Get started with Neural networks and understand the underlying concepts of Neural Networks, Convolutional Neural Networks, and Recurrent Neural Networks. This hands-on course will help you understand deep learning in detail with no prior coding or programming experience required.
Duration 2 Days 12 CPD hours This course is intended for This course assumes that you have successfully completed the Administering BIG-IP course, or equivalent, and have hands-on experience working in a production BIG-IP environment for several months. You should have a solid understanding of the environment in which the BIG-IP is deployed. This course is meant for BIG-IP administrators, network engineers, applications engineers, etc., who will be responsible for troubleshooting problems associated with their BIG-IP system. This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Reviewing High Availability (HA) Module 3: Troubleshooting Methodology Step-By-Step Process Step 1: State the Problem Step 2: Specify the Problem Step 3: Map the System Step 4: Develop Possible Causes Step 5: Test Theories Step 6: Iterate Until Root Cause Identified Documenting a Problem Putting Troubleshooting Steps to Use Module 4: Working with F5 Support Leveraging F5 Support Resources AskF5.com DevCentral iHealth Leveraging F5 Labs Working with F5 Technical Support Running End User Diagnostics (EUD) - Hardware Only New Platform Diagnostic Tools Always-On Management (AOM) Subsystem Requesting Return Materials Authorization F5?s Software Version Policy Managing the BIG-IP License for Upgrades Managing BIG-IP Disk Space Upgrading BIG-IP Software Module 5: Troubleshooting ? Bottom to Top Introducing Differences between BIG-IP and LINUX Tools Troubleshooting with Layer 1/Layer 2 Tools Troubleshooting with Layer 2/Layer 3 Tools Troubleshooting with Layer 3 Tools Troubleshooting with LINUX Tools Troubleshooting Memory and CPU Troubleshooting with watch Troubleshooting with Additional tmsh commands Module 6: Troubleshooting Tools tcpdump Wireshark ssldump Fiddler diff KDiff3 cURL Module 7: Using System Logs Configuring Logging Log Files Understanding BIG-IP Daemons Functions Triggering an iRule Deploying and Testing iRules Application Visibility and Reporting Module 8: Troubleshooting Lab Projects Network Configurations for Project Additional course details: Nexus Humans F5 Networks Troubleshooting BIG-IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Troubleshooting BIG-IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Java training course description A comprehensive introduction of the Java language and environment. It is important to note that the course will assume that the delegates are already familiar with the C language as this enables more advanced features of the Java language to be covered in the course. The course will also give an overview of areas related to programming in Java. What will you learn Describe the Java architecture. Write Java applets and applications. Debug Java programs. Examine existing code and determine its function. Use multimedia extensions, the awt, multithreading, exceptions within Java Java training course details Who will benefit: Those wishing to program in Java. Prerequisites: Complete C programming Duration 5 days Java training course contents Review of UNIX fundamentals What is Java? What Java is, history of Java, reasons for success. The Java Virtual Machine, Bytecodes, getting up and running with Java, Java resources. Simple Java applications. C features in Java Java data structures, Java flow control, differences from C, arrays, strings and packages. OO features in Java Java classes and objects, inheritance, overloading, packages. Differences from C++. Java applets Applications vs. applets, HTML, the applet tag, applet methods, life cycle, testing and debugging. Multimedia applets Images, sounds, fonts, colours and animation. Java products The JDK in detail, other development environments. Javabeans and JDBC overviews. Abstract Window Toolkit JFC and Swing versus AWT. Event handling (JDK 1.1), GUIs, panels, buttons, lists, scrollbars, text areas, frames⦠Exception handling and multithreading Handling exceptions. Starting, pausing, stopping threads, producers, consumers, monitoring. More standard classes Java file I/O, Streams, The system class. The networking model, java.net classes. Security and Java Types of attack, the security manager, craplets, securing the network. Integrating legacy code with Java
Duration 3 Days 18 CPD hours This course is intended for This course is designed for network and software engineers interested in Cisco Collaboration and Webex automation and who hold job roles such as: Collaboration Sales Engineer Collaboration Software Developer Collaboration Solutions Architect Consulting Systems Engineer Network Administrator Network Engineer Network Manager Software Architect Software Developer Systems Engineer Technical Solutions Architect Wireless Design Engineer Wireless Engineer Overview After taking this course, you should be able to: Examine API and automation capabilities and concepts for Cisco Unified Communication Manager Examine API and automation capabilities and concepts for Cisco Unity Connection Examine API and automation capabilities and concepts for Cisco Finesse Examine Experience API (xAPI) and automation capabilities and concepts for Cisco Collaboration endpoints Examine API and automation capabilities and concepts for Cisco Webex Teams Examine API and automation capabilities and concepts for Cisco Webex Meetings This course teaches you how to implement Cisco© Collaboration automated, programmable solutions for voice, video, collaboration, and conferencing on-premises or in the cloud, including Cisco Unified Communications Manager, Cisco IP Phone Services, Cisco