SolarWinds NPM training course description A hands on course providing a solid foundation on network management using SolarWinds. The course specifically focusses on SolarWinds Orion Network Performance Monitor. The course starts with configuring agents and device discovery, onto exploiting SNMP with SolarWinds and then Alerts, reports and customisation of menus, views and maps. What will you learn Discover devices using Solarwinds. Use Solarwinds. Poll and monitor devices using Solarwinds. Create Alarms and reports. Diagnose faults using Solarwinds. SolarWinds NPM training course details Who will benefit: Technical staff working with Solarwinds. Prerequisites: None. Duration 2 days SolarWinds NPM training course content Getting started with SolarWinds What is SolarWinds, Products, ICMP, WMI, SNMP. Installing SolarWinds. Hands on Connecting to SolarWinds, configuring users and groups, using SolarWinds. Device discovery with SolarWinds Manual discovery, automatic discovery, controlling IP discovery, polling, thresholds. Hands on Adding ICMP only, SNMP and WMI nodes. dependencies, groups. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs, SNMPv3, obtaining MIB information. Universal device poller. Hands on MIB browser, MIB walking, syslog. Message center. Using SolarWinds The home page, Views, changing views, adding views. Hands on Views and menu customisation. Server monitoring. Alerts Filters, acknowledgements, notes. Basic alert configuration, Advanced alert configuration. Hands on Configuring alerts. Reports Creating reports, on demand reports, scheduled reports, customising reports, adding reports to views. Standard reports. Hands on Performance reports. Graphs. Maps Orion Network Atlas, the background, adding objects, connect now, applying to views. Hands on Customising a map. Administration Backups, the database.
Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco
Server Load Balancing course description This two-day Server Load Balancing course introduces the concepts of SLB from the reasons to implement, through the basics and then onto details studies of load distribution, health checks, layer 7 switching and Global SLB. What will you learn Explain packet paths when implementing SLB. Recognise the impact of different topologies. Evaluate SLB load distribution methods. Describe how load balancers can improve security. Explain how GSLB works. Server Load Balancing course details Who will benefit: Anyone working with SLB. Prerequisites: None. Duration 2 days Server Load Balancing course contents Introduction Concept, reasons, benefits, alternatives. Other features: Security, Caching. SLB concepts Architectures, Virtual servers, real servers, Virtual IP address, health checks. DNS load balancing. Packet walk using SLB. Load balancing 6 modes of bonding and load balancing without SLB. ISP load balancing. Health. Distribution policies: Round Robin, least connections, weighted distributions, response time, other variations. Persistent versus concurrent. Layer 4 switching L2 SLB, L3 SLB, single arm SLB, DSR, more packet walking, TCP versus UDP, Port numbers. Layer 7 switching Persistence. Cookie switching, Cookie hashing, Cookie insertion, URL switching, URL Hashing, SSL. Health checks Layer 3: ARP, ping. Layer 4: SYN, UDP. Layer 7: HTTP GET, Status codes, HTTP keepalives, content verification, SSL. Other application keepalives. What to do after failure and recovery. Security DOS attack protection, SYN attack protection, Rate limiting: connections, transactions. SSL offload. Redundancy Hot standby, Active standby, Active active. Stateful, stateless. VRRP, STP. GSLB Anycasting. DNS, TTL, DNS load balancing, problems with DNS load balancing,. HTTP redirect, health, thresholds, round trip times, location.
The Wheel Building Masterclass with Vince Warner Ready to Elevate Your Wheel Building Skills? Imagine Building Every Wheel with Confidence and Precision. That's What Mastery Feels Like. I started to learn to build wheels in 1967. My dad always said if you can count to 4 you can learn to build wheels, and as soon as I could count to 4 he had to prove to everybody that he was right. I was approaching my 4th birthday when he took me into his workshop and started to show me his trade secrets. I don't for one moment think you need to start at 3 years old to become an excellent wheel builder, but I do believe you need to be shown the techniques clearly by an experienced craftsman. Join Me in My Workshop for the Ultimate Learning Experience. What You'll Gain: Confidence in every wheel you build A high professional standard in all your projects The ability to charge for your expertise (if you wish to) The Masterclass Includes: Full access to all video training modules Personalised instruction from me, Vince Warner 4 full days of intensive training Exclusive private one-to-one attention A certificate showing you have completed the masterclass And Lunch is on Me, Every Day! Enjoy complimentary lunch, along with tea, coffee, cold drinks, and snacks throughout the day.
