Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for all computer professionals who will use z/OS UNIX. Overview Discuss the role of z/OS in an open systems environmentIdentify the basic terms used in z/OS UNIXDefine the components of z/OS UNIXExplain major functions provided in z/OS UNIXDiscuss opportunities for applications in a z/OS UNIX environmentIdentify z/OS base elements and optional features that make up z/OS UNIXUse the two interactive interfaces available to access the services This course describes how open standards are implemented in a z/OS system by z/OS UNIX. UNIX System Services are introduced, and the role of z/OS as a server in the open systems environment is discussed. Day 1 Welcome and introduction Unit 1. z/OS UNIX overview Unit 2. Introduction to z/OS UNIX Unit 3. Hierarchical file system Exercises Day 2 Unit 4. z/OS UNIX shell and utilities Unit 5. z/OS UNIX shell commands Unit 6. Working with the shell Unit 7. Functions in z/OS UNIX Exercises Day 3 Unit 8. Working with the z/OS UNIX environment Exercises
Duration 2 Days 12 CPD hours This course is intended for This course is intended for SQL Server administrators who work in a Windows network environment. At least one year of experience administering SQL Servers and using PowerShell is recommended. Overview After completing this course, students will be able to: •Install and Configure SQL Server and all its components using PowerShell •Manage day-to-day SQL Server Administration with PowerShell •Maintain the SQL Server environment using PowerShell scripting and programming options This course provides candidates with the knowledge and skills needed to use PowerShell for SQL Server administration. Students will learn how to manage day-to-day and scheduled maintenance tasks. Install and Configure SQL Server with PowerShell Install SQL Server Configure Database Settings Configure SQL Server Settings Configure SQL Server Policy-Based Management Lab 1: Configuring SQL Server with PowerShell Administering SQL Servers with PowerShell Managing Users and Roles Managing Database Performance Managing Database Availability Managing SQL Server Features Lab 1: Administering SQL Servers with PowerShell Maintaining SQL Server with PowerShell Managing Backups and Restores Maintaining Database Integrity and Performance Monitoring and Auditing Task Automation Generating Reports Lab 1: Maintaining SQL Servers with PowerShell
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for application or system support personnel or anyone who needs an overview of the capabilities of HP UD 10.1x. Overview Upon successful completion of this course, you should be able to: Identify the evolution of the Configuration Management System (CMS) from the Configuration Management Database (CMDB), the need for CMS, and working of CMS Define the concept of Universal Discovery (UD) and be able to identify its applications and types Identify the architecture and deployment process of UD, and the installation and setup of the data flow probe and its log files Define the concepts of discovery adapters, discovery jobs, discovery scripts, and other discovery resources Use the Universal Discovery module to perform application dependency mapping discovery and inventory discovery Use zone-based discover method and discovery activities Design and build agentless and agent-based discoveries, and use inventory scanners Work with the Software Library Viewer and various inventory tools Use the application recognition process, and discovery rules HP This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution. This course is designed to provide an understanding of the fundamental concepts and applications of the HP Universal Discovery (UD) solution.
Duration 2 Days 12 CPD hours This course is intended for This course is geared toward development, engineering, and operations staff. Students in this class should have some familiarity and comfort with the following: 1. Writing code (of just about any flavor) in a text editor 2. Working on the command line 3. Basic system administration ? installing packages, configuring those packages, starting service Overview Get started with Chef by taking Chef Essentials. It?s a two-day instructor-led course that covers all the basics. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your servers. You?ll also learn about Chef Architecture and the set of tools included in the Chef Development Kit (ChefDK). Each of the core units includes hands-on exercises that will give you confidence in your new skills. At the end of the course, you?ll come away with a repo and the skills to start automating your own infrastructure. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your Windows servers. IntroductionResourcesCookbooksOhaiTemplatesLabWorkstation installationSigning up for Managed ChefThe Chef serverCommunity cookbooksManaging multiple nodesRolesSearchEnvironmentsFurther resources
Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and incident responders Overview By the end of the course, you should be able to meet the following objectives: Utilize Carbon Black EDR throughout an incident Implement a baseline configuration for Carbon Black EDR Determine if an alert is a true or false positive Fully scope out an attack from moment of compromise Describe Carbon Black EDR capabilities available to respond to an incident Create addition detection controls to increase security This course teaches you how to use the VMware Carbon Black© EDR? product during incident response. Using the SANS PICERL framework, you will configure the server and perform an investigation on a possible incident. This course provides guidance on using Carbon Black EDR capabilities throughout an incident with an in-depth, hands-on, scenariobased lab. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black EDR & Incident Response Framework identification and process Preparation Implement the Carbon Black EDR instance according to organizational requirements Identification Use initial detection mechanisms Process alerts Proactive threat hunting Incident determination Containment Incident scoping Artifact collection Investigation Eradication Hash banning Removing artifacts Continuous monitoring Recovery Rebuilding endpoints Getting to a more secure state Lessons Learned Tuning Carbon Black EDR Incident close out