Unity© Connection, Cisco Finesse©, Cisco Collaboration Endpoints, Cisco Webex Teams?, and Cisco Webex© Meetings. You will also learn how to use Application Programming Interfaces (APIs) interfaces such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP), parsing data in Extensible Markup Language (XML) and JavaScript Object Notation (JSON) formats, and leverage frameworks such as Python. This course prepares you for the 300-835 Automating and Programming Cisco Collaboration Solutions (CLAUTO) certification exam, and specialization toward the CCNP Collaboration certification. Course Outline Automating Cisco Unified Communications Manager Automating Cisco Unity Connection Automating Cisco Finesse Examining Cisco Collaboration Endpoint Automation Examining Cisco Cloud Collaboration Automation Examining Cisco Conferencing Automation Lab outline Configure the Initial Collaboration Lab Environment Verify Phone Details Configure Phone Line Label Configure User Pin Configure System Forward No Answer Timer Configure Route Plan Report Deploy Basic SQL Query Deploy Advanced SQL Query Configure an Alternate Extension in Cisco Unity Connection Configure Voicemail Pin Verify Agent Settings Deploy Gadget Deploy Modify Call Via Video Codec Configure System Name and Branding Deploy and Monitor Video Call Configure Custom Control Panel Deploy Macro Verify Cisco Webex Organization and License Information Configure New Cisco Webex Teams Room Deploy Interactive Bot Deploy Widget Configure Cisco Webex Meetings User Configure and Record Cisco Webex Meeting Verify System Status Configure Host Access on Cisco Meeting Server Spaces Additional course details: Nexus Humans Cisco Implementing Automation for Cisco Collaboration Solutions (CLAUI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Collaboration Solutions (CLAUI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Step into the future with our 'Cyber Security Law & Ethical Hacking' bundle. This comprehensive package includes three QLS-endorsed courses: 'Cyber Security Advanced Training', 'Cyber Security Law Online Course', and 'Cyber Security & Ethical Hacking To The Next Level'. Each course comes with a hardcopy certificate, offering you recognised credentials in this vital field. This bundle is further enriched by five CPD QS accredited courses: 'Cyber Intelligence Officer', 'Cyber Security Incident Handling and Incident Response', 'Linux Security and Hardening', 'Cyber Security Awareness Training', and 'Computer Networks Security from Scratch to Advanced'. Key Features of the Cyber Security Law & Ethical hacking- 3 QLS Course Bundle: 3 QLS-Endorsed Courses: We proudly offer 3 QLS-endorsed courses within our Cyber Security Law & Ethical hacking- 3 QLS Course bundle, providing you with industry-recognized qualifications. Plus, you'll receive a free hardcopy certificate for each of these courses. QLS Course 01: Cyber Intelligence Officer QLS Course 02: Cyber Security Incident Handling and Incident Response QLS Course 03: Linux Security and Hardening 5 CPD QS Accredited Courses: Additionally, our bundle includes 5 relevant CPD QS accredited courses, ensuring that you stay up-to-date with the latest industry standards and practices. Course 01: Cyber Intelligence Officer Course 02: Cyber Security Incident Handling and Incident Response Course 03: Linux Security and Hardening Course 04: Cyber Security Awareness Training Course 05: Computer Networks Security from Scratch to Advanced In Addition, you'll get Five Career Boosting Courses absolutely FREE with this Bundle. Course 01: Professional CV Writing Course 02: Job Search Skills Course 03: Self Esteem & Confidence Building Course 04: Professional Diploma in Stress Management Course 05: Complete Communication Skills Master Class Convenient Online Learning: Our Cyber Security Law & Ethical hacking- 3 QLS Course courses are accessible online, allowing you to learn at your own pace and from the comfort of your own home. Secure your career in the cyber realm by mastering the legal landscape, advanced protection techniques, and ethical hacking principles through this immersive learning experience. Learning Outcomes: Grasp advanced cyber security concepts and strategies. Gain a comprehensive understanding of Cyber Security Law. Learn and apply ethical hacking principles. Become proficient in cyber intelligence and incident response. Understand Linux security and hardening techniques. Enhance awareness of cyber security threats and countermeasures. Learn about computer network security from scratch to advanced. The 'Cyber Security Law & Ethical Hacking' bundle delivers an extensive theoretical foundation in critical areas of cyber security. With the three QLS-endorsed courses, you'll delve into advanced cyber security practices, the legal framework surrounding cyber security, and ethical hacking principles. The five additional CPD QS accredited courses cover a broad spectrum of vital cyber security topics, from intelligence and incident response, to Linux security and cyber security awareness. This knowledge allows you to understand and navigate the increasingly complex digital security landscape and protect vital information and systems. CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring professionals in the field of cyber security. Law students interested in specialising in cyber security law. IT professionals aiming to broaden their skill set with cyber security knowledge. Anyone interested in understanding the foundations of ethical hacking. Career path Cyber Security Analyst: Implement security measures to protect systems (£26,000 - £60,000). Cyber Security Lawyer: Advise on legal aspects of cyber threats (£40,000 - £80,000). Ethical Hacker: Identify vulnerabilities in systems using hacking techniques (£30,000 - £70,000). Cyber Intelligence Officer: Monitor and analyse cyber threats (£35,000 - £65,000). Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included
