Duration 5 Days 30 CPD hours This course is intended for Ideal candidates are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain Networking Fundamentals Describe and review the Aruba Switching portfolio with customers Install and configure devices running the ArubaOS-CX Network Operating System Describe and configure VLANs Explain, describe and configure Spanning Tree Protocol Understand when to use VRRP and how to configure it Explain and configure Link Aggregation Understand and configure IP Routing Explain IP Subnetting Understand and configure OSPFv2 - Single Area Describe and configure Switch Stacking using VSF Configuration of Aruba solutions using Secure Management and Maintenance methodologies Manage, monitor, administer and operate Aruba solutions using Aruba's NetEdit tool This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. This course consists of approximately 60% lecture and 40% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 5-day course prepares candidates for the Aruba Certified Switching Associate exam.In this course, participants learn about ArubaOS-CX switch technologies including multi-layer switches. You will also learn about broadcast domains and Virtual Local Area Networks (VLANs); secure management protocols such as AAA, SSH, HTTPS, and Dynamic Segmentation using Aruba's Role-Based Access Control (RBAC); availability technologies such as Multiple Spanning Tree Protocol (MSTP); link aggregation techniques including Link Aggregation Control Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Framework (VSF). Static and dynamic IP routing protocols such as Open Shortest Path First (OSPF) are also covered. Network Fundamentals What is a network? What is a Protocol? OSI Reference Model Encapsulation, frames, packets, segments Layer 2 to Layer 7 headers Media, cabling, Ethernet/wifi headers Binary/Hex/Decimal theory and conversion TCP/IP Stack (IP addressing & Transport Protocols TCP/UDP) Types of traffic: Unicast, Broadcast, Multicast TCP/IP Stack Overview Ethernet frames IPv4 Header TCP Header ? Three-way Handshake TCP Header ? Sequence Numbers TCP Header ? Port Numbers TCP Header UPD Header Basic Networking with Aruba Solutions Networking devices: Switches, Routers, Multilayer Switches, APs, Mobility Controllers, Firewalls, Servers (HTTP, DHCP, DNS, Telnet, FTP) 2-Tier vs 3-Tier hierarchy Switching Portfolio (AOS switches & AOS-CX switches) is this introducing both portfolio on a couple of slide and few slides on AOS-CX hardware architecture, software architecture and intro to NAE high level. Introduction to AOS-CX and feature set Port numbering Accessing Aruba OS-CX CLI Prompt modes/levels and navigation Context sensitive help Show logs, configuration, interfaces, transceivers, flash, version Hostname/interface name, enabling interfaces Link Layer Discovery Protocol ICMP and reachability testing tools: Ping and Traceroute PoE (standards one slide and what we support and one or two slide on configuration and verifications.) VLANs Broadcast/collision domains VLAN benefits VLAN creation DHCP server configuration in switches (optional) 802.1Q tagging Switchports vs. Routed ports MAC address table ARP table Packet Delivery part 1 Spanning Tree Protocol Redundant network L2 loops 802.1D Common Spanning Tree 802.1s 802.1w overview 802.1w load balancing 802.1w region configuration Link Aggregation Static Aggregation LACP Load Balancing IP Routing - Part 1 Default Gateway DHCP IP Helper Address IP Routing Service Inter-VLAN routing Packet Delivery Part 2 Need for layer 3 redundancy Introduction to VRF VRRP VRRP overview VRRP basic operation VRRP failover and preempt VRRP and MSTP coordination IP Routing - Part 2 Subnetting CIDR Static routes Administrative Distance Floating routes Scalability issues IP Routing - Part 3 IGP vs EGP Distance Vector vs Link State OSPF Router-ID and Hello Messages Passive interfaces States DR and BDR LSDB: LSA 1 and 2 Path selection and convergence Using cost to manipulate routes Stacking Control Plane, Management Plane, and Data Plane Introduction to Stacking technologies Stacking Benefits Centralized control and management plane Distributed Data Plane and Distributed Link Aggregation VSF VSF requirements VSF Link and member roles VSF member IDs and port numbers VSF Configuration VSF Provisioning use cases Tracing Layer 2 traffic: Unicast Tracing Layer 2 traffic: Broadcast, Multicast, and Unknown Unicast VSF Failover and OSFP Graceful-Restart VSF Link failure without MAD MAD VSX Introduction Secure Management and Maintenance OOBM port Management VRF Secure Management Protocols: AAA, SSH, HTTPS, RBAC Radius-based management auth (VSA) SNMP Web interface Configuration file management (Backup, restore, checkpoint and roll back) Operating System image management (backup and restore) Factory default/password recovery AOS-CX Management tools Intro to NetEdit NetEdit installation Basic monitoring with NetEdit AOS-CX Mobile App Additional course details: Nexus Humans Aruba OS-CX Switching Fundamentals, Rev. 20.21 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba OS-CX Switching Fundamentals, Rev. 