Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network Administrators Administrators interested in Automation Individuals interested in devops, specifically for networking Overview This course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day's topics and demonstrations. No two networks are the same! Learn to automate your network with a Python and Ansible skillset. Course can be taught across all major (and most minor) network vendors. Course demonstrations can be adapted to best-fit the customer?s network to ensure all lessons have maximum relevance. Day 1 ? Critical Python Catchup & Review Overview of Python and Ansible Python white space rules & best practices Printing and more Printing Date types and Variables Packing and Unpacking Variables f Strings Conditional expressions Relational and Boolean operators Lists, Tuples, Dictionaries Indexing and slicing Built-in functions Iterating with Loops (for and while) Working with files Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.) Using Python to access REST interfaces Working with JSON Python, Ansible and Paramiko Using Paramiko to SSH with keys and passwords RESTful API review API keys Paramiko Review Using Paramiko to SFTP with keys and passwords Day 02 ? Python and Network Automation Introduction to Netmiko (automating routers and switches) Using Netmiko to send commands to / from network devices Working with YAML Converting JSON to YAML with Python Ansible keywords YAML and JSON for data exchange Ansible and YAML Ansible Playbook components Tying together Python and Ansible ? Using Python within Ansible Ansible Network Modules What is new in Ansible (most current updates / release notes) Network Agnostic modules Writing network playbooks Reviewing the construction of network playbooks Writing Ansible playbooks that respond to network failures Day 03 ? Blending Python and Ansible Skillsets Review how to use Python within Ansible Calling Python scripts with Ansible Jinja2 Templating Engine for Python (and Ansible) Using Templates in Ansible playbooks Jinja2 filters, looping, and other useful tricks for automating with Ansible Playbook tagging for selective runs When to use Python and when to use Ansible ?Big Picture? options for using Python & Ansible within your Network Ansible Roles Day 04 ? Customizing Ansible with Python Review ? Running Scripts with Ansible Prompting for Ansible user input Ansible Galaxy & Getting at Roles Writing a custom Ansible Module with Python Ansible ?Engine? vs Ansible ?Tower? ? marketing hype, capabilities, costs, etc. Case Study: Automate your Enterprise Network When to use Python and when to use Ansible Writing your own Ansible modules in Python ?Big Picture? options for using Python & Ansible within your Network Overview ? NETCONF / YANG and what they mean for Python and Ansible Molecule ? Testing your roles Additional course details: Nexus Humans Network Automation with Python and Ansible training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Automation with Python and Ansible course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Network design engineers Network engineers System administrators Overview After taking this course, you should be able to: Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise network Design Open Shortest Path First (OSPF) internal routing for the enterprise network Design Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise network Design a network based on customer requirements Design Border Gateway Protocol (BGP) routing for the enterprise network Describe the different types and uses of Multiprotocol BGP (MP-BGP) address families Describe BGP load sharing Design a BGP network based on customer requirements Decide where the L2/L3 boundary will be in your Campus network and make design decisions Describe Layer 2 design considerations for Enterprise Campus networks Design a LAN network based on customer requirements Describe Layer 3 design considerations in an Enterprise Campus network Examine Cisco SD-Access fundamental concepts Describe Cisco SD-Access Fabric Design Design a Software-Defined Access (SD-Access) Campus Fabric based on customer requirements Design service provider-managed VPNs Design enterprise-managed VPNs Design a resilient WAN Design a resilient WAN network based on customer requirements Examine the Cisco SD-WAN architecture Describe Cisco SD-WAN deployment options Design Cisco SD-WAN redundancy Explain the basic principles