Duration 2 Days 12 CPD hours This course is intended for This course is ideal for developers and engineers including: Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Cisco integrators/partners Field engineers Server administrators Network managers Overview After taking this course, you should be able to: Apply troubleshooting methodology to Cisco ACI networks Troubleshoot logical and physical constructs of the Cisco ACI policy Understand Cisco APIC and its troubleshooting aspects Troubleshoot endpoint learning in Cisco ACI Troubleshoot Layer 2 traffic bridging and Layer 3 routing in the Cisco ACI network Troubleshoot hypervisor integration in Cisco ACI Troubleshoot Layer 4 to Layer 7 service insertion Troubleshoot contracts and route leaking in Cisco ACI The Troubleshooting Cisco Application-Centric Infrastructure (DCACIT) v5.2 course teaches you through a combination of lectures and labs the key components and procedures needed to troubleshoot Cisco Nexus 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. This course is for advanced engineers who have installed and managed existing fabrics or for those who have completed the Implementing Cisco Application-Centric Infrastructure-Advanced (DCACI) course. Course Outline Describing Cisco ACI Troubleshooting Methodology Troubleshooting Logical and Physical Constructs Troubleshooting Cisco APIC Troubleshooting Endpoint Learning Troubleshooting Layer 2 Troubleshooting Layer 3 Routing Troubleshooting VMM Integration Troubleshooting Layer 4-7 Service Insertion Troubleshooting Contracts and Route Leaking Additional course details: Nexus Humans Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Troubleshooting Cisco Application Centric Infrastructure v5.2 (DCACIT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for Solution Architects Overview At the end of this course, you will be able to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to AWS cloud Move large data from an on-premises datacenter to AWS Design large datastores for AWS cloud Understand different architectural designs for scalability Protect your infrastructure from DDoS attack Secure your data on AWS with encryption Enhance the performance of your solutions Select the most appropriate AWS deployment mechanism Building on concepts introduced in Architecting on AWS, Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform. Building on concepts introduced in Architecting on AWS, this course covers how to build complex solutions which incorporate data services, governance, and security on AWS. This course introduces specialized AWS services, including AWS Direct Connect and AWS Storage Gateway to support Hybrid architecture. It also covers designing best practices for building scalable, elastic, secure, and highly available applications on AWS. Module 1: AWS Account Management Multiple accounts Multi-account patterns License management Manage security and costs with multiple accounts AWS Organizations AWS Directory Service Hands-on lab: Multi-VPC connectivity using a VPN Module 2: Advanced Network Architectures Improve VPC network connections Enhance performance for HPC workloads VPN connections over AWS AWS Direct Connect AWS Transit Gateway Amazon Route 53 Exercise: Design a hybrid architecture Module 3: Deployment Management on AWS Application lifecycle management Application deployment using containers AWS Elastic Beanstalk AWS OpsWorks AWS CloudFormation Module 4: Data Optimize Amazon S3 storage Amazon ElastiCache AWS Snowball AWS Storage Gateway AWS DataSync Backup and archival considerations Database migration Designing for big data with Amazon DynamoDB Hands-on lab: Build a failover solution with Amazon Route 53 and Amazon RDS Module 5: Designing for large scale applications AWS Auto Scaling Migrating over-provisioned resources Blue-green deployments on AWS Hands-on lab: Blue-green deployment with AWS Module 6: Building resilient architectures DDoS attack overview AWS Shield AWS WAF Amazon GuardDuty High availability using Microsoft SQL Server and Microsoft SharePoint on AWS High availability using MongoDB on Amazon EC2 AWS Global Accelerator Hands-on lab: CloudFront content delivery and automating AWS WAF rules Module 7: Encryption and data security Encryption primer DIY key management in AWS AWS Marketplace for encryption products AWS Key Management Service (AWS KMS) Cloud Hardware Security Module (HSM) Comparison of key management options Hands-on lab: AWS KMS with envelope encryption
Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Project Leadership Skills - Français: On-Demand To be effective within an organization, project managers must have a wide variety of skills and abilities.These include: creating and executing a vision;motivate others;influence without authority;networking;communicate up, down and laterally;the negociation;stakeholder management;and manage conflicts. This workshop aims to develop the soft skills essential to leading a team and creating lasting business change.Participants will gain insight into social science and brain science to motivate and empower others.They will learn and experiment with various influencing strategies and tactics. Participants will also discover their personal communication preferences, strengths and blind spots and learn how to best communicate with others they find 'difficult'.They will learn better how to manage the human side of change and learn strategies for managing each step.In the process.Practical negotiation and conflict management activities reinforce theoretical learning, rooting it in real life and making it actionable. What You Will Learn