pack by using Visual Studio Authoring Extensions.

Module 10: Integrating Operations Manager with Other System Center Components

System Center 2012 R2 consists of several components that provide complete management of the IT environment. This includes the server and desktop infrastructure and the networking infrastructure that binds them. You can also manage client devices by using System Center 2012 R2.

You should integrate the System Center 2012 R2 components to provide seamless management of the IT environment from both a cloud and datacenter perspective. This provides easier and more flexible management of the cloud and datacenter environment and enables automation of many manual processes.

In this module, you will learn several key features of other System Center 2012 R2 components. This includes the benefits that are achieved when integrating Operations Manager with them.

Lessons

  • Service Manager Integration
  • Data Protection Manager Integration
  • Orchestrator Integration

Lab : Configuring System Center Integration

After completing this module, students will be able to:

  • Describe System Center 2012 R2 Service Manager and configure integration with Operations Manager
  • Describe System Center 2012 R2 Data Protection Manager and configure integration with Operations Manager.
  • Describe System Center 2012 R2 Orchestrator and configure integration with Operations Manager.

Module 11: Troubleshooting, Tuning and Disaster Recovery

Your monitoring solution must be highly available to ensure your key line-of-business applications are available and performing at optimum levels at all times. Additionally, ensuring your system is fully optimized helps prevent outages and deterioration of performance of the monitoring solution. In this module you will learn how to optimize the data warehouse to ensure the correct volume of data is kept.

As with all key systems it’s important to know where to look when troubleshooting problems. This includes using reports to understand performance and knowing which logs to investigate on both the management servers and agents.

To increase overall service availability you may also consider configuring SQL AlwaysOn for Operations Manager. This will increase the availability of the database layer.

If a component within the Operations Manager environment fails it is equally important that you understand how to recover the failed component. In this final module you will learn how to optimize, troubleshoot and perform disaster recovery in Operations Manager.

Lessons

  • Troubleshooting Operations Manager Core Components
  • Tuning Management Packs
  • Configuring SQL AlwaysOn for Operations Manager
  • Configuring Data Retention in Operations Manager
  • Disaster Recovery in Operations Manager

Lab : Troubleshooting Operations Manager

After completing this module, students will be able to:

  • Troubleshoot Operations Manager core components.
  • Tune Management Packs.
  • Configure SQL AlwaysOn for Operations Manager.
  • Configure data retention for the Data Warehouse database in Operations Manager.
  • Perform disaster recovery in Operations Manager.

target_au

The primary audience for this course is cloud and datacenter administrators who are new to System Center 2012 R2 Operations Manager and are responsible for deploying, configuring and operating it in their cloud or datacenter. The secondary audience for this course is cloud and datacenter administrators who are already familiar with Operations Manager and want to upgrade their skills to include the new features found in System Center 2012 Operations Manager, System Center 2012 SP1 Operations Manager and System Center 2012 R2 Operations Manager.


pre_req

In addition to their professional experience, students who attend this training should already have the following technical knowledge:

  • One or more years’ experience in the design and implementation of System Center Operations 2007 R2 or System Center 2012 Operations Manager is desired.
  • Working knowledge of Windows Server 2008 R2 and Windows Server 2012 R2.
  • Working knowledge of SQL Server 2008 R2 and SQL Server 2012.

titleIBNTRN 1.1 – Transforming to a Cisco Intent Based Network
days5
seo_titleIBNTRN - Transforming to a Cisco Intent Based Network Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended.
objective
  • Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components.
  • Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance.
  • Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access.
  • Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding.
  • Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network.
  • Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access.
  • Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes.
  • Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network.
  • Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless.
  • Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution
  • Describe the use cases and migration scenarios for migrating users from traditional campus to SD

outline
  • Introducing Cisco DNA Architecture
  • Cisco DNA Center Design
  • Cisco DNA Center Inventory
  • Cisco DNA Center Automation
  • Explore Cisco DNA Center and Automating Network Changes
  • Introducing Cisco Software-Defined Access
  • Deploying Cisco Software-Defined Access
  • Deploy Wired Fabric Networks with Cisco DNA Center
  • Cisco SD-Access for Wireless
  • Cisco SD-Access Extension for IoT
  • Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
  • Migrating to Cisco SD-Access
  • Cisco SD-Access Multicast
  • Integrating Cisco DNA Center
  • Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications
  • Understanding Programmable Network Infrastructure
  • Operating and Managing Cisco DNA Infrastructure
  • Test Drive Cisco DNA Center APIs

 

Lab exercises

  • Explore Cisco DNA Center and Automate Network Changes
  • Deploy Wired Fabric Networks with Cisco DNA Center
  • Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
  • Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications
  • Test Drive Cisco DNA Center APIs

target_au
  • Channel partners and resellers
  • Network administrators
  • Network engineers
  • Sales engineers
  • System engineers
  • Technical architects
  • Technical support personnel

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Understanding of network routing and switching principles equivalent to a CCNP® Enterprise level
  • Experience with Cisco Unified Wireless Network technologies
  • Experience with Cisco ISE, 802.1x, and Cisco TrustSec
  • Understanding of segmentation technologies such as VLANs and Virtual Routing and Forwarding (VRF)
  • Basic understanding of overlay technologies such as Virtual Extensible LAN (VXLAN)
  • Basic understanding of Locator ID Separation Protocol (LISP)

Recommended Cisco courses that may help you meet these prerequisites:

  • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
  • Configuring Cisco ISE Essentials for SD-Access (ISESDA)
  • Understanding Cisco Wireless Foundations (WLFNDU)

titleDNAAS 1.0 – Leveraging Cisco Intent-Based Networking DNA Assurance
days3
seo_titleDNAAS - Leveraging Cisco Intent-Based Networking DNA Assurance Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v1.0 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco® Digital Network Architecture (Cisco DNA™) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer. This course will help you:
  • Monitor, identify, and respond to changing network and wireless conditions
  • Automate manual operations to reduce the costs associated with human errors, resulting in more uptime and improved security
  • Save time by using a single dashboard to manage and automate your network

objective

After taking this course, you should be able to:

  • Explain the benefits of using Cisco DNA Center in a traditional, enterprise network
  • Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts.
  • Discuss the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance
  • Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends
  • Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause
  • Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications

outline
  • Introducing Cisco DNA Center Assurance
  • Cisco DNA Center and Intent-Based Network Management Automation
  • Cisco DNA Center System Architecture
  • Monitoring Health and Performance with Cisco DNA Center Assurance
  • Cisco DNA Center Assurance Functional Components
  • Cisco DNA Center Assurance Data Analytics and Metrics
  • Troubleshooting Issues, Observing Insights and Trends
  • Detect Issues, Insights, and Trends in the Network
  • Observe Trends, Insights, and Comparative Analysis
  • Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools
  • Review of Assurance Tools for Troubleshooting Wireless Networks
  • Use Sensor Tests to Troubleshoot Wireless Networks

Lab outline

  • Prepare Cisco DNA Center for Assurance
  • Monitor the Health of Network Devices, Clients, and Applications
  • Troubleshoot Network, Client, and Application Issues
  • Analyze Wireless Networks with Advanced Assurance Tools

 


target_au

This course is designed for network and software engineers who hold the following job roles:

  • Network administrators
  • Network operators

 


pre_req

Before taking this course, you should have the following knowledge and skills:

  • Internet web browser usability knowledge
  • Working knowledge of TCP/IP networking
  • Familiarity with network management concepts such as Simple Network Management Protocol (SNMP), Syslog, and NetFlow

The following Cisco courses can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)

 


titleCBRCOR 1.0 – Performing CyberOps Using Cisco Security Technologies
days5
seo_titleCBRCOR - Performing CyberOps Using Cisco Security Technologies
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity. This course also earns you 30 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam. This course will help you:
  • Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
  • Configure common tools and platforms used by security operation teams via practical application
  • Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
  • Prepare for the 350-201 CBRCOR core exam
  • Earn 30 CE credits toward recertification
What to expect in the exam 350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR) is a 120-minute exam associated with the Cisco CyberOps Professional Certification. The multiple-choice format tests knowledge of core cybersecurity operations including cybersecurity fundamentals, techniques, policies, processes, and automation. The exam will test for knowledge in the following areas:
  • Monitoring for cyberattacks
  • Analyzing high volume of data using automation tools and platforms—both open source and commercial
  • Accurately identifying the nature of attack and formulate a mitigation plan
  • Scenario-based questions; for example, using a screenshot of output from a tool, you may be asked to interpret portions of output and establish conclusions

objective

After taking this course, you should be able to:

  • Describe the types of service coverage within a SOC and operational responsibilities associated with each.
  • Compare security operations considerations of cloud platforms.
  • Describe the general methodologies of SOC platforms development, management, and automation.
  • Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
  • Describe Zero Trust and associated approaches, as part of asset controls and protections.
  • Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
  • Use different types of core security technology platforms for security monitoring, investigation, and response.
  • Describe the DevOps and SecDevOps processes.
  • Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
  • Describe API authentication mechanisms.
  • Analyze the approach and strategies of threat detection, during monitoring, investigation, and response.
  • Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
  • Interpret the sequence of events during an attack based on analysis of traffic patterns.
  • Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
  • Analyze anomalous user and entity behavior (UEBA).
  • Perform proactive threat hunting following best practices.

outline
  • Understanding Risk Management and SOC Operations
  • Understanding Analytical Processes and Playbooks
  • Investigating Packet Captures, Logs, and Traffic Analysis
  • Investigating Endpoint and Appliance Logs
  • Understanding Cloud Service Model Security Responsibilities
  • Understanding Enterprise Environment Assets
  • Implementing Threat Tuning
  • Threat Research and Threat Intelligence Practices
  • Understanding APIs
  • Understanding SOC Development and Deployment Models
  • Performing Security Analytics and Reports in a SOC
  • Malware Forensics Basics
  • Threat Hunting Basics
  • Performing Incident Investigation and Response

Lab outline

  • Explore Cisco SecureX Orchestration
  • Explore Splunk Phantom Playbooks
  • Examine Cisco Firepower Packet Captures and PCAP Analysis
  • Validate an Attack and Determine the Incident Response
  • Submit a Malicious File to Cisco Threat Grid for Analysis
  • Endpoint-Based Attack Scenario Referencing MITRE ATTACK
  • Evaluate Assets in a Typical Enterprise Environment
  • Explore Cisco Firepower NGFW Access Control Policy and Snort Rules
  • Investigate IOCs from Cisco Talos Blog Using Cisco SecureX
  • Explore the ThreatConnect Threat Intelligence Platform
  • Track the TTPs of a Successful Attack Using a TIP
  • Query Cisco Umbrella Using Postman API Client
  • Fix a Python API Script
  • Create Bash Basic Scripts
  • Reverse Engineer Malware
  • Perform Threat Hunting
  • Conduct an Incident Response

 


target_au

Although there are no mandatory prerequisites, the course is particularly suited for the following audiences:

  • Cybersecurity engineer
  • Cybersecurity investigator
  • Incident manager
  • Incident responder
  • Network engineer
  • SOC analysts currently functioning at entry level with a minimum of 1 year of experience

 


pre_req

Although there are no mandatory prerequisites, to fully benefit from this course, you should have the following knowledge:

  • Familiarity with UNIX/Linux shells (bash, csh) and shell commands
  • Familiarity with the Splunk search and navigation functions
  • Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar.

Recommended Cisco offerings that may help you prepare for this course:

  • Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
  • Implementing and Administering Cisco Solutions (CCNA)

Recommended third-party resources:

  • Splunk Fundamentals 1
  • Blue Team Handbook: Incident Response Edition by Don Murdoch
  • Threat Modeling- Designing for Security y Adam Shostack
  • Red Team Field Manual by Ben Clark
  • Blue Team Field Manual by Alan J White
  • Purple Team Field Manual by Tim Bryant
  • Applied Network Security and Monitoring by Chris Sanders and Jason Smith

 


titleSSFRULES v2.1 – Securing Cisco Networks with Snort Rule Writing Best Practices
days3
seo_titleSSFRULES - Securing Cisco Networks with Snort Rule Writing Best Practices Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. This course will help you:
  • Gain an understanding of characteristics of a typical Snort rule development environment
  • Gain hands-on practices on creating rules for Snort
  • Gain knowledge in Snort rule development, Snort rule language, standard and advanced rule options

objective

After taking this course, you should be able to:

  • Describe the Snort rule development process
  • Describe the Snort basic rule syntax and usage
  • Describe how traffic is processed by Snort
  • Describe several advanced rule options used by Snort
  • Describe OpenAppID features and functionality
  • Describe how to monitor the performance of Snort and how to tune rules

outline
  • Introduction to Snort Rule Development
  • Snort Rule Syntax and Usage
  • Traffic Flow Through Snort Rules
  • Advanced Rule Options
  • OpenAppID Detection
  • Tuning Snort

Lab outline

  • Connecting to the Lab Environment
  • Introducing Snort Rule Development
  • Basic Rule Syntax and Usage
  • Advanced Rule Options
  • OpenAppID
  • Tuning Snort

target_au

This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes:

  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel using open source IDS and IPS
  • Channel partners and resellers

pre_req

To fully benefit from this course, you should have:

  • Basic understanding of networking and network protocols
  • Basic knowledge of Linux command-line utilities
  • Basic knowledge of text editing utilities commonly found in Linux
  • Basic knowledge of network security concepts
  • Basic knowledge of a Snort-based IDS/IPS system

titleSSFSNORT v2.1 – Securing Cisco Networks with Open Source Snort
days4
seo_titleSSFSNORT - Securing Cisco Networks with Open Source Snort Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more. This course will help you:
  • Learn how to implement Snort, an open-source, rule-based, intrusion detection and prevention system
  • Gain leading-edge skills for high-demand responsibilities focused on security

objective

After taking this course, you should be able to:

  • Describe Snort technology and identify resources available for maintaining a Snort deployment
  • Install Snort on a Linux-based operating system
  • Describe the Snort operation modes and their command-line options
  • Describe the Snort intrusion detection output options
  • Download and deploy a new rule set to Snort
  • Describe and configure the snort.conf file
  • Configure Snort for inline operation and configure the inline-only features
  • Describe the Snort basic rule syntax and usage
  • Describe how traffic is processed by the Snort engine
  • Describe several advanced rule options used by Snort
  • Describe OpenAppID features and functionality
  • Describe how to monitor Snort performance and how to tune rules

outline
  • Introduction to Snort Technology
  • Snort Installation
  • Snort Operation
  • Snort Intrusion Detection Output
  • Rule Management
  • Snort Configuration
  • Inline Operation and Configuration
  • Snort Rule Syntax and Usage
  • Traffic Flow Through Snort Rules
  • Advanced Rule Options
  • OpenAppID Detection
  • Tuning Snort

Lab outline

  • Connecting to the Lab Environment
  • Snort Installation
  • Snort Operation
  • Snort Intrusion Detection Output
  • Pulled Pork Installation
  • Configuring Variables
  • Reviewing Preprocessor Configurations
  • Inline Operations
  • Basic Rule Syntax and Usage
  • Advanced Rule Options
  • OpenAppID
  • Tuning Snort

target_au

This course is for technical professionals who need to know how to deploy open source, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), and how to write Snort rules.

  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel
  • Channel partners and resellers

pre_req

To fully benefit from this course, you should have:

  • Technical understanding of TCP/IP networking and network architecture
  • Proficiency with Linux and UNIX text editing tools (vi editor is suggested but not required)

titleSSFAMP v6.0 – Protecting Against Malware Threats with Cisco AMP for Endpoints
days3
seo_titleSSFAMP - Protecting Against Malware Threats with Cisco AMP for Endpoints Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 course shows you how to deploy and use Cisco® AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. This class will help you:
  • Learn how to deploy and manage Cisco AMP for Endpoints
  • Succeed in today’s high-demand security operations roles

objective

After taking this course, you should be able to:

  • Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP)
  • Recognize the key features and concepts of the AMP for Endpoints product
  • Navigate the AMP for Endpoints console interface and perform first-use setup tasks
  • Identify and use the primary analysis features of AMP for Endpoints
  • Use the AMP for Endpoints tools to analyze a compromised host
  • Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports
  • Configure and customize AMP for Endpoints to perform malware detection
  • Create and configure a policy for AMP-protected endpoints
  • Plan, deploy, and troubleshoot an AMP for Endpoints installation
  • Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors.
  • Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use
  • Describe all the features of the Accounts menu for both public and private cloud installations

outline
  • Introducing to Cisco AMP Technologies
  • Introducing AMP for Endpoints Overview and Architecture
  • Navigating the Console Interface
  • Using Cisco AMP for Endpoints
  • Identifying Attacks
  • Analyzing Malware
  • Managing Outbreak Control
  • Creating Endpoint Policies
  • Working with AMP for Endpoint Groups
  • Using Orbital for Endpoint Visibility
  • Introducing AMP REST API
  • Navigating Accounts

Lab outline

  • Amp Account Self-Registration
  • Accessing AMP for Endpoints
  • Attack Scenario
  • Analysis Tools and Reporting
  • Outbreak Control
  • Endpoint Policies
  • Groups and Deployment
  • Testing Your Configuration
  • Endpoint Visibility Using Orbital
  • REST API
  • Endpoint Isolation Using Cisco AMP API
  • User Accounts

target_au
  • Cisco integrators, resellers, and partners
  • Network administrators
  • Security administrators
  • Security consultants
  • Systems engineers
  • Technical support personnel

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Technical understanding of TCP/IP networking and network architecture
  • Technical understanding of security concepts and protocols

The recommended Cisco offering may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA)

titleINFND 1.0 – Understanding Cisco Industrial IoT Networking Foundation
days5
seo_titleINFND - Understanding Cisco Industrial IoT Networking Foundation Course Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCisco

techonogyEnterprise Networking
overviewThe Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 course gives you an overview of the protocols, applications, and network infrastructure you need to support and manage Industrial Internet of Things (IIoT) solutions. You will learn about IIoT industry verticals and how different protocols are used within them. The course also covers configuring and verifying the protocols on Cisco® IIoT networking devices. This course will help you:
  • Understand what IIoT is, IIoT market verticals, and the related standards
  • Understand the protocols, applications, and network infrastructure needed to support IIoT solutions
  • Identify Cisco IIoT networking devices and how they are different from other devices
  • Configure and verify IIoT networking devices to support IIoT solutions

objective
  • Define what IIoT is and identify IIoT architectures.
  • Identify IIoT market verticals, and their motivations and requirements.
  • Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them.
  • Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure.
  • Describe wireless protocols used in IIoT environments, including architectures and devices used.
  • Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments.
  • Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration.
  • Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations.
  • Explore field WAN technologies and how they are used in IIoT environments.
  • Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks.
  • Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments.
  • Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments.
  • Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments.
  • Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments.
  • Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms.
  • Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments.

outline
  • Course Introduction
  • Defining Industrial Internet of Things
  • Examining Common IIoT Verticals
  • Examining Cisco IIoT Networking Devices
  • Examining and Configuring Industrial Communication Protocols
  • Describing Wireless IIoT Protocols
  • Explaining and Configuring TCP/IP Protocols, Addressing, and Segmentation
  • Examining Network Services and Administration
  • Examining and Configuring Wireless Core LAN Technologies
  • Describing Field WAN Technologies
  • Examining and Configuring Transportation of Legacy Protocols
  • Describing, Configuring, and Verifying Quality of Service (QoS) for IIoT Protocols
  • Examining and Verifying MPLS and IIoT
  • Configuring and Explaining VPN Technology and IIoT
  • Describing DWDM
  • Configuring and Defining Layer 1 and Layer 2 High Availability Technologies
  • Defining and Configuring Layer 3 High Availability Technologies

target_au
  • Operational Technology (OT) Engineers
  • IT engineers
  • Generalists, including managers, project leads, and solutions and business architects

pre_req

  

The knowledge and skills that students are expected to have before attending this course are:

  • CCNA® Routing and Switching (R&S) (or equivalent knowledge)

titleAWS Cloud Practitioner Essentials
days1
seo_titleAWS Cloud Practitioner Essentials Course Training
seo_dec
seo_tkey
categoryaws-cloud
vendorAWS

techonogyCloud Computing
overviewThis course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles. You will learn about AWS Cloud concepts, AWS services, security, architecture, pricing, and support to build your AWS Cloud knowledge. This course also helps you prepare for the AWS Certified Cloud Practitioner exam.
objective
  • Differentiate between on-premises, hybrid-cloud, and all-in cloud
  • Describe the basic global infrastructure of the AWS Cloud
  • Explain the six benefits of the AWS Cloud
  • Describe and provide an example of the core AWS services, including compute, network, databases, and storage
  • Identify an appropriate solution using AWS Cloud services with various use cases
  • Describe the AWS Well-Architected Framework
  • Explain the shared responsibility model
  • Describe the core security services within the AWS Cloud
  • Describe the basics of AWS Cloud migration
  • Articulate the financial benefits of the AWS Cloud for an organization’s cost management
  • Define the core billing, account management, and pricing models
  • Explain how to use pricing tools to make cost-effective choices for AWS services

outline

Module 1: Introduction to Amazon Web Services

  • Summarize the benefits of AWS
  • Describe differences between on-demand delivery and cloud deployments
  • Summarize the pay-as-you-go pricing model

 

Module 2: Compute in the Cloud

  • Describe the benefits of Amazon Elastic Compute Cloud (Amazon EC2) at a basic level
  • Identify the different Amazon EC2 instance types
  • Differentiate between the various billing options for Amazon EC2
  • Describe the benefits of Amazon EC2 Auto Scaling
  • Summarize the benefits of Elastic Load Balancing
  • Give an example of the uses for Elastic Load Balancing
  • Summarize the differences between Amazon Simple Notification Service (Amazon SNS) and Amazon Simple Queue Services (Amazon SQS)
  • Summarize additional AWS compute options

 

Module 3: Global Infrastructure and Reliability

  • Summarize the benefits of the AWS Global Infrastructure
  • Describe the basic concept of Availability Zones
  • Describe the benefits of Amazon CloudFront and Edge locations
  • Compare different methods for provisioning AWS services

 

Module 4: Networking

  • Describe the basic concepts of networking
  • Describe the difference between public and private networking resources
  • Explain a virtual private gateway using a real life scenario
  • Explain a virtual private network (VPN) using a real life scenario
  • Describe the benefit of AWS Direct Connect
  • Describe the benefit of hybrid deployments
  • Describe the layers of security used in an IT strategy
  • Describe which services are used to interact with the AWS global network

 

Module 5: Storage and Databases

  • Summarize the basic concept of storage and databases
  • Describe benefits of Amazon Elastic Block Store (Amazon EBS)
  • Describe benefits of Amazon Simple Storage Service (Amazon S3)
  • Describe the benefits of Amazon Elastic File System (Amazon EFS)
  • Summarize various storage solutions
  • Describe the benefits of Amazon Relational Database Service (Amazon RDS)
  • Describe the benefits of Amazon DynamoDB
  • Summarize various database services

 

Module 6: Security

  • Explain the benefits of the shared responsibility model
  • Describe multi-factor authentication (MFA)
  • Differentiate between the AWS Identity and Access Management (IAM) security levels
  • Describe security policies at a basic level
  • Explain the benefits of AWS Organizations
  • Summarize the benefits of compliance with AWS
  • Explain primary AWS security services at a basic level

 

Module 7: Monitoring and Analytics

  • Summarize approaches to monitoring your AWS environment
  • Describe the benefits of Amazon CloudWatch
  • Describe the benefits of AWS CloudTrail
  • Describe the benefits of AWS Trusted Advisor

 

Module 8: Pricing and Support

  • Understand AWS pricing and support models
  • Describe the AWS Free Tier
  • Describe key benefits of AWS Organizations and consolidated billing
  • Explain the benefits of AWS Budgets
  • Explain the benefits of AWS Cost Explorer
  • Explain the primary benefits of the AWS Pricing Calculator
  • Distinguish between the various AWS Support Plans
  • Describe the benefits of AWS Marketplace

 

Module 9: Migration and Innovation

  • Understand migration and innovation in the AWS Cloud
  • Summarize the AWS Cloud Adoption Framework (AWS CAF)
  • Summarize six key factors of a cloud migration strategy
  • Describe the benefits of various AWS data migration solutions, such as AWS Snowcone, AWS Snowball, and AWS Snowmobile
  • Summarize the broad scope of innovative solutions that AWS offers
  • Summarize the five pillars of the AWS Well-Architected Framework

 

Module 10: AWS Certified Cloud Practitioner Basics

  • Determine resources for preparing for the AWS Certified Cloud Practitioner examination
  • Describe benefits of becoming AWS Certified

target_au
  • Sales
  • Legal
  • Marketing
  • Business analysts
  • Project managers
  • AWS Academy students
  • Other IT-related professionals

pre_req
  • General IT business knowledge
  • General IT technical knowledge

titleMcAfee: ePO & Endpoint Security Administration
days3
seo_titleMcAfee: ePO & Endpoint Security Administration Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorMcAfee

techonogySecurity
overviewThe 3 Days McAfee ePO & Endpoint Security Administration Course has been designed to provide new and existing ePO administrators with a thorough introduction to the McAfee ePO Management Console. Keeping up-to-date with the latest software versions is necessary to maintain the productivity and efficiency of an IT department. It also enables you to get the most from your security investment. This IT Security training course will enable you to maximise the performance of your solution.
objective
  • Understand the use of each component
  • Configure the ePO Management Console from a fresh install experience
  • Install, Configure and deploy Endpoint Security
  • Perform day to day administration with confidence
  • Leverage inter-component functionality and automation to increase security and decrease workload

outline
  • Introduction to anti-malware defence procedures and the core competencies of the McAfee suite of products managed by ePO 5.x
  • Installation of the software, basic configuration and management of clients
  • Automating the full software installation including applications, signatures, product upgrades and patches using repositories and the Software Manager
  • Product policy configuration including the McAfee Agent and Endpoint Security, and the assignment of policies by group, system and tag
  • An introduction to the system tree and automating Active Directory synchronisation
  • Configuration of the Deployment tool and Client Task Catalogue to deploy and update software followed by an introduction to the automation of these processes
  • An introduction to Agent Handlers and the management of systems not connected to your network
  • An introduction to custom notifications and alerts followed by configuration of automated tasks and responses
  • Advanced features and techniques including system compliance, creating and automating queries and general ePO maintenance

target_au
pre_req
titleU4180S – HPE NonStop SQL/MP Database Management
days5
seo_titleU4180S - HPE NonStop SQL/MP Database Management Course Training
seo_dec
seo_tkey
categorydata-center-virtualization
vendorHP

techonogyDatacenter & Virtualization
overviewThis course introduces the tasks and tools used by a database administrator or system manager who is responsible for the daily management and protection of NonStop SQL/MP database, programs that access the database, and other associated database elements. Hands-on labs give you practical experience in performing management tasks against a database with applications.
objective
  • Review of the NonStop SQL/MP environment
  • SQL/MP installation and version management
  • Creating SQL/MP database base objects
  • Loading, copying, appending, and reorganizing data
  • DataLoader/MP
  • Updating SQL/MP statistics
  • Managing SQL/MP embedded programs
  • Altering SQL/MP database objects
  • Moving SQL/MP database objects
  • Removing SQL/MP database objects
  • Managing database protection and recovery using NonStop
  • Transaction Manager/MP (TM/MP)
  • Backing up and restoring SQL/MP database objects
  • Database security management
  • Tools for monitoring performance
  • Enhancing DP2 performance
  • Managing sorts
  • Controlling SQL/MP processes

outline

Module 1: NonStop SQL/MP Environment

  • Processes, structure, and objects of the NonStop SQL/MP environment
  • Locating the SQL/MP system catalog
  • Determining the number and location of SQL/MP catalogs on a system
  • Identifying and locating the objects registered in an SQL/MP database
  • Related products and additional tables they can create in the SQL/MP system catalog

Lab Exercise (30 minutes)

NonStop SQL/MP Environment

  • Locate the system catalog
  • Locate all user catalogs on a system
  • Identify the objects in the PERSNL database and their dependent objects
  • Identify what SQL/MP processes you have running for your session
  • Create a user catalog

 

Module 2: installation and Version Management

  • Identifying the system requirements for NonStop SQL/MP
  • Installation and initialization process of SQL/MP software
  • Version management for SQL/MP objects
  • Managing the migration of SQL/MP from one NonStop Kernel operating system release to another
  • Compatibility of SQL/MP software versions within a network

Lab Exercise (30 minutes)

Installation and Version Management

  • Identify the versions of NonStop SQL/MP, the catalog, and several objects on your system

 

Module 3: Creating NonStop SQL/MP Database Objects

  • Planning and creating NonStop SQL/MP database objects
  • Performance considerations and guidelines for creating SQL/MP database objects
  • Query metadata for the SQL/MP objects that have been created

Lab Exercise (1.5 hours)

Creating SQL/MP Database Objects

 

Module 4: Copying, Loading, Appending, Reorganizing, and Converting Data

  • Converting an Enscribe database to a NonStop SQL/MP database
  • Use the COPY utility to load, extract, or display data
  • Using the LOAD or APPEND utilities to load data
  • Re-organizing data in key-sequenced tables and indexes
  • Archiving data from the database
  • Checking the referential integrity of the database

Lab Exercise (1 hour)

Using Copy, Load and Append Utilities

Lab Exercise (40 minutes)

Reorganizing Data

Lab Exercise (40 minutes)

Converting an Enscribe Database to an SQL/MP Database

 

Module 5: DataLoader/MP

  • How DataLoader/MP can be used to load and maintain database data
  • Components of DataLoader/MP (main logic, library routines, and user exits)
  • Building customized DataLoader/MP processes
  • Running DataLoader/MP processes

 

Module 6: Updating NonStop SQL/MP Statistics

  • Creating DataLoader/MP processes to load the data given a data loading scenario
  • NonStop SQL/MP statistics
  • Statistics for partitioned tables
  • How the optimizer uses statistics to calculate selectivity for predicates
  • How to update statistics
  • When to update statistics
  • Testing the impact of updating statistics in a test environment or the production environment
  • Querying the catalog for statistical information
  • Copying the production system statistics to the development system
  • Statistics performance degradation

Lab Exercise (30 minutes)

Updating SQL/MP Statistics

 

Module 7: Managing NonStop SQL/MP Embedded Programs

  • Explicit compilation and automatic recompilation of NonStop SQL/MP programs
  • SQL/MP program run-time environment
  • Compiling COBOL and C embedded SQL programs in the Guardian and Open System Services (OSS) environments using native and non-native compilers
  • SQL/MP compiler options
  • Creating, implementing, and testing a compilation strategy for an SQL/MP program
  • Determining what actions make an SQL/MP program invalid
  • Detecting invalid SQL/MP programs
  • Detecting auto-recompiling SQL/MP programs

Lab Exercise (45 minutes)

Managing SQL/MP Embedded Programs

  • Plan and implement different compiler options using two scenarios

 

Module 8: Altering NonStop SQL/MP Database Objects

  • Altering NonStop SQL/MP objects and the impact to the database environment
  • Methods for partitioning tables and indexes
  • SQL/MP Format 2 Enabled objects and Format 1 and Format 2 partitions

Lab Exercise (45 minutes)
Altering SQL/MP Database Objects

 

Module 9: Moving NonStop SQL/MP Database Objects

  • Process for moving NonStop SQL/MP objects
  • Methods to move SQL/MP objects (Re-create and Load, ALTER MOVE, DUP, Backup and Restore)

Lab Exercise 9.1 (30 minutes)
Moving SQL/MP Database Objects

Lab Exercise 9.2 (30 minutes)
Moving SQL/MP Embedded Programs

 

Module 10: Removing NonStop SQL/MP Database Objects

  • Removing NonStop SQL/MP objects
  • Removing objects using the DROP command and PURGE and CLEANUP utilities
  • Removing data from a table or a partition of a table using PURGEDATA utility
  • Dropping a partition of a table using ALTER TABLE … DROP PARTITION
  • Dropping a partition of an index using ALTER INDEX … DROP PARTITION
  • TACL GOAWAY command

Lab Exercise (1 hour, 15 minutes)
Removing SQL/MP Database Objects

 

Module 11: Managing Database Protection and Recovery

  • NonStop Transaction Manager/MP (TM/MP) methods of protection and recovery
  • TM/MP considerations for NonStop SQL/MP objects
  • Protecting SQL/MP database with TM/MP
  • Online dump strategy
  • Recovery strategy
  • TM/MP recovery of SQL/MP objects and their catalog
  • TM/MP recovery of SQL/MP objects without recovering their catalog
  • Using licensed copy of SQLCI2 to insert, update, or delete metadata

 

Module 12: Backing up and Restoring NonStop SQL/MP Database Objects

  • File-mode BACKUP and RESTORE options that can be used with NonStop SQL/MP objects
  • Developing protection strategies with the BACKUP and RESTORE utilities for SQL/MP objects
  • Volume-mode options of the BACKUP and RESTORE utilities
  • Using the tape simulator program to implement BACKUP and RESTORE options
  • Possible causes for objects becoming unusable
  • Locating unusable objects
  • Removing unusable objects
  • Identifying the appropriate tools to make objects usable
  • Using the simulator program to implement Backup and Restore options

Lab Exercise (Optional, 45 minutes)
Backing Up and Restoring SQL/MP Database Objects

 

Module 13: Managing NonStop SQL/MP Database Security

  • Process for securing the Nonstop SQL/MP environment
  • Authorization requirements for SQL/MP operations
  • SQL/MP security commands and utilities
  • SQL/MP protection views
  • NonStop Kernel security and the Safeguard product security characteristics
  • Security for the production and development environment

Lab Exercise (1 hour)
Managing SQL/MP Database Security

 

Module 14: Tools for Monitoring Performance

  • Performance tools: SQLCI, Measure product, Tandem Performance Data Collector (TPDC), and basic guidelines for monitoring performance

 

Module 15: Disk process (DP2) Performance Enhancements

  • Methods to enhance the performance of the disk process

 

Module 16: Managing Sorts

  • Sorts available to NonStop SQL/MP
  • Managing sort processes to control system resources
  • Configuring serial and parallel sort operations

 

Module 17: Controlling NonStop SQL/MP Processes

  • Controlling the impact of NonStop SQL/MP processes on performance

target_au
  • Database administrators
  • System managers
  • People responsible for the availability of NonStop SQL/MP databases and applications

pre_req
  • Concepts and Facilities course
  • NonStop SQL/MP Essentials course
  • Solid understanding of systems, application areas, and daily operations for both systems and applications
  • Understanding of the database environment at your business

titleSystem Operator for IBM i
days4
seo_titleSystem Operator for IBM i Course Training
seo_dec
seo_tkey
categoryibm-system
vendorIBM

techonogyEnterprise Networking
overviewThis introductory course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i. Focus is given to using the GUI (IBM i Access Client Solutions and IBM Navigator for i) as well as 5250 emulation sessions to perform tasks including job control, monitoring, sending messages, managing systems devices, and more. Hands-on exercises reinforce the lecture topics and prepare the student to successfully operate a Power System with IBM i.
objective
  • Use the online help and references
  • Send, display, and reply to messages
  • Monitor and control jobs, devices, and job and output queues
  • Start and stop the system
  • Create and change user profiles
  • Use authorization lists and group profiles
  • Manage system configuration  –> this could be the replacement for Manage system devices, user display stations, and printers
  • Save and restore objects, libraries, and the system
  • Monitor job and history logs
  • Diagnose a system problem
  • Order, receive, and apply PTFs
  • Perform all of these functions using a 5250 emulation session as well as IBM i Access Client Solutions and IBM Navigator for i

outline

Day 1

  •  Unit 1: Power Systems and IBM i concepts and overview
  •  Unit 2: Reference material and support
  •  Unit 3: Overview of IBM i Access Client Solutions
  •  Exercise 1: Using the keyboard and system displays
  •  Unit 4: Overview of 5250 emulation and help
  •  Exercise 2: Overview of IBM i Access Client Solutions
  •  Unit 5: Overview of IBM Navigator for i
  •  Exercise 3: Overview of IBM Navigator for i
  •  Unit 6: Messaging concepts
  •  Unit 7: Messaging with 5250 emulation
  •  Exercise 4: Messages with 5250 emulation
  •  Unit 8: Messaging with IBM Navigator for i
  •  Exercise 5: Messaging with IBM Navigator for i
  •  Unit 9: CL command concepts
  •  Unit 10: CL commands with 5250 emulation
  •  Unit 11: Concepts: Object, library, and the IFS

 

Day 2

  • Unit 12: Object management with 5250 emulation
  • Exercise 6: Object management with 5250 emulation
  • Unit 13: Object management with IBM Navigator for i
  • Exercise 7: Object management with IBM Navigator for i
  • Unit 14: Introduction to work management
  • Unit 15: Work management with 5250 emulation
  • Exercise 8: Work management with 5250 emulation
  • Exercise 9: Work management with IBM Navigator for i (Optional)
  • Unit 16: Job control with 5250 emulation
  • Exercise 10: Job control with 5250 emulation
  • Unit 17: Job control with IBM Navigator for i
  • Exercise 11: Job control with IBM Navigator for i (Optional)
  • Unit 18: Print concepts
  • Unit 19: Print control with 5250 emulation
  • Exercise 12: Print control with 5250 emulation
  • Unit 20: IBM i Access Client Solutions printer output
  • Exercise 13: Print with IBM i Access Client Solutions
  • Unit 21: Print control with IBM Navigator for i
  • Exercise 14: Print control with IBM Navigator for i (Optional)

 

Day 3

  • Exercise 15 Creating your own subsystem description
  • Exercise 16 Special work management functions
  • Unit 22: Starting and stopping the system
  • Exercise 17: System values with 5250 emulation
  • Exercise 18: System values with IBM Navigator for i (Optional)
  • Unit 23: System security concepts
  • Unit 24: System security with 5250 emulation
  • Exercise 19: System security with 5250 emulation
  • Unit 25: System security with IBM Navigator for i
  • Exercise 20: System security with IBM Navigator for i (Optional)
  • Unit 26: System configuration overview
  • Unit 27: Configuration with 5250 emulation
  • Exercise 21: Managing your system configuration
  • Unit 28: Configuration with IBM Navigator for i
  • Unit 29: Control language programming
  • Exercise 22: Write a basic CL program

 

Day 4

  • Unit 30: IBM DB2 for i introduction
  • Unit 31: Save concepts
  • Unit 32: Save with 5250 emulation
  • Exercise 23: Save with 5250 emulation
  • Unit 33: Save with IBM Navigator for i
  • Unit 34: Restore concepts and overview
  • Exercise 24: Restore with 5250 emulation
  • Unit 35: Problem determination with 5250 emulation
  • Exercise 25: Problem determination
  • Unit 36: Overview of the PTF process
  • Unit 37: PTFs with 5250 emulation
  • Unit 38: Storage management
  • Unit 39: Introduction to system tuning
  • Unit 40: Class summary

target_au
  • This course is intended for the person who has responsibility for daily system operations.
  • It is not intended for technical audiences who are seeking an in-depth look at how the Power System with IBM i works. This audience should instead attend the IBM i Technical Introduction (OL4AG).

pre_req
  • There are no prerequisites for this course.

titleFortiSwitch
days3
seo_titleFortiSwitch Course Training | Fortinet NSE 6 Certification
seo_decIn this course, you will learn about FortiSwitch when managed by FortiGate using FortiLink.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this three days course, you will learn about FortiSwitch when managed by FortiGate using FortiLink. You will also learn about the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly or from FortiSwitch Cloud. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features available on FortiSwitch. In interactive labs, you will explore the administrative tasks necessary to deploy, provision, and manage FortiSwitch. You will also explore advanced deployment topologies, such as FortiGate full mesh high availability (HA) with MCLAG, to showcase the full potential of FortiSwitch. Product Versions:
  • FortiGate 6.4.6
  • FortiSwitch 6.4.6
  • FortiAnalyzer 6.4.5
  • FortiManager 6.4.5
  • FortiAuthenticator 6.1.1

objective

After completing this course, candidates should be able to:

  • Explore the FortiSwitch portfolio and identify the supported management modes
  • Describe and deploy FortiSwitch in managed switch mode (FortiLink mode)
  • Understand Ethernet switching, VLANs, link aggregation (LAG), MCLAG, and Layer 2 discovery
  • Identify the most common FortiSwitch topologies when deploying FortiSwitch in managed switch mode
  • Understand Spanning Tree Protocol (STP), Rapid Spanning Tree protocol (RSTP), and Multiple Spanning Tree protocol (MSTP) operation and configuration, as well as other loop protection features
  • Describe and configure Layer 2 security to filter unwanted traffic and perform antispoofing
  • Configure Layer 2 authentication using 802.1.X, and leverage 802.1X to assign dynamic VLANs to endpoints
  • Implement advanced features to increase port density, control network access, forward multicast traffic more effectively, and quarantine compromised devices
  • Prioritize traffic on FortiSwitch by using QoS marking, queuing, and rate limiting features
  • Simplify endpoint deployment by using Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED)
  • Share FortiSwitch ports across different VDOMs using multi-tenancy
  • Monitor FortiSwitch using SNMP, sFlow, and flow sampling
  • Describe the most useful troubleshooting tools available on FortiSwitch

outline
  1. Managed Switch
  2. Switch Fundamentals
  3. Layer 2 Design
  4. Layer 2 Security
  5. Advanced Features
  6. Monitoring
  7. Standalone Switch
  8. Troubleshooting

target_au

This course is intended for networking and security professionals involved in the management, configuration, administration, and monitoring of FortiSwitch devices used to provide secure network access to endpoints.


pre_req
  • Basic knowledge in networking
  • Understanding of layer 2 switching
  • Understanding of the topics covered in the following courses:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure

titleFortiSOAR Design and Development
days3
seo_titleFortiSOAR Course Training | Fortinet NSE 7 Certification
seo_decIn this course, you will learn to create your own dashboards using various built-in widgets, and install widgets from the widget library.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overview
In this course, you will learn how to use FortiSOAR to design simple to complex playbooks. You will learn to create your own dashboards using various built-in widgets, and install widgets from the widget library. You will review the dashboards that are built-in to FortiSOAR and learn to edit them according to your requirements. In practical labs, you will explore the role of FortiSOAR in mitigating malicious indicators and creating interactive dashboards to display relevant information about alerts and incidents. You will design a playbook to extract indicators from a phishing email alert. You will also design a playbook to enrich those indicators using connectors to query threat intelligence platforms, such as FortiGuard. You will also design a playbook to mitigate malicious indicators by blocking them on FortiGate. You will configure a FortiSIEM connector to ingest incidents into FortiSOAR. Product Versions:
  • FortiSOAR 6.4.3
  • FortiSIEM 6.1.1
  • FortiGate 6.4.4
  • FortiMail 6.4.3

objective

After completing this course, you should be able to:

  • Identify the role of FortiSOAR in a SOC environment
  • Plan a FortiSOAR deployment
  • Manage incidents and alerts in a SOC environment
  • Explore, create, and customize dashboards
  • Explore the structure of a template
  • Create, customize, and analyze various dashboard widgets
  • Create, customize, and publish modules
  • Search for records and filter search records
  • Analyze field-type options in the field editor
  • Categorize playbook trigger types
  • Build a user prompt from a manual trigger step
  • Understand the basics of Jinja syntax
  • Define variables and dictionaries in Jinja
  • Configure step utilities within a playbook step
  • Configure various core steps of a playbook
  • Use the advanced editor within a playbook step
  • Analyze the details of an approval record
  • Review the connector store
  • Understand connector configuration
  • Configure different modes of data ingestion
  • Configure data ingestion from FortiSIEM
  • Install and configure connectors and apply them to a playbook
  • Configure various utility steps
  • Configure referenced playbooks
  • Configure and use dynamic variables and values
  • Use expressions to customize playbook input and outputs
  • Use common Jinja filters and functions
  • Use the json_query filter to extract data from complex data structures
  • Configure for loop functions and if statements

outline
  1. Introduction to FortiSOAR
  2. Dashboard Templates and Widgets
  3. Module Templates and Widgets
  4. Application Editor
  5. Dynamic Variables and Values
  6. Jinja Filters, Functions, and Conditions
  7. Introduction to Playbooks
  8. Playbook Core Steps
  9. Playbook Evaluate Steps
  10. Playbook Connectors, Data Ingestion, and Execution Steps

target_au

This course is intended for cybersecurity professionals responsible for planning, designing, and customizing FortiSOAR deployments, integrating FortiSOAR with FortiGate, FortiSIEM, and FortiMail, and FortiSOAR playbook design and development.


pre_req

Familiarity with Python programming, and the Jinja2 templating language for Python is required to benefit from this course.

Familiarity with the following Fortinet products is beneficial:

  • FortiGate
  • FortiSIEM
  • FortiMail

titleOT Security
days3
seo_titleOT Security Course Training | Fortinet NSE 7 Certification
seo_dec
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overview
In this course, you will learn how to secure your OT infrastructure using Fortinet solutions. You will learn how to design, deploy, administrate, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of how to design, implement, and operate an OT security solution based on Fortinet products. Product Versions:
  • FortiOS 6.4.3
  • FortiAnalyzer 6.4.3
  • FortiSIEM 5.3.1

objective

After completing this course, you should be able to:

  • Understand the fundamentals of an OT infrastructure
  • Secure an OT infrastructure using the Purdue model
  • Use FortiGate and FortiNAC to identify and manage devices
  • Implement segmentation and micro-segmentation in an OT network
  • Authenticate users
  • Secure your OT network traffic using a FortiGate device
  • Use FortiAnalyzer for logging and reporting
  • Use FortiSIEM to centralize security information and event management
  • Generate real time analysis of security events using FortiSIEM

outline
  1. Introduction
  2. Asset Management
  3. Access Control
  4. Segmentation
  5. Protection
  6. Logging and Monitoring
  7. Risk Assessment

target_au

Networking and security professionals involved in the design, implementation, and administration of an OT infrastructure using Fortinet devices should attend this course.


pre_req

You must have an understanding of the topics covered in the following courses, or have equivalent experience:

  • NSE 4 FortiGate Security
  • NSE 5 FortiGate Infrastructure

It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:

  • NSE 5 FortiSIEM
  • NSE 5 FortiAnalyzer

titleTrend Micro™ Deep Discovery
days3
seo_titleTMCPDD - Trend Micro™ Deep Discovery Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorTrend Micro

techonogyIT Systems and Security
overviewTrend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solution using: Trend Micro™ Deep Discovery Inspector Trend Micro™ Deep Discovery Analyzer Trend Micro™ Deep Discovery Email Inspector Participants explore key concepts and methodologies of using a blend of Deep Discovery solutions for a more complete approach to network security. This course details the architecture, deployment options, threat management, and system administration fundamentals, as well as troubleshooting and best practices, for all three products. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by TrendMicro-certified trainers. Upon completion of this course, participants may choose to complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Discovery.
objective

Trend Micro™ Deep Discovery Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to deploy and manage a Trend Micro™ Deep Discovery threat protection solution using:

• Trend Micro™ Deep Discovery Inspector
• Trend Micro™ Deep Discovery Analyzer
• Trend Micro™ Deep Discovery Email Inspector


outline
  • Module 1: Introduction
  • Module 2: Deep Discovery Solution Overview
  • Module 3: Deep Discovery Inspector
  • Module 4: Deep Discovery Inspector Installation and Configuration
  • Module 5: Threat Detect Technologies
  • Module 6: Deep Discovery Inspector Management and Administration
  • Module 7: Deep Discovery Inspector Logs and Reports
  • Module 8: Virtual Analyzer
  • Module 9: Deep Discovery Analyzer Installation and Configuration
  • Module 10: Deep Discovery Analyzer Administration
  • Module 11: Deep Discovery Email Inspector
  • Module 12: Deep Discovery Email Inspector Installation and Configuration
  • Module 13: Deep Discovery Email Inspector Administration
  • Module 14: Threat Connect

target_au

This course is designed for IT professionals who are responsible for protecting networks from any kinds of networked, endpoint, or cloud security threats.

The individuals who will typically benefit the most includes:

  • System administrators
  • Network engineers
  • Support engineers
  • Integration engineers
  • Solution & security architects

pre_req

Before you take this course, trend micro recommends that you have a working knowledge of their products and services as well as basic networking concepts and principles. You should also have a working knowledge of the following products:

  • Windows servers and clients
  • Firewalls, Web Application Firewalls, Packet Inspection devices
  • General understanding of malware

titleCCET 1.0 – Troubleshooting Cisco Contact Center Enterprise
days2
seo_titleCCET - Troubleshooting Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco® PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues.   This class will help you:
  • Learn the troubleshooting techniques to maximize the benefits the prepackaged deployment model PCCE
  • Anticipate and rectify possible deployment issues by learning the tools and processes that provide solutions for deployment issues

objective

After taking this course, you should be able to:

  • Describe CCE flows and processes required to support and troubleshoot the PCCE deployment
  • Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment
  • Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE Deployment

outline
  • CCE Flows and Process Review
  • Troubleshooting and Support Methodology
  • PCCE Components
  • PCCE Call Flow Review
  • CCE Diagnostic Tools
  • Diagnostic Framework Suite
  • Run Analysis Manager
  • Run Unified System Command-Line Interface (CLI)
  • Troubleshooting CCE
  • Troubleshooting Certificates
  • Troubleshooting Cisco Finesse
  • Troubleshooting a PCCE Deployment

 

Lab Exercises

  • Configure Access to Discovery Environment
  • Explore CCE Components
  • Explore Diagnostic Framework Suite
  • Analyze Peripheral Gateway (PG) Logs
  • Navigate Certificate Store
  • View Cisco Finesse Logs

target_au
  • Account manager
  • Deployment engineer
  • Deployment project manager
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Strong knowledge of computer networking components: Windows A/D, SQL Server, and components (servers, routers, switches)
  • Strong understanding of IP networks
  • Advanced experience administering of Cisco Packaged Contact Center Enterprise
  • Experience deploying Cisco Packaged Contact Center Enterprise
  • Experience administering and troubleshooting Cisco Unified Communications Manager and Voice Gateways

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding Cisco Collaboration Foundations (CLFNDU)
  • Implementing and Administering Cisco Solutions (CCNA®)
  • Administering Cisco Contact Center Enterprise (CCEA)
  • Administering Advanced Cisco Contact Center Enterprise (CCEAA)
  • Implementing Cisco Contact Center Enterprise (CCEI)

titleCCER 1.0 – Reporting Cisco Contact Center Enterprise
days5
seo_titleCCER - Reporting Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. The course explains the nuances of analyzing and troubleshooting in various deployment scenarios: Designed Tier 2/Day 2 Support. The Cisco® Contact Center Enterprise (CCE) solution helps businesses deliver a connected digital experience, enabling you to provide contextual, continuous, and capability-rich journeys for your customers, across time and channels. The course teaches you the business application of the CCE solution providing the framework of interrelationship between both core and optional components required to configure the CCE solution.   This class will help you:
  • Consolidate disparate data into manageable, comprehensive reports
  • Understand the business application of the CCE solution and how it provides a framework of correlation between core and optional components

objective

After taking this course, you should be able to:

  • Explain the Cisco Unified Intelligence Center including the benefits and features of the system and describe the high-level architecture of Cisco Unified Intelligence Center in the UCCE environment
  • Understand the Cisco Unified Intelligence Center administration console to perform Cisco Unified Intelligence Center administrative, maintenance and provisioning functions
  • Discuss the functional attributes of the Cisco Unified Intelligence Center
  • Customize Cisco Unified Intelligence Center Reports and Views

outline
  • Cisco Unified Intelligence Center Foundations
    • Cisco Unified Intelligence Center – Basics
    • Cisco Unified Intelligence Center – Deployment Models

     

    Cisco Unified Intelligence Center Administration and Operations Console

    • Operations Console (OAMP) Console Introduction
    • Admin User Management

     

    Cisco Unified Intelligence Center Attributes

    • Stock Reporting
    • Dashboard Features

     

    Cisco Unified Intelligence Center Custom Reports and Views

    • Creating Views
    • Building Report Definitions

     

    Lab outline

    • Exploring Cisco Unified Intelligence Center (CUIC) OAMP
    • Working with Stock Reports
    • Working with Dashboards
    • Value Lists and Collections
    • Exploring Supervisor Defaults
    • Using Groups
    • Editing Report Views Pt 1 of 2
    • Editing Report Views Pt 2 of 2
    • Report Definitions and Drilldowns
    • Create Custom Route Call Detail (RCD) Report Definition (Database Query) and Report
    • Value Lists and Drilldowns

target_au
  • Administrators
  • Business liaisons
  • Deployment engineers
  • Managers overseeing CCE deployments

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of computer networking components: Windows Active Directory (AD) SQL Server and components (servers, routers, switch) is helpful but not required
  • Understanding of Cisco Packaged Contact Center Enterprise components and call flows
  • Experience administering Cisco Packaged Contact Center Enterprise

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Administering Cisco Contact Center Enterprise (CCEA)
  • Cisco Certified Network Associate (CCNA®)
  • Understanding Cisco Foundation Collaborations (CLFNDU)

titleCCEF 1.0 – Understanding Cisco Contact Center Enterprise Foundations
days1
seo_titleCCEF - Understanding Cisco Contact Center Enterprise Foundations Course Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Understanding Cisco Contact Center Enterprise Foundations (CCEF) v1.0 course gives you an overview of the Cisco® Packaged Contact Center Enterprise (PCCE) and Unified Contact Center Enterprise solutions. You will gain an understanding of contact center basics and describe the available Cisco contact center solutions and intended target customers. You will also focus on the Cisco Contact Center Enterprise (CCE) family of products and explore key features and functionality of the solution including architecture, major system components, and tools used for administration and reporting. This course is the foundation for additional courses required to deploy, configure, support, and troubleshoot Cisco CCE solutions.   This class will help you:
  • Learn how to manage timely, disparate data using CCER as a reporting solution
  • Apply the CCE as a business solution to deploy, troubleshoot, and tailor application usage to support business processes.
  • Understand the foundational components of Contact Center Enterprise solutions

objective

After taking this course, you should be able to:

  • Provide a high-level overview of the Cisco Contact Center portfolio
  • List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions
  • Describe how calls flow through PCCE using appropriate terms and naming conventions
  • Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment
  • Identify advanced features available within the PCCE solution

outline
  • Introduction to CCE
  • Cisco Contact Center Basics
  • Cisco Contact Center Fundamentals
  • Functionality of PCCE Components
  • Public Switched Telephone Network (PSTN) and Voice Gateways
  • Cisco Unified Border Element (CUBE)
  • Terms and Naming Conventions Used in CCE
  • CCE Access Environment
  • CCE Routing Configuration
  • Access Tools Available in CCE
  • Single Pane of Glass (SPOG)
  • Cisco Intelligent Contact Management (ICM) Configuration Manager
  • Discovering CCE Features Beyond Default
  • Agent Management
  • Agent Efficiency

 

Lab outline

  • This class does not have any labs.

target_au
  • Account and project managers
  • Business liaisons
  • Deployment engineers
  • Managers overseeing CCE deployments
  • Technical sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
  • Working knowledge of Unified Communications Manager and Voice Gateways
  • Basic understanding of IP networks

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • CCNA®
  • Understanding Cisco Foundation Collaborations (CLFNDU)

titleCCEI 1.0 – Implementing Cisco Contact Center Enterprise
days3
seo_titleCCEI - Implementing Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Contact Center Enterprise (CCEI) v1.0 course teaches you how to build and implement a Cisco® Packaged Contact Center Enterprise (PCCE) solution, including advanced integration of external data, Single Sign-On (SSO), and process detail for the Contact Center Enterprise (CCE) solution with examples of the various deployment models. This integration process enables businesses and organizations to deliver a connected digital experience of continuous and capability-rich journeys for your customers, across time and channels. This course teaches you to install the CCE solution and provide Tier 2–3 solution support. The focus is on Day 1 support for a new CCE deployment.   This class will help you:
  • Learn how to optimize management of CCE solutions for smooth, connected, and efficient digital experiences across multiple channels
  • Manage the effects of using CCE solutions for scalability, flexibility, and growth to support larger contact center enterprises

objective

After taking this course, you should be able to:

  • Examine components, protocols, and variables that influence selection of the design and sizing of a PCCE deployment
  • Identify concepts necessary to create CCE system design specifications and deployment plans
  • Configure an advanced VXML application implementing DB lookup functionality and digit collection; use Call Studio and CCE Scripting tools to present call data collected from the caller to the gent desktop
  • Discover how to install CCE software
  • Administer CA signed security certificates to support the successful addition of a PCCE site
  • Identify the tasks associated with adding Remote Site functionality to the PCCE environment
  • Discuss integration of the CUIC, LiveData, and Finesse reporting environments
  • Configure the PCCE Dial Plan end-to-end, incorporating the use of Cisco Unified Border Element (CUBE), Cisco Unified SIP Proxy (CUSP), Cisco Virtualized Voice Browsers (VVBs), Voice XML (VXML) Gateways (GW), and Significant Digits
  • Examine concepts necessary to create CCE system design specifications and deployment plans
  • Create a series of routing scripts using PCCE
  • Configure Single sign-on for Unified CCE

outline

Planning a Cisco Packaged Contact Center Enterprise Deployment

  • Packaged CCE Component Overview
  • Call Flows Review

 

Staging a Packaged CCE Deployment

  • PCCE Deployment Planning and System Design Specification
  • Software Compatibility and OS Requirements

 

Preparing CCE Software for Installation

  • General Considerations and System Requirements
  • Active Directory Considerations

 

Administering Security Certificates

  • Security Certificate Overview
  • Install and Configure Certificate Authority

 

Introducing the Packaged CCE Integration Wizard

  • PCCE Inventory and Service Accounts
  • Run the PCCE Wizard Adding a Site to Packaged CCE

 

Adding a Site to Packaged CCE

  • PCCE Remote Site Overview
  • Remote Site Security Certificate Considerations

 

Integrating Cisco Unified Intelligence Center, LiveData, and Finesse

  • Compare Real Time vs. Live Data
  • Complete Cisco Unified Intelligence Center Integration

 

Personalizing the Packaged CCE Dial Plan

  • CCE Dial Plan Components
  • Ingress Gateway and Cisco Unified Border Element Dial Plans Configuring to Validate Deployment

 

Configuring to Validate Deployment

  • Confirm Configuration Readiness
  • Cisco Unified Communications Manager Administration

 

Scripting for Packaged Contact Center Enterprise

  • Configure Script Editor
  • Use Microapps

 

Configuring Single Sign-On

  • SSO Overview
  • Configure SSO Prerequisites

 

Lab Practice

  • Navigate CCE Discovery Architecture and Components
  • Explore ICM Configuration Tools
  • Observe Installed CCE Software
  • Navigate Certificate Store
  • Add a Remote Site to PCCE
  • Personalize Finesse Server
  • Configure Site Dial Plan
  • Verify Configuration Details for Final Testing
  • Build a Series of Test Scripts
  • Enable Single Sign-On

target_au
  • Deployment engineer
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Advanced knowledge of computer networking components: Windows A/D, SQL Server, and components
  • Understanding of IP networks
  • Strong understanding of Cisco Packaged Contact Center Enterprise functionality
  • Advanced experience administering of Cisco Packaged Contact Center Enterprise
  • Working knowledge of Unified Communications Manager and Voice Gateways

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Administering Cisco Contact Center Enterprise (CCEA)
  • Administering Advanced Cisco Contact Center Enterprise (CCEAA)
  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Understanding Cisco Collaboration Foundations (CLFNDU)
  • Implementing and Administering Cisco Solutions (CCNA®)

titleCCEAA 1.0 – Administering Advanced Cisco Contact Center Enterprise
days3
seo_titleCCEAA - Administering Advanced Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco® Contact Center Enterprise (CCE) solution through an in-depth examination of technical and operational requirements, and of the tools used to configure and ensure CCE solution functionality.   This class will help you:
  • Learn how to optimize management of CCE solutions for proactive management of contact centers tasks
  • Manage the effects of using CCE solutions for scalability and interaction between the solution components for centralized application management

objective

After taking this course, you should be able to:

  • Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities.
  • Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration.
  • Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop.
  • Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new.
  • Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop.
  • Successfully deploy Mobile Agent in a CCE Environment.
  • Successfully deploy Post Call Survey in a CCE Environment.

outline

PCCE Review

  • Review PCCE Architecture and Components
  • Review PCCE Protocols

 

Introducing Bulk Import Tools

  • Use the PCCE Bulk Import Tool
  • Use Bulk Import Templates

 

Configuring Advanced Scripting and CCE Data Exchange

  • Design for Advanced Scripting
  • CCE Data Exchange

 

Cisco Unified Communications Manager Initiated Call Flows

  • Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models
  • Describe Subsequent Transfers

 

Using Gadgets to Customize the Finesse Desktop

  • Obtain Finesse Custom Gadgets
  • Deploy Finesse Custom Gadgets

 

Implementing Mobile Agent

  • Examine Mobile Agent Functionality
  • Identify Mobile Agent Architecture and Components

 

Implementing Post Call Survey

  • Examine Post Call Survey Functionality
  • Configure Post Call Survey

 

Lab Practice

  • Review Discovery
  • Navigate CCE Discovery Architecture and Components
  • Import Bulk Data
  • Create a VXML Application Using Call Studio
  • Configure Precision Queues
  • Create a CCE Routing Script
  • Customize the Finesse Desktop
  • Test Your Call Flow
  • Configure Cisco Unified Communications Manager (CUCM) as Routing Client and Agent Transfers
  • Deploy Cisco Finesse Gadgets
  • Implement Mobile Agent

target_au
  • Deployment engineer
  • Sales engineer

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required.
  • Working knowledge of Unified Communications Manager and voice gateways
  • Basic understanding of Cisco Unified Contact Center Enterprise architecture and operation