20.21 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot Lab : Creating and running queries Lab : Configuring SSRS Lab : Analyzing the real-time state of a device by using CMPivot Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections Lab : Configuring boundaries and resource discovery Lab: Configuring user and device collections Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations Lab : Deploying the Microsoft System Center Configuration Manager client software Lab: Configuring and monitoring client status Lab : Managing client settings Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Lab : Configuring software metering Lab : Configuring and managing Asset Intelligence Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Lab : Managing application supersedence and removal Lab : Deploying virtual applications by using Configuration Manager (Optional) Lab : Using Configuration Manager to deploy Windows Store apps Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates Lab : Configuring the site for software updates Lab : Deploying and managing software updates Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies Lab : Implementing Microsoft System Center Endpoint Protection Lab : Implementing advanced threat policies Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access Lab : Managing compliance settings Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service Lab : Preparing the site for operating -system deployment Lab : Deploying operating -system images for bare-metal installations Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance Backing up and recovering a Configuration Manager site Lab : Configuring role-based administration Lab : Configuring Remote Tools Lab : Maintaining a Configuration Manager site Additional course details: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview Upon completing this course, you will be able to meet the following objectives: SD-WAN Overview Cloud Concepts Cloud Technologies SD-WAN Direct Cloud Access (DCA) SD-WAN SaaS Cloud On-RAMP for IAAS (AWS) Cloud On-RAMP for IAAS (AZURE) Cloud Configuration for GCP Cloud On-RAMP for MULTI-CLOUD Cloud On-RAMP for CO-LOCATIONS This is a 5 day hands-on course on Cisco SD-WAN Cloud Configuration, Monitoring and Troubleshooting. This course provides the student with the knowledge to connect SD-WAN to SaaS Applications, as well as the ability to connect their Branches to AWS, AZURE, GCP Data Centers in the Cloud. Students will also learn how to Configure, Monitor, and Troubleshoot SD-WAN Co-Locations and SD-WAN Multicloud. SD-WAN Overview SD-WAN Controller SD-WAN WAN Edges supported in Cloud Instances Cloud Concepts Cloud Ops vs WAN Ops Cloud Connectivity Cloud Access Control Cloud Network Connectivity Cloud Regions Cloud Availability Zones Virtual Networks Cloud Routing Internet Gateways VS VPN Gateways VPC/VNET: IP Addressing Cloud Network Load Balancing Cloud Peering Cloud Transit Networks Cloud Technologies Azure Azure Basics Resource Groups vNets Availability zones Availability Set Workload and Public IP Network Virtual Appliance Load Balancer User Defined Routes Network Security Group VPN Gateway Express Routes Creating VNET for SDWAN AWS AWS Basics Region VPCs Availability zones Subnets EC2 Instance Elastic IPs Security Groups Internet Gateway NAT Gateway Route Table VPN Gateway Direct Connect Elastic Load Balancer Subscribe to Amazon machine images Setting AWS resource limits AWS Transit Gateways Creating VPC for SDWAN AWS IAM Role AWS Security Groups Service limits AWS SSH key pair Google Cloud GCP Basics Project Region Virtual Private Cloud Availability Zone Subnets Compute Engine Cloud Load Balancer Cloud DNS VPC Routing Cloud VPN & VPC peering VPC Firewall Rules SD-WAN Direct Cloud Access (DCA) DCA Prerequisites DNS on VPN 0 DIA Central Policy Configuration Match Traffic Set QOS Set External Access SD-WAN SaaS Supported Platforms and Versions SaaS Prerequisites DNS on VPN 0 DIA SaaS Access Methods Cloud Access through Direct Internet Access Links Cloud Access through a Gateway Site Hybrid Approach Supported SaaS Applications SaaS Security Options SaaS Configuration Common Scenarios for Using Cloud onRamp for SaaS Specify Office 365 Traffic Category Enable Cloud onRamp for SaaS, Cisco IOS XE SD-WAN Devices Configure Applications for Cloud onRamp for SaaS Using Cisco vManage Configure Sites for Cloud onRamp for SaaS Using Cisco vManage View Details of Monitored Applications Cloud On-RAMP for IAAS (AWS) Prerequisite AWS Configuration Verify prerequisites Configure AWS for Cisco SD-WAN Cloud On-RAMP for AWS Overview Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp AWS IAM Role Select Region Select CPU and Memory Transit Networking IP Addresses Discover and Map Host VPCs AWS to SD-WAN Security Monitor Cisco Cloud Onramp for AWS Troubleshoot Cisco Cloud Onramp for AWS Interconnecting Cisco SD-WAN with AWS Transit Gateway (TGW) Cloud On-RAMP for IAAS (AZURE) Prerequisite AZURE Configuration Cloud On-RAMP for AZURE Configure AWS for Cisco SD-WAN Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp Select Region Discover and Map Host VPCs