At the end of this program, you will be able to: Explain the importance of a vision in driving motivation and engagement Apply a scientific approach to better motivate those around you Strategically maximize your personal and positional power for better project results Determine influence and network development strategies necessary for personal development Know how to respond to communication challenges related to different personality styles Make the link between the expectations of stakeholders and the success criteria of a project Assess key stakeholders across different dimensions of complexity Apply the four rules of principled negotiation to real-life conflict situations Recognize key aspects of a physiological response to conflict Make the right choice of tools and techniques to "demine" an emotional situation Maximize different strategies and tactics to manage ambiguity at work Manage vision and purpose / Motivate others Communication and alignment with the vision Link the present to the future The Importance of Purpose The art and science of motivation Network development and influence Positive policy and project success Types of power in an organization power and influence Network Development Best Practices Communication The medium and the message Personality and communication styles Communication challenges Stakeholder management / Negotiation Identification of stakeholders Stakeholder analysis The basics of negotiation reasoned negotiation Manage the conflict Conflict dynamics The Anatomy of Conflict Conflict management approaches and tools Dealing with Ambiguity Summary and Next Steps Review of key concepts Create your personal action plan
Duration 3 Days 18 CPD hours This course is intended for Typical candidates for this course are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview After you successfully complete this course, expect to be able to: Explain how Aruba's wireless networking solutions meet customers' requirements Explain fundamental WLAN technologies, RF concepts, and 802.11 Standards Learn to configure the Mobility Master and Mobility Controller to control access to the Employee and Guest WLAN Control secure access to the WLAN using Aruba Firewall Policies and Roles Recognize and explain Radio Frequency Bands and channels, and the standards used to regulate them Describe the concept of radio frequency coverage and interference and successful implementation and diagnosis of WLAN systems Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios Describe RF power technology including, signal strength, how it is measured and why it is critical in designing wireless networks Learn to configure and optimize Aruba ARM and Client Match and Client Insight features Learn how to perform network monitoring functions and troubleshooting This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing the OS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience of configuring a single Mobility Master with one controller and AP Aruba WLAN. Participants will learn how to use Aruba hardware and ArubaOS to install and build a complete, secure controller network with multiple SSIDs. This course provides the underlying material required to prepare candidates for the Aruba Certified Mobility Associate (ACMA) certification exam. WLAN Fundamentals Describes the fundamentals of 802.11, RF frequencies and channels Explain RF Patterns and coverage including SNR Roaming Standards and QOS requirements Mobile First Architecture An introduction to Aruba Products including controller types and modes OS 8.X Architecture and features License types and distribution Mobility Master Mobility Controller Configuration Understanding Groups and Subgroups Different methods to join MC with MM Understanding Hierarchical Configuration Secure WLAN configuration Identifying WLAN requirements such as SSID name, encryption, authentication Explain AP groups structure and profiles Configuration of WLAN using the Mobility Master GUI AP Provisioning Describes the communication between AP and Mobility controller Explain the AP booting sequence and requirements Explores the APs controller discovery mechanisms Explains how to secure AP to controller communication using CPSec Describes AP provisioning and operations WLAN Security Describes the 802.11 discovery, authentication and association Explores the various authentication methods, 802.1x with WPA/WPA2, Mac auth Describes the authentication server communication Explains symmetric vs asymmetric Keys, encryption methods WIPS is described along with rogue discovery and protection Firewall Roles and Policies An introduction into Firewall Roles and policies Explains Aruba?s Identity based Firewall Configuration of Policies and Rules including aliases Explains how to assign Roles to users Dynamic RF Management Explain how ARM calibrates the network selecting channels and power settings Explores OS 8.X Airmatch to calibrate the network How Client Match and ClientInsight match steers clients to better APs Guest Access Introduces Aruba?s solutions for Guest Access and the Captive portal process Configuration of secure guest access using the internal Captive portal The configuration of Captive portal using Clearpass and its benefits Creating a guest provisioning account Troubleshooting guest access Network Monitoring and Troubleshooting Using the MM dashboard to monitor and diagnose client, WLAN and AP issues Traffic analysis using APPrf with filtering capabilities A view of Airwaves capabilities for monitoring and diagnosing client, WLAN and AP issues Additional course details: Nexus Humans Aruba Mobility Fundamentals, Rev. 20.11 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba Mobility Fundamentals, Rev. 20.11 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.