 

 Recommended Cisco offerings that may help you meet these prerequisites:

  • Administering Cisco Contact Center Enterprise (CCEA)
  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding CiscoCollaboration Foundations (CLFNDU)

titleCCEA 1.0 – Administering Cisco Contact Center Enterprise
days4
seo_titleCCEA - Administering Cisco Contact Center Enterprise Course Training
seo_dec
seo_tkey
categoryunified-contact-center-2
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Administering Cisco Contact Center Enterprise (CCEA) v1.0 course teaches you the contextual information around call flow between components in the Cisco® Unified Contact Center Enterprise (UCCE) solution including intelligent contact routing, call treatment, network-to-desktop Computer Telephony Integration (CTI), and multichannel contact management over an IP infrastructure. You receive hands-on practice using administrative tools to perform routine adds, moves, and changes in an inbound contact center environment.   This class will help you:
  • Leverage the Cisco Unified Contact Center Enterprise (UCCE) for a smooth integration of inbound and outbound voice applications to support multiple communication channels.
  • Manage a multichannel contact functionality with IP telephony as a unified solution to rapidly deploy within a distributed contact center infrastructure.

objective

After taking this course, you should be able to:

  • Navigate CCE configuration and scripting tools
  • Configure a dialed number, call type, and media routing domain
  • Build a basic Cisco Intelligent Contact Management (ICM) script
  • Configure agents and skill groups
  • Configure basic Interactive Voice Response (IVR) functionality
  • Implement attributes and precision queues
  • Configure Ring-No-Answer (RONA) using CCE configuration tools
  • Configure and populate an agent team and primary supervisor
  • Improve agent efficiency through finesse enhancements
  • Build and test a basic Voice XML (VXML) application
  • Implement roles, departments, and business hours
  • Run Cisco Unified Intelligence Center (CUIC) reports using the Reporting tool

outline

Cisco Unified Contact Center Review

  • Contact Center Basics
  • Components and Architecture

 

Deploying Basic Call Settings

  • Associate Basic Call Settings
  • Explore Media Routing Domains

 

Building a Basic Cisco Unified Contact Center Enterprise Script

  • Introduce Script Editor
  • Use Script Editor Nodes

 

Configuring Basic Agent Functionality

  • Introduce Agent Functionality
  • Configure Agent Desk Settings

 

Configuring Basic Call Treatment and Queuing

  • Explore Media Server and Files
  • Introduce Microapps

 

Implementing Precision Routing

  • Introduce Precision Routing Basics
  • Examine the Migration Path

 

Configuring RONA Support

  • Introduce RONA Functionality
  • Identify RONA Timeout Considerations

 

Configuring Agent Teams and Supervisors

  • Configuring Teams and Supervisors
  • Explore Agent Roles

 

Administering the Cisco Finesse Desktop

  • Administering Cisco Finesse Desktop
  • Introduce Cisco Finesse Administration

 

Implementing Voice XML Applications

  • Introduce VXML
  • Build a Basic Call Studio Project

 

Configuring Roles, Departments, and Business Hours

  • Examine Post-Call Survey Functionality
  • Configure Post-Call Survey

 

Running Unified CC Enterprise Reports with Unified Intelligence Center (IC)

  • Configure Unified CC Enterprise Administrators
  • Configure Departments

 

Lab Exercises

  • Navigate CCE Discovery Architecture and Components
  • Explore ICM Configuration Tools
  • Administering ICM Dialed Numbers and Call Types
  • Prepare a Basic Label Script
  • Using ICM Tools for ICM Scripts
  • Configure ICM for Basic Agent and Skill Group Functionality
  • Configure UCM for Agent Functionality
  • Test Basic Skill Group Functionality in an ICM Script
  • Examine Media Files and Variables in ICM Scripts
  • Build Basic ICM Scripts with MicroApps
  • Configure and Implement Precision Routing
  • Configure RONA
  • Configure Agent Teams and Supervisors
  • Cisco Finesse Administration
  • Configure VXML Server and Install Call Studio
  • Create and Deploy a Call Studio Project
  • Integrate VXML Applications with a Unified CC Enterprise Script
  • Configuring Roles, Departments, and Business Hours
  • Run Unified IC Stock Reports

target_au
  • Account and project managers
  • Contact Center Enterprise (CCE) administrators
  • Deployment engineers
  • Technical sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
  • Working knowledge of Unified Communications Manager and voice gateways
  • Basic understanding of Cisco Unified Contact Center Enterprise architecture and operation

 

Recommended Cisco offerings that may help you meet these prerequisites:

  • Understanding Cisco Contact Center Enterprise Foundations (CCEF)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Understanding Cisco Collaboration Foundations (CLFNDU)

titleCLFNDU v1.1 – Understanding Cisco Collaboration Foundations
days5
seo_titleCLFNDU - Understanding Cisco Collaboration Foundations Course Training
seo_dec
seo_tkey
categoryunified-communications
vendorCisco

techonogyCollaboration
overviewThe Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution with Session Initiation Protocol (SIP) gateway. The course covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities. This course does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several professional-level collaboration courses and exams:
NO Id Course NameVendor seo titlekeywords seo description
Collaboration Courses Collaboration Exams
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) 350-801 Implementing Cisco Collaboration Core Technologies (CLCOR)
Implementing Cisco Collaboration Applications (CLICA) 300-810 Implementing Cisco Collaboration Applications (CLICA)
Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM)
Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) 300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)
Implementing Automation for Cisco Collaboration Solutions (CLAUI) 300-835 Implementing Automation for Cisco Collaboration Solutions (CLAUI)

objective

After taking this course, you should be able to:

  • Define collaboration and describe the main purpose of key devices in a Cisco collaboration on-premise, hybrid, and cloud deployment model
  • Configure and modify required parameters in Cisco Unified Communications Manager (CM) including service activation, enterprise parameters, CM groups, time settings, and device pool
  • Deploy and troubleshoot IP phones via auto registration and manual configuration within Cisco Unified CM

outline
  • Define Collaboration Technology and Benefits
  • Administering Initial Parameters for Cisco Unified Communications Manager
  • Exploring Endpoints and the Registration Process
  • Exploring Codecs and Call Signaling
  • Managing Users in Cisco Unified Communication Manager
  • Describing a Basic Dial Plan
  • Describing Class of Service
  • Enabling Endpoints and Features
  • Describing the Cisco ISR as a Voice Gateway
  • Exploring Cisco Unified Communication Manager Media Resources
  • Reporting and Maintenance
  • Exploring Additional Requirements for Video Endpoints
  • Describing Cisco Unity Connection

Lab outline

  • Configure Cisco Unified Communication Manager Initial Parameters
  • Configure the Cisco Unified CM Core System Settings
  • Configure an Access Switch for an Endpoint
  • Deploy an IP Phone Through Auto and Manual Registration
  • Administer Endpoints in Cisco Unified Communications Manager
  • Create a Local User Account and Configure LDAP
  • Adding Users in Cisco Unified Communications Manager Create a Basic Dial Plan
  • Explore Partitions and Call Search Spaces
  • Explore Private Line Automatic Ringdown (PLAR)
  • Deploy an On-Premise Cisco Jabber® Client for Windows
  • Implement Common Endpoint Features
  • Implement Single-Site Extension Mobility Configure Jabber
  • Configure Voice over Internet Protocol (VoIP) Dial Peers
  • Configure Integrated Service Digital Network (ISDN) Circuits and Plain Old Telephone Service (POTS) Dial Peers
  • Control Access to Media Resources
  • Use Reporting and Maintenance Tools
  • Explore Endpoint Troubleshooting Tools
  • Examine the Integration between Unity Connection and Cisco Unified CM
  • Manage Unity Connection Users

target_au
  • Students preparing to take the CCNP Collaboration certification
  • Network administrators
  • Network engineers
  • Systems engineers

pre_req

This course is intended to be an entry-level course. While there are no specific prerequisite Cisco courses; however, the following skills are required:

  • Internet web browser usability knowledge and general computer usage
  • Knowledge of Cisco Internetwork Operating System (Cisco IOS®) command line

titleDCNXA 1.0 – Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced
days4
seo_titleDCNXA - Implementing Cisco Nexus 9000 Switches in NX-OS Mode - Advanced Course Training
seo_dec
seo_tkey
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features. This course will help you:
  • Learn how you can integrate Cisco Nexus 9000 Switches in NX-OS mode to manage your enterprise IT environment
  • Understand the common platform architecture and key features of the Cisco Nexus 9000 Series in NX-OS mode to provide a consistent set of provisioning, management, and diagnostic capabilities for applications

objective

After taking this course, you should be able to:

  • Configure VXLAN EVPN in a single site using Cisco DCNM
  • Configure a Multi-Site VXLAN EVPN
  • Configure L4-L7 service redirection
  • Configure external connectivity from a VXLAN EVPN
  • Configure tenant-level features and Tenant-Routed Multicast (TRM) in VXLAN EVPN
  • Configure Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD)

outline
  • Describing VXLAN EVPN in Single Site
    • Describe VXLAN EVPN Control Plane
    • Describe VXLAN EVPN Data Plane
  • Describing Multi-Site VXLAN EVPN
    • Describe VXLAN EVPN Multi-Site Features
    • Describe Supported Multi-Site Topologies
  • Describing Layer 4-Layer 7 Service Redirection
    • Describe Layer 4-Layer 7 Service Integration Options
    • Describe Integration of Active/Standby and Active/Active Service Devices
  • Describing External Connectivity from VXLAN EVPN
    • Describe External VRF-Lite Connectivity
  • Describing VXLAN EVPN Functionality Enhancements
    • Describe Fabric Management Options
    • Describe Tenant-Level Dynamic Host Configuration Protocol (DHCP) Relay
  • Describing Cisco NX-OS Enhanced Policy-Based Redirect and Intelligent Traffic Director
    • Describe Enhanced Policy-Based Redirect
    • Describe Tenant-Level DHCP Relay

Labs

  • Import an Existing VXLAN Border Gateway Protocol (BGP) EVPN Fabric into Cisco DCNM
  • Configure vPC and Layer 3 Connectivity
  • Configure Multi-Site VXLAN EVPN
  • Configure Routed Firewall Integration into VXLAN EVPN Using PBR
  • Configure External VRF Lite Connectivity and Endpoint Locator
  • Configure Tenant DHCP Relay
  • Configure Tenant-Routed Multicast
  • Configure Enhanced Policy-Based Redirect
  • Configure Traffic Load-Balancing Using the ITD

target_au

Basic knowledge in the following areas can help you get the most from this course:

  • Networking protocols, routing, and switching
  • General Cisco data center technologies
  • Virtualization fundamentals
  • Cisco Nexus platform management

The following course offerings may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Implementing Cisco Nexus 9000 Switches in NX-OS Mode (DCNX)

pre_req

IT professionals interested in understanding the capabilities of Cisco Nexus 9000 Series Switches including:

  • Data center engineer
  • Field engineer
  • Network designer
  • Network administrator
  • Network engineer
  • Systems engineer
  • Technical solutions architect

titleDCMDSO 1.5 – Cisco MDS 9000 Series Switches Overview
days1
seo_titleDCMDSO - Cisco MDS 9000 Series Switches Overview Course Training
seo_dec
seo_tkey
categorystorage-networking
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Cisco MDS 9000 Series Switches Overview (DCMDSO) v1.5 course gives you a technical overview of how Cisco Multilayer Director Switch (MDS) 9000 Series, can be used to build highly available and scalable storage networks with advanced security and unified management. The course is for technical decision makers and IT professionals who architect, implement, and manage data center Storage Area Network (SAN) environments. In this course, you’ll learn about key capabilities of the MDS 9000 Series, including platforms, architecture, software, management, and key features that contribute to performance, high availability, flexibility, and operational simplicity of storage environments. This course will help you:
  • Learn how you can use Cisco MDS Series 9000 Multilayer Switches to manage your enterprise SAN environment
  • Understand the common platform architecture and key features of the MDS 9000 Series, which provide a consistent set of provisioning, management, and diagnostic capabilities and lead to flexibility, speed, lower operational costs and more benefits

objective

After taking this course, you should be able to:

  • Describe Cisco MDS SAN features and advantages
  • Define fixed and modular platforms
  • Understand Cisco MDS architecture and high-availability mechanisms
  • Identify technologies used in modern SANs
  • Describe SAN management with Cisco Data Center Network Manager (DCNM)
  • Explain key value-add features that distinguish Cisco MDS switches

outline
  • Define Cisco MDS Platform Overview
  • Introduction and Advantages of Cisco MDS
  • Fixed Platforms
  • Modular Platforms
  • Describe Cisco MDS Architecture
  • Store-and-Forward Architecture
  • High Availability
  • Redundancy
  • Explore Cisco MDS Key Features
  • Virtual Storage Area Networks
  • Port Channels
  • Slow Drain Device and Path Analysis Using Congestion Control Mechanisms
  • Cisco DCNM SAN Insights for SAN Analytics
  • Zoning
  • Smart Zoning
  • Other Differentiating Features
  • Examine Cisco MDS Management
  • Cisco Data Center Network Manager

target_au

IT professionals interested in understanding the capabilities of the MDS 9000 Series, including:

  • Data center architects
  • Data center engineers
  • IT directors
  • IT managers
  • Network architects
  • Network engineers
  • Solutions architects
  • Systems engineers

pre_req

Understanding the following information can help you get the most from this course:

  • Experience managing data center deployments
  • Grasping the fundamentals of SAN technologies
  • Understanding business and application requirements

titleDCIT v7.0 – Troubleshooting Cisco Data Center Infrastructure
days5
seo_titleDCIT - Troubleshooting Cisco Data Center Infrastructure Course Training
seo_dec
seo_tkey
categorydata-center-switching
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 course shows you how to troubleshoot LAN, SAN, Cisco® Data Center Unified Fabric, Cisco Unified Computing System™ (Cisco UCS®), and Cisco Application-Centric Infrastructure (Cisco ACI®).You will learn methodologies and tools to identify issues that may occur in data center network architecture. You will get extensive hands-on practice troubleshooting installation, configuration and interconnectivity issues on Cisco Multilayer Director Switch (MDS) switches, Cisco Nexus® switches, Cisco Fabric Extenders (FEXs), Cisco UCS, Cisco ACI, and more. This course helps prepare you to take the exam:
  • 300-615 Troubleshooting Cisco Data Center Infrastructure (DCIT)
This course will help you:
  • Learn how to deploy and troubleshoot various components of Cisco data center infrastructure to support performance, resiliency, scalability needs
  • Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
  • Earn 50 CE credits toward recertification

objective

After taking this course, you should be able to:

  • Describe how to troubleshoot the data center network, troubleshooting tools and methodologies available from the Command-Line Interface (CLI) that are used to identify and resolve issues in a Cisco data center network architecture
  • Identify and resolve issues that are related to: Virtual LANs (VLANs) and private VLANs (PVLANs); port channels and virtual port channels; Overlay Transport Virtualization (OTV); and Virtual Extensible LAN (VXLAN)
  • Describe troubleshooting of routing protocols such as Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Protocol-Independent Multicast (PIM), and LAN security features
  • Identify and resolve issues that are related to a single device
  • Identify and resolve issues that are related to Fibre Channel interface operation
  • Identify and resolve Fibre Channel switching issues when the Cisco NX-OS Software is used in switched mode, and in N-Port Virtualization (NPV) mode
  • Identify and resolve issues that are related to Fibre Channel over Ethernet (FCoE) and FCoE Initialization Protocol (FIP), including FCoE performance
  • Describe Cisco UCS architecture, initial setup, tools, and service aids that are available for Cisco UCS troubleshooting and interpretation of the output
  • Describe Cisco UCS configuration, Cisco UCS B-Series Blade Server operation and troubleshoot related issues
  • Describe LAN, SAN, and Fibre Channel operations, including in-depth troubleshooting procedures
  • Describe Cisco Integrated Management Controller (IMC) tools for validating performance and facilitating data-gathering activities for Cisco UCS C-Series server troubleshooting, and the troubleshooting approach for hardware and firmware failures
  • Define the proper procedures for configuring LAN and SAN connectivity, avoiding issues with the VIC, troubleshooting connectivity issues and Cisco UCS C-Series server integration with Cisco UCS Manager
  • Identify the tools, protocols, and methods to effectively troubleshoot Cisco ACI

outline
  • Describing the Troubleshooting Process
  • Understanding CLI Troubleshooting Tools
  • Troubleshooting VLANs and PVLANs
  • Troubleshooting Port Channels and Virtual Port Channels
  • Troubleshooting Cisco Overlay Transport Virtualization (OTV)
  • Troubleshooting Virtual Extensible LAN (VXLAN)
  • Troubleshooting Routing and High-Availability Protocols
  • Troubleshoot Data Center LAN Security
  • Troubleshooting Platform-Specific Issues
  • Troubleshooting Fibre Channel Interfaces
  • Troubleshooting Fibre Channel Fabric Services
  • Troubleshooting NPV Mode
  • Troubleshooting FCoE
  • Troubleshooting Cisco UCS Architecture and Initialization
  • Troubleshooting Cisco UCS Configuration
  • Troubleshooting Cisco UCS B-Series Servers
  • Troubleshooting Cisco UCS B-Series LAN and SAN Connectivity
  • Troubleshooting Cisco UCS C-Series Servers
  • Troubleshooting Cisco UCS C-Series LAN and SAN Connectivity
  • Troubleshooting Cisco UCS C-Series and Cisco UCS Manager Integration
  • Exploring the Tools and Methodologies for Troubleshooting Cisco ACI
  • Troubleshoot Automation and Scripting Tools
  • Troubleshooting Programmability

Lab outline

  • Document the Network Baseline
  • Troubleshoot Rapid PVST+
  • Troubleshoot Link Aggregation Control Protocol (LACP)
  • Troubleshoot vPC
  • Troubleshoot OTV
  • Troubleshoot VXLAN
  • Troubleshoot OSPF
  • Troubleshoot FHRP
  • Troubleshoot Cisco Fabric Services
  • Troubleshoot VRF
  • Troubleshoot Cisco FEX
  • Troubleshoot Fibre Channel Interfaces
  • Troubleshoot Fibre Channel VSANs, Zones, and Domain Services
  • Troubleshoot NPV Mode
  • Troubleshoot FCoE
  • Troubleshoot DCB
  • Troubleshoot Cisco UCS Management and Service Profile Deployment
  • Troubleshoot Cisco UCS C-Series Server LAN Connectivity
  • Troubleshoot Cisco UCS C-Series Server Boot from the Fibre Channel LUN
  • Troubleshoot Cisco UCS C-Series Server Management Connectivity
  • Troubleshoot Cisco ACI Integration with VMware vCenter
  • Troubleshoot Contracts in Cisco ACI
  • Troubleshoot Cisco ACI External Layer 3 Connectivity
  • Troubleshoot Cisco ACI External Layer 2 Connectivity

target_au
  • Network designers
  • Network administrators
  • Network engineers
  • System engineers
  • Data center engineers
  • Consulting systems engineers
  • Technical solutions architects
  • Server administrators
  • Network managers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Configure, secure, and maintain LAN and SAN based on Cisco Nexus and MDS switches
  • Configure, secure, and maintain Cisco Unified Computing System
  • Configure, secure, and maintain Cisco ACI

 

The following Cisco courses may help you meet these prerequisites:

  • Implementing and Administering Cisco Networking Technologies (CCNA®)
  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Introducing Cisco NX-OS Switches and Fabrics in the Data Center (DCINX)
  • Configuring Cisco NX-OS Switches and Fabrics in the Data Center (DCCNX)
  • Introducing Cisco Unified Computing System (DCIUCS)
  • Configuring Cisco Unified Computing System (DCCUCS)

titleDCACIA 1.1 – Implementing Cisco Application Centric Infrastructure – Advanced
days5
seo_titleDCACIA - Implementing Cisco Application Centric Infrastructure - Advanced Course Training
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco Application Centric Infrastructure–Advanced (DCACIA) v1.1 course shows you how to integrate the capabilities of the Cisco® Nexus® 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI®) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode providing enhanced management and policy framework, along with the protocols used in the underlying fabric. The course also covers how to use Cisco ACI as a policy-driven solution that integrates software and hardware, and how to implement Cisco ACI Multi-Pod and Nexus Dashboard Orchestrator (NDO) deployments. You will gain hands-on practice implementing advanced ACI capabilities such as Rogue Endpoint Feature, Transit Routing, VRF Route Leaking, Contracts and Zoning Rules, Policy Based Redirect to Layer 4–7 Service Node, Multi-Pod Fabric and Cisco ACI® Nexus Dashboard Orchestrator.
objective

After taking this course, you should be able to:

  • Explain Cisco ACI advanced fabric packet forwarding
  • Explain advanced ACI policy and tenant configuration
  • Demonstrate Cisco ACI Multi-Pod deployment
  • Explain the details and consideration of implementing and integrating traditional network with Cisco ACI
  • Describe Cisco ACI Service Graph Policy-Based Redirect (PBR)
  • Describe Cisco ACI Nexus Dashboard Orchestrator deployment

outline

Cisco ACI Advanced Packet Forwarding

  • Packet Forwarding Between Leaf Switches
  • Endpoint Learning

 

Using Advanced Cisco ACI Policy and Tenant Configuration

  • Layer 3 Outside Transit Routing
  • Using Tenant Common for Shared Services

 

Implementing Traditional Network in Cisco ACI

  • Integrating Switched Network with Cisco ACI
  • Migrating Existing Switched Network to Cisco ACI

 

Cisco ACI Service Graph PBR

  • Service Graph PBR Overview
  • PBR End-to-End Packet Flow

 

Cisco ACI Multi-Pod Deployment

  • Cisco ACI Multi-Pod Overview
  • Inter-Pod Network Overview

 

Cisco Nexus Dashboard Deployment

  • Cisco Nexus Dashboard Overview
  • Cisco Nexus Dashboard Orchestrator

 

Lab Outline

  • Examine Local and Remote Endpoint Learning
  • Verify Bounce Entries
  • Validate IP Learning
  • Mitigate IP and MAC Flapping with the Rogue Endpoint Feature
  • Enable Transit Routing
  • Implement VRF Route Leaking
  • Configure VRF Route Leaking with L3Out
  • Examine Contracts and Zoning Rules
  • Configure Policy-Based Redirect to Layer 4–7 Service Node
  • Deploy Multi-Pod Fabric
  • Provision Policies with Cisco ACI Nexus Dashboard Orchestrator

target_au
  • Network designers
  • Network administrators
  • Network engineers
  • Systems engineers
  • Data center engineers
  • Consulting systems engineers
  • Technical solutions architects
  • Field engineers
  • Server administrators
  • Network managers
  • Storage administrators
  • Cisco integrators and partners
  • Program managers
  • Project managers

pre_req

To fully benefit from this course, you should have the following knowledge and skills:

  • Basic understanding of Cisco ACI
  • Understanding of Cisco data center architecture
  • Familiarity with virtualization fundamentals

 

These are the recommended Cisco offerings that may help you meet these prerequisites:

  • Implementing Cisco Application Centric Infrastructure (DCACI) v1.1
  • Implementing and Administering Cisco Solutions (CCNA®) v1.0
  • Understanding Cisco Data Center Foundations (DCFNDU) v1.0

titleVMware Horizon 8: Deploy and Manage (V8.0)
days5
seo_titleVH8DM - VMware Horizon 8: Deploy and Manage (V8.0) Training
seo_dec
seo_tkey
categorydesktop-mobility
vendorVMware

techonogyWireless
overviewVMware Horizon 8: Deploy and Manage is a five days course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
objective

Upon completing this course, the learner will be able to meet these objectives:

  • Recognize the features and benefits of Horizon
  • Use VMware vSphere® to create VMs to be used as desktops for Horizon
  • Create and optimize Windows VMs to create Horizon desktops
  • Install and configure Horizon Agent on Horizon desktop
  • Configure and manage the VMware Horizon® Client™ systems and connect the client to a VMware Horizon desktop
  • Configure, manage, and entitle desktop pools of full VMs
  • Configure, manage, and entitle pools of instant-clone desktops
  • Create and use Remote Desktop Services (RDS) desktops and application pools
  • Monitor the Horizon environment using Horizon Console Dashboard and Horizon Help Desk Tool
  • Identify Horizon Connection Server installation, architecture, and requirements.
  • Describe the authentication and certification options for a Horizon environment
  • Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8
  • Discuss performance and scalability options available in Horizon 8
  • Describe different security options for the Horizon environment

outline

Module 1: Course Introduction

  • Introductions and course logistics
  • Course objectives

Module 2: Introduction to VMware Horizon

  • Recognize the features and benefits of Horizon
  • Describe the conceptual and logical architecture of Horizon

Module 3: Introduction to Use Case

  • Define a use case for your virtual desktop and application infrastructure
  • Convert customer requirements to use-case attributes

Module 4: vSphere for Horizon 8

  • Explain basic virtualization concepts
  • Use VMware vSphere® Client™ to access your vCenter Server system and VMware ESXi™ hosts
  • Create, provision, and remove a virtual machine

Module 5: VMware Horizon Desktops

  • Create a Windows and a Linux virtual machine using vSphere
  • Optimize and prepare Windows and Linux virtual machines to set up Horizon desktop VMs

Module 6: VMware Horizon Agents

  • Outline the configuration choices when installing Horizon Agent on Windows and Linux virtual machines
  • Create a gold master for Windows Horizon desktops

Module 7: VMware Horizon Pools

  • Identify the steps to set up a template for desktop pool deployment
  • List the steps to add desktops to the VMware Horizon® Connection Server™ inventory
  • Compare dedicated-assignment and floating-assignment pools
  • Outline the steps to create an automated pool
  • Define user entitlement
  • Explain the hierarchy of global, pool-level, and user-level policies

Module 8: VMware Horizon Client Options

  • Describe the different clients and their benefits
  • Access Horizon desktop using various Horizon clients and HTML
  • Configure integrated printing, USB redirection, and the shared folders option
  • Configure session collaboration and media optimization for Microsoft Teams

Module 9: Creating and Managing Instant-Clone Desktop Pools

  • List the advantages of instant clones
  • Explain the provisioning technology used for instant clone desktop pools
  • Set up an automated pool of instant clones
  • Push updated images to instant clone desktop pools

Module 10: Creating RDS Desktop and Application Pools

  • Explain the difference between an RDS desktop pool and an automated pool
  • Compare and contrast an RDS session host pool, a farm, and an application pool
  • Create an RDS desktop pool and an application pool
  • Access RDS desktops and application from Horizon Client
  • Use the instant clone technology to automate the build-out of RDSH farms
  • Configure load-balancing for RDSHs on a farm

Module 11: Monitoring VMware Horizon

  • Monitor the status of the Horizon components using the Horizon Administrator console dashboard
  • Monitor desktop sessions using the HelpDesk tool

Module 12: Course Introduction

  • Introductions and course logistics
  • Course objectives

Module 13 : Horizon Connection Server

  • Recognize VMware Horizon reference architecture
  • Identify the Horizon Connection Server supported features
  • Identify the recommended system requirements for Horizon Connection Server
  • Configure the Horizon event database
  • Outline the steps for the initial configuration of Horizon Connection Server
  • Discuss the ADAM database as a critical component of Horizon Connection Server installation

Module 14: VMware Horizon Authentication and Certificates

  • Compare the authentication options that Horizon Connection Server supports
  • Describe the Smartcard authentication options that Horizon Connection Server supports
  • Outline the steps to create a Horizon administrator and custom roles
  • Describe the roles available in a Horizon environment
  • Explain the role that certificates play for Horizon Connection Server
  • Install and configure certificates for Horizon Connection Server
  • Install and configure True SSO in a Horizon environment

Module 15: Workspace ONE Access & Virtual Application Management

  • Recognize the features and benefits of Workspace ONE Access
  • Recognize the Workspace ONE Access console features
  • Explain identity management in Workspace ONE Access
  • Explain access management in Workspace ONE Access
  • Describe the Workspace ONE Access directory integration
  • Describe the Workspace ONE Access directory integration
  • Deploy virtual applications with Workspace services

Module 16: VMware Horizon Performance and Scalability

  • Describe the purpose of a replica connection server
  • Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
  • Describe the 3D rendering options available in Horizon 8
  • List the steps to configure graphics cards for use in a Horizon environment
  • Configure a load balancer for use in a Horizon environment
  • Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
  • Explain Horizon Cloud Pod Architecture scalability options

Module 17: Managing VMware Horizon Security

  • Explain concepts relevant to secure Horizon connections
  • Describe how to restrict Horizon connections.
  • Discuss the benefits of using Unified Access Gateway
  • List the two-factor authentication options that are supported by Unified Access Gateway
  • List Unified Access Gateway firewall rules
  • Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces

target_au

The primary audience for this course is as follows:

  • Operators, administrators, and architects for VMware Horizon should enroll in this course. These individuals are responsible for the creation, maintenance, and or delivery of remote and virtual desktop services. Additional duties can include the implementation, support, and administration of an organization’s end-user computing infrastructure.

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Use VMware vSphere® Web Client to view the state of virtual machines, datastores, and networks
  • Open a virtual machine console on VMware vCenter Server® and access the guest operating system
  • Create snapshots of virtual machines
  • Configure guest customization specifications
  • Modify virtual machine properties
  • Convert a virtual machine into a template
  • Deploy a virtual machine from a template

Attendees should also have the following Microsoft Windows system administration experience:

  • Configure Active Directory services, including DNS, DHCP, and time synchronization
  • Restrict user activities by implementing Group Policy objects
  • Configure Windows systems to enable Remote Desktop Connections
  • Build an ODBC connection to an SQL Server database

titleBuilding Web Applications with React and Redux (REACT)
days4
seo_titleBuilding Web Applications with React and Redux (REACT) Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewReact is an open-source JavaScript library from Facebook used for building HTML5 web applications. In this training course, you learn how to develop a complete application by building high-performance User Interfaces (UIs) with JSX components targeting a virtual DOM, and creating Flux applications, which provide complementary architectural patterns to construct client-side application functionality.
objective
  • Create an isomorphic web application using Facebook React and Flux
  • Compose a UI using React JavaScript and JSX components
  • Integrate React forms with Ajax and back-end REST services
  • Apply the Flux application pattern (dispatcher, stores, and actions)
  • Exploit React animation components with CSS3 transitions

outline

Introduction and Overview

  • Features of React and Flux
  • Benefits of the virtual DOM
  • Configuring the development and build environment

Designing Custom React Components

Displaying React content

  • Employing React.createElement() and React.DOM.* factories
  • Rendering the application with ReactDOM.render()
  • Constructing the UI on the server with renderToString()

Leveraging JSX for UI design

  • Coding custom components with React.createClass()
  • Generating component output with the render method
  • Composing a JSX component hierarchy
  • Incorporating third-party components

Activating React Components

Parameterising components

  • Disambiguating component properties and state
  • Inserting properties into rendered output with this.props
  • Passing property values using JSX { } expressions
  • Initialising default values with getDefaultProps()

Manipulating component state

  • Setting starting state values with getInitialState()
  • Reading application data with this.state
  • Mutating data with this.setState()
  • Harnessing React autobinding and event aggregation

Integrating into the component life cycle

  • Attaching and detaching logic and event handlers in componentDidMount and componentWillUnmount
  • Enhancing performance with componentShouldUpdate
  • Responding to changes with componentWillReceiveProps

Developing React Forms

Manipulating form input components

  • Working with interactive properties
  • value
  • defaultValue
  • checked
  • selected
  • Capturing form component updates with onChange
  • Comparing controlled and uncontrolled components

Simulating two-way binding

  • Applying the onChange / setState() convention
  • Employing the LinkedStateMixin
  • Passing ReactLink objects through the props hierarchy

Connecting React to REST services

  • Making Ajax calls from React
  • Mapping CRUD access to REST actions
  • GET
  • POST
  • PUT
  • DELETE

Creating Flux Applications

Modelling client-side data interactivity

  • Identifying Flux participants
  • Actions
  • Dispatcher
  • Stores
  • Views
  • Harnessing unidirectional data flow
  • Comparing Flux to Model View Controller, Redux and Relay

Coding a Flux application

  • Extending the Facebook Dispatcher
  • Utilising Node.js EventEmitter with custom stores
  • Integrating REST access with Flux action creators

Integrating routing into Flux

  • Exploiting the react-router for semantic URLs
  • Mapping URL paths and parameters to components

Analysing React Applications

Developer tools

  • Inspecting React components with browser extensions
  • Identifying and debugging rendering errors

Unit testing

  • Running tests with Jest
  • Simulating event dispatch with ReactTestUtils.Simulate

Performance testing

  • Establishing a baseline
  • Profiling React execution with Perf.start() and stop()
  • Optimising component reconciliation with key

Animating React Applications

  • Including the react-css-transition-group add-on
  • Employing the ReactCS component
  • Writing CSS transitions and animations

target_au
pre_req

Experience developing web pages with JavaScript, HTML, and CSS at the level of:

  • JavaScript for Modern Web Development

titlePython Programming 2 (PYP2)
days3
seo_titlePython Programming 2 Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewThe Python Programming 2 course comprises sessions dealing with advanced object orientation, iterators and generators, comprehensions, decorators, multithreading, functional programming, web services, and unit testing. The delegate will learn how to exploit advanced features of the Python language to build complex and efficient applications. Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
objective

This course aims to provide the delegate with the knowledge to be able to interpret, write, and troubleshoot complex Python applications exploiting inheritance and polymorphism, mixins, composition and aggregation, iterators, generators, decorators, comprehension, concurrency, functional programming, and RESTful web services.

The delegate will learn and acquire skills as follows:

  • Encapsulating classes
  • Exploiting polymorphism using inheritance and mixins
  • Associating objects via composition and aggregation
  • Working with static members
  • Using iterators as an alternative to for
  • Constructing custom iterators
  • Constructing functions that yield generators
  • Manipulating lists, sets, and dictionaries using comprehension
  • Exploiting aspect oriented programming using decorators
  • Writing multithreaded code
  • Sharing data between threads
  • Processing collections using lambdas
  • Building RESTful clients
  • Building RESTful APIs
  • Testing units of code

outline

Day 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: ADVANCED OBJECT ORIENTATION

  • The self Keyword
  • Constructors and Destructors
  • Encapsulation
  • Inheritance
  • Polymorphism
  • Abstract Classes
  • Multiple Inheritance and Mixins
  • Composition and Aggregation
  • Static Members

Session 2: ITERATORS & GENERATORS

  • Iterables
  • Iterators
  • Custom Iterators
  • Generators
  • Yield vs. Return

Session 3: COMPREHENSIONS

  • List Comprehension
  • Set Comprehension
  • The zip Function
  • Dictionary Comprehension

Day 2

Session 4: FUNCTIONAL PROGRAMMING

  • Functional Programming
  • Lambdas
  • Immutability
  • Mapping
  • Filtering
  • Reducing

Session 5: DECORATORS

  • Decorators
  • Decorator Functions
  • Decorator Annotations
  • Decorator Use Cases
  • Labs

Session 6: MULTITHREADING

  • Threads
  • Multithreading
  • Thread Construction
  • Thread Execution
  • Thread Sleep
  • Joins
  • Data Sharing
  • Synchronisation
  • Multithreading vs. Multiprocessing

Day 3

Session 7: WEB SERVICES

  • RESTful Web Services
  • JSON Data
  • CRUD and HTTP
  • RESTful Clients
  • RESTful APIs

Session 8: UNIT TESTING

  • Unit Testing Terminology
  • Test Classes
  • Test Fixtures
  • Test Cases
  • Assertions
  • Test Runners

target_au

The Python Programming 2 course is designed for existing Python developers who have a good grounding in the basics and want to exploit some of the advanced features of the language.

For the delegate for whom Python is their first programming language, we recommend taking the Python Programming 1 (PYP1) course first, then taking some time to practice the skills gained, before returning to take the Python Programming 2 course.


pre_req

Students should be able to build Python applications that exploit all fundamental elements of the language including variables and expressions, conditions and loops, functions, objects, and lists.

This knowledge can be gained by attendance on the pre-requisite Python Programming 1 (PYP1) course.


titlePython Programming 1 (PYP1)
days4
seo_titlePython Programming 1 Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewPython is an object oriented rapid development language deployed in many scenarios in the modern world. This Python Programming 1 course is designed to give delegates the knowledge to develop and maintain Python scripts using the current version (V3) of Python. There are many similarities between Python V2 and Python V3. The skills gained on this course will allow the delegate to develop their own skills further using Python V2 or V3 to support the development and maintenance of scripts. The Python Programming 1 course comprises sessions dealing with syntax, variables and data types, operators and expressions, conditions and loops, functions, objects, collections, modules and packages, strings, pattern matching, dates, exception handling, files, and databases. Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
objective

This course aims to provide the delegate with the knowledge to be able to produce Python scripts and applications that exploit all core elements of the language including variables, expressions, selection and iteration, functions, objects, collections, strings, modules, pattern matching, exception handling, I/O, and classes.

The delegate will learn and acquire skills as follows:

  • Writing and testing simple scripts
  • Representing data using built-in and custom data types
  • Building expressions
  • Building conditional and iterative statements
  • Declaring and calling functions
  • Using objects
  • Creating and manipulating collections including lists, tuples, and dictionaries
  • Creating and manipulating strings
  • Creating modules and packages, and using third-party libraries
  • Pattern matching
  • Working with date and time objects
  • Handling exceptions
  • Reading from and writing to files and databases
  • Coding in an OOP manner

outline

Day 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: GETTING STARTED

  • About Python
  • Python versions
  • Python documentation
  • Python runtimes
  • Installing Python
  • The REPL shell
  • Python editors

Session 2: PYTHON SCRIPTS & SYNTAX

  • Script naming
  • Comments
  • Docstring
  • Statements
  • The backslash
  • Code blocks
  • Whitespace
  • Console IO (to enable the writing of simple programs)
  • A first Python program
  • Script execution

Session 3: VARIABLES & DATA TYPES

  • Literals
  • Identifiers
  • Assignment
  • Numbers (bool, int, float, complex)
  • Binary, octal, and hexadecimal numbers
  • Collections (str, list, tuple, set, dict)
  • None
  • Implicit and explicit type conversion (casting)
  • The type function

Session 4: OPERATORS & EXPRESSIONS

  • Arithmetic Operators
  • Assignment Operators
  • Comparison Operators
  • Logical Operators
  • Membership Operators
  • Bitwise Operators
  • Identity Operators

Session 5: CONDITIONS & LOOPS

  • Conditional statements (if, elif, else)
  • Short hand if/if else
  • Python’s alternative to the ternary operator
  • Iterative statements (while, for, else)
  • The range function
  • Iterating over a list
  • Break
  • Continue
  • Nested conditional/iterative statements

Day 2

Session 6: FUNCTIONS

  • Declaration
  • Invocation
  • Default values for parameters
  • Named arguments
  • args and kwargs
  • Returning multiple values
  • Nested functions
  • Functions as data
  • Introduction to lambda expressions
  • Variable scope
  • The pass keyword

Session 7: OBJECTS AND CLASSES

  • About objects
  • Attributes and the dot notation
  • The dir function
  • Dunder attributes
  • Mutability
  • The id function
  • Pass by reference
  • Introduction to Classes
  • Class Declaration and Instantiation
  • Data attributes
  • Methods
  • Composition

Session 8: LISTS

  • About lists
  • List syntax including slicing
  • Getting and setting list elements
  • Iterating over a list
  • Checking for the presence of a value
  • The len function
  • List methods incl. append, insert, remove, pop, clear, copy, sort, reverse etc.
  • The del keyword
  • Appending to and combining lists
  • List comprehension

Session 9: TUPLES

  • About tuples
  • Tuple syntax
  • Getting tuple elements including unpacking
  • Iterating over a tuple
  • Checking for the presence of a value
  • The len function
  • Appending to and combining tuples

Session 10: SETS

  • About Sets
  • Dictionary syntax
  • Creating, adding and removing set elements
  • Iterating over a set
  • Membership Testing
  • Sorting
  • Copying
  • Set methods incl. union, intersection, difference, symmetric_difference etc.

Day 3

Session 11: DICTIONARIES

  • About dictionaries
  • Dictionary syntax
  • Getting and setting dictionary elements
  • Iterating over a dictionary (keys, values, and items)
  • Checking for the presence of a key
  • The len function
  • Dictionary methods incl. keys, values, items, get, pop, popitem, clear etc.
  • The del keyword
  • Dictionary comprehension

Session 12: STRINGS

  • About strings
  • String syntax including slicing
  • Escape characters
  • Triple-quoted strings
  • Concatenation
  • Placeholders
  • The format method
  • Other methods e.g. endswith, find, join, lower, replace, split, startswith, strip, upper etc.
  • A string as a list of bytes

Session 13: MODULES & PACKAGES

  • About modules
  • The module search path
  • Importing modules
  • Namespaces
  • Importing module objects
  • The import wildcard
  • Aliases
  • Importing within a function
  • Executable modules
  • Reloading a module
  • About packages
  • Importing packaged modules
  • Importing packaged module objects
  • Package initialisation
  • Subpackages
  • Referencing objects in sibling packages
  • The Standard Library
  • Installing modules and packages using pip

Session 14: PATTERN MATCHING

  • About regular expressions
  • Regular expression special characters
  • Raw strings
  • About the re module
  • re module functions incl. match, search, findall, full match, split, sub

Day 4

Session 15: DATES

  • About the datetime module
  • datetime object attributes
  • Creating a datetime object
  • Date arithmetic
  • Formatting dates

Session 16: EXCEPTION HANDLING

  • About exceptions and exception handling
  • Handling exceptions (try, except, else, finally)
  • Exception types
  • The exception object
  • Raising exceptions
  • Custom exception types

Session 17: FILES & THE FILESYSTEM

  • The open function
  • Methods for seeking (seekable, seek)
  • Methods for reading from a file (readable, read, readline, readlines)
  • Iterating over a file
  • Methods for writing to a file (writable, write, writelines)
  • Introduction to context managers
  • File parsing for files of type CSV, XML, JSON, YAML
  • About the os module
  • os module functions incl. getcwd, listdir, mkdir, chdir, remove, rmdir etc.
  • Session 18: DATABASES
  • The DB-API
  • DP-API implementations
  • Establishing a connection
  • Creating a cursor
  • Executing a query
  • Fetching results
  • Transactions
  • Inserting, updating, and deleting records

target_au

The Python Programming 1 course is aimed at anyone who wants to learn Python as a first language, and developers/engineers who want to migrate to Python from another language, particularly those with little or no object-oriented knowledge.


pre_req

Students attending this course should be able to define general programming concepts including compilation and execution, variables, arrays, sequence, selection and iteration, navigate the filesystem (on the command line ideally), edit and save text files and browse the web.


titleIntroduction to Python Certification Training
days4
seo_titleIntroduction to Python Certification Course Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overview55284A Python instructional class, understudies provides knowledge on how to program in Python. The course is gone for understudies new to the language who could conceivably have involvement in other programming dialects. This Python course is shown utilizing Python 3; be that as it may, contrasts between Python 2 and Python 3 are noted. For private Python classes, our educator can concentrate explicitly on Python 2 whenever wanted.
objective

After completion of this course, you will learn how to :

  • Understand how Python functions and what it’s useful for
  • Understand Python’s place in the realm of programming dialects
  • Work with and control strings in Python
  • Perform math tasks with Python
  • Work with Python arrangements: records, clusters, word references, and sets
  • Collect client info and yield results
  • Perform stream control preparing in Python
  • Write to and read from records utilizing Python
  • Write works in Python
  • Handle special cases in Python
  • Work with dates and times in Python

outline

Module 1: Python Basics

  • Running Python
  • Hello, World!
  • Literals
  • Python Comments
  • Variables
  • WRiting a Python Module
  • print Function
  • Collecting User Input
  • Getting Help
  • Lab : Exercises in this Lesson
  • Hello, World
  • Exploring Types
  • A Simple Python Script

Module 2: Functions and Modules

  • Defining Functions
  • Variable Scope
  • Global Variables
  • Function Parameters
  • Returning Values
  • Importing Modules
  • Lab : Exercises in this Lesson
  • A Function with Parameters
  • Parameters with Default Values

 

Module 3: Math

  • Arithmetic Operators
  • Assignment Operators
  • Built-in Math Functions
  • The math Module
  • The randon Module
  • Lab : Exercises in this Lesson
  • Floor and Modulus
  • How Many Pizzas Do We Need

Module 4: Python Strings

  • Quotation Marks and Special Characters
  • String Indexing
  • Slicing Strings
  • Concatentaion and Repetition
  • Common String Methods
  • String Formatting
  • Formatted String Literals (f-strings)
  • Built-in String Functions
  • Lab : Exercises in this Lesson
  • Indexing Strings
  • Slicing Strings
  • Repetition
  • Playing with Formatting
  • Getting Acquainted with f-strings
  • Outputting Tab-delimited Text

Module 5: Iterables: Sequences, Dictionaries, and Sets

  • Definitions
  • Sequences
  • Unpacking Sequences
  • Dictionaries
  • The len Function
  • Sets
  • *args and **kwargs
  • Lab : Exercises in this Lesson
  • Remove and Return Random Element
  • Simple Rock, Paper, Scissors Game
  • Slicing Sequences
  • Creating a Dictionary from User Input

Module 6: Flow Control

  • Conditional Statements
  • Loops in Python
  • break and continue
  • The enumerate() Function
  • Generators
  • List Comprehensions
  • Lab : Exercises in this Lesson
  • All True and Any True
  • Word Guessing Game
  • Find the Needle
  • Rolling Dice

Module 7: Virtual Environments

  • Virtual Environmen
  • Lab : Exercises in this Lesson
  • Working with a Virtual Environment

Module 8: Regular Expressions

  • Regular Expression Syntax
  • Python’s Handling of Regular Expressions

Module 9: Unicode and Encoding

  • Bits and Bytes
  • Hexadecimal Numbers
  • Encoding
  • Lab : Exercises in this Lesson
  • Converting Numbers between Number Systems
  • Finding Confusables

Module 10: File Processing

  • Opening Files
  • The os and os.path Modules
  • Lab : Exercises in this Lesson
  • Finding Text in a File
  • Writing to FilesList CreatorAfter completing this module, students will be able to:Read files on the operating system.
  • Create and write to files on the operating system.
  • Access and work with directories on the operating system.
  • Work with the os and os.path modules.

Module 11: Handling

  • Wildcard except Clauses
  • Getting Information on Exceptions
  • The else Clause
  • The finally Clause
  • Using Exceptions for Flow Control
  • Raising your Own Exceptions
  • Exception Hierarchy
  • Lab : Excercises in this Lesson
  • Raising Exceptions
  • Running Sum

Module 12: Python Dates and Times

  • Understanding Time
  • The time Module
  • The datetime Module
  • Lab : Exercises in this Lesson
  • Report on Amtrack Departure Times

Module 13: Running Python Scripts from the Command Line

  • sys.arg
  • sys.path
  • Lab : Exercises in this Lesson
  • Migrating Settings by using Windows Easy Transfer
  • Configuring a Reference Image of Windows 7
  • Configuring a Reference Image

target_au

This course is planned for understudies who need to learn Python. Some programming experience is useful yet not required.


pre_req
  • Some programming experience is useful, yet not required.

titleBeginning Frontend Development with React
days1
seo_titleBeginning Frontend Development with React Training
seo_dec
seo_tkey
categorysoftware-development
vendorMicrosoft

techonogy
overviewThis is a 1 day course packed with the perfect balance of theory and hands-on activities that will help you get started with React. React is widely used to create fast and reusable user interface components. It has been remarkably successful in recent years, since it is easy to use and offers a coherent design model. React's ease of use depends on an actual understanding of the core concepts of the library. By exploiting these concepts, you can build a high-quality design interface. You'll find helpful tips and tricks, as well as useful self-assessment material, exercises, and activities to help benchmark your progress and reinforce what you’ve learned.
objective
  • Create components and combine them together to build other components
  • Use JSX declaratives to describe how a component should look
  • Manage a component’s internal state
  • Manage interaction events
  • Exploit component lifecycle events
  • Manage navigation between high-level components
  • Design user interfaces by making the most of React’s features

outline

Lesson 1: Introducing React and UI Design

  • What is React?
  • How to Set Up a React-Based Application
  • How to Design a UI

Lesson 2: Creating Components

  • Definition of a Component
  • Using JSX
  • Composing Components
  • Data Propagation
  • Managing the Internal State

Lesson 3: Managing User Interactivity

  • Managing User Interaction
  • Component Lifecycle Events

Managing Routing


target_au
pre_req

Hardware

For successful completion of this course, students will require computer systems with the following:

  • Processor: Pentium 4 (or equivalent)
  • 2 GB RAM
  • Hard disk space: 10 GB
  • A projecting device (for the instructor only)
  • An Internet Connection

A keyboard and mouse or other pointing device

Software

  • Operating System: Windows 10 version, 1507
  • The latest version of Node.js (https://nodejs.org/en/)
  • The latest version of Chrome or the penultimate version

titleDeploy and Manage Citrix ADC 13.x with Traffic Management (CNS 225)
days5
seo_titleDeploy and Manage Citrix ADC 13.x with Traffic Management Training
seo_dec
seo_tkey
categoryenterprise-networks-courses
vendorCitrix

techonogyEnterprise Networking
overviewBuild your Citrix ADC knowledge and skills by enrolling in this course. It covers Citrix ADC essentials-- platforms, architecture, licensing and functionality – and also focuses on traffic management, including content switching, traffic optimization and global server load balancing (GSLB). You will learn about key ADC capabilities such as high availability, security and performance, and explore SSL offload, load balancing and monitoring. The traffic management curriculum will cover the AppExpert policy engine, the Rewrite and Responder features, and Content Switching.
objective
  • Understand the functionalities and capabilities of Citrix ADC
  • How to obtain, install, and manage Citrix ADC licenses
  • Comprehend basic ADC network architecture
  • Understand how SSL is used to secure Citrix ADC
  • Optimize the ADC system for traffic handling and management

outline

Module 1: Getting Started

  • Introduction to Citrix ADC
  • Feature and Platform Overview
  • Deployment Options
  • Architectural Overview
  • Setup and Management

Module 2: Basic Networking

  • Networking Topology
  • Citrix ADC Components
  • Routing
  • Access Control Lists

Module 3: ADC Platforms

  • Citrix ADC MPX
  • Citrix ADC VPX
  • Citrix ADC CPX
  • Citrix ADC SDX
  • Citrix ADC BLX

Module 4: High Availability

  • Citrix ADC High Availability
  • High Availability Configuration
  • Managing High Availability
  • In Service Software Upgrade
  • Troubleshooting High Availability

Module 5: Load balancing

  • Load Balancing Overview
  • Load Balancing Methods and Monitors
  • Load Balancing Traffic Types
  • Load Balancing Protection
  • Priority Load Balancing
  • Load Balancing Troubleshooting

Module 6: SSL Offloading

  • SSL Overview
  • SSL Configuration
  • SSL Offload
  • Troubleshooting SSL Offload
  • SSL Vulnerabilities and Protections

Module 7: Security

  • Authentication, Authorization, and Auditing
  • Configuring External Authentication
  • Admin Partitions

Module 8: Security

  • Citrix ADC Logging
  • Monitoring with SNMP
  • Reporting and Diagnostics
  • AppFlow Functions
  • Citrix Application Delivery Management
  • Troubleshooting

Module 9: Advanced Policies

  • Default Policy Overview
  • Default Expression Syntax
  • Policy Bindings
  • AppExpert Additional Features

Module 10: Rewrite Responder URL Transformation

  • Rewrite Policies
  • Responder Policies
  • DNS Rewrite and Responder
  • URL Transformation

Module 11: Content Switching

  • Content Switching Overview
  • Content Switching Configuration

Module 12: Optimization

  • Citrix ADC Optimization Overview
  • HTTP Compression
  • Integrated Caching
  • Front-End Optimization

Module 13: Global Server Load Balancing

  • GSLB Overview
  • GSLB Architecture
  • Content-Switching GSLB
  • GSLB MEP and Monitoring
  • Customizing GSLB

target_au

Built for IT Professionals working with Citrix ADC, with little to no previous ADC experience. Potential students include administrators, engineers, and architects interested in learning how to implement and manage Citrix ADC features using leading practices.


pre_req

This course requires little to no previous experience with Citrix ADC; however, Citrix recommends a basic understanding of of TCP/IP, HTTP, and of the OSI model, network devices, and networking protocols.


titleVMware Horizon 8: Infrastructure Administration [V8.0]
days2
seo_titleVMware Horizon 8: Infrastructure Administration Training
seo_dec
seo_tkey
categorydesktop-mobility
vendorVMware

techonogyWireless
overviewThis two days, hands-on course gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon® through a combination of lecture and hands-on labs. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Identify Horizon Connection Server installation, architecture, and requirements.
  • Describe the authentication and certification options for a Horizon environment.
  • Recognize the integration process and benefits of VMware Workspace ONE® Access™ and Horizon 8.
  • Discuss performance and scalability options available in Horizon 8.
  • Describe different security options for the Horizon environment.

outline

Module 1: Course Introduction

  • Introductions and course logistics
  • Course objectives

 

Module 2: Horizon Connection Server

  • Recognize VMware Horizon reference architecture
  • Identify the Horizon Connection Server supported features
  • Identify the recommended system requirements for Horizon Connection Server
  • Configure Horizon event database
  • Outline the steps for the initial configuration of Horizon Connection Server
  • Discuss the ADAM database as a critical component of Horizon Connection Server installation

 

Module 3: VMware Horizon Authentication and Certificates

  • Compare the authentication options that Horizon Connection Server supports
  • Describe the Smartcard authentication options that Horizon Connection Server supports
  • Outline the steps to create a Horizon administrator and custom roles
  • Describe the roles available in a Horizon environment
  • Explain the role that certificates play for Horizon Connection Server
  • Install and configure certificates for Horizon Connection Server
  • Install and configure True SSO in a Horizon environment

 

Module 4: Workspace ONE Access & Virtual Application Management

  • Recognize the features and benefits of Workspace ONE Access
  • Recognize the Workspace ONE Access console features
  • Explain identity management in Workspace ONE Access
  • Explain access management in Workspace ONE Access
  • Describe the Workspace ONE Access directory integration
  • Describe the Workspace ONE Access directory integration
  • Deploy virtual applications with Workspace services

 

Module 5: VMware Horizon Performance and Scalability

  • Describe the purpose of a replica connection server
  • Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
  • Describe the 3D rendering options available in Horizon 8
  • List the steps to configure graphics cards for use in a Horizon environment
  • Configure a load balancer for use in a Horizon environment
  • Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
  • Explain Horizon Cloud Pod Architecture scalability options

 

Module 6: Managing VMware Horizon Security

  • Explain concepts relevant to secure Horizon connections
  • Describe how to restrict Horizon connections.
  • Discuss the benefits of using Unified Access Gateway
  • List the two-factor authentication options that are supported by Unified Access Gateway
  • List Unified Access Gateway firewall rules
  • Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces

target_au

The primary audience for this course is as follows:

  • Administrators and architects for VMware Horizon should enroll in this course. These individuals are responsible for the implementation, maintenance, and administration of an organization’s end-user computing infrastructure.

pre_req

For attending this course you should have these VMware infrastructure skills:

  • Use VMware vSphere® Web Client to view the state of virtual machines, datastores, and networks.
  • Open a virtual machine console on VMware vCenter Server® and access the guest operating system.
  • Create snapshots of virtual machines.
  • Configure guest customization specifications.
  • Modify virtual machine properties.
  • Convert a virtual machine into a template.
  • Deploy a virtual machine from a template.

 

Students should also have the following Microsoft Windows system administration experience:

  • Configure Active Directory services, including DNS, DHCP, and time synchronization.
  • Restrict user activities by implementing Group Policy objects.
  • Configure Windows systems to enable Remote Desktop Connections.
  • Build an ODBC connection to an SQL Server database.

titlePython NETPYA: Network Automation with Python and Ansible
days4
seo_titlePython NETPYA: Network Automation with Python and Ansible Course Training
seo_dec
seo_tkey
categorynetworking
vendorVendor Neutral

techonogyEnterprise Networking
overviewThis course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day’s topics and demonstrations. Class is appropriate for those interested in automation, specifically network automation, and those looking to marry a Python and Ansible skillset.
objective
outline

Critical Python Catchup & Review

  • Overview of Python and Ansible
  • Python white space rules & best practices
  • Printing and more Printing
  • Date types and Variables
  • Packing and Unpacking Variables
  • f Strings
  • Conditional expressions
  • Relational and Boolean operators
  • Lists, Tuples, Dictionaries
  • Indexing and slicing
  • Built-in functions
  • Iterating with Loops (for and while)
  • Working with files
  • Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.)
  • Using Python to access REST interfaces
  • Working with JSON
  • Python, Ansible and Paramiko
  • Using Paramiko to SSH with keys and passwords
  • RESTful API review
  • API keys
  • Paramiko Review
  • Using Paramiko to SFTP with keys and passwords

 

Python and Network Automation

  • Introduction to Netmiko (automating routers and switches)
  • Using Netmiko to send commands to / from network devices
  • Working with YAML
  • Converting JSON to YAML with Python
  • Ansible keywords
  • YAML and JSON for data exchange
  • Ansible and YAML
  • Ansible Playbook components
  • Tying together Python and Ansible – Using Python within Ansible
  • Ansible Network Modules
  • What is new in Ansible (most current updates / release notes)
  • Network Agnostic modules
  • Writing network playbooks
  • Reviewing the construction of network playbooks
  • Writing Ansible playbooks that respond to network failures

 

Blending Python and Ansible Skillsets

  • Review how to use Python within Ansible
  • Calling Python scripts with Ansible
  • Jinja2 Templating Engine for Python (and Ansible)
  • Using Templates in Ansible playbooks
  • Jinja2 filters, looping, and other useful tricks for automating with Ansible
  • Playbook tagging for selective runs
  • When to use Python and when to use Ansible
  • “Big Picture” options for using Python & Ansible within your Network
  • Ansible Roles

 

Customizing Ansible with Python

  • Review – Running Scripts with Ansible
  • Prompting for Ansible user input
  • Ansible Galaxy & Getting at Roles
  • Writing a custom Ansible Module with Python
  • Ansible “Engine” vs Ansible “Tower” – marketing hype, capabilities, costs, etc.
  • Case Study: Automate your Enterprise Network
  • When to use Python and when to use Ansible
  • Writing your own Ansible modules in Python
  • “Big Picture” options for using Python & Ansible within your Network
  • Overview – NETCONF / YANG and what they mean for Python and Ansible
  • Molecule – Testing your roles

 

Lab Outline

  • Lab 0 – Setting up the Admin PC for Development
  • Lab 1 – Build your First Python Script
  • Lab 2 – More Python
  • Lab 3 – Strings in Python
  • Lab 4 – Using argv
  • Lab 5 – Lists and Dictionaries
  • Lab 6 – Loops and if-else
  • Lab 7 – Defining a Function
  • Lab 8 – Using Python Scripting and the REST API
  • Lab 9 – Telnetib (Optional)
  • Lab 10 – Paramiko
  • Lab 11 – Netmiko
  • Lab 12 – Ansible Installation
  • Lab 13 – Verify the Ansible Installation
  • Lab 14 – CSRX-1 SSH Connectivity
  • Lab 15 – Cisco IOS Show Command Execution with Ansible
  • Lab 16 – Configuration Changes with Ansible
  • Lab 17 – Create a Custom Module for Ansible
  • Lab 18 – Installing and Using a Role from Galaxy
  • Lab 19 – Ansible and Jinja2 Templating
  • Lab 20 – Integrating Template Instantiation and Device Synchronization into a Playbook

target_au

The primary audience for this course is as follows:

  • Network Administrators
  • Administrators interested in Automation
  • Individuals interested in devops, specifically for networking

pre_req
titleCLCNF v1.0 – Implementing Cisco Collaboration Conferencing
days5
seo_titleCLCNF - Implementing Cisco Collaboration Conferencing Course Training
seo_dec
seo_tkey
categoryunified-communications
vendorCisco

techonogyCollaboration
overviewThe Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco® on-premises conferencing architecture and solutions. You will get knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.
objective

This class will help you:

  • Learn how to configure and troubleshoot on-premises conferencing solutions with Cisco Meeting Server.
  • Integrate on-premises conferencing solutions with other collaboration components to meet the needs of modern-day workplaces.