Monitor Cisco Cloud Onramp for Azure Troubleshoot Cisco Cloud Onramp for AZURE Azure Virtual Wan (VWAN) Integration Cloud Configuration for GCP Prerequisite GCP Configuration SD-WAN Configuration Configure Google Cloud for SD-WAN Google Cloud GCP Basics Deploy cEdge Catalyst 8000V Edges Setup IPSEC Connections Setup BGP Connections Cloud On-RAMP for MULTI-CLOUD AWS Transit Gateway Microsoft vWAN Create Cisco Cloud GW Discover host VPCs/VNets Map Branch nets to VPCs Cloud On-RAMP for CO-LOCATIONS SD-WAN CO-LOCATIONS Overview Colocation facilities Cisco Colocation Equipment Cisco Cloud Services Platform 5444 Cisco Network Function Virtualization Infrastructure Software (NFVIS) Virtual Network Functions Network Fabric Cisco Catalyst 9500-48Y4C switch Cisco Catalyst 9500-40X switch Device Configuration and Connectivity Sizing the Colocation Solution Devices Cisco Colocation Manager Deploy Network Services at the Network Edge Colocation Solution?Deployment Workflow Monitor Cisco SD-WAN Colocation Devices Cisco Colocation Manager States for Switch Configuration Cisco Colocation Manager States and Transitions from Host Cisco Colocation Manager Notifications VM Alarms Cloud Services Platform Real-Time Commands Colocation High Availability Troubleshoot Cisco SD-WAN Cloud onRamp for Colocation Solution Troubleshoot Catalyst 9500 Issues Troubleshoot Cloud Services Platform Issues DHCP IP Address Assignment Troubleshoot Cisco Colo Manager Issues Troubleshoot Service Chain Issues Troubleshoot Physical Network Function Management Issues Log Collection from CSP Troubleshoot vManage Issues Additional course details: Nexus Humans Cisco SD-WAN Cloud (SDWAN-CLD-CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco SD-WAN Cloud (SDWAN-CLD-CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Cisco Meeting Server Overview Cisco Meeting Server Deployment Cisco Meeting Server User Licensing Cisco Meeting Server Configuration Cisco Meeting Server Configuration with Cisco Unified Communication Manager (CUCM) Cisco Meeting Server Integration VCS/Expressway Cisco Meeting Server Integration with TMS Cisco Meeting Server Configuration with Lync/Skype for Business Cisco Meeting Server Recording and Streaming Cisco Meeting Manager (CMM) Deployment Cisco Meeting Server WebRTC using Expressway Proxy Cisco Meeting Server Customization Cisco Meeting Server Troubleshooting In this course, students will install and configure a Cisco Meeting Server version 2.x. Students will configure a multimode CMS Cluster and implement all the different components of a clustered solution. Student will also integrate CMS with Unified Communications Manager and VCS/Expressway. Students will also integrate Recording and Skype/Lync. Students will use the TMS and new Cisco Meeting Manager Schedule and monitor CMS. Cisco Meeting Server Overview What is Cisco Meeting Server Cisco Meeting Server Benefits Cisco Meeting Server vs Telepresence Server vs MCU Cisco Meeting Server Functions? Cisco Meeting Server Components Cisco Meeting Server Call Bridge Cisco Meeting Server Web Bridge Cisco Meeting Server Turn Server Cisco Meeting Server XMPP Server Cisco Meeting Server Database Cisco Meeting Server Scalability On-premises and Cloud Conferencing API Integration Cisco Meeting Server Deployment MMP CLI Cisco Meeting Server Prerequisites Cisco Meeting Server 2000 Deployments Installing the server Configuring the Fabric Interconnect modules Configuring the Cisco Meeting Server 2000 through the MMP Checking the installed software Configuring the Web Admin Interface Applying a License File Cisco Meeting Server 1000/VM Deployments Installing CMM via VMware Configuring VMware Network Management Configuring the VMware Instance using vSphere client Retrieving and activating VMware Licenses Accessing the Cisco Meeting Server 1000 Console Installing CMM via Hyper-V Single combined server deployment Single Split Server Deployment Deploying a Core Server Deploying an Edge Server Certificate Guidelines for Single Split Server Deployment Scalable and Resilient Server Deployments Cisco Meeting Server User Licensing Obtaining and Entering a License File Cisco Meeting Server Licenses Cisco User Licenses Personal Multiparty Plus Licensing Shared Multiparty Plus Licensing Cisco Meeting Server Capacity Units XMPP Licensing for Cisco Meeting Apps Cisco Meeting Server Capacity Units Cisco Meeting Server Configuration Transferring the License File to the Cisco Meeting Sever Creating a Cisco Meeting Server Administrator Account Setting up the Network Interface for IPv4 Adding additional Network Interfaces Configuring the Web Admin Interface Creating the certificate for the Web Admin Interface Configuring the Web Admin Interface for HTTS Access Configuring the Web Bridge Configuring the TURN server Configuring the Databases Deploying Web Bridges Deploying multiple Web Bridges Setting up the Web Bridges? certificates Setting up the Web Bridges via the API Web Bridge call flow Cisco Meeting App and WebRTC Client Enabling HTTP redirect and the Web Bridge Deploying the TURN Servers Dial plan configuration ? Overview Dial plan rules for incoming