DevOps training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps training course details Who will benefit: IT development, IT operations and IT service management. Prerequisites: Introduction to data communications & networking. Duration 2 days DevOps training course contents Why DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture. Implementation Challenges, risks and critical success factors Measuring DevOps successes
SolarWinds NPM training course description A hands on course providing a solid foundation on network management using SolarWinds. The course specifically focusses on SolarWinds Orion Network Performance Monitor. The course starts with configuring agents and device discovery, onto exploiting SNMP with SolarWinds and then Alerts, reports and customisation of menus, views and maps. What will you learn Discover devices using Solarwinds. Use Solarwinds. Poll and monitor devices using Solarwinds. Create Alarms and reports. Diagnose faults using Solarwinds. SolarWinds NPM training course details Who will benefit: Technical staff working with Solarwinds. Prerequisites: None. Duration 2 days SolarWinds NPM training course content Getting started with SolarWinds What is SolarWinds, Products, ICMP, WMI, SNMP. Installing SolarWinds. Hands on Connecting to SolarWinds, configuring users and groups, using SolarWinds. Device discovery with SolarWinds Manual discovery, automatic discovery, controlling IP discovery, polling, thresholds. Hands on Adding ICMP only, SNMP and WMI nodes. dependencies, groups. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs, SNMPv3, obtaining MIB information. Universal device poller. Hands on MIB browser, MIB walking, syslog. Message center. Using SolarWinds The home page, Views, changing views, adding views. Hands on Views and menu customisation. Server monitoring. Alerts Filters, acknowledgements, notes. Basic alert configuration, Advanced alert configuration. Hands on Configuring alerts. Reports Creating reports, on demand reports, scheduled reports, customising reports, adding reports to views. Standard reports. Hands on Performance reports. Graphs. Maps Orion Network Atlas, the background, adding objects, connect now, applying to views. Hands on Customising a map. Administration Backups, the database.
Intro to containers training course description This course looks at the technologies of containers and microservices. The course starts with a look at what containers are, moving onto working with containers. Networking containers and container orchestration is then studied. The course finishes with monitoring containers with Prometheus and other systems. Hands on sessions are used to reinforce the theory rather than teach specific products, although Docker and Kubernetes are used. What will you learn Use containers. Build containers. Orchestrate containers. Evaluate container technologies. Intro to containers training course details Who will benefit: Those wishing to work with containers. Prerequisites: Introduction to virtualization. Duration 2 days Intro to containers training course contents What are containers? Virtualization, VMs, What are containers? What are microservices? Machine containers, application containers. Benefits. Container runtime tools Docker, LXC, Windows containers. Architecture, components. Hands on Installing Docker client and server. Working with containers Docker workflow, Docker images, Docker containers, Dockerfile, Building, running, storing images. Creating containers. Starting, stopping and controlling containers. Public repositories, private registries. Hands on Exploring containers. Microservices What are microservices? Modular architecture, IPC. Hands on Persistence and containers. Networking containers Linking, no networking, host, bridge. The container Network Interface. Hands on Container networking Container orchestration engines Docker swarm: Nodes, services, tasks. Apache Mesos: Mesos master, agents, frameworks. Kubernetes: Kubectl, master node, worker nodes. Openstack: Architecture, containers in OpenStack. Amazon ECS: Architecture, how it works. Hands on Setup and access a Kubernetes cluster. Managing containers Monitoring, logging, collecting metrics, cluster monitoring tools: Heapster. Hands on Using Prometheus with Kubernetes.
LTE training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. LTE training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days LTE training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.
IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering
ITIL® 4 Strategist: Direct, Plan and Improve: In-House Training The ITIL® 4 Strategist: Direct, Plan, and Improve course is based on the ITIL® 4 Strategist Direct, Plan, and Improve candidate syllabus from AXELOS. This course is based on the ITIL® 4 Strategist: Direct, Plan and Improve IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This course provides the practical skills necessary to create a 'learning and improving' IT organization, with a strong and effective strategic direction. It was designed to provide practitioners with a practical and strategic method for planning and delivering continual improvement with necessary agility. It covers both practical and strategic elements, making it the universal module that is a key component to both ITIL® 4 Managing Professional and ITIL® 4 Strategic Leader streams. What You Will Learn At the end of this course, participants will be able to: Understand the key concepts of direction, planning, improvement Understand the scope of what is to be directed and/or planned and know how to use key principles and methods of direction and planning in that context Understand the role of GRC and know how to integrate the principles and methods into the service value system Understand and know how to use the key principles and methods of continual improvement for all types of improvements Understand and know how to use the key principles and methods of Communication and Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in direction, planning, and improvement Understand and know how to direct, plan, and improve value streams and practices Course Introduction Let's Get to Know Each Other Course Overview ITIL® 4 Certification Scheme Course Learning Objectives Course Components Course Agenda Exercises Case Study: Axle Car Hire Case Study: HandyPerson on Demand Exam Details Core Concepts of DPI Key Terms Covered in the Module Module Learning Objectives Basics of Direction Basics of Planning Basics of Improvement Other Core Elements DPI through Service Value Chain and Guiding Principles Key Terms Covered in the Module Module Learning Objectives DPI of the SVS DPI of Guiding Principles Role of Direction in Strategy Management Key Terms Covered in the Module Introducing Strategy Management Developing Effective Strategies Implementation of Strategies Key Terms Covered in the Module Module Learning Objectives Managing Risks Making Decisions through Portfolio Management Directing via Governance, Risk, and Compliance (GRC) Introduction to Assessment and Planning Key Terms Covered in the Module Module Learning Objectives Core Concepts of Assessment Conducting Effective Assessments Core Concepts of Planning Assessment and Planning through VSM Key Terms Covered in the Module Module Learning Objectives Introducing VSM Developing Value Stream Maps Knowing More About VSM Measurement, Reporting, and Continual Improvement Key Terms Covered in the Module Module Learning Objectives Measurement and Reporting Alignment of Measurements and Metrics Success Factors and Key Performance Indicators Continual Improvement Measurements and Continual Improvement through Dimensions and SVS Key Terms Covered in the Module Module Learning Objectives Measurements for the Four Dimensions Continual Improvement of the Service Value Chain and Practices OCM Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of OCM OCM throughout DPI and Service Value Chain Resistance and Reinforcement Communication Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of Effective Communication Communication with Stakeholders SVS Development Using Four Dimensions Key Terms Covered in the Module Module Learning Objectives Organizations and People in the SVS Partners and Suppliers in the SVS Value Streams and Processes in the SVS Information and Technology in the SVS
Supporting Microsoft SharePoint course description A concise hands on course enabling delegates to manage and administer a SharePoint site. What will you learn Perform initial farm configuration. Use stsadm commands. Manage content. Secure SharePoint. Customise SharePoint search. Monitor and performance tune SharePoint. Supporting Microsoft SharePoint server course details Who will benefit: Anyone working with Microsoft SQL server Prerequisites: SharePoint Administrators. Duration 2 days Supporting Microsoft SharePoint course contents SharePoint Introduction A SharePoint installation. Initial farm configuration. Creating a site collection. Administering SharePoint Stsadm commands, automation with PowerShell. Managing content Lists, libraries, items and documents Security SecureStore, Users and groups, roles and role assignments. Permission levels. SharePoint search Configure search, refine search. SharePoint performance Diagnostic logging, logging levels, Health anaylzer, performance bottlenecks.
VSAT training course description This 2 day training course examines what VSAT is, its usages and users. It then looks at the hardware required for VSAT. What will you learn Explain how VSAT is used Describe the hardware required for VSAT operation. VSAT training course details Who will benefit: Anyone working with VSAT. Prerequisites: None. Duration 2 days VSAT training course contents Introduction History of PMR VSAT Introduction A Brief History Satellite Services Satellite Communications Satellite Footprint Radio Frequency Bands ITU Definitions VSAT Users What is a VSAT? VSATs - Usage VSATs - Users VSAT Hardware Typical System Hardware VSAT ODU and IDU VSAT Station Equipment Diplexer and Feed Horn Typical Waveguide Element Polarisation VSAT Hub Antenna Pointing Outdoor Unit Outdoor (continued) VSAT Network Earth Stations Indoor Unit VSAT Network Earth Stations Indoor Unit Element Hub Station Hub Sub-station Hub Options Hub Options (2) Hub Options (3) Temporary Mount
Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco
IP addressing and subnetting course description A course focusing purely on IP addressing and subnetting. The course assumes that delegates already have some knowledge of IP addressing. In particular delegates will be able to calculate subnet numbers in seconds without using binary. What will you learn Download and install Wireshark. Calculate subnet numbers in seconds Design IP addressing schemes. Troubleshoot IP address problems. Calculate CIDR prefixes in seconds IP addressing and subnetting course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IP addressing and subnetting course contents IP addressing review What is an IP address? What is a subnet? Classless IP addressing. The rules of IP addressing. Ways IP addresses are used: On hosts, in packets, in routing tables. Hands on Byte boundary subnetting. Configuring IP addresses Interfaces, Static vs. dynamic configuration. DHCP: Scopes, leases, relays, using multiple DHCP servers. Multihoming. Subnetting Default subnet masks, subnet notations. How to subnet without binary. VLSMs. Hands on Bit boundary subnetting. Address ranges and routing Routing tables, IP address spoofing, host specific routing, subnets in routing tables, supernets in routing tables. CIDR. Impact of choice of routing protocol. Hands on IP addressing plans. Allocations and assignments IAB, IANA, RIRs, RIPE, LIRs and ISPs. PI vs. PA addressing. Hands on Querying the RIPE database. Private addressing and NAT NAT, NAPT, NAT terms, private addresses, NAT operation, NAT architecture, NAT and security, why use NAT? NAT-ALG, Types of NAT, RSIP. Special use addresses Unicasts, broadcasts, multicasts, anycasts. Directed broadcasts. Allowing broadcasts through routers.