of QoS Design Quality of Service (QoS) for the WAN Design QoS for enterprise network based on customer requirements Explain the basic principles of multicast Designing rendezvous point distribution solutions Describe high-level considerations when doing IP addressing design Create an IPv6 addressing plan Plan an IPv6 deployment in an existing enterprise IPv4 network Describe the challenges that you might encounter when transitioning to IPv6 Design an IPv6 addressing plan based on customer requirements Describe Network APIs and protocols Describe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF) The Designing Cisco Enterprise Networks (ENSLD) v1.1 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on the topics covered in the Implementing and Operating Cisco© Enterprise Network Core Technologies (ENCOR) v1.0 course.This course also helps you prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam which is part of the CCNP© Enterprise and Cisco Certified Specialist - Enterprise Design certifications. Course Outline Designing EIGRP Routing Designing OSPF Routing Designing IS-IS Routing Design Case Study Activity: Designing Enterprise Connectivity Designing BGP Routing and Redundancy Understanding BGP Address Families and Attributes Design Case Study Activity: Designing an Enterprise Network with BGP Internet Connectivity Designing the Enterprise Campus LAN Designing Layer 2 Campus Design Case Study Activity: Designing an Enterprise Campus LAN Designing Layer 3 Campus Discovering the Cisco SD-Access Architecture Exploring Cisco SD-Access Fabric Design Exploring Cisco SD-Access Site Design Strategy and Considerations Design Case Study Activity: Designing Cisco SD-Access in the Enterprise Designing Service Provider-Managed VPNs Designing Enterprise-Managed VPNs Designing WAN Resiliency Design Case Study Activity: Designing Resilient Enterprise WAN Examining Cisco SD-WAN Architectures Examining Cisco SD-WAN Deployment Design Considerations Designing Cisco SD-WAN Routing and High Availability Design Case Study Activity: Designing Resilient Enterprise Cisco SD-WAN Understanding QoS Designing LAN and WAN QoS Design Case Study Activity: Designing QoS in an Enterprise Network Exploring Multicast with Protocol-Independent Multicast-Sparse Mode (PIM-SM) Designing Rendezvous Point Distribution Solutions Designing an IPv4 Address Plan Exploring IPv6 Deploying IPv6 Design Case Study Activity: Designing an Enterprise IPv6 Network Introducing Network APIs and Protocols Exploring YANG, NETCONF, RESTCONF, and Model-Driven Telemetry Additional course details: Nexus Humans Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Enterprise Networks v1.1 (ENSLD) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACIâ¢) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System⢠(Cisco UCS) Describe Cisco HyperFlex⢠infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 course helps you prepare for the Cisco CCNP Data Center and CCIE Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System (Cisco UCS) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. This course also earns you 64 Continuing Education (CE) credits towards recertification. This course, including the self-paced material prepares you to take the exam: 350-601 Implementing Cisco Data Center Core Technologies (DCCOR) This course will help you: Gain experience implementing, securing and automating network, compute, and storage infrastructure Gain knowledge and skills through Cisco?s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software Qualify for professional and expert-level job roles in the high-demand area of enterprise-class data center environments Earn 64 CE credits toward recertification This course will help you prepare to take the 350-601 DCCOR exam. This exam tests your knowledge of implementing core data center technologies including network, compute, storage network, automation, and security. After you pass 350-601 DCCOR: You earn the Cisco Certified Specialist - Data Center Core certification and you satisfy the core requirement for these certifications: CCNP Data Center CCIE Data Center Implementing Data Center Switching Protocols* Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols* Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center* Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center* IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security* User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network* Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations* Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts* Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security* User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations* Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors* Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems* Hyper converged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations* Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools* Cisco NX-OS