calls and outbound calls Outbound Dial Plan Rules Inbound Dial Plan Rules Forwarding Dial Plan Rules Dial plan configuration?SIP endpoints Cisco Meeting Server (CMS) Configuration with Cisco Unified Communication Manager (CUCM) CUCM and CMS Integration Setting up Escalated ad hoc calls Configuring the Meeting Server Setup Incoming Dial Plan Setup Administrator Account with API Permission Adding the Cisco Meeting Server as a Conference Bridge Creating a Media Resource Group Creating a Media Resource List Adding the Media Resource Group to a Device Pool or Device Setting up Scheduled and Rendezvous Calls Configure Outbound Dial Plan Dial Plan Configuring Cisco Unified Communications Server Configure Route Groups Configure Route Lists Configure Route Pattern Support for Active Control Participant List Indicators Selecting Layout Limitations Overview of ActiveControl and the iX protocol CUCM 8.x and earlier Third-party networks VCS-centric deployments Load Balancing Calls Configuring Call Bridges for Load Balancing Incoming Calls Creating Call Bridge Groups Enabling Load Balancing Fine Tuning Load Balancing Enable Load Balancing of Outbound SIP Calls Setup Outbound Dial Plan Rule for Load Balancing SIP Calls Supply the Call Bridge Group or Specific Call Bridge to Use for Outbound SIP Calls Cisco Meeting Server Integration VCS/Expressway Gateway Configuration Call Testing Inbound call from an endpoint registered to a VCS/Expressway Outbound call to an endpoint registered to a VCS/Expressway Calling non Cisco Meeting App users from H.323 endpoint Troubleshooting Cisco Meeting Server Integration with TMS TMS Integration Cisco Meeting Server Configuration with Lync/Skype for Business Configuring Cisco Meeting Server with SKYPE Dial plan configuration ? integrating Lync/Skype for Business Lync clients dialing into a call on clustered Meeting Servers Integrating SIP endpoints and Lync clients Adding calls between Lync clients and SIP video endpoints Lync Front End server configuration VCS configuration Meeting Server configuration Integrating Cisco Meeting App with SIP and Lync clients Integrating Lync using Lync Edge service Controlling the bandwidth for sharing content on Microsoft Lync and Skype for Business calls Direct Lync federation Calling into scheduled Lync meetings directly and via IVR Office 365 Dual Homed Experience with OBTP Scheduling Cisco Meeting Server Recording and Streaming Recording Meetings Recorder licensing Recording with Vbrick Prerequisites for the Meeting Server Configuring the Meeting Server to work with Vbrick Steps to configuring the Streamer Deploying streaming Streamer licensing Recording meetings Cisco Meeting Manager (CMM) Deployment Deploy Cisco Meeting Manager Cisco Meeting Manager Meetings Navigation List Meetings Edit Meetings Layout Recording Streaming Participants Find meetings Find participants Change layout for all participants in a meeting Start and stop recording Start and stop streaming Add participants Change layout for an individual participant Turn audio or video on or off View participant details Call statistics Cisco Meeting Server WebRTC using Expressway Proxy Configure Cisco Meeting Server for WebRTC Proxy Configure Cisco Expressway C Configure Turn on Cisco Expressway E Cisco Meeting Server Customization WebRTC App Customization Call Customization IVR Message Customization SIP/LYNC Call Message Customization Invitation Customization Cisco Meeting Server Troubleshooting Troubleshooting Cisco Meeting Server Connectivity Troubleshooting Web Bridge connectivity Troubleshooting Call Server issues Troubleshooting Conferencing issues
Duration 4 Days 24 CPD hours This course is intended for Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0. Overview By the end of the course, you should be able to meet the following objectives: Describe vSAN concepts Detail the underlying vSAN architecture and components Explain the key features and use cases for vSAN Identify requirements and planning considerations for vSAN clusters Explain the importance vSAN node hardware compatibility Describe the different vSAN deployment options Explain how to configure vSAN fault domains Detail how to define and create a VM storage policy Discuss the impact of vSAN storage policy changes Detail vSAN resilience and data availability Describe vSAN storage space efficiency Explain how vSAN encryption works Detail VMware HCI Mesh⢠technology and architecture Detail vSAN File Service architecture and configuration Describe how to setup a stretched and a two-node vSAN cluster Describe vSAN maintenance mode and data evacuation options Define the steps to shut down a vSAN cluster for maintenance Explain how to use proactive tests to check the integrity of a vSAN cluster Use VMware Skyline Health⢠for monitoring vSAN health Use VMware Skyline Health to investigate and help determine failure conditions Discuss vSAN troubleshooting best practices Describe vSAN Express Storage Architecture⢠concepts During this course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN? cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises. Course Introduction Introduction