Duration 2 Days 12 CPD hours This course is intended for Die Schulung ist zugeschnitten auf die Bedarfe von: Entwickler:innen, Menschen, die die Rollen Scrum Master oder Product Owner ausüben. Projekt- und Prozessexpertinnen und -experten. Manager:innen sowie Teams, die Kanban für das Managen von täglichen operativen Aktivitäten einsetzen, z. B. Mitglieder von DevOps-Teams. Fachleute aus Bereichen wie z. B. Personal, Finanzen, Marketing, Produktion und Support. Alle, die irgendwo den Arbeitsfluss optimieren möchten. Overview Kanban umfasst sechs Grundpraktiken: Arbeitsfluss visualisieren Work-in-Progress (WIP) begrenzen Arbeitsfluss kontrollieren Prozessregeln explizit machen Feedback-Schleifen implementieren Gemeinsam verbessern, experimentell weiterentwickeln Im Mittelpunkt der Schulung steht das Verständnis der Kanban-Prinzipien und wie man diese mit Hilfe der Kanban-Werkzeuge (Tools) in der Praxis anwendet. Der Kurs bereitet auf die entsprechende Zertifizierung EXIN Kanban Foundation vor. Kanban: Methode zur kontinuierlichen Verbesserung des Arbeitsflusses in kollaborativen Teams. Zentrales Mittel ist die Visualisierung und Begrenzung der parallel in Arbeit befindlichen Aufgaben. Einsatzgebiete: SW-Entwicklung, IT-Betrieb, Produktion. Vorteile von Kanban 1.1 Die Flexibilitât von Kanban 1.2 Die Kanban-Kultur Kontinuierliche Verbesserung 2.1 Kaizen einfÂhren 2.2 Prozesse visualisieren und verbessern 2.3 Rahmenbedingungen fÂr Verânderungen Kanban implementieren 3.1 Arbeit visualisieren 3.2 Tickets erstellen 3.3 Work-in-Progress (WIP) begrenzen 3.4 Fluss und Lieferrhythmus kontrollieren 3.5 Priorisierung 3.6 Variabilitât reduzieren Kanban skalieren 4.1 Kanban mit verteilten Teams 4.2 Kanban in Groáprojekten
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to install, configure, and manage multiple security domains within their network security environment. Overview Discuss challenges associated with securing large-scale business organizations with distributed network environments. Describe the Check Point Multi-Domain Security Management solution and its benefits. Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework. Understand how to install and configure the Multi-Domain Security Management environment. Describe how to implement Management High Availability within the MDSM environment. Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ. Understand how to manage and view Multi-Domain activity logs in SmartConsole. Understand how to configure and implement Global Policy to manage rules for multiple domains. Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server. Describe troubleshooting tools to use for addressing MDSM Server issues. Understand how VSX works and how to integrate the technology within the MDSM environment. This course provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and describes how to deploy it within the corporate network environment. Course Outline Multi-Domain Security Management MDSM Installation and Configuration MDSM Log Management Global Policy Management MDSM Troubleshooting Incorporating VSX
Duration 3 Days 18 CPD hours This course is intended for This course is designed for anyone currently working on Agile-based projects or having experience with other forms of project management experience and want to add Agile PM skills and knowledge to their portfolio. Anyone with any experience in project-based work, either from the customer or supplier side can benefit from this course, including but not limited to: project manager, team leaders and managers or project employees. Overview AgilePM ⢠certification is the result of collaboration between APMG-International and the DSDM Consortium. DSDM (Dynamic Systems Development Method) is the longest existing Agile method and the only Agile method aimed at managing Agile projects. It Has evolved over the years into a Project Framework, and AgilePM is a subset tailored to the Agile project manager. Students will be explained how the model is set up, how the different project activities and project roles are connected and how AgilePM handles project management. This course provides preparation for the Foundation exam of APMG. Training Day 1 - AgilePM Foundation Topics What is Agile? Choosing an appropriate Agile approach philosophy, principles and project variables preparing for success The DSDM Process Training Day 2 - AgilePM Foundation Topics The People ? DSDM Roles and Responsibilities The DSDM Products Key practices ? prioritization and timeboxes Training Day 3 - AgilePM Foundation Topics Planning and control throughout the lifecycle Other practices: facilitated workshops, modeling and iterative development
Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Describe typical uses of static, aggregate, and generated routes. Configure and monitor static, aggregate, and generated routes. Explain the purpose of Martian routes and add new entries to the default list. This two-day course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol independent routing feature. Chapter 1: Course Introduction Course Introduction Chapter 2: Protocol-Independent Routing Static Routes Aggregated Routes Generated Routes Martian Addresses Routing Instances Chapter 3: Load Balancing and Filter-Based Forwarding Overview of Load Balancing Configuring and Monitoring Load Balancing Overview of Filter-Based Forwarding Configuring and Monitoring Filter-Based Forwarding Chapter 4: Open Shortest Path First Overview of OSPF Adjacency Formation and the Designated Router Election OSPF Scalability Configuring and Monitoring OSPF Basic OSPF Troubleshooting Chapter 5: Border Gateway Protocol Overview of BGP BGP Attributes IBGP Versus EBGP Configuring and Monitoring BGP Chapter 6: IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels Chapter 7: High Availability Overview of High Availability Networks GR Graceful RE Switchover Nonstop Active Routing BFD VRRP Appendix A
Duration 1 Days 6 CPD hours This course is intended for System administrators, security operations personnel including analyst and managers. Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of application control. Manage and configure the Carbon Black App Control server based on organizational requirements. Create policies to control enforcement levels and agent functionality. Implement rules to support the organization's security posture. Use the Carbon Black App Control tools to understand agent and server data. This course teaches you how to use the VMware Carbon Black© App ControlTM product and leverage the capabilities to configure and maintain the system according to their organization?s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Login Accounts and Groups User accounts User roles Policies Modes and Enforcement Levels Rule sets Notifiers Agent side display notification use Computer Details View agent information Related views Local Approval Timed Policy Override Use case and functionality Software Approvals Methods and use cases Custom Rules Rule type and use cases Tools Meters and Alerts Events Agent and server events Baseline Drift Changes in a baseline
