Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. Course Outline Course Introduction Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Backbone Bridging Configuring and Monitoring Provider Backbone Bridging Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring OAM Ethernet Ring Protection ERP Overview Configuring and Monitoring ERP LAG Overview Configuring and Monitoring a LAG
Duration 1 Days 6 CPD hours This course is intended for In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Overview Upon successful completion of this course, students will take ownership of their time management in order to achieve their goals and lead a more productive life. In this course, students will learn how to establish routines, set goals, create an efficient environment, and use time-honored planning and organizational tools to use their time more effectively. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives Setting SMART Goals The Three P's The SMART Way Prioritizing Your Goals Evaluating and Adapting The Power of Routines What is a Routine? Personal Routines Professional Routines Six Easy Ways to Simplify Your Life Scheduling Yourself The Simple Secret of Successful Time Management Developing a Tracking System Scheduling Appointments Scheduling Tasks Keeping Yourself on Top of Tasks The One-Minute Rule The Five-Minute Rule What To Do When You Feel Like You're Sinking Tackling New Tasks and Projects Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog! Using Project Management Techniques The Triple Constraint Creating the Schedule Using a RACI Chart Creating a Workspace Setting Up the Physical Layout Ergonomics 101 Using Your Computer Efficiently Organizing Files and Folders Organizing Paper Files Organizing Electronic Files Scheduling Archive and Clean-Up Managing E-Mail Using E-mail Time Wisely Taking Action! Making the Most of Your E-mail Program Taking Time Back from Handheld Devices Tackling Procrastination Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations
Duration 2 Days 12 CPD hours This course is intended for Security professionals, System engineers, channel partners, service partners, and end users with 1+ years of experience in implementing IT security technologies (Network, Applications, and Systems) and are also SNSAcertified. Overview The students will learn how to monitor, investigate, analyze, and configure SonicWall Next-Gen firewalls running SonicOS to enable advanced functionality related to Secure and Remote Connectivity, Network Optimization, and Threat Prevention. Upon successful completion of the SNSP program, the students will be able to demonstrate SonicWall product expertise and the application skill sets required to mount a proactive, effective defense against current and evolving network and cyber security threats. A key issue affecting an organization?s business productivity and employee efficiency today is its ability to respond to dynamic changes in the cyber threat landscape. Coming up on the heels of the highly successful SNSA program launched earlier this year, SonicWall now presents the SonicWall Network Security Professional (SNSP) course, an expert-level training and certification program that builds on the enterprise security skills learned in the SNSA course. Previously known as the Network Security Advance Administration (NSAA) course, the revamped SNSP curriculum expands on the topics covered in SNSA and features advanced SonicWall firewall configuration and administration tasks aimed at helping enterprises adapt to dynamic security environments. Relevant changes to the curriculum include an enhanced and deeper scope of SonicOS 6.5.x features and functionality, as well as changes in the learning and delivery methodologies to better balance the professional needs of the students and the business requirements for network and cyber security. Course Outline Course Introduction and Overview Configuring VPN Auto Provisioning Configuring Advanced Routing Configuring Advanced Interface Settings Using SonicOS CLI Configuring Capture Client Capturing and Replaying Packets Configuring DPI-SSL/TLS Server Configuring DPI-SSH Configuring App Rules Configuring App Control Configuring Advanced High Availability Excluding Trusted Content Resolving and Reporting False Positives Configuring Content Filtering Implementing Best Practices
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Cisco Unified Communications system channel partners and resellers System engineers Customers deploying and maintaining Cisco Unified Contact Center Express products. Overview Upon completing this course, the learner will be able to meet these overall objectives: Provide a comprehensive overview of the Cisco Unified Contact Center Express product suite. This overview will cover descriptions of the product, compatibility, and hardware and software options, architecture, and sizing and ordering tools. Provide a complete description of the Cisco Unified CCX installation process, the configuration required with an overview of most common configuration web pages, and describe the call flow processes needed to establish a call on Cisco Unified CCX. Describe the Cisco Unified CCX script editor, how it is installed and how to implement common IVR scripting techniques. Provide a comprehensive view of Cisco Unified CCX ACD operations to include basic contact center build-up, scripting, agent and supervisor desktop configurations, advanced scripting topics, and reporting. Describe how to install, configure and use features found in Cisco Unified CCX Premium such as, Remote Monitoring, Outbound Dialer, Agent Email, Agent Web Chat, and Automatic Speech Recognition (ASR) and Text-to-Speech (TTS). Understand how to maintain and monitor a Cisco Unified CCX system This course, Deploying Cisco© Unified Contact Center Express (UCCXD) v6.0, provides the student with hands-on experience and knowledge of tasks typically performed during contact center deployment. Cisco Unified CCX Product Overview Cisco Unified CCX Product Packages Cisco Unified CCX Architecture Designing Cisco Unified CCX Cisco Unified CCX Installation and Configuration Installing Cisco Unified CCX Managing Cisco Unified CCX Configuring Basic Properties of Cisco Unified CCX Cisco Unified CCX Scripting Understanding Script Editor Basics Creating a Basic IVR Script Prompting and Collecting Information Accessing an External Database Making Decisions Confirming Caller Input Cisco Unified CCX ACD Operations Implementing Cisco Unified CCX
Duration 3 Days 18 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. Overview Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. Course Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic.
Duration 1 Days 6 CPD hours This course is intended for Everyone dealing with day to day work environment Overview Wherever two or more people come together, there is bound to be conflict. This course will give participants a seven-step conflict resolution process that they can use and modify to resolve conflict disputes of any size. Participants will also learn crucial conflict management skills, including dealing with anger and using the Agreement Frame. Participants will learn crucial conflict management skills, including dealing with anger and using the Agreement Frame. If left unchecked or not resolved it can lead to lost production, absences, attrition, and even law suits. Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives An Introduction to Conflict Resolution What is Conflict? What is Conflict Resolution? Understanding the Conflict Resolution Process The Thomas-Kilmann Instrument Collaborating Competing Compromising Accommodating Avoiding Creating an Effective Atmosphere Neutralizing Emotions Setting Ground Rules Choosing the Time and Place Creating Mutual Understanding What do I Want? What Do They Want? What Do We Want? Focusing on Individual Needs Finding Common Ground Building Positive Energy and Goodwill Strengthening Your Partnership Getting to the Root Cause Examining Root Causes Creating a Cause and Effect Diagram The Importance of Forgiveness Identifying the Benefits of Resolution Generating Options Generate, Don't Evaluate Creating Mutual Gain Options and Multiple Option Solutions Digging Deeper into Your Options Building a Solution Creating Criteria Creating a Shortlist Choosing a Solution Building a Plan The Short Version of the Process Evaluating the Situation Choosing Your Steps Creating an Action Plan Using Individual Process Steps Additional Tools Stress and Anger Management Techniques The Agreement Frame Asking Open Questions Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans
Duration 2 Days 12 CPD hours This course is intended for Database Administrator Help Desk/CoE Support System Administrator Technology Consultant Overview This course will prepare you to: Use the SAP HANA cockpit to perform emergency trouble shooting, the SAP HANA traces to investigate for costly statements and to setup SAP HANA Workload Management and SAP HANA Capture and Replay tools. In this course, students will learn how to describe the methods and the tools needed for analyzing performance issues in SAP HANA. Emergency Analysis and Troubleshooting using SAP HANA cockpit 2.0 SP10 Handling System Offline Situations Handling System Hanging but Reachable Situations Analyzing