and course logistics Course objectives Introduction to vSAN Describe vSAN architecture Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT Identify vSAN objects and components Describe the advantages of object-based storage Describe the difference between All-Flash and Hybrid vSAN architecture Explain the key features and use cases for vSAN Discuss the vSAN integration and compatibility with other VMware technologies Planning a vSAN Cluster Identify requirements and planning considerations for vSAN clusters Apply vSAN cluster planning and deployment best practices Determine and plan for storage consumption by data growth and failure tolerance Design vSAN hosts for operational needs Identify vSAN networking features and requirements Describe ways of controlling traffic in a vSAN environment Recognize best practices for vSAN network configurations Deploying a vSAN Cluster Recognize the importance of hardware compatibility Ensure the compatibility of driver and firmware versioning Use tools to automate driver validation and installation Apply host hardware settings for optimum performance Use VMware vSphere© Lifecycle ManagerTM to perform upgrades Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard Manually configure a vSAN Cluster using VMware vSphere© Client? Explain and configure vSAN fault domains Using VMware vSphere© High Availability with vSAN Understand vSAN Cluster maintenance capabilities Describe the difference between implicit and explicit fault domains Create explicit fault domains vSAN Storage Policies Describe a vSAN object Describe how objects are split into components Explain the purpose of witness components Explain how vSAN stores large objects View object and component placement on the vSAN datastore Explain how storage policies work with vSAN Define and create a virtual machine storage policy Apply and modify virtual machine storage policies Change virtual machine storage policies dynamically Identify virtual machine storage policy compliance status vSAN Resilience and Data Availability Describe and configure the Object Repair Timer advanced option Plan disk replacement in a vSAN cluster Plan maintenance tasks to avoid vSAN object failures Recognize the importance of managing snapshot utilization in a vSAN cluster Managing vSAN Storage Space Efficiency Discuss deduplication and compression techniques Understand deduplication and compression overhead Discuss compression only mode Configure erasure coding Configure swap object thin provisioning Discuss reclaiming storage space with SCSI UNMAP Configure TRIM/UNMAP vSAN Security Operations Identify differences between VM encryption and vSAN encryption Perform ongoing operations to maintain data security Describe the workflow of data-in transit encryption Identify the steps involved in replacing Key Management Server vSAN HCI Mesh Understand the purpose of vSAN HCI Mesh Detail vSAN HCI Mesh technology and architecture Perform mount and unmount of a remote datastore vSAN File Service and iSCSI Target Service Understand the purpose of vSAN File Services Detail vSAN File Services architecture Configure vSAN File Shares Describe vSAN iSCSI Target Service vSAN Stretched and Two Node Clusters Describe the architecture and uses case for stretched clusters Detail the deployment and replacement of a vSAN witness node Describe the architecture and uses case for two-node clusters Explain storage policies for vSAN stretched cluster vSAN Cluster Maintenance Perform typical vSAN maintenance operations Describe vSAN maintenance modes and data evacuation options Assess the impact on cluster objects of entering maintenance mode Determine the specific data actions required after exiting maintenance mode Define the steps to shut down and reboot hosts and vSAN clusters Use best practices for boot devices Replace vSAN nodes vSAN Cluster Monitoring Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services Use VMware Skyline Health for monitoring vSAN cluster health Manage alerts, alarms, and notifications related to vSAN in VMware vSphere© Client? Create and configure custom alarms to trigger vSAN health issues Use IOInsight metrics for monitoring vSAN performance Use a vSAN proactive test to detect and diagnose cluster issues vSAN Troubleshooting Use a structured approach to solve configuration and operational problems Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency Use VMware Skyline Health to investigate and help determine failure conditions Explain which log files are useful for vSAN troubleshooting vSAN Express Storage Architecture Understand the purpose of vSAN Express Storage Architecture Describe the vSAN Express Storage Architecture components Identify Storage Policy differences Understand compression and encryption operation differences