After taking this course, you should be able to:

  • Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing
  • Describe the physical deployment options and deployment models for Cisco Meeting Server, including Cisco Meeting Server 1000, 2000, and virtual machine
  • Configure a Cisco Meeting Server single combined deployment for Web-Real Time Communications (WebRTC) endpoints within the enterprise
  • Use APIs and the Cisco Meeting Server API Guide to configure profiles using Postman and the Webadmin API tool
  • Configure a scalable and resilient deployment of Cisco Meeting Server with three servers for WebRTC endpoints within the enterprise
  • Configure a scalable and resilient deployment of Cisco Meeting Server to support standard Session Initiation Protocol (SIP) and WebRTC connectivity outside the enterprise
  • Configure a scalable and resilient deployment of Cisco Meeting Server to support recording and streaming of conferences
  • Configure Cisco Unified Communications Manager and Cisco Meeting Server to support Rendezvous, Scheduled, and Ad-hoc conferencing for Cisco Unified CM registered endpoints
  • Configure Cisco Meeting Server to integrate with a preconfigured on-premise Microsoft Skype for Business installation
  • Install Cisco TelePresence Management Suite (Cisco TMS) and Cisco TelePresence Management Suite for Microsoft Exchange (Cisco TMSXE) on a single Microsoft Windows 2012 server and connect to an existing SQL environment
  • Install and integrate Cisco Meeting Management with Cisco TMS and Cisco Meeting Server
  • Set up and manage a scheduled conference with Cisco TMS and Cisco Meeting Management
  • Capture and analyze logs from Cisco Meeting Server and Cisco Meeting Manager to diagnose faults, including a SIP connection error

outline
  • Describing Cisco Conferencing Architecture
  • Configuring a Single Combined Deployment
  • Installing Cisco Meeting Server
  • Using APIs with Cisco Meeting Server
  • Configuring a Cisco Meeting Server Scalable and Resilient Deployment
  • Configuring Business to Business (B2B) and WebRTC Firewall Traversal Connectivity for Cisco Meeting Server
  • Configuring Recording and Streaming with Cisco Meeting Server
  • Troubleshooting Cisco Meeting Server
  • Integrating Cisco Meeting Server with Cisco Unified CM
  • Integrating Cisco Meeting Server with Microsoft Skype for Business
  • Installing and Operating Cisco TMS and Cisco TMSXE
  • Installing and Integrating Cisco Meeting Management

Lab Practice

  • Cisco Meeting Server Initial Configuration
  • Cisco Meeting Server Single Combined Deployment
  • Install a Cisco Meeting Server Virtual Machine
  • Using Postman with Cisco Meeting Server
  • Using Cisco Meeting Server Webadmin API Tool
  • Cluster Cisco Meeting Server Databases
  • Cluster Cisco Meeting Server Call Bridges
  • Configure Cisco Meeting Server Distributed Spaces and Active Directory
  • Configure Cisco Meeting Server Scalable and Resilient Web Bridges
  • Configure External WebRTC Connectivity for Cisco Meeting Server
  • Configure External B2B Connectivity for Cisco Meeting Server
  • Configure Cisco Meeting Server Recording
  • Capturing Log Files in Cisco Meeting Server
  • Troubleshoot Cisco Meeting Server
  • Configure Cisco Meeting Server Integration with Cisco Unified CM Using a SIP Trunk
  • Configure Cisco Meeting Server Integration with Cisco Unified CM as a Conference Resource
  • Install, Upgrade, and Maintain Cisco TMS and TMSXE
  • Configure Cisco TMS for Scheduled Conferences
  • Manage Endpoints in Cisco TMS Part 1
  • Manage Endpoints in Cisco TMS Part 2
  • Cisco Meeting Management Initial Installation
  • Integrate Cisco Meeting Management
  • Manage Conferences in Cisco TMS and Cisco Meeting Management
  • Specific Lab Issues

target_au
  • Deployment engineer
  • Network engineer
  • Sales engineer

pre_req

o fully benefit from this course, you should have the following knowledge:

  • PC skills
  • Addition and management of devices and users in Cisco Unified CM
  • SIP signaling fundamentals
  • Video endpoint operation and configuration
  • Management of media resources in Cisco Unified CM
  • Familiarity with Cisco Expressway ideal but not required
  • Familiarity with APIs ideal but not required

Recommended Cisco offerings that may help you meet these prerequisites:

  • Cisco Collaboration Fundamentals (CLFNDU)
  • Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
  • Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)

titleVMware vSphere: Install, Configure, Manage [V7]
days5
seo_titleVSICM70 - VMware vSphere: Install, Configure, Manage [V7.0] Course Training
seo_dec
seo_tkeyVSICM70
categorydatacenter-courses
vendorVMware

techonogyDatacenter & Virtualization
overviewThis course features hands-on training on installing, configuring, and managing VMware vSphere® 7, which includes VMware ESXi™ 7 and VMware vCenter Server® 7. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most of the other VMware technologies in the software-defined data center. Certifications: Attending this course meets the training requirement to achieve the following certification:
objective
  • Describe the software-defined data center (SDDC)
  • Explain the vSphere components and their function in the infrastructure
  • Describe the benefits and capabilities of VMware Skyline
  • Install and configure ESXi hosts
  • Deploy and configure VMware vCenter® Server Appliance™
  • Use VMware vSphere® Client™ to manage the vCenter Server inventory and the vCenter Server configuration
  • Manage, monitor, back up, and protect vCenter Server Appliance
  • Create virtual networks with vSphere standard switches
  • Describe the storage technologies supported by vSphere
  • Configure virtual storage using iSCSI and NFS storage
  • Create and manage VMware vSphere® VMFS datastores
  • Use the vSphere Client to create virtual machines, templates, clones, and snapshots
  • Create a content library and deploy virtual machines from templates in the library
  • Manage virtual machine resource use
  • Migrate virtual machines with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
  • Create and manage a vSphere cluster that is enabled with VMware vSphere® High Availability and VMware vSphere® Distributed Resource Scheduler™
  • Discuss solutions for managing the vSphere life cycle
  • Use VMware vSphere® Lifecycle Manager™ to perform upgrades to ESXi hosts and virtual machines

outline

Course Introduction

  • Introductions and course logistics
  • Course objectives

Introduction to vSphere and the Software-Defined Data Center

  • Explain basic virtualization concepts
  • Describe how vSphere fits into the software-defined data center and the cloud infrastructure
  • Explain how vSphere interacts with CPUs, memory, networks, and storage
  • Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts
  • Describe the ESXi host architecture
  • Navigate the Direct Console User Interface (DCUI) to configure an ESXi host
  • Recognize ESXi host user account best practices
  • Install an ESXi host
  • Use VMware Host Client™ to configure ESXi host settings
  • Describe how to proactively manage your vSphere environment using VMware Skyline

Virtual Machines

  • Create and provision a virtual machine
  • Explain the importance of VMware Tools™
  • Install VMware Tools
  • Identify the files that make up a VM
  • Recognize the components of a VM
  • Recognize virtual devices supported by a VM
  • Describe the benefits and use cases for containers
  • Identify the parts of a container system

vCenter Server

  • Describe the vCenter Server architecture
  • Discuss how ESXi hosts communicate with vCenter Server
  • Deploy and configure vCenter Server Appliance
  • Use vSphere Client to manage the vCenter Server inventory
  • Add data center, organizational objects, and hosts to vCenter Server
  • Use roles and permissions to enable users to access objects in the vCenter Server inventory
  • Back up vCenter Server Appliance
  • Monitor vCenter Server tasks, events, and appliance health
  • Use VMware vCenter Server® High Availability to protect a vCenter Server Appliance

Configuring and Managing Virtual Networks

  • Create and manage standard switches
  • Describe the virtual switch connection types
  • Configure virtual switch security, traffic-shaping, and load-balancing policies
  • Compare vSphere distributed switches and standard switches

Configuring and Managing Virtual Storage

  • Identify storage protocols and storage device types
  • Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage
  • Create and manage VMFS and NFS datastores
  • Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage
  • Recognize the components of a VMware vSAN™ configuration

Virtual Machine Management

  • Use templates and cloning to deploy new virtual machines
  • Modify and manage virtual machines
  • Create a content library and deploy virtual machines from templates in the library
  • Use customization specification files to customize a new virtual machine
  • Perform vSphere vMotion and vSphere Storage vMotion migrations
  • Describe the Enhanced vMotion Compatibility feature
  • Create and manage virtual machine snapshots
  • Examine the features and functions of VMware vSphere® Replication™
  • Describe the benefits of VMware vSphere® Storage APIs – Data Protection

Resource Management and Monitoring

  • Discuss CPU and memory concepts in a virtualized environment
  • Describe what over commitment of a resource means
  • Describe methods for optimizing CPU and memory usage
  • Use various tools to monitor resource use
  • Create and use alarms to report certain conditions or events

vSphere Clusters

  • Describe the functions of a vSphere DRS cluster
  • Create a vSphere DRS cluster
  • Monitor a vSphere cluster configuration
  • Describe options for making a vSphere environment highly available
  • Explain the vSphere HA architecture
  • Configure and manage a vSphere HA cluster
  • Examine the features and functions of VMware vSphere® Fault Tolerance
  • Describe the function of the vSphere® Cluster Service

vSphere Lifecycle Management

  • Recognize the importance of vCenter Server Update Planner
  • Describe how VMware vSphere® Lifecycle Manager™ works
  • Describe how to update ESXi hosts using baselines
  • Validate ESXi host compliance using a cluster image
  • Describe how to upgrade VMware Tools and VM hardware
  • Describe VMware vSphere® Lifecycle Manager™ and VMware vSAN™ integration

target_au
  • System administrators
  • System engineers

pre_req
  • System administration experience on Microsoft Windows or Linux operating systems

titleACUCM/AUC v12.5 – Administering Cisco Unified Communication Manager and Unity Connection
days5
seo_titleACUCM/AUC - Administering Cisco Unified Communication Manager and Unity Connection Course Training
seo_dec
seo_tkey
categorynetworking
vendorCisco

techonogyEnterprise Networking
overview

Administering Cisco Unified Communications Manager (ACUCM) v12.5 provides system administrators and networking professionals with an understanding of the Cisco Unified Communications Manager System. This course teaches the concepts of IP telephony based in system administration, including its function, features, and configuration. This is an entry-level course that begins with the basic concepts of IP telephony and very quickly moves the learner forward into an understanding of system concepts: clustering, creation of phones and users, route plans, digit manipulation, media resources, and phone features, which are all important to supporting IP telephony in the enterprise network


objective
outline

Module 1: Introduction to IP Telephony

  • Exploring IP Telephony
  • Describing Deployment Models
  • Understanding Advanced Multisite Features

Module 2: Defining the Basic Configuration

  • Logging In to Cisco Unified Communications Manager
  • Examining Basic Server Configuration
  • Describing Multilevel Administration
  • Configuring DRS Backup and Restore Procedures

Module 3: User Administration

  • Understanding User Configuration
  • Using the User Web Pages

Module 4: Exploring Phone Registration and Cisco Unified IP Phones

  • Configuring System Parameters
  • Supporting Cisco Unified IP Phones
  • Exploring Phone Registration and IP Phone Communications
  • Utilizing the Bulk Administration Tool (BAT)

Module 5: Basic Route Plan Configuration

  • Implementing Dial Plan Connectivity
  • Creating Route Plans

Module 6: Route Filters and Digit Manipulation

  • Configuring Translation Patterns and Route Filters
  • Implementing Digit Manipulation

Module 7: Class of Control

  • Defining Class of Control
  • Using Class of Control Features

Module 8: Understanding Media Resources

  • Defining Media Resources
  • Exploring Media Resource Management

Module 9: Features and Services

  • Describing Basic Features
  • Exploring Hunt Groups
  • Describing Phone Services

Labs for ACUCM:

  • Lab 2-1: Navigating Cisco Unified Communications Manager
  • Lab 2-2: Configuring CUCM Basic Settings
  • Lab 3-1: Working with User Accounts
  • Lab 4-1: Configuring the System to Support Cisco IP Phones and Jabber Clients
  • Lab 4-2: Using the CUCM Bulk Administration Tool to Add Phones
  • Lab 5-1: Configuring Basic Dial Plan Elements
  • Lab 6-1: Configuring Simple Digit Manipulation in CUCM
  • Lab 7-1: Implementing Calling Privileges and Restrictions
  • Lab 8-1: Configuring Media Resources, MeetMe and Conference Now
  • Lab 9-1: Configuring User Features, Call Pickup and Intercom
  • Lab 9-2: Configuring Hunt Groups and Call Coverage

 

Appendix: Integrating CUCM with Cisco Unity Connection Voice-Mail AUC

Module 1: Introduction to Cisco Unity Connection

  • Overview of Cisco Unity Connection
  • Navigating Cisco Unity Connection
  • Understanding Call Handlers, Users, and Call Flow

Module 2: Configuration of Users and Contacts

  • Explaining Users and Contacts
  • Managing Multiple Users

Module 3: Implementation of Features

  • Implementing the Dial Plan
  • Understanding User Features
  • Accessing Voice Messaging and User Features
  • Managing Distribution Lists

Module 4: Use of Cisco Unity Connection Applications, Tools and Reports

  • Designing an Audiotext Application
  • Using Cisco Unity Connection Tools and Reports
  • Using the DRS

Labs for AUC:

  • Lab 1-1: Verifying Connectivity and Call Flow
  • Lab 1-2: Verifying and Configuring Call Handlers
  • Lab 1-3: Working with Users and Extensions in Voice Mail
  • Lab 2-1: Preparing to Configure Users and Contacts
  • Lab 2-2: Managing Users and Contacts
  • Lab 2-3: Managing Multiple Users
  • Lab 3-1: Implementing the Dial Plan
  • Lab 3-2: Understanding User Features
  • Lab 3-3: Implementing Integrated Messaging and User Features
  • Lab 4-1: Implementing an Audiotext Application
  • Lab 4-2: Using Cisco Unity Connection Tools and Reports

target_au

The course is geared to individuals that will be using and managing the system and performing administration for Level 1 and Level 2 support. Level 1 support is geared toward supporting phone users and making moves, adds, and changes to the desktop phone environment. Level 2 support is oriented to supporting changes in the organization, such as opening new office locations or relocating departments.

The course does not cover issues of initial deployment, new cluster deployment or international deployments.

Also, the course does not cover issues with the underlying network that involve routers, switches, or Cisco IOS software configuration.


pre_req
  • Basic knowledge of IP and networking or voice networks is suggested, but not required
  • Basic knowledge of the Windows desktop environment
  • Basic understanding of fundamental terms and concepts of computer networking, including LANs, WANs, and IP switching and routing
  • Basic knowledge of traditional PSTN operations and technologies, including PBX and voice-mail administration tasks
  • Basic understanding of Cisco Unified Communications Manager

titleDCIHX – Implementing Cisco HyperFlex v1.3
days4
seo_titleDCIHX - Implementing Cisco HyperFlex Course Training
seo_dec
seo_tkey
categoryhyperflex
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Cisco HyperFlex (DCIHX) v1.3 course shows you how to deploy and use the Cisco® HyperFlex™ data platform to support multicloud workloads. You will become familiar with HyperFlex components and learn how to install, design, manage, and troubleshoot Cisco HyperFlex to support highly scalable and resilient multicloud implementations. You will also gain hands-on experience focused on installation, management, maintenance, and native replication, and you will explore cluster technologies as well as Cisco Intersight.™
objective
  • Describe hyperconvergence, Cisco HyperFlex, and the components of Cisco HyperFlex
  • Explain the Cisco Unified Computing System™ (Cisco UCS®) and what makes it valuable to business
  • Describe how Cisco HyperFlex Data Platform (HXDP) works
  • Describe the physical components of Cisco HyperFlex
  • Describe Cisco Intersight and introduce functionalities relevant to HyperFlex
  • Install standard ESXi-based vSphere Cisco HyperFlex
  • Manage your Cisco HyperFlex VMware ESXi-based cluster
  • Describe how to maintain Cisco HyperFlex
  • Design a Cisco HyperFlex solution
  • Protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption
  • Describe a stretched cluster and how is it different from a standard cluster
  • Describe an Edge cluster and how is it different from a standard cluster
  • Perform basic troubleshooting tasks and explain Cisco Intersight

outline

Introducing Hyperconvergence and Cisco HyperFlex

  • Traditional Data Center Design
  • What Is Hyperconvergence?

Describing Cisco UCS: The Foundation of Cisco HyperFlex

  • Cisco Server Deployment Models: Standalone Versus Managed
  • Cisco UCS Managed Model Benefits

Describing Cisco HyperFlex Software Components

  • Virtual Machine Hypervisor
  • Log-Structured File System

Describing Cisco HyperFlex Hardware Components

  • Introducing Cisco HyperFlex Servers
  • Storage Technologies in Cisco HyperFlex

Introducing Cisco Intersight

Installing and Expanding Standard ESXi Cisco HyperFlex

  • Installation Summary
  • Software Prerequisites

Managing Cisco HyperFlex in vSphere Environment

  • Management Interfaces Overview
  • Cisco HyperFlex Plugin for vCenter

Maintaining Cisco HyperFlex

  • Cisco HyperFlex Upgrade Overview
  • Cisco HyperFlex Online Upgrade

Designing Cisco HyperFlex

  • Cluster Resiliency: VM-Level
  • Cluster Resiliency: HXDP-Level

Protecting Your Data

  • Disaster Recovery Overview
  • Third-Party Data Restore Solutions

Introducing Cisco HyperFlex Stretched Deployment

  • Stretched Cluster Overview
  • Prerequisites

Introducing Cisco HyperFlex EDGE

  • Cisco HyperFlex EDGE Cluster Overview
  • Prerequisites and Recommendations

Troubleshooting Cisco HyperFlex

  • Troubleshooting Guidelines
  • Generating Tech Support Bundles

Lab outline

  • Investigate Software Components of Cisco HyperFlex
  • Investigate Cisco UCS Part of HyperFlex
  • Investigate Cisco Intersight
  • Install Cisco HyperFlex
  • Manage Cisco HyperFlex
  • Protect Your HyperFlex VMs
  • Investigate Stretched Group
  • Install and Manage Stretched HyperFlex Group
  • Investigate HyperFlex Edge

target_au
  • Data center engineers
  • Engineers (design, implementation, pre sales, post sales)
  • Product managers and sales

pre_req

To fully benefit from this course, you should have the following knowledge:

  • Cisco CCNA®–level knowledge about data center architecture and products technologies (network, compute, storage network)
  • Familiarity with VMware vCenter and ESXi
  • Familiarity with public cloud offerings, primarily AWS, but also Azure and GCP

Recommended Cisco learning offerings that may help you meet these prerequisites:

  • Understanding Cisco Data Center Foundations (DCFNDU)
  • Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
  • Introducing Cisco Data Center Technologies (DCICT)
  • Cisco CCNP Data Center specialization modules: DCID, DCIT, DCACI, DCSAN, DCACIA, DCAUTO.

titleC98WF6 – Configuring Cisco Catalyst 9800 and Intro to WIFI6
days3
seo_titleC98WF6 - Configuring Cisco Catalyst 9800 and Intro to WIFI6 Course Training
seo_decThis course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
seo_tkeyC98WF6
categorywireless-courses
vendorInsoft Specials

techonogyWireless
overviewC98WF6 - Configuring Cisco Catalyst 9800 and Intro to WIFI6 course provides knowledge regarding how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits. This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.
objective

After completing this course you should be able to:

  • Describe Cisco Catalyst 9800
  • Understand the Benefits for Catalyst 9800
  • Configure Catalyst 9800
  • Migrate to the Catalyst 9800
  • Troubleshoot the Catalyst 9800
  • Understand and Discuss WIFI6

outline

Introduction

  • Cisco Catalyst 9800 Overview
  • Intent Based Networking (IBN)
  • Cisco Catalyst Next Gen Wireless Architecture
  • Cisco Catalyst 9800 Wireless – Platform Support

Cisco Catalyst 9800 Wireless Controller Appliances

  • Cisco Catalyst 9800 Wireless Controller Series: C9800-80-K9
  • Cisco Catalyst 9800 Wireless Controller Series: C9800-40-K9
  • Cisco Catalyst 9800 Wireless Controller Cloud Series: C9800-CL-K9

Cisco Catalyst 9800 use in Private and Public Cloud Environments

  • Private
  • Public
  • Hybrid

What is WiFi 6 and Why do we need it?

  • Use Cases – how WiFi 6 will change Buisness and Industry
  • WIFI6 technical – a leap from previous WiFi technologies
  • Design Considerations
  • Cisco WiFi6 Portfolio and Interoperability
  • Configure WiFi6 on Cat 9800

Cisco Catalyst 9800 Series Embedded Controller for SDA

  • SD-Access Everywhere
  • Wireless Assurance with DNA Center
  • Catalyst 9800 SD-Access Wireless
  • Catalyst 9800 SD-Access Embedded Wireless Controllers

High Availability

  • Reducing downtime for Upgrades and Unplanned Events
  • High Availability (Client SSO)
  • High Availability (AP & Client SSO)

Software Updates

  • Software Updates
  • SSO
  • Patching
  • Rolling Upgrades
  • Wireless Controller SMU
  • Rolling AP Update
  • Image Upgrade

Programmability and Telemetry

  • Flexible management options with Cisco Catalyst 9800 Wireless Controllers
  • Wireless Programmability “Stack”
  • Config vs Operational YANG data models
  • Model Driven Telemetry
  • Security and Threat Detection
  • Intent-based wireless networks Security
  • Security and Threat Mitigation

Catalyst 9800 Wireless Controller Configuration Model

  • New Configuration Model
  • AireOS vs. Catalyst 9800 Config Model
  • Catalyst 9800 Config Model

Wireless Basic Setup

  • Wireless Basic Configuration Model
  • Adding Local Site
  • Adding Remote Site
  • Provisioning APs to Site
  • Day 0
  • AP PnP

Wireless Advanced

  • Guided UI Configuration Workflow
  • WLAN Profile
  • Policy Profile
  • AP Join profile
  • RF Profile
  • Static and Rule-Based AP Tagging

Migration

  • AireOS Config Translator
  • Using the Tool
  • Migration using Prime
  • AireOS Config Translator on PI 3.5

Troubleshooting

  • IOS-XE logging architecture
  • Packet tracing and packet captures
  • Embedded Packet Capture web interface
  • Useful commands and tools

Lab Outline:

  • Configure Windows 10 Client Access
  • Configure Centralized WLAN Deployment with Catalyst 9800
  • Configure Security in Centralized WLAN Deployment with Catalyst 9800 using ISE
  • Configuring Guest Access using Catalyst 9800 and Anchor AirOS
  • Implement Flex-Connect WLAN Deployment with Catalyst 9800
  • High Availability SSO with Catalyst 9800
  • Migrating Configuration from AireOS to Catalyst 9800 WLC using WebUI and Prime Infrastructure
  • Catalyst 9800 Software Upgrade

target_au

The primary audience for this course is as follows:

  • Cisco Partners and customers interested in the Catalyst 9800 wireless controller

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Understanding of Wi-Fi technologies (CCNA Level)

titleINCVDO – Cisco CyberVision Deployment & Operation
days3
seo_titleINCVDO - Cisco CyberVision Deployment & Operation Course Training
seo_decINCVDO, Cisco CyberVision Deployment and Operation, is a 3-day instructor-led course. Security is every enterprise€™s top priority in today€™s connected world and keeping enterprise architecture secure will protect business values and outcomes.
seo_tkeyINCVDO
categorydata-center-security
vendorInsoft Specials

techonogySecurity
overviewINCVDO, Cisco CyberVision Deployment and Operation, is a 3 days instructor-led course. Security is every enterprise’s top priority in today’s connected world and keeping enterprise architecture secure will protect business values and outcomes. Thus, a critical element to the success of any network is ensuring and maintaining security – it’s a need that is applicable to all networks and network devices, including those that power Cisco Internet of Things technologies and solutions. In an effort to simplify cybersecurity and increase device visibility within systems utilized by our IoT customers and partners, Cisco introduces Cisco Cyber Vision – a software cybersecurity solution for Operations Technology (OT). This course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays IoT Extended Enterprise and IT – OT integration using Cyber Vision. The goal of this course is to help the student understand the types of attacks, the types of targets and the tools available to protect the Industrial IoT architecture and to use Cyber Vision to keep the IoT infrastructure safe. Practical skills will be achieved using real-world scenarios and examples in a lab developed for such a purpose. Cisco Cyber Vision provides organizations the ability to gain visibility into industrial environments including full details of what assets are on the network, how those assets are communicating, and application level understanding of operational information. As a result, Cisco Cyber Vision provides views and capabilities, including integrations, that can be leveraged by security teams, IT infrastructure teams, and operational teams to ensure system integrity and protect against cyber risks.
objective
  • Explain the common vulnerabilities in the IoT deployments.
  • Explain the cybersecurity approach for IoT architectures.
  • Define the Cyber Vision main concepts.
  • Describe Cyber Vision solution portfolio.
  • Describe and use the Cyber Vision GUI.
  • Identify and explain Cyber Vision Installation and Support procedures.
  • Define Cyber Vision Assessment.
  • Identify Cyber Vision Assessment components.
  • Explain and use Cyber Vision Asset solution.
  • Describe and use Cyber Vision API for Automation.
  • Identify Cyber Vision use cases.

outline

Industrial Internet of Things Security Threats

  • Describe security threats and potential impacts on the network
  • Understand the security challenges faced by the IIoT staff on a daily basis
  • Explain why Cisco Validated Designs lead to a more secure infrastructure
  • Describe security threats in the Extended Enterprise network

Introducing Cyber Vision

  • Cybersecurity overview in IIoT deployments
  • Cyber Vision overview
  • Cyber Vision solution components
  • Cyber Vision installation procedure

Cyber Vision Concepts

  • Preset
  • Filters
  • Component
  • Activity
  • Flow
  • Time span
  • Tags
  • Properties
  • Vulnerabilities
  • Events
  • Credentials
  • Variable accesses

Cyber Vision GUI Exploration

  • General Dashboard
  • Preset Views
  • Panels
  • Reports
  • Events
  • Monitor
  • Search
  • Admin
  • Systems Statistics
  • My Settings

Cyber Vision Operation

  • Using General Dashboard
  • Explore Preset Views and Panels
  • Examine and generate Reporting features
  • Working with Events, Alerts and Audits.
  • Using Monitor Mode and its Views
  • Describing and Exploring Monitor Mode Differences
  • Creating Baselines from default preset and from groups
  • Defining with Weekend Baselines
  • Enabling and using Baselines
  • Cyber Vision Use Cases
  • Administering Cyber Vision System and Data Management
  • Cyber Vision Center and Sensors general administration
  • Administering Users
  • Administering Events
  • Administering Licensing
  • Working with RBAC and LDAP Settings
  • Exploring and using Cyber Vision API
  • Cyber Vision Context Information Exchange with pxGrid
  • IDS functionality with SNORT
  • Cyber Vision Integrations and Extensions
  • Working with My Settings

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco Security.
  • Sound knowledge of Internet of Things Concepts.
  • Sound knowledge of IIoT Architectures.

titleNXEWS – Networking Express for Engineers Workshop
days2
seo_titleNXEWS - Networking Express for Engineers Workshop Course Training
seo_decThis Cisco Express Networking training course does require some fundamental knowledge. Students should be familiar with network operation, basic network security, and wireless.
seo_tkeyNXEWS
categorynetworking
vendorInsoft Specials

techonogyEnterprise Networking
overviewWith NXEWS - Networking Express for Engineers Workshop course, you will get knowledge on Meraki technologies as a point of entry into the Cisco portfolio and gain exposure to foundational Cisco technologies. This Cisco Express Networking training course does require some fundamental knowledge. Students should be familiar with network operation, basic network security, and wireless. Course modules cover Cisco Networking, Portfolio and Switching Solutions, Routing Portfolio and Solutions, Wireless Portfolio and Solutions, Security Portfolio and Solution, and more. This Networking Express for Engineers Workshop is intended for channel partners. Find additional course information below!
objective

After you complete this course you should be able to pass the Networking Express for Engineers exam which includes:

  • Describe and explain networking express
  • Describe, explain, and identify switching product portfolio
  • Explain and identify switching positioning
  • Describe and explain routing features
  • Describe and explain Mobility Express features
  • Explain and identify wireless tools and resources
  • Describe, explain, and identify security product portfolio
  • Describe, explain, and identify Cisco Active Advisor SE programs
  • Describe, explain, and identify FindIT SE programs
  • Describe and explain Meraki cloud architecture design
  • Describe and explain Meraki datacenter reliability and security
  • Describe and explain the Meraki WLAN (MR) platform and features
  • Describe and explain the Meraki security appliance (MX) platform and features
  • Describe and explain the Meraki switching (MS) platform and features
  • Describe and explain the Meraki security cameras (MV) platform and feature
  • Describe and explain the Meraki licensing model
  • Describe and explain the Meraki support model

outline

Day 1: Routing and Switching

Module 1: Introduction to Cisco Networking

  • Lesson 1: Overview
  • Lesson 2: Market Trends and Drivers

Module 2: Portfolio and Switching Solutions

  • Lesson 1: Switching Overview
  • Lesson 2: Cisco Switching Solutions
  • Lesson 3: Switching Product Portfolio
  • Lesson 4: Positioning Cisco Switching Solutions and Products
  • Lesson 5: Cisco Switching Tools and Resources

Module 3: Introduction to Routing Portfolio and Solutions

  • Lesson 1: Routing Overview
  • Lesson 2: Routing Product Portfolio
  • Lesson 3: Positioning Cisco Routing
  • Lesson 4: Cisco Routing Tools and Resources

Module 4: Introduction to Wireless Portfolio and Solutions

  • Lesson 1: Build or Expand a Wireless Practice
  • Lesson 2: Mobility Express Overview
  • Lesson 3: Mobility Express Products and Features
  • Lesson 4: Cisco Wireless Products RF Planner
  • Lesson 5: Wireless Resources

Module 5: Introduction to Security Portfolio and Solution

  • Lesson 1: Branch Threat Defense Umbrella
  • Lesson 2: Security in the Digital Age
  • Lesson 3: Security Portfolio Overview
  • Lesson 4: Security Sales Resources

Module 6: Programs, Support, Services, Software, and Resources

  • Lesson 1: Programs – Cisco Active Advisor
  • Lesson 2:  Programs – FindIT
  • Lesson 3: Support Services

Day 2: Meraki

Module 7: Meraki Overview

  • Lesson 1: The Meraki Mission
  • Lesson 2: Cloud Based Management
  • Lesson 3: Zero Touch Provisioning

Module 8: Meraki MR – Wireless LAN

  • Lesson 1: Overview
  • Lesson 2: Features
  • Lesson 3: Models
  • Lesson 4: Performance

Module 9: Meraki MX – Security Appliances

  • Lesson 1: Overview
  • Lesson 2: Dashboard
  • Lesson 3: Intrusion Prevention
  • Lesson 4: Threat protection

Module 10: Meraki MS – Switches

  • Lesson 1: Access and Aggregation
  • Lesson 2: Zero Touch Provisioning
  • Lesson 3: Deployment
  • Lesson 4: Management

Module 11: Meraki SM – Mobility Management

  • Lesson 1: Cloud Based Enterprise Mobility Management
  • Lesson 2: Device On Boarding
  • Lesson 3: Policy Automation

Module 12: Meraki MC – Collaboration

  • Lesson 1: Cloud Managed Communication
  • Lesson 2: Products
  • Lesson 3: Features

Module 13: Meraki MV – Surveillance

  • Lesson 1: Automatic Network Detection
  • Lesson 2: MV Cameras
  • Lesson 3: Video Sharing

Module 14: Meraki APIs – Developer Platforms

  • Lesson 1: Meraki developers’ platform and community (APIs)
  • Lesson 2: API Integration

Module 15: Meraki Sales Cycle

  • Lesson 1: Sales Resources
  • Lesson 2: Meraki opportunities
  • Lesson 3: Meraki demos

Module 16: Meraki Licensing, Support, and Warranty

  • Lesson 1: Meraki licensing model
  • Lesson 2: Meraki support mode

target_au

The primary audience for this course is as follows:

  • Channel Partners

pre_req

The knowledge and skills that a learner should have before attending this course are as follows:

  • Familiarity with Wireless
  • Familiarity with Network operation
  • Understanding of basic network security

titleHXIAVR – HyperFlex Implementation and Administration with VR
days3
seo_titleHXIAVR - HyperFlex Implementation and Administration with VR Course Training
seo_decThis HyperFlex training course provides an introduction to hyper-converged infrastructure and presents the Cisco HyperFlex (HX) hardware and software architecture.
seo_tkeyHXIAVR
categorydata-center-virtualization
vendorInsoft Specials

techonogyDatacenter & Virtualization
overviewHyperFlex Implementation and Administration with Virtual Reality (HXIAVR) is a 3 days instructor-led course. This HyperFlex training course provides an introduction to hyper-converged infrastructure and presents the Cisco HyperFlex (HX) hardware and software architecture. HX use cases and solutions based on Cisco Validated Designs (CVD) are presented as well as performance advantages of the HX platform over competing vendors. Pre-installation requirements, best practices and post installation requirements are delivered in conjunction with the HX Data Platform Installer as a utility to streamline cluster creation and validation. The learner will also get virtual hands on experience with racking and connecting HyperFlex devices in a virtual environment. Additional topics include troubleshooting and upgrading HX, creating HyperFlex stretched clusters and installing HX within Hyper-V environments.
objective

Upon completion of this course, the student will be able to meet these overall objectives:

  • Define the concept of Software Defined Storage in Hyperconverged Infrastructure
  • Describe the architecture, components, features and operation of Cisco HyperFlex Systems
  • Rack HyperFlex family devices.
  • Install, configure, deploy, manage and monitor Cisco HyperFlex Systems
  • Describe pre-installation, best practices and post-installation requirements for Cisco HyperFlex Systems
  • Configure a Cisco HyperFlex Stretched Cluster
  • Describe Cisco HyperFlex Systems Use Cases

outline

Lesson 1: Introduction to Hyper-converged Infrastructure (HCI)

  • Identify the components of a Hyper-converged Infrastructure (HCI)
  • Understand the challenges that are being addresses by Hyper-converged Infrastructure
  • Explain the benefits of an HCI solution
  • Present the components and physical topology of the Cisco HyperFlex with Application Centric Infrastructure (ACI) solution

Lesson 2: Cisco HyperFlex Systems Hardware and Software Architecture

  • What’s New in HX v4.x
  • Describe the Virtualization Platforms options for HypeFlex: VMWare, Hyper-V, Containers with Kubernetes
  • Understand the capabilities and functionality of the HyperFlex Hybrid, All-Flash and NVMe server platform
  • Describe the HyperFlex HX Compute Only solution
  • Describe the HyperFlex HX Edge solution
  • Present the Cisco HyperFlex HX Data Platform hardware components
  • Describe the Cisco HyperFlex system architecture
  • Understand the advanced storage features and performance enhancements of the HyperFlex cluster
  • Identify the hardware functionality of the Hyperflex HX server nodes
  • Describe the management and connectivity details for various HyperFlex HX cluster deployments

Lesson 3: Cisco HyperFlex Systems Use Cases, Solutions and Performance

  • Introduce the Cisco Validated Design (CVD) guides that are available for the HyperFlex HX Data Platform solution
  • Describe the Cisco HyperFlex All-Flash Systems for Deploying Microsoft SQL Server Database validated design details
  • Present the Cisco HyperFlex M5 All-Flash Hyperconverged System with up to 600 Citrix XenDesktop Users validated design details
  • Identify and compare the performance advantages of the Cisco HyperFlex HCI solution with other vendors for Oracle OLTP, SQL Server and mixed workload operating environments

Lesson 4: HyperFlex Pre-installation Requirements in VMware

  • Review the software requirements for VMware ESXi
  • Describe the physical requirements for successful HX cluster deployment
  • Present the network requirements for HX Data Platform installation
  • Define the port requirements for VMware ESXi and vCenter
  • Identify the HyperFlex external connections
  • Provide the deployment information and variables required when using the HX Data Platform installer

Lesson 5: HyperFlex HX Data Platform Installation Best Practices

  • Confirm the configuration requirements of the northbound switches that are connected to the HyperFlex cluster
  • Present the Cisco UCS configuration parameters required for the HyperFlex Data Installer utility
  • Describe the VMware vCenter host, licensing and networking parameters that support successful of the HX Data Platform

Lesson 6: Installing Cisco HyperFlex Systems Using the HX Installer

  • Present the benefits of the HX Data Platform automation function to streamline Cisco UCS and VMware vCenter configuration
  • Describe the HyperFlex factory pre-installed hardware and software options
  • Identify the steps required to install, deploy and launch the HX Data Platform Installer
  • Describe HyperFlex cluster creation validation using UCS Manager and VMware vSphere Client/Web Client
  • Review installation procedures using Intersight

Lesson 7: Post-Installation Requirements for HX Data Platform

  • Describe the post installation capabilities of the HX Installer command line interface
  • Present the post install script as a streamlined to perform cluster administrative functions such as Auto Support, email alerts and password changes
  • Identify the HX vSphere Plug-in and the HX Connect utility as two methods to create and manage HyperFlex cluster datastores
  • Explain the use of the HX vSphere Plug-in to create snapshots and ReadyClone VM clones
  • Using Cisco Workload Optimization Manager to improve operation.

Lesson 8: Troubleshooting HX Data Platform Installation and Upgrades

  • Present issues that are commonly encountered during HX cluster creation and upgrade activities
  • Describe troubleshooting steps to validate and correct network connectivity problems due to misconfiguration of VLAN, frame size and quality of service parameters across vCenter, UCS and northbound switch platforms
  • Identify issues that cause virtual machine migration (vMotion) failure
  • Present the issues that prevent successful completion of HX cluster and node upgrades and provide corrective measures to complete the operations

Lesson 9: Upgrading the HX Data Platform

  • Present the upgrade features for HX Data Platform
  • Describe the HX Data Platform upgrade guidelines and recommendations
  • Identify the Cisco HX Data Platform upgrade matrix including Cisco UCS manager and VMware ESXi
  • Present the upgrade validations, pre-installation checks and pre-upgrade procedures
  • Describe the process to upgrade the Cisco UCS Infrastructure using UCS Manager
  • Describe the process to upgrade the HX Data Platform, Cisco UCS Server and VMware ESXi using the HX Connect utility

Lesson 10: HyperFlex Stretched Cluster Overview and Configuration

  • Introduce the HyperFlex Stretched Cluster architecture and pre-installation checklist requirements
  • Describe the process to download the witness VM installation image file and complete the configuration and deployment within vCenter
  • Present the process to create the Stretched Cluster Sites and run the Configure Site workflow for Sites A and B
  • Explain the required steps to create the HyperFlex Stretched Cluster and run the Create Stretch Cluster workflow

Lesson 11: HX Data Platform for the Hyper-V Environment

  • Describe the hardware, software network services and port requirements that support the installation of the HX Data Platform for the Hyper-V environment
  • Present the guidelines and limitations for creating the HyperFlex cluster using the HX Data Installer as well as DNS and Active Directory
  • Present the process to download the HX Data Installer VM and install the image onto a Hyper-V server
  • Define the steps required to deploy the HyperFlex cluster for Hyper-V using the HX Data Installer

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems and Hyperconvergence
  • Basic knowledge of servers and storage

titleDCSVR – Data Center Security with Virtual Reality
days2
seo_titleDCSVR - Data Center Security with Virtual Reality Course Training
seo_decThis course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays advanced Data Centers.
seo_tkeyDCSVR
categorydata-center-security
vendorInsoft Specials

techonogyDatacenter & Virtualization
overviewData Center Security with Virtual Reality (DCSVR) is an instructor-led course. Security is every enterprise’s top priority and keeping Data Center secure will protect business values. This course uses Cisco Validated Designs (CVD) to build a foundational understanding of the potential security threats impacting todays advanced Data Centers. The goal of this course is to help the student understand the types of attacks, the types of targets and the tools available to protect the DC. The learner will get virtual hands on experience with racking and connecting security appliances in a virtual environment. We will also discuss newer security solutions such as Application Centric Infrastructure (ACI), Stealth watch and Tetration to understand how logical separation, data mining and anomaly detection can help us protect the infrastructure.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Explain the common vulnerabilities in the Data Center
  • Understand Data Center Cisco Validated Designs
  • Identify the common attack vectors in the Data Center
  • Identify malicious activities
  • Identify patterns of suspicious behaviors across the Data Center
  • Secure device management in the Data Center
  • Explain Zero Trust Networking
  • Describe Firewall Features for the Data Center
  • Explain the advantages of AMP protection
  • Secure the Network with Umbrella
  • Understand the reports and information available from Stealthwatch
  • Describe how to use Cisco Tetration Analytics for workload protection in order to provide a secure infrastructure for business-critical applications and data

outline

Lesson 1: DC Security Threats

  • Describe security threats and potential impacts on the network
  • Understand the security challenges faced by the DC staff on a daily basis
  • Explain why Cisco Validated Designs lead to a more secure infrastructure
  • Describe security threats in the storage network
  • Explain Zero Trust Networking

Lesson 2: Protecting the Management Network

  • Discuss options for in band and out of band management
  • Describe role-based access control
  • Explain the role of TACACS and Identity Services Engine (ISE) for device administration control

Lesson 3: Firewalling the Data Center

  • Positioning the Firewall Within Data Center Networks
  • Cisco Firepower Portfolio
  • Describe advanced policy configuration and Firepower system configuration options
  • Configure policies to find and stop Ransomware
  • Configure Correlation events, white rules, traffic profiles, and create respective events and remediate them
  • Understand network and host based AMP on a server
  • Configure and analyze host based AMP on a server
  • Firewall Virtualization
  • Design for Threat Mitigation
  • Threat Mitigation Integration with other Cisco products

Lesson 4: Umbrella Integration

  • Umbrella and Available Features Overview
  • Destination Lists
  • Content Categories
  • Application Settings
  • Tenant Controls
  • Security Settings
  • Integrations
  • Selective Decryption Lists
  • DNS Policies
  • Firewall Policies
  • Virtual Appliance
  • Core Reports
  • Management Reports
  • Integrating Umbrella within Cisco SecureX

Lesson 5: Stealthwatch in the Data Center

  • Explain what Cisco Stealthwatch is and how it works.
  • Describe the goals of using Cisco Stealthwatch in the proactive and operational modes.
  • Define basic concepts of investigation and detection of potential security issues using the Cisco Stealthwatch System.
  • Complete workflows to identify indicators of compromise in your network.
  • Describe alarm types and alarm notification within Cisco Stealthwatch.
  • Explain the utility of maps in the Cisco Stealthwatch System.
  • Describe how the Cisco Stealthwatch System contributes to successful incident handling

Lesson 6: Utilizing Tetration in the Data Center

  • Enable pervasive visibility of traffic across datacenter infrastructure
  • Uses long term data retention for forensics and analysis
  • Create communication and dependencies for all applications within the datacenter
  • Empower the company to utilize a whitelist policy model
  • Identify behavior deviation in real time
  • Perform forensics operations

target_au

The primary audience for this course is as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic knowledge of Cisco Security
  • Basic knowledge of Cisco Data Center Architecture
  • Basic knowledge of servers, storage, and security appliances

titleICUCSVR – Installation and Configuration of the Cisco Unified Computing System with Virtual Reality
days3
seo_titleInstallation and Configuration of the Cisco Unified Computing System with Virtual Reality Course Training
seo_decIn this Cisco UCS server training course, you will become experienced with the installation, configuration, and troubleshooting of Cisco Unified Computing System (UCS) B-Series.
seo_tkeyICUCSVR
categoryunified-computing
vendorInsoft Specials

techonogyDatacenter & Virtualization
overviewICUCSVR - Installation and Configuration of the Cisco Unified Computing System with Virtual Reality is a 3 days instructor-led course. In this Cisco UCS server training course, you will become experienced with the installation, configuration, and troubleshooting of Cisco Unified Computing System (UCS) B-Series. This custom-built Cisco UCS training class was developed by NterOne using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Cisco UCS Manager as the primary interface. This Cisco training course will explore all of the components of the UCS B-Series from a day to day administrative point of view. Learn UCS Manager, B-Series administration, troubleshooting, and management tools used to support basic UCS and multi-cluster support with UCS Central.
objective

Upon completing this course, the learner will be able to meet the following overall objectives:

  • Understand the B-Series product line similarities and differences
  • Describe UCS managed architectures
  • Install and rack UCS family devices.
  • Understand the process for upgrading B-Series Firmware
  • Administering service profiles, pools, and policies
  • Understanding RBAC with Active Directory integration
  • Administering backup and restores in UCS Manager
  • Learn and discuss the various management tools for Cisco UCS
  • Perform basic troubleshooting of B-Series in normal operations

outline

Module 1: UCS Infrastructure Components

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: Exploring Cisco UCS User Interfaces
  • Lesson 3: Cisco UCS Management Framework and Features
  • Lesson 4: Rack, Stack, Power, and Console

Module 2: Configuring Cisco B-Series Servers

  • Lesson 1: Cisco UCS Servers and Components
  • Lesson 2: RBAC, Organizations, and Active Directory Integration
  • Lesson 3: Configuring Compute Node LAN Connectivity
  • Lesson 4: Configuring Compute Node SAN Connectivity
  • Lesson 5: Creating Identity and Resource Pools
  • Lesson 6: Creating Service Profiles with VMware
  • Lesson 7: Creating Templates and Cloning Service Profiles
  • Lesson 8: Managing Service Profiles
  • Lesson 9: Operating System Installation Options
  • Lesson 10: Backing Up and Restoring UCSM Database
  • Lesson 11: Upgrading UCS B-Series Firmware
  • Lesson 12: Troubleshooting Cisco UCS B-Series Configuration
  • Lesson 13: Troubleshooting Cisco UCS B-Series Operation

Module 3: UCS Management Tools Essentials

  • Lesson 1: UCS Management Tool Overview
  • Lesson 2: Introduction to UCS Central
  • Lesson 3: Introduction to Cisco Intersight

target_au

The primary audience for this course are as follows:

  • Systems Administrators and Engineers
  • Technical Solutions Architects
  • Systems Integrators
  • Channel Partners
  • Value-Added Resellers

pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • Basic knowledge of Cisco routing and switching
  • Basic knowledge of Cisco Unified Computing Systems
  • Basic knowledge of servers, storage, and VMware

titleNS303 – Cisco NSO Administration and DevOps v3.0
days4
seo_titleNS303 - Cisco NSO Administration and DevOps Course Training
seo_dec
seo_tkey
categorynetworking
vendorCisco

techonogyDatacenter & Virtualization
overviewThis four days course, Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v3.0, provides knowledge regarding Cisco® NSO development, operation, and administration tasks. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and you will learn best practices for using DevOps.
objective
outline

Section 1: Cisco NSO Administration

  • Introducing Network and IT Convergence
  • Introducing Cisco NSO Architecture
  • Introducing Linux
  • Explaining Setup
  • Explaining Access Control
  • Describing Integration Options

Section 2: Scalability

  • Introducing Scalability and High Availability
  • Describing Scalable System Management

Section 3: DevOps Fundamentals

  • Describing Software Development Methodologies
  • Explaining Version Control System
  • Describing Continuous Integration and Continuous Delivery

Section 4: Cisco NSO Operations

  • Introducing Service Maintenance
  • Performing Network Element Driver (NED) Upgrades
  • Introducing Configuration Management
  • Describing Change Management
  • Explaining Service Problem Management
  • Explaining Service Monitoring and Compliance Reporting
  • Cisco NSO and DevOps
  • Introducing Inventory Management
  • Describing Cisco NSO Use Cases

target_au

The primary audience for this course is as follows:

  • System installers
  • System integrators
  • System administrators
  • Network administrators
  • Solution designers

pre_req

Before you take this course, we recommend that you have the knowledge and skills obtainable by attending the Cisco Network Services Orchestrator Foundation (NSO201) class, including:

  • Basic knowledge of the command line of UNIX-like operating systems.
  • Basic knowledge of Network Configuration Protocol (NETCONF).
  • Basic knowledge of Yet Another Next Generation (YANG) data modelling.
  • Basic knowledge of Python software development.

titleDCNML – Managing LAN Infrastructure with Cisco Data Center Network Manager
days3
seo_titleDCNML - Managing LAN Infrastructure with Cisco Data Center Network Manager Course Training
seo_dec
seo_tkey
categoryunified-computing
vendorCisco

techonogyDatacenter & Virtualization
overviewThis course enhances your knowledge of managing LAN Infrastructure with Cisco Data Center Network Manager (DCNM) implementing a spine-and-leaf network fabric using DCNM with Virtual Extensible LAN (VXLAN), Ethernet VPN (EVPN), and Border Gateway Protocol (BGP). You will learn how the integration of spine-and-leaf network fabric with Cisco Data Center Network Manager increases overall data center infrastructure uptime and reliability, thereby improving business continuity. It provides a robust framework and comprehensive feature set that meets the routing, switching, and storage administration needs of data centers. Cisco DCNM streamlines the provisioning for the unified fabric and monitors the SAN (Storage area network) and LAN (Local area network) components. This course will help you:
  • Acquire the advanced skills and techniques to use spine-leaf topologies to provide better scalability and more seamless capacity and support for devices and lines.
  • Gain the necessary skills to maximize the benefits of DCNM by integrating automation, and greater visibility into network infrastructure and elimination of configuration errors with templated deployment models.

objective
  • Describe the components and functionality of DCNM.
  • Describe the software define network protocols of VXLAN, eVPN and BGP.
  • Deploy a DCNM environment in high-availability environment.
  • Operate the DCNM discovery process to acquire management of all devices.
  • List high lever navigation features of DCNM and utilize the DCNM GUI (Graphical User Interface) to optimize data center topologies.
  • Manage and monitor data center LAN fabric from DCNM.
  • Program RESTful APIs native to DCNM to perform any network management task.
  • Troubleshoot and monitor the network using DCNM troubleshooting tools.
  • Describe the benefits of DCNM Network Insights.

outline

Introducing Cisco DCNM LAN

  • Cisco DCNM Introduction
  • Cisco DCNM LAN Solution Overview

Deploying VXLAN EVPN with Cisco DCNM LAN

  • VXLAN Overlays and Underlays
  • Easy Fabric VXLAN EVPN Underlay Model

Deploying Cisco DCNM

  • Cisco DCNM High Availability
  • Cisco DCNM Installation Requirements

Discovering Existing Network Devices with Cisco DCNM

  • Configure Switches for Discovery

Exploring the Data Center with Cisco DCNM Topology

  • Access Topology View in the GUI
  • Navigate the Map Views and Layouts

Managing and Monitoring the Data Center with Cisco DCNM LAN

  • Manage the Configuration Archive
  • Deploy Changes to the Fabric

Automating Cisco DCNM Programmatically

  • Explore APIs for the Network
  • REST API Tool

Troubleshooting and Monitoring Cisco DCNM

  • Troubleshoot and Monitor Cisco DCNM

Describing Network Insights

  • Network Insights Advisor

 

Lab outline

  • Access the Lab Devices
  • Explore and Test DCNM Lab Topology
  • Configure Nexis Series Operating System (NX-OS) VXLAN with BGP Control Plane Using CLI
  • Configure and Execute DCNM POAP
  • Managing the Network Using DCNM
  • Managing the Data Center Using DCNM Templates
  • Troubleshooting VXLAN with DCNM

target_au

This course is ideal for the following professionals:

  • Data Network Engineers and Administrators
  • Data Center Technical Managers

pre_req

Before enrolling in this course, you should have knowledge in the following areas:

  • Understanding of Cisco routing and switching in a data center.
  • CCNA certification recommended.
  • Fundamentals of network management.

 

The following course may help you meet these prerequisites:


titleIOT – Essentials Sales and Technical Training
days1
seo_titleIOT - Essentials Sales and Technical Course Training
seo_decIn this course, IoT Essentials: Sales & Technical Training, we€™ll dive into Cisco€™s high-level strategy and vision for IoT.
seo_tkey
categoryinternet-of-things-courses
vendorInsoft Specials

techonogyCisco
overviewIn this course, IoT Essentials: Sales & Technical Training, we’ll dive into Cisco’s high-level strategy and vision for IoT, and explore the underlying guiding principles which will help you in your customer engagements as you become an advisor in their IoT journey. In addition, we will explore the IoT Portfolio, where we cover ‘what to sell’ with a high-level overview of Cisco’s entire landscape of offerings for the infrastructure, applications, and resources that serve as the building blocks for your customers’ IoT solutions. Finally, we will break down the ‘where to sell’ question. The student will learn how, as a Cisco Partner, to create awareness of how you can help your customer navigate their IoT journey. You will be able to position yourself and your organization to support your customers in their IoT journey by leveraging Cisco’s Portfolio of IoT products, solutions, and services. This course will help prepare the student to take the 700-825 exam.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand the guiding principles to help in the customer engagements.
  • Understand an overview of the Cisco IoT product offerings.
  • Understand how to assist customers in their IoT journey.

outline

IoT Portfolio Overview

  • Delivering Value Now
  • Industrial Switching Portfolio
  • Industrial Routing Portfolio
  • Industrial Wireless Portfolio
  • Industrial Security Portfolio
  • Cisco DNA & Intent-based Networking
  • Cisco Industrial Network Director
  • IOx and Edge Computing
  • Kinetic Portfolio
  • DevNet Resources

Sales Play: Extended Enterprise Opportunity

  • Extended Enterprise Opportunity
  • Sales Plays and Use Cases
  • Key Takeaways

Sales Play: Remote and Mobile Assets Opportunity

  • Remote and Mobile Assets Opportunity
  • Customer Use Cases

Sales Play: Industry Solutions Opportunity

  • Opportunities with Industry Plays
  • Manufacturing Sales Plays
  • Transportation and Roadways Plays
  • Oil and Gas Plays
  • Utilities Sales Plays

target_au

The primary audience for this course is as follows:

  • Individuals preparing for the Cisco IoT Essentials for Account Managers (700-825) exam.

pre_req

This course has no formal prerequisites, but it is recommended that students have the following:

  • Experience with and interest in working with customers to determine, measure, and deliver business outcomes through the implementation of technology.
  • Time spent in a customer facing role, including technical sales, system engineering, or similar will be especially helpful.

titleOEMBST – Catalyst 9K, Nexus 9K, VXLAN Implementation & Administration
days5
seo_titleCatalyst 9K, Nexus 9K, VXLAN Implementation & Administration Course Training
seo_decThe purpose of the VXLAN IPv6 Networking training is to provide implementation and administration knowledge.
seo_tkeyOEMBST
categorynetwork-virtualization
vendorInsoft Specials

techonogyEnterprise Networking
overviewThe purpose of the OEMBST training is to provide implementation and administration knowledge on the hardware and software, geared towards VA technical staff.
objective

Upon completing this course, the learner will be able to meet these overall objectives:

  • Learn how to Implement and Administer a next generation network leveraging the latest Cisco Catalyst 9000 series switches, Cisco Nexus 9000 switches and VXLAN.

outline

Section 1: OSPF basics

Section 2: BGP basics

Section 3: IPv6 basics

Section 4: Overview of VXLAN

Section 5: Intro to Spine, Leaf, Border Leaf, Intermediary

Section 6: VXLAN Underlay

Section 7: VXLAN Overlay

Section 8: VXLAN Overlay

Section 9: Layer 2 VNI for isolated networks segments

Section 10: Layer 3 VNI for non-isolated networks segments

Section 11: VXLAN Troubleshooting


target_au

The primary audience for this course is as follows:

  • Network engineers
  • Network administrators
  • Network support technicians
  • Help desk technicians

pre_req

The knowledge and skills that the learner should have before attending this course are as follows:

  • Basic understanding of enterprise routing and switching

titleFortiEDR
days2
seo_titleFortiEDR Course Training | Fortinet NSE 5 Certification
seo_decIn this course, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this two days class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. Product Versions:
  • FortiEDR 4.2

objective

After completing this course, you should be able to:

  • Explain the FortiEDR approach and how it works
  • Identify the communicating components and how they are configured
  • Schedule, organize, and tune a new deployment
  • Carry out basic troubleshooting steps, including: verifying that FortiEDR is installed and actively blocking malware, identifying whether FortiEDR has blocked a process or connection, finding logs, and contacting FortiEDR Support
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, and viewing system events
  • Complete basic tasks in of each area of the management console: the Dashboard, the Event Viewer, the Forensics tab, the Threat Hunting module, Communication Control, Security Policies, Playbooks, Inventory, and the Administration tab
  • Manage security events and their status
  • Block communication from applications that are risky or unwanted, but not inherently malicious
  • Define next-generation antivirus, its role in FortiEDR, and where it falls in the order of operations
  • Find and remove malicious executables from all the devices in your environment
  • Use RESTful API to manage your FortiEDR environment
  • Administer a multi-tenant environment
  • Recognize what Fortinet Cloud Service is and how it works
  • Troubleshoot collector upgrades and performance issues
  • Obtain collector logs and memory dumps
  • Have a basic understanding of the history of malware, how it exploits trust, and the persistence techniques used in malware today
  • Triage PowerShell and CScript events, verify their destinations, and retrieve memory
  • Prioritize, investigate, and analyze security events
  • Remediate malicious events and create exceptions to allow safe processes

outline
  1. Overview and Technical Positioning
  2. Installation and Architecture
  3. Administration
  4. Best Practices and Deployment
  5. The User Interface in Depth Part 1
  6. The User Interface in Depth Part 2
  7. Events and Alerting
  8. Help Desk Level 1 Triage
  9. Communication Control
  10. Next-Generation Antivirus
  11. Threat Hunting
  12. RESTful API
  13. Multi-Tenancy
  14. Fortinet Cloud Services
  15. Advanced Troubleshooting
  16. Endpoint Security 101
  17. PowerShell and CScript
  18. Alert Analysis 401

target_au

IT and security professionals involved in the administration and support of FortiEDR should attend this course.


pre_req
  • Basic understanding of cybersecurity concepts

titleSD-WAN
days2
seo_titleSD-WAN Course Training | Fortinet NSE 7 Certification
seo_decIn this course, you will learn about common SD-WAN deployment scenarios using Fortinet Secure SD-WAN solutions.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this two days course, you will learn about common SD-WAN deployment scenarios using Fortinet Secure SD-WAN solutions. You will explore different situations, from a single enterprise site, to multiple data center environments, that will help you to enhance and troubleshoot SD-WAN deployments. Product Versions:
  • FortiOS 6.4.0
  • FortiManager 6.4.0

objective

After completing this course, you should be able to:

  • Describe capabilities of the Fortinet Secure SD-WAN solution
  • Configure basic SD-WAN features
  • Configure advanced SD-WAN features
  • Differentiate basic static routing from the advanced dynamic routing capabilities of the Fortinet Secure SD-WAN solution
  • Configure SD-WAN with advanced VPN features
  • Integrate FortiOS SD-WAN solutions with FortiManager for central management

outline
  1. Introduction
  2. Routing, Sessions, and Performance SLA
  3. SD-WAN Rules
  4. Traffic Shaping
  5. Integration
  6. Advanced IPsec
  7. Auto-discovery VPN (ADVPN)

target_au

Anyone responsible for the day-to-day management of a Fortinet SD-WAN deployment and network operation.


pre_req
  • Advanced knowledge of networking, and extensive hands-on experience working with FortiGate and FortiManager
  • It is recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure
    • NSE 5 FortiManager

titleAdvanced Analytics
days3
seo_titleAdvanced Analytics Course Training | Fortinet NSE 6 Certification
seo_decIn this course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn to add various organizations to FortiSIEM and discover devices from each organization.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this three days Advanced Analytics course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn to add various organizations to FortiSIEM and discover devices from each organization. You will learn to differentiate logs and events from each organization and apply appropriate rules. You will dive deep into rules and their architecture. You will also learn about incidents and how they are generated when a rule is triggered. You will learn about different clear conditions. You will also dive deep into baseline calculations performed on FortiSIEM. You will learn to create your own baseline profile and run queries based on the profile. Finally, you will learn the methods of remediation available on FortiSIEM. In interactive labs, you will explore the role of FortiSIEM in a service provider environment. You will configure FortiSIEM in a cluster with a worker and NFS server for data storage. You will add organizations to FortiSIEM and manage the scope of each organization. You will register collectors from those organizations on FortiSIEM. You will also register Linux and Windows agents. You will analyze events from different organizations and understand how those events trigger some of the built-in rules. You will create your own rules and generate security events to trigger incidents for those rules. Product Versions:
  • FortiSIEM 5.2.5
  • FortiGate 6.2.2

objective

After completing this course, candidates will be able to:

  • Identify various implementation requirements for a multi-tenant FortiSIEM deployment
  • Understand how FortiSIEM can be deployed in a hybrid environment with and without collectors
  • Understand EPS restrictions on FortiSIEM
  • Define organizations on FortiSIEM and assign collectors to organizations
  • Deploy collectors in a multi-tenant solution
  • Register collectors on the supervisor
  • Understand the impact of excessive collectors on a FortiSIEM cluster
  • Identify the impact of excessive collectors on a FortiSIEM cluster
  • Manage EPS assignment on collectors
  • Manage collector high availability
  • Maintain and troubleshoot a collector installation
  • Install Windows and Linux agents and identify the benefits of log collection through agents
  • Understand agent architecture and associate templates with Windows and Linux agents
  • Understand rule processes architecture and differentiate between a rule worker and a rule master
  • Understand how the rule engine sliding time window works when it is evaluating rules
  • Understand the out-of-the-box single pattern security rules and how to create rules by evaluating security events
  • Define actions for a single pattern security rule
  • Understand incident generation and identify the attributes that trigger an incident
  • Identify multiple pattern security rules and define conditions and actions for them
  • Understand how baseline data is useful in creating conditions in rules
  • Differentiate between a standard report and a baseline report
  • Understand the built-in baseline profile and learn to create your own baseline profiles
  • Understand how statistical average and standard deviation calculations are performed on FortiSIEM
  • Understand hourly buckets for weekdays and weekends
  • Clone and edit some out-of-the-box baseline rules
  • Understand clear conditions on FortiSIEM and walk through a rule with clear conditions
  • Learn about remediation options on FortiSIEM and analyze some out-of-the-box remediation scripts

outline
  1. Introduction to Multi-tenancy
  2. Defining Collectors and Agents
  3. Operating Collectors
  4. FortiSIEM Windows and Linux Agents
  5. Rules Breakdown
  6. Single Subpattern Security Rule
  7. Multiple Subpattern Rules
  8. Introduction to Baseline
  9. Baseline Rules
  10. Clear Conditions
  11. Remediation

target_au

Security professionals involved in the management, configuration, administration, and monitoring of FortiSIEM devices in an enterprise or service provider deployment used to monitor and secure the networks of customer organizations should attend this course.

