Duration 3 Days 18 CPD hours This course is intended for Field engineers Network engineers Network administrators System engineers Overview After taking this course, you should be able to: Describe Cisco SD-Access architecture and its components Explain Cisco DNA Center deployment models, scaling, and high availability Identify Cisco SD-Access fabric protocols and node roles Understand the Cisco SD-Access Wireless deployment models Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP Deploy simple Cisco SD-Access fabric networks Monitor health and performance of the network with Cisco DNA Center Assurance Interact with the Cisco DNA Center Platform Intent APIs The Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco© Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks.You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFNDwill introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks. Course Outline Introducing Cisco SD-Access Introducing Cisco DNA Center Exploring Cisco SD-Access Solution Components Exploring Cisco SD-Access Wireless Architecture Automating Network Changes with Cisco DNA Center Deploying Fabric Networks with Cisco DNA Center Exploring Cisco DNA Center Assurance Exploring Cisco DNA Center Programmability
Duration 5 Days 30 CPD hours This course is intended for This advanced course is for individuals who are experienced AIX system administrators with TCP/IP networking and AIX Logical Volume Manager (LVM) experience, who are responsible for the planning and installation of a PowerHA SystemMirror 7.1 and later cluster on an IBM power systems server running AIX 6.1 or later. The lab exercises are conducted on an AIX 7.1 TL2-level system. Overview Explain what high availability is Outline the capabilities of PowerHA SystemMirror Design and plan a highly available cluster Install and configure PowerHA SystemMirror in the following modes of operation: Single resource group on a primary node with standby node Two resource groups in a mutual takeover configuration Implement the trusted execution feature of AIX 6.1 Configure resource group startup, fallover, and fallback policies Perform system administration tasks for PowerHA Perform customization for PowerHA Perform problem determination and recovery This course is designed to prepare you to perform administration on a highly available cluster using PowerHA SystemMirror for AIX. It introduces concepts; design and planning considerations; installation and configuration; customization; and maintenance. Day 1 Introduction to PowerHA SystemMirror Planning and configuring network and storage Day 2 Configuring applications for PowerHA SystemMirror Configuring a PowerHA SystemMirror cluster Day 3 Cluster validation and testing PowerHA SystemMirror administration Day 4 PowerHA SystemMirror event processing Basic Troubleshooting Day 5 PowerHA SystemMirror installation
Duration 5 Days 30 CPD hours This course is intended for Project Team Members IT Support Team Members Advanced Business Analysts System Administrators Application Consultants Business Process Owners / Team Leads / Power Users Program / Project Managers Trainers Overview Learn how to design, configure, consolidate, and report with BPC Standard In this course, students learn all of the key steps to set up Consolidation based on the SAP Business Planning and Consolidation, version for SAP NetWeaver. SAP Business Planning and Consolidation Overview Describing SAP Business Planning and Consolidation Running Consolidation Tasks Implementing BPC Standard Consolidation Modeling Consolidation Structures and Reporting Configuring Environments and Dimensions Creating Models for Consolidation Creating Reports and Formats in the EPM Add-In Report on BPC Standard Data in Analysis for Office Data Collection and Preparation Collecting Transforming Data for Consolidation Scenarios Creating Consolidation Logic Configuring Reclassifications Configuring Balance Carryforward Managing Journals Consolidations and Eliminations Translating Local Currency Configuring Intercompany Matching and Booking Using the Ownership Manager Configuring Integration Rules Eliminating Intercompany Transactions Configuring Intercompany US Elimination Designing Management, Matrix, and Multiple Accounting Standard Solutions Describing Consolidation and Elimination Principles Consolidating Investments Describing Stage Consolidation Configuring Scope Variation Configuring Equity Pickup Consolidation Process Monitoring Configuring Work Status Using the Controls Monitor to Validate Data Configuring Consolidation Business Process Flows
Duration 3 Days 18 CPD hours This course is intended for Developers Architects Administrators Overview By the end of the course, you should be able to meet the following objectives: Install and configure RabbitMQ Activate and use plugins such as the web management console Implement messaging patterns and applications using the Java client Set up a cluster of RabbitMQ nodes Configure high availability appropriately Tune and optimize RabbitMQ for better performance Secure RabbitMQ This intensive instructor-led course in RabbitMQ provides a deep dive into how to install, configure, and develop applications which leverage RabbitMQ messaging. The course begins with RabbitMQ installation and general configuration. It continues with developing messaging applications using the Java APIs, and delves into more advanced topics including clustering, high availability, performance, and security. Modules are accompanied by lab exercises that provide hands-on experience Introduction to Spring Essentials Kubernetes Overview BOSH Introduction Deploy, Patch & Upgrade Deploy a simple release Inside the VM Persistent Disks Patch the OS Upgrade Nginx Entry Point Set up a jumpbox Platform Infrastructure Pave the IaaS Deploy ops manager Deploy BOSH director Containerized Workloads Deploy Pivotal Container Service Provision a Kubernetes Cluster Harbor Container Registry Application Deployment Helm Advanced BOSH Deploy a distributed system Deploy Concourse CredHub Troubleshooting Concourse Deployment Concourse Day 2 Operations
Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: System administrators Technical solutions architects Systems integrators Channel partners Value-added resellers Customer sales engineers DevOps engineers Sales engineers Systems engineers Technical solutions architects Overview This course will help you: Use SaaS or on-prem version of Cisco Intersight to enable IT organizations to analyze, simplify, and automate their environments in more advanced ways than the prior generations of tools Gain hands-on experience using Cisco Intersight Understand the X-Series, B-Series, and C-Series product line similarities and differences Describe Cisco Intersight and how it can be used to manage UCS and Cisco Hyperflex Understand the process for upgrading firmware with Cisco Intersight Administering server profiles, pools, and policies with Cisco Intersight Describe how to get started with Cisco Intersight programmability Cisco Intersight Overview (DCISO) v1.0 is a 3-day instructor led course that builds your experience with the administration of Cisco Unified Computing System (UCS) X-Series servers, including using Cisco Intersight for UCS management. This course covers architecture, configuration, and operation of Cisco Intersight©, and is designed to serve the needs of engineers seeking to understand the capabilities of Cisco Intersight for managing data centers from a single management platform. Course Outline Describing Cisco UCS Management in Cisco Intersight Describing the Cisco UCS Platform Describing Cisco Intersight Workloads Describing Automation Options Using Cisco Intersight
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to install, configure, and manage multiple security domains within their network security environment. Overview Discuss challenges associated with securing large-scale business organizations with distributed network environments. Describe the Check Point Multi-Domain Security Management solution and its benefits. Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework. Understand how to install and configure the Multi-Domain Security Management environment. Describe how to implement Management High Availability within the MDSM environment. Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ. Understand how to manage and view Multi-Domain activity logs in SmartConsole. Understand how to configure and implement Global Policy to manage rules for multiple domains. Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server. Describe troubleshooting tools to use for addressing MDSM Server issues. Understand how VSX works and how to integrate the technology within the MDSM environment. This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment. Course Outline Multi-Domain Security Management MDSM Installation and Configuration MDSM Log Management Global Policy Management MDSM Troubleshooting Incorporating VSX
Duration 4 Days 24 CPD hours This course is intended for This course is intended for: Network administrators Network engineers with little or no programming or Python experience Network managers Systems engineers Overview After taking this course, you should be able to: Create a Python script Describe data types commonly used in Python coding Describe Python strings and their use cases Describe Python loops, conditionals, operators, and their purposes and use cases Describe Python classes, methods, functions, namespaces, and scopes Describe the options for Python data manipulation and storage Describe Python modules and packages, their uses, and their benefits Explain how to manipulate user input in Python Describe error and exception management in Python Describe Python code debugging methods The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts. Course Outline Introducing Programmability and Python for Network Engineers Scripting with Python Examining Python Data Types Manipulating Strings Describing Conditionals, Loops, and Operators Exploring Classes, Methods, Functions, Namespaces, and Scopes Exploring Data Storage Options Exploring Python Modules and Packages Gathering and Validating User Input Analyzing Exceptions and Error Management Examining Debugging Methods
Duration 1 Days 6 CPD hours This course is intended for This course is for solution architects, solution designers, administrators, product managers, or anyone who needs to learn the essentials of IBM Case Manager. Overview Describe the users of IBM Case Manager Identify components of IBM Case Manager Create and process a case Search for a case Review a case Add annotations and comments to a case Split a case Explore and identify the structure of a solution Add a custom task Add a quick task Identify IBM Case Manager integration options This course is an introduction to IBM Case Manager, concepts, functions, and architecture. Participants use an IBM Case Manager system to practice the skills that are required by case workers to process cases and create runtime tasks. Introduction to IBM Case Manager Describe the uses of IBM Case Manager Identify components of IBM Case Manager Create and process a case Identify a case List the components of a case type Describe the IBM Case Manager Client Add a case and process a work item Review a case Search for a case Review a case Add annotations and comments to a case Split a case Structure of a solution Describe IBM Case Manager solutions and their assets Identify IBM Case Manager environments Explore the IBM Case Manager Builder Step Designer Add runtime tasks Add a custom task Add a quick task IBM Case Manager integration options Identify IBM Case Manager integration options
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Endpoint Standard Identify the architecture and data flows for Carbon Black Cloud Endpoint Standard communication Perform searches across endpoint data to discover suspicious behavior Manage the Carbon Black Cloud Endpoint Standard rules based on organizational requirements Configure rules to address common threats Evaluate the impact of rules on endpoints Process and respond to alerts Describe the different response capabilities available from VMware Carbon Black CloudTM This course teaches you how to use the VMware Carbon Black Cloud Endpoint? Standard product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Analyzing events Search operators Advanced queries Policy Components Rules Local scanner Sensor capabilities Prevention Capabilities Using Rules Rule types Rule creation Reputation priority Configuring rules Evaluating rule impact Processing Alerts Alert triage Alert actions Response Capabilities Using quarantine Using live response Hash banning
Duration 5 Days 30 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff Overview The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.