Duration 3 Days 18 CPD hours This course is intended for This course is geared for experienced Scala developers who are new to the world of machine learning and are eager to expand their skillset. Professionals such as data engineers, data scientists, and software engineers who want to harness the power of machine learning in their Scala-based projects will greatly benefit from attending. Additionally, team leads and technical managers who oversee Scala development projects and want to integrate machine learning capabilities into their workflows can gain valuable insights from this course Overview Working in a hands-on learning environment led by our expert instructor you'll: Grasp the fundamentals of machine learning and its various categories, empowering you to make informed decisions about which techniques to apply in different situations. Master the use of Scala-specific tools and libraries, such as Breeze, Saddle, and DeepLearning.scala, allowing you to efficiently process, analyze, and visualize data for machine learning projects. Develop a strong understanding of supervised and unsupervised learning algorithms, enabling you to confidently choose the right approach for your data and effectively build predictive models Gain hands-on experience with neural networks and deep learning, equipping you with the know-how to create advanced applications in areas like natural language processing and image recognition. Explore the world of generative AI and learn how to utilize GPT-Scala for creative text generation tasks, broadening your skill set and making you a more versatile developer. Conquer the realm of scalable machine learning with Scala, learning the secrets to tackling large-scale data processing and analysis challenges with ease. Sharpen your skills in model evaluation, validation, and optimization, ensuring that your machine learning models perform reliably and effectively in any situation. Machine Learning Essentials for Scala Developers is a three-day course designed to provide a solid introduction to the world of machine learning using the Scala language. Throughout the hands-on course, you?ll explore a range of machine learning algorithms and techniques, from supervised and unsupervised learning to neural networks and deep learning, all specifically crafted for Scala developers. Our expert trainer will guide you through real-world, focused hands-on labs designed to help you apply the knowledge you gain in real-world scenarios, giving you the confidence to tackle machine learning challenges in your own projects. You'll dive into innovative tools and libraries such as Breeze, Saddle, DeepLearning.scala, GPT-Scala (and Generative AI with Scala), and TensorFlow-Scala. These cutting-edge resources will enable you to build and deploy machine learning models for a wide range of projects, including data analysis, natural language processing, image recognition and more. Upon completing this course, you'll have the skills required to tackle complex projects and confidently develop intelligent applications. You?ll be able to drive business outcomes, optimize processes, and contribute to innovative projects that leverage the power of data-driven insights and predictions. Introduction to Machine Learning and Scala Learning Outcome: Understand the fundamentals of machine learning and Scala's role in this domain. What is Machine Learning? Machine Learning with Scala: Advantages and Use Cases Supervised Learning in Scala Learn the basics of supervised learning and how to apply it using Scala. Supervised Learning: Regression and Classification Linear Regression in Scala Logistic Regression in Scala Unsupervised Learning in Scala Understand unsupervised learning and how to apply it using Scala. Unsupervised Learning:Clustering and Dimensionality Reduction K-means Clustering in Scala Principal Component Analysis in Scala Neural Networks and Deep Learning in Scala Learning Outcome: Learn the basics of neural networks and deep learning with a focus on implementing them in Scala. Introduction to Neural Networks Feedforward Neural Networks in Scala Deep Learning and Convolutional Neural Networks Introduction to Generative AI and GPT in Scala Gain a basic understanding of generative AI and GPT, and how to utilize GPT-Scala for natural language tasks. Generative AI: Overview and Use Cases Introduction to GPT (Generative Pre-trained Transformer) GPT-Scala: A Library for GPT in Scala Reinforcement Learning in Scala Understand the basics of reinforcement learning and its implementation in Scala. Introduction to Reinforcement Learning Q-learning and Value Iteration Reinforcement Learning with Scala Time Series Analysis using Scala Learn time series analysis techniques and how to apply them in Scala. Introduction to Time Series Analysis Autoregressive Integrated Moving Average (ARIMA) Models Time Series Analysis in Scala Natural Language Processing (NLP) with Scala Gain an understanding of natural language processing techniques and their application in Scala. Introduction to NLP: Techniques and Applications Text Processing and Feature Extraction NLP Libraries and Tools for Scala Image Processing and Computer Vision with Scala Learn image processing techniques and computer vision concepts with a focus on implementing them in Scala. Introduction to Image Processing and Computer Vision Feature Extraction and Image Classification Image Processing Libraries for Scala Model Evaluation and Validation Understand the importance