Participants should have a thorough understanding of all the topics covered in the NSE 5 FortiSIEM course before attending the NSE 7 Advanced Analytics course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts
  • Basic understanding of SIEM products
  • Basic understanding of Linux

It is highly recommended that you have an understanding of the topics covered in the NSE 5 FortiSIEM course.


titleSecure Access
days3
seo_titleSecure Access Course Training | Fortinet NSE 7 Certification
seo_decIn this course, you will learn how FortiGate, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity over wired and wireless networks.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogyIT Systems and Security
overviewIn this three days course, you will learn how FortiGate, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity over wired and wireless networks. You will also learn how to provision, administer, and monitor FortiAP and FortiSwitch devices using FortiManager. This course covers the deployment, integration, and troubleshooting of advanced authentication scenarios, as well as best practices for securely connecting wireless and wired users. You will learn how to keep the network secure by leveraging Fortinet Security Fabric integration between FortiGate, FortiSwitch, FortiAP, and FortiAnalyzer to automatically quarantine risky and compromised devices using IOC triggers. Product Versions:
  • FortiGate 6.4.1
  • FortiAP 6.4.2
  • FortiSwitch 6.4.2
  • FortiAnalyzer 6.4.2
  • FortiAuthenticator 6.1.1

objective

After completing this course, you should be able to:

  • Configure advanced user authentication and authorization scenarios using RADIUS and LDAP
  • Troubleshoot user authentication and authorization problems
  • Implement two-factor authentication using digital certificates
  • Implement and troubleshoot RADIUS and syslog single sign-on solutions
  • Provision, configure, and manage FortiSwitch using FortiManager over FortiLink
  • Configure Layer 2 authentication for wired and wireless users using 802.1.x
  • Provision, deploy, and manage FortiAP using FortiManager over FortiLink
  • Deploy complex wireless networks with dynamic VLAN assignments
  • Implement and deploy wireless network with IoT segmentation
  • Secure the wired and wireless network
  • Provide secure access to guest users
  • Monitor and analyze wireless clients and traffic using Wireless Manager
  • Automatically quarantine wired and wireless clients using IOC triggers

outline
  1. RADIUS and LDAP
  2. Certificate-Based Authentication
  3. Radius and Syslog Single Sign-On
  4. Centralized Management
  5. FortiSwitch
  6. Port Security
  7. Integrated Wireless
  8. Guest Access
  9. Enhanced Wireless

target_au

This course is intended for networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate, FortiManager, FortiAP, FortiSwitch, and Wireless Manager devices used to secure access to their organizations’ resources.


pre_req
  • Knowledge of network authentication protocols
  • Knowledge of Layer 2 switching
  • Understanding of wireless networks
  • Understanding of the topics covered in the following courses:
    • NSE 4 FortiGate Security
    • NSE 4 FortiGate Infrastructure
  • An understanding of the topics covered in the following courses is also recommended:
    • NSE 5 FortiManager
    • NSE 6 FortiAuthenticator
    • NSE 6 Integrated and Cloud Wireless

titleWindows Server 2019 Administration
days5
seo_titleWindows Server 2019 Administration Training
seo_dec
seo_tkey
categorywindows-server
vendorMicrosoft

techonogy
overviewThis five days instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations.
objective
outline

Module 1: Windows Server Administration Overview
This module describes how to distinguish different Windows Server 2019 editions and techniques for deployment, servicing and activation. The module also introduces Windows Server Core and compares it with the Desktop Experience version. The module describes tools and concepts for adminstering Windows Server, such as Windows Admin Center, PowerShell, and delegation of privileges.
Lessons

  • Overview of Windows Server administration principles and tools
  • Introducing Windows Server 2019
  • Windows Server Core Overview

Lab : Deploying and configuring Windows Server

  • Deploying and configuring Server Core
  • Implementing and using remote server administration

After completing this module, students will be able to:

  • Describe Windows Server as well as techniques for deployment, servicing and activation.
  • Describe Windows Server Core, its specifics and ways to administer it.

Module 2: Identity Services in Windows Server
This module introduces identity services and describes Active Directory Domain Services (AD DS) in a Windows Server environment. The module describes how to deploy domain controllers in AD DS, as well as the Azure Active Directory (AD) and the benefits of integrating Azure AD with AD DS. The module also covers Group Policy basics and how to configure group policy objects (GPOs) in a domain environment. Finally, the modules describes the role of Active Directory certificate services and certificate usage.

Lessons

  • Overview of AD DS
  • Deploying Windows Server domain controllers
  • Overview of Azure AD
  • Implementing Group Policy
  • Overview of Active Directory Certificate Services

Lab : Implementing identity services and Group Policy

  • Deploying a new domain controller on Server Core
  • Configuring Group Policy
  • Deploying and using certificate services

After completing this module, students will be able to:

  • Describe AD DS in a Windows Server environment.
  • Deploy domain controllers in AD DS.
  • Describe Azure AD and benefits of integrating Azure AD with AD DS.
  • Explain Group Policy basics and configure GPOs in a domain environment
  • Describe the role of Active Directory certificate services and certificate usage

Module 3: Network Infrastructure services in Windows Server
This module describes how to implement core network infrastructure services in Windows Server. The modules covers how to deploy, configure and manage DNS and IPAM. The modules also describes how to use Remote Access Services.
Lessons

  • Deploying and managing DHCP
  • Deploying and managing DNS services
  • Deploying and managing IPAM

Lab : Implementing and configuring network infrastructure services in Windows Server

  • Deploying and configuring DHCP
  • Deploying and configuring DNS

After completing this module, students will be able to:

  • Describe, deploy and configure DHCP service.
  • Deploy, configure and manage DNS.
  • Describe, deploy and manage IPAM.

Module 4: File Servers and Storage management in Windows Server
This modules describes how to configure file servers and storage in Windows Server. The module covers file sharing and deployment of Storage Spaces technology. The module describes how to implement data deduplication, iSCSI based storage in Windows Server, and finally, how to deploy DFS.

Lessons

  • Volumes and file systems in Windows Server
  • Implementing sharing in Windows Server
  • Implementing Storage Spaces in Windows Server
  • Implementing Data Deduplication
  • Implementing iSCSI
  • Deploying Distributed File System

 

  • Implementing Data Deduplication
  • Configuring iSCSI storage
  • Configuring redundant storage spaces
  • Implementing Storage Spaces Direct

After completing this module, students will be able to:

  • Implement sharing in Windows Server
  • Deploy Storage Spaces technology
  • Implement the data deduplication feature
  • Implement iSCSI based storage
  • Deploy and manage Distributed File System (DFS)

Module 5: Hyper-V virtualization and containers in Windows Server
This modules describes how to implement and configure Hyper-V VMs and containers. The module covers key features of Hyper-V in Windows Server, describes VM settings, and how to configure VMs in Hyper-V. The module also covers security technologies used with virtualization, such as shielded VMs, Host Guardian Service, admin-trusted and TPM-trusted attestation, and KPS.

Lessons

  • Hyper-V in Windows Server
  • Configuring VMs
  • Securing virtualization in Windows Server
  • Containers in Windows Server
  • Overview of Kubernetes

Lab : Implementing and configuring virtualization in Windows Server

  • Creating and configuring VMs
  • Installing and configuring containers

After completing this module, students will be able to:

  • Describe the key features of Hyper-V in Windows Server.
  • Describe VM settings and deploy and configure VMs in Hyper-V.
  • Explain the use of security technologies for virtualization.
  • Describe and deploy containers in Windows Server.
  • Explain the use of Kubernetes on Windows.

Module 6: High Availablity in Windows Server
This module describes current high availability technologies in Windows Server. The module describes failover clustering and considerations for implementing it, and how to create and configure failover clustering. The module also explains stretch clusters and options for achieving high availability with Hyper-V VMs.

Lessons

  • Planning for failover clustering implementation
  • Creating and configuring failover cluster
  • Overview of stretch clusters
  • High availability and disaster recovery solutions with Hyper-V VMs

Lab : Implementing failover clustering

  • Configuring iSCSI storage
  • Configuring a failover cluster
  • Deploying and configuring a highly available file server
  • Validating the deployment of the highly available file server

After completing this module, students will be able to:

  • Describe failover clustering and the considerations for implementing it.
  • Create and configure failover clusters.
  • Describe stretch clusters.
  • Describe options to achieve high availability with Hyper-V VMs.

Module 7: Disaster recovery in Windows Server
This module describes disaster recovery technologies in Windows Server and how to implement them. The module covers how to configure and use Hyper-V Replica and describes Azure Site Recovery. The module also covers how to implement Windows Server backup and describes the Azure Backup service.
Lessons

  • Hyper-V Replica
  • Backup and restore infrastructure in Windows Server

Lab : Implementing Hyper-V Replica and Windows Server Backup

  • Implementing Hyper-V Replica
  • Implementing backup and restore with Windows Server Backup

After completing this module, students will be able to:

  • Describe and implement Hyper-V Replica.
  • Describe Azure Site Recovery.
  • Describe and implement Windows Server backup.
  • Describe the Azure Backup service.

Module 8: Windows Server security
This module describes Windows Server security features and how to implement them. The module covers credentials used in Windows Server and explains how to implement privileged access protection. In addition to describing methods and technologies for hardening Windows Server security, the module explains how to configure Just Enough Administration (JEA) and how to secure SMB traffic. Finally, the module covers Windows Update, its deployment and management options.

Lessons

  • Credentials and privileged access protection in Windows Server
  • Hardening Windows Server
  • Just Enough Administration in Windows Server
  • Securing and analyzing SMB traffic
  • Windows Server update management

Lab : Configuring sercurity in Windows Server

  • Configuring Windows Defender Credential Guard
  • Locating problematic accounts
  • Implementing LAPS

After completing this module, students will be able to:

  • Describe credentials used in Windows Server.
  • Explain how to implement privileged access protection.
  • Describe methods and technologies to harden security in Windows Server.
  • Describe and configure Just Enough Administration (JEA).
  • Secure SMB traffic in Windows Server.
  • Describe Windows Update and its deployment and management options.

Module 9: Remote Desktop Services in Windows Server
This module describes key Remote Desktop Protocol (RDP) and Virtual Desktop Infrastructure (VDI) features in Windows Server. The modules covers how to deploy session-based desktops and describes personal and poled virtual desktops.

Lessons

  • Remote Desktop Services Overview
  • Configuring a session-based desktop deployment
  • Overview of personal and pooled virtual desktops

Lab : Implementing RDS in Windows Server

  • Implementing RDS
  • Configuring RemoteApp collection settings
  • Configuring a virtual desktop template

After completing this module, students will be able to:

  • Describe Remote Desktop Services (RDS) in Windows Server.
  • Describe and deploy session-based desktops.
  • Describe personal and pooled virtual desktops.

Module 10: Remote access and web services in Windows Server
This module describes how to implement virtual private networks (VPNs), Network Policy Server (NPS), and Microsoft Internet Information Services (IIS). The module provides an overview of remote access services and describes Always On VPN functionality, as well as how to configure NPS and Web Server (IIS) in Windows Server.

Lessons

  • Overview of RAS in Windows Server
  • Implementing VPNs
  • Implementing NPS
  • Implementing Always On VPN
  • Implementing Web Server in Windows Server

Lab : Deploying network workloads

  • Implementing Web Application Proxy
  • Implementing VPN in Windows Server
  • Deploying and Configuring Web Server

After completing this module, students will be able to:

  • Describe VPN options in Windows Server.
  • Describe Always On VPN functionality.
  • Describe and configure NPS.
  • Describe and configure Web Server (IIS).

Module 11: Monitoring, performance, and troubleshooting
This module describes how to implement service and performance monitoring, and apply troubleshooting in Windows Server. The module highlights monitoring tools and describes how to monitor performance, including event logging and how to perform event logging monitoring for troubleshooting purposes.

Lessons

  • Overview of Windows Server monitoring tools
  • Using Performance Monitor
  • Monitoring event logs for troubleshooting

Lab : Monitoring and troubleshooting Windows Server

  • Establishing a performance baseline
  • Identifying the source of a performance problem
  • Viewing and configuring centralized event logs
  • Identifying the source of a performance problem
  • Describe monitoring tools in Windows Server.
  • Describe performance monitoring and use it in Windows Server.
  • Describe event logging and perform event logging monitoring for troubleshooting purposes.

Module 12: Upgrade and migration in Windows Server
This module describes how to perform upgrades and migrations for AD DS, Storage, and Windows Server. The module covers tools to use for AD DS migration. The module also covers the Storage Migration Service, and finally, Windows Server migration tools and usage scenarios.

Lessons

  • AD DS migration
  • Storage Migration Service
  • Windows Server migration tools

Lab : Migrating Server workloads

  • Selecting a process to migrate server workloads
  • Planning how to migrate files by using Storage Migration Service

After completing this module, students will be able to:

  • Describe tools to use for AD DS migration.
  • Describe the Storage Migration Service.
  • Describe Windows Server migration tools and their usage scenarios.

target_au

This course is intended for Information Technology (IT) Professionals who have some experiencing working with Windows Server and are looking for a single five-day course that covers core administration components and technologies in Windows Server 2019. This course also helps server administrators from previous Windows Server versions to update their knowledge and skills related to Windows Server 2019. Additionally, this course can help individuals looking for preparation materials to pass exams related to Windows Server. The course is also to individuals from a service desk role who wish to transition into server maintenance.


pre_req
  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Some exposure to and experience with Active Directory Domain Services (AD DS) concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
  • Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts.
  • An awareness of basic security best practices.
  • Experience working hands-on with Windows client operating systems such as Windows 8, Windows 8.1 or Windows 10.
  • Basic experience with Windows PowerShell.

titleAZ-104T00-A: Microsoft Azure Administrator
days4
seo_titleAZ-104T00-A: Microsoft Azure Administrator Course Training
seo_dec
seo_tkey
categoryazure
vendorMicrosoft

techonogyEnterprise Networking
overviewThis course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.
objective

You will learn,

  • Identity
  • Governance and Compliance
  • Azure Administration
  • Virtual Networking
  • Intersite Connectivity
  • Network Traffic Management
  • Azure Storage
  • Azure Virtual Machines
  • Serverless Computing
  • Data Protection and
  • Monitoring

outline

Module 1: Identity

In this module, you will learn how to secure identities with Azure Active Directory, and implement users and groups.

Lessons

  • Azure Active Directory
  • Users and Groups

After completing this module, students will be able to:

  • Secure and manage identities with Azure Active Directory.
  • Implement and manage users and groups.

Module 2: Governance and Compliance

In this module, you will learn about managing your subscriptions and accounts, implementing Azure policies, and using Role-Based Access Control.

Lessons

  • Subscriptions and Accounts
  • Azure Policy
  • Role-based Access Control (RBAC)

After completing this module, students will be able to:

  • Implement and manage Azure subscriptions and accounts.
  • Implement Azure Policy, including custom policies.
  • Use RBAC to assign permissions.

Module 3: Azure Administration

In this module, you will learn about the tools an Azure Administrator uses to manage their infrastructure. This includes the Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager Templates. This module includes:

Lessons

  • Azure Resource Manager
  • Azure Portal and Cloud Shell
  • Azure PowerShell and CLI
  • ARM Templates

After completing this module, students will be able to:

  • Leverage Azure Resource Manager to organize resources.
  • Use the Azure Portal and Cloud Shell.
  • Use Azure PowerShell and CLI.
  • Use ARM Templates to deploy resources.

Module 4: Virtual Networking

In this module, you will learn about basic virtual networking concepts like virtual networks and subnetting, IP addressing, network security groups, Azure Firewall, and Azure DNS.

Lessons

  • Virtual Networks
  • IP Addressing
  • Network Security groups
  • Azure Firewall
  • Azure DNS

After completing this module, students will be able to:

  • Implement virtual networks and subnets.
  • Configure public and private IP addressing.
  • Configure network security groups.
  • Configure Azure Firewall.
  • Configure private and public DNS zones.

Module 5: Intersite Connectivity

In this module, you will learn about intersite connectivity features including VNet Peering, Virtual Network Gateways, and Site-to-Site Connections.

Lessons

  • VNet Peering
  • VPN Gateway Connections
  • ExpressRoute and Virtual WAN

After completing this module, students will be able to:

  • Configure VNet Peering.
  • Configure VPN gateways.
  • Choose the appropriate intersite connectivity solution.

Module 6: Network Traffic Management

In this module, you will learn about network traffic strategies including network routing and service endpoints, Azure Load Balancer, Azure Application Gateway, and Traffic Manager.

Lessons

  • Network Routing and Endpoints
  • Azure Load Balancer
  • Azure Application Gateway
  • Traffic Manager

After completing this module, students will be able to:

  • Configure network routing including custom routes and service endpoints.
  • Configure an Azure Load Balancer.
  • Configure and Azure Application Gateway.
  • Choose the appropriate network traffic solution.

Module 7: Azure Storage

In this module, you will learn about basic storage features including storage accounts, blob storage, Azure files and File Sync, storage security, and storage tools.

Lessons

  • Storage Accounts
  • Blob Storage
  • Storage Security
  • Azure Files and File Sync
  • Managing Storage

After completing this module, students will be able to:

  • Create Azure storage accounts.
  • Configure blob containers.
  • Secure Azure storage.
  • Configure Azure files shares and file sync.
  • Manage storage with tools such as Storage Explorer.

Module 8: Azure Virtual Machines

In this module, you will learn about Azure virtual machines including planning, creating, availability and extensions.

Lessons

  • Virtual Machine Planning
  • Creating Virtual Machines
  • Virtual Machine Availability
  • Virtual Machine Extensions

After completing this module, students will be able to:

  • Plan for virtual machine implementations.
  • Create virtual machines.
  • Configure virtual machine availability, including scale sets.
  • Use virtual machine extensions.

Module 9: Serverless Computing

In this module, you will learn administer serverless computing features like Azure App Service, Azure Container Instances, and Kubernetes.

Lessons

  • Azure App Service Plans
  • Azure App Service
  • Container Services
  • Azure Kubernetes Service

After completing this module, students will be able to:

  • Create an app service plan.
  • Create a web app.
  • Implement Azure Container Instances.
  • Implement Azure Kubernetes Service.

Module 10: Data Protection

In this module, you will learn about backing up files and folders, and virtual machine backups.

Lessons

  • File and Folder Backups
  • Virtual Machine Backups

After completing this module, students will be able to:

  • Backup and restore file and folders.
  • Backup and restore virtual machines.

Module 11: Monitoring

In this module, you will learn about monitoring your Azure infrastructure including Azure Monitor, alerting, and log analytics.

Lessons

  • Azure Monitor
  • Azure Alerts
  • Log Analytics
  • Network Watcher

After completing this module, students will be able to:

  • Use Azure Monitor.
  • Create Azure alerts.
  • Query using Log Analytics.
  • Use Network Watcher.

Labs

  • Lab : Manage Azure Active Directory Identities
  • Lab : Manage Subscriptions and RBAC
  • Lab : Manage Governance via Azure Policy
  • Lab : Manage Azure resources by Using the Azure Portal
  • Lab : Manage Azure resources by Using ARM Templates
  • Lab : Manage Azure resources by Using Azure PowerShell
  • Lab : Manage Azure resources by Using Azure CLI
  • Lab : Implement Virtual Networking
  • Lab : Implement Intersite Connectivity
  • Lab : Implement Traffic Management
  • Lab : Manage Azure storage
  • Lab : Manage virtual machines
  • Lab : Implement Web Apps
  • Lab : Implement Azure Container Instances
  • Lab : Implement Azure Kubernetes Service
  • Lab : Implement Data Protection
  • Lab : Implement Monitoring


target_au
pre_req

Successful Azure Administrators start this role with experience on operating systems, virtualization, cloud infrastructure, storage structures, and networking.

  • Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).

titleIJAUT – Introduction to Junos Platform Automation and DevOps
days3
seo_titleIJAUT - Introduction to Junos Platform Automation and DevOps Course Training
seo_dec
seo_tkey
categorydevops
vendorJuniper

techonogyJuniper
overviewThis three-day course provides students with introductory knowledge of how to automate Junos using DevOps automation tools, protocols, and technologies. Students receive hands-on experience with tools and languages relevant to automating the Junos OS platform in a DevOps environment. The course includes an introduction to the basic DevOps practices, Junos APIs, and NETCONF. It then focuses on using Python, PyEZ, Ansible, and REST API to automate Junos. XML, JSON, and YAML are introduced as these languages facilitate Junos automation. Through demonstrations and hands-on labs, students will gain experience in automating the Junos operating system and device operations. This course uses Junos OS Release 18.1R1, Junos PyEZ 2.1, and Ansible 2.5.
objective

After successfully completing this course, you should be able to:

  • Describe the Junos operating system and its basic design architecture.
  • Explain traffic processing for transit and exception traffic.
  • Describe the Junos CLI and its features.
  • List and perform initial configuration tasks.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe DevOps principles and practices.
  • Explain how DevOps can benefit an IT organization.
  • List and describe the various APIs Junos provides for automation.
  • Discuss various frameworks, libraries and tools available to automate Junos devices.
  • Read Junos XML documents.
  • Use XPath to navigate a Junos XML document.
  • Use NETCONF and the XML API to issue RPCs.
  • Use NETCONF and the XML API to configure a Junos device.
  • Understand JSON syntax.
  • Understand YAML syntax.
  • Create JSON and YAML documents.
  • Perform Ansible installation.
  • Retrieve information from Junos devices using Ansible.
  • Use Ansible to configure Junos devices.
  • Create and execute simple Python scripts.
  • Use the Python interactive interpreter.
  • Install Junos PyEZ.
  • Use PyEZ to connect to Junos devices.
  • Use PyEZ to issue RPCs.
  • Use PyEZ to modify a Junos device configuration.
  • Use PyEZ to upgrade Junos devices.
  • Describe basic PyEZ exception handling.
  • Describe the capabilities of the Junos REST API.
  • Use the Junos REST API Explorer.
  • Issue Junos REST API RPCs.

outline

Day 1

Chapter 1: Course Introduction

Chapter 2: Introduction to Junos OS

  • Junos OS Basic Design Architecture
  • Traffic Processing
  • CLI Modes and Features
  • Initial Configuration Tasks
  • Interface Types and Configuration
  • Lab 1: Configuring a Device using Junos CLI

 

Chapter 3: Introduction to DevOps

  • Why DevOps?
  • The Benefits of DevOps
  • DevOps Goals and Best Practices

 

Chapter 4: The Junos Automation Stack

  • The Junos Automation Stack and DevOps
  • Junos XML API Overview
  • Junos REST API Overview
  • Junos JET API Overview
  • Review of Junos Automation Tools

 

Day 2

Chapter 5: Introduction to XML and XPath

  • Basic XML Syntax
  • The Junos XML Schema
  • Navigating the Junos XML Schema with XPath
  • Lab 2: Working with XML and XPath

 

Chapter 6: The XML API and NETCONF

  • NETCONF
  • The Junos XML API
  • Languages and Libraries Used to Automate the Junos XML API
  • Case Study
  • Lab 3: Using XML and NETCONF for Automation

 

Chapter 7: Introduction to JSON and YAML

  • The Need to Structure Data
  • JSON Basics
  • YAML Basics
  • Use of JSON and YAML in Junos Automation
  • Lab 4: Using JSON and YAML

 

Chapter 8: Introduction to Ansible

  • Ansible Architecture and Capabilities
  • Ansible Playbook Basics
  • Using Ansible to Retrieve Junos Status Information
  • Using Ansible to Retrieve and Modify Configuration Information
  • Case Study
  • Lab 5: Using Ansible to Automate Junos

 

Chapter 9: Introduction to Python

  • Basic Python Syntax
  • Python 2 vs. Python 3
  • Python Data Types and Variables
  • Python Sequences, Tuples, Sets, and Dictionaries
  • Python Libraries
  • The Python Interactive Interpreter
  • Case Study: Creating a Python Script to Solve a Problem
  • Lab 6: Using the Python Interpreter

 

Day 3

Chapter 10: Introduction to XML and XPath

  • Connecting to Junos Devices with PyEZ
  • Retrieving Junos Device Status and Configuration Handling
  • Modifying the Junos Configuration with PyEZ
  • Using PyEZ utilities to upgrade Junos software
  • Case Study
  • Lab 7: Using PyEZ to Manage Junos Devices

 

Chapter 11: The Junos REST API

  • Overview of the Junos REST API
  • Methods of Connecting to the Junos REST API
  • Configuring the Junos REST API
  • Using the Junos REST API Explorer
  • Using the Junos REST API to Retrieve Junos Configuration Data
  • Case Study
  • Lab 4: Using the REST API

target_au

This course benefits individuals responsible for configuring and monitoring devices running the Junos OS.


pre_req

Basic understanding of the OSI model and the TCP/IP protocol suite;

Basic understanding of computer networking concepts


titleIJSEC – Introduction to Junos Security
days3
seo_titleIJSEC - Introduction to Junos Security Course Training
seo_dec
seo_tkey
categoryjunos-security
vendorJuniper

techonogyJuniper
overview
This 3-day course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration.   The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application-level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies.   Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.   This course is based on Junos OS Release 19.1R1.6.

objective

After completing this course you should be able to:

  • Identify high-level security challenges in today’s networks
  • Identify products that are incorporated into the Juniper Connected Security solution
  • Explain the value of implementing security solutions
  • Explain how Juniper Connected Security solves the cyber security challenges of the future
  • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide
  • Explain traffic flows through the SRX Series devices
  • List the different security objects and how to create them
  • Describe interface types and perform basic interface configuration tasks
  • Describe the initial configuration for an SRX Series device
  • Explain security zones
  • Describe screens and their use
  • Explain address objects
  • Describe services and their use
  • Describe the purpose for security policies on an SRX Series device
  • Describe zone-based policies
  • Describe global policies and their use
  • Explain unified security policies
  • Configure unified security policies with the J-Web user interface
  • Describe IDP signatures
  • Configure an IDP policy using predefined templates with the J-Web user interface
  • Describe the use and configuration of the integrated user firewall feature
  • Describe the UTM security services
  • List the available UTM services on the SRX Series device
  • Configure UTM filtering on a security policy with the J-Web user interface
  • Explain Sky ATP’s use in security
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats
  • Describe NAT and why it is used
  • Explain source NAT and when to use it
  • Explain destination NAT and when to use it
  • Explain static NAT and its uses
  • Describe the operation and configuration the different types of NAT
  • Identify various types of VPNs
  • Describe IPsec VPNs and their functionality
  • Describe how IPsec VPNs are established
  • Describe IPsec traffic processing
  • Configure IPsec VPNs with the J-Web user interface
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface
  • Monitor IPsec VPNs with the J-Web user interface
  • Describe the J-Web monitoring features
  • Explain the J-Web reporting features
  • Describe the Sky Enterprise service and how it can save resources
  • Explain the functionality of Junos Space Security Director

outline

Juniper Security Concepts

  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security

Juniper Connected Security – SRX Series Devices

  • Connected Security
  • Interfaces
  • Initial Configuration
  • LAB 1: Initial Configuration

Security Objects

  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects
  • LAB 2: Creating Security Objects with J-Web

Security Policies

  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies
  • LAB 3: Creating Security Policies with J-Web

Security Services – IDP and User Firewall

  • IDP Security Services
  • Integrated User Firewall
  • LAB 4: Adding IDP and User Firewall Security Services to Security Policies

Security Services – UTM

  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam
  • LAB 5: Adding UTM Security Services to Security Policies

Juniper Connected Security – Sky ATP

  • Sky ATP Overview
  • Blocking Threats
  • Lab 6: Demonstrating Sky ATP

Network Address Translation

  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT
  • Lab 7: Implementing Network Address Translation

IPsec VPN Concepts

  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing

Site-to-Site VPNs

  • IPsec Configuration
  • IPsec Site-to-Site Tunnel
  • Lab 8: Implementing Site-to-Site IPsec VPNs

Monitoring and Reporting

  • J-Web monitoring options
  • J-Web Reporting options
  • Lab 9: Using Monitoring and Reporting

Appendices

  • Appendix A: SRX Series Hardware
  • Appendix B: Virtual SRX
  • Appendix C: CLI Primer
  • Appendix D: Sky Enterprise Services
  • Appendix E: Junos Space Security Director

target_au

Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.


pre_req

Attendees should meet the following prerequisites:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite

titleEMCC – Enterprise Multicloud Automation and Orchestration Using Contrail
days3
seo_titleEMCC - Enterprise Multicloud Automation and Orchestration Using Contrail Course Training
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis three-day course is designed to provide knowledge of how to use Contrail Enterprise Multicloud in cloud networks. Through demonstrations and hands-on labs, students will gain experience in working with Contrail Enterprise Multicloud in Kubernetes, OpenShift, VMware vCenter, Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) environments. Students will also learn how to secure cloud networks with Contrail Security, service chaining, and Juniper cSRX. This course is based on Contrail Release 2003. Enterprise Multicloud Automation and Orchestration Using Contrail (EMCC) is an advanced-level course
objective

After successfully completing this course, you should be able to:

  • Describe the benefits of Contrail Enterprise Multicloud.
  • Describe the use cases of Contrail Enterprise Multicloud.
  • Understand the Contrail Enterprise Multicloud architecture.
  • Explain Kubernetes architecture.
  • Explain how Contrail integrates with Kubernetes.
  • Understand how Contrail Security is used with Kubernetes.
  • List main deployment methods for Contrail with Kubernetes.
  • Explain Red Hat OpenShift architecture.
  • Explain how Contrail integrates with Red Hat OpenShift.
  • Understand how to launch OpenShift workloads and connect them over Contrail Virtual Networks.
  • Understand how Contrail Security is used with Red Hat OpenShift.
  • Explain vCenter architecture.
  • Understand vCenter integration with Contrail.
  • Describe how to connect vCenter workloads using Contrail virtual networks.
  • Describe how to use Contrail Security features to secure vCenter workloads.
  • Understand how VMware vRealize Orchestrator works with Contrail.
  • Explain the main AWS concepts.
  • Describe how to launch AWS workloads with Contrail Enterprise Multicloud .
  • Describe how to connect AWS workloads to private cloud over Contrail VNs.
  • Explain the main Azure concepts.
  • Describe how to launch Azure workloads with Contrail Enterprise Multicloud .
  • Describe how to connect Azure workloads to private cloud over Contrail VNs.
  • Explain the main GCP concepts.
  • Describe how to launch GCP workloads with Contrail Enterprise Multicloud .
  • Describe how to connect GCP workloads to private cloud over Contrail VNs.
  • Describe service chaining within Contrail.
  • Configure In-Network, In-Network-NAT, and Transparent service chains.
  • Understand route leaking, policies, and aggregation in service chains.
  • Understand the features of Juniper cSRX.
  • Configure cSRX service chains

outline

Chapter 1: Course Introduction

Chapter 2: Contrail Enterprise Multicloud Overview

  • CEM Overview
  • CEM Use Cases
  • CEM Architecture

 

Chapter 3: Using Contrail with Kubernetes

  • Kubernetes Architecture
  • Contrail Integration Overview
  • Service and Ingress
  • Workload Isolation
  • Using Contrail Security
  • Deploying Contrail with Kubernetes
  • Lab 1: Contrail and Kubernetes Integration

 

Chapter 4: Using Contrail with Red Hat OpenShift

  • Red Hat OpenShift Overview
  • OpenShift Architecture and Contrail Integration
  • Working with OpenShift and Contrail
  • Case Study
  • Lab 2: Contrail and OpenShift Integration

Chapter 5: Using Contrail with VMware vCenter

  • Overview of VMware vCenter and Contrail Integration
  • Using Contrail vCenter Fabric Manager Plugin
  • Using Contrail Virtual Machine
  • Instantiating vCenter Workloads over Contrail Virtual Networks
  • Securing vCenter Workloads with Contrail Security
  • Contrail and VMware vRealize Orchestrator
  • Lab 3: Contrail and vCenter Integration

 

Chapter 6: Private to Public Cloud Overlay Networking – AWS

  • AWS and Contrail Overview
  • Deploying Contrail Multicloud for AWS
  • Lab 4: Interconnecting Private Cloud Workloads to AWS Workloads

 

Chapter 7: Private to Public Cloud Overlay Networking – Azure

  • Azure and Contrail Overview
  • Deploying Contrail Multicloud for Azure
  • Lab 5: Interconnecting Private Cloud Workloads to Azure Workloads

Chapter 8: Private to Public Cloud Overlay Networking – GCP

  • Google Cloud Platform (GCP) Overview
  • Deploying Contrail Multicloud for GCP

 

Chapter 9: Contrail Service Chains

  • Service Chaining Overview
  • Service Chain Configuration
  • Advanced Service Chain Operation
  • Lab 6: Creating Contrail Service Chains

 

Chapter 10: Service Chaining with cSRX

  • cSRX Overview
  • Multiple Interface Pods in Kubernetes
  • Service Chaining with cSRX
  • Lab 7: Creating Service Chains with cSRX

target_au

The primary audience for this course includes network engineers, administrators, support personnel, and reseller support personnel, responsible for working with Contrail-based networking solutions in data center and enterprise cloud environments.


pre_req

The prerequisites for this course are as follows:

  • TCP/IP networking knowledge
  • Working knowledge of cloud networks
  • Attended Cloud Automation Using Contrail (CAC) course

Recommended prerequisites:


titleJCF – Juniper Cloud Fundamentals
days3
seo_titleJCF - Juniper Cloud Fundamentals Course Training
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis three-day course is designed to provide students with an understanding of cloud enabled networks, cloud service deployment concepts, and virtualized network platforms such as vSRX and vMX. This course provides a high level overview and understanding of the following concepts:
  • Cloud Network Underlays
  • Cloud Network Overlays
  • Cloud Design
  • Cloud Implementation Methods
  • Cloud Services
  • Juniper Networks Virtualized Platforms

objective
  • Describe network overlay and underlay concepts.
  • Describe private, public, and hybrid cloud architecture and implementation.
  • Describe the implementation of services in a cloud networking environment.
  • Describe the implementation and functions of the Juniper vSRX platform.
  • Describe the implementation and functions of the Juniper vMX platform.
  • Describe the implementation and functions of the Juniper NFX platform.
  • Describe the role of Juniper Networks virtualized platforms in public cloud offerings.
  • Describe the functionality and use of Juniper Networks Cloud Connector.
  • Describe the need for Software Defined Networking.
  • Describe basic SDN concepts.
  • Describe common types of SDN implementation.
  • Describe the main Network Function Virtualization components.
  • Describe cloud services monitoring.
  • Describe the functions of AppFormix in cloud services.
  • Describe SDN WAN concepts.
  • Describe the role, functions, and features of the NorthStar Controller.
  • Describe the role, functions, and features of WANDL/IP MPLS View.
  • Describe the role and functions a vCPE and uCPE components.
  • Describe the role and functions of Contrail Service Orchestration.
  • Describe Software Defined Secure Network concepts.
  • Describe methods to secure an SDN environment.

outline

Day1:

1.Course Introduction

2. Cloud Components:

  • Cloud Networking Definition
  • Cloud Architecture
  • XaaS 3 Virtualized Platforms
  • Juniper Networks Virtualized Platforms
  • Juniper Networks Virtualized Platforms in Public Clouds
  • Cloud Connector Lab: Deploying Juniper Networks Virtual Devices – vMX

3.Virtualized Platforms

  •  Juniper Networks Virtualized Platforms
  • Juniper Networks Virtualized Platforms in Public Clouds
  • Cloud Connector Lab: Deploying Juniper Networks Virtual Devices – vMX

Lab: Deploying Juniper Networks Virtual Devices – vMX

4. SDN Fundamentals:

  • The Need for SDN
  • SDN Explained
  • OpenFlow Based SDN
  • SDN as an Overlay
  • SDN via API
  • Applications of SDN

 Day2:

5. Network Function Virtualization:

  • Introduction to NFV
  • NFV Architecture
  • Examples of VNFs

Lab: Manually Deploying VNFs

 

 6.Orchestration and Automation

  • Managing a Cloud Infrastructure
  • OpenStack for Orchestration
  • Contrail/OpenContrail SDN Controller

NSX for SDN

 

 7.AppFormix:

  • Operations Management
  • AppFormix Operation and Use Cases

Lab: AppFormix

 

8.SD WAN Solutions:

  • SD WAN Concepts
  • NorthStar SD WAN Controller
  • NorthStar Controller Use Cases
  • WANDL IP/MPLSView

9.Cloud CPE:

  • Legacy Versus Cloud CPE Architecture
  • Cloud CPE with Contrail Service Orchestration

Lab: Cloud CPE (video demonstration)

 

10 Cloud Security :

  • Legacy Network Security
  • Cloud Security Concepts
  • SDSN Components Lab

Cloud Security using SkyATP


target_au

This course benefits individuals responsible for planning and coordinating cloud enabled networks and services in data center, private cloud, public cloud, hybrid cloud, service provider, and enterprise WAN environments.


pre_req

Students should have basic TCP/IP skills, a general understanding of data center environments, a general understanding of enterprise WAN environments, and a basic understanding of virtualization


titleIJSA – Implementing Juniper Networks Secure Analytics
days5
seo_titleIJSA - Implementing Juniper Networks Secure Analytics Course Training
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogy
overviewThis three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.   Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4. Implementing Juniper Networks Secure Analytics is an introductory-level course.
objective
  • After successfully completing this course, you should be able to:
  • Describe the JSA system and its basic functionality.
  • Describe the hardware used with the JSA system.
  • Identify the technology behind the JSA system.
  • Identify the JSA system’s primary design divisions—display versus detection, and events versus traffic.
  • Plan and prepare for a new installation.
  • Access the administration console.
  • Configure the network hierarchy.
  • Configure the automatic update process.
  • Access the Deployment Editor.
  • Describe the JSA system’s internal processes.
  • Describe event and flow source configuration.
  • List key features of the JSA architecture.
  • Describe the JSA system’s processing logic.
  • Interpret the correlation of flow and event data.
  • List the architectural component that provides each key function.
  • Describe Events and explain where they come from.
  • Access the Log Activity interface.
  • Execute Event searches.
  • Describe flows and their origin.
  • Configure the Network Activity interface.
  • Execute Flow searches.
  • Specify the JSA system’s Asset Management and Vulnerability Assessment functionality.
  • Access the Assets interface.
  • View Asset Profile data.
  • View Server Discovery.
  • Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).
  • Access vulnerability scanner configuration.
  • View vulnerability profiles.
  • Describe rules.
  • Configure rules.
  • Configure Building Blocks (BBs).
  • Explain how rules and flows work together.
  • Access the Offense Manager interface.
  • Understand Offense types.
  • Configure Offense actions.
  • Navigate the Offense interface.
  • Explain the Offense summary screen.
  • Search Offenses.
  • Use the JSA system’s Reporting functionality to produce graphs and reports.
  • Navigate the Reporting interface.
  • Configure Report Groups.
  • Demonstrate Report Branding.
  • View Report formats.
  • Identify the basic information on maintaining and troubleshooting the JSA system.
  • Navigate the JSA dashboard.
  • List flow and event troubleshooting steps.
  • Access the Event Mapping Tool.
  • Configure Event Collection for Junos devices.
  • Configure Flow Collection for Junos devices.
  • Explain high availability (HA) functionality on a JSA device.

outline
  • Chapter 1: Course Introduction
  • Chapter 2: Product Overview
  • Overview of the JSA Series Device
  • Hardware
  • Collection
  • Operational Flow
  • Chapter 3: Initial Configuration
  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
  • Lab 1: Initial Configuration
  • Chapter 4: Architecture
  • Processing Log Activity
  • Processing Network Activity
  • JSA Deployment Options
  • Chapter 5: Log Activity
  • Log Activity Overview
  • Configuring Log Activity
  • Lab 2: Log Activity
  • Chapter 6: Network Activity
  • Network Activity Overview
  • Configuring Network Activity
  • Lab 3: Network Activity
  • Chapter 7: Assets and Vulnerability Assessment
  • Asset Interface
  • Vulnerability Assessment
  • Vulnerability Scanners
  • Lab 4: Assets and Vulnerability Assessment
  • Chapter 8: Rules
  • Rules
  • Configure Rules and Building Blocks
  • Lab 5: Rules
  • Chapter 9: Offense Manager
  • Offense Manager
  • Offense Manager Configuration
  • Offense Investigation
  • Lab 6: Configure the Offense Manager
  • Chapter 10: JSA Reporting
  • Reporting Functionality
  • Reporting Interface
  • Lab 7: Reporting
  • Chapter 11: Basic Tuning and Troubleshooting
  • Basic Tuning
  • Troubleshooting
  • Chapter 12: Configuring Junos Devices for Use with JSA
  • Collecting Junos Events
  • Collecting Junos Flows
  • Lab 8: Configuring Junos Devices for JSA
  • Appendix A: High Availability
  • High Availability
  • Configuring High Availability

 


target_au

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing the JSA system.

 


pre_req
  • This course assumes that students have basic networking knowledge and experience in the following areas:
  • Understanding of TCP/IP operation;
  • Understanding of network security concepts; and
  • Experience in network security administration.

titleCAC – Cloud Automation Using Contrail
days5
seo_titleCAC - Cloud Automation Using Contrail Course Training
seo_dec
seo_tkey
categorycloud
vendorJuniper

techonogyCloud Computing
overviewThis five-day course is designed to provide students with the knowledge required to work with the Juniper Contrail software-defined networking (SDN) solution. Students will gain in-depth knowledge of how to use the Contrail Command user interface, Contrail Networking, Contrail’s fabric management and administration features, and Contrail Security, as well as AppFormix analytics features. Students will also learn to use APIs and the CLI to perform the Contrail configuration tasks. Through demonstrations and hands-on labs, students will gain experience with the features of Contrail and AppFormix. This course is based on Contrail Release 1912 and AppFormix 2.19.10. Cloud Automation Using Contrail is an intermediate-level course
objective

After successfully completing this course, you should be able to:

  • Explain the role of Contrail SDN Controller.
  • List available Contrail solutions.
  • Describe the purpose of an orchestrator.
  • Describe the basics of Kubernetes.
  • Identify the function of each of the main OpenStack Projects.
  • Describe the purpose of Contrail.
  • Explain how the versions of Contrail differ.
  • Discuss Contrail related solutions.
  • Describe the functions of the Contrail vRouter and Contrail Controller.
  • Explain the role of the control, configuration, and analytic nodes.
  • Configure and deploy virtual DNS and IPAMs.
  • Create virtual networks.
  • Create policies to control the flow of traffic.
  • Explain the routing behavior of an IP Fabric
  • Describe the steps to onboard a Brownfield IP Fabric.
  • Describe the steps to onboard a Greenfield IP Fabric.
  • Describe the various commands to troubleshoot the onboarding of an IP Fabric.
  • Explain the benefits of VXLAN in the data center.
  • Describe EVPN signaling for VXLAN.
  • Describe how CEM can bridge between a VM and a BMS.
  • Implement bridging between VMs and BMSs using VXLAN and EVPN signaling.
  • Describe EVPN signaling for VXLAN routing in the Spine.
  • Describe how to enable central routing using CEM.
  • Describe EVPN signaling for DCI.
  • Describe how to enable DCI using CEM.
  • Create physical gateways.
  • Describe architecture and capabilities of Contrail Security.
  • Configure main Contrail Security features.
  • Explain the benefits of AppFormix.
  • Explain the operation and use of AppFormix.
  • Explain how to setup and install AppFormix in different environments.
  • Explain the purpose and use of the different AppFormix features.
  • Understand the purpose of the Clusters feature.
  • Describe how to use the dashboard to examine the state of the network.
  • Understand the purpose and use of the Charts feature.
  • Explain the benefits of capacity planning.
  • Explain how to setup the chargeback functionality.
  • Explain how to use AppFormix charts.
  • Explain how to use AppFormix heat maps.
  • Describe the benefits of reports and service monitoring functionalities.
  • Explain the purpose and use of AppFormix alarms.
  • Explain the purpose and use of AppFormix Composite Alarms.
  • Explain the purpose of JTI.
  • Discuss native sensors.
  • Explain OpenConfig and gRPC sensors.
  • Describe best practices for JTI.
  • Explain how to use JTI with AppFormix.

outline

Chapter 1: Course Introduction

Chapter 2: SDN and Contrail

  • Review of SDN
  • Contrail Basics Contrail Advantages, Capabilities, and Features Contrail Products and Solutions Contrail Use Cases Contrail Command
  • Lab 1: Contrail Command Walkthrough

 

Chapter 3: Orchestration Fundamentals

  • Orchestrator Overview
  • Kubernetes Orchestrator
  • OpenStack Orchestrator
  • Lab 2: Instantiating Virtual Workloads

Chapter 4: Contrail Architecture Fundamentals

  • Contrail Architecture Overview
  • Contrail Management and Analytics
  • Contrail Control Plane Communications
  • Contrail Data Plane Communications
  • Basic Contrail Troubleshooting
  • Lab 3: Exploring and Troubleshooting the Contrail vRouter and SDN Controller

 

Chapter 5: Contrail Configuration

  • Contrail Configuration Methods
  • Configuring DNS and IPAM
  • Configuring the Metadata Service
  • Configuring Virtual Networks
  • Configuring Network Policies and Security Groups
  • Contrail Configuration API
  • Lab 4: Configuring Virtual Networks and Policies

 

Chapter 6: IP Fabric Automation

  • IP Fabric Review
  • Greenfield Fabric Automation
  • Brownfield Fabric Automation
  • Troubleshooting Fabric Automation
  • Lab 5: IP Fabric Automation

Chapter 7: VM to BMS Bridging

  • VXLAN Review
  • EVPN Signaling for BMS to BMS VXLAN Forwarding
  • Contrail VM to BMS Bridging<./li>
  • Server/Instance example
  • Virtual Port Groups
  • Lab 6: VM to BMS Bridging

 

Chapter 8: VXLAN Routing

  • EVPN Signaling for Central Routing
  • Central Routing Example
  • EVPN Signaling for Edge Routing
  • Edge Routing Example
  • Lab 7: VXLAN Routing

 

Chapter 9: Data Center Interconnect

  • DCI Overview
  • DCI Options for a VXLAN Overlay using Contrail Automation
  • DCI Example using Contrail Automation
  • Lab 8: Data Center Interconnect

Chapter 10: Interacting with External Networks

  • DC Gateway Use Case/LI>
  • Implementing a DC Gateway
  • Lab 9: DC Gateway

 

Chapter 11: Fabric Administration

  • Generic Device Operations/LI>
  • Hitless Fabric Upgrade
  • Lab 10: Fabric Administration

 

Chapter 12: Contrail Security

  • The Need for Contrail Security
  • Contrail Security Configuration
  • Monitoring and Visualization
  • Lab 11: Contrail Security

Chapter 13: AppFormix Overview

  • AppFormix Overview
  • AppFormix UI and General Settings AppFormix Features Overview: Clusters, Dashboard, Charts, Heat Map, Plan, Reports, Chargeback

 

Chapter 14: Alarms and Composite Alarms

  • Alarms
  • Alarms Case Study
  • Composite Alarms
  • Lab 12: Implementing AppFormix Features

 

Chapter 15: Junos Telemetry Interface

  • JTI Overview
  • Native Sensors for JTI
  • OpenConfig and gRPC Sensors for JTI
  • Lab 13: Implementing JTI with AppFormix

target_au

This course benefits individuals responsible for working with software-defined networking solutions in data center, service provider, and enterprise network environments.


pre_req

The prerequisites for this course are as follows:

  • Basic TCP/IP skills;
  • General understanding of data center virtualization;
  • Basic understanding of the Junos operating system;
  • Completion of the Data Center Fabric with EVPN and VXLAN (ADCX) course or equivalent knowledge; and
  • Completion of the Juniper Cloud Fundamentals (JCF) course; and
  • Basic knowledge of object-oriented programming and Python scripting is recommended.

Recommended prerequisites:


titleJND-DC – Juniper Networks Design – Data Center
days5
seo_titleJND-DC - Juniper Networks Design - Data Center Course Training
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for data center design including data center architectures, data center interconnects, security considerations, virtualization, and data center operations.
objective

After successfully completing this course, you should be able to:

  • State high-level concepts about different data center architectures.
  • Identify features used to interconnect data centers.
  • Identify key high-level considerations about securing and monitoring a data center deployment.
  • Outline key high-level concepts when implementing different data center approaches.
  • Recommend data center cooling designs and considerations.
  • Explain device placement and cabling requirements.
  • Outline different data center use cases with basic architectures.
  • Describe a traditional multitier data center architecture.
  • Explain link aggregation and redundant trunk groups.
  • Explain multichassis link aggregation.
  • Summarize and discuss key concepts and components of a Virtual Chassis.
  • Summarize and discuss key concepts and components of a VCF.
  • Summarize and discuss key concepts and components of a QFabric System.
  • Summarize and discuss key concepts and components of Junos Fusion.
  • List the reasons for the shift to IP fabrics.
  • Summarize how to scale an IP fabric.
  • State the design considerations of a VXLAN overlay.
  • Define the term Data Center Interconnect.
  • List differences between the different Layer 2 and Layer 3 DCIs.
  • Summarize and discuss the benefits and use cases for EVPN.
  • Discuss the security requirements and design principles of the data center.
  • Identify the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.
  • Summarize and discuss the purpose of SDN.
  • Explain the function of Contrail.
  • Summarize and discuss the purpose of NFV.
  • Discuss the purpose and function of vSRX and vMX.
  • Discuss the importance of understanding the baseline behaviors in your data center.
  • List the characteristics of the Junos Space Network Management Platform and describe its deployment options.
  • Describe the importance of analytics.
  • Discuss automation in the data center.
  • Discuss the benefits of QoS and CoS.
  • State the benefits of a converged network.
  • Identify general aspects of data center migration.
  • Summarize and discuss best practices for migration planning.
  • Outline some common migration scenarios.
  • Summarize high availability design considerations in the data center.
  • Provide an overview of high availability offerings and solutions in the data center

outline

Chapter 1: Course Introduction

Chapter 2: Overview of Data Center Design

  • Initial Considerations
  • Architectures and Design considerations
  • Connecting Data Centers
  • Security and Operation
  • Implementation Considerations

Chapter 3: Initial Design Considerations

  • Physical Layout and Placement
  • Environmental Conditions
  • Cabling Options
  • Data Center Use Cases

Chapter 4: Traditional Data Center Architecture

  • Traditional Multi-tier Architecture
  • Link Aggregation and Redundant Trunk Groups
  • Multichassis Link Aggregation
  • Designing a Multi-tier Architecture Lab

Chapter 5: Ethernet Fabric Architectures

  • Virtual Chassis
  • Virtual Chassis Fabric
  • QFabric
  • Junos Fusion
  • Ethernet Fabric Design Considerations
  • Lab: Ethernet Fabric Architecture

Chapter 6: IP Fabric Architecture

  • The Shift To IP Fabrics
  •  IP Fabric Routing Design
  • IP Fabric Scaling
  • VXLAN
  • Lab: IP Fabric Architecture

Chapter 7: Data Center Interconnect

  • DCI Overview
  • Layer 2 DCI
  • EVPN Use Cases
  • Layer 3 DCI
  • Lab: Interconnecting Data Centers

Chapter 8: Securing the Data Center

  • Overview of Data Center Security
  • Security Elements
  • Simplifying Security in the Data Center
  • Advanced Data Center Security
  • Lab: Securing the Data Center

Chapter 9: SDN and Virtualization in the Data Center

  • Designing SDN in the Data Center
  • Using Contrail in the Data Center
  • Using NFV in the Data Center
  • Understanding How Contrail Works in the Data Center
  • Working in Virtual Environments in the Data Center
  • Lab: SDN and Virtualization

Chapter 10: Data Center Operation

  • Understanding baseline behaviors
  • Deploying Junos Space and JSA
  • Understanding analytics
  • Deploying automation in the data center
  • Lab: Data Center Operations

Chapter 11: Traffic Prioritization for Converged Networks

  • Understanding QoS, and CoS
  • Converging Networks
  • Lab: Prioritizing Data in the Data Center

Chapter 12: Migration Strategies

  • Migration Overview
  • Common Scenarios
  • Migration Case Study
  • Lab: Data Center Migration

Chapter 13: High Availability

  • Data Center High Availability Overview
  • Link Level and Physical Device Redundancy
  • Device-Level Redundancy

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of design for the data center


pre_req

The following are the prerequisites for this course:

  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Basic knowledge of hypervisors and load balancers.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

Recommended prerequisites:


titleJND-SEC – Juniper Networks Design Security
days5
seo_titleJND-SEC - Juniper Networks Design Security Course Training
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis five-day course is designed to cover best practices, theory, and design principles for security design, including traditional and modern security principles such as security design specifics for campus and branch, enterprise wide area network (WAN), service provider WAN, and data center deployments. This course also includes design principles for security management, automation, and virtualization.JND-SEC is an intermediate-level course.
objective
  • After successfully completing this course, you should be able to:
  • Identify high level security challenges with different design architectures.
  • Explain the value of implementing security solutions in any network design.
  • Identify key factors in Juniper Networks security focus.
  • List and describe the security platforms and solutions offered by Juniper Networks.
  • Perform the steps necessary to identify customer security requirements.
  • Explain what is required to define the scope of the security design.
  • Identify the data required to perform a data analysis of the customer’s existing network and use that information in the design.
  • Describe traditional security practices used to secure a network.
  • Explain the added capabilities that next generation firewalls provide.
  • Explain the evolution of modern security models.
  • Describe intelligent networks.
  • Explain how Software-Defined Secure Networking improves security in network design.
  • Explain the need for centralized Security Management.
  • Describe what Junos Space Security Director can do to manage network security.
  • Describe the function of Juniper Secure Analytics in managing network security.
  • List the main components of the Juniper Automation Stack.
  • Explain Juniper Networks automation solutions.
  • Describe the benefits of automating security.
  • Describe how security works in a virtualized environment.
  • Explain the benefits of service chaining.
  • Describe Juniper Virtual SRX and Container SRX products.
  • Describe network virtualization with VMware NSX.
  • Describe the benefits of HA with security devices.
  • Discuss how to handle asymmetric traffic with security devices.
  • Describe different options for SRX chassis cluster deployments.
  • Describe the main security concerns for the campus and the branch networks.
  • Explain end-to-end security concepts.
  • Describe security functions at different network layers.
  • Explain network authentication and access control concepts.
  • Describe common campus and branch network security design examples.
  • Describe security considerations for the enterprise WAN.
  • Explain when to use IPsec and NAT in the enterprise WAN.
  • Explain virtual router applications for the enterprise WAN.
  • Discuss security best practices in the enterprise WAN.
  • Describe security in the service provider WAN.
  • Discuss security best practices for the service provider WAN.
  • Discuss the security requirements and design principles of the data center.
  • Describe the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.

outline
  • Chapter 1: Course Introduction
  • Chapter 2:Security in Network Design
  • The Value of Security in Network Design
  • Juniper’s Security Focus
  • Chapter 3: Assessing Security in Network Design
  • Overview
  • Customer Security Requirements
  • Customer Scope
  • Data Analysis
  • Chapter 4: Traditional Security Architectures
  • Traditional Security Practices
  • NAT
  • IPsec VPNs
  • Next Generation Firewalls
  • Unified Threat Management
  • Lab: Designing a Traditional Security Architecture
  • Chapter 5: Modern Security Principles
  • Modern Security Model
  • Designing an Intelligent Network
  • Use Cases
  • Modularity in Security Design
  • Lab: Designing for Security Intelligence
  • Chapter 6: Managing Security
  • Security Management Challenges
  • Junos Space Security Director
  • Juniper Secure Analytics
  • Lab: Security Management
  • Chapter 7: Automating Security
  • Automating Security Introduction
  • Juniper Automation Stack
  • Juniper Automation Tools
  • Automating Security
  • Lab: Automating Security
  • Chapter 8: Virtualizing Security
  • Security in a Virtualized Environment
  • Virtual SRX
  • Security with SDN and NFV
  • Container SRX
  • Network Virtualization with VMware NSX
  • Lab: Virtualizing Security
  • Chapter 9: Providing High Availability in Security Design
  • Benefits of High Availability with Security Devices
  • Implementing Physical High Availability
  • Asymmetrical Traffic Handling
  • SRX Chassis Clustering
  • Lab: High Availability
  • Chapter 10: Securing the Campus and Branch
  • Campus and Branch Security: An Overview
  • Network Segmentation and Perimeter Security
  • Application-Level Security
  • Access Control and Authentication
  • Layer 2 Security Functions
  • Case Studies and Example Architectures
  • Lab: Designing for Campus and Branch Security
  • Chapter 11: Securing the Enterprise WAN
  • Security in the Enterprise WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures
  • Lab: Designing for Enterprise WAN Security
  • Chapter 12: Securing the Service Provider WAN
  • Security in the Service Provider WAN: An Overview
  • Best Practices and Considerations
  • Case Studies and Example Architectures
  • Lab: Designing for Service Provider WAN Security
  • Chapter 13: Securing the Data Center
  • Overview of Data Center Security
  • Security Elements
  • Simplifying Security in the Data Center
  • Advanced Data Center Security
  • Lab: Securing the Data Center
  • Appendix A: Juniper Security Solutions
  • Security Products and Solutions

 


target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design


pre_req
  • The following are the prerequisites for this course:
  • Knowledge of network security concepts, including: Traditional and next-generation firewalls; IPsec VPNs; Network Address Translation (NAT); and Security intelligence.
  • Knowledge of Juniper Networks products and solutions.
  • Network automation and virtualization concepts.
  • Basic knowledge of hypervisors and high availability concepts.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

 

Recommended prerequisites:


titleJND-SP – Juniper Networks Design-Service Provider
days5
seo_titleJND-SP - Juniper Networks Design-Service Provider Course Training
seo_dec
seo_tkey
categorynetwork-design
vendorJuniper

techonogyEnterprise Networking
overviewThis JND-SP course is designed to cover best practices, theory, and design principles for Wide Area Network (WAN) design including WAN interconnects, security considerations, virtualization, and management/operations. This course covers both service provider and enterprise WAN design.
objective
  • Describe high level concepts about the different WAN architectures.
  • Identify key features used to interconnect WANs.
  • Describe key high level considerations about securing and monitoring a WAN deployment.
  • Outline high level concepts for implementing WANs.
  • Explain various methods of WAN connectivity.
  • Describe basic MPLS concepts as they are related to WANs.
  • Identify basic Ethernet concepts as they are related to WANs.
  • Describe key concepts of network availability.
  • Explain high availability features and protocols.
  • Describe the key aspects of class of service.
  • Describe how core WAN technologies are used to solve specific problems facing network designers.
  • Discuss core routing requirements.
  • Explain how to design a high performance MPLS WAN core.
  • Define CoS requirements for the WAN core.
  • Discuss BGP peering and path selection.
  • Design MPLS Layer 2 and Layer 3 services.
  • Design metro Ethernet networks.
  • Understand role of class of service in provider edge.
  • Describe Next-generation MVPNs.
  • Explain how enterprise WAN technologies are used to solve specific problems facing network designers.
  • Outline various solutions regarding campus and branch WANs.
  • Explain how data centers are interconnected through WANs.
  • Identify various solutions regarding data center WAN interconnection.
  • Describe the benefits and use cases for EVPN.
  • Describe security concepts regarding WANs.
  • Explain the differences between LAN security concepts and WAN security concepts.
  • Explain VPN-related concepts regarding WANs.
  • Describe methods to manage WANs.
  • Discuss key concepts related to WAN management.
  • Explain how virtualization and SDN can be leveraged in the WAN.
  • Describe various SDN products and how they are used in the WAN.
  • Describe MX, SRX, T, PTX, ACX, QFX, EX, and NFX Series devices and the basics of how they relate to WAN solutions

outline

Day 1

COURSE INTRODUCTION

Overview of WAN Design

  • WAN Design Overview
  • WAN Domains
  • Management, Operations, and Security
  • Implementation Considerations

WAN Connectivity

  • Public and Private
  • Service Provider
  • Enterprise

Network Availability and Traffic Prioritization

  • Network Availability
  • Class of Service

LAB: Network Availability and CoS Design

Day 2

Service Provider Core WAN

  • WAN Core Overview
  • Core Routing
  • MPLS Design
  • CoS Considerations

Lab : WAN Core Design

Day 3

Service Provider Edge WAN

  • Provider Edge

Lab: Service Provider Edge—VPN Design

Access and Aggregation Edge

  • Services
  • CoS Considerations
  • Multicast

Lab : Service Provider Edge—Services Design

Day 4

Enterprise WAN

  • Enterprise WAN Overview
  • WAN Topologies
  • Campus and Branch
  • CoS Considerations
  • Large Enterprise Designs

LAB: Enterprise WAN Design

Data Center WAN

  • WAN Overview
  • EVPN

LAB: Data Center WAN Design

WAN Security

  • Security Overview
  • WAN Versus LAN
  • Service Provider Core WAN Security
  • Service Provider Edge WAN Security
  • Enterprise WAN Security

LAB: Security Design

Day 5

WAN Management

  • Best Practices and Considerations
  • OoB Management Design
  • Junos Space
  • Juniper WAN Automation

LAB: WAN Management Design

WAN Virtualization and SDN

  • SDN Overview
  • NorthStar
  • Contrail
  • SD-WAN

LAB: SDN Design

WAN Device Portfolio

  • Platform and Junos Overview
  • MX Series
  • SRX Series
  • PTX and T Series
  • ACX Series
  • QFX Series
  • EX Series
  • NFX Series

target_au

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of WAN design.


pre_req
  • Knowledge of routing and switching architectures and protocols.
  • Knowledge of Juniper Networks products and solutions.
  • Understanding of infrastructure security principles.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

titleNSE 4 – FortiGate v7.0 Bundle Training
days5
seo_titleFortiGate v6.4 Bundle Course Training | Fortinet NSE 4 Certification
seo_decIn this course, you will learn how to use basic FortiGate features, including security profiles, advanced FortiGate networking and security.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this 5 days course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, SSL VPN, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics. Product Versions
  • FortiOS 7.0
This FortiGate Bundle Training course help participants prepare for the NSE 4 certification exam.
objective

After completing this course, you should be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Identify the characteristics of the Fortinet Security Fabric
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Offer an SSL VPN for secure access to your private network
  • Collect and interpret log entries
  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load-balanced deployments
  • Configure SD-WAN to load balance traffic between multiple WAN links effectively
  • Inspect traffic transparently, forwarding as a Layer 2 device
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Diagnose and correct common problems

outline

FortiGate Security:

  1. Introduction and Initial Configuration
  2. Security Fabric
  3. Firewall Policies
  4. Network Address Translation (NAT)
  5. Firewall Authentication
  6. Logging and Monitoring
  7. Certificate Operations
  8. Web Filtering
  9. Application Control
  10. Antivirus
  11. Intrusion Prevention and Denial of Service
  12. SSL VPN

 

FortiGate Infrastructure:

  1. Routing
  2. SD-WAN Local Breakout
  3. Virtual Domains (VDOMs)
  4. Layer 2 Switching
  5. IPsec VPN
  6. Fortinet Single Sign-On (FSSO)
  7. High Availability (HA)
  8. Diagnostics

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network

titleNSE 4 – FortiGate Infrastructure v7.0
days2
seo_titleFortiGate Infrastructure v6.4 Course Training | Fortinet NSE 4 Certification
seo_decIn this FortiGate Infrastructure course, you will learn how to use advanced FortiGate networking and security.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics. Product Versions:
  • FortiOS 7.0

objective

After completing this course, you will be able to:

  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multipath and load-balanced deployments
  • Configure SD-WAN to load balance traffic between multiple WAN links effectively
  • Inspect traffic transparently, forwarding as a Layer 2 device
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a meshed or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Diagnose and correct common problems

outline
  1. Routing
  2. SD-WAN Local Breakout
  3. Virtual Domains (VDOMs)
  4. Layer 2 Switching
  5. IPsec VPN
  6. Fortinet Single Sign-On (FSSO)
  7. High Availability (HA)
  8. Diagnostics

target_au

Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate devices should attend this course.