Duration 5 Days 30 CPD hours This course is intended for Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Overview After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACIâ¢) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System⢠(Cisco UCS) Describe Cisco HyperFlex⢠infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies This course helps you prepare for the CiscoÿCCNPÿData Center and CCIEÿData Center certifications. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center. Implementing Data Center Switching Protocols* Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols* Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center* Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center* IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security* User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network* Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations* Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts* Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security* User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations* Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors* Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems* Hyper converged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations* Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools* Cisco NX-OS Additional course details: Nexus Humans Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Audience: Data Scientists, Software Developers, IT Architects, and Technical Managers. Participants should have the general knowledge of statistics and programming Also familiar with Python Overview ? NumPy, pandas, Matplotlib, scikit-learn ? Python REPLs ? Jupyter Notebooks ? Data analytics life-cycle phases ? Data repairing and normalizing ? Data aggregation and grouping ? Data visualization ? Data science algorithms for supervised and unsupervised machine learning Covers theoretical and technical aspects of using Python in Applied Data Science projects and Data Logistics use cases. Python for Data Science ? Using Modules ? Listing Methods in a Module ? Creating Your Own Modules ? List Comprehension ? Dictionary Comprehension ? String Comprehension ? Python 2 vs Python 3 ? Sets (Python 3+) ? Python Idioms ? Python Data Science ?Ecosystem? ? NumPy ? NumPy Arrays ? NumPy Idioms ? pandas ? Data Wrangling with pandas' DataFrame ? SciPy ? Scikit-learn ? SciPy or scikit-learn? ? Matplotlib ? Python vs R ? Python on Apache Spark ? Python Dev Tools and REPLs ? Anaconda ? IPython ? Visual Studio Code ? Jupyter ? Jupyter Basic Commands ? Summary Applied Data Science ? What is Data Science? ? Data Science Ecosystem ? Data Mining vs. Data Science ? Business Analytics vs. Data Science ? Data Science, Machine Learning, AI? ? Who is a Data Scientist? ? Data Science Skill Sets Venn Diagram ? Data Scientists at Work ? Examples of Data Science Projects ? An Example of a Data Product ? Applied Data Science at Google ? Data Science Gotchas ? Summary Data Analytics Life-cycle Phases ? Big Data Analytics Pipeline ? Data Discovery Phase ? Data Harvesting Phase ? Data Priming Phase ? Data Logistics and Data Governance ? Exploratory Data Analysis ? Model Planning Phase ? Model Building Phase ? Communicating the Results ? Production Roll-out ? Summary Repairing and Normalizing Data ? Repairing and Normalizing Data ? Dealing with the Missing Data ? Sample Data Set ? Getting Info on Null Data ? Dropping a Column ? Interpolating Missing Data in pandas ? Replacing the Missing Values with the Mean Value ? Scaling (Normalizing) the Data ? Data Preprocessing with scikit-learn ? Scaling with the scale() Function ? The MinMaxScaler Object ? Summary Descriptive Statistics Computing Features in Python ? Descriptive Statistics ? Non-uniformity of a Probability Distribution ? Using NumPy for Calculating Descriptive Statistics Measures ? Finding Min and Max in NumPy ? Using pandas for Calculating