of model evaluation and validation, and how to apply these concepts using Scala. Model Evaluation Metrics Cross-Validation Techniques Model Selection and Tuning in Scala Scalable Machine Learning with Scala Learn how to handle large-scale machine learning problems using Scala. Challenges of Large-Scale Machine Learning Data Partitioning and Parallelization Distributed Machine Learning with Scala Machine Learning Deployment and Production Understand the process of deploying machine learning models into production using Scala. Deployment Challenges and Best Practices Model Serialization and Deserialization Monitoring and Updating Models in Production Ensemble Learning Techniques in Scala Discover ensemble learning techniques and their implementation in Scala. Introduction to Ensemble Learning Bagging and Boosting Techniques Implementing Ensemble Models in Scala Feature Engineering for Machine Learning in Scala Learn advanced feature engineering techniques to improve machine learning model performance in Scala. Importance of Feature Engineering in Machine Learning Feature Scaling and Normalization Techniques Handling Missing Data and Categorical Features Advanced Optimization Techniques for Machine Learning Understand advanced optimization techniques for machine learning models and their application in Scala. Gradient Descent and Variants Regularization Techniques (L1 and L2) Hyperparameter Tuning Strategies
Our telephone training takes place in your normal working situation, using the actual telephones and software, and the programming software clients that trainees will use when fully trained. Our trainers will travel anywhere in the world to train you face to face, or if you prefer, we can offer our whole training catalogue remotely using Teams or Zoom. On-site and live remote telecoms training sessions have a general reputation as most effective for trainees to continue to efficiently carry out their telecoms usage, programming and own in-house training of future new employees. On-site training involves employees training at their place of work while they are doing their actual job, or in pre-organised classroom training sessions, based around hands-on interaction, trainer Q&A and all carried out using your own site telephone system. Our telephone trainers also offer consultations on your new or current telephone systems: looking into how you currently use your system, making suggestions on how programming could be tweaked and changed to improve your current usage, how to improve on call handling methods, and informing you of additional products which may be available on your system that you may not be aware of. This could help improve the level of communication across your company and interactions with your customers. We believe telephone handset and voicemail training sessions are essential to the smooth and efficient running of your company, making sure your staff are aware of all the features and benefits that the telephone handsets can offer, and ensuring calls are dealt with quickly and effectively. System administration training is available to teach new administrators how to manage and control a variety of system features. This type of training is especially important when new administrators have little or no previous telecom knowledge or experience, but it is equally important at all levels to ensure the new system is utilised to its maximum capability. Administration days or Call Centre Software training days take one full day to complete. Full Day Example: 9:30 - 16:00 Day Structure 09:30 - 10:45 Handset & VM session for up to 8 people 10:45 - 12:00 Handset & VM session for up to 8 people 12:00 - 12:45 Lunch 12:45 - 14:00 Handset & VM session for up to 8 people 14:00 - 15:15 Handset & VM session for up to 8 people 15:15 - 16:30 Handset & VM session for up to 8 people Half Day Example: 9:30 - 13:00 Switchboard training takes half a day (3-4 hours for up to 3 people). If you want to train more than 3 people, you may need to extend the day to a full day, to ensure everyone gets to have hands-on training on the switchboard. Super Users and Train the Trainer Sessions Super User sessions can also be organised to show advanced system features in order to provide an ongoing training service to their colleagues, once the trainers have left the site.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Administrator IT support personnel Helpdesk support staff The secondary audience for this course is as follows: Network Engineering Staff Overview Upon completing this course, the learner can meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) system and its environment Configure CUCM to support IP Phones Configure Cisco Unified Communications Manager and IM&Presence to support Cisco Jabber soft client. Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Demonstrate the use of Self Care Portal functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Define the capabilities of and demonstrate the Bulk Administration Tool Define the SMART Licensing model for Cisco Unified Communications Demonstrate the use of the Unified Reporting tool Demonstrate the use of the Dialed Number Analyzer Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system Describe the components that are required for user call processing by Cisco Unity Connection Implement the various features and options that are available to users in Cisco Unity Connection Explore Cisco Unity Connection version features and functions Use the various applications, tools, and reports that are available in Cisco Unity Connection Administering Collaboration Environments (CLACE) is an instructor-led course presented by Skyline-ATS to system administrators and customers involved with the Cisco Unified Communications Manager and Cisco Unity Connection product's day-to-day operation. The CLACE course is the replacement for the CMA / UCA courses. CLACE is a lab-intensive course. The primary focus is learning by performing the configuration tasks. The amount of theory is limited to allow more time for discovery exercises. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan, and implementing Features. The course also covers Jabber administration and Cisco Unity Connection administration features, options, and configuration settings. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the CUCM and CUC software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x of the applications. The concepts and the lab tasks are the same for most of the software versions. Define Collaboration Technology and Benefits Define Collaboration Benefits Describe On-Premise, Cloud, and Hybrid Deployments Describe On-Premise Collaboration Deployments Describe Cisco's Collaboration Endpoints Describe Cisco Collaboration On-Premise Edge Solutions Describe Cisco's Collaboration On-Premise Conferencing Solutions Describe Cisco Cloud Services Administering Initial Parameters for Cisco Unified Communications Manager Understand the On-Premise Collaboration Deployment Models Describe The Cisco Unified CM Cluster Services Define Network requirements for Collaboration Define Network Services for Collaboration Navigate Cisco Unified CM Discovery 1: Configure Cisco Unified Communications Manager Initial Parameters Explore Cisco Unified CM Groups Discovery 2: Configure the Cisco UCM Core Systems Settings Exploring Endpoints and the Registration Process Identify Cisco Endpoint Solutions Explore the Boot up Process of an Endpoint Describe Power Over Ethernet Discovery 3: Configure an Access Switch for an Endpoint Describe IP Network Settings Discovery 4: Deploy an IP Phone Through Auto and Manual Registration Discovery 5: Administer Endpoints in Cisco Unified Communications Manager Managing Users in Cisco Unified Communications Manager Analyze Cisco UCM Users Types and Settings Describe Methods for Authenticating Cisco UCM Users Discovery 6: Create Local User Accounts Discovery 7: Adding Users in Cisco Unified Communications Manager Describing a Basic Dial Plan Describe the Concepts of a Dial Plan and Call Routing Describe Elements of Call Routing Explore Digit Manipulation and Translation Patterns Discovery 8: Create a Basic Dial Plan Describing Class of Service Explore the Concepts of Class of Control Discovery 9: Explore Partitions and Calling Search Spaces Discovery 10: Explore Private Line Automatic Ringdown (PLAR) Enabling Endpoints and Features Configure a Cisco Jabber Endpoint in Cisco UCM Discovery 11: Implementing Common Endpoint Features (Configuring Hunt Groups and Call Coverage) Explore Mobility Discovery 12: Implement Mobility Implementing Media Resources in Cisco Unified Communications Manager Media Resource Overview Media Resource Selection and Access Control Audio and Video Conference Bridge Devices Audio and Video Conference Bridge Integration Options Discovery 13: Configuring Media Resources Reporting and Maintenance Explore the Troubleshooting Process Describe Reporting and Maintenance Tools Describe the Cisco Real-Time Monitoring Tool Discovery 14: Use Reporting and maintenance Tools Describing Cisco Instant Messaging and Presence Describe Cisco IM and Presence Features and Architecture Clustering Describe Cisco IM and Presence Components and Communication Flows Enabling Jabber Cisco Jabber Deployment Modes Discovery 15: Deploy an On-Premise Cisco Jabber Client for Windows Configure Unity Connection Integration Overview of Cisco Unity Connection Integration SIP Integration Typical Integration Mistakes Integration Considerations Discovery 16: Configure the integration between Cisco Unity Connection and Cisco UCM Discovery 17: Configure Voicemail Users Configuring Cisco Unity Connection Call Handlers Call handler Overview System Call Handler Caller Input Operator Call Handler Goodbye Call Handler Directory Handler Interview Handler Troubleshooting Cisco Unity Connection Overview of Cisco Unity Connection Troubleshooting Options Integration Troubleshooting Tools Cisco Real-Time Monitoring Tool Discovery 18: Troubleshoot Cisco Unity Connection Additional course details: Nexus Humans Cisco Administering Collaboration Environments (CLACE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Collaboration Environments (CLACE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.