This course assumes knowledge of basic FortiGate fundamentals. You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network
  • Knowledge of the fundamentals of FortiGate, as presented in the FortiGate Security course

titleNSE 4 – FortiGate Security v7.0
days3
seo_titleFortiGate Security v6.4 Course Training | Fortinet NSE 4 Certification
seo_decIn this FortiGate Security course, you will learn how to use basic FortiGate features, including security profiles.
seo_tkey
categorynetwork-security-courses
vendorFortinet

techonogySecurity
overviewIn this course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, SSL VPN, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security. Product Versions:
  • FortiOS 7.0

objective

After completing this course, you will be able to:

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Identify the characteristics of the Fortinet Security Fabric
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Fight hacking and denial of service (DoS)
  • Offer an SSL VPN for secure access to your private network
  • Collect and interpret log entries

outline
  1. Introduction and Initial Configuration
  2. Security Fabric
  3. Firewall Policies
  4. Network Address Translation (NAT)
  5. Firewall Authentication
  6. Logging and Monitoring
  7. Certificate Operations
  8. Web Filtering
  9. Application Control
  10. Antivirus
  11. Intrusion Prevention and Denial of Service
  12. SSL VPN

target_au

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations’ networks should attend this course.

You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


pre_req
  • Knowledge of network protocols
  • Basic understanding of firewall concepts

titleCompTIA A+ Certification
days5
seo_titleCompTIA A+ Certification Course Training
seo_dec
seo_tkey
categoryit-services-management-training
vendorComptia

techonogyIT Services Management
overviewCompTIA A+ Certification is the industry standard for validating the foundational skills needed by support technicians in today's digital world. A technical support professional does much more than fix a PC, they now have to understand how applications work across systems and be capable of solving problems that help to keep the business running smoothly. The CompTIA A+ Certification has recently been updated to reflect the growing focus on topics such cybersecurity, Prvacy, IoT, Scripting, Virtualisation and Cloud. This certification requires that you pass two exams: CompTIA A+ Core 1 Exam 220-1001 and Core 2 Exam 220-1002.
objective

After completing this course you should be able to:

  • Support basic IT infrastructure, including endpoint management, advanced device connectivity troubleshooting, and basic networking
  • Configure and support PC, mobile and IoT device hardware, including components, connectors and peripherals
  • Implement basic data backup and recovery methods and apply data storage and management best practices
  • Demonstrate baseline security skills for IT support professionals, including detecting and removing malware, addressing privacy concerns, physical security and device hardening
  • Configure device operating systems, including Windows, Mac, Linux, Chrome OS, Android and iOS and administer client-based as well as cloud-based (SaaS) software
  • Troubleshoot and problem solve core service and support challenges while applying best practices for documentation, change management, and the use of scripting in IT support

outline

Supporting Operating Systems

  • Identify Common Operating Systems
  • Troubleshooting Methodolgy
  • Use Windows Features and Tools
  • Manage Files in Windows
  • Manage Disks in Windows
  • Manage Devices in Windows

Installing and Configuring PC Components

  • Use Appropriate Safety Procedures
  • PC Components
  • Common Connection Interfaces
  • Install Peripheral Devices

Installing, Configuring and Troubleshooting Display and Multimedia Devices

  • Install and Configure Display Devices
  • Troubleshoot Display Devices
  • Install and Configure Multimedia Devices

Installing, Configuring and Troubleshooting Storage Devices

  • Install System Memory
  • Insall and Configure Mass Storage Devices
  • Install and Configure Removable Storage
  • Configure RAID
  • Troublshoot Storage Devices

Installing, Configuring and Troubleshooting Internal System Components

  • Install and Upgrade CPUs
  • Configure and Update BIOS/UEFI
  • Install Power SUpplies
  • Troubleshoot Internal System Components
  • Configure a Custom PC

Installing, Configuring and Maintaining Operating Systems

  • Configure and Use Linux
  • Configure and Use macOS
  • Install and Upgrade Operating Systems
  • Maintain OSs

Maintaining and Troubleshooting Microsoft Windows

  • Install and Manage Windows Applications
  • Manage Windows Performance
  • Troublshoot WIndows

Network Infrastructure Concepts

  • Wired Networks
  • Network Hardware Devices
  • Wireless Networks
  • Internet Connection Types
  • Network Configuration Concepts
  • Network Services

Configuring and Troubleshooting Networks

  • Configure Network Connection Settings
  • Install and Configure SOHO Networks
  • Configure SOHO Network Security
  • Configure Remote Access
  • Troubleshoot Network Connectons
  • Install and configure IoT Devices

Managing Users, Workstations and Shared Resources

  • Manage Users
  • Configure Shared Resources
  • Configure Active Directory Accounts and Policies

Implementing Client Virtualization and Cloud Computing

  • Configure Client-Side Virtualization
  • Cloud Computing Concepts

Security Concepts

  • Logical Security Concepts
  • Threat and Vulnerabilities
  • Physical Security Measures

Securing Workstations and Data

  • Implement Security Best Practices
  • Implement Data Protection Policies
  • Protect Data During Incident Response

Troubleshooting Workstation Security Issues

  • Detect, Remove and Prevent Malware
  • Troubleshoot Common Workstation Security Issues

Supporting and Troubleshooting Laptops

  • Use Laptop Features
  • Install and Configure Laptop Hardware
  • troublshoot Common Laptop Issues

Supporting and Troublshooting Mobile Devices

  • Mobile Device Types
  • Connect and Configure Mobile Device Accessories
  • Configure Mobile Device Network Connectivity
  • Support Mobile Apps
  • Secure Mobile Devices
  • Troublshoot Mobile Device Issues

Installing, Configuring and Troubleshooting Print Devices

  • Maintain Laser Printers
  • Maintain Inkjet Printers
  • Maintain Impact, Thermak and 3D Printers
  • Install and Configure Printers
  • Troubleshoot Print Device Issues
  • Install and Configure Imaging Devices

Implementing Operational Procedures

  • Environmental Impacts and Controls
  • Create and Maintain Documentation
  • Use Basic Change Management Best Practices
  • Implement Disaster Prevention and Recovery Methods
  • Basic Scripting Concepts
  • Professionalism and Communication

target_au
pre_req
  • Recognize the main components of a PC and different data media such as USB drives and DVD.
  • Start the computer and navigate the desktop.
  • Use Windows Explorer to create directories and subdirectories and manage files.
  • Use a web browser such as Internet Explorer to view websites.

titleSESA v3.1 – Securing Email with Cisco Email Security Appliance
days4
seo_titleSESA - Securing Email with Cisco Email Security Appliance Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications. This class will help you
  • Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
  • Gain leading-edge career skills focused on enterprise security
  • Earn 24 Cisco CE credits toward recertification

objective

After taking this course, you should be able to:

  • Describe and administer the Cisco Email Security Appliance (ESA)
  • Control sender and recipient domains
  • Control spam with Talos SenderBase and anti-spam
  • Use anti-virus and outbreak filters
  • Use mail policies
  • Use content filters
  • Use message filters to enforce email policies
  • Prevent data loss
  • Perform LDAP queries
  • Authenticate Simple Mail Transfer Protocol (SMTP) sessions
  • Authenticate email
  • Encrypt email
  • Use system quarantines and delivery methods
  • Perform centralized management using clusters
  • Test and troubleshoot

outline
  • Describing the Cisco Email Security Appliance
  • Administering the Cisco Email Security Appliance
  • Controlling Sender and Recipient Domains
  • Controlling Spam with Talos SenderBase and Anti-Spam
  • Using Anti-Virus and Outbreak Filters
  • Using Mail Policies
  • Using Content Filters
  • Using Message Filters to Enforce Email Policies
  • Preventing Data Loss
  • Using LDAP
  • SMTP Session Authentication
  • Email Authentication
  • Email Encryption
  • Using System Quarantines and Delivery Methods
  • Centralized Management Using Clusters
  • Testing and Troubleshooting
  • References

Lab outline

  • Verify and Test Cisco ESA Configuration
  • Perform Basic Administration
  • Advanced Malware in Attachments (Macro Detection)
  • Protect Against Malicious or Undesirable URLs Beneath Shortened URLs
  • Protect Against Malicious or Undesirable URLs Inside Attachments
  • Intelligently Handle Unscannable Messages
  • Leverage AMP Cloud Intelligence Via Pre-Classification Enhancement
  • Integrate Cisco ESA with AMP Console
  • Prevent Threats with Anti-Virus Protection
  • Applying Content and Outbreak Filters
  • Configure Attachment Scanning
  • Configure Outbound Data Loss Prevention
  • Integrate Cisco ESA with LDAP and Enable the LDAP Accept Query
  • Domain Keys Identified Mail (DKIM)
  • Sender Policy Framework (SPF)
  • Forged Email Detection
  • Configure the Cisco SMA for Tracking and Reporting

target_au
  • Security engineers
  • Security administrators
  • Security architects
  • Operations engineers
  • Network engineers
  • Network administrators
  • Network or security technicians
  • Network managers
  • System designers
  • Cisco integrators and partners

pre_req

To fully benefit from this course, you should have one or more of the following basic technical competencies:

  • Cisco certification (Cisco CCENT® certification or higher)
  • Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
  • Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
  • Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], CompTIA (A+, Network+, Server+)

The knowledge and skills that a student must have before attending this course are:

  • TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
  • Experience with IP routing

Cisco learning offerings that contribute to recommended skills and knowledge:


titleCBROPS v1.0 – Understanding Cisco Cybersecurity Operations Fundamentals
days5
seo_titleCBROPS - Understanding Cisco Cybersecurity Operations Fundamentals Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate security incidents. This course teaches you how to monitor alerts and breaches, and how to understand and follow established procedures for response to alerts converted to incidents. Through a combination of lecture, hands-on labs, and self-study, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities. This course helps you prepare for the Cisco Certified CyberOps Associate certification and the role of a Junior or Entry-level cybersecurity operations analyst in a SOC.
objective

After taking this course, you should be able to:

  • Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
  • Explain the data that is available to the network security analyst.
  • Describe the basic concepts and uses of cryptography.
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
  • Understand common endpoint security technologies.
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
  • Identify resources for hunting cyber threats.
  • Explain the need for event data normalization and event correlation.
  • Identify the common attack vectors.
  • Identify malicious activities.
  • Identify patterns of suspicious behaviors.
  • Conduct security incident investigations.
  • Explain the use of a typical playbook in the SOC.
  • Explain the use of SOC metrics to measure the effectiveness of the SOC.
  • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
  • Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
  • Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.

 


outline
  • Defining the Security Operations Center
  • Understanding Network Infrastructure and Network Security Monitoring Tools
  • Exploring Data Type Categories
  • Understanding Basic Cryptography Concepts
  • Understanding Common TCP/IP Attacks
  • Understanding Endpoint Security Technologies
  • Understanding Incident Analysis in a Threat-Centric SOC
  • Identifying Resources for Hunting Cyber Threats
  • Understanding Event Correlation and Normalization
  • Identifying Common Attack Vectors
  • Identifying Malicious Activity
  • Identifying Patterns of Suspicious Behavior
  • Conducting Security Incident Investigations
  • Using a Playbook Model to Organize Security Monitoring
  • Understanding SOC Metrics
  • Understanding SOC Workflow and Automation
  • Describing Incident Response
  • Understanding the Use of VERIS
  • Understanding Windows Operating System Basics
  • Understanding Linux Operating System Basics

Lab outline

  • Use SIEM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Explore TCP/IP Attacks
  • Explore Endpoint Security
  • Investigate Hacker Methodology
  • Hunt Malicious Traffic
  • Correlate Event Logs, Packet Captures (PCAPs), and Alerts of an Attack
  • Investigate Browser-Based Attacks
  • Analyze Suspicious Domain Name System (DNS) Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks
  • Explore the Windows Operating System
  • Explore the Linux Operating System

target_au

This course is designed for individuals seeking a role as an associate-level cybersecurity analyst, IT professionals desiring knowledge in Cybersecurity operations or those in pursuit of the Cisco Certified CyberOps Associate certification including:

  • Students pursing a technical degree
  • Current IT professionals
  • Recent college graduates with a technical degree

pre_req

 

Before taking this course, you should have the following knowledge and skills:

  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows and Linux operating systems
  • Familiarity with basics of networking security concepts

The following Cisco course can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)

titleECS – ExtremeWireless Cloud
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewECS - ExtremeWireless Cloud course provides Extreme Networks customers and partners theoretical and practical hands-on training to give students a better understanding of Extreme Networks Cloud WiFi technologies. Students will also learn how to manage and orchestrate ExtremeWireless Cloud from within the ExtremeCloud IQ management platform. [dt_sc_button type="type1" link="https://dojo.extremenetworks.com/organizer/insoft-services/" size="medium" bgcolor="#8fbd85" target="_new" timeline_button="no"]Registration Link[/dt_sc_button]
objective
  • Have the ability to onboard devices and configure WLANS using the powerful cloud based solution that is ExtremeCloud IQ.
  • Gain basic wireless skills and be able to utilize the knowledge gained to deploy real world solutions.
  • Prepare students to take the Extreme Wireless Cloud ECS exam.

outline

Solution Overview

  • Global Data Centers
  • Regional Data Centers
  • ISO 27001
  • GDPR and Privacy
  • Private Cloud
  • Local Cloud
  • Wireless Hardware
  • Distributed Architecture
  • Understanding the evolution of distributed architecture
  • Distributed Control
  • Cooperative Control Protocols

 

ExtremeCloud IQ

  • Taking a first look at ExtremeCloud IQ
  • Logging in for the first time

 

WLAN Design Concepts

  • Coverage Design
  • Roaming
  • Layer 2 Retransmissions
  • Capacity Design
  • Airtime Consumption
  • Co-Channel Interference
  • Antennas

 

Device Discovery and Provisioning

  • Device Redirection Services and Auto-Discovery
  • Auto-discovery for on-premises
  • Management Protocols and Device Updates
  • Adding Devices into ExtremeCloud IQ

 

Guided Configuration and Object Management

  • Guided Configuration of Objects
  • Clone Tool

 

Monitoring Clients, Users and Client 360

  • Monitoring Clients
  • Monitoring Devices

 

User Profiles

  • Defining VLANs
  • Firewalls
  • Tunnelling
  • Rate Limiting
  • URL Filtering
  • Availability Schedule
  • Assignment Rules

 

Troubleshooting 802.1x

  • IEEE 802.1X with EAP
  • 802.1X Troubleshooting

 

Network 360

  • Monitor View
  • Device Health
  • Client Health
  • WiFi Health
  • Network Health
  • Services Health
  • Application Health
  • Security Health

 

Private Pre-Shared Key (PPSK)

  • Understanding PPSK
  • 802.1X/EAP
  • Mapping User Profiles to User Groups
  • User Groups
  • PPSK Credential storage
  • RadSec Proxies
  • Secure Access with Cloud PPSK
  • RadSec Troubleshooting

 

Radio Profiles

  • Showing Radio Profiles through a Lab

 

Device Templates

  • AP Device Templates
  • Radio Settings
  • Radio Usage
  • Mesh
  • Exclude Channels
  • Transmit Power Control

 

Software Defined Radio (SDR)

  • Dual Band APs
  • Dual 5GHz WLAN design
  • SDR Radio Profile

 

Cloud Config Groups and Classification Rules

  • Cloud Config Groups – What are they?
  • Classification Rules
  • Joining CCGs and Classification Rules

 

Classification Rules

  • VLAN Objects
  • Captive Web Portals
  • Time Zone Objects
  • Use Cases
  • Server Objects
  • AP Device Templates
  • SSIDs

 

Deployment Optimization

  • Management and Native VLANs
  • Using Trunked Ports and VLANs
  • AP and VLAN guidelines
  • Configuring rollback timer

 

ExtremeCloud IQ Diagnostic Tools

  • Device Diagnostic Tools
  • Ping
  • Points of Failure
  • VLAN Probe
  • Common CLI Commands

 

Dashboards

  • Network
  • Reports
  • Diagnostics
  • Inventory
  • Insights – Comparative Analysis
  • Insights – Proximity
  • Insights – Presence

 

ExtremeCloud IQ Administration

  • Communications
  • Account Management
  • Administrator Accounts
  • Internal Admin Accounts
  • External Admin Accounts
  • Role Based Access Control
  • Global Settings – Logs
  • Global Settings – Audit Logs

 

Firmware Updates

  • How to do firmware updates using ExtremeCloud IQ

 

ExtremeWireless Cloud Exam

  • What you need to know about the ExtremeWireless Cloud Exam

target_au
pre_req

Students should have a working knowledge of networking concepts and a basic understanding of WiFi technologies although prior experience of WLAN design and deployment is helpful.


titleECS ExtremeWireless Cloud Troubleshooting
days2
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewDesigned for networking professionals responsible for supporting and troubleshooting wireless LAN networks. This course is an advanced level class building upon the student’s real working experiences with ExtremeWireless Cloud and ExtremeCloud IQ. Please read the pre-requisites before enrolling on the class as prior experience with ExtremeCloud IQ and ExtremeWireless Cloud is expected. The class is a fast paced, fault-based scenario lab which immerses the student in real life situations requiring fault diagnosis and remedial actions. It provides students with the information and skills necessary to troubleshoot common WLAN issues using ExtremeCloud IQ tools and networking solutions.
objective

This challenging course is a blend of theory and real-world troubleshooting scenarios.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Cloud installations and common wireless issues using the in-built tools and the Wireshark protocol analyzer.


outline
  • Troubleshooting Theory and Best practices
  • Opening a support case
  • Techdata File
  • Co-Operative Control Protocols
  • CAPWAP and Provisioning
  • RF Troubleshooting
  • Network Performance Troubleshooting
  • ExtremeWireless Cloud troubleshooting tools
  • Authentication and Roaming
  • Private Pre-shared Key

target_au
pre_req

To gain the maximum learning experience from this class, it is extremely important that attendees adhere to the following requirements prior to attending this course:

  • Have attend the ExtremeWireless Cloud training and hold the relevant ECS ExtremeWireless Cloud certification, or, to have been grandfathered from the Aerohive ACMA qualification onto ExtremeWireless Cloud ECS.
  • Possess significant working experience with Extreme/Aerohive products as well as wireless networking. Attendees need to be able to navigate and configure the current version of XIQ confidently with minimal or no instruction.
  • Have access to the internet to connect to XIQ for the virtual instructor-led classes or bring their own laptop to classroom based instructor-led classes.

titleECS Extreme NAC
days2
seo_title
seo_dec
seo_tkey
categorynetwork-design
vendorExtreme

techonogyEnterprise Networking
overviewExtremeNAC (A3) is Extreme’s Secure Access Management Solution with enterprise-grade features for onboarding, authentication, and network access control (NAC). This training class covers the essentials of deploying ExtremeNAC (A3). It provides the theoretical knowledge and hands-on experience that will enable you to successfully deploy, configure and maintain the ExtremeNAC (A3) solution.
objective

To deploy Extreme A3 Cloud Network Access Control to build unique workflows and requirements to fit unique environments. Integrate ExtremeNAC (A3) into third party systems, implement controls and checks to help ensure compliance to regulations and policies and be able to leverage custom workflows and alarms to proactively resolve network issues.


outline
  • What is ExtremeNAC (A3)?
  • Qualifying Questions
  • Product capabilities
  • Deployment Modes and Options
  • Enforcement
  • Guest Authentication and Registration
  • Radius and 802.1x
  • Active Directory Integration and Authentication
  • Self-Registration
  • Portal Modules and Modifications
  • PKI and Certificates

target_au
pre_req

A solid networking background. Working proficiency and experience with network security and understanding basic concepts behind Active Directory and Digital Certificates.


titleECS ExtremeWireless Core
days4
seo_title
seo_dec
seo_tkey
categorywireless-mobility
vendorExtreme

techonogyWireless
overviewThis class will give the students a good technical understanding of the ExtremeWireless CORE technologies. There will also be practical, hands-on-labs, where the students will get to setup and configure this type of technology to supplement the theoretical learning.
objective

This course is a blend of both theoretical and hands-on Lab experience.

Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Core.

 


outline

Solution Overview

  • ExtremeWireless Landscape
  • WiNG at a glance
  • What’s New In WiNG 7
  • 11ax Introduction
  • WPA3 Introduction
  • Dual Mode Capability
  • ExtremeWireless WiNG hardware overview
  • Configuration Model
  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration

 

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links

 

AP Adoption

  • Finding a controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption

 

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

 

Supported Deployments and Provisioning

  • Reference designs for single and central site/multi-site deployments
  • Scalability considerations
  • General best practices and common design mistakes

 

Clustering

  • Clustering overview
  • Clustering setup

 

Virtual Controller

  • VC overview
  • VC configuration

 

Initial Configuration

  • Initial device setup
  • Resetting APs to factory defaults
  • Configure management access settings via Management Policy

 

Software Management

  • Mixed mode
  • Image types
  • Software upgrade

 

Wireless LANs

  • WLAN configuration
  • WLAN forwarding modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy
  • QoS policies and mappings

 

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features

 

Integrated Services

  • DHCP server
  • Radius server
  • Role Based Access Control (RBAC)
  • IPsec VPN

 

Captive Portal

  • Hotspot deployment options and defining policies
  • Authentication methods used to verify user registrations
  • Enforcing authentication methods
  • User and device registration and notification methods

 

Security Features

  • Stateful L2+ Distributed Firewall features
  • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
  • Variations of Wireless IPS (WIPS)

 

Mesh Features

  • MeshConnex overview
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex

 

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Opening GTAC case

 

NSight

  • NSight overview
  • Using NSight for monitoring and troubleshooting

 

Extreme Guest

  • Extreme Guest overview and features

 

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

 

What’s new?

  • Recent firmware releases overview

target_au
pre_req

A thorough understanding of wireless networking, wired networking and associated protocols. Highly recommended to have completed the Extreme Wireless EDS class.


titleSAUI v1.0 – Implementing Automation for Cisco Security Solutions
days3
seo_titleSAUI - Implementing Automation for Cisco Security Solutions Course Training
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Implementing Automation for Cisco Security Solutions (SAUI) v1.0 course teaches you how to design advanced automated security solutions for your network. Through a combination of lessons and hands-on labs, you will master the use of modern programming concepts, RESTful application program interfaces (APIs), data models, protocols, firewalls, web, Domain Name System (DNS), cloud, email security, and Cisco® Identity Services Engine (ISE) to strengthen cybersecurity for your web services, network, and devices. You will learn to work within the following platforms: Cisco Firepower® Management Center, Cisco Firepower Threat Defense, Cisco ISE, Cisco pxGrid, Cisco Stealthwatch® Enterprise, Cisco Stealthwatch Cloud, Cisco Umbrella®, Cisco Advanced Malware Protection (AMP), Cisco Threat grid, and Cisco Security Management Appliances. This course will teach you when to use the API for each Cisco security solution to drive network efficiency and reduce complexity. This course prepares you for 300-735 Automating and Programming Cisco Security Solutions (SAUTO) certification exam.
objective

After taking this course, you should be able to:

  • Describe the overall architecture of the Cisco security solutions and how APIs help enable security
  • Know how to use Cisco Firepower APIs
  • Explain how pxGrid APIs function and their benefits
  • Demonstrate what capabilities the Cisco Stealthwatch APIs offer and construct API requests to them for configuration changes and auditing purposes
  • Describe the features and benefits of using Cisco Stealthwatch Cloud APIs
  • Learn how to use the Cisco Umbrella Investigate API
  • Explain the functionality provided by Cisco AMP and its APIs
  • Describe how to use Cisco Threat Grid APIs to analyze, search, and dispose of threats

outline
  • Introducing Cisco Security APIs
  • Consuming Cisco Advanced Malware Protection APIs
  • Using Cisco ISE
  • Using Cisco pxGrid APIs
  • Using Cisco Threat Grid APIs
  • Investigating Cisco Umbrella Security Data Programmatically
  • Exploring Cisco Umbrella Reporting and Enforcement APIs
  • Automating Security with Cisco Firepower APIs
  • Operationalizing Cisco Stealthwatch and the API Capabilities
  • Using Cisco Stealthwatch Cloud APIs
  • Describing Cisco Security Management Appliance APIs

target_au

This course is designed primarily for professionals in job roles such as:

  • Network engineer
  • Systems engineer
  • Wireless engineer
  • Consulting systems engineer
  • Technical solutions architect
  • Network administrator
  • Wireless design engineer
  • Network manager
  • Sales engineer
  • Account manager

pre_req

Before enrolling in this course, you should have professional level knowledge in the following areas:

  • Basic programming language concepts
  • Basic understanding of virtualization
  • Ability to use Linux and Command Line Interface (CLI) tools, such as Secure Shell (SSH) and bash
  • CCNP level core networking knowledge
  • CCNP level security networking knowledge

The following Cisco courses can help you gain the knowledge you need to prepare for this course:

  • Implementing and Administering Cisco Solutions (CCNA®)
  • Introducing Automation for Cisco Solutions (CSAU)
  • Programming Use Cases for Cisco Digital Network Architecture (DNAPUC)
  • Introducing Cisco Network Programmability (NPICNP)
  • Implementing and Operating Cisco Security Technologies (SCOR)

titleCSAU 1.0 – Introducing Automation for Cisco Solutions
days2
seo_titleCSAU - Introducing Automation for Cisco Solutions Course Training
seo_dec
seo_tkey
categorydata-center-virtualization
vendorCisco

techonogyDatacenter & Virtualization
overviewThe Introducing Automation for Cisco Solutions (CSAU) v1.0 course gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) protocols. The course also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain’t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git.   This course will help you:
  • Gain an overview of the skills you need to become a next-generation engineer
  • Prepare to accelerate network automation in your organization
  • Increase collaboration across internal and external teams using version control systems
  • Earn 16 CE credits toward recertification

objective

After taking this course, you should be able to:

  • Articulate the role network automation and programmability play in the context of end-to-end network management and operations
  • Define and differentiate between waterfall and agile software development methodologies
  • Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
  • Describe how DevOps principles, tools, and pipelines can be applied to network operations
  • Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
  • Understand and construct HTTP-based API calls to network devices
  • Articulate the differences among and common use cases for XML, JSON, YAML, and protobuf
  • Construct and interpret Python scripts using the Python requests module to auto

outline
  • Examining Network Management and Operations
  • Exploring Software Development Methodologies
  • Using Python for Network Automation
  • Describing NetDevOps: DevOps for Networking
  • Managing Automation Development Environments
  • Introducing HTTP Network APIs
  • Reviewing Data Formats and Data Encoding
  • Using Python Requests to Automate HTTP-Based APIs
  • Exploring YANG
  • Using YANG Tools
  • Automating Model-Driven APIs with Python
  • Introducing Ansible for Network Automation
  • Templating Configurations with Jinja2
  • Exploring Cisco Ansible Integrations
  • Introducing Multidomain Network Automation

target_au

This course is designed primarily for customer engineers and systems engineers in the following job roles:

  • Automation architect
  • Automation engineer
  • Consulting systems engineer
  • DevOps engineer
  • Network administrator
  • Network architect
  • Network consulting engineer
  • Network design engineer
  • Network engineer
  • Network operator
  • Network reliability engineer
  • Sales engineer
  • Site reliability engineer
  • Systems engineer
  • Technical solutions architect

 

This course would also be useful for network manager job roles such as:

  • Application developer
  • Collaboration developer
  • Collaboration solutions architect
  • IT director
  • Mobile developer
  • Network Operations Center (NOC) manager
  • Software architect
  • Web developer

pre_req

Before taking this course, you should have the following knowledge and skills:

  • Routing and switching including Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), and basic configuration features such as interfaces, Simple Network Management Protocol (SNMP), and static routes
  • Fundamentals of Python data structures and programming constructs such as loops, conditionals, and classes, or the equivalent of 3–6 months of experience writing Python scripts
  • Basic Linux commands for navigating the file system and executing scripts
  • Knowledge of working with text editors

title(802.1X) 1.0 – Introduction to 802.1X Operations for Cisco Security Professionals
days3
seo_title(802.1X) - Introduction to 802.1X Operations for Cisco Security Professionals Course Training
seo_dec
seo_tkey
categorynetwork-security-courses
vendorCisco

techonogySecurity
overviewThe Introduction to 802.1X Operations for Cisco Security Professionals Course shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.
objective

Upon completing this course, the learner should be able to meet these overall objectives:

  • Provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1X protocol and the ability to configure the Cisco Identity Services Engine (ISE) for 802.1X operation.
  • The course will introduce the architecture, components, and features of a Cisco TrustSec network designed around the IEEE 802.1X and RADIUS protocols.
  • The student will gain hands-on experience with configuring a network for 802.1X-based network services using the Cisco ISE, Cisco Catalyst switches, and Cisco wireless products.

outline
  • Describe Cisco TrustSec concepts
  • Describe IEEE 802.1X concepts, architecture, and requirements for deployment
  • Describe how the RADIUS authentication protocol is used for Cisco TrustSec
  • Configure Cisco ISE for 802.1X operation
  • Describe IEEE 802.1X supplicants for Microsoft, Apple, and Cisco
  • Configure IEEE 802.1X for a wired network
  • Configure IEEE 802.1X for a wireless network
  • Describe how to provide secure guest access in a Cisco TrustSec network
  • Build a high-level design of a Cisco TrustSec network using IEEE 802.1X.

target_au
  • Channel Partner / Reseller
  • Customer
  • Employee

pre_req

The knowledge and skills that a learner must have before attending this course are as follows:

  • Cisco Certified Network Associate (CCNA).
  • Attendance of Securing Networks with Routers and Switches (SNRS) or equivalent knowledge.
  • Knowledge of Microsoft Windows Server 2008 Active Directory.
  • Knowledge of Cisco Wireless LAN Controllers and Lightweight Access Points.
  • Knowledge of basic command-line configuration of Cisco Catalyst switches.The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.

titleCISA – Certified Information Systems Auditor
days4
seo_titleCISA Certified System Auditor Training Course | Insoft Services
seo_decIn this CISA Certified System Auditor course delegates will be exposed to the Five Domains of Information Security Auditing.
seo_tkeyCISA Certified System Auditor
categoryinformation-systems-security
vendor

techonogySecurity
overviewCISA Certified System Auditor is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security. During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing. These domains comprise the foundations of CISA and it is imperative that delegates grasp a complete understanding of these aspects in order to pass the CISA exam and use their certification within the workplace. Within each of these domains exists multiple topics, which when combined, provide a comprehensive overview of the domain of focus. Due to the breadth of information imparted with each topic over a period of just four days, this course is considered intensive and candidates must study hard to obtain the certification. The five domains are as follows:
  1. The Process of Auditing Information Systems
  2. Governance & Management of IT
  3. Information Systems Acquisition, Development, and Implementation
  4. Information Systems Operations, Maintenance, and Support
  5. Protection of Information Assets

objective

This CISA Certified System Auditor training course is not suitable for beginners. It is required that delegates possess at least five years of exposure in the field of Information Systems Auditing. With this information in mind, it is expected that CISA qualified candidates have an outstanding level of professional experience, commitment, and extensive knowledge of IS Auditing. Thus, a CISA qualification is likely to open many doors and propel certified individuals into a high ranking position within the enterprise.

The five domains within the course are as follows:

  • The Process of Auditing Information Systems
  • Governance & Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance, and Support
  • Protection of Information Assets

outline

The course content surrounds the pivotal Five Domains. The information imparted within each domain is as follows:

Domain 1: Information Systems Audit Process:

  • Developing a risk-based IT audit strategy
  • Planning specific audits
  • Conducting audits to IS audit standards
  • Implementation of risk management and control practices

Domain 2: IT Governance and Management:

  • Effectiveness of IT Governance structure
  • IT organizational structure and human resources (personnel) management
  • Organisation’s IT policies, standards, and procedures
  • Adequacy of the Quality Management System
  • IT management and monitoring controls
  • IT resource investment
  • IT contracting strategies and policies
  • Management of organizations IT-related risks
  • Monitoring and assurance practices
  • Organization business continuity plan

Domain 3: Information Systems Acquisition, Development, and Implementation:

  • Business case development for IS acquisition, development, maintenance, and retirement
  • Project management practices and controls
  • Conducting reviews of project management practices
  • Controls for requirements, acquisition, development, and testing phases
  • Readiness for Information Systems
  • Project Plan Reviewing
  • Post Implementation System Reviews

Domain 4: Information Systems Operations, Maintenance, and Support:

  • Conduct periodic reviews of organizations objectives
  • Service level management
  • Third-party management practices
  • Operations and end-user procedures
  • Process of information systems maintenance
  • Data administration practices determine the integrity and optimization of databases
  • Use of capacity and performance monitoring tools and techniques
  • Problem and incident management practices
  • Change, configuration, and release management practices
  • Adequacy of backup and restore provisions
  • Organization’s disaster recovery plan in the event of a disaster

Domain 5: Protection of Information Assets:

  • Information security policies, standards and procedures
  • Design, implementing, monitoring of system and logical security controls
  • Design, implementing, monitoring of data classification processes and procedures
  • Design, implementing, monitoring of physical access and environmental controls
  • Processes and procedures to store, retrieve, transport and dispose of information assets

target_au

The CISA essential for professionals dealing with controlling, monitoring, and assessing an organization’s information technology and business systems. This includes:

  • IS/IT auditors/consultants
  • IT compliance managers
  • Chief Compliance Officers
  • Chief risk & privacy officers
  • Security heads/directors
  • Security managers/architects

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to learn CISA from this tutorial. However, to get the CISA certification you need to:

  • Pass the CISA examination
  • Submit an application for CISA certification
  • Adhere to the Code of Professional Ethics
  • Dedicate to the Continuing Professional Education Program
  • Compliance with the Information Systems Auditing Standards

The examination is open to all individuals who have an interest in information systems audit, control, and security. A minimum of 5 years of professional information systems auditing, control or security work experience is required for the CISA certification.


titleP3O Portfolio, Programme & Project Offices Practitioner
days2
seo_titleP3O Practitioner Training Course in the UK | Insoft Services
seo_decThe P3O Practitioner course will allow individuals to analyze, distinguish, review the success or failure of projects, and contribute to a successful P3O.
seo_tkeyP3O Practitioner Course
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive P3O Practitioner Course will cover the knowledge required to pass the P3O® Practitioner examination. The training course will allow individuals to analyze, distinguish, and review the success or failure of projects, with a full appreciation of differing principles and varying roles that contribute to a successful P3O®. This P3O® certification indicates that a candidate is a proficient Portfolio Manager and can be entrusted with making informed operational decisions.   See other courses available
objective

P3O Practitioner Course (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, P3O® helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • P3O Model and implementing/Re-energising a P3O
  • Essential tools and techniques
  • Crucial P3O Operations
  • Underpinning concepts of P3O and application to your business
  • Individual, collaborative, and integrated Working Methods
  • Enable regular practice and reliable project management
  • Risk analysis and for-seeing issues
  • Best Practice in P3O projects
  • Support structures development
  • Encouraging and using evidence-based decision making
  • Quality assurance
  • Roles of responsibility and clear delegation of tasks
  • Supporting Provision
  • Improving the financial aspects of projects
  • How to create a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Promote business transparency
  • Roles & responsibilities
  • Business case
  • Model customization

outline

Module 1 – Course Overview and introduction

Module 2 – Why Have a P3O?

Module 3 – Designing a P3O

Module 4 – Implementing and Re‐energising a P3O

Module 5 – Practitioner Examination Preparation

Module 6 – Group activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

 

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.

 


pre_req

The P3O Foundation certificate is required to take the P3O practitioner exam.


titleP3O Portfolio, Programme & Project Offices Foundation & Practitioner
days5
seo_titleP3O Foundation and Practitioner Certification | Insoft Services
seo_decThis comprehensive P3O Foundation and Practitioner Certification course will cover the knowledge required to pass the P3O Foundation and Practitioner exams.
seo_tkeyP3O Foundation and Practitioner Certification
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive P3O® course will cover the knowledge required to pass the P3O® Foundation and Practitioner examinations. P3O Foundation and Practitioner Certification training will allow individuals to analyze, distinguish, and review the success or failure of projects, with a full appreciation of differing principles and varying roles that contribute to a successful P3O®. This P3O® certification indicates that a candidate is a proficient Portfolio Manager and can be entrusted with making informed operational decisions.   See other courses available
objective

P3O® (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, P3O Foundation and Practitioner Certification helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • Essential P3O® operations, concepts and, application to your business
  • Individual, collaborative, and integrated working methods
  • P3O Model and implementing/Re-energising a P3O
  • Essential tools and techniques
  • Benefits of project management
  • Risk analysis and foreseeing issues
  • Best practice in P3O® projects
  • Support structures development
  • Encouraging and using evidence-based decision making
  • Quality assurance
  • Roles of responsibility and clear delegation of tasks
  • Supporting provision
  • Improving the financial aspects of projects
  • Creating a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Promote business transparency
  • Enable regular practice and reliable project management
  • Support structures development
  • Quality assurance
  • Supporting Provision
  • Business case
  • Model customization
  • P3MS summary
  • Functions and services

outline

Module 1 – Course Overview and introduction

Module 2 – Introduction to P3O

Module 3 – Why Have a P3O?

Module 4 – Designing a P3O

Module 5 – Implementing and Re‐energising a P3O

Module 6 – Operating a P3O

Module 7 – Practice foundation exams

Module 8 – Practitioner Examination Preparation

Module 9 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this course, however, in order to take the Practitioner exam the foundation certificate will be needed (this can be completed during the course).


titleP3O Portfolio, Programme & Project Offices Foundation
days3
seo_titleP3O Foundation Certification Course | Insoft Services
seo_decThis comprehensive course offers basic tools and techniques of P3O Foundation Certification, and educate them on the constituents of a successful P3O.
seo_tkeyP3O Foundation certification
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewThis comprehensive course will equip candidates with the basic tools and techniques of P3O® (Portfolio, Programme and Project Offices), and educate them on the constituents of a successful P3O®. This certification enables individuals to contribute to an office or enterprise in a supporting role. P3O Foundation Certification is a valuable certification in the project management industry, showing that you have the knowledge to operate within a project office that follows the P3O® model. Once you have obtained your P3O® Foundation certification, you will be ready to proceed onto the P3O® Practitioner course.   See other courses available
objective

P3O® (Project, Programme, and Project Office) is a framework that enables businesses to set up and maintain a support structure to deliver change within their organization. Provided by the global best practice provider AXELOS, the P3O Foundation certification helps to align these areas of interest with the business’s objectives. This ensures senior management is able to make informed decisions about how these components of the business can fit in with the overall strategy.

This course covers the following topics:

  • Essential P3O® operations and concepts
  • Individual, collaborative, and integrated working methods
  • Benefits of project management
  • Risk analysis and for-seeing issues
  • Best practice in P3O® projects
  • Support structures development
  • Encouraging evidence-based decision making
  • Quality assurance
  • Roles of responsibility and delegation of tasks
  • Supporting provision
  • Improving the financial aspects of projects
  • Creating a skilled workforce
  • Optimizing resources
  • Predict efficiency by creating capability models
  • Business transparency at the forefront

outline

Module 1 – Course Overview and introduction

Module 2 – Introduction to P3O

Module 3 – Why Have a P3O?

Module 4 – Designing a P3O

Module 5 – Implementing and Re‐energising a P3O

Module 6 – Operating a P3O

Module 7 – Practice foundation exams

Module 8 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs


pre_req

There are no prerequisites for this exam.


titleManaging Successful Programmes: 2011 (MSP) Practitioner
days2
seo_titleManaging Successful Programmes (MSP) Practitioner | Insoft Services
seo_dec(MSP) Managing Successful Programmes Practitioner represents good practice in programme management for successfully delivering transformational change.
seo_tkeyManaging Successful Programmes Practitioner
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognized as a key tool to enable organisations to deliver their strategy and manage that transformation. The Managing Successful Programmes Practitioner Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. The two-day MSP Practitioner course builds on the foundation level concepts through to advanced level understanding of the MSP framework. Following the course candidates will be able to understand the relationships between MSP Principles, MSP Governance Themes and MSP Transformational Flow, and can apply this understanding to a given programme scenario. Successful completion of the Practitioner examinations will give the delegate a recognised international qualification; understood and identified in the industry as a mark of quality for Programme Managers.   See other courses available
objective

The MSP framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

MSP defines programme management as ‘the action of carrying out the coordinated organisation, direction and implementation of a dossier and transformation activities to achieve outcomes and realise benefits of strategic importance to the business.’

As well as the guidance detailed within MSP, candidates will learn about the themes running throughout the MSP methodology. On completion of this courses candidates will be able to:

  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Identify additional value as a result of managing change as an MSP programme
  • Explain and apply each of the MSP principles, the governance themes and the transformational flow processes and their activities
  • Explain the relationship between the MSP principles, governance themes, the transformational flow, programme information (documents) and the MSP defined programme management roles
  • Produce and evaluate examples of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP practitioner concepts

Section 4 – MSP practitioner governance themes

Section 5 – Practitioner examination preparation

Section 6 – Group activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management.

The Managing Successful Programmes Practitioner would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their need.


pre_req

To and sit the Practitioner examination the Foundation certification is required. It is strongly recommended that candidates should have a good understanding of project and program management.


titleManaging Successful Programmes: 2011 (MSP) Foundation & Practitioner
days5
seo_titleManaging Successful Programmes (MSP) | Insoft Services
seo_decManaging Successful Programmes (MSP) provides an adaptable route map for programme management to facilitate the delivery of business transformation.
seo_tkeyManaging Successful Programmes (MSP)
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognised as a key tool to enable organizations to deliver their strategy and manage that transformation. The MSP Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. The five-day MSP Foundation & Practitioner course will take candidates from foundation level concepts through to advanced level understanding of the MSP framework. Following the course candidates will be able to understand the relationships between MSP Principles, MSP Governance Themes and MSP Transformational Flow, and can apply this understanding to a given programme scenario. Successful completion of the Foundation and Practitioner examinations will give the delegate a recognized international qualification; understood and identified in the industry as a mark of quality for Programme Managers.   See other courses available
objective

The Managing Successful Programmes (MSP) framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

MSP defines programme management as ‘the action of carrying out the coordinated organisation, direction and implementation of a dossier and transformation activities to achieve outcomes and realise benefits of strategic importance to the business.’

As well as the guidance detailed within MSP, candidates will learn about the themes running throughout the MSP methodology. On completion of this courses candidates will be able to:

  • Distinguish between projects and programmes
  • Identify the MSP defined types of programme and their characteristics
  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Explain the purpose and areas of focus of the defined roles
  • Identify additional value as a result of managing change as an MSP programme
  • Explain and apply each of the MSP principles, the governance themes and the transformational flow processes and their activities
  • Explain the relationship between the MSP principles, governance themes, the transformational flow, programme information (documents) and the MSP defined programme management roles
  • Produce and evaluate examples of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP governance themes

Section 4 – MSP transformational flow

Section 5 – MSP practitioner concepts

Section 6 – MSP practitioner governance themes

Section 7 – Practice foundation exams

Section 8 – Practitioner examination preparation

Section 9 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

This course leads to foundation certification in the initial stages of training. Assuming candidates pass their Foundation examination, there is no prerequisite to attending this course.

To complete the latter stage of training and sit the Practitioner examination the Foundation certification is required. It is strongly recommended that candidates should have a good understanding of project and program management.


titleManaging Successful Programmes: 2011 (MSP) Foundation
days3
seo_titleMSP Foundation Course - IT Training | Insoft Services
seo_decThe purpose of MSP Foundation Course is to ensure candidates have the knowledge and understanding of the core concepts of MSP guidance.
seo_tkeyMSP Foundation
categoryagilepm
vendorPeoplecert

techonogyIT Services Management
overviewManaging Successful Programmes (MSP) represents proven good practice in programme management for successfully delivering transformational change. Programme management is increasingly being recognised as a key tool to enable organizations to deliver their strategy and manage that transformation. The MSP Foundation Framework provides an adaptable route map for programme management, bringing together key principles, governance themes and a set of interrelated processes to facilitate the delivery of business transformation. This three-day course leads to the MSP Foundation. This is a free-standing qualification, but is also part of the MSP Practitioner qualification scheme and provides candidates with a broad overview of the MSP Framework. The purpose of the MSP Foundation qualification is to ensure candidates have the knowledge and understanding of the core concepts of MSP guidance to interact effectively with those involved in the management of a programme or act as an informed member of a programme office, business change team or project delivery team working within an environment supporting MSP. This level is also a prerequisite for programme management professionals progressing toward the practitioner and advanced practitioner qualification, and those aspiring to become programme management professionals in the future.   See other courses available
objective

The MSP framework is designed to enable the delivery of transformational change and the achievement of an organisation’s strategic objectives. Programmes exist in the tension zone between the strategic direction of the organisation, the delivery of change capability by projects and the need to maintain business performance and stability while realising and exploiting the benefits from the investments.

On completion of this course, candidates will be able to:

  • Distinguish between projects and programmes
  • Identify the MSP defined types of programme and their characteristics
  • Explain the benefits of applying the MSP guidance to the management of a programme of transformational change
  • Explain the purpose and areas of focus of the defined roles
  • Explain the purpose of the seven MSP principles, the nine governance themes and the six transformational flow processes
  • Explain the purpose of MSP programme information (documents)

outline

Section 1 – Course overview and introduction

Section 2 – MSP foundation overview and principles

Section 3 – MSP governance themes

Section 4 – MSP transformational flow

Section 5 – Practice foundation exams

Section 6 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in Project or Programme Management. The MSP Foundation would suit candidates working in the following professions or areas:

  • Members of a programme office
  • Business change team members
  • Project delivery team members
  • Anyone who needs to understand the terminology and concepts underpinning MSP and those wishing to pursue higher-level qualifications; e.g. programme managers, business change managers and senior responsible owners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of Project or Programme Management.


titleChange Management Practitioner
days2
seo_titleChange Management Practitioner Certification Course | Insoft Services
seo_decChange Management Practitioner Certification is designed to help manage the impact of change and provide techniques to plan and implement transformations.
seo_tkeyChange Management Practitioner Certification
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Practitioner Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.

A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative – but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, the complexity of the change initiative, and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation.


outline

Change Impact

  • Levers for change
  • Levels of adoptions and critical mass
  • Reinforcing systems

Exam Preparation

  • Change Management Practitioner Exam Preparation
  • Change Management Practitioner Exam

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. This course would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The change management foundation certificate is required to sit the Practitioner level exam.


titleChange Management Foundation & Practitioner
days5
seo_titleChange Management Certification - IT Certification | Insoft Services
seo_decChange Management Certification, developed by APMG with GMI, provides an independent standard for professional knowledge for an effective change manager.
seo_tkeyChange Management Certification
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Foundation certification is to confirm that a candidate has sufficient knowledge and understanding of Change Management to work as an informal member of a team working on an organizational change initiative. The Foundation certification is also a pre-requisite for the APMG Practitioner certification.

The new syllabus samples a wide range of knowledge regarding the theory and practice of change management including:

  • Change and the individual
  • Change and the organization
  • Communication and stakeholder engagement and;
  • Change practice

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.

A successful Practitioner candidate should, with suitable direction, be able to start applying the Change Management approaches and techniques to a real change initiative – but may not be sufficiently skilled to do this appropriately for all situations. Their individual Change Management expertise, the complexity of the change initiative, and the support provided for the use of Change Management approaches in their work environment will all be factors that impact what the Practitioner can achieve. Successful candidates will have fulfilled the knowledge requirements for Change Management Institute accreditation.


outline

Change and the Organization

  • Drivers for change
  • Developing a vision
  • Culture and climate
  • Emergent change and life-cycle
  • Organizational metaphors
  • Models of change
  • Roles required for change

Stakeholders

  • Principles
  • Identification
  • Analysis
  • Influencing and listening
  • Emotion and demonstration
  • Communications
  • Cognitive biases
  • Remaining people-focused
  • Improving Communications
  • Communications channels
  • Collaboration
  • Communications Planning
  • Larger workshops

Change Impact

  • Assessing impact
  • McKinsey 7 S
  • Stakeholder impact assessment
  • Assessing change readiness
  • Large change – how to staff
  • Building a change team
  • Preparing for resistance
  • Building team effectiveness

Individual Change

  • Learning theory
  • Motivation
  • Change Curve
  • Personality differences

Change Impact

  • Levers for change
  • Levels of adoptions and critical mass
  • Reinforcing systems

Exam Preparation

  • Change Management Practitioner exam preparation
  • Change Management Practitioner exam

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Change Management Practitioner would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. The change management foundation certificate is required to sit for the practitioner level exam.


titleChange Management Foundation
days3
seo_titleChange Management Foundation Course | Insoft Services
seo_decChange Management Foundation Course provides professional knowledge that allows us to deal with change and the impact of change on organizations.
seo_tkeyChange Management Foundation Course
categoryagilepm
vendorAPMG

techonogyAPMG
overviewDealing with change and more importantly, the impact of change is a high priority for all organizations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ‘body of knowledge’ for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. Change Management Foundation Course provides professional knowledge that allows us to deal with change and the impact of change on organizations. APMG’s refreshed Change Management certification is fully aligned with the change management body of knowledge.   See other courses available
objective

The purpose of the Change Management Foundation course is to confirm that a candidate has sufficient knowledge and understanding of Change Management to work as an informal member of a team working on an organizational change initiative. The Foundation certification is also a pre-requisite for the APMG Practitioner certification.

The new syllabus samples a wide range of knowledge regarding the theory and practice of change management including:

  • Change and the individual
  • Change and the organization
  • Communication and stakeholder engagement and;
  • Change practice

The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.


outline

Change and the Organization

  • Drivers for change
  • Developing a vision
  • Culture and climate
  • Emergent change and life-cycle
  • Organizational metaphors
  • Models of change
  • Roles required for change

Stakeholders

  • Principles
  • Identification
  • Analysis
  • Influencing and listening
  • Emotion and demonstration
  • Communications
  • Cognitive biases
  • Remaining people-focused
  • Improving Communications
  • Communications channels
  • Collaboration
  • Communications Planning
  • Larger workshops

Change Impact

  • Assessing impact
  • McKinsey 7 S
  • Stakeholder impact assessment
  • Assessing change readiness
  • Large change – how to staff
  • Building a change team
  • Preparing for resistance
  • Building team effectiveness

Individual Change

  • Learning theory
  • Motivation
  • Change Curve
  • Personality differences

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Change Management Practitioner would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a changing environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices


titleAgilePM Practitioner
days2
seo_title
seo_decAgilePM Practitioner certification offers the core principles needed to facilitate a successful project, while allowing a degree of scope and agility.
seo_tkeyAgilePM Practitioner
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This two-day AgilePM Practitioner certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This two-day course leads to the AgilePM Practitioner certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including:

  • Understand how Agile Project Management projects are delivered to time, cost & quality
  • Understand when and why to select Agile Project Management
  • Plan and organize Agile Project Management projects
  • Successfully complete a project using the required Agile Life-cycle, Processes, Roles, Management Products and Practices/Techniques

outline

Module 1 – Course overview and introduction

Module 2– The DSDM team model

Module 3 – Lifecycle and products

Module 4 – People, teams and collaboration

Module 5 – DSDM techniques

Module 6 – Planning and control

Module 7 – Practitioner exam preparation

Module 8 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Practitioner would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Pre-requisites accepted to be eligible to take the Practitioner examination:

  • AgilePM Foundation Certificate (either 2010 or 2014 version), or
  • DSDM Atern Foundation Certificate, or
  • DSDM Advanced Practitioner Certificate

titleAgilePM Foundation & Practitioner
days5
seo_titleAgilePM Foundation and Practitioner Certification | Insoft Services
seo_decAgilePM Foundation and Practitioner certification provides practical understanding of the techniques used, roles and responsibilities in an Agile project.
seo_tkeyAgilePM Foundation and Practitioner
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This five-day AgilePM Foundation and Practitioner certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This five-day course leads to the AgilePM Foundation and Practitioner certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including:

  • Choosing the right Agile approach
  • Philosophy, Principles and Project Variables
  • Preparing for Success
  • The DSDM Process
  • The People – DSDM Roles and Responsibilities
  • The DSDM Products
  • Key Practices – MoSCoW and Timeboxing
  • Planning and Control throughout the Life-cycle
  • Facilitated Workshops
  • Modeling and Iterative Development
  • People, Teams and Interactions
  • Understand how Agile Project Management projects are delivered to time, cost & quality
  • Understand when and why to select Agile Project Management
  • Plan and organize Agile Project Management projects
  • Successfully complete a project using the required Agile Life-cycle, Processes, Roles, Management Products and Practices/Techniques

outline

Module 1 – Course overview and introduction

Module 2 – The DSDM approach

Module 3 – The DSDM team model

Module 4 – Lifecycle and products

Module 5 – People, teams and collaboration

Module 6 – Requirements and user stories

Module 7 – Workshops and prioritization

Module 8 – Timeboxing, iterative development and testing

Module 9 – Planning and control

Module 10 – Practitioner exam preparation

Module 11 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Practitioner would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for the foundation exam.

Pre-requisites accepted to be eligible to take the Practitioner examination:

  • AgilePM Foundation Certificate (either 2010 or 2014 version), or
  • DSDM Atern Foundation Certificate, or
  • DSDM Advanced Practitioner Certificate

titleAgilePM Foundation
days3
seo_titleAgilePM Foundation Certification - IT Training | Insoft Services
seo_decThis three-day AgilePM Foundation certification provides the method with the core principles needed to facilitate a successful project.
seo_tkeyAgilePM Foundation
categoryagilepm
vendorAPMG

techonogyAPMG
overviewAgilePM developed in partnership with APMG and the DSDM Consortium, offers a practical and repeatable methodology that achieves an ideal balance between the standards, rigor, and visibility required for good project management, and the fast pace, change and empowerment provided by Agile. The focus of agile project management is on developing solutions incrementally enabling project teams to react effectively to changing requirements, whilst empowering project personnel and encouraging increased collaboration and ownership. This three-day AgilePM Foundation certification lives up to its name by providing the users of the method with the core principles needed to facilitate a successful project, while allowing a degree of scope and agility that not many other methodologies provide. With a clear, concise, and detailed perspective on project productivity, the AgilePM certification is useful to all candidates and competency levels ranging from highly experienced project managers to those new to the industry.   See other courses available
objective

This two-day course leads to the AgilePM Foundation certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Agile DSDM guidance including

  • Choosing the right Agile approach
  • Philosophy, Principles and Project Variables
  • Preparing for Success
  • The DSDM Process
  • The People – DSDM Roles and Responsibilities
  • The DSDM Products
  • Key Practices – MoSCoW and Timeboxing
  • Planning and Control throughout the Life-cycle
  • Facilitated Workshops
  • Modeling and Iterative Development
  • People, Teams and Interactions
  • Agile PM Foundation Exam

outline

Module 1 – Course overview and introduction

Module 2 – The DSDM approach

Module 3 – The DSDM team model

Module 4 – Life-cycle and products

Module 5 – People, teams and collaboration

Module 6 – Requirements and user stories

Module 7 – Workshops and prioritization

Module 8 – Timeboxing, iterative development and testing

Module 9 – Planning and control

Module 10 – Group activities and buzz exercises


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Project Management. The AgilePM Foundation would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Development & Planning Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within any environment that has responsibilities for identifying, assessing, planning, or managing projects, or reporting on project management activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this exam.


titleSIAM Foundation (Service Integration and Management)
days3
seo_titleService Integration and Management (SIAM) - IT Training | Insoft Services
seo_decService Integration and Management (SIAM) is a methodology used to manage multiple service providers and to integrate them seamlessly into IT organization.
seo_tkeyService Integration and Management (SIAM)
categorysiam
vendorInsoft Specials

techonogyIT Services Management
overviewService Integration and Management (SIAM) creates an environment where IT professionals can effectively orchestrate the increasing array of business solutions and services, whether they are delivered internally, externally, or from the cloud. The BCS EXIN Foundation Certificate in SIAM® is the most relevant and practical resource for skills and knowledge development, aligning Service Management framework processes and enabling businesses of any size to effectively manage multi-sourcing. This includes outsourcing, SaaS, PaaS, and Cloud and benefits a very broad range of stakeholders. Organizations are recognizing an increasing need to implement a Service Integration and Management (SIAM) framework to help them better manage multiple suppliers and reduce service complexity, whilst improving efficiency, governance, and cost control. SIAM is a methodology used to manage multiple service providers and to integrate them seamlessly to provide a single business-facing IT organization.   See other courses available
objective

The EXIN BCS SIAM® Foundation tests a candidate’s knowledge and understanding of the terminology and the core principles. This certification covers themes such as potential benefits as well as the challenges and risks of implementing Service Integration and Management. The SIAM® certification also includes examples of implementation structures, governance, tooling and data considerations, and the common processes used in a SIAM ecosystem.

A candidate who successfully completes the EXIN BCS SIAM® Foundation knows how Service Integration and Management delivers business value and is able to contribute to the implementation and use of Service Integration and Management in an organization.


outline

Module 1 – Introduction to Service Integration and Management

Module 2 – SIAM implementation roadmap

Module 3 – SIAM and its relation to other management practices

Module 4 – SIAM roles and responsibilities

Module 5 – SIAM practices

Module 6 – Processes to support SIAM

Module 7 – SIAM challenges and risk


target_au

The certification will create clarity and consensus for anyone involved in service management that takes care of any combination of internal and external service providers.

This includes:

  • Consultants
  • Service managers
  • Project and program managers
  • Business relationship managers
  • Change and commercial managers
  • Solution Architects

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites for this exam.


titleSDI Service Desk & Support Manager
days4
seo_titleService Desk and Support Manager - IT Training | Insoft Services
seo_decService Desk & Support Manager qualification (SDM) ensures that candidates are provided with the knowledge, information, and tools to successfully pass the SDM exam.
seo_tkeyService Desk and Support Manager
categorysda
vendorAPMG

techonogyIT Services Management
overviewFunctioning effectively as a Service Desk & Support Manager requires a broad range of skills and abilities. These talents range from people-management abilities, relationship management, and logistical awareness to financial acumen and presentation skills. This course provides a thorough understanding of, and qualification in, Service Desk & Support Management. The course also investigates the management of support methodologies and technologies and the tools utilized within the Service Desk and support teams. This four-day course also covers issues such as Service Level Agreements, the benefits and pitfalls and the importance of metrics; the implementation of service management processes, and effective problem-solving techniques that a Service Desk Manager can utilize. The course is based upon the standards and objectives for SDI’s Service Desk & Support Manager qualification (SDM) and ensures that candidates are provided with the knowledge, information, and tools to successfully pass the SDM exam.   See other courses available
objective

After attendance on this course, candidates will recognize and understand the importance of understanding our customer’s expectations and perceptions, along with understanding the benefit of using SLAs effectively as a service quality improvement tool. Critically, candidates will learn about the importance of a reward and recognition strategy and identify some different methods of reward and recognition. Specifically, this course covers the following key Service Desk and Support Management Skills:

  • Course Overview and Introduction
  • The Strategic Role of Support
  • Essential Management Skills
  • Developing and Promoting the Service Desk
  • IT Service Management
  • Quality Assurance
  • Effective Management of Tools and Technology
  • Staff Recruitment, Retention, and Development
  • Leadership and Management
  • Professional Development

The SDI qualification is an open qualification standard that is independent of any other training curriculum. SDI is the administrator, facilitator, and arbitrator of the standards. The exams are independently administered and proctored.


outline

Module 1 – The strategic role of support

  • Role of the service desk
  • The activities of the service desk
  • Successful service desk characteristics
  • Vision and mission statements
  • Goof practice and best practice
  • Service desk and best practice
  • Business standards and Industry standards
  • Service ethics
  • Social responsibility

Module 2 – Essential Management Skills

  • Essential skills and competencies
  • Routine responsibilities
  • Strategic responsibilities
  • The importance of documentation
  • Business knowledge
  • Strategic alignment
  • Obtaining support to remove barriers and board approval
  • Commercial management
  • Financial management
  • Business cases
  • Organizational change management
  • Elements and characteristics of project management
  • Communication skills
  • Effective presentations
  • Negotiation

Module 3 – Developing and promoting the service desk

  • Effective working relationships
  • Personal networking
  • Building effective work relationships
  • Contributing to IT/Business objectives
  • Conducting assessments
  • Analysis techniques
  • Sourcing models
  • Outsourcing the service desk
  • Promoting the service desk
  • Managing stakeholders expectations

Module 4 – IT Service Management

  • Objectives of ITSM
  • IT Infrastructure Library (ITIL)
  • Incident Management
  • Request Fulfillment
  • Problem Management
  • IT Change Management
  • Release and Deployment Management
  • Service Asset and Configuration Management
  • Knowledge Management
  • Information Security Management
  • IT Service Continuity Management
  • Service Catalogue Management
  • Service Level Management

Module 5 – Quality assurance

  • Quality assurance program and practices
  • Customer feedback
  • Service desk bench-marking
  • Monitoring interactions
  • Monitoring benefits
  • Incident and request monitoring
  • Call monitoring
  • Support delivery model variables
  • CSF’s, KPI’s and metrics
  • Resource management

Module 6 – Efficient management of tools and technologies

  • Service desk infrastructure
  • Common service desk technologies
  • IT Service Management systems
  • Automatic Call Distribution (ACD)
  • Computer Telephony Integration (CTI)
  • Support tools and methodologies
  • Telephone support
  • Deskside support
  • Electronic support tools
  • IT self-service and self-help
  • Self-healing tools
  • Cloud computing
  • Social media
  • Social collaboration

Module 7 – Staff recruitment, retention and development

  • Recruitment
  • The interview process
  • Structured induction and training
  • Skills and knowledge
  • Retain staff
  • Measuring satisfaction and engagement
  • Staffing strategy
  • Common staffing pitfalls
  • Staffing models

Module 8 – Leadership and Management

  • Characteristics of effective management
  • Activates of effective management – Planning
  • Activates of effective management – Organization resources
  • Activates of effective management – Direct, control and co-ordinate
  • Characteristics of effective leadership
  • Motivations of effective leadership
  • Benefits of motivation and motivation factors
  • Maintaining a positive environment
  • Improving performance
  • Reward and recognition
  • Providing direction and focus
  • Teamwork
  • Friendly and supportive workplaces

Module 9 – Professional development

  • Professional development assessment
  • Professional development methods
  • Personal development
  • Coaching
  • Mentoring
  • Stress management

target_au

Although there is no mandatory requirement, ideally candidates should have at least three years of professional experience working at the supervisory level within a Service Desk or support team. This course is ideal for both new Service Desk and Support managers and those who are established but wish to understand the latest approach and techniques for Service Desk best practice. The SDI Service Desk & Support Manager course would suit candidates working in the following professions or areas:

  • Support Managers
  • Service Desk Managers
  • Client Managers
  • Desktop Managers
  • Customer Support Managers
  • Technical Support Managers
  • Service Center Managers

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this Service Desk & Support Analysts course, although it is recommended that candidates should have a good understanding of service desk activity and objectives.


titleSDI Service Desk & Support Analyst
days3
seo_titleService Desk and Support Analyst (SDA) - IT Training | Insoft Services
seo_decThe Service Desk & Support Analyst (SDA) is designed to prepare candidates to work within and manage customer support environments.
seo_tkeyService Desk and Support Analyst (SDA)
categorysda
vendorAPMG

techonogyIT Services Management
overviewThe Service Desk & Support Analyst (SDA) three-day course recognizes an individual’s knowledge of customer service competencies and certifies that they have the skills required to work in the support industry. An individual passing an SDI exam indicates that they understand the role of the service desk professional and the associated best practice for communications, customer service, teamwork, ethics, service desk processes, and terminology usage. The Guide has been written by leading industry experts and is part of the Service Desk Institute (SD) stream of courses. This training event is designed to prepare candidates to work within and manage customer support environments.   See other courses available
objective

The SDA course is focused on equipping support analysts with the skills essential to deliver excellent levels of customer service and support. The course also looks at support methodologies and technologies and the tools utilized within the Service Desk. It reviews issues such as Service Level Agreements, the benefits and pitfalls and the importance of metrics; the implementation of service management processes, and effective problem-solving techniques that a Service Desk Analyst can utilize. It is based upon the standards and objectives for SDI’s Service Desk & Support Analyst qualification and ensures that students are provided with the knowledge, information, and tools to take the SDA exam.

The core concepts covered in the SDA course are:

  • Roles and Responsibilities
  • Effective Communication
  • Customer Service Skills and Competencies
  • Determine the importance of effective cross-cultural communication
  • The Service Desk Environment
  • Process Management
  • Managing, Meeting and Maintaining Service Levels
  • Problem Solving
  • Develop a clear understanding of the support tools and technologies available to Service Desk Analysts

The SDI qualification is an open qualification standard that is independent of any other training curriculum. SDI is the administrator, facilitator, and arbitrator of the standards. The exams are independently administered and proctored.


outline

Module 1 – Roles and Responsibilities

  • Roles and responsibilities
  • Activities of the service desk
  • Expectation of customers
  • The role of service desk management
  • Service desk and support analyst roles
  • Personal professional development
  • The service desk and best practice
  • The organizations policies
  • Local and international legislation
  • Service commitments and ethics
  • Good service attitude, skills and knowledge
  • Quality and service expectations
  • The supportive workplace
  • Typical service desks

Module 2 – Relationship Management

  • Teamwork
  • Relationship management
  • Customer relationship techniques – Organization
  • Customer relationship techniques – Colleagues
  • Customer relationship techniques – Customers
  • Cultural awareness and sensitivity
  • Language barriers
  • Communication techniques
  • Obtaining language assistance

Module 3 – Effective communication skills and competencies

  • Elements of communication
  • Customer communication
  • Emotional intelligence
  • Communications protocols
  • Barriers to communications
  • Ineffective communication
  • Verbal skills
  • Adapting your communication style
  • Non-verbal communication
  • Listening skills
  • Activating listening
  • Written communication
  • Using questions effectively
  • Types of question types and use of them
  • Problem-solving
  • Creative thinking

Module 4 – Effective rapport and conflict management skills

  • Empathy
  • Common emotions and actions
  • Dealing with negative reactions
  • Signs of conflict and frustration
  • Your role in conflict resolution
  • Successful negotiation
  • Professional contact management
  • Interaction and call management
  • Standard telephone greetings
  • Focusing the customer attention
  • Unsupported products
  • Unprofessional call management
  • Silent time
  • Routing call handling procedures
  • Techniques to manage difficult situations
  • Disengaging calls professionally
  • Stress management
  • Time management techniques
  • Types of customer behavior
  • Confidence

Module 5 – Effective processes and IT Service Management

  • Process management
  • Importance of documentation
  • Why follow processes and procedures
  • Incident management
  • Request fulfillment
  • Problem management
  • IT change management
  • Service level management
  • Service catalog
  • Knowledge management
  • IT security management
  • Software license management
  • IT service continuity management

Module 6 – Quality assurance activities

  • Quality assurance
  • Interaction monitoring
  • Incident and request monitoring
  • Customer satisfaction surveys
  • Service desk metrics
  • Common service desk measurements

Module 7 – Service desk technologies and tools

  • Telephony systems
  • Technology for ITSM processes
  • Service desk internet technologies
  • Assisted service delivery models
  • Support delivery models
  • Telephone support
  • Remote support
  • Deskside support
  • Basic IT components
  • Automatic call distribution (ACD)
  • Computer telephony integration (CTI)
  • Self-service technology
  • Self-healing technology
  • Social media

target_au

Although there is no mandatory requirement, ideally candidates should have an awareness of working in a service or support department or team. The SDI Service Desk & Support Analyst course would suit candidates working in the following professions or areas:

  • Support Analysts
  • Service Desk Analysts
  • First-line Analysts
  • Second-line Analysts
  • Client Supports
  • Desktop Support Analysts
  • Customer Support Officers
  • Technical Support Analysts
  • Service Center Analysts

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this Service Desk & Support Analysts course, although it is recommended that candidates should have a good understanding of service desk activity and objectives.


titleEnterprise Architecture Foundation Training
days2
seo_titleTOGAF Enterprise Architecture Foundation - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Foundation helps utilize resources more efficiently and effectively, and realize a greater return on investment.
seo_tkeyTOGAF Enterprise Architecture Foundation
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This two-day course is intended as a foundational introduction to the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

The course examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 exam (foundation). During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • The basic concepts of Enterprise Architecture and TOGAF
  • The core concepts of TOGAF 9
  • The key terminology of TOGAF 9
  • The ADM cycle and the objectives of each phase, and how to adapt and scope the ADM
  • The concept of the Enterprise Continuum; its purpose and constituent parts
  • How each of the ADM phases contributes to the success of enterprise architecture
  • The ADM guidelines and techniques
  • How Architecture Governance contributes to the Architecture Development Cycle
  • The concepts of views and viewpoints and their role in communicating with stakeholders
  • The concept of building blocks
  • The key deliverables of the ADM cycle
  • The TOGAF reference models
  • The TOGAF certification program
  • Foundation Exam Preparation

outline

Module 1 – Course overview and introduction
Module 2 – TOGAF 9.1 Introduction and Core Concepts
Module 3 – The Enterprise Continuum and Tools
Module 4 – The Architecture Development Method (ADM)
Module 5 – Architecture Governance
Module 6 – ADM Guidelines and Techniques
Module 7 – TOGAF Reference Models
Module 8 – Group Activities and Buzz Exercises


target_au

The TOGAF Enterprise Architecture Foundation would suit candidates working in the following professions or areas:

  • Individuals who require a basic understanding of the TOGAF 9 framework
  • Professionals who are working in roles associated with an architecture project
  • Individuals responsible for planning, execution, development, delivery, and operation
  • Architects who are looking for a first introduction to TOGAF 9
  • Architects who want to achieve Level 2 certification

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There are no prerequisites to attending this course, although it is recommended that candidates should have at least two years of professional experience working in Enterprise Architecture.


titleISO27001:2013 Information Security Practitioner
days2
seo_titleISO27001:2013 Information Security Practitioner Course | Insoft Services
seo_decISO27001:2013 Information Security Practitioner develops a deeper understanding of how to apply the standard for implementation, management and improvement.
seo_tkeyISO27001:2013 Information Security Practitioner
categoryit-services-management-training
vendorAPMG

techonogyIT Services Management
overviewISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. This two-day course expands on the foundational overview of this recently revised version of 2013. The ISO27001:2013 Information Security Practitioner training develops a deeper understanding of how to actually apply the standard for implementation, management, and improvement. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources.
  • ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Practitioner course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology
  • Apply your knowledge to business scenarios to enhance control of information
  • Establish a structured approach to information security management to secure information assets
  • Improve information security through the adoption of best practices
  • Understand how ISO/IEC 27001 provides a competitive differentiator when tendering for business contracts
  • Build a reputation with the secure management of confidential and sensitive information
  • Demonstrate compliance with an internationally recognized standard and the ability to satisfy customer security requirements

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – Practitioner examination preparation


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation and Practitioner would suit candidates working in the following professions or areas:

  • Both IT and business people will benefit from this course
  • Those requiring a basic understanding of the Information Security
  • IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • Anyone involved in or contributing to an on-going service improvement program
  • The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates are required to have attended an accredited training course and have successfully passed their foundation examination. It is strongly recommended that candidates should have a good understanding of security management.


titleISO27001:2013 Information Security Foundation
days3
seo_titleISO27001:2013 Information Security Foundation Course | Insoft Services
seo_decISO27001:2013 Information Security Foundation provides the basis for effective management of confidential information and application of information security controls.
seo_tkeyISO27001:2013 Information Security Foundation
categoryinformation-systems-security
vendorAPMG

techonogyIT Systems and Security
overviewThis three-day ISO27001:2013 Information Security Foundation course overviews the recently revised version of 2013. ISO/IEC 27001:2013 builds upon established foundations as the most widely recognized international standard specifically aimed at information security management. The adoption of an Information Security Management System (ISMS) is a strategic decision driving the coordination of operational security controls across all of the organizations electronic and physical information resources. ISO/IEC 27001:2013 is an international standard that provides the basis for effective management of confidential and sensitive information, and for the application of information security controls. It enables organizations to demonstrate excellence and prove best practices in Information Security management. Conformance with the standard requires a commitment to continually improve control of confidential and sensitive information, providing reassurance to sponsors, shareholders, and customers alike. ISO/IEC 27001:2013 is the formal specification and defines the requirements for an ISMS, which includes:
  • ISMS planning, support and operational requirements
  • Leadership responsibilities
  • Performance evaluation of the ISMS
  • Internal ISMS audits
  • ISMS improvement
  • Control objectives and controls
  See other courses available
objective

ISO27001:2013 Information Security Foundation course will ensure delegates understand the value to the business of the ISO/IEC 27001:2013 standard. There is an in-depth review of the key concepts and activities needed to properly plan for the implementation, management, and improvement of an Information Security Management System. The course also ensures a thorough understanding of associated activities, roles, responsibilities, challenges, risks, and critical success factors:

  • Best practice in Information Security Management and how to apply this within your organization
  • Scope and purpose of the ISO/IEC 27001 standard and how it can be implemented within an organization
  • Understand the key terms and definitions used in ISO/IEC 27001 to effectively roll out the principles
  • Leverage the fundamental ISO/IEC 27001 requirements for an ISMS to address the need to continually improve
  • Recognize the purpose of internal audits and external certification audits, their operation and the associated terminology

outline

Module 1 – Course overview and introduction

Module 2 – Overview and vocabulary

Module 3 – ISO/IEC 27001 requirements

Module 4 – Information risk management

Module 5 – ISO/IEC 27001 controls

Module 6 – ISMS implementation

Module 7 – ISMS audit and certification


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working within IT Service or Security Management. The ISO/IEC 27001:2013 Foundation would suit candidates working in the following professions or areas:

  • · Both IT and business people will benefit from this course
  • · Those requiring a basic understanding of the Information Security
  • · IT professionals or others working within an organization that is aligned or planning to be aligned with the ISO/IEC 27000 suite of standards
  • · Anyone involved in or contributing to an on-going service improvement program
  • · The Information Security Foundation is open to all individuals who may have an interest in the subject

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite for attending this course. It is strongly recommended that candidates should have a good understanding of security management.


titleLean IT Leadership
days3
seo_title
seo_decLean IT Leadership shows how to establish and maintain a sustainable approach to long term improvement of value delivery from IT.
seo_tkeyLean IT Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation and Lean IT Leadership exam. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This three-day course leads to the Lean IT Leadership exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a deep understanding of what skills are needed and what it takes to be a Lean IT Leader, this includes:

  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organisation
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 2 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 3 – Helping Others to Develop

  • Definition of Genchi Genbutsu/ Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 4 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 5 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 6 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 7 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Kaizen
days3
seo_title
seo_decThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives.
seo_tkeyLean IT Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis hands-on three-day course teaches and equips individuals to define, facilitate and lead Lean IT Kaizen improvement initiatives. The course teaches students how to effectively use the Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) improvement model leveraging the Lean A3 problem identification and planning tool to complete a full improvement cycle. This certification course provides you with the knowledge, skills, and methodology required to identify, plan and implement incremental service and process improvements focused on improving the efficiency and effectiveness of any process or value stream. It also prepares you for the Lean IT Association Kaizen certification exam. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Kaizen level certification.   See other courses available
objective
outline

This three-day course leads to the Lean IT Kaizen certification. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to be a highly effective Lean Kaizen Lead.

During the course you will:

  • Understand Lean principles related specifically to leading a Kaizen event
  • Understand how to apply the Lean A3 tool to support continual improvement
  • Gain practical how-to knowledge of how to use of the Six Sigma DMAIC improvement model as a structured improvement methodology
  • Learn about improvement scoping and validation
  • Learn how to gain the voice of customer input and establish critical to quality requirements
  • Learn how to apply and use Value Stream Mapping (VSM) techniques to identify process waste and speed improvement opportunities
  • Understand how to use root cause analysis techniques to support problem analysis
  • Learn how to identify, select and use various improvement options
  • Understand how to establish effective controls
  • Understand how to establish methods to improve quality and mistake proof future process activities

target_au

The course is designed for IT practitioners interested in expanding their practical knowledge and skills to lead targeted Lean improvement initiatives focused on continual service improvement, including:

  • Managers tasked with department level process improvements
  • Business analysts
  • Project managers
  • Software developers
  • Quality assurance managers
  • IT Consultants
  • Any roles responsible for quality, efficiency and continual service improvement

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req
titleLean IT Foundation with Six Sigma Overview
days3
seo_titleLean IT Foundation with Six Sigma Overview | Insoft Services
seo_decLean IT Foundation with Six Sigma Overview course shows how to apply the Lean IT approach to address customer value requirements.
seo_tkeyLean IT Foundation with Six Sigma Overview
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis three-day course leads to the Lean IT Association Foundation exam followed by an overview of Six Sigma. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.   See other courses available
objective

Lean IT Foundation with Six Sigma Overview is a three-day course that leads to the Lean IT Association foundation exam. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organisation
  • Lean IT Dimensions: Behaviour & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • High-level overview of Six Sigma

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behaviour & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviours
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Six Sigma

  • Meaning of Six Sigma
  • History of Six Sigma
  • Common roles in six sigma
  • Six Sigma methods
  • Six Sigma tools
  • Control charts
  • The Six Sigma organization
  • Process capability and measures

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of IT processes.


titleLean IT Foundation & Leadership
days5
seo_titleLean IT Foundation and Leadership - IT Training | Insoft Services
seo_decLean IT Foundation and Leadership provides practical appreciation of how to apply Lean IT Principles to specific business problems and pain points.
seo_tkeyLean IT Foundation and Leadership
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The leadership learning objectives are focused on building on the learning objectives from the Lean IT Foundation to provide a specific Lean leadership development training for IT professionals in a leadership role, both formal (i.e. managerial) and informal. The course will make use of the Lean A3 tool as the basis for progressively investigating all aspects of Lean IT Leadership. The aim is to ensure that each participant gains a detailed view of their personal Lean IT Leadership development by the end of the course. Application of learning outcomes will be demonstrated by each student through the completion of an A3. Validate the creation of the A3 as part of the class outcomes. The Lean IT Leader is someone who is committed to ensuring that the IT organization embraces Lean principles and operational excellence as its way of operating, and can be at any level of the organization in any ‘department’. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT.   See other courses available
objective

This five-day course leads to the Lean IT Association Foundation and Lean IT Leadership exams. During the course delegates, will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain both a foundational understanding of all the key parts of the Lean It approach and a more in-depth focus in IT Lean Leadership, this includes:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation
  • Develop yourself toward becoming a Lean IT leader
  • Understand Cascading Communication
  • Establish vision, mission and improvement prioritization with all levels of stakeholders
  • Use the Lean IT Leadership development model
  • Apply Walking the process (Gemba)
  • Use Lean Visual Management and Meeting Structure
  • Apply Employee Performance dialogue and review processes
  • Plan and organize for a Lean IT Organization
  • Develop a holistic measurement framework
  • Plan and design Lean organization transformational strategies

outline

Module 1 – Introduction to Lean

  • History of Lean
  • Key Principles of Lean
  • Aspects of Lean
  • Customer Defined Activities
  • 8 types of waste
  • Primary drivers of Lean
  • Lean and Six Sigma
  • Characteristics of Lean IT

Module 2 – Lean IT Dimensions: Customer

  • What is value
  • The customers
  • Critical to Quality
  • Voice of the customer

Module 3 – Lean IT Dimensions: Process

  • Value streams and processes
  • Process elements
  • Basic processes
  • Push vs pull systems
  • SIPOC
  • Value Stream Mapping (VSM)
  • Lean IT Time
  • Process metrics
  • The 5 s concept
  • Heijunka

Module 4 – Lean IT Dimensions: Performance

  • Defining performance
  • Performance indicators
  • Defining KPI’s
  • Time usage
  • Process Cycle Efficiency (PCE)
  • Skills and Knowledge

Module 5 – Lean IT Dimensions: Organization

  • Organization structures
  • Key behavior
  • Organizing Lean IT
  • Communications cascade
  • Objectives, feedback and performance
  • Performance dialogue
  • Visual management
  • Work boards

Module 6 – Lean IT Dimensions: Behavior & Attitude

  • The Lean mind-set
  • The Lean attitude
  • Lean Behaviors
  • Lean transformation
  • Lean leadership
  • Jidoka

Module 7 – Kaizen Continual Improvement

  • Continuous improvement
  • Kaizen events
  • Business benefits criteria
  • Feasibility criteria
  • Selecting a subject for a Kaizen event
  • Roles in a Kaizen event
  • A3 Method
  • Define, Measure, Analyze, Improve, Control
  • Common Kaizen tools
  • Common Kaizen Pitfalls

Module 8 – Introduction to Lean Leadership

  • Shingo Model: four key guiding principles
  • Key components to systems thinking
  • Definition of a True Value north
  • Lean style of leadership
  • Four aspects of the lean leadership development model
  • Five flows of IT value as defined by bell
  • Organizational context of the IT leader
  • Leadership aspects applied to the IT organizational context

Module 9 – Committing to Self-Development

  • Self-development principles and requirements
  • Leaders standard work
  • Resources efficiency vs Flow efficiency
  • Kaizen mindset: always seek improvement
  • Accountability: role of taking responsibility in a lean IT setting
  • Kata of leadership
  • PDCA cycle for practicing lean leadership to the Gemba

Module 10 – Helping Others to Develop

  • Definition of Genchi Genbutsu/Nemawashi
  • T-type leadership
  • 5 Whys: method for finding the route cause
  • Questioning techniques
  • Importance of Lean IT leadership in eliminating Mura and Muri
  • Gemba walk contrasted with a gallery walk

Module 11 – Continuous Improvement

  • Definition of continuous improvement
  • Daily Kaizen and Kaizen events
  • Definition and key characteristics of a team (Katzenbach & Smith)
  • The core elements of the Kaizen mind-set
  • Importance of standard reference models as the basis of improvement
  • The five levels of team development (Lencioni)
  • Characteristics of IT teams – technically-oriented, project-based, customer-oriented

Module 12 – Vision, Goals and Communication

  • Performing dialogue: Leading meetings and listening skills
  • Nemawashi for ensuring adoption strategy and policy and execution of projects
  • Noshin Kanri: method for translating strategy to operations
  • The key aspects of performance dialogue
  • Visual management – for development, IT operations, service desk
  • Cascade and catch ball mechanism
  • The aim of the Pyramid principle
  • MECE and its use
  • The goal of a change story

Module 13 – Lean IT Transformation

  • Business case for a Lean IT transformation
  • Eight mistakes when carrying out a transformation, and their mitigation
  • Key phases in accepting change
  • The importance of a change story
  • 5 lean IT dimensions for structuring Lean IT transformation
  • 7 phases of the transition curve
  • 3 key phases of the organizational level of a Lean IT transformation
  • Role of the Lean IT Leader in relation to the Lean IT Coach
  • The top-down and bottom-up aspects of a Lean IT transformation

Module – 14 The A3 Method

  • Goals of the A3 method
  • Sections of the A3 report
  • Advance-Prepare-Do-Check cycle
  • Organize information into the A3 format
  • Communicate the key message and create involvement
  • Define personal Lean IT Leadership goals

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in a process environment. The Lean IT Leadership qualification would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req

The Lean IT Foundation certificate is required to take the Lean IT Leadership exam.

Whilst the Lean IT Kaizen level is not a pre-requisite, candidates who complete the Lean IT Leadership scheme can benefit substantially from first understanding the Lean IT Kaizen role. One of the core tasks of Lean IT Leadership is driving and teaching continuous improvement, and the tools for this task are covered in detail in the Kaizen course.


titleLean IT Foundation & Kaizen
days5
seo_titleLean IT Foundation and Kaizen - IT Training | Insoft Services
seo_decLean IT Foundation and Kaizen course will show how to implement and apply Kaizen improvement activities into the enterprise, use it for client initiatives.
seo_tkeyLean IT Foundation and Kaizen
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewLean IT Foundation and Kaizen course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

Lean IT Foundation and Kaizen two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleLean IT Foundation
days2
seo_title
seo_decLean IT Foundation training is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach.
seo_tkeyLean IT Foundation
categorylita
vendorPeoplecert

techonogyIT Services Management
overviewThis two-day course leads to the Lean IT Association foundation exam. Candidates will be taken from foundational understanding through to getting a practical appreciation of how to apply Lean IT Principles to specific business problems, pain points, trigger events, and waste scenarios within the organization. They will learn how to implement and apply Kaizen improvement activities into their enterprise and how to efficiently use it for client initiatives, and how to effectively use Lean IT for different organizational scenarios. The course material is supported by practical case-based exercises. Candidates will learn how to apply the Lean IT approach to address customer value requirements and establish and maintain a sustainable approach to long term improvement of value delivery from IT. The Guide has been written by leading industry experts and is part of the Lean IT Association (LITA) stream of courses. This training event is designed to prepare candidates to manage improvements in a controlled and structured way using the Lean IT approach. Examinations are available during the event for candidates to achieve the Foundation level certification.   See other courses available
objective
outline

This two-day course leads to the Lean IT Association foundation exam. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain a foundational understanding of all the key parts of the Lean It approach including:

  • Introduction to Lean
  • Lean IT Dimensions: Customer
  • Lean IT Dimensions: Process
  • Lean IT Dimensions: Performance
  • Lean IT Dimensions: Organization
  • Lean IT Dimensions: Behavior & Attitude
  • Kaizen Continuous Improvement
  • Lean IT Foundation Exam Preparation

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years’ professional experience working in a process environment. The Lean IT Foundation would suit candidates working in the following professions or areas:

  • CxO’s
  • IT Managers/ Directors
  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • Operations Managers
  • Quality Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

This qualification is aimed at anyone working within a quality improvement environment that has responsibilities for identifying, assessing, planning, or managing improvement activities, or reporting on continual improvement activities across the organization.

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives.


pre_req
titleEnterprise Architecture Foundation & Advanced Training
days4
seo_titleTOGAF Enterprise Architecture Training | Insoft Services
seo_decTOGAF Enterprise Architecture Training is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts.
seo_tkeyTOGAF Enterprise Architecture Training
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. This four-day course is intended as an introduction to the TOGAF framework leading to an advanced understanding of the central concepts. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Training examines the essential features of the TOGAF framework and covers the Key Learning Points required to take the TOGAF Level 1 & 2 exams (foundation and certified). During the course delegates will get the opportunity to prepare for the exams and utilize our extensive database of practice questions. This course will enable delegates to understand all the key parts of the TOGAF Framework:

  • Course Introduction
  • TOGAF Basic Concepts
  • Architecture Governance
  • Architecture Views and Viewpoints
  • The ADM Phases
  • Building Blocks and the ADM
  • Key ADM Deliverables
  • ADM Guidelines and Techniques
  • The Architecture Development Method (ADM) – architecture process
  • Guidelines and techniques for using and adapting the ADM
  • The Architecture Content Framework – how to describe the architecture
  • The Enterprise Continuum – a classification system for architecture assets
  • TOGAF 9 Reference Models – the ‘building blocks’ of an Information System
  • Architectural Governance and Capability – governance, skills and maturity
  • Foundation & Certified Exam Preparation

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – The Enterprise Continuum and Core Concepts

Module 4 – The Architecture Development Method

Module 5 – Architecture Governance

Module 6 – ADM Guidelines and Techniques

Module 7 – TOGAF Reference Models

Module 8 – The ADM in Detail

Module 9 – Adapting the ADM Using Iterations and Levels

Module 10 – Security and the ADM

Module 11 – Service Orientated Architecture (SOA)

Module 12 – Architecture Content Framework (Metamodel)

Module 13 – Certified (Part 2) Examination Preparation

Module 14 – Group Activities and Buzz Exercices


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this taking the TOGAF Certified (Level 2) exam. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleEnterprise Architecture Advanced Training
days2
seo_titleTOGAF Enterprise Architecture Advanced - IT Training | Insoft Services
seo_decTOGAF Enterprise Architecture Advanced training contains guidance on what to do to establish an architecture practice and use it for transformation.
seo_tkeyTOGAF Enterprise Architecture Advanced
categorytogaf
vendorInsoft Specials

techonogyOpen-Source
overviewTOGAF, an Open Group Standard, is a proven enterprise architecture methodology and framework used by the world’s leading organizations to improve business efficiency. It is the most prominent and reliable enterprise architecture standard, ensuring consistent standards, methods, and communication among enterprise architecture professionals. Enterprise architecture professionals fluent in TOGAF standards enjoy greater industry credibility, job effectiveness, and career opportunities. TOGAF helps practitioners avoid being locked into proprietary methods, utilize resources more efficiently and effectively, and realize a greater return on investment. Enterprise Architecture Advanced Training is a two-day course that is intended as an advanced exploration of the TOGAF framework. TOGAF is the de-facto global standard for Enterprise Architecture. The Open Group Architecture Forum, comprised of more than 200 enterprises, develops and maintains the TOGAF standard and publishes successive versions at regular intervals. It contains substantial guidance on what to do to establish an architecture practice and then how to use it in connection with planning the longer-term transformation of the enterprise (strategic architecture), and designing capabilities to support it.   See other courses available
objective

TOGAF Enterprise Architecture Advanced training is designed as a follow-on course from the TOGAF Level 1 examination. During the course delegates will get the opportunity to prepare for the exam and utilize our extensive database of practice questions. This course will enable delegates to gain an advanced understanding of all the key parts of the TOGAF Framework:

  • How to apply the ADM phases in the development of an enterprise architecture
  • How to apply Architecture Governance in the development of an enterprise architecture
  • How to apply the TOGAF Architecture Content Framework
  • How to apply the concept of Building Blocks
  • How to apply the Stakeholder Management Technique
  • How to apply the TOGAF Content Metamodel
  • How to apply TOGAF recommended techniques when developing an enterprise architecture
  • The TOGAF Technical Reference Model and how to customize it to meet an organizations needs
  • The Integrated Information Infrastructure Reference Model
  • The content of the key deliverables of the ADM cycle
  • How an enterprise architecture can be partitioned to meet the specific needs of an organization
  • The purpose of the Architecture Repository
  • How to apply iteration and different levels of architecture with the ADM
  • How to adapt the ADM for security
  • SOA as a style of architecture
  • The role of architecture maturity models in developing an enterprise architecture
  • The purpose of the Architecture Skills Framework and how to apply it within an organization

outline

Module 1 – Course overview and introduction

Module 2 – TOGAF 9.1 Introduction and Core Concepts

Module 3 – TOGAF Reference Models

Module 4 – The Architecture Development method in detail

Module 5 – Adapting the ADM Using Iterations and Levels

Module 6 – Security and the ADM

Module 7 – Service Orientated Architecture (SOA)

Module 8 – Architecture Content Framework (Metamodel)

Module 9 – Certified (Part 2) Examination Preparation

Module 10 – Group Activities


target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in Enterprise Architecture. The TOGAF Certified would suit candidates working in the following professions or areas:

  • Individuals who require a deeper understanding of TOGAF 9
  • Professionals who are working in an organization where TOGAF 9 has been adopted
  • Individuals who need to participate in architecture projects and initiatives
  • Architects who will be responsible for developing architecture artifacts
  • Architects who wish to introduce TOGAF 9 into an architecture practice
  • Architects who want to achieve a recognized qualification to demonstrate their detailed knowledge of TOGAF 9

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the TOGAF 9 Foundation (Level 1) examination prior to attending this course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise architecture and IT organizational management.


titleCOBIT 5 Foundation & NIST Cyber Security Framework
days5
seo_titleCOBIT 5 Foundation and NIST CyberSecurity Framework | Insoft Services
seo_decCOBIT 5 Foundation and NIST Cybersecurity Framework prepare candidates to manage cybersecurity in a structured way using the NIST Cybersecurity Framework.
seo_tkeyCOBIT 5 Foundation and NIST CyberSecurity
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThis 5-day COBIT 5 Foundation and Implementing NIST Cybersecurity Framework using COBIT® 5 course, builds from the foundation level of COBIT, what it is and what it does, to preparing candidates to manage cybersecurity in a controlled and structured way using the NIST Cybersecurity Framework. The second part of the course is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business
  • Introduction to the Cybersecurity Framework

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise End-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Critical Security Framework Structure

  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow
  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 7: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 8: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 9: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 10: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 11: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 12: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 13: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts, IT organizational management, and a basic knowledge of cybersecurity concepts.


titleCOBIT 5 & NIST Cybersecurity Framework
days2
seo_titleCOBIT 5 and NIST Cybersecurity Framework - IT Training | Insoft Services
seo_decCOBIT 5 and NIST Cybersecurity Framework provides knowledge and understanding of the CSF, its goals, and the ability to apply this information.
seo_tkeyCOBIT 5 and NIST Cybersecurity
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThis 2-day Implementing NIST Cybersecurity Framework using COBIT® 5 course, is based on the ISACA Guide, ‘Implementing NIST Cybersecurity Framework Using COBIT 5’, which provides guidance in the implementation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) through a seven-step process, aligned with COBIT5 principles. The purpose of this course and qualification is to provide and measure a candidate’s knowledge and understanding of the CSF, its goals, the implementation steps, and the ability to apply this information. Delegates will also prepare for and sit an 80 minute, multiple-choice foundation Information is a key resource for all enterprises, and technology plays a significant role.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • COBIT®5 Cyber Security Introduction
  • Cybersecurity Challenges
  • Step 1: Prioritise and Scope
  • Steps 2 and 3: Orient and Create a Current Profile
  • Step 4 and Step 5: Conduct a Risk Assessment and Create a Target Profile
  • Step 6: Determine, Analyse, and Prioritise Gaps
  • Step 7: Implement the Action Plan
  • CSF Action Plan Review and CSF Life Cycle Management

outline

Lesson 1: Course Overview and Introduction

  • COBIT 5 Overview
  • The Five Principles of COBIT 5
  • The Goals Cascade
  • The Seven Enterprise Enablers
  • COBIT 5 Process Reference Model
  • Process Capability Levels
  • Executive Order 13636
  • Three components of the Cybersecurity Framework (CSF)
  • CSF 7 Implementation Steps
  • Alignment with COBIT 5 Principles/ Phases
  • Framework implementation Flow

Lesson 2: Critical Security Framework Structure

  • The CSF Core
  • The Five Core Functions
  • CSF Tiers and Tier Categories
  • Four CSF Tiers
  • CSF Framework Profiles

Lesson 3: Phase One – What are the drivers?

  • Purpose of Phase One
  • Phase One Inputs and Outputs
  • Phase One Activities
  • Develop an Enterprise Architecture Vision
  • Determine Scope
  • Identify the Risk Architecture
  • Step One – Relationship to COBIT 5

Lesson 4: Phase Two – Where are we now?

  • Purpose of Phase Two
  • Phase Two Inputs and Outputs
  • Phase Two Activities
  • Tier Selection
  • Assets
  • Threats and Vulnerabilities
  • Current State Profile
  • Achievement of an Outcome
  • Process Capability Levels
  • Attribute Rating Scale

Lesson 5: Phase Three – Where do we want to be?

  • Purpose of Phase Three
  • Phase Three Inputs and Outputs
  • Phase Three Activities
  • Risk Assessment
  • Target State Profile
  • Goals for the Risk Assessment

Lesson 6: Phase Four – What needs to be done?

  • Purpose of Phase Four
  • Phase Four Inputs and Outputs
  • Phase Four Activities
  • Gap Assessment
  • The Action Plan/ Considerations when Action Planning

Lesson 7: Phase Five – How do we get there?

  • Purpose of Phase Five
  • Phase Five Inputs and Outputs
  • Phase Five Activities
  • COBIT 5 Implementation Guide
  • Stakeholder Communication
  • Action Plan Delivery

Lesson 8: Phase Six – Did we get there

  • Purpose of Phase Six
  • Phase Six Inputs and Outputs
  • Phase Six Activities

Lesson 9: Phase Seven – How to keep the momentum going

  • Purpose of Phase Seven
  • Phase Seven Inputs and Outputs
  • Phase Seven Activities

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in IT and an understanding of the COBIT 5 framework. The COBIT 5 NIST Cybersecurity Framework would suit candidates working in the following professions or areas:

  • Senior Project Officers
  • Project & Program Coordinator/Managers
  • IT Security Managers
  • Operations Managers
  • Business Analysts
  • Engineering Managers
  • IT Infrastructure Managers
  • Internal Consultants
  • Professional Consultants

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

The recommended prerequisites for this course are:

  • Completed COBIT 5 Foundation Course (for obtaining the CSF Implementation Enhanced Qualification)
  • Basic Knowledge of COBIT 5
  • Basic knowledge of cybersecurity concepts

titleCOBIT 5 Implementation
days3
seo_title
seo_decCOBIT 5 Implementation shows how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization.
seo_tkeyCOBIT 5 Implementation
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewGet a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 Implementation for different organizational scenarios. The course material is supported by practical exercises and case-based scenarios. Candidates learn how to apply the COBIT 5 continual improvement lifecycle approach to address requirements and establish and maintain a sustainable approach to governing and managing enterprise IT as “normal business practice."   See other courses available
objective

This course is designed as an advanced implementation guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are:

  •  How to analyze enterprise drivers
  • Seven Phase implementation Steps
  • Implementation challenges
  • Root causes and success factors in each phase
  • How to determine and assess current process capability
  • How to scope and plan improvements
  • Identify and avoid potential implementation pitfalls
  • Leverage the latest good practices

outline

Lesson 1: Introduction and Positioning GEIT

  • Understanding GEIT
  • Leveraging COBIT 5 & Integrated Frameworks, Standards and Good Practices
  • Recap of Principles
  • Recap of Enablers

Lesson 2: First Steps

  • Creating the Appropriate Environment
  • Recap of the Continual Lifecycle
  • Pain Points and Trigger Events
  • Stakeholder Involvement, Needs/ Enterprise Goals to be Mapped to Pain Points and Trigger Events
  • Key Success Factors

Lesson 3: Initiate the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 4: Define Problems and Opportunities

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 5: Plan and Execute the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 6: Realising the Benefits

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 7: Exam Preparation

  • Question Types
  • Practice Questions

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Implementation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Implementation Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Foundation and Assessor for Security
days5
seo_titleCOBIT 5 Foundation and Assessor for Security Training | Insoft Services
seo_decCOBIT 5 Foundation and Assessor for Security provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities.
seo_tkeyFoundation and Assessor for Security
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Foundation and Assessor for Security course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Foundation and Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How to use the self-assessment guide
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  •  The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Program
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 7: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 8: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 9: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 10: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 11: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 12: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 13 – Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Foundation and Assessor for Security course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Foundation and Assessor
days5
seo_titleCOBIT 5 Foundation and Assessor - IT Training | Insoft Services
seo_decThe COBIT 5 Foundation and Assessor course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities.
seo_tkeyCOBIT 5 Foundation and Assessor
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Foundation and Assessor course provides the foundational knowledge of COBIT and the basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Foundation and Assessor course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How to use the self-assessment guide
  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  • How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 7: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  •  Assessment Class Selection
  • Self-Assessment

Lesson 8: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 9: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 10: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 11: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 12: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 13 – Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Foundation & Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organization management.


titleCOBIT 5 Foundation & Implementation
days5
seo_titleCOBIT 5 Foundation and Implementation - IT Training | Insoft Services
seo_decThe COBIT 5 Foundation and Implementation course explains the COBIT framework and supporting materials in a logical and example-driven approach.
seo_tkeyCOBIT 5 Foundation and Implementation
categorycobit
vendor

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT.  The COBIT 5 Foundation and Implementation course explains the COBIT framework and supporting materials in a logical and example-driven approach. Get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events, and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 for different organizational scenarios.   See other courses available
objective

The COBIT 5 Foundation and Implementation course is designed as an advanced course leading candidates from novice to implementation skilled professionals. The course will enable you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation
  • How to analyze enterprise drivers
  • Implementation challenges, root causes and success factors
  • How to determine and assess current process capability
  • How to scope and plan improvements
  • Potential implementation pitfalls

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?
  • Phase 2 – Where are We Now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What Needs to be Done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

Lesson 6: Introduction and Positioning GEIT

  • Understanding IT
  • Leveraging COBIT 5 & Integrated Frameworks, Standards and Good Practices
  • Recap of Principles
  • Recap of Enablers

Lesson 7: First Steps

  • Creating the Appropriate Environment
  • Recap of the Continual Lifecycle
  • Pain Points and Trigger Events
  • Stakeholder Involvement, Needs/ Enterprise Goals to be Mapped to Pain Points and Trigger Events
  • Key Success Factors

Lesson 8: Initiate the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Programme Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 9: Define Problems and Opportunities

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 10: Plan and Execute the Program

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 11: Realising the Benefits

  • Challenges
  • Roles within the Phase
  • Phase Description and Objective
  • Continual Improvement Tasks
  • Change Enablement Tasks
  • Program Management Tasks
  • Inputs
  • Processes
  • Outputs

Lesson 12: Exam Preparation

  • Question types
  • Practice Questions

target_au

Although there is no mandatory requirement, ideally candidates should have at least two years of professional experience working in an IT Services environment.

The COBIT 5 Foundation & Implementation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management. To be eligible to sit the Implementation examination, candidates must pass the Foundation examination taken during the course.


titleCOBIT 5 Foundation
days3
seo_title
seo_decCOBIT 5 Foundation course helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques.
seo_tkeyCOBIT 5 Foundation
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.   See other courses available
objective

This COBIT 5 Foundation course is designed as an introduction to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT
  • How to apply COBIT in a practical situation

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Meeting Stakeholders Needs
  • The Goals Cascade
  • Covering an Enterprise Endo-to-end
  • Single Integrated Framework
  • Enabling a Holistic Approach
  • Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

  • COBIT 5 Enabler Dimensions
  • Enabler 1 – Principles, Policy and Frameworks
  • Enabler 2 – Processes
  • Enabler 3 – Organisational Structures
  • Enabler 4 – Culture, Ethics and Behaviour
  • Enabler 5 – Information
  • Enabler 6 – Services, Infrastructure and Applications
  • Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the drivers?
  • Phase 2 – Where are we now?
  • Phase 3 – Where do we want to be?
  • Phase 4 – What needs to be done?
  • Phase 5 – How do we get there?
  • Phase 6 – Did we get there?
  • Phase 7 – How to Keep Momentum
  • Business Case

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment?
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments
  • The Process Reference Model (PRM)
  • The Process Assessment Model (PAM)
  • The Measurement Framework

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment.

The COBIT 5 Foundation course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs


pre_req

There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Awareness
days1
seo_title
seo_decCOBIT 5 Awareness will introduce COBIT 5 and how it works with existing frameworks, and discuss how to measure and assess processes using the framework.
seo_tkeyCOBIT 5 Awareness
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewCOBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems. This one-day COBIT 5 Awareness course will give you a flavor of what COBIT 5 is, and when used effectively can govern the use of your existing processes throughout your IT Enterprise. The course will introduce COBIT 5 and how it works with existing frameworks, discuss the COBIT 5 principles, highlight the COBIT 5 enablers, and discuss how you would measure and assess processes using the framework.   See other courses available
objective

This course is designed to provide a high-level overview of COBIT and enable delegates to understand how an integrated IT Governance framework might be utilized to achieve IT business integration, cost reductions, and increased productivity. The areas that this course is designed to cover are:

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT framework and all the components of COBIT

outline

Lesson 1: COBIT 5 Overview and Key Features

  • What is COBIT 5?
  • COBIT 5 Scope
  • History of COBIT 5
  • The Drivers for COBIT 5
  • Mapping COBIT 5 with other frameworks
  • Mapping COBIT 5 in a business

Lesson 2: The Five COBIT 5 Principles

  • Introduction to Meeting Stakeholders Needs
  • Introduction to The Goals Cascade
  • Introduction to Covering an Enterprise Endo-to-end
  • Introduction to Single Integrated Framework
  • Introduction to Enabling a Holistic Approach
  • Introduction to Separating Governance from Management

Lesson 3: The Seven COBIT 5 Enablers

COBIT 5 Enabler Dimensions

  • Introduction to Enabler 1 – Principles, Policy and Frameworks
  • Introduction to Enabler 2 – Processes
  • Introduction to Enabler 3 – Organizational Structures
  • Introduction to Enabler 4 – Culture, Ethics and Behaviour
  • Introduction to Enabler 5 – Information
  • Introduction to Enabler 6 – Services, Infrastructure and Applications
  • Introduction to Enabler 7 – People, Skills and Competencies

Lesson 4: COBIT Implementation

  • Challenges to Success
  • Key Success Factors
  • COBIT 5 Lifecycle Approach
  • COBIT 5 Implementation Lifecycle
  • Phase 1 – What are the Drivers?

Lesson 5: The COBIT 5 Process Capability Model

  • What is a Process Assessment
  • What is the COBIT Assessment Programme
  • The Differences between a Capability and Maturity Assessment
  • Overview of the COBIT 5 Capability Model & Assessments

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment.

The COBIT 5 Awareness course would suit candidates working in the following IT professions or areas:

  • IT Auditors
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • IT Developers
  • Process practitioners
  • Managers in IT service providing firms

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

There is no prerequisite to attending this awareness course, although it is recommended that candidates should have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Assessor for Security
days3
seo_titleCOBIT 5 Assessor for Security - IT Training | Insoft Services
seo_decThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model.
seo_tkeyCOBIT 5 Assessor for Security
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Assessor for Security course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective

The COBIT 5 Assessor for Security course is designed as an advanced assessor guide to COBIT 5 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized to achieve IT business integration, cost reductions, and increased productivity. The syllabus areas that this course is designed to cover are:

  •  How to perform a process capability assessment using the Assessor Guide: using COBIT 5
  •  How to apply the Process Assessment Model (The PAM) in performing a process capability assessment
  • Specifically: To use the Process Reference Model, in particular, to be able to use the 37 processes outlined in the PRM; To apply and analyze the measurement model in assessing process capability levels; and, To apply and analyze the capability dimension using generic criteria outlined in the PAM
  • How to identify and assess the roles and responsibilities in the process capability assessment process
  • How to perform and assess the 7 steps outlined in the Assessor Guide
  • Specifically: Initiate a process assessment; Scope an assessment, using the tools provided and the PAM for the selection of the appropriate processes; Plan and brief the teams; Collect and validate the data; Do a process attribute rating; and, Report the findings of the assessment

outline

Lesson 1: Foundation Review

  • Process Capability Assessment
  • COBIT Assessment Program
  • Process Capability Program
  • Advantages of the ISO/IEC15504 Approach
  • Key Definitions
  • Process Reference Model
  • Assessing Process Capability
  • COBIT Process Assessment Attributes
  • Consequences of Capability Gaps

Lesson 2: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 3: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 4: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 5: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 6: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 7: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 8: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarize Results

Lesson 9: Exam Preparation

  • Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Assessor Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleCOBIT 5 Assessor
days3
seo_title
seo_decCOBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM).
seo_tkeyCOBIT 5 Assessor
categorycobit
vendorPeoplecert

techonogyCOBIT
overviewThe COBIT 5 Assessor course provides a basis for assessing an enterprise’s process capabilities against the COBIT 5 Process Assessment Model (PAM). Evidence-based to enable a reliable, consistent, and repeatable way to assess IT process capabilities, this model helps IT leaders gain C-level and board member buy-in for change and improvement initiatives. Assessment results provide a determination of process capability. They can be used for process improvement, delivering value to the business, measuring the achievement of current or projected business goals, benchmarking, consistent reporting, and organizational compliance.   See other courses available
objective
outline

Lesson 1: Foundation Review

  • Process Capability Assessment
  • COBIT Assessment Programme
  • Process Capability Program
  • Advantages of the ISO/IEC15504 Approach
  • Key Definitions
  • Process Reference Model
  • Assessing Process Capability
  • COBIT Process Assessment Attributes
  • Consequences of Capability Gaps

Lesson 2: Roles and Responsibilities

  • Assessment Team
  • Role – Sponsor
  • Role – Lead Assessor
  • Role – Assessor
  • Role – Co-ordinator
  • Competencies for Assessors
  • Key Issues for an Assessment

Lesson 3: Assessment Initiation and Scoping

  • Recommend Steps
  • Pre-Assessment Questionnaire
  • Scoping Process
  • Selection of Processes
  • Initial Mapping of the Processes
  • Setting Target Capability Levels
  • Assessment Class Selection
  • Self-Assessment

Lesson 4: Planning the Assessment and Briefing the Teams

  • Planning Overview
  • Recommendation Planning Steps
  • Assessment Plan
  • Briefing Overview
  • Recommended Briefing Steps
  • Issues – Management Support
  • Issues – Training

Lesson 5: Data Collection, Validation and Attribute Rating

  • Data Collection Overview
  • Data Collection Recommended Steps
  • Process Purpose & Outcomes, Base Products and Work Products
  • Data Collection Strategy
  • Instances of Process Performance
  • Evidence Requirements
  • Capability Levels of Evidence
  • Recording
  • Data Validation Recommended Steps
  • Review of Data Collected
  • Dealing with Deficiencies

Lesson 6: Process Rating

  • Attribute Rating Recommended Steps
  • Attribute Rating Scales
  • Process Capability Levels
  • Attribute Ratings and Capability Levels
  • Decision Making Process

Lesson 7: Assessment Reporting

  • Assessment Reporting Recommended Steps
  • Reporting
  • Minimum Report Content
  • Implication of Results
  • Presentation to Participants

Lesson 8: Self-Assessment

  • The Self-Assessment Process
  • Deciding on a Process to Assess
  • Determine Level 1 Capability
  • Determine Capability Levels 2 to 5
  • Record and Summarise Results

Lesson 9: Exam Preparation

  •  Exam Structure
  • Exam Question Types

target_au

Although there is no mandatory requirement, ideally candidates should have at least two year’s professional experience working in an IT Services environment. Candidates wishing to attend this course must have attained the COBIT 5 Foundation course prior to attending the course.

The COBIT 5 Assessor course would suit candidates working in the following IT professions or areas:

  • Internal and external auditors
  • IT auditors and consultants
  • IT Managers
  • IT Quality professionals
  • IT Leadership
  • Process practitioners

The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.


pre_req

Candidates must have successfully achieved the COBIT 5 Foundation examination and should have successfully completed a COBIT 5 Assessor Course. Although it is not a mandatory requirement, it is recommended that candidates should also have a good understanding of enterprise governance concepts and IT organizational management.


titleOWASP Top 10 Bootcamp
days2
seo_titleOWASP Top 10 Bootcamp - IT Training | Insoft Services
seo_decOWASP Top 10 Bootcamp course shows how to identify and exploit general vulnerabilities, and how to fix existing holes and prevent new ones from occurring.
seo_tkeyOWASP Top 10 Bootcamp
categoryweb-applications
vendorOWASP

techonogyOpen-Source
overviewIn OWASP Top 10 Bootcamp course you will learn about the most common security risks for web applications (OWASP Top 10). Find out how to identify and exploit general vulnerabilities in applications, and how to fix existing holes and prevent new ones from occurring.   See other courses available
objective

After successfully completing the OWASP Top 10 Bootcamp course, you will:

  • Recognize the causes behind and the consequences of common coding errors and mistakes
  • Understand the methods for discovery and exploitation of these issues
  • Understand the basic practices that help prevent the most common mistakes and lead to more secure software

outline

This training follows the structure of the OWASP Top 10 list of the most critical web application security risks. For each risk, it provides its description, common examples of vulnerabilities and ways the attackers can use to exploit them, and explains the potential consequences of a successful attack.

Basic guidance on how to avoid each risk is also provided, which is delivered in engaging, seminar-style lecture format with hands-on lab exercises for you to complete. This hands-on approach keeps you engaged and ensures the knowledge transfer of critical secure coding techniques.

Labs

The OWASP Top 10 Boot Camp features several hands-on labs, that includes:

  • Exploiting SQL injection
  • Attacking authentication
  • Cross-site scripting exploitation
  • Source code auditing
  • CMS identification
  • Attacking web services
  • Client-side attacks
  • Open-source analysis & Google hacking
  • Exploiting web application with w3a

target_au

OWASP Top 10 course applies to a broad audience. Primarily designed for professionals whose job function includes creating web applications, it will also be highly beneficial for other IT and information security professionals, as well as managers who want to know more about web application security risks and what they mean to an organization.


pre_req
titleOWASP Application Threat Modeling
days2
seo_titleOWASP Application Threat Modeling - IT Training | Insoft Services
seo_decThe OWASP Application Threat Modeling gives the best training possible and the templates to incorporate threat modeling best practices in the daily work.
seo_tkeyOWASP Application Threat Modeling
categorythreat-modeling
vendorOWASP

techonogyOpen-Source
overviewAs skilled and experienced professionals we know that there is a gap between academic knowledge of threat modeling and the real world. To close that gap, we developed practical use cases, based on real-world projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using the OWASP Application Threat Modeling methodology, we provide our students with the best training possible and the templates to incorporate threat modeling best practices in their daily work. Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on:
  • B2B web and mobile applications, sharing the same REST back-end
  • An IoT deployment with a gateway and a cloud-based update service
  • OAuth scenarios for an HR application
  • Privacy of a new face recognition system in an airport
  • Get into the defenders’ head, attacking a nuclear facility
  See other courses available
objective
outline

Day 1

  • Threat modelling introduction
  • Threat modelling in a secure development lifecycle
  • What is threat modelling?
  • Why perform threat modelling?
  • Threat modelling stages
  • Different threat modelling methodologies
  • Document a threat model
  • Diagrams –what are you building?
  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Sequence and state diagrams
  • Advanced diagrams
  • Hands-on: diagram B2B web and mobile applications, sharing the same REST backend
  • Identifying threats –what can go wrong?
  • STRIDE introduction
  • Spoofing threats
  • Tampering threats
  • Repudiation threats
  • Information disclosure threats
  • Denial of service threats
  • Elevation of privilege threats
  • Attack trees
  • Attack libraries
  • Hands-on: STRIDE analysis of an Internet of Things (IoT) deployment with an on-premise gateway and secure update service

Day 2

  • Addressing each threat
  • Mitigation patterns
  • Authentication: mitigating spoofing
  • Integrity: mitigating tampering
  • Non-repudiation: mitigating repudiation
  • Confidentiality: mitigating information disclosure
  • Availability: mitigating denial of service
  • Authorization: mitigating elevation of privilege
  • Specialist mitigations
  • Hands-on: threat mitigations OAuth scenarios for web and mobile applications

target_au

Threat modeling is a crucial technique to assure more secure software and systems. The OWASP Application Threat Modeling training will provide our students with the know-how, templates, and exercises to start threat modeling themselves. Key takeaways are:

  • becoming a better (security) professional
  • understanding the process and technique of threat modeling
  • knowing when and how to introduce and improve threat modeling

pre_req

Students should be familiar with basic knowledge of web and mobile applications, databases & Single sign-on (SSO) principles


titleWeb Hacking Check Point Certified PenTesting Expert
days2
seo_titleWeb Hacking Check Point Certified PenTesting Expert | Insoft Services
seo_decIn this Web Hacking Check Point PenTesting course you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing.
seo_tkeyWeb Hacking Check Point
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Web Hacking Check Point Certified PenTesting Expert course is an entry-level web application security testing training. This course works as a prerequisite for the Advanced Web Hacking course. In two days, you'll learn the tools and techniques to step into the world of ethical hacking and penetration testing with a focus on web applications.   See other Check Point courses
objective
  • This curriculum introduces you to Web Application Hacking.
  • Practical focus
  • Learn how web application security flaws are found
  • Discover leading industry standards and approaches
  • Use this foundation to enhance your knowledge
  •  Prepare for more advanced web application topics

outline

Day 1

Information gathering, profiling and cross-site scripting

  • Understand HTTP protocol
  • Identify the attack surface
  • Username enumeration
  • Information disclosure
  • Issues with SSL / TLS
  • Cross-site scripting

Day 2

Injection, flaws, files and hacks

  • SQL injection
  • XXE attacks
  • OS code injection
  • Local/remote file include?
  • Cryptographic weakness
  • Business logic flaws
  • Insecure file uploads

target_au
  • System administrators
  • Web developers
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next level

pre_req

Before attending the Web Hacking Check Point Certified PenTesting Expert course, you should have:

  • Laptop with Windows Operating System installed (either natively or running in a VM)
  • Administrative access to perform tasks such as installing software, disabling antivirus etc..
  • Ethernet/wired network for this class (Or supported adapter).

titleInfrastructure Hacking Check Point Certified Pen Testing Expert
days2
seo_titleInfrastructure Hacking Check Point Certified PenTesting Expert | Insoft UK
seo_decThe Infrastructure Hacking Check Point Certified Pen Testing Expert course will give you what is necessary to start or formalise your pen testing career.
seo_tkeyInfrastructure Hacking Check Point
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Infrastructure Hacking Check Point Certified Pen Testing Expert course is an intermediate training designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.   See other Check Point courses
objective

This curriculum familiarizes you with hacking tools and techniques.

  • Gain practical experience with tools that will serve you in the future
  • Learn tools and techniques to hack various components involved in infrastructure hacking
  • Develop a critical understanding of the concepts behind these

outline

Day 1

  • TCP/IP basics
  • The threat of port scanning
  • Target enumeration
  • Brute-forcing
  • Meta sploit basics
  • Hacking recent Unix vulnerabilities
  • Hacking databases
  • Hacking application servers
  • Password cracking

Day 2

  • Hacking third-party applications (WordPress, Joomla, Drupal)
  • Windows enumeration
  • Hacking recent Windows vulnerabilities
  • Hacking third-party software (Browser, PDF, Java)
  • Post-exploitation: dumping secrets
  • Hacking windows domains

target_au
  • System administrators
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next-level

pre_req

Before attending the Infrastructure Hacking Check Point Certified PenTesting Expert course, you must bring or have access to a laptop with admin/root access.


titleHacking 101 Check Point Certified PenTesting
days1
seo_titleHacking 101 Check Point Certified PenTesting Training | Insoft Services
seo_decThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing and Reverse Engineering.
seo_tkeyHacking 101
categorycheck-point-courses
vendorCheck Point

techonogySecurity
overviewThe Hacking 101 Check Point Certified PenTesting training course is built to train professionals in the realm of Pen Testing, by providing knowledge and skills in areas of network, system, network, web and applications hacking, as well as in Reverse Engineering.   See other Check Point courses
objective

Discover the world of Pen Testing Begin your journey with proven hacking techniques. The Hacking 101 Check Point Certified PenTesting course trains IT professionals in the skills of Pen Testing. You will become familiar with the risks and vulnerabilities of corporate networks.

You will learn hacking skills for:

  • Systems
  • Networks
  • Web
  • Applications
  • Reverse software engineering

outline
  • Pen Test Methodology
  • Website architecture
  • Attack vectors
  • SQL injection
  • XSS (Cross-site scripting)
  • Burp (Proxy tool)

Learn Hacking techniques for infrastructure devices and systems. These skills are critical for penetration testing and managing vulnerabilities in your environment. Students will become familiar with scanning, testing and hacking networks.

