Duration 1 Days 6 CPD hours This course is intended for System administrators, security operations personnel including analyst and managers. Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of application control. Manage and configure the Carbon Black App Control server based on organizational requirements. Create policies to control enforcement levels and agent functionality. Implement rules to support the organization's security posture. Use the Carbon Black App Control tools to understand agent and server data. This course teaches you how to use the VMware Carbon Black© App ControlTM product and leverage the capabilities to configure and maintain the system according to their organization?s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Login Accounts and Groups User accounts User roles Policies Modes and Enforcement Levels Rule sets Notifiers Agent side display notification use Computer Details View agent information Related views Local Approval Timed Policy Override Use case and functionality Software Approvals Methods and use cases Custom Rules Rule type and use cases Tools Meters and Alerts Events Agent and server events Baseline Drift Changes in a baseline
Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Describe typical uses of static, aggregate, and generated routes. Configure and monitor static, aggregate, and generated routes. Explain the purpose of Martian routes and add new entries to the default list. This two-day course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol independent routing feature. Chapter 1: Course Introduction Course Introduction Chapter 2: Protocol-Independent Routing Static Routes Aggregated Routes Generated Routes Martian Addresses Routing Instances Chapter 3: Load Balancing and Filter-Based Forwarding Overview of Load Balancing Configuring and Monitoring Load Balancing Overview of Filter-Based Forwarding Configuring and Monitoring Filter-Based Forwarding Chapter 4: Open Shortest Path First Overview of OSPF Adjacency Formation and the Designated Router Election OSPF Scalability Configuring and Monitoring OSPF Basic OSPF Troubleshooting Chapter 5: Border Gateway Protocol Overview of BGP BGP Attributes IBGP Versus EBGP Configuring and Monitoring BGP Chapter 6: IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels Chapter 7: High Availability Overview of High Availability Networks GR Graceful RE Switchover Nonstop Active Routing BFD VRRP Appendix A
Duration 1 Days 6 CPD hours This course is intended for After taking this course, you should be able to: Describe cloud architecture, administration, and licensing Understand hardware and features of all product families Implement best practices for troubleshooting and when to contact support Overview After taking this course, you should be able to: Implement core configurations for a full stack solution in the Meraki Dashboard Deploy foundational Meraki product features to meet basic IT requirements Understand and leverage essential Meraki Dashboard tools for troubleshooting The Engineering Cisco Meraki Solutions Part 1 (ECMS1) v2.1 is an introductory course that equips you with the technical knowledge and skills to confidently operate Cisco Meraki solutions as a unified management system of an entire network from a centralized dashboard. Through a full day of instruction including live demos and guided lab practice, you will learn how to implement core configurations for a full stack solution in the Meraki Dashboard and leverage essential Meraki Dashboard tools to enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on managed devices. This is the first of two courses that prepare you for the Cisco Meraki Solutions Specialist certification exam. Describing the Cloud and the Cisco Meraki Dashboard Single Pane of Glass Management Cisco Meraki Full Stack Capabilities Describing Cisco Meraki Products and Administration Cisco Meraki MX Security and SD-WAN Appliance Cisco Meraki MS Switches Describing Cisco Meraki Troubleshooting Cisco Meraki Dashboard Sync and Real-Time Tools Integration of Cisco Meraki Monitoring and Troubleshooting Tools in Existing Systems
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer This is a two day instructor-led course that focuses on the skills and knowledge needed to implement and configure a Cisco TelePresence Management Suite and Cisco TelePresence Management Suite Extensions. Students will configure TMS, TMSPE, TMSXE, VCS and UCM for management of endpoints. Students will also learn to Configure and Schedule Conferencing, Administrative Tasks, Set up Microsoft Active Directory Users, Manage Conferences and Provision Devices. Installing Cisco Telepresence Management Server Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Release and Option Keys Upgrading TMS Backup TMS Configuring Cisco TelePresence Management Suite (TMS) Initial Configuration Endpoint Configuration Adding User Accounts and Profiles Groups and Permissions Active Directory Lookup Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS Direct Managed Endpoint Features CUCM Configuration for TMS Direct Endpoint Management ? CUCM TMS Responsibilities CUCM Responsibilities Findme Configuration Phonebooks & Phonebook Sources Booking Conferencing Conference Creation Advanced Conference Settings Booking & Scheduling Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Reporting on TMS Reporting Basics Creating a Report Using Reporting Templates Bridge Utilization Call Detail Records Billing Code Statistics Conferences System Managing and Troubleshooting TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Manage and configure the Carbon Black App Control sever based on organizational requirements. Implement rules to support business processes and automatic approvals. Identify scenarios and use cases for Custom rules and Event rules. Describe common troubleshooting scenarios for the Carbon Black App Control server. Describe common troubleshooting scenarios for the Carbon Black App Control Windows agent. This course teaches you how to configure and scope the rules within VMware Carbon Black© App ControlTM product to maintain the system according to your organization?s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Custom Rules Basics Execute / Write action rules Precedence Paths tom Rules Best Practices Rule Triad Rule multiplication Rule Types Custom rule type overview Optimizing Custom Rules Evaluating events Event Rules Creating and editing Testing before implementing Creating and editing Testing before implementing Server versus agent issues Server Capabilities Tools, logs, common issues, scenarios Agent Capabilities Tools, logs, common issues, scenarios
Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights
Duration 2 Days 12 CPD hours This course is intended for System Engineers/Administrators; Backup/Virtualization Administrators; Solution Architects/Consultants Overview By the end of the course, students should be able to:Maximize your expertise on consulting/professional services for the Veeam Availability Suite solutionAim for the VMCA title and comply with some of the certifications requirements for Platinum ProPartners and Veeam Accredited Service Partners (VASPs)Gain professional advantage with the highest level of Veeam technical certification This course covers Veeam Availability Suite? design and optimization and is based on best practices from Veeam solutions architects. IntroductionDesign & Sizing DNS and name resolution Veeam backup server Backup and replication database Proxy server Transport modes Repository server WAN accelerator Interaction with hypervisors Infrastructure Stages of Proof of Concept Assessment using Veeam ONE? Important data to collect (Veeam ONE + infrastructure accounts) Security Permissions Design Scenario: Part 1 Discovery Create a design based on the customer environment Optimizations Backup and replication database Proxy server Repository server WAN accelerator Tape Veeam Backup Enterprise Manager Indexing Antivirus on Veeam servers and guest VM (if VSS is used) Protecting Veeam Backup & Replication? configuration Design Scenario: Part 2 Create a design based on the customer?s evolving environment Automation Veeam backup server VMware vSphere tags Audit & Compliance Auditing Compliance SureBackup© and SureReplica Troubleshooting Deep dive into reading log files Common issues Troubleshooting mode (SureBackup/SureReplica)
Duration 1 Days 6 CPD hours This course is intended for This course is intended for both organizations that would like to improve the corporate communications of their employees and individuals, who take the role of Project Managers, Business Analysts, Team Leaders, Scrum Masters, Product Owners, Managers, Employees, and anyone who would like to improve their communications skills both in the personal and professional aspects. Overview Upon successful completion of this course, students will learn: what effective communications are. why they are important. how by improving communications you will be able to improve the overall execution of projects and your results in general. the specifics of online remote teamwork communications. Your employees will be equipped with knowledge of different communication techniques and styles, which will save them time to adapt to the communication style of the interlocutor and allow them to have more effective conversations both with business partners and customers, and with colleagues at work. Also, they will master the art of active listening and thus win more customers and partners. This course can be adapted to the specific needs of your organization. This course represents highly effective training on developing communication skills and teaches students how to ask correct questions and get the most from one discussion. Also, students will learn how to resolve and/or avoid conflict situations. Course Outline What is the process of effective communications? How to ask good questions and reach clear agreements? Why is listening important and how to listen actively? How to give and receive feedback? How to prepare and conduct effective meetings? Each topic includes discussions and exercises.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for System and network engineers, technical architects and technical support personnel Overview Upon successful completion of this course, students will be able to install and operate a Cisco DNA Center (DNAC) This course will cover the basics of installing and operation of the Cisco DNA Center (DNAC). The Cisco DNAC is a stand-alone product that provides a single dashboard for every fundamental management task to simplify running an enterprise network. The DNAC is the management piece of the Software Defined Access (SDA) solution. Intent-based Networking overview DNA Center overview. DNA Center as a Platform. DNA Center Architecture & Design. DNA Center Installation DNA Center/Identity Services Engine (ISE) Integration ISE Integration configuration in DNA Center. DNA - Global - Add servers (e.g. ISE server(s)). DNA Center integration configuration in ISE. Approve pxGrid in ISE.Verify DNA/ISE integration DNA Center - Device Inventory Add networks devices to the DNA Center device inventory. Verify DNA Center Inventory configuration. DNA Center - Design - Network Hierarchy. Verify DNA Center - design configuration DNA Center - Design - Software Image Management (SWIM) Review SWIM image repository listing. Create golden software image & role. Verify golden software image creation DNA Center - Design ? Templates and Policies Templates ? Apache Velocity Engine. Command Runner. Policies: Group-Based, Application,Traffic Copy, IP-Based DNA Center - Provision Configuration Add devices to newly created sites/locations. Plug and Play (PnP). Verify DNA Center - provision configuration. DNA Center - Assurance Collection. DNA Center ? Administration
Duration 2 Days 12 CPD hours This course is intended for This course is ideal for users who need to replace a Windows computer with a Mac and for IT professionals who support Mac users. Overview Organizations are increasingly integrating Mac computers into Windows or other standards-based network environments. This course gives both users and the IT professionals who support them the skills necessary to make integration easy. This two day Mac Integration Basics course examines how to best use a Mac(s) in an organization that predominantly functions with a Microsoft Windows operating system and Windows Servers. Directory Services Connect a Mac to an Active Directory server Share Files Connect to file servers. Turn on personal file sharing. Configure Collaborative Services Manage Internet Accounts preferences. Connect to an Exchange Server. Connect Mail to non-Windows servers. Add accounts in Mail, Contacts, and Calendars. Secure a Mac Built-In Security features. Create strong passwords. Use two-factor authentication. Set a firmware password. Lock a Mac screen. Create user accounts. Disable automatic login. Protect start-up disk files. Ensure that the apps you download are safe. Provide network security. Printing Connect to a local printer. Connect to, share, and print from network printers. Move and Back Up Content Move content. Back up content. Run Windows on a Mac Run Windows natively or virtually. Microsoft Office for macOS. Cross-platform apps. Cross-platform files. Troubleshooting How to best troubleshoot macOS. Questions & Answers