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with at least one year of experience in implementing IT security technologies (Network, Applications, and Systems). Overview This course will enable students to configure, monitor, manage, and optimize the SonicWall Network Security firewall appliances running the new SonicOS 7 to effectively defend against limitless network and cyberthreats and implement SonicWall Boundless Cybersecurity safeguards for seamless protection. Upon completion of the course, students will be able to configure the SonicWall firewall for Secure and Remote Connectivity, Network Optimization, and Advanced Threat Protection. The SonicWall Network Security Administrator (SNSA) for SonicOS 7.0curriculum provides students the required background, knowledge, and hands-on experience to begin designing, implementing, and troubleshooting SonicWall Network Security products. SonicOS 7 is SonicWall?s brand new and most advanced security operating system and is at the core of its latest physical and virtual firewalls, including models from the TZ, NSv, NSa and NSsp Series. SonicOS 7.0 features advanced security, simplified policy management, and critical networking and management capabilities for distributed enterprises and small- to medium-sized businesses with SD-branch support. Course Outline Setting up Basic Firewall Components Unified Threat Management Secure Access Deep Packet Inspection for SSL (DPI-SSL) Content Filtering Services Application Control Scalability and Reliability SD-WAN High Availability Troubleshooting Tools
Duration 3 Days 18 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, Network Engineers, and Support Staff Overview The Palo Alto Networks Firewall 11.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Course Outline Module 1 - Tools and Resources Module 2 - CLI Primer Module 3 - Flow Logic Module 4 - Packet Captures Module 5 - Packet-Diagnostics Logs Module 6 - Host-Inbound Traffic Module 7 - Transit Traffic Module 8 - System Services Module 9 - Certificate Management and SSL Decryption Module 10 - User-ID Module 11 - GlobalProtect Module 12 - Support Escalation and RMAs Module 13 - Next Steps
Duration 3 Days 18 CPD hours This course is intended for This course is for technical professionals to gain skills in writing rules for Snort-based Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The primary audience includes: Security administrators Security consultants Network administrators System engineers Technical support personnel using open source IDS and IPS Channel partners and resellers Overview After taking this course, you should be able to: Describe the Snort rule development process Describe the Snort basic rule syntax and usage Describe how traffic is processed by Snort Describe several advanced rule options used by Snort Describe OpenAppID features and functionality Describe how to monitor the performance of Snort and how to tune rules The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules. Course Outline Introduction to Snort Rule Development Snort Rule Syntax and Usage Traffic Flow Through Snort Rules Advanced Rule Options OpenAppID Detection Tuning Snort
Duration 5 Days 30 CPD hours This course is intended for Project Team Members IT Support Team Members Advanced Business Analysts System Administrators Application Consultants Business Process Owners / Team Leads / Power Users Program / Project Managers Trainers Overview Learn how to design, configure, consolidate, and report with BPC Standard In this course, students learn all of the key steps to set up Consolidation based on the SAP Business Planning and Consolidation, version for SAP NetWeaver. SAP Business Planning and Consolidation Overview Describing SAP Business Planning and Consolidation Running Consolidation Tasks Implementing BPC Standard Consolidation Modeling Consolidation Structures and Reporting Configuring Environments and Dimensions Creating Models for Consolidation Creating Reports and Formats in the EPM Add-In Report on BPC Standard Data in Analysis for Office Data Collection and Preparation Collecting Transforming Data for Consolidation Scenarios Creating Consolidation Logic Configuring Reclassifications Configuring Balance Carryforward Managing Journals Consolidations and Eliminations Translating Local Currency Configuring Intercompany Matching and Booking Using the Ownership Manager Configuring Integration Rules Eliminating Intercompany Transactions Configuring Intercompany US Elimination Designing Management, Matrix, and Multiple Accounting Standard Solutions Describing Consolidation and Elimination Principles Consolidating Investments Describing Stage Consolidation Configuring Scope Variation Configuring Equity Pickup Consolidation Process Monitoring Configuring Work Status Using the Controls Monitor to Validate Data Configuring Consolidation Business Process Flows
Duration 3 Days 18 CPD hours This course is intended for This course is designed for anyone currently working on Agile-based projects or having experience with other forms of project management experience and want to add Agile PM skills and knowledge to their portfolio. Anyone with any experience in project-based work, either from the customer or supplier side can benefit from this course, including but not limited to: project manager, team leaders and managers or project employees. Overview AgilePM ⢠certification is the result of collaboration between APMG-International and the DSDM Consortium. DSDM (Dynamic Systems Development Method) is the longest existing Agile method and the only Agile method aimed at managing Agile projects. It Has evolved over the years into a Project Framework, and AgilePM is a subset tailored to the Agile project manager. Students will be explained how the model is set up, how the different project activities and project roles are connected and how AgilePM handles project management. This course provides preparation for the Foundation exam of APMG. Training Day 1 - AgilePM Foundation Topics What is Agile? Choosing an appropriate Agile approach philosophy, principles and project variables preparing for success The DSDM Process Training Day 2 - AgilePM Foundation Topics The People ? DSDM Roles and Responsibilities The DSDM Products Key practices ? prioritization and timeboxes Training Day 3 - AgilePM Foundation Topics Planning and control throughout the lifecycle Other practices: facilitated workshops, modeling and iterative development