Signalling training course description An intensive course that defines and explores the signalling methods that are to be found in today's telecommunications services. What will you learn Describe the Functionality and Features of Signalling. Describe the Functionality of Analogue & Digital Subscriber Signalling. Describe the various types of signalling used on different network types. Describe the Functionality of Private Network Signalling. Describe the Functionality of Public Network Signalling. Signalling training course details Who will benefit: Personnel involved with systems design, implementation and support. Prerequisites: Telecommunications Introduction Duration 2 days Signalling training course contents Introduction What is Signalling?, Standards, ITU-T Recommendations, Signalling Categories - Supervisory Addressing, E.164, Call Information, Network Management, Network Components, Inband/Outband Switch Signalling, Analogue Vs Digital Signalling. Analogue Subscriber Signalling Analogue Local Loops/Switches/Trunks, Digital Switches/Local Loops, Telephone Handset, Accessing the Local Exchange, Pulse/Tone Dialling. Digital Subscriber Signalling Integrated Digital Access, DASS2 & DPNSS, DASS2 - Call, IMUX, Euro ISDN, Q.931 Call Control, Message Identification, Message Types, Call Establishment Messages, Call Clearing. Network Types Service Types, Circuit Switched, Packet Switched, Signalling Terminology, In-Channel Signalling, G.704, Performance and Quality, Digital Signalling, CAS, CAS Applications, Foreign Exchange, CCS, Break-In/Out Private Network Signalling Types Networking PABXs, Inter PABX Analogue Signalling Methods, E & M, Tone-On-Idle, Inter PABX Digital Signalling Methods, DPNSS, DPNSS Deployment, PABX Support for DPNSS, DPNSS Call, Q.Sig, Q.Sig support/functionality/protocol, Message Overview, Call Establishment. Public Network Signalling SS7, SS7 Operations, SS7 Topology, SSP, STP, SCP, Database Types - CMSDB NP LIDB HLR VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, SS7 addressing, Point Codes, Sub-System, Global Title Addressing and Translation, ANSI PCs, ITU-T PCs, SS7 Protocol Stack, MTP Level 1, MTP Level 2, Flow Control, FISU, LSSU, MSU, MSU SIF, MTP Level 3, SCCP, TCAP, TUP, Facility Format, Main Facilities, Flow Control Negotiation, Closed User Groups, Reverse Charging, Fast Select Facility, Throughput Class Negotiation, Call Barring, On-Line Facility Registration. BTUP, ISDN ISUP, Supplementary Services, ISUP Call - IAM, Progress/Answer/Suspend/ Resume/Release Messages, Intelligent Network (IN) Introduction, IN Evolution, IN Conceptual Model, IN Target Services & Service Features, Service Independent Building Blocks
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
Peering at LINX training course description A one or two day induction course covering the technical procedures of LINX along with correct interaction with LINX and LINX members. This course focuses on the implementation of the technologies within the LINX network. For those already competent in BGP the one day version of this course is sufficient. What will you learn Explain the role of LINX in the Internet. Correctly connect to LINX. Recognise the correct procedures for peering at LINX. Use the current Best Current Practices. Peering at LINX training course details Who will benefit: Technical staff of new LINX members. Technical staff of companies preparing to join LINX. Non technical staff may also benefit from this course. Prerequisites: None. (For technical staff with BGP knowledge 1 day) Duration 1 to 2 days Peering at LINX training course contents Introduction and review Networks, The Internet, IP, routers, Autonomous systems, the structure of the Internet, the role of Internet Exchanges. BGP and peering. LINX, EuroIX, RIPE. What you get when you join LINX. LINX products: Connexions, Virtual PoPs, Colocation resales, LINX from anywhere. LINX infrastructure The original architecture, The growth of LINX, the current topology. LINX London locations. Dual LAN topology. LON1, LON2. Use of MPLS to connect London sites. Regional peering: LINX NoVa, LINX Manchester, LINX Wales, LINX Scotland, ManxIX, JEDIX. Connecting with LINX nnecting with LINX Locations. 1/10/100/400G. Interface specifications. Link aggregation. The racks and space provided, access to the racks, connecting WAN circuits into LINX. The connection form, How to link your ISP with LINX, switch assignments, limits on traffic, average measured traffic, getting statistics from LINX, Using looking glass. Allowed traffic. Port security Configuration hints LINX IP details, IPv4, IPv6, PTR records, Cisco base configuration, Juniper base configuration. Peering with other LINX members Preparing for peering, the peering template, setting up the peering, RFC 2142, the RIPE database, contacts, peeringdb.net, solving downed BGP sessions, escalation procedures. Peering configuration hints Cisco BGP configuration, Juniper BGP configuration. LINX additional services Private interconnect, LINX time service. NTP, Strata. The LINX route server Bi lateral peering, Multi lateral peering. How the LINX route server is configured. Use of communities on the route server, template for peering with the route server. Summary Getting further information, the LINX website, the LINX mailing lists.