Duration 1 Days 6 CPD hours This course is intended for After taking this course, you should be able to: Describe cloud architecture, administration, and licensing Understand hardware and features of all product families Implement best practices for troubleshooting and when to contact support Overview After taking this course, you should be able to: Implement core configurations for a full stack solution in the Meraki Dashboard Deploy foundational Meraki product features to meet basic IT requirements Understand and leverage essential Meraki Dashboard tools for troubleshooting The Engineering Cisco Meraki Solutions Part 1 (ECMS1) v2.1 is an introductory course that equips you with the technical knowledge and skills to confidently operate Cisco Meraki solutions as a unified management system of an entire network from a centralized dashboard. Through a full day of instruction including live demos and guided lab practice, you will learn how to implement core configurations for a full stack solution in the Meraki Dashboard and leverage essential Meraki Dashboard tools to enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on managed devices. This is the first of two courses that prepare you for the Cisco Meraki Solutions Specialist certification exam. Describing the Cloud and the Cisco Meraki Dashboard Single Pane of Glass Management Cisco Meraki Full Stack Capabilities Describing Cisco Meraki Products and Administration Cisco Meraki MX Security and SD-WAN Appliance Cisco Meraki MS Switches Describing Cisco Meraki Troubleshooting Cisco Meraki Dashboard Sync and Real-Time Tools Integration of Cisco Meraki Monitoring and Troubleshooting Tools in Existing Systems
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer This is a two day instructor-led course that focuses on the skills and knowledge needed to implement and configure a Cisco TelePresence Management Suite and Cisco TelePresence Management Suite Extensions. Students will configure TMS, TMSPE, TMSXE, VCS and UCM for management of endpoints. Students will also learn to Configure and Schedule Conferencing, Administrative Tasks, Set up Microsoft Active Directory Users, Manage Conferences and Provision Devices. Installing Cisco Telepresence Management Server Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Release and Option Keys Upgrading TMS Backup TMS Configuring Cisco TelePresence Management Suite (TMS) Initial Configuration Endpoint Configuration Adding User Accounts and Profiles Groups and Permissions Active Directory Lookup Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS Direct Managed Endpoint Features CUCM Configuration for TMS Direct Endpoint Management ? CUCM TMS Responsibilities CUCM Responsibilities Findme Configuration Phonebooks & Phonebook Sources Booking Conferencing Conference Creation Advanced Conference Settings Booking & Scheduling Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Reporting on TMS Reporting Basics Creating a Report Using Reporting Templates Bridge Utilization Call Detail Records Billing Code Statistics Conferences System Managing and Troubleshooting TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Manage and configure the Carbon Black App Control sever based on organizational requirements. Implement rules to support business processes and automatic approvals. Identify scenarios and use cases for Custom rules and Event rules. Describe common troubleshooting scenarios for the Carbon Black App Control server. Describe common troubleshooting scenarios for the Carbon Black App Control Windows agent. This course teaches you how to configure and scope the rules within VMware Carbon Black© App ControlTM product to maintain the system according to your organization?s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Custom Rules Basics Execute / Write action rules Precedence Paths tom Rules Best Practices Rule Triad Rule multiplication Rule Types Custom rule type overview Optimizing Custom Rules Evaluating events Event Rules Creating and editing Testing before implementing Creating and editing Testing before implementing Server versus agent issues Server Capabilities Tools, logs, common issues, scenarios Agent Capabilities Tools, logs, common issues, scenarios
Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights
Duration 2 Days 12 CPD hours This course is intended for System Engineers/Administrators; Backup/Virtualization Administrators; Solution Architects/Consultants Overview By the end of the course, students should be able to:Maximize your expertise on consulting/professional services for the Veeam Availability Suite solutionAim for the VMCA title and comply with some of the certifications requirements for Platinum ProPartners and Veeam Accredited Service Partners (VASPs)Gain professional advantage with the highest level of Veeam technical certification This course covers Veeam Availability Suite? design and optimization and is based on best practices from Veeam solutions architects. IntroductionDesign & Sizing DNS and name resolution Veeam backup server Backup and replication database Proxy server Transport modes Repository server WAN accelerator Interaction with hypervisors Infrastructure Stages of Proof of Concept Assessment using Veeam ONE? Important data to collect (Veeam ONE + infrastructure accounts) Security Permissions Design Scenario: Part 1 Discovery Create a design based on the customer environment Optimizations Backup and replication database Proxy server Repository server WAN accelerator Tape Veeam Backup Enterprise Manager Indexing Antivirus on Veeam servers and guest VM (if VSS is used) Protecting Veeam Backup & Replication? configuration Design Scenario: Part 2 Create a design based on the customer?s evolving environment Automation Veeam backup server VMware vSphere tags Audit & Compliance Auditing Compliance SureBackup© and SureReplica Troubleshooting Deep dive into reading log files Common issues Troubleshooting mode (SureBackup/SureReplica)