Descriptive Statistics Measures ? Correlation ? Regression and Correlation ? Covariance ? Getting Pairwise Correlation and Covariance Measures ? Finding Min and Max in pandas DataFrame ? Summary Data Aggregation and Grouping ? Data Aggregation and Grouping ? Sample Data Set ? The pandas.core.groupby.SeriesGroupBy Object ? Grouping by Two or More Columns ? Emulating the SQL's WHERE Clause ? The Pivot Tables ? Cross-Tabulation ? Summary Data Visualization with matplotlib ? Data Visualization ? What is matplotlib? ? Getting Started with matplotlib ? The Plotting Window ? The Figure Options ? The matplotlib.pyplot.plot() Function ? The matplotlib.pyplot.bar() Function ? The matplotlib.pyplot.pie () Function ? Subplots ? Using the matplotlib.gridspec.GridSpec Object ? The matplotlib.pyplot.subplot() Function ? Hands-on Exercise ? Figures ? Saving Figures to File ? Visualization with pandas ? Working with matplotlib in Jupyter Notebooks ? Summary Data Science and ML Algorithms in scikit-learn ? Data Science, Machine Learning, AI? ? Types of Machine Learning ? Terminology: Features and Observations ? Continuous and Categorical Features (Variables) ? Terminology: Axis ? The scikit-learn Package ? scikit-learn Estimators ? Models, Estimators, and Predictors ? Common Distance Metrics ? The Euclidean Metric ? The LIBSVM format ? Scaling of the Features ? The Curse of Dimensionality ? Supervised vs Unsupervised Machine Learning ? Supervised Machine Learning Algorithms ? Unsupervised Machine Learning Algorithms ? Choose the Right Algorithm ? Life-cycles of Machine Learning Development ? Data Split for Training and Test Data Sets ? Data Splitting in scikit-learn ? Hands-on Exercise ? Classification Examples ? Classifying with k-Nearest Neighbors (SL) ? k-Nearest Neighbors Algorithm ? k-Nearest Neighbors Algorithm ? The Error Rate ? Hands-on Exercise ? Dimensionality Reduction ? The Advantages of Dimensionality Reduction ? Principal component analysis (PCA) ? Hands-on Exercise ? Data Blending ? Decision Trees (SL) ? Decision Tree Terminology ? Decision Tree Classification in Context of Information Theory ? Information Entropy Defined ? The Shannon Entropy Formula ? The Simplified Decision Tree Algorithm ? Using Decision Trees ? Random Forests ? SVM ? Naive Bayes Classifier (SL) ? Naive Bayesian Probabilistic Model in a Nutshell ? Bayes Formula ? Classification of Documents with Naive Bayes ? Unsupervised Learning Type: Clustering ? Clustering Examples ? k-Means Clustering (UL) ? k-Means Clustering in a Nutshell ? k-Means Characteristics ? Regression Analysis ? Simple Linear Regression Model ? Linear vs Non-Linear Regression ? Linear Regression Illustration ? Major Underlying Assumptions for Regression Analysis ? Least-Squares Method (LSM) ? Locally Weighted Linear Regression ? Regression Models in Excel ? Multiple Regression Analysis ? Logistic Regression ? Regression vs Classification ? Time-Series Analysis ? Decomposing Time-Series ? Summary Lab Exercises Lab 1 - Learning the Lab Environment Lab 2 - Using Jupyter Notebook Lab 3 - Repairing and Normalizing Data Lab 4 - Computing Descriptive Statistics Lab 5 - Data Grouping and Aggregation Lab 6 - Data Visualization with matplotlib Lab 7 - Data Splitting Lab 8 - k-Nearest Neighbors Algorithm Lab 9 - The k-means Algorithm Lab 10 - The Random Forest Algorithm
Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation
Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation
Duration 70 Days 420 CPD hours Cisco Learning Library: Networking offers a subscription to all Cisco core online networking training, including product training, technology training, and certifications such as Cisco Routing and Switching, Wireless, Design, and Network Programmability.This comprehensive technical training library includes full-length, interactive certification courses, additional product and technology training with labs, and thousands of reference materials. Networking Library Certification Courses CCNA Implementing and Administering Cisco Solutions (CCNA) v1.0 CCNP Enterprise Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Designing Cisco Enterprise Wireless Networks (ENWLSD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 CCIE Enterprise Infrastructure Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 CCIE Enterprise Wireless Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Product and Technology Training Implementing and Administering Cisco Solutions (CCNA) v1.0 Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC) v1.0 Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) v1.0 Developing Solutions Using Cisco IoT and Edge Platforms (DEVIOT) v1.0 Implementing DevOps Solutions and Practices Using Cisco Platforms (DEVOPS) v1.0 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.0 Implementing Automation for Cisco Enterprise Solutions (ENAUI) v1.0 Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 Implementing Automation for Cisco Data Center Solutions (DCAUI) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 Introducing Automation for Cisco Solutions (CSAU) v1.0 Cisco Certified Technician Supporting Cisco Routing and Switching Network Devices (RSTECH) v3.0 Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 Implementing Cisco SD-WAN Solutions (SDWAN300) v1.0 Designing Cisco Enterprise Networks (ENSLD) v1.0 Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Cisco NCS 2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 Cisco Digital Network Architecture Implementation Essentials (DNAIE) v2.0 Understanding Cisco Industrial IoT Networking Foundation (INFND) v1.0 Programming Use Cases for Cisco Digital Network Architecture v1.0 (DNAPUC) v1.0 Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.0 Deploying Cisco SD-Access (ENSDA) v1.1 Cisco SD-WAN Operation and Deployment (ENSDW) v1.0 Introduction to Cisco IOS XR (IOSXR100) v2.0 Cisco IOS XR System Administration (IOSXR200) v1.1 Cisco IOS XR Basic Troubleshooting (IOSXR201) v1.1 Cisco ASR 9000 Series IOS XR 64-Bit Software Migration and Operational Enhancements (IOSXR211) v1.0 Cisco IOS XR Layer 3 VPN Implementation and Verification (IOSXR301) v1.1 Cisco IOS XRMulticast Routing Implementation and Verification (IOSXR302) v1.1 Cisco IOS XR Broadband Network Gateway Implementation and Verification (IOSXR304) v1.0 NSO Essentials for Programmers and Network Architects (NSO201) v3.0 Cisco NSO Administration and DevOps (NSO303) v3.0 Cisco Optical Technology Advanced (OPT300) v2.0 Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 Operating and Implementing Cisco WAN Automation Engine (WAE200) v3.0 Implementing Cisco Virtual Wide Area Application Services (VWAAS) v1.0 Configuring and Operating Cisco EPN Manager (EPNM100) v3.0 Cisco Elastic Services Controller (ESC300) v2.0 Product and Technology Training Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V (CLDCSR) v1.0 Implementing Cisco Multicast (MCAST) v2.0 Cisco Prime Central Intermediate ? Administration and Operations (CPCI-AO) v1.0 Cisco Prime Network Intermediate ? Administration and Operation (CPNI-AO) v1.1 Cisco Prime Provisioning (CPP) v6.5 Cisco Prime Performance Manager (CPPERF) v1.0 Implementing Cisco Catalyst 9000 Switches (ENC9K) v1.0 Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE) v6.0 Network Convergence System 5500 Series Router (NCS5500HW) v1.0 Cisco DNA Center Fast-Start Use Cases (A-SDA-FASTSTART) Getting Started with DNA Center Assurance (A-DNAC-ASSUR) v1.0 Overview of Cisco DNA Center Fast Start Use Cases for System Engineers (P-SDA-SYSEF) Planning and Deploying SD-Access Fundamentals (For Customers) (CUST-SDA-FUND) v1.0 Preparing the Identity Services Engine (ISE) for SD-Access (For Customers) (CUST-SDA-ISE) v1.0 SD-Access 1.2 Update Supplement (A-SDA-12UPDT) The SD-WAN Mastery Collection - Getting Started (For Customers) v1.0 (A-SDW-START) The SD-WAN Mastery Collection - Deploying the Data Plane (For Customers) v1.0 (A-SDW-DATPLN) The SD-WAN Mastery Collection - Developing the Overlay Topology (For Customers) v1.0 (A-SDW-OVRLAY) The SD-WAN Mastery Collection - Managing the Application Experience (For Customers) v1.0 (A-SDW-APPEXP) The SD-WAN Mastery Collection - Bringing Up the Control Plane Devices (For Customers) v1.0 (A-SDW-CTRPLN) Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC) Programming for Network Engineers (PRNE) v1.0 Cisco Optical Technology Intermediate (OPT200) v2.0 Advanced Implementing and Troubleshooting MPLS VPN Networks (AMPLS) BGP Bootcamp (BGP) Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN) Configuring BGP on Cisco Routers (BGP) v4.0 Implementing Cisco MPLS v3.0 Internetworking Technology Overview (ITO) Introduction to IP Multicast Bootcamp Introduction to IPsec VPN Bootcamp (IPsec VPN) Introduction to IPv6 Bootcamp (IPv6) Introduction to MPLS-VPN Bootcamp (MPLS-VPN) LAN Switching Bootcamp (LAN-SW) RP Bootcamp Troubleshooting for Network Support Engineers