Emotional Intelligence (In-Person) Emotional Intelligence is a set of emotional and social skills that collectively establish how well we: Perceive and express ourselves Develop and maintain social relationships Cope with challenges Use emotional information in an effective and meaningful way It is a skill set that transfers across all categories of relationships. It is also a predictor of success - both in life and at work. This highly-interactive course delivers a practical approach to developing, improving, and sustaining effective and mutually beneficial relationships. The design of the course involves individual reflection and paired activities, interwoven with small and large group interactions. The EQ-i 2.0® assessment reports will be debriefed over the course of the two days. In addition, participants will delve into their personal strengths and blind spots, and will explore topics including: the neuroscience of emotion, the connection between empathy and performance, and how communication styles impact our perceptions of self and other. Role-play activities give participants the opportunity to try out new behaviors and techniques. The program includes: A personal behavioral profile, the results of which you will bring to your training 2-day highly interactive workshop and experiential learning Optional professional coaching activities initiated in class that can continue over the four months after class ends What you will Learn Recognize your interpersonal strengths and potential blind spots regarding Emotional Intelligence Identify the five domains within the EQ-i 2.0 assessment model Summarize what neuroscience research has discovered about emotions and actions Recognize ways that human beings are physiologically impacted by stress Articulate ways to develop and maintain strong working relationships Describe how emotional intelligence translates into high performance Make use of the EI model and associated competencies Employ strategies for enhancing leadership through Emotional Intelligence Getting Started Foundation Concepts The biology of emotion Why Emotional Intelligence matters The impact of EI on performance The EQ-I 2.0 Model Overview of the EQ-i 2.0 framework Exploring your report Balancing your EI domains Self: Awareness and Sensitivity Self-awareness and empathy Perception vs. reality Acting by choice, not impulse Other: Communication and Relationship-Building Elements of effective communication Communication styles Communication techniques Neuroscience and Behavioral Change Insights from social neuroscience Making a change Summary and Next Steps
Conflict Resolution Skills (In-Person) Many organizations have assumed that workplace conflict is always destructive. So, they have often believed that conflict is best dealt with by managers or even via policies and procedures. After all, conflict creates workplace stress and leads to many performance problems, generating very real organizational costs! However, savvy organizations have embraced the fact that when conflict is understood and harnessed, it can be leveraged to add value to teams and even enhance performance. With the right knowledge, skills, training, and practice, conflict can be productive and make organizations better! In this highly interactive course, learners will discover the connection between individual conflict response and team-empowering conflict resolution skills. Participants will explore conflict's visceral dynamics and the nuanced behaviors we individually engage in to communicate and respond to conflict. Learners will apply techniques for transforming unproductive conflict responses into productive ones. Additionally, learners will use a systematic method that prepares them to objectively dissect real-world conflict, while practicing many strategies for resolving it. They will also develop proactive conflict approach plans, which they can transfer back to their own workplaces. What you will Learn At the end of this program, you will be able to: Recognize the organizational costs of conflict Explain our physical and mental responses to conflict Communicate proactively and effectively with different types of people during conflict Replace unproductive conflict responses with productive ones Use the Conflict Resolution Diagram (CRD) process and conflict resolution approaches Relate team stages of development to shifts in conflict Develop a proactive conflict approach for your organization Create a conflict resolution plan for a real-world scenario Getting Started Introductions and social agreements Course goal and objectives Opening activities Conflict Facilitation Readiness Conflict responses and perceptions Conflict basics Conflict and organizations Dynamics of conflict Conflict Styles and Communication A look at the color energies model Conflict through the color energies and DiSC® lens Communication with opposite color energies Individual Response to Conflict The anatomy of conflict Recognizing unproductive conflict responses 4 steps to productive conflict Choosing productive conflict responses Team Performance and Conflict High-performing team relationships Conflict and project team performance Conflict Resolution Diagram (CRD) and process Conflict Facilitation - Preparation Recognizing context and stakeholder needs Using team conflict resolution approaches Preparing for Crucial Conversations® Conflict Facilitation - Clarity Exposing assumptions and biases Defining the conflict and using the CRD Conflict Facilitation - Action Proactive conflict management Conflict facilitation practice Summary and Next Steps Review Personal action plans