There are live demonstrations that feature a variety of defensive hacking techniques.


target_au

Students with a background in programming and networking.


pre_req

Students should bring their own laptop with Windows Operating System installed (either natively or running in a VM). Further, students must have administrative access to perform tasks such as installing software, disabling antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported. Also, note that we will use an Ethernet/wired network for this class. If your laptop does not support this, please carry the correct adaptor to ensure you are able to connect to the wired network.


titleForcepoint Web Security System Engineer Course
days5
seo_titleForcepoint Web Security System Engineer Course Training
seo_decIn this Forcepoint Web Security System Engineer course, you will gain core skills as a system engineer for handling Forcepoint Web Security.
seo_tkey
categoryweb-security
vendorForcepoint

techonogySecurity
overviewDuring this 5 days Forcepoint Web Security System Engineer classroom-based instructor-led course, students will gain an understanding of the core competencies and skills needed to practice as a system engineer handling Forcepoint Web Security. The core competencies are design and deployment, component implementation, troubleshooting, and debugging. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Web Security from concept creation to production.
objective
  • Analyze key deployment considerations
  • Calculate sizing and performance tuning
  • Classify different deployment types
  • Install and configure Web Security with appliances
  • Assess how Web Security integrates with supported third-party solutions
  • Configure tweaks to tune and balance settings to respond to daily needs
  • Perform troubleshooting and debugging

outline

MODULE 1: DEPLOYMENT

  • Define key deployment considerations
  • Use best practices to review the system, hardware, and other pre-requirements for installation
  • Identify which services to install and how to distribute them across different devices
  • Prepare a Windows server for a Forcepoint installation
  • Identify the location of the installation logs for troubleshooting installation problems
  • Identify the features of Forcepoint Appliances
  • Describe the hardware specifications and architecture of Forcepoint Appliances
  • Identify the information needed for the initial configuration of an appliance
  • Locate and install hotfixes
  • Explain the principle differences between appliances running version 8.3 (or later)versus those running version 8.4 (or newer)
  • Describe configuring SNMP on an appliance
  • Define and discuss the methods of traffic redirection using a proxy including the pros and cons of each
  • Deploy and configure Explicit and Transparent Proxy
  • Demonstrate understanding of PAC files, WPAD, GPO enforcement of proxy settings
  • Compare Web Security component placement per network size
  • Apply guidelines related to component deployment, limits, ratios and supported configurations
  • Identify how Web Security integrates with third-party external services
  • Detail the full scope and deployment workflow for simple, medium, and advanced network deployments
  • List components and concepts used in sizing and performance tuning
  • Apply Web Security sizing information provided by Forcepoint Performance Engineering
  • Utilize the sizing guidelines to successfully provide deployment recommendations for small, medium, and large networks
  • Compare and contrast various deployment types based on real-world deployment examples
  • Describe Installation verification for a successful deployment
  • Identify the Web Security installation footprint
  • Describe methods of configuring the proxy for high availability
  • List the components needed for disaster recovery
  • Identify the disaster recovering guidelines and considerations

MODULE 2: CONFIGURATION

  • Distinguish key settings in the Security Manager infrastructure components
  • Install and use the Forcepoint Security Appliance Manager(FSAM)
  • Identify and analyze Filtering and Policy Enforcement components
  • Articulate the key features and functions in the proxy architecture
  • Describe the pros and cons of various user identification agents
  • Describe the functions of the User Service
  • Defend the need for domain admin rights
  • Compare XID agents with proxy authentication
  • Design and implement proxy authentication based on a customer’s network size and Directory Service options
  • Utilize best practices for managing encrypted traffic
  • Implement User Identification components in single and multi-domain environments
  • Evaluate the Logging and Reporting architecture

MODULE 3: TROUBLESHOOTING AND DEBUGGING

  • Identify Web Security configuration files, diagnostic tools, tuning parameters, and verbose logging
  • Describe the process of obtaining appliance root access
  • Demonstrate appliance CLI commands and operations
  • Utilize effective procedures for troubleshooting Security Manager components
  • Detail proxy tuning and debugging procedures
  • Identify proxy debugging tools and log files
  • Debug the ant_server
  • Troubleshoot proxy authentication
  • Troubleshoot IWA
  • Troubleshoot SSL decryption
  • Inspect User Service architecture, main configuration files, troubleshooting, and debugging parameters
  • Review Log Server and Log Database back-end configuration files, tuning parameters, and troubleshooting procedures

target_au
  • Channel Partners: Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support
  • Customers: Deployment Specialists, Implementation Specialists, System Engineers
  • Forcepoint: Sales Engineers, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint Web Administrator Course and certification
  • Intermediate knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint NGFW System Engineer Course
days5
seo_titleForcepoint NGFW System Engineer Course Training
seo_decIn the Forcepoint NGFW System Engineer course you will learn how to install, configure, administer and support Forcepoint NGFW into the security ecosystem.
seo_tkey
categoryngfw
vendorForcepoint

techonogySecurity
overviewThe Forcepoint NGFW System Engineer course combines five sessions where you will learn how to install, configure, administer, support and understand how Forcepoint NGFW fits into the security ecosystem. Through instruction, demonstrations, and hands-on lab practice exercises, you will understand the requirements and recommendations to successfully deploy Forcepoint NGFW in a variety of network environments. You will then develop expertise in topics that include, but are not limited to, clustering the NGFW, creating security rules and policies, integrating the NGFW with other Forcepoint technologies, inbound and outbound traffic management, under-standing multi-link technology, configuring VPNs, traffic deep inspection, and controlling endpoint activity with the Endpoint Context Agent.
objective
  • Describe the fundamentals of NGFW
  • Detail the Security Management Center (SMC)capabilities
  • Plan and deploy the SMC
  • Configure and deploy a single firewall
  • Configure and deploy a firewall cluster
  • Configure policies for distributed firewall management
  • Configure security policies and access control
  • Configure and utilize multiple internet connections
  • Define Policy-based and Route-based VPNs
  • Manage users and authentication
  • Create a Mobile VPN
  • Monitor user and endpoint activity
  • Perform traffic inspection and malware detection
  • Create custom network applications
  • Configure TLS decryption
  • Integrate the NGFW with Forcepoint cloud solutions

outline

SESSION 1

Module 1: System Architecture Overview

  • Articulate the NGFW System Architecture
  • Understand how to size a firewall and management environment
  • Understand Management and Log Server high availability
  • Become familiar with upgrading Management Server, Log Server, and engines
  • Articulate the Forcepoint NGFW license model

Module 2: Firewall/VPN Role and Single Firewall Deployment

  • Describe basic network defence strategies
  • Define the capabilities and key features of the NGFW
  • Understand and learn the process of defining and deploy a single firewall•Identify additional features of the NGFW

Module 3: Routing and Anti-spoofing

  • Configure static routing
  • Describe additional special routing capabilities of the NGFW
  • Configure Policy-Based routing•Summarize the origin and function of Anti-spoofing

Module 4: NGFW Policies

  • Describe different NGFW policy types
  • Define NGFW policy templates and policy structure
  • Identify the anatomy of a security policy and the objects used in policies
  • Employ NGFW interface options•Detail the process of policy installation and activation

SESSION 2

Module 5: Distributed System Configuration

  • Describe system communication in a distributed firewall environment
  • Identify locations and contact addresses in distributed systems
  • Describe system communication between management and engines
  • Configure Network Address Translation (NAT)
  • Analyze the of exchanging data between management and other security devices

Module 6: Firewall/VPN Role and Clustering Technology

  • Describe the firewall clustering architecture and theory
  • Configure a firewall cluster in the SMC (management)
  • Deploy a firewall appliance (physical and virtual)

Module 7: MSSP and Virtual Contexts

  • Describe the SMC Domain Architecture
  • Detail the function of the Web Portal Server
  • Define Virtual Contexts
  • Relate Master Engines and Virtual Engines
  • Relate clustering and performance
  • Review a configuration and deployment example of an MSSP architecture

SESSION 3

Module 8: Outbound Multi-Link Technology

  • Describe Outbound Traffic Management and its capabilities
  • Explain ISP link selection•Classify when to use a particular link selection method
  • Configure Outbound Multi-Link

Module 9: Site-to-Site VPNs

  • Define Forcepoint NGFW VPN capabilities
  • Define Forcepoint NGFW VPN terminology
  • Identify supported VPN topologies•Relate Multi-Link and VPNs
  • Configure a Policy-Based VPN
  • Investigate Route-Based VPNs and when to use them
  • Test VPN-related tools in the SMC
  • Design VPN Hub configuration

Module 10: Active Directory Integration

  • Define network user management
  • Integrate Active Directory with the SMC (management)
  • Categorize the role of NPS, RADIUS, and TACAC+ in the authentication process
  • Deploy Forcepoint User Identification
  • Configure and deploy the Endpoint Context Agent
  • Monitor network users

Module 11: VPN Client

  • Describe Mobile VPN connections
  • Distinguish IPSec and SSL VPN tunnelling
  • Configure an NGFW engine for Mobile VPN connections
  • Configure the VPN Client for an endpoint
  • Demonstrate tools for Mobile VPN troubleshooting

SESSION 4

Module 12: Traffic Inspection

  • Review connection control and the role of Deep Inspection
  • Differentiate between Services, Protocol Agents, and Proxy Modules
  • Configure a Sidewinder Proxy service
  • Establish Network Application Identification
  • Differentiate Network Applications and Client Applications

Module 13: Inspection Policies

  • Relate firewall and inspection policies
  • Illustrate the anatomy of Inspection Policies
  • Differentiate the predefined Inspection Policy templates
  • Define the concept of Situations•Define the function of the Inspection Rules tree
  • Fine-tune inspection policies
  • Analyze the role and function of Inspection Exception rules
  • Analyze the use and function of Blacklisting

Module 14: Malware Detection and File Filtering

  • Explain theprocess of Malware Detection
  • Illustrate the anatomy of a File Filtering Policy
  • Define the process of using File Reputation services
  • Configure built-in Anti-Malware scanning
  • Describe the role of Advance Malware Detection

SESSION 5

Module 15: NGFW Inspection Techniques

  • Define techniques used by the NGFW to identify threats
  • Detail the traffic inspection process
  • Explain the role of Advanced Evasion Techniques and the process of traffic normalization
  • Describe misuse detection with Fingerprints
  • Describe concept of Situations and their role in traffic inspection
  • Analyze Regular Expression syntax
  • Review examples of fingerprints

Module 16: TLS Inspection

  • Articulate the purpose of TLS inspection
  • Describe TLS inspection exceptions
  • Define the process of Server and Client-Side TLS inspection
  • Configure the TLS inspection

Module 17: NGFW in Layer 2 Roles and Multi-Layer Deployment

  • Identify NGFW Operating Roles
  • Define key features of the IPS and Layer 2 firewall roles
  • Understand the difference between the Firewall and IPS
  • Deploy an IPS and a Layer 2 firewall•Configure and deploy a multi-layer NGFW
  • Analyze the role of High Availability in multi-layer deployments

Module 18: Forcepoint Integration

  • Configure integration with Forcepoint Web Gateway
  • Detail how to integrate with Forcepoint Advanced Malware Detection
  • Describe Forcepoint CASB•Review the Malware Detection process
  • Understand information exchange using Syslog or other SIEM solutions

Module 19: Troubleshooting

  • Detail the NGFW packet inspection process
  • Review the troubleshooting process and learn troubleshooting tips
  • Define the role of sgInfo in troubleshooting
  • Explore how to troubleshooting with logs
  • Understand how to troubleshoot a VPN
  • Analyze the role of monitoring in troubleshooting
  • Troubleshoot the NGFW engine

target_au
  • End-User/Customers: System Administrators, Network Security Administrators, Network Engineers, IT staff
  • Channel Partners: Consultants, System Architects, Integrators and Planners who help customers with Forcepoint NGFW implementations

pre_req
  • Completion of the Forcepoint NGFW Administrator Course and certification.
  • General understanding of routing and firewall functionality

titleForcepoint Insider Threat System Engineer Course
days5
seo_titleForcepoint Insider Threat System Engineer Course Training
seo_decIn the Forcepoint Insider Threat System Engineer course, you will gain an understanding of the key core competencies and skills needed to practice as a SE.
seo_tkey
categorysystem-engineer
vendorForcepoint

techonogyIT Systems and Security
overviewIn the Forcepoint Insider Threat System Engineer 5 days course, students will gain an understanding of the key core competencies and skills needed to practice as a System Engineer handling Forcepoint Insider Threat. The core competencies are design, deployment, integration, maintenance, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Insider Threat from concept creation to production.
objective
  • Understand key deployment types.
  • Learn about sizing and performance considerations.
  • Understand how Insider Threat integrates with other Forcepoint products and third-party products.
  • Perform common maintenance activities to keep system performance high in fast-evolving real-world environments.
  • Troubleshoot and debug each major component.

outline

Day 1&2–Design and Deployment

1. Components and communication

  • Describe the responsibilities of each component
  • Understand protocols and ports used for communication between components

2. Planning

  • Identify and confirm key System Requirements
  • Provide sizing guidelines based on number of agents and policy weight
  • Accommodate for growth and redundancy specifications

3. Installation

  • Perform demos, POCs, and simple deployments
  • Perform intermediate appliance-based deployments
  • Perform advanced clustered deployments for large enterprises

4. Initial configuration

  • Complete global setup checklist
  • Complete Administration Workbench agent setup checklist
  • Complete Policy Workbench checklist

5. Phased rollout deployments

  • Implement best practices for initial rollout
  • Configure and Install Windows Agent
  • Configure and Install Mac OS X Agent

6. Tuning

  • Create, test, and tune advanced level policies to address a variety of customer’s insider threat concerns

7. Advanced Agent deployment

  • Complete roll out using remote Agent deployment solutions

8. Backup and Disaster Recovery

  • Set up backups and confirm them with a test recovery

9. Monitoring

  • Track deployed Agents using Administration Workbench
  • Run and review reports to preempt potential performance issues

Day 3–Integrations

1. Perform AP-DATA integration

  • Test and tune AP-DATA triggered policies

2. Set up group mapping via LDAP integration

3. Understand the capabilities of Convergence and Spotlight APIs

Day 4–Upgrades and Hotfixes

1. Server upgrades

  • Prepare deployment and database for hotfix
  • Install Hotfix
  • Reinitialize database and test deployment

2. Agent Bundle upgrades and compatibility packs

  • Upgrade using agent commands
  • Upgrade using remote install utility

3. Verification

  • Confirm HF and Agent Bundles perform as expected

Day 5–Troubleshooting and Debugging

1. Troubleshooting methodology

  • Correctly identify the root cause
  • Apply and confirm a solution

2. Perform critical server diagnostics

  • Enable and review verbose logging
  • Access appliance using debug account

3. Database diagnostics and maintenance

  • Administer Oracle databases using sqlplus
  • Manage database using Oracle Enterprise Manager (OEM)

4. Agent monitoring and troubleshooting

  • Run Agent Tool diagnostics locally and remotely
  • Use Agent Tool to test for configuration issues
  • Manage Agents remotely
  • Enable and view verbose logging

 


target_au
  • Channel Partners: Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support
  • Forcepoint: Sales Engineers, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint Insider ThreatAdministrator Course(Previously “SVIT Administrator”)
  • Basic understanding of computer systems and networking

titleForcepoint Email Security System Engineer Course
days5
seo_titleForcepoint Email Security System Engineer Course Training
seo_decThe Forcepoint Email Security System Engineer course prepares engineers to manage SE development of Forcepoint Email Security.
seo_tkey
categoryemail-security
vendorForcepoint

techonogySecurity
overviewDuring the Forcepoint Email Security System Engineer hands-on instructor-led course, you will gain an understanding of the key core competencies and skills needed to practice as a System Engineer handling Forcepoint Email Security. The core competencies are deploymentplanning, installation, upgrading and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint Email Security from concept creation to production.
objective
  • Propose an Email Security deployment solution by identifying the most suitable platform, components and configurations for a given set of requirements.
  • Successfully plan and execute an Email Security on-premises installation.
  • Identify and mitigate common environmental factors within a deployment that can affect filtering efficacy.
  • Planand execute an Email Security upgrade using the Migration Tool.
  • Perform troubleshooting steps and debugging to resolve common deployment issues.

outline

SESSION 1 –DEPLOYMENT OVERVIEW AND INSTALLATION

Module1: Email Security Components

  • Required components
  • Optional components
  • Appliance offerings

Module2: Deployment Platforms

  • On-premises platform
  • Hybrid platform
  • Email Security in the Azure platform

Module3: Appliance Management Interfaces

  • Command Line Interface (CLI)
  • Forcepoint Security Appliance Manager (FSAM)

Module4: Deployment Use Cases

  • Small and middle business
  • Large and enterprise business

Module5: Installation planning

  • Requirements
  • Pre-installation considerations

Module6: Email Security on-premises Installation

  • Virtual Appliance on-premises deployment
  • Installing Forcepoint Security Manager and Log Server

Module7: Email Security in Azure

  • Deployment process

SESSION 2 -ARCHITECTURE AND ENVIRONMENT

Module8: Clustering

  • Benefits of a configuration cluster
  • Clustering with Hybrid and Data Security
  • Clustering with PEMModule9: Load Distribution
  • Third-Party Load Balancer
  • Load balancing with DNS

Module10: Upstream MTA

  • Simultaneous Connections
  • True Source IP Detection

Module 11: Address rewriting

  • Rewrite the envelope sender address
  • Rewrite the display sender address

Module12: DKIM Signing

  • DKIM process
  • Configuring DMARK in Forcepoint Security Manager

SESSION 3 –UPGRADINGEMAIL SECURITY

Module13: Plan the upgrade

  • Review the documentation
  • Component upgrade order

Module14: Perform the upgrade

  • 8.3 Appliance architecture changes
  • Migration Tool
  • Migration Process
  • Virtual Appliance Hotfix
  • Forcepoint Security Manager upgrade 8.2 –8.5.0
  • Migrate and upgrade Appliance

SESSION 4 –TROUBLESHOOTINGOVERVIEW

Module15: Troubleshooting & debug overview

  • Troubleshooting tools Real-time monitor Forcepoint Security Manager logo Counters Command Line Troubleshooting
  • Backend files and processes log on with root access to Email Security appliance backed files and processes debugging
  • CLI debug command debugging Forcepoint Modules using the CLIoDebugging Postfix modules (requires root access)

Module16: Installation Errors

  • Email Log Server installation errors
  • Forcepoint Management Server installation errors
  • Appliance registration errors

Module17: Mailflow Issues

  • Delivery problems handling outbound/internal delivery problems handling inbound delivery problems
  • Spam detection error false negative / False possible receiving backscatter / Sending backscatter
  • Troubleshooting with “mail log”

SESSION 5 –TROUBLESHOOTINGCONTINUED

Module18: LogDatabase and Log Server Issues

  • Cannot see logs form TRION Manager
  • Log server failed to start
  • Log DB extract, transform, and load process wrong
  • Track on-box PostgreSQL
  • Debug log daemon

Module19: Quarantine Issues

  • Message queues•Cannot see quarantine email in Blocked Messages
  • Debug quarantine daemon

Module20: PEM Issues

  • End-user login fail
  • PEM portal load fail•End user cannot receive notification
  • End-user cannot release messages
  • PEM always permit/blocklist fails
  • Debug PEM

Module21: Email DLPIssues

  • Email DLP registration fail
  • Email DLP policy deployment fail
  • Email DLP policy does not work normally
  • Use multiple policy engines

Module22: Cluster Problems

  • Configuration and license synchronization
  • Heartbeat Request and response
  • A secondary node cannot be synchronized
  • Debug clusteringModule23: Hybrid Issues
  • Hybrid configuration file
  • Hybrid logs cannot be synchronized
  • Debug Hybrid

target_au
  • Consultants, system architects, integrators
  • Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Technical Support

pre_req
  • Completion of the Forcepoint Email Security Administrator Course and certification.
  • Intermediate knowledge of networking and computer security concepts.
  • A computer that meets the requirements noted at the end of this document.

titleForcepoint DLP System Engineer Course
days5
seo_titleForcepoint DLP System Engineer Course Training
seo_decThe Forcepoint DLP System Engineer course is a five-day instructor-led training, where you will create and test a Forcepoint DLP deployment.
seo_tkey
categorydlp-system
vendorForcepoint

techonogyIT Systems and Security
overviewThe Forcepoint DLP System Engineer course is a 5 days hands-on instructor-led training, where you will create and test a Forcepoint DLP deployment, perform an in-depth analysis of DLP component architecture, and integrate Forcepoint DLP with local and cloud-based products. In this course, you will also learn how to manage incident data through Security Manager as well as through SQL, and perform maintenance tasks, such as dealing with failovers, upgrades and troubleshooting of all of the above, including advanced debugging of DLP logs.
objective
  • Given a set of environmental, acceptable usage, and user requirements, deploy and configure Forcepoint DLP in various enterprise environments
  • Itemize and explain the processes involved in the interaction between DLP components
  • Explain the methodology used for evaluating necessary sizing of the DLP product
  • Perform advanced configuration of custom classifiers, predefined classifiers, rules and policies
  • Formulate policies leveraging predefined classifiers for regulatory compliance, the prevention of IP loss, and data theft
  • Build, configure, and deploy DLP Endpoint
  • Configure and enable cloud-based integrations with DLP, including online services and Forcepoint CASB
  • Explain the integration and function of DLP with RMS and file tagging software, such as Azure RMS and Boldon James
  • Demonstrate multiple methods for generating real-time incidents and discovery events
  • Indicate primary log files used to review component function, and itemize useful topics to debug
  • Troubleshoot functionality of all DLP system modules, including Linux based appliances
  • Compile and analyse incident data both in Forcepoint Security Manager and from SQL
  • Compare and configure incident workflows through Forcepoint Security Manager and email
  • Perform maintenance activities on Forcepoint DLP, including automated and manual upgrade, failover, backup, and restore

outline

MODULE 1: COMPONENTS AND INITIAL SETUP

  • Provide an organized list of available resources for support when working with Forcepoint DLP
  • Classify the basic methodologies for Forcepoint DLP deployment depending on the scale (Single Datacenter or Multiple Datacenter).
  • Identify software components (PEI, PE, Crawler, OCR, EP Servers, EP Agents) and hardware components used by Forcepoint DLP
  • Itemize and explain the software components and database locations used in Forcepoint Security Manager infrastructure
  • Install and configure Forcepoint Security Manager, Forcepoint DLP, Analytics Engine, Web Content Gateway, and Email Security Gateway

MODULE 2: DLP ARCHITECTURE

  • Diagram and explain the internal architecture used by Policy Engine, Data Batch Server, and Message Broker, as well as Security Manager and each DLP System Module (WCG, ESG, DSS Server, Protector)
  • Follow the flow of transaction processing during Policy Engine analysis
  • Document possible options for deployment patterns, including web and email traffic monitoring
  • Formulate sizing requirements for DLP Deployments, based on environment and user demands
  • Configure and demonstrate Policy Engine load balancing features
  • Generate artificial traffic using regression testing tools (PolicyEngineClient.exe, ContentExtractorClient.exe)

MODULE 3: INTEGRATIONS AND ADVANCED DEPLOYMENT

  • Explain basic configuration and troubleshooting for a DLP Protector, Mobile Agent, LDAP import and ResourceResolver
  • Identify upgrade requirements and procedures for upgrading a Protector or Mobile Agent
  • Identify basic requirements and functions when integrating DLP with Web Security, including DLP only Content Gateway
  • Analyze methods of integrating DLP with Email Security, including leveraging Email Security action plans in DLP and configuring Email Gateway for Office 365
  • Explain basic configuration and troubleshooting for the Analytics Engine•Identify the elements of the Incident Risk Ranking interface elements in Forcepoint Security manager, and explain their functions
  • Configure and test email encryption using Forcepoint Secure Messaging (Park and Pull)
  • Modify a Protector deployment to pair with a Web Content Gateway in ICAP mode
  • Install, configure, and test Squid on a Protector
  • Enable the Web Security Linking Service, Import URL Categories, and test Geolocation Lookup on Web DLP Policies
  • Configure an Email Encryption action plan and leverage it in a DLP Policy. Test functionality using a 3rd party MTA
  • Configure and perform remediation on incidents created by a DLP Policy that monitors and enforces against inbound mail.

MODULE 4: TROUBLESHOOTING AND DEBUGGING

  • Compare methodologies for diagnosing and resolving potential issues occurring in Forcepoint DLP
  • Discuss and analyzeDLP Troubleshooting use cases
  • Document log and debug topic structure used in Policy Engine debugging
  • Document log and debug topic structure used for DLP system modules (Security Manager, Protector, Content Gateways, Analytics Engine)
  • Enable debugging of Tomcat logs on Forcepoint Security Manager
  • Enable debugging of Policy Engine logs on an appliance (Email Security Gateway), and use debug information to track live transactions as they are submitted

MODULE 5: POLICIES, RULES, AND CLASSIFIERS

  • Define an Acceptable Use Policy as a preface to configuring Policies and Rules
  • Identify and define the three categories of DLP Policies
  • Analyze Boolean Logic as used in DLP Policies, and formulate examples, including an “off switch” argument
  • Explain how DLP interacts with Microsoft RMS using protected file classifiers
  • Analyze the uses of and compare the inherent accuracy of the different types of classifiers DLP uses (Key Phrases, Dictionaries, Regular Expressions, Scripts, File Properties, Machine Learning, Fingerprinting)
  • Document the syntax used, and analyze basic use cases for Regular Expression classifiers
  • Explain what the different components of Script (a.k.a. predefined) classifiers, and how Natural Language Processing functions
  • Analyze use cases involving configurable Script Classifiers, including the Email to Competitors classifier
  • Define exceptions to DLP policies using LDAP search expressions
  • Given an example of an Acceptable Use Policy, create a .bat file to automate regression testing using PolicyEngineClient
  • Explain, configure, and test the different components of the Customizable IDs Classifier
  • Perform stress testing on DLP Email policies using an SMTP “Black Hole”

MODULE 6: DISCOVERY AND CLOUD

  • Define the potential resources we can scan using Forcepoint DLP Discovery
  • Explain the methods used to assist Crawlers when dealing with very large discovery tasks•Manually administrate Discovery jobs using WorkSchedulerWebServiceClient
  • Explain configuration of Discovery tasks against cloud services (Sharepoint Online, Exchange Online, Office365, Box.com)
  • Differentiate between the three types of Remediation Scriptsand explain how to use Discovery Remediation Scripts using .bat files
  • Explain the basic functionality of Classifier Administration software (Boldon James) and how DLP integrates with those classifiers, including reading and writing document tags, as well as updates to the reporting interface.
  • Explain basic configuration for deploying a DLP Email Gateway in the cloud using Microsoft Azure•Explain basic configuration for integrating Forcepoint DLP with Forcepoint CASB, including adding ‘Cloud Services’ as destinations for DLP Policies
  • Configure and run a Network Discovery task using a Crawler, and configure load balancing for the Crawler
  • Manually delete a Discovery task using WorkSchedulerWebServiceClient
  • Configure and run a Database Discovery task against Oracle Enterprise
  • Create and run an Incident Management Remediation Script
  • Create a Policy Remediation Script, add it to an action plan, and test functionality
  • Create an Endpoint Remediation Script, add it to an action plan, and test functionality
  • Install a trial version of Boldon James Office Classifier, and experiment with DLP interaction using hierarchical content tags

MODULE 7: FINGERPRINTING, MACHINE LEARNING, AND OCR

  • Document and analyze the implications of the N-gram (5-word sliding window) fingerprinting algorithm
  • List and explain best practices when performing both file and database fingerprinting, including the use of validation scripts
  • Explain the functionality of Machine Learning versus Fingerprinting, and differentiate PreciseID from the Support Vector Machine (SVM) algorithm
  • Diagram and explain Work scheduler (Crawler) architecture, functionality, and debugging
  • Explain how Fingerprint tasks may be recorded and replayed for troubleshooting purposes
  • Document the architecture and explain the functionality of OCR
  • Analyze methods for troubleshooting OCR, including log file locations, best topics to debug, and manual testing using OCRClient
  • Create a File Fingerprint Classifier, configure it in a policy, and run multiple tests differentiated using an Ignored Section classifier
  • Perform Database Fingerprinting on an imported .csv file, configure the classifier in policy, and test functionality
  • Prepare training sets for a Machine Learning classifier, create the classifier and fine-tune accuracy, then evaluate success using an automated test script (.bat file with PolicyEngineClient)
  • Install a DSS Server with an OCR component, then test OCR using both external email traffic and manually generated traffic using OCRClient

MODULE 8: FORCEPOINT DLP ENDPOINT

  • Diagram and analyze endpoint server architecture
  • Diagram and analyze endpoint agent architecture, including log file locations and debugging
  • Explain and demonstrate Endpoint command line functionality (WDEUtil)
  • Document web browser integration using Browser Extensions, and explain troubleshooting methods with use cases
  • Differentiate between Unhooked and Trusted Endpoint applications
  • Explain how to use Tasklist from the command line to thoroughly Unhook and application and all related .dll files
  • Explain how serial numbers may be used to identify removable media for use in DLP Policies
  • Deploy Endpoints manually, using SCCM or GPO
  • Review installation procedure and explain how to configure and use DLP Endpoint on XenApp and XenDesktop
  • Build and install a DLP Endpoint package, then test Temporary Bypass function
  • Configure and deploy a custom message file for custom Endpoint alerts as part of an Endpoint package•Install an Endpoint in Stealth Mode•Debug an Endpoint agent and perform log analysis
  • Use Tasklist to completely unhook an application and all .dll files, then test to confirm the success
  • Create an Endpoint encryption action plan and test using emulated USB Removable Media, then attempt decryption using Forcepoint Decryption Utility

MODULE 9: INCIDENT MANAGEMENT, REPORTING, AND MAINTENANCE

  • Explain Syslog configuration and integration with a Syslog server (Splunk)
  • List the types of configurable DLP Alerts
  • Explain and demonstrate advanced functions of system health dashboard and system, traffic, and audit logs
  • Explain the functions of the User Risk Report
  • Demonstrate pulling various data points manually from SQL (when-data-security)
  • Explain and demonstrate what permissions can be limited for delegated admins and the effects in Forcepoint Security Manager
  • Perform each possible workflow in Incident Management•Configure and test the DLP Force Release feature
  • Configure and test Incident Notifications with Action Links (Email Based Incident Workflow)
  • Perform a manual incident dump from SQL using .bat files
  • Schedule and run a Backup task, while manually modifying the backup .vbs script, and performing a manual backup of the Fingerprint Repository
  • Configure and test DLP Alerts for various system health-related events

target_au
  • System Engineers, high-level System Administrators, and IT professionals assisting with DLP deployment, configuration, and administration
  • Consultants, system architects, integrators and planners who help customers with Forcepoint DLP implementations
  • Sales Engineers, Implementation Specialists, Deployment Specialists, Network Architects, Professional Services, Technical Support

pre_req
  • Completion of the Forcepoint DLP Administrator Course and certification.
  • Intermediate knowledge of networking and computer security concepts.
  • A computer that meets the requirements noted at the end of this document.

titleForcepoint CASB System Engineer
days3
seo_titleForcepoint CASB System Engineer Course Training
seo_decThe Forcepoint CASB System Engineer training course enables CASB administrators, network security administrators, IT staff and Forcepoint CASB operators.
seo_tkey
categorycloud-security
vendorForcepoint

techonogyIT Systems and Security
overviewThe Forcepoint CASB System Engineer training course focuses on enabling CASB administrators, network security administrators, IT staff and Forcepoint CASB operators, as well as consultants, system architects, integrators and planners who help customers with Forcepoint CASB implementations. Forcepoint CASB training is available in a two-tier learning path. The first course, Forcepoint CASB Administrator is focused on how to use and administer the Forcepoint CASB solution after implementation. The second course, Forcepoint CASB SE is focused on how to deploy, tune, and troubleshoot the Forcepoint CASB solution. The Forcepoint CASB Administrator and Forcepoint CASB SE training is available separately or can be taken at one time through the Forcepoint CASB Service Professional Bootcamp.   See other Forcepoint courses
objective

The Forcepoint CASB Administrator course provides in-depth instruction for students looking to learn the features, components, and key integrations that enable Forcepoint CASB capabilities. Students will develop skills in system architecture, Active Directory integration, cloud app discovery, managing assets, DLP integration, compliance and governance, forensic analysis, reporting, and health assessment and maintenance of the Forcepoint CASB system.


outline

During the three days, students will gain an understanding of the core competencies and skills needed to practice as a System Engineer handling Forcepoint CASB. The core competencies are sizing, deployment, product tuning, and troubleshooting. This course prepares engineers or other professionals who are about to manage or lead system engineering development of Forcepoint CASB from concept creation to production.


target_au
pre_req
titleForcepoint Web Security
days3
seo_titleForcepoint Web Security Course Training
seo_decIn the Forcepoint Web Security course you will gain an understanding of the key core competencies to manage Forcepoint Web Security.
seo_tkey
categoryweb-security
vendorForcepoint

techonogySecurity
overviewThe Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.
objective
  • Understand the Forcepoint Web Security components and architecture
  • Articulate common deployment topologies
  • Access anduse Security Manager, including other available user interfaces
  • Execute updates and upgrades on Forcepoint Web Security
  • Understand delegated administration
  • Comprehend and perform policy and filter basics
  • Create effective web policies
  • Understand exception management
  • Recognize different user management methods
  • Configure user identification and policy enforcement
  • Create notifications and alerts
  • Understand report types and utilization
  • Create various reports
  • Understand system health alerts and usage monitoring
  • Understand system disaster recovery procedures
  • Learn how to respond to incidents

outline

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security
  • Describe features, components, and key integrations that enable Web Security functionalities
  • Compare the advantages and disadvantages of various deployment methodologies
  • Articulate the licensing structure and how and when to enter the key within the Content Gateway
  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning
  • Identify standard and custom policies (and related filters) based on your organizations needs
  • Distinguish the key settingsin Security Manager
  • Compare user identification and proxy authentication
  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts
  • Explain the reporting flow
  • Describe the various reporting options to gain important insights about your environment
  • Identify suspicious network activity using threats dashboard
  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents
  • Compare and contrast the available update options
  • Distinguish the guidelines related to incident management and disaster recovery
  • Identify system health monitoring capabilities
  • Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery

target_au
  • System Administrators, Network Security Administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations

pre_req
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

titleForcepoint Email Security Administrator Course
days2
seo_titleForcepoint Email Security Administrator Course Training
seo_decDuring the Forcepoint Email Security Administrator course, you will develop skills in creating email policies and system architecture and maintenance.
seo_tkey
categorynetwork-security-courses
vendorForcepoint

techonogySecurity
overviewDuring the Forcepoint Email Security Administrator course, you will learn the features, components, and key integrations that enable Forcepoint Email Security functionalities; how to administer policies, handle incidents, upgrade, manage and assess the health of the Forcepoint Email Security system. You will develop skills in creating email policies, configure email encryption, incident management, reporting, and system architecture and maintenance.
objective
  • Describe the key capabilities of Forcepoint Email Security
  • Understand the required and add-on components of Forcepoint Email Security
  • Understand multiple deployment scenarios
  • Perform initial setup configurations
  • Configure connection level controls and message properties
  • Create policies to fulfill various organization needs
  • Understand the difference between various block/permit lists
  • Configure email DLP policies
  • Configure and customize PEM portal
  • Understand email encryption methods
  • Run and interpret reports and configure logs
  • Understand how to upgrade the system and disaster recovery procedures

outline

Topic 1: Features & Components

  • Forcepoint solution overview
    • Forcepoint solution introduction
  • Forcepoint Email Security features and new features
    • Key features
    • What’s new
  • Understanding the deployment
    • Forcepoint Email Security appliances
    • V-Series appliance interfaces
    • Network without Forcepoint Email Security
    • Network with Forcepoint Email Security
    • Required components
    • Internal daemons
    • Communications with external services
    • Supported V-Series and X-Series models and total resources
    • Hardware allocation
  • Getting started with Forcepoint Email Security
    • Fundamental email security concepts: protected domain and email relay
    • Setting up Forcepoint Email Security
  • Setting up users
    • Domain group
    • User directory
  • Defining email routing
    • Domain-based route
    • Directory-based route

Topic 2: Traffic & Policies

  • Traffic
    • Message processing flow
    • Setting connection properties (simultaneous connection per IP)
    • Configuring message properties (size, volume)
    • RBL & Reputation service
    • SMTP greeting delay
    • Recipient validation
    • DHA prevention
    • SPF check
    • SMTP authentication
    • Global IP block list
    • IP address group
    • Compare trusted IP group and Allow Access List
  • Quarantine system
    • Quarantine system overview
    • Queue monitor
    • Message queues
  • Policy
    • Policy flow
    • Policy type
    • Policy condition
    • Rules, filters, actions
    • Action options merge
    • Global IP and address permit list
    • Dynamic permit list
    • Built-in DLP
      • DLP integration
      • Registered with data security server

Topic 3: PEM & advanced configurations & Maintenance

  • Personal Email Manager (PEM)
    • PEM architecture
    • Enabling PEM
    • End user block/permit list
  • Threat Projection Cloud
    • Threat Protection Cloud introduction
    • Configure Threat Protection Cloud
  • Traffic shaping
    • 5 parameters
    • How traffic shaping works
  • Transfer Layer Security (TLS)
    • Enforced/Mandatory TLS vs opportunistic TLS
    • Enable enforced TLS for incoming/outgoing connections
    • Enforced TLS security level & encryption strength
    • CA issued or self-signed TLS certification process
    • Enable mandatory TLS
    • Enable opportunistic TLS
  • Secure Message Delivery
    • Secure Message Delivery scenario 1
    • Secure Message Delivery scenario 2
    • Enable Secure Message Delivery
    • Secure encryption queue
    • Secure Message Delivery end-user experiences
  • Maintenance
    • Reporting
      • Log and reporting system overview
      • Log Server and database deployment
      • Dashboard & alert & logs
      • Presentation reports
      • Real-time monitor
      • Log database partition & rollover & maintenance
    • System administration & maintenance
      • Manage appliances
      • Delegated administration
      • Backup and restore

target_au
  • End-User/Customers: System administrators, network security administrators, IT staff
  • Channel Partners: Sales Engineers, consultants, implementation specialists

pre_req

None


titleCourse MB-700T00-A: Microsoft Dynamics 365: Finance and Operations Apps Solution Architect
days3
seo_titleMB-700T00-A: Dynamics 365 Finance Operations Apps Solution Architect Course Training
seo_decThe Microsoft Dynamics 365 Finance & Operations Apps Solution Architect (MB-700T00-A) course is developed for aspiring solution architects.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Microsoft Dynamics 365: Finance and Operations Apps Solution Architect (MB-700T00-A) course is developed for those aspired to be and new to the solution architect role. This course provides technical information focusing on application architecture and technical skills to start their journey into this role. This course will not cover the industrial skills and delivery skills required for this role.   See other Microsoft courses
objective

After completing the MB-700T00-A course, students will be able to:

  • Define skill areas for the solution architect role
  • Explain instances & deployment models recommendations by Microsoft
  • Understand cloud solution, CDM & CDS
  • Get more info on Licensing, AppSource & Support for Dynamics 365
  • Use Lifecycle services as a solution architect
  • Know the considerations for blueprinting Dynamics 365 solution
  • Understand the concepts and tools used for data management
  • Explain the Integration options & Business events on solutions
  • Know the available options on solution localization, compliance & reporting
  • Have architectural conversations on extensibility, security, & performance
  • Know what is ALM application lifecycle management
  • Identify opportunities for automated testing and using RSAT

outline
  • Module 1: Introduction
  • Module 2: The Architect Role
  • Module 3: Environment, Instances & Deployment Models
  • Module 4: Cloud Solution, CDM & CDS
  • Module 5: Licensing, AppSource & Support
  • Module 6: Lifecycle services
  • Module 7: Blueprinting Dynamics 365 solutions
  • Module 8: Data Management
  • Module 9: Integration & Business events
  • Module 10: Localization, Compliance & Reporting
  • Module 11: Extensibility
  • Module 12: Security
  • Module 13: Performance
  • Module 14: Application Lifecycle Management
  • Module 15: Automated Testing & RSAT
  • Module 16: Additional Areas for Architects

target_au

The audience for this course should have previous experience with a functional or technical focus in Dynamics 365: Finance and Operations Applications. Primarily for those who are aspired to be and new to solution architect role.


pre_req

You must complete the solution architect learning path for solution architects.


titleCourse AZ-120T00-A: Planning and Administering Microsoft Azure for SAP Workloads
days4
seo_titleAZ-120T00-A Plan & Administer Azure for SAP Workloads Course Training
seo_decThe Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course how to leverage Azure resources that include deployment of VMs.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course teach IT Professionals experienced in SAP solutions how to leverage Azure resources that include deployment and configuration of virtual machines, virtual networks, storage accounts, and Azure AD that includes implementing and managing hybrid identities. Students of this course will learn through concepts, scenarios, procedures, and hands-on labs on how to best plan and implement migration and operation of an SAP solution on Azure. You will receive guidance on subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution.   See other Microsoft courses
objective

After completing the Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course, students will be able to:

  • Migrate and SAP HANA, S/4HANA, SAP NetWeaver to Azure
  • Leverage Azure Portal, Cloud Shell, Azure PowerShell, CLI, and Resource Manager
  • Use intersite connectivity features including VNet Peering and VNet-to-VNet connections
  • Work with Azure Active Directory (AAD) and Azure AD Connect

outline

Module 1: Introduction

  • Contains an overview of the SAP and Microsoft partnership.

Module 2: Foundations of SAP on Azure

  • Contains brief lessons on Azure compute, Azure storage, Azure networking, SAP HANA for Azure (Large Instances), identity services, governance and manageability, backup and data protection services, and migration services.

Module 3: SAP Certified Offerings on Azure

  • Contains lessons on general prerequisites (SAP support in public cloud environments), deployment options of Azure for SAP workloads, SAP product-specific support for Azure, operating System support of Azure for SAP workloads, storage support of Azure for SAP workloads, networking support for SAP, database support for SAP, high availability and disaster recovery support for SAP, and monitoring requirements for SAP.
  • Lab: Online Lab: Implementing Linux clustering on Azure VMs
  • Lab: Online Lab: Implementing Windows clustering on Azure VMs

Module 4: SAP on Azure Reference Architecture

  • Contains lessons on SAP NetWeaver with AnyDB, SAP S4 HANA, and SAP HANA on Azure (Large Instances) on Azure VMs.

Module 5: Planning for Implementing SAP Solutions on Azure

  • Contains lessons on Azure VM compute, network, and storage considerations. As well as Azure VM high availability and disaster recovery, Azure VM backup considerations, Azure VM monitoring considerations, Azure VM security considerations, and Azure VM authentication and access control considerations.

Module 6: Planning for Migrating SAP Workloads to Azure

  • Contains lessons on strategies for migrating SAP systems to Microsoft Azure and SAP a workload planning and deployment checklist.

Module 7: Implementing Azure VM-based SAP Solutions

  • Contains lessons on Azure VM deployment methodologies, single-instance implementations (2-tier or 3-tier), implementing HA SAP NetWeaver with AnyDB on Azure VMs, implementing HA SAP HANA on Azure VMs, configure the Azure Enhanced Monitoring Extension for SAP, and implementing AD and Azure AD-based authentication.

Module 8: Module 8-Deploying HANA Large Instances (HLI)

  • Contains a lesson on implementing HANA Large Instances (HLI).

Module 9: Migrating SAP Workloads to Azure

  • Contains lessons on migration options, DMO methodologies, cloud migration options, and Very Large Database Migration to Azure.
  • Lab: Online Lab-Implement SAP architecture on Azure VMs running Linux
  • Lab: Online Lab-Implement SAP architecture on Azure VMs running Windows

Module 10: Maintaining SAP on Azure

  • Contains lessons on, remote management, performing backups and restores, OS and workload updates, vertical and horizontal scaling, and Disaster Recovery (DR).

Module 11: Monitoring and Troubleshooting SAP on Azure

  • Contains lessons on monitoring Azure VMs, monitoring SAP HANA on Azure (Large Instances), and integrating SAP solutions with Microsoft cloud services.

target_au

The Planning and Administering Microsoft Azure for SAP Workloads (AZ-120T00-A) course are for Azure Administrators who migrate and manage SAP solutions on Azure. Azure Administrators manage the cloud services that span storage, networking and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle.

They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface.


pre_req
  • Administrators and architects of Azure solutions for SAP should possess solid knowledge of SAP Applications, SAP HANA, S/4HANA, SAP NetWeaver, SAP BW, OS  Servers for SAP Applications and Databases.
  • Prior to taking this course, it is recommended that students to have taken the Azure Administrator (AZ-103) or Azure Solutions Architect (AZ-300) training, as well as SAP HANA and Linux training.

titleCourse 55285A: Advanced Python
days2
seo_title55285A: Advanced Python Course Training
seo_decIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques.
seo_tkey
categoryprogramming
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Python (55285A) training course, students already familiar with Python programming will learn advanced Python techniques. This advanced Python course is taught using Python 3; however, differences between Python 2 and Python 3 are noted. For private Python classes, our instructor can focus specifically on Python 2 if desired.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Work with the Collections module.
  • Understand mapping and filtering and lambda functions.
  • Perform advanced sorting.
  • Work with regular expressions in Python.
  • Work with databases, CSV files, JSON, and XML.
  • Write object-oriented code in Python.
  • Test and debug your Python code

outline

Module 1: Advanced Python Concepts

In this lesson, you will learn about some Python functionality and techniques that are commonly used but require a solid foundation in Python to understand.

Lessons

  • Lambda Functions
  • Advanced List Comprehensions
  • Collections Module
  • Mapping and Filtering
  • Mutable and Immutable Built-in Objects
  • Sorting
  • Unpacking Sequences in Function Calls

Lab: Exercises in this Lesson

  • Rolling Five Dice
  • Creating a defaultdict
  • Creating an OrderedDict
  • Creating a Counter
  • Working with a deque
  • Converting list.sort() to sorted(iterable)
  • Converting a String to a DateTime.date Object

After completing this module, students will be able to:

  • Work with lambda functions.
  • Write more advanced list comprehensions.
  • Work with the collections module to create named tuples, defaultdicts, ordereddicts, counters, deque
  • Use mapping and filtering.
  • Sort sequences.
  • Unpack sequences in function calls.
  • Create modules and packages.

 

Module 2: Working with Data

Data is stored in many different places and in many different ways. There are Python modules for all of the most common ways.

Lessons

  • Relational Databases
  • CSV
  • Getting Data from the Web
  • JSON

Lab: Exercises in this Lesson

  • Querying an SQLite Database
  • Inserting File Data into a Database
  • Comparing Data in a CSV File
  • Requests and Beautiful Soup
  • Using JSON to Print Course Data

After completing this module, students will be able to:

  • Access and work with data stored in a relational database.
  • Access and work with data stored in a CSV file.
  • Get data from a web page.
  • Access and work with data stored as HTML and XML.
  • Access an API.
  • Access and work with data stored as JSON.

 

Module 3: Testing and Debugging

This module explains how to test and debug using Python.

Lessons

  • Testing for Performance
  • The unittest Module

Lab: Exercises in this Lesson

  • Fixing Functions

After completing this module, students will be able to:

  • Test performance with timers and using the time it module.
  • To write unit tests using the unittest module.

 

Module 4: Classes and Objects

An object is something that has attributes and/or behaviours, meaning it is certain ways and does certain things. In the real world, everything could be considered an object. Some objects are tangible, like rocks, trees, tennis racquets, and tennis players. And some objects are intangible, like words, colours, tennis swings, and tennis matches.

Lessons

  • Attributes
  • Behaviours
  • Classes vs. Objects
  • Attributes and Methods
  • Private Attributes
  • Properties
  • Documenting Classes
  • Inheritance
  • Static Methods
  • Class Attributes and Methods
  • Abstract Classes and Methods
  • Understanding Decorators

Lab: Exercises in this Lesson

  • Adding a roll() Method to Die
  • Properties
  • Documenting the Die Class
  • Extending to Die, Class
  • Extending the roll() Method

After completing this module, students will be able to:

  • Create classes and objects in Python.
  • Write instance methods, class methods, and static methods.
  • Define properties.
  • Create subclasses using inheritance.
  • Create abstract classes.
  • Appropriately document Python classes.
  • Understand how decorators work.

target_au
pre_req

Experience in the following is required for this Python class:

  • Basic Python programming experience. In particular, you should be very comfortable with:
    1. Working with strings.
    2. Working with lists, tuples and dictionaries.
    3. Loops and conditionals.
    4. Writing your own functions.

Experience in the following would be useful for this Python class:

  • Some exposure to HTML, XML, JSON, and SQL.

titleCourse 55278A: Advanced Microsoft Outlook 2019
days1
seo_title55278A: Advanced Microsoft Outlook 2019 Course Training
seo_decThe Advanced Microsoft Outlook 2019 (55278A) course teaches how to work with some of the more advanced features of Outlook.
seo_tkey
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewThe Advanced Microsoft Outlook 2019 (55278A) training course builds on basic skills in Outlook and teaches students to work with some of the more advanced features of Outlook.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tasks and notes.
  • Learn to work with signatures and themes.
  • Manage your inbox including filtering, creating search folders, and archiving.
  • Work with multiple accounts.

outline

Module 1: Working with Tasks and Notes

This module explains how to work with tasks and notes in Microsoft Outlook.

Lessons

  • Create a Task
  • Print a Task
  • Update a Task
  • Search for Tasks
  • Assign a Task
  • Reply to a Task Request
  • Track Tasks
  • Change Your Task View
  • Work with Notes
  • Lab: Work with Tasks
After completing this module, students will be able to:
  • Change your Task view.
  • Create a task.
  • Print a task.
  • Update a task.
  • Assign a task.
  • Search for tasks.
  • Reply to a task request.
  • Track tasks.
  • Work with notes.

 

Module 2: Using Signature and Themes

This module explains how to use signatures and themes.

Lessons

  • Create a Signature
  • Automatically Add a Signature to Messages
  • Modify a Signature
  • Format Outgoing Messages
  • Create and Apply a Theme
  • Lab: Adding a Theme and Signature to Your Messages
After completing this module, students will be able to:
  • Create a signature.
  • Learn how to automatically add the signature to email messages.
  • Modify a signature.
  • Create and apply a theme

 

Module 3: Managing Your Inbox

This module explains how to manage your inbox in Microsoft Outlook.

Lessons

  • Search for Messages
  • Create Search Folders
  • Sort Messages
  • Add New Local Folders
  • Move Messages between Folders
  • Group Your Mailbox Items
  • Filter Messages
  • Organize Messages
  • Create and Manage Rules
  • Manage Your Junk Email
  • Archive Your Messages
  • Create an Outlook Data File
  • Create a Quick-Step
  • Add Protection to Your Outgoing Messages
  • Create Auto-replies
  • Lab: Managing Your Inbox Exercises
  • Organizing Your Messages
  • Managing Your Mail by Creating a Quick-Step
After completing this module, students will be able to:
  • Search for messages.
  • Create search folders.
  • Group your mailbox items.
  • Filter messages.
  • Organize messages.
  • Manage your junk mail.
  • Archive your messages.
  • Create an Outlook data file.
  • Create a Quick Step to easily and quickly apply multiple actions to emails.
  • Add protection to outgoing emails.

 

Module 4: Working with Multiple Email Accounts

This module explains how to work with multiple email accounts in Microsoft Outlook.

Lessons

  • Setting Up Multiple Accounts in Outlook
  • Send Emails from Different Accounts
  • POP vs. IMAP Email Programs
  • Lab: Working with Multiple Email Accounts
After completing this module, students will be able to:
  • Set up multiple accounts in Outlook.
  • Send emails from different accounts.
  • Learn the differences between POP and IMAP email programs.

target_au

This course is intended for students who have basic skills with Microsoft Outlook 2019 who want to learn higher level skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Experience in the following is required for this Microsoft Outlook class:
  • Familiarity with Windows.
  • Introductory level knowledge of Outlook.

titleCourse 55274A: Advanced Microsoft Word 2019
days1
seo_title55274A: Advanced Microsoft Word 2019 Course Training
seo_decIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents and footnotes.
seo_tkey
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Advanced Microsoft Word 2019 (55274A) training class, students learn advanced techniques, such as working with tables of contents, footnotes, and endnotes, adding comments, tracking changes, comparing and combining documents, creating envelopes and labels, using Mail Merge, and protecting documents. This class is for Word 2019 on Windows.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Learn to work with tables of contents.
  • Learn to work with footnotes and endnotes.
  • Learn to insert bibliographies and indexes.
  • Learn to use comments.
  • Learn to use track changes including accepting and rejecting changes.
  • Learn to compare and combine documents.
  • Learn to use Mail Merge and create envelopes and labels.
  • Learn to protect documents.
  • Learn to use bookmarks, add watermarks, and customize the Ribbon.

outline

Module 1: Working with Long Documents

This module explains how to work with long documents in Microsoft Word.

Lessons

  • Adding a Table of Contents
  • Updating the Table of Contents
  • Deleting the Table of Contents
  • Footnotes and Endnotes
  • Inserting citations and a Bibliography
  • Adding an Index
  • Inserting a Table of Figures
  • Inserting and Updating a Table of Authorities
  • Creating an Outline
  • Lab: Working with Long Documents Exercises
  • Insert and Update a Table of Contents
  • Working with Footnotes
  • Insert Citations and a Bibliography
After completing this module, students will be able to:
  • Add a table of contents to a Microsoft Word document.
  • Update the table of contents.
  • Add footnotes to a Microsoft Word document.
  • Add endnotes to a Microsoft Word document.
  • Insert citations into a Microsoft Word document.
  • Insert a bibliography.
  • Update the bibliography.
  • Mark entries in a document.
  • Insert an index into a Microsoft Word document.
  • Create an outline in Word.

 

Module 2: Review and Collaborating on Documents

This module explains how to review and collaborate on Microsoft Word documents.

Lessons

  • Adding Comments
  • Tracking Changes
  • Viewing Changes, Additions, and Comments
  • Accepting and Rejecting Changes
  • Lab: Reviewing and Collaborating Exercises
  • Adding Comments to a Document
  • Tracking Changes
  • Viewing Markup
  • Accepting and Rejecting Changes
After completing this module, students will be able to:
  • Add and work with comments.
  • Track changes and set and change tracking options.
  • View changes, additions and comments.
  • Use the Reviewing pane.
  • Choose what changes to show.
  • Accept and reject changes.

 

Module 3: Comparing and Combining Documents

This module explains how to compare and combine documents in Microsoft Word.

Lessons

  • Comparing Documents
  • Combining Documents
  • Lab: Comparing and Combining Documents Exercises
  • Comparing Documents
  • Combining Documents
After completing this module, students will be able to:
  • Compare documents to find out what has changed between different versions of a document.
  • Combine documents to gather revisions made by various individuals into a single document.

 

Module 4: Managing Mailings

This module explains how to manage mailings in Microsoft Word.

Lessons

  • Creating Envelopes and Labels
  • Using Mail Merge
  • Lab: Managing Mailings Exercises
  • Printing an Envelope
  • Using Mail Merge
After completing this module, students will be able to:
  • Create and print envelopes in Microsoft Word.
  • Create and print labels in Microsoft Word.
  • Use Mail Merge to print or email form letters to multiple recipients.
  • Select mail Merge recipients from an existing list

 

Module 5: Protecting Documents

This module explains how to protect documents in Microsoft Word.

Lessons

  • Making Word Documents Read Only
  • Password Protect Word Documents
  • Removing Metadata from Files
  • Restrict Formatting and Editing
  • Lab: Protecting a Document
After completing this module, students will be able to:
  • Mark documents as final and makes them read-only.
  • Password protect Microsoft Word documents.
  • Restrict formatting options before sharing a document with others.
  • Restrict editing options before sharing a document with others

 

Module 6: Random Useful Items

This module goes over several random and useful features in Microsoft Word.

Lessons

  • Using Bookmarks
  • Adding Watermarks
  • Adding Titles to Sections
  • Inserting Built-in Fields
  • Using the Go To Feature
  • Using Macros
  • Copy Macros From Document to Document
  • Macro Security
  • Recording a Macro
  • Assigning Shortcut Keys
  • Customizing the Ribbon
  • Preparing a Document for Internationalization and Accessibility
  • Sharing
  • Lab: Random Useful Items Exercises
  • Using Bookmarks
  • Adding Custom Watermarks
  • Recording a Macro
  • Customizing the Ribbon
  • Using the Cloud
After completing this module, students will be able to:
  • Add bookmarks to a Microsoft Word document and to use them to jump around the document.
  • Add watermarks to a Microsoft Word document.
  • Add titles to sections.
  • Insert built-in fields.
  • Use the Go-To feature.
  • Customize the ribbon.
  • Prepare a document for internationalization and accessibility.
  • Learn how to use the Cloud.

target_au

This course is intended for students who have intermediate skills with Microsoft Word 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req

Intermediate-level experience in Microsoft Word.


titleCourse 55270A: Advanced Microsoft Excel 2019
days1
seo_title55270A: Advanced Microsoft Excel 2019 Course Training
seo_decIn this Advanced Microsoft Excel 2019 (55270A) training class you will gain skills to use pivot tables, audit and analyze worksheet data and manage macros.
seo_tkey
categoryoffice
vendorMicrosoft

techonogyInternet of Technology
overviewThis Advanced Microsoft Excel 2019 (55270A) training class is designed for students to gain the skills necessary to use pivot tables, audit and analyze worksheet data, utilize data tools, collaborate with others, and create and manage macros.   See other Microsoft courses
objective
After completing this course, students will be able to:
  • Create pivot tables and charts.
  • Learn to trace precedents and dependents.
  • Convert text and validate and consolidate data.
  • Collaborate with others by protecting worksheets and workbooks.
  • Create, use, edit, and manage macros.
  • Import and export data.

outline

Module 1: Using Pivot Tables

This module explains how to use pivot tables in Microsoft Excel.

Lessons

  • Creating Pivot Tables
  • More PivotTable Functionality
  • Inserting Slicers
  • Multi-Select Option in Slicers
  • PivotTable Enhancements
  • Working with Pivot Tables
  • Inserting Pivot Charts
  • More Pivot Table Functionality
  • Working with Pivot Tables
  • Lab: Working with Pivot Tables
After completing this module, students will be able to:
  • Use pivot tables to analyze data.
  • Edit pivot tables.
  • Format pivot tables.
  • Insert pivot charts.
  • Use Slicers.

 

Module 2: Auditing Worksheets

This module explains how to audit worksheets.

Lessons

  • Tracing Precedents
  • Tracing Dependents
  • Showing Formulas
  • Lab: Auditing Worksheets Exercises
  • Tracing Precedents
  • Tracing Dependents
After completing this module, students will be able to:
  • Audit formulas.
  • Trace precedents to determine which cells impact a specific cell.
  • Trace dependents to determine which cells are impacted by a specific cell.
  • Remove precedent and dependent arrows.
  • Show formulas.
  • Check for errors frequently found in formulas

 

Module 3: Data Tools

This module explains how to work with data tools.

Lessons

  • Converting Text to Columns
  • Linking to External Data
  • Controlling Calculation Options
  • Data Validation
  • Using Data Validation
  • Consolidating Data
  • Goal Seek
  • Using Goal Seek
  • Lab: Data Tools Exercises
  • Converting Text to Columns
  • Using Data Validation
  • Consolidating Data
  • Using Goal Seek
After completing this module, students will be able to:
  • Convert text to columns.
  • Use Data Validation to restrict the type of data that can be entered into a cell.
  • Consolidate data from a number of different ranges into one new range.
  • Use Goal Seek to figure out the value to input to obtain a specific result

 

Module 4: Working with Others

This module explains how to work with others in Microsoft Excel.

Lessons

  • Protecting Worksheets and Workbooks
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
  • Marking a Workbook as Final
  • Lab: Working with Others Exercises
  • Password Protecting a Workbook
  • Password Protecting a Worksheet
  • Password Protecting Ranges in a Worksheet
After completing this module, students will be able to:
  • Password protect a workbook.
  • Password protect a worksheet.
  • Password protect ranges in a worksheet.
  • Track changes.
  • Accept and reject changes.
  • List all changes on a new sheet

 

Module 5: Recording and Using Macros

This module explains how to record and use macros.

Lessons

  • Recording Macros
  • Recording a Macro
  • Running Macros
  • Editing Macros
  • Adding Macros to the Quick Access Toolbar
  • Adding a Macro to the Quick Access Toolbar
  • Lab: Recording and Using Macros Exercises
  • Recording a Macro
  • Adding a Macro to the Quick Access Toolbar
After completing this module, students will be able to:
  • Record macros.
  • Run macros.
  • Edit macros (kind of).
  • Add macros to the Quick Access Toolbar

 

Module 6: Random Useful Items

This module explains how to use sparklines and other useful random features.

Lessons

  • Sparklines
  • Inserting and Customizing Sparklines
  • Using Microsoft Translator
  • Preparing a Workbook for Internationalization and Accessibility
  • Importing and Exporting Files
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
  • Lab: Random Useful Items Exercises
  • Inserting and Customizing Sparklines
  • Importing Text Files
  • Copying Data from Excel to Word
  • Copying Charts from Excel to Word
After completing this module, students will be able to:
  • Insert sparklines into worksheets.
  • Customize sparklines by:
  • Change the type of sparkline.
  • Highlight key points.
  • Change colours.
  • Change the axis.
  • Prepare a workbook for internationalization, accessibility, and compatibility.
  • Import text files into Microsoft Excel.
  • Copy cells from a worksheet into Microsoft Word.
  • Copy and paste a chart into Microsoft Word.

 

Module 7: Cloud

This module explains how to save, share, and collaborate with others using the cloud.

Lessons

  • Using the Cloud.
  • Lab: Using the Cloud
After completing this module, students will be able to:
  • Use Excel in the Cloud.

target_au

Students who have intermediate skills with Microsoft Excel 2019 who want to learn more advanced skills or students who want to learn the topics covered in this course in the 2019 interface.


pre_req
Before attending this course, students must have:
  • Basic and Intermediate Excel experience.

titleCourse 40573G: Microsoft Cloud Workshop: Hybrid Identity
days1
seo_title40573G: Microsoft Cloud Workshop: Hybrid Identity Course Training
seo_decIn the Microsoft Cloud Workshop: Hybrid identity (40573G) workshop, you will learn to set up a hybrid identity solution that integrates with Azure.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud Workshop: Hybrid identity (40573G) workshop, you will learn to set up and configure a hybrid identity solution that integrates an existing on-premises identity solution with Azure. You will learn how to secure the virtual network by deploying a network virtual appliance and configure firewall rules and route tables. Additionally, you will set up access to the virtual network with a jump box and a site-to-site VPN connection.  
objective

At the end of this workshop, you will be better able:

  • Design virtual networks in Azure with multiple subnets to filter and control network traffic.
  • Create a virtual network and provision subnets.
  • Create route tables with required routes.
  • Build a management jump box.
  • Configure firewalls to control traffic flow.
  • Configure site-to-site connectivity.

outline

Module 1: Whiteboard Design Session – Hybrid identity

In this workshop, you will learn to set up and configure a hybrid identity solution that integrates an existing on-premises identity solution with Azure. You will learn how to secure the virtual network by deploying a network virtual appliance and configure firewall rules and route tables. Additionally, you will set up access to the virtual network with a jump box and a site-to-site VPN connection.

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

 

Module 2: Hands-On Lab – Hybrid identity

In this hands-on lab you will setup and configure a number of different hybrid identity scenarios. The scenarios involve an Active Directory single-domain forest named contoso.local, which in this lab environment, consists (for simplicity reasons) of a single domain controller named DC1 and a single domain member server named APP1. The intention is to explore Azure AD-related capabilities that allow you to integrate Active Directory with Azure Active Directory, optimize hybrid authentication and authorization, and provide secure access to on-premises resources from Internet for both organizational users and users who are members of partner organizations.

Lessons

  • Integrate an Active Directory forest with an Azure Active Directory tenant.
  • Manage Authentication, Authorization, and Access Control in Hybrid Scenarios.
  • Configure application access in hybrid scenarios.

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas. Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


pre_req

Workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop.


titleCourse 40565G: Microsoft Cloud Workshop: Modernizing Data Analytics with SQL Server 2019
days1
seo_titleModernizing Data Analytics with SQL Server 2019 Workshop Course Training
seo_decIn this Microsoft Data Analytics with SQL Server 2019 (Course 40565G) workshop, you will gain a better understanding of the features of SQL Server 2019.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud: Modernizing Data Analytics with SQL Server 2019 Workshop (Course 40565G), you will gain a better understanding of the features of SQL Server 2019 enables more Big Data and analytics capabilities through the use of Big Data Clusters, data virtualization and orchestration, query processing enhancements, and through better scalability through distributed storage and compute.   See other Microsoft courses
objective

At the end of this SQL Server Workshop, you will be better able:

  • Design a modernization plan for performing Big Data analytics using SQL Server 2019 capabilities
  • Build solutions for conducting advanced data analytics with scalable SQLServer2019 Big Data clustersSQL Server Workshop

outline

Module 1: Whiteboard Design Session – Modernizing Data Analytics with SQL Server 2019

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-On Lab – Modernizing Data Analytics with SQL Server 2019

Lessons

  • Using data virtualization
  • Using notebooks
  • Machine learning
  • Identify PII and GDPR-related compliance issues using Data Discovery & Classification in SSMS
  • Exploring intelligent query processing (QP) features
  • Monitoring the big data cluster

target_au

This SQL Server Workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this SQL Server Workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40564G: Microsoft Cloud Workshop: Securing the IoT End-to-End
days1
seo_titleSecuring the IoT End-to-End - Microsoft Cloud Workshop Course Training
seo_decIn this Microsoft Cloud Workshop: Securing the IoT End-to-End (Course 40564G) workshop, you will look at the process for designing a secure IoT solution.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Securing the IoT End-to-End (Course 40564G) workshop, you will look at the process for designing and implementing an oil and gas manufacturing IoT solution that is secured end-to-end following best practices. At the end of this workshop, you will be better able to architect a comprehensive and secure oil and gas manufacturing IoT solution.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Architect a comprehensive and secure oil and gas manufacturing IoT solution.

outline

Module 1: Whiteboard Design Session – Securing the IoT end to end

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Securing the IoT end to end

Lessons

  • Secure and configure IoT Hub and Device Provisioning Service
  • Enroll and provision IoT devices
  • Install and configure IoT Edge
  • Install Azure Security IoT Agent
  • Simulate IoT attacks
  • Configure security and alerts

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas. Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


pre_req
titleCourse 40563G: Microsoft Cloud Workshop: Real-time data with Azure Database for PostgreSQL Hyperscale
days1
seo_titleReal-time data with Azure Database for PostgreSQL Hyperscale Course Training
seo_decIn this workshop Real-time data with Azure Database for PostgreSQL Hyperscale, you will learn advanced features of the PostgreSQL PaaS service on Azure.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Microsoft Cloud Workshop: Real-time data with Azure Database for PostgreSQL Hyperscale (Course 40563G) workshop, you will learn how to use advanced features of the managed PostgreSQL PaaS service on Azure to make your database more scalable and able to handle the rapid ingest of streaming data while simultaneously generating and serving pre-aggregated data for reports. You will design a resilient stream processing pipeline to ingest, process, and save real-time data to Postgres. Next, you will learn how to explore and gain insights from flat files at scale, perform aggregates, and save valuable information to your database. Finally, you will create complex reports containing advanced visualizations, using a drag-and-drop interface, and use them to build a customizable dashboard that gets updated in real-time.   See other Microsoft courses
objective

At the end of this workshop, you will be better able to:

  • Implement a highly scalable, managed open source database solution.
  • Ensure that it can handle real-time, roll-up and serve data for advanced visualizations.

outline

Module 1: Whiteboard Design Session – Real-time data with Azure Database for PostgreSQL Hyperscale

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Real-time data with Azure Database for PostgreSQL Hyperscale

Lessons

  • Connect to and set up your database
  • Add secrets to Key Vault and configure Azure Databricks
  • Send clickstream data to Kafka and process it in real-time
  • Rollup real-time data in PostgreSQL
  • Create advanced visualizations in Power BI

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40561G: Microsoft Cloud Workshop: Machine Learning
days1
seo_titleMicrosoft Cloud Workshop: Machine Learning Course Training
seo_decIn this Microsoft Machine Learning Workshop, you will design and implement a solution that combines Azure Databricks with Azure Machine Learning.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Machine Learning (Course 40561G), you will work with a group to design and implement a solution that combines Azure Databricks with Azure Machine Learning service to build, train and deploy the machine learning and deep learning models. You will learn how to use automated machine learning, model lifecycle management from training to deployment, in batch and real-time inferencing scenarios, and construct deep learning models for Natural Language Processing (NLP) in text classification and forecasting against time-series data. Finally, you’ll learn to compare data with PyTorch and Keras for deep learning.   See other Microsoft courses
objective

After completing this course, students will understand:

  • The capabilities and implementation solutions of Azure Machine Learning and Azure Databricks.

outline

Module 1: Whiteboard Design Session – Machine Learning

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on lab – Machine Learning

Lessons

  • Creating a forecast model using automated machine learning
  • Understanding the automated ML generated forecast model using model explainability
  • Creating a deep learning model (RNN) for time series data and registering the model
  • Using a forecast model for scoring of streaming telemetry
  • Creating a deep learning text classification model

target_au

This Microsoft Machine Learning workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40560G: Microsoft Cloud Workshop: Predictive Maintenance for remote field devices
days1
seo_titlePredictive Maintenance for remote field devices - Microsoft Workshop Course Training
seo_decIn this Predictive Maintenance for remote field devices workshop, you will learn how to evaluate Microsoft's catalogue of PaaS and SaaS-based IoT products.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: Predictive Maintenance for remote field devices (Course 40560G), you will learn how to evaluate Microsoft's catalogue of PaaS and SaaS-based IoT products to determine the optimal combination of tools to fulfil Fabrikam's needs. You will design and implement a solution that simplifies IoT device management and reporting, providing Fabrikam with a faster path to realizing their IoT strategy without requiring a lot of custom development. Next, you will learn how to deploy a trained predictive maintenance Machine Learning model and design a stream processing pipeline that makes predictions with the model in near real-time. At the end of this pipeline is an alert that is sent to the oil pump maintenance team when a pump failure is imminent.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Design an IoT-based predictive maintenance solution in Azure.

outline

Module 1: Whiteboard Design Session – Predictive Maintenance for remote field devices

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on Lab – Predictive Maintenance for remote field devices

Lessons

  • Configuring IoT Central with devices and metadata
  • Run the Rod Pump Simulator
  • Creating a device set
  • Creating a useful dashboard
  • Create an Event Hub and continuously export data from IoT Central
  • Use Azure Databricks and Azure Machine Learning service to train and deploy a predictive model
  • Create an Azure Function to predict pump failure

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure. Workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop.


titleCourse 40559G: Microsoft Cloud Workshop: MLOps
days1
seo_titleMicrosoft Cloud Workshop: MLOps Course Training
seo_decIn this Microsoft Cloud Workshop: MLOps (Course 40559G) workshop, you will learn how Trey Research can leverage Deep Learning technologies.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop: MLOps (Course 40559G) workshop, you will learn how Trey Research can leverage Deep Learning technologies to scan through their vehicle specification documents to find compliance issues with new regulations and manage the classification through their web application. The entire process from model creation, application packaging, model deployment and application deployment needs to occur as one unified repeatable, pipeline. At the end of this workshop, you will be better able to design and implement end-to-end solutions that fully operationalize deep learning models, inclusive of all application components that depend on the model.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Design and implement end-to-end solutions that fully operationalize deep learning models.

outline

Module 1: Whiteboard Design Session – MLOps

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-on lab – MLOps

Lessons

  • Creating and evaluating compliance classification models
  • Registering the model
  • Setup New Project in Azure DevOps
  • Setup and Run the Build Pipeline
  • Setup the Release Pipeline
  • Test Build and Release Pipelines
  • Testing the deployed solution
  • Examining deployed model performance

target_au

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40526G: Microsoft Cloud Workshop: SAP HANA on Azure
days1
seo_titleSAP HANA on Azure - Microsoft Cloud Workshop Course Training
seo_decIn this Microsoft Cloud Workshop: SAP HANA on Azure (Course 40526G) training, you will learn how to provision a highly available deployment of SAP HANA.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop (Course 40526G): SAP HANA on Azure Training, you will learn how to provision a highly available deployment of SAP HANA in Azure. Throughout the whiteboard design session and the hands-on lab, you will look at the planning process for SAP HANA migration and deployment. You will identify and implement Azure infrastructure components necessary to support a clustered deployment of SAP HANA. You will also step through installing SAP HANA and configuring SAP HANA system replication. Finally, you will review and test different scenarios that involve manual and automatic failover between cluster nodes.   See other Microsoft courses  
objective

At the end of this SAP HANA on Azure training workshop, you will be able to better design and deploy SAP HANA on Azure. After its completion, you will be able to provision Azure infrastructure components necessary to support highly available SAP HANA deployments, configure Azure virtual machines to support highly available SAP HANA installations, implement SUSE Linux Enterprise clustering, install SAP HANA, configure SAP HANA system replication, and test high availability scenarios.


outline

Module 1: Whiteboard Design Session – SAP HANA on Azure

Lessons

  • Review the customer case study
  • Design a proof of concept solution
  • Present the solution

Module 2: Hands-On Lab – SAP HANA on Azure

Lessons

  • Provision Azure infrastructure
  • Configure operating system on Azure VMs running Linux
  • Configure clustering on Azure VMs running Linux
  • Install SAP HANA
  • Configure SAP HANA replication
  • Configure cluster framework
  • Test the deployment

target_au

This SAP HANA on Azure training workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas.


pre_req

Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure.


titleCourse 40519G: Microsoft Cloud Workshop: SAP NetWeaver on Azure
days1
seo_titleSAP NetWeaver on Azure Training - Microsoft Cloud Workshop Course Training
seo_decIn this Microsoft Cloud Workshop, you will learn to deploy and configure SAP on Azure infrastructure and SAP NetWeaver deployment running on Azure.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewIn this Microsoft Cloud Workshop (Course 40519G): SAP NetWeaver on Azure training, you will learn to deploy and configure SAP on Azure infrastructure and SAP NetWeaver deployment running on Azure infrastructure, including SAP NetWeaver ASCS and SAP NetWeaver database servers. Key takeaways are the Azure infrastructure solution components and the way they are put together to run SAP applications as well as the Solution architecture references.   See other Microsoft courses
objective

At the end of this SAP NetWeaver on Azure training workshop, you will be better able to design and deploy SAP running on Azure infrastructure as a service component and understand the proper configuration of SAP NetWeaver ASCS, database and application servers in Azure.


outline

Module 1: Whiteboard Design Session – SAP on AzureLessons

Review the customer case study
Call to action: Design a proof of concept solution
Call to action: Present the solution

Module 2: Hackathon – SAP on AzureLessons

Deploy the SAP on Azure infrastructure components
Configure the SAP NetWeaver ASCS servers (Part 1)
Configure SAP NetWeaver database servers
Configure SAP NetWeaver Application servers


target_au
pre_req

This SAP NetWeaver on Azure training workshop content presumes 300-level of architectural expertise of infrastructure and solutions design. We suggest students take this prerequisite prior to attending this workshop:


titleCourse 20345-2B: Designing and Deploying Microsoft Exchange Server 2016/2019
days5
seo_titleDesigning and Deploying Microsoft Exchange Server 2016/2019 Course Training
seo_decThis Designing and Deploying Microsoft Exchange Server 2016/2019 course provides the skills to implement an Exchange Server messaging environment.
seo_tkey
categoryexchange-server
vendorMicrosoft

techonogyInternet of Technology
overviewThis Designing and Deploying Microsoft Exchange Server 2016/2019 (20345-2B) course provides experienced Exchange Server administrators with the knowledge to design and implement an Exchange Server messaging environment. The course covers how to design and configure advanced components in an Exchange Server deployment such as site resiliency, advanced security, compliance, archiving and discovery solutions, coexistence with other Exchange organizations or Exchange Online, and migration from previous versions of Exchange server. The course also provides guidelines, best practices, and considerations that will help optimize Exchange Server deployments.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Plan for Exchange Server deployments.
  • Plan and deploy Exchange Server hardware, virtualization, mailbox databases, and public folders.
  • Plan message transport in Exchange Server.
  • Plan and deploy Client Access services in Exchange Server.
  • Design and implement a highly available Exchange Server environment.
  • Maintain Exchange Server by using Managed Availability and Desired State Configuration (DSC).
  • Plan for messaging security and design and implement Active Directory Rights Management Services (AD RMS) and Microsoft Azure RMS in Exchange Server.
  • Design and implement message retention and archiving.
  • Design and implement data loss prevention policies, In-Place Hold, and eDiscovery.
  • Design and implement messaging coexistence among Exchange Server organizations.
  • Plan and implement the upgrade from previous versions of Exchange Server to Exchange Server 2019.
  • Plan a hybrid Exchange deployment.

outline

Module 1: Planning Exchange Server deployments

This module explains the key features of Exchange Server and explains how to gather business requirements. It also explains how to plan for an Exchange Server deployment and the migration of Unified Messaging to Cloud Voicemail.

Lessons

  • New features in Exchange Server 2019
  • Gathering business requirements for an Exchange Server deployment
  • Planning for an Exchange Server deployment
  • Planning the migration of Unified Messaging to Cloud Voicemail

Lab: Planning Exchange Server 2019 deployments

  • Evaluating an existing messaging infrastructure
  • Identifying requirements
  • Discussion: Deployment design for Exchange Server 2019

After completing this module, students will be able to:

  • Describe the new features in Exchange Server 2019.
  • Describe how to gather business requirements for an Exchange Server deployment.
  • Plan an Exchange Server deployment.
  • Plan how to migrate Exchange Server 2016 Unified Messaging (UM) to Cloud Voicemail.

 

Module 2: Planning and deploying Exchange Server Mailbox services

This module explains how to plan and implement Exchange Server hardware, Exchange Server virtualization, Azure integration, and public folders.

Lessons

  • Planning Exchange Server hardware requirements
  • Planning Exchange Server for virtualization and Microsoft Azure integration
  • Planning and implementing public folders

Lab: Planning and implementing Exchange Server mailbox servers, databases, and public folders

  • Planning mailbox server configuration and location
  • Planning for mailbox databases
  • Implementing mailbox databases
  • Planning and implementing public folders

After completing this module, students will be able to:

  • Plan and implement Exchange Server hardware.
  • Plan for Exchange Server virtualization and Microsoft Azure integration.
  • Plan and implement public folders.

 

Module 3: Planning message transport

This module explains how to plan and implement mail routing internally as well as from and to the internet. This module also describes transport-related tasks in the organization.

Lessons

  • Designing message routing
  • Designing transport services
  • Designing the message-routing perimeter
  • Designing transport compliance

Lab: Planning message transport

  • Planning for a redundant and secure message transport
  • Planning for transport compliance
  • Implementing transport compliance

After completing this module, students will be able to:

  • Design message routing.
  • Design transport services.
  • Design external message routing.
  • Design and implement transport compliance.

 

Module 4: Planning and deploying client access

This module explains how to plan and implement Exchange Server clients, client access, Microsoft Office Online Server, and coexistence of Microsoft SharePoint with Exchange Server. It also explains the design and implementation of the external client access.

Lessons

  • Planning for Exchange Server clients
  • Planning for client access
  • Planning and implementing Office Online Server
  • Planning and implementing coexistence of SharePoint 2019 with Exchange Server 2019
  • Designing external client access

Lab: Planning and deploying client access solutions

  • Planning and configuring namespaces
  • Planning and configuring client access services options
  • Planning and deploying Office Online Server
  • Planning and implementing a reverse proxy

After completing this module, students will be able to:

  • Plan for Exchange Server clients.
  • Plan for client access.
  • Plan and implement Office Online Server.
  • Plan and implement SharePoint and with Exchange Server coexistence.
  • Design external client access.

 

Module 5: Designing and implementing high availability

This module explains how to plan and implement high availability for Exchange Server. It also explains how to plan for load balancing. Finally, it explains how to plan and implement site resilience.

Lessons

  • Planning high availability for Exchange Server
  • Planning for load balancing
  • Planning for site resilience

Lab: Designing and implementing high availability

  • Planning high availability and site resilience
  • Creating a site-resilient DAG
  • Validating site resilience
  • Creating a lagged database copy
  • Recovering data from a lagged database copy

After completing this module, students will be able to:

  • Plan high availability for an Exchange Server.
  • Plan for load balancing in an Exchange Server deployment.
  • Plan for site resilience in an Exchange Server deployment.

 

Module 6: Maintaining Exchange Server

This module explains how to maintain Exchange Server by using Managed Availability and DSC.

Lessons

  • Using Managed Availability to improve high availability
  • Implementing DSC

Lab: Maintaining Exchange Server

  • Using Windows PowerShell to investigate and configure Managed Availability
  • Implementing DSC

After completing this module, students will be able to:

  • Use Managed Availability to improve high availability.
  • Implement DSC.

 

Module 7: Designing messaging security

This module explains how to plan for messaging security, and how to design and implement AD RMS and Azure RMS in an Exchange Server organization.

Lessons

  • Planning messaging security
  • Designing and implementing AD RMS and Azure RMS

Lab: Designing messaging security

  • Planning messaging security
  • Implementing AD RMS
  • Integrating AD RMS with Exchange Server
  • Creating a message transport rule to protect email

After completing this module, students will be able to:

  • Plan messaging security.
  • Design and implement AD RMS and Azure RMS.

 

Module 8: Designing and implementing message retention and archiving

This module explains the purpose of archiving and messaging records management. It also explains how to design and implement In-Place archiving and message retention.

Lessons

  • Overview of archiving and messaging records management
  • Designing In-Place Archiving
  • Designing and implementing message retention

Lab: Designing and implementing message retention and archiving

  • Designing message retention and archiving
  • Implementing message retention and archiving

After completing this module, students will be able to:

  • Explain the purpose of archiving and messaging records management.
  • Design and implement In-Place archiving.
  • Design and implement message retention.

 

Module 9: Designing and implementing messaging compliance

This module explains how to design and implement data loss prevention policies, In-Place Hold, and In-Place eDiscovery.

Lessons

  • Designing and implementing data loss prevention policies
  • Designing and implementing In-Place Hold
  • Designing and implementing In-Place eDiscovery

Lab: Designing and implementing messaging compliance

  • Designing messaging compliance
  • Implementing data loss prevention
  • Implementing In-Place eDiscovery
  • Comparing messaging policy and compliance options

After completing this module, students will be able to:

  • Design and implement data loss prevention.
  • Design and implement In-Place Hold.
  • Design and implement In-Place eDiscovery.

 

Module 10: Designing and implementing messaging coexistence

This module explains how to design and implement federation. It also explains how to design coexistence between Exchange Server organizations. Finally, it explains how to design and implement cross-forest mailbox moves.

Lessons

  • Designing and implementing federation
  • Designing coexistence between Exchange organizations
  • Designing and implementing cross-forest mailbox moves

Lab: Implementing messaging coexistence

  • Implementing message-routing coexistence
  • Migrating user mailboxes

After completing this module, students will be able to:

  • Design and implement federation.
  • Design the coexistence between Exchange Server organizations.
  • Design and implement cross-forest mailbox moves.

 

Module 11: Upgrading to Exchange Server 2019

This module provides an overview of the options you have when choosing to implement Exchange Server 2019, and provides details on how to upgrade an existing Exchange Server 2013 or Exchange Server 2016 organization to Exchange Server 2019.

Lessons

  • Planning an upgrade from previous Exchange Server versions
  • Implementing the upgrade from previous Exchange Server versions

Lab: Upgrading from Exchange Server 2013 to Exchange Server 2019

  • Documenting the Exchange Server 2013 organization
  • Deploying Exchange Server 2019
  • Upgrading from Exchange Server 2013 to Exchange Server 2019
  • Removing Exchange Server 2013

After completing this module, students will be able to:

  • Plan an upgrade to Exchange Server 2019.
  • Implement the upgrade to Exchange Server 2019.

 

Module 12: Planning a hybrid Exchange Server deployment

This module explains the basics of a hybrid deployment and how to plan for authentication in a hybrid deployment. It also explains how to implement the Microsoft Azure Active Directory (Azure AD) Connect, a hybrid development, and advanced functionality for hybrid deployments.

Lessons

  • Basics of a hybrid deployment
  • Planning and implementing a hybrid deployment
  • Implementing Azure AD Connect
  • Implementing a hybrid deployment
  • Implementing advanced functionality for hybrid deployments

Lab: Planning a hybrid Exchange deployment

  • Creating a plan for hybrid Exchange deployment

After completing this module, students will be able to:

  • Explain the basics of a hybrid deployment.
  • Plan for authentication in a hybrid environment.
  • Implement Azure AD Connect.
  • Implement a hybrid deployment.
  • Implement advanced functionality for hybrid deployments.

target_au

The audience for this course includes IT professionals who are experienced messaging administrators, messaging architects, or consultants. This course is designed for people in an enterprise environment who are responsible for designing and deploying Exchange Server solutions, including environments that contain previous versions of Exchange Server or Exchange Online.


pre_req
Students taking this course are expected to have experience with Exchange Server 2019 or previous versions of Exchange Server.
In addition to their professional experience, students who attend this Designing and Deploying Microsoft Exchange Server 2016/2019 training should already have the following technical knowledge:
  • Attended course 20345-1B: Administering Microsoft Exchange Server 2016/2019 or have equivalent knowledge
  • Minimum of two years of experience working with any version of Exchange Server
  • Minimum of six months of experience working with Exchange Server 2013 or Exchange Server 2016
  • Minimum of two years of experience administering the Windows Server operating system, including Windows Server 2016 or Windows Server 2019
  • Minimum of two years of experience working with Active Directory Domain Services (AD DS)
  • Minimum of two years of experience working with name resolution, including Domain Name System (DNS)
  • Experience working with certificates, including public key infrastructure (PKI) certificates
  • Experience working with Windows PowerShell

titleCourse WS-050T00-A: Migrating Application Workloads to Azure
days2
seo_titleMigrating Application Workloads to Azure Course Training
seo_decThe Migrating Application Workloads to Azure workshop teaches you how to migrate existing on-premises workloads and assets to the cloud.
seo_tkey
categoryazure
vendorMicrosoft

techonogyInternet of Technology
overviewThe Migrating Application Workloads to Azure workshop teaches IT Professionals how to migrate existing on-premises workloads and assets to the cloud, specifically to the Microsoft Azure platform. Students learn how to assess and evaluate an existing on-premises environment in preparation for cloud migration. Students also learn how to monitor and optimize their Azure-based workloads to maximize return on investment (ROI), and use Azure services to protect and manage your virtual machines, applications, and data.   See other Microsoft courses
objective

After completing this course, students will be able to:

  • Identify the tools and services specific to each phase of the migration.
  • Identify the tools and services specific to each phase of the migration
  • Discover and assess on-premises workloads for migration to Azure
  • Obtain deeper profiling of an environment using app dependency mapping and assessment customizations
  • Perform an end-to-end migration of on-premises workloads to Azure using Azure Migrate
  • Replicate data from an on-premises datacenter to Azure or to a secondary site
  • Migrate data from existing data sources to Azure data platforms using the Database Migration Service
  • Secure and manage migrated workloads using Azure Security Center, Azure Backup, and Log Analytics
  • Ensure an effective business continuity strategy that includes high availability, disaster recovery
  • Back up and protect Azure IaaS virtual machines from any location using the Azure Backup Service
  • Define a recovery plan to ensure virtual machines failover properly before running a full failover

outline

Module 1: Planning and Assessing and Azure Migration
In this module, you’ll learn about the key business and technical drivers leading to cloud migration, the phases of an Azure migration and tools and services used for each phase. You will learn how to discover and assess your on-premises environments in preparation to migrate the appropriate workloads to Azure.

Lessons

  • Cloud Migration – Business Motivations, Goals and Outcomes
  • Discovery and Assessment

Lab: Discover and Assess On-Premises Resources for Migration

 

Module 2: Introduction to Data Migration

In this module, you’ll learn about solutions you can use when you need to securely send terabytes of data to Azure. You will learn about the Azure Data Box family of products with both online and offline transfer options. You will then learn about migrating an on-premises SQL Server 2008R2 database to Azure SQL Database Managed Instance (MI), using the Azure Database Migration Service (DMS).

Lessons

  • Azure Data Box
  • Database Migration

Lab: Migrate On-Premises SQL Server Database to Azure SQL Managed Instance

 

Module 3: Implementing Migration using Azure Migrate Services

In this module, you’ll learn how to prepare the on-premises infrastructure and the Azure components ahead of the planned migration. You’ll also learn how to perform and end to end migration using Azure Migrate Services.

Lessons

  • Overview of Azure Migrate Server Migration
  • VMware – Agentless Migration
  • VMware – Agent-based Migration
  • Securing Migrated Workloads
  • Datacenter Migration using Microsoft Migration Factory

Lab: Replicate Virtual Machines to Azure

 

Module 4: Backup and Disaster Recovery in Azure

In this module, you’ll learn about the key components of a business continuity strategy and what is required for a highly available solution. You will also learn how to implement Azure IaaS virtual machine back up using the Azure Backup service. Additionally, you will learn how to replicate Azure VMs to any other Azure location using Azure Site Recovery.

Lessons

  • Azure Backup Overview
  • Implementing Azure IaaS Backup
  • Azure to Azure Site Recovery
  • Application Disaster Recovery

target_au

This workshop is for IT Administrators and staff who need to plan, implement and manage migrations of on-premises resources to Azure, or to replicate Azure virtual machines to other Azure locations. They take business requests from workload owners to migrate workloads to the cloud in order to take advantage of the benefits that a cloud-enabled strategy provides over a traditional datacenter approach. This role requires communicating and coordinating with different individuals within an organization’s IT department and business groups, as well as vendors.


pre_req
  • IT Administrators start this role with experience in operating systems, virtualization, cloud infrastructure, storage structures, and networking. In addition, IT administrators should have experience or equivalent knowledge in administering an IaaS Azure infrastructure.
  • Understanding of on-premises virtualization technologies, including VMs, virtual networking, and virtual hard disks.
  • Understanding of network configuration, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies.
  • Understanding of Active Directory concepts, including domains, forests, domain controllers, replication, Kerberos protocol, and Lightweight Directory Access Protocol (LDAP).
  • Understanding of resilience and disaster recovery, including backup and restore operations.
  • Familiarity with using Azure, including the Azure portal, Cloud Shell, Azure PowerShell, CLI and ARM template.
  • Understanding of Azure Active Directory and cloud identity management.
  • Understanding of management of subscriptions, users, groups, and billing, and Azure policies.

titleMS-700T00-A: Managing Microsoft Teams
days5
seo_titleManaging Microsoft Teams - Microsoft 365 Course Training
seo_decThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThe Managing Microsoft Teams (Course MS-700T00-A) course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. Microsoft Teams admins configure, deploy, and manage Office 365 workloads for Microsoft Teams that focus on efficient and effective collaboration and communication in an enterprise environment. This course covers six central elements - Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the environment for a Microsoft Teams deployment, deploying and managing teams, managing collaboration and managing communication in Microsoft Teams.
objective

By actively participating in this course, you will learn about the following:

  • What is Microsoft Teams and how the components work together
  • How to implement Governance, Security and Compliance for Microsoft Teams
  • How to prepare an organizations environment for a Microsoft Teams deployment
  • How to deploy and manage teams
  • Ways of managing collaboration in Microsoft Teams
  • Techniques to manage and troubleshoot communication in Microsoft Teams

outline

Module 1: Microsoft Teams Overview

In Microsoft Teams overview, you will get an overview of Microsoft Teams including Teams architecture and related Office 365 workloads. You will be provided with an overview of security and compliance in Microsoft Teams and finally get an overview of how to manage Microsoft Teams.

Lessons

  • Overview of Microsoft Teams
  • Overview of security and compliance in Microsoft Teams
  • Overview of managing Microsoft Teams

Lab: Manage roles and create teams

  • Prepare team roles and licenses
  • Create a new team

 

Module 2: Implement Microsoft Teams Governance, Security and Compliance

In implementing governance, security and compliance for Microsoft Teams, you will plan and configure governance for Office 365 groups including expiration and naming policies. Then you will implement security by configuring conditional access, MFA or Threat Management for Microsoft Teams. Finally, you will implement compliance for Teams by using DLP policies, eDiscovery cases or supervision policies.

Lessons

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing Security for Microsoft Teams
  • Implementing Compliance for Microsoft Teams

Lab: Configure Security and Compliance for teams and content

  • Implement Governance and Lifecycle Management for Microsoft Teams
  • Implementing security for Microsoft Teams
  • Implementing compliance for Microsoft Teams

 

Module 3: Prepare the environment for a Microsoft Teams deployment

In preparing the environment for a Microsoft Teams deployment, you plan an upgrade from Skype for Business to Microsoft Teams by evaluating upgrade paths with coexistence and upgrade modes, manage meeting migrations and configuring coexistence and upgrade settings. Then you plan and configure network settings for Microsoft Teams, and finally, you will deploy and manage Microsoft Teams endpoints.

Lessons

  • Upgrade from Skype for Business to Microsoft Teams
  • Plan and configure network settings for Microsoft Teams
  • Deploy and Manage Microsoft Teams endpoints

Lab: Environment preparation for Teams

  • Calculate networking capabilities
  • Evaluate configuration profiles
  • Provide team resources

 

Module 4: Deploy and manage teams

In deploying and managing teams, you will learn how to create and manage teams, manage membership and access for both, internal and external users.

Lessons

  • Create and manage teams
  • Manage membership
  • Manage access for external users

Lab: Manage teams

  • Manage team resources
  • Manage sharing and access

 

Module 5: Manage collaboration in Microsoft Teams

In managing collaboration in Microsoft Teams, you will manage chat and collaboration experiences such as team settings or private channel creation policies. Finally, you will manage settings for Teams apps such as app setup policies, Apps, bots & connectors in Microsoft Teams or publish a custom app in Microsoft Teams.

Lessons

  • Manage chat and collaboration experiences
  • Manage settings for Teams apps

Lab: Modify collaboration settings for Teams

  • Configure channel and message policies
  • Manage app settings for team

 

Module 6: Manage communication in Microsoft Teams

This course concludes with managing communication in Microsoft Teams. You will learn how to manage Live event and meetings experiences, manage phone numbers or Phone System for Microsoft Teams and finally how to troubleshoot audio, video, and client issues.

Lessons

  • Manage Live event and meetings experiences
  • Manage phone numbers
  • Manage Phone System for Microsoft Teams
  • Troubleshoot audio, video, and client issues

Lab: Modify communication settings for Teams

  • Configure meeting policies
  • Manage Phone System for Microsoft Teams
  • Troubleshooting audio, video and client issues

target_au

Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam.


pre_req
  • A proficient understanding of basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices, including using PowerShell.

titleMS-101T00: Microsoft 365 Mobility and Security
days5
seo_titleMicrosoft 365 Mobility and Security Course Training
seo_decThis Microsoft 365 Mobility and Security (MS-101T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyIT Services Management
overviewThis course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches. With your Microsoft 365 security components now firmly in place, you will examine the key components of Microsoft 365 compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Secure Multipurpose Internet Mail Extension (S/MIME), Office 365 message encryption, and data loss prevention (DLP). You will then delve deeper into archiving and retention, paying particular attention to in-place records management in SharePoint, archiving and retention in Exchange, and Retention policies in the Security and Compliance Center. Now that you understand the key aspects of data governance, you will examine how to implement them, including the building of ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips. You will then focus on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement Azure Information Protection and Windows Information Protection. You will conclude this section by learning how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery. The course concludes with an in-depth examination of Microsoft 365 device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management. At this point, you will transition from planning to implementing device management; specifically, your Windows 10 deployment strategy. This includes learning how to implement Windows Autopilot, Windows Analytics, and Mobile Device Management (MDM). When examining MDM, you will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.
objective
  • Microsoft 365 Security Metrics
  • Microsoft 365 Security Services
  • Microsoft 365 Threat Intelligence
  • Data Governance in Microsoft 365
  • Archiving and Retention in Office 365
  • Data Governance in Microsoft 365 Intelligence
  • Search and Investigations
  • Device Management
  • Windows 10 Deployment Strategies
  • Mobile Device Management

outline

Module 1: Explore security metrics in Microsoft 365

In this learning path, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats, including the Zero Trust approach. You will be introduced to the Microsoft Secure Score, Privileged Identity Management, as well as to Azure Identity Protection and Microsoft Defender for Office 365.

Lessons

  • Examine threat vectors and data breaches
  • Explore the Zero Trust security model
  • Explore security solutions in Microsoft 365
  • Examine Microsoft Secure Score
  • Examine Privileged Identity Management
  • Examine Azure Identity Protection

Lab : Tenant Setup and Privileged Identity Management

  • Initialize your Microsoft 365 Tenant
  • PIM Resource Workflows

After completing this module, students will be able to:

  • Describe several techniques hackers use to compromise user accounts through email
  • Describe techniques hackers use to gain control over resources
  • Describe techniques hackers use to compromise data
  • Describe the Zero Trust approach to security in Microsoft 365.
  • Describe the components of Zero Trust security.
  • Describe and five steps to implementing a Zero Trust model in your organization.
  • Explain Zero Trust networking
  • List the types of threats that can be avoided by using EOP and Microsoft Defender for Office 365
  • Describe how Microsoft 365 Threat Intelligence can be benefit your organization
  • Monitor your organization through auditing and alerts
  • Describe how ASM enhances visibility and control over your tenant through three core areas
  • Describe the benefits of Secure Score and what kind of services can be analyzed
  • Describe how to collect data using the Secure Score API
  • Know where to identify actions that will increase your security by mitigating risks
  • Explain how to determine the threats each action will mitigate and the impact it has on use
  • Explain Privileged Identity Management (PIM) in Azure administration
  • Configure PIM for use in your organization
  • Audit PIM roles
  • Explain Microsoft Identity Manager
  • Explain Privileged Access Management in Microsoft 365
  • Describe Azure Identity Protection and what kind of identities can be protected
  • Understand how to enable Azure Identity Protection
  • Know how to identify vulnerabilities and risk events
  • Plan your investigation in protecting cloud-based identities
  • Plan how to protect your Azure Active Directory environment from security breaches

Module 2: Manage your Microsoft 365 security services

This learning path examines how to manage the Microsoft 365 security services, including Exchange Online Protection, Microsoft Defender for Office 365, Safe Attachments, and Safe Links. You will also be introduced to the various reports that help an organization monitor its security health.

Lessons

  • Examine Exchange Online Protection
  • Examine Microsoft Defender for Office 365
  • Manage Safe Attachments
  • Manage Safe Links
  • Explore reporting in the Microsoft 365 security services

Lab : Manage Microsoft 365 Security Services

  • Implement a Safe Attachments policy
  • Implement a Safe Links policy

After completing this module, students will be able to:

  • Describe the anti-malware pipeline as email is analyzed by Exchange Online Protection
  • List several mechanisms used to filter spam and malware
  • Describe additional solutions to protect against phishing and spoofing
  • Describe the benefits of the Spoof Intelligence feature
  • Describe how Safe Attachments is used to block zero-day malware in email attachments and documents
  • Describe how Safe Links protect users from malicious URLs embedded in email and documents
  • Create and modify a Safe Attachments policy in the Security & Compliance Center
  • Create a Safe Attachments policy by using Windows PowerShell
  • Configure a Safe Attachments policy to take certain actions
  • Understand how a transport rule can be used to disable the Safe Attachments functionality
  • Describe the end-user experience when an email attachment is scanned and found to be malicious
  • Create and modify a Safe Links policy in the Security & Compliance Center
  • Create a Safe Links policy by using Windows PowerShell
  • Understand how a transport rule can be used to disable the Safe Links functionality
  • Describe the end-user experience when Safe Links identifies a link to a malicious website or file
  • Describe how the Microsoft 365 security reports show how your organization is being protected
  • Understand where to access reports generated by EOP and Microsoft Defender for Office 365
  • Understand how to access detailed information from the generated reports generated

Module 3: Implement threat intelligence in Microsoft 365

In this learning path, you will then transition from security services to threat intelligence; specifically, using the Security Dashboard, Microsoft Defender for Identity, and Microsoft Cloud Application Security to stay ahead of potential security breaches.

Lessons

  • Explore threat intelligence in Microsoft 365
  • Explore the Security Dashboard
  • Implement Microsoft Defender for Identity
  • Implement Microsoft Cloud Application Security

Lab : Implement Threat Intelligence

  • Conduct a Spear Phishing attack using the Attack Simulator
  • Conduct Password attacks using the Attack Simulator
  • Prepare for Alert Policies
  • Implement a Mailbox Permission Alert
  • Implement a SharePoint Permission Alert
  • Test the Default eDiscovery Alert

After completing this module, students will be able to:

  • Understand how threat intelligence is powered by the Microsoft Intelligent Security Graph
  • Describe how the threat dashboard can benefit C-level security officers
  • Understand how Threat Explorer can be used to investigate threats and help to protect your tenant
  • Describe how the Security Dashboard displays top risks, global trends, and protection quality
  • Describe what Microsoft Defender for Identity is and what requirements are needed to deploy it
  • Configure Microsoft Defender for Identity
  • Manage the Microsoft Defender for Identity services
  • Describe Cloud App Security
  • Explain how to deploy Cloud App Security
  • Control your Cloud Apps with Policies
  • Troubleshoot Cloud App Security

Module 4: Introduction to Data Governance in Microsoft 365

This learning path examines the key components of Microsoft 365 Compliance management. This begins with an overview of all key aspects of data governance, including data archiving and retention, Information Rights Management, Office 365 message encryption, In-place Records Management in SharePoint, and data loss prevention (DLP).

Lessons

  • Explore archiving in Microsoft 365
  • Explore retention in Microsoft 365
  • Explore Information Rights Management
  • Explore Office 365 Message Encryption
  • Explore In-place Records Management in SharePoint
  • Explore Data Loss Prevention in Microsoft 365

Lab : Implement Data Governance

  • Configure Microsoft 365 Message Encryption
  • Validate Information Rights Management
  • Initialize Compliance
  • Configure Retention Tags and Policies

After completing this module, students will be able to:

  • Understand Data Governance in Microsoft 365
  • Describe the difference between In-Place Archive and Records Management
  • Explain how data is archived in Exchange
  • Recognize the benefits of In Place Records Management in SharePoint
  • Understand how Messaging Records Management works in Exchange
  • List the types of retention tags that can be applied to mailboxes
  • Know the different Microsoft 365 Encryption Options
  • Understand how Information Rights Management (IRM) can be used in Exchange
  • Configure IRM protection for Exchange mails
  • Explain how IRM can be used in SharePoint
  • Apply IRM protection to SharePoint documents
  • Tell the differences between IRM protection and AIP classification
  • Understand how message encryption works
  • Perform encryption on a message
  • Accomplish decryption of a message
  • Understand the co-operation of signing and encryption simultaneously
  • Explain what triple-wrapped messages are
  • Describe when you can use Office 365 Message Encryption
  • Explain how Office 365 Message Encryption works
  • Describe Data Loss Prevention (DLP)
  • Understand what sensitive information and search patterns are that DLP is using
  • Know what a DLP policy is and what it contains
  • Recognize how actions and conditions work together for DLP
  • Express how actions contain functions to send emails on matches
  • Show policy tips to the users if a DLP rule applies
  • Use policy templates to implement DLP policies for commonly used information
  • Explain document finger
  • Understand how to use DLP to protect documents in Windows Server FCI

Module 5: Implement data governance in Microsoft 365

This learning path examines how to implement the key aspects of data governance, including the building of information barriers in Microsoft 365 and ethical walls in Exchange Online, creating DLP policies from built-in templates, creating custom DLP policies, creating DLP policies to protect documents, and creating policy tips.

Lessons

  • Evaluate your compliance readiness
  • Implement compliance solutions
  • Create information barriers in Microsoft 365
  • Create a DLP policy from a built-in template
  • Create a custom DLP policy
  • Create a DLP policy to protect documents
  • Implement policy tips for DLP policies

Lab : Implement DLP Policies

  • Manage DLP Policies
  • Test MRM and DLP Policies

After completing this module, students will be able to:

  • Describe the Microsoft 365 Compliance Center and how to access it
  • Describe the purpose and function of Compliance score
  • Explain the components of of how an organization’s Compliance score is determined
  • Explain how assessments are used to formulate compliance scores
  • Explain how Microsoft 365 helps address Global Data Protection Regulation
  • Describe insider risk management functionality in Microsoft 365
  • Configure insider risk management policies
  • Configure insider risk management policies
  • Explain the communication compliance capabilities in Microsoft 365
  • Describe what an ethical wall in Exchange is and how it works
  • Explain how to create information barriers in Microsoft 365
  • Identify best practices for building and working with ethical walls
  • Understand the different built-in templates for a DLP policies
  • Determine how to choose the correct locations for a DLP policy
  • Configure the correct rules for protecting content
  • Enable and review the DLP policy correctly
  • Describe how to modify existing rules of DLP policies
  • Explain how to add and modify custom conditions and action to a DLP rule
  • Describe how to change user notifications and policy tips
  • Configure the user override option to a DLP rule
  • Explain how incident reports are sent by a DLP rule violation
  • Describe how to work with managed properties for DLP policies
  • Explain how SharePoint Online creates crawled properties from documents
  • Describe how to create a managed property from a crawled property in SharePoint Online
  • Explain how to create a DLP policy with rules that apply to managed properties via PowerShell
  • Describe the user experience when a user creates an email or site containing sensitive information
  • Explain the behavior in Office apps when a user enters sensitive information

Module 6: Manage data governance in Microsoft 365

This learning path focuses on managing data governance in Microsoft 365, including managing retention in email, troubleshooting retention policies and policy tips that fail, as well as troubleshooting sensitive data. You will then learn how to implement sensitivity labels and Windows Information Protection.

Lessons

  • Manage retention in email
  • Troubleshoot data governance
  • Explore sensitivity labels
  • Implement sensitivity labels
  • Implement Data Governance

Lab : Implement Data Governance

  • Implement sensitivity labels
  • Implement Windows Information Protection

After completing this module, students will be able to:

  • Determine when and how to use retention tags in mailboxes
  • Assign retention policy to an email folder
  • Add optional retention policies to email messages and folders
  • Remove a retention policy from an email message
  • Explain how the retention age of elements is calculated
  • Repair retention policies that do not run as expected
  • Understand how to systematically troubleshoot when a retention policy appears to fail
  • Perform policy tests in test mode with policy tips
  • Describe how to monitor DLP policies through message tracking
  • Manage data protection using sensitivity labels
  • Describe the requirements to create a sensitivity label
  • Develop a data classification framework for your sensitivity labels
  • Create, publish, and remove sensitivity labels
  • Describe WIP and what it is used for
  • Plan a deployment of WIP policies
  • Implement WIP policies with Intune and SCCM
  • Implement WIP policies in Windows desktop apps

Module 7: Manage content search and investigations in Microsoft 365

This learning path conclude this section on data governance by examining how to manage search and investigation, including searching for content in the Security and Compliance Center, auditing log investigations, and managing advanced eDiscovery.

Lessons

  • Search for content in the Microsoft 365 Compliance center
  • Conduct audit log investigations
  • Manage Advanced eDiscovery

Lab : Manage Search and Investigations

  • Conduct a data search
  • Investigate Your Microsoft 365 Data

After completing this module, students will be able to:

  • Describe how to use content search
  • Design your content search
  • Configure search permission filtering
  • Explain how to search for third-party data
  • Describe when to use scripts for advanced searches
  • Describe what the audit log is and the permissions required to search a Microsoft 365 audit
  • Configure Audit Policies
  • Enter criteria for searching the audit log
  • View, sort, and filter search results
  • Export search results to a CSV file
  • Search the unified audit log by using Windows PowerShell
  • Describe Advanced eDiscovery
  • Configure permissions for users in Advanced eDiscovery
  • Create Cases in Advanced eDiscovery
  • Search and prepare data for Advanced eDiscovery

Module 8: Prepare for device management in Microsoft 365

This learning path provides an in-depth examination of Microsoft 365 Device management. You will begin by planning for various aspects of device management, including preparing your Windows 10 devices for co-management. You will learn how to transition from Configuration Manager to Microsoft Intune, and you will be introduced to the Microsoft Store for Business and Mobile Application Management.

Lessons

  • Explore Co-management of Windows 10 device
  • Prepare your Windows 10 devices for Co-management
  • Transition from Configuration Manager to Intune
  • Examine the Microsoft Store for Business
  • Plan for application management

Lab : Implement the Microsoft Store for Business

  • Configure the Microsoft Store for Business
  • Manage the Microsoft Store for Business

After completing this module, students will be able to:

  • Describe the benefits of Co-management
  • Plan your organization’s Co-management Strategy
  • Describe the main features of Configuration Manager
  • Describe how Azure Active Directory enables co-management
  • Identify the prerequisites for using Co-management
  • Configure Configuration Manager for Co-management
  • Enroll Windows 10 Devices to Intune
  • Modify your co-management settings
  • Transfer workloads to Intune
  • Monitor your co-management solution
  • Check compliance for co-managed devices
  • Describe the feature and benefits of the Microsoft Store for Business
  • Configure the Microsoft Store for Business
  • Manage settings for the Microsoft Store for Business

Module 9: Plan your Windows 10 deployment strategy

This learning path focuses on planning your Windows 10 deployment strategy, including how to implement Windows Autopilot and Desktop Analytics, and planning your Windows 10 subscription activation service.

Lessons

  • Examine Windows 10 deployment scenarios
  • Explore Windows Autopilot deployment models
  • Plan your Windows 10 Subscription Activation strategy
  • Resolve Windows 10 upgrade errors
  • Analyze Windows 10 diagnostic data using Desktop Analytics

After completing this module, students will be able to:

  • Plan for Windows as a Service
  • Plan a Modern Deployment
  • Plan a Dynamic Deployment
  • Plan a Traditional Deployment
  • Describe Windows Autopilot requirements
  • Configure Autopilot
  • Describe Autopilot Self-deployments, Pre-provisioned deployments, and User-driven deployments
  • Deploy BitLocker Encryption for Autopiloted Devices
  • Understand Windows 10 Enterprise E3 in CSP
  • Configure VDA for Subscription Activation
  • Deploy Windows 10 Enterprise licenses
  • Describe common fixes for Windows 10 upgrade errors
  • Use SetupDiag
  • Troubleshooting upgrade errors
  • Describe Windows error reporting
  • Understand the upgrade error codes and resolution procedure
  • Describe Desktop Analytics
  • Describe Device Health
  • Describe Update Compliance
  • Determine Upgrade Readiness

Module 10: Implement Mobile Device Management in Microsoft 365

This learning path focuses on Mobile Device Management (MDM). You will learn how to deploy it, how to enroll devices to MDM, and how to manage device compliance.

Lessons

  • Explore Mobile Device Management
  • Deploy Mobile Device Management
  • Enroll devices to Mobile Device Management
  • Manage device compliance

Lab : Manage devices with Intune

  • Enable device management
  • Configure Azure AD for Intune
  • Create Intune policies
  • Enroll a Windows 10 device
  • Manage and monitor a device in Intune

After completing this module, students will be able to:

  • Manage devices with MDM
  • Compare MDM for Microsoft 365 and Intune
  • Understand policy settings for mobile devices
  • Control Email and Document Access
  • Activate Mobile Device Management Services
  • Deploy Mobile Device Management
  • Configure Domains for MDM
  • Configure an APNs Certificate for iOS devices
  • Manage Device Security Policies
  • Define a Corporate Device Enrollment Policy
  • Enroll devices to MDM
  • Understand the Apple Device Enrollment Program
  • Understand Enrollment Rules
  • Configure a Device Enrollment Manager Role
  • Describe Multi-factor Authentication considerations
  • Plan for device compliance
  • Configure conditional users and groups
  • Create Conditional Access policies
  • Monitor enrolled devices

target_au

This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleMS-100T00-A: Microsoft 365 Identity and Services
days5
seo_titleMicrosoft 365 Identity and Services Course Training
seo_decThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewThis Microsoft 365 Identity and Services (MS-100T00-A) course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 tenant and service management, Office 365 management, and Microsoft 365 identity management. In Microsoft 365 tenant and service management, you will examine all the key components that must be planned for when designing your Microsoft 365 tenant. Once this planning phase is complete, you will learn how to configure your Microsoft 365 tenant, including your organizational profile, tenant subscription options, component services, user accounts and licenses, and security groups. Finally, you will learn how to manage your tenant, which includes the configuration of tenant roles and managing your tenant health and services. With your Microsoft 365 tenant now firmly in place, you will examine the key components of Office 365 management.
objective

By actively participating in this course, you will learn about the following:

  • Designing, configuring, and managing your Microsoft 365 tenant
  • Office 365 product functionality
  • Configuring Office 365
  • Managing Office 365 ProPlus deployments
  • Planning and implementing identity synchronization
  • Implementing application and external access

outline

Module 1: Designing Your Microsoft 365 Tenant

Lessons

  • Planning Microsoft 365 in your On-premises Infrastructure
  • Planning Your Identity and Authentication Solution
  • Planning Your Service Setup
  • Planning Your Hybrid Environment
  • Planning Your Migration to Office 365

 

Module 2: Configuring Your Microsoft 365 Tenant

Lessons

  • Planning  Your Microsoft 365 Experience
  • Configuring  Your Microsoft 365 Experience
  • Managing User Accounts and Licenses in Microsoft 365
  • Managing Security Groups in Microsoft 365
  • Implementing Your Domain Services
  • Leveraging FastTrack and Partner Services

 

Module 3: Lab 1 – Configuring your Microsoft 365 Tenant

Lab: Configuring your Microsoft 365 Tenant

  • Exercise 1 – Set up a Microsoft 365 Trial Tenant

 

Module 4: Managing Your Microsoft 365 Tenant

Lessons

  • Configuring Tenant Roles
  • Managing Tenant Health and Services

 

Module 5: Lab 2 – Managing your Microsoft 365 Tenant

Lab: Managing your Microsoft 365 Tenant

  • Exercise 1 – Manage Administration Delegation
  • Exercise 2 – Configure Office 365 Message Encryption (OME)
  • Exercise 3 – Monitor and Troubleshoot Office 365

 

Module 6: Office 365 Overview

Lessons

  • Exchange Online Overview
  • SharePoint Online Overview
  • Teams Overview
  • Additional Resources Overview
  • Device Management Overview

 

Module 7: Lab 3 – Office 365 Overview

Lab: Office 365 Overview

  • Exercise 1 – Exchange Online Overview
  • Exercise 2 – SharePoint Online Overview
  • Exercise 3 – Teams Overview

 

Module 8: Configuring  Office 365

Lessons

  • Office 365 Client Overview
  • Configuring Office Client Connectivity to Office 365

 

Module 9: Managing Office 365 ProPlus Deployments

Lessons

  • Managing User-Driven Client Installations
  • Managing Centralized Office 365 ProPlus Deployments
  • Configuring Office Telemetry
  • Configuring Microsoft Analytics

 

Module 10: Lab 4 – Managing Office 365 ProPlus installations

Lab: Managing Office 365 ProPlus installations

  • Exercise 1 – Prepare an Office 365 ProPlus Managed Installation
  • Exercise 2 – Manage a Centralized Office 365 ProPlus Installation
  • Exercise 3 – Deploy and Configure Office Telemetry Components

 

Module 11: Planning and Implementing Identity Synchronization

Lessons

  • Introduction to Identity Synchronization
  • Planning for Azure AD Connect
  • Implementing Azure AD Connect
  • Managing Synchronized Identities
  • Password Management in Microsoft 365

 

Module 12: Lab 5 – Implementing Identity Synchronization

Lab: Implementing Identity Synchronization

  • Exercise 1 – Set up your organization for identity synchronization
  • Exercise 2 – Implement Identity Synchronization

 

Module 13: Implementing Application and External Access

Lessons

  • Implementing Applications in Azure AD
  • Configuring Azure AD App Proxy
  • Designing Solutions for External Access

target_au

This Microsoft 365 Identity and Services course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 role-based administrator certification paths.


pre_req
  • Completed a role-based administrator course such as Messaging, Teamwork, Security and Compliance, or Collaboration.
  • A proficient understanding of DNS and basic functional experience with Microsoft 365 services.
  • A proficient understanding of general IT practices.

titleCourse MD-101T00-A: Managing Modern Desktops
days5
seo_titleManaging Modern Desktops Course Training
seo_decIn the Managing Modern Desktops (MD-101T00-A) course, you will be introduced to key components of modern management and co-management strategies.
seo_tkey
categorymicrosoft-365
vendorMicrosoft

techonogyInternet of Technology
overviewIn the Managing Modern Desktops (MD-101T00-A) course, students will learn how to plan and implement an operating system deployment strategy using modern deployment methods, as well as how to implement an update strategy. Students will be introduced to key components of modern management and co-management strategies. This course also covers what it takes to incorporate Microsoft Intune into your organization. Students will also learn about methods for deployment and management of apps and browser-based applications. Students will be introduced to the key concepts of security in modern management including authentication, identities, access, and compliance policies. Students will be introduced to technologies such as Azure Active Directory, Azure Information Protection and Windows Defender Advanced Threat Protection, as well as how to leverage them to protect devices and data.   See other Microsoft courses
objective

After completing this course, learners should be able to:

  • Plan, develop, and implement an Operating System deployment, upgrade, and update strategy.
  • Understand the benefits and methods of co-management strategies.
  • Plan and implement device enrollment and configuration.
  •  Manage and deploy applications and plan a mobile application management strategy.
  •  Manage users and authentication using Azure AD and Active Directory DS.
  •  Describe and implement methods used to protect devices and data.

outline

Module 1: Planning an Operating System Deployment Strategy

This module explains how to plan and implement a deployment strategy. Students will learn about the concepts of supporting the desktop through its entire lifecycle. This module also covers assessing an existing environment and the tools used to prepare a deployment strategy. Finally, students will be introduced to the tools and strategies used for desktop deployment.

Lessons

  • The Enterprise Desktop
  • Assessing Deployment Readiness
  • Deployment Tools & Strategies

Lab: Practice Lab – Planning Windows 10 deployment

After completing this module, students will be able to:
  • Describe the enterprise desktop lifecycle.
  • Describe how to assess an existing environment.
  • Describe methods for mitigating deployment blockers.
  • Describe the different tools and methods for deployment.

 

Module 2: Implementing Windows 10

This module covers the modern methods of Windows deployment used in common scenarios such as upgrading and migrating to Windows 10, as well as deploying new devices and refreshing existing devices. Students will also learn about alternate methods of OS deployment as well as considerations when choosing methods of deployment.

Lessons

  • Upgrading Devices to Windows 10
  • Deploying New Devices and Refreshing
  • Migrating Devices to Windows 10
  • Alternate Deployment Methods
  • Imaging Considerations

Lab: Practice Lab – Implementing Windows 10

  • Creating and deploying the provisioning package
  • Migrating user settings
  • Deploying Windows 10 with AutoPilot

After completing this course, learners should be able to:

  • Develop an Operating System deployment and upgrade strategy.
  • Understand the different methods of deployment.
  • Understand which scenarios on-premise and cloud-based solutions can be used for.
  • Deploy and migrate desktops to Windows 10.

 

Module 3: Managing Updates for Windows 10

This module covers managing updates to Windows. This module introduces the servicing options for Windows 10. Students will learn the different methods for deploying updates and how to configure windows update policies. Finally, students will learn how to ensure and monitor update compliance using Windows Analytics.

Lessons

  • Updating Windows 10
  • Windows Update for Business
  • Introduction to Windows Analytics

Lab: Practice Lab – Managing Updates for Windows 10

  • Manually configuring Windows Update settings
  • Configuring Windows Update by using GPOs

After completing this module, students will be able to:

  • Describe the Windows 10 servicing channels.
  • Configure a Windows update policy using Group Policy settings.
  • Configure Windows Update for Business to deploy OS updates.
  • Use Windows Analytics to assess upgrade readiness and update compliance.

 

Module 4: Device Enrollment

In this module, students will examine the benefits and prerequisites for co-management and learn how to plan for it. This module will also cover Azure AD join and will be introduced to Microsoft Intune, as well as learn how to configure policies for enrolling devices. The module will conclude with an overview of device inventory in Intune and reporting using the Intune console, Power BI and Microsoft Graph.

Lessons

  • Device management options
  • Microsoft Intune Overview
  • Manage Intune device enrollment and inventory
  • Managing devices with Intune

Lab: Practice Lab – Device Enrollment and Management

After completing this module, students will be able to:

  • Describe the benefits and methods for migrating to co-management.
  • Deploy an MDM with Microsoft Intune.
  • Configure device enrollment.
  • Enrol desktop and mobile devices in Windows Intune.
  • Configure and downloads inventory reports.

 

Module 5: Configuring Profiles

This module dives deeper into Intune device profiles including the types of device profiles and the difference between built-in and custom profiles. The student will learn about assigning profiles to Azure AD groups and monitoring devices and profiles in Intune. The module will conclude with an overview of using Windows Analytics for health and compliance reporting.

Lessons

  • Configuring device profiles
  • Managing user profiles
  • Monitoring devices

Lab: Practice Lab – Managing profiles

After completing this module, students will be able to:
  • Describe the types of device profiles.
  • Create and assign device profiles.
  • Configure the user profile and folder redirection.
  • Monitor and report on devices using Intune and Windows Analytics.

 

Module 6: Application Management

In this module, students learn about application management on-premise and cloud-based solutions. This module will cover how to manage Office 365 ProPlus deployments in Intune as well as how to manage apps on non-enrolled devices. The module will conclude with an overview of Enterprise Mode with Internet Explorer and Microsoft Edge and tracking your installed applications, licenses, and assigned apps using Intune.

Lessons

  • Implement Mobile Application Management (MAM)
  • Deploying and updating applications
  • Administering applications

Lab: Practice Lab – Managing Applications

After completing this module, students will be able to:

  • Describe the methods for application management.
  • Deploy applications using Intune and Group Policy.
  • Configure Microsoft Store for Business.
  • Deploy Office365 ProPlus using Intune.
  • Manage and report application inventory and licenses.

 

Module 7: Managing Authentication in Azure AD

In this module, students will are introduced to the concept of a directory in the cloud with Azure AD. Students will learn the similarities and differences between Azure AD and Active Directory DS and how to synchronize between the two. Students will explore identity management in Azure AD and learn about identity protection using Windows Hello for Business, as well as Azure AD Identity Protection and multi-factor authentication.

Lessons

  • Azure AD Overview
  • Managing identities in Azure AD
  • Protecting identities in Azure AD
  • Managing device authentication

Lab: Practice Lab – Managing objects and authentication in Azure AD

After completing this module, students will be able to:
  • Describe the capabilities of Azure AD.
  • Manage users using Azure AD with Active Directory DS.
  • Implement Windows Hello for Business.
  • Join devices to Azure AD.

 

Module 8: Managing Device Access and Compliance

In this module, students will be introduced to managing device security. The module will cover securely accessing corporate resources and introduce concepts such as Always On VPN and remote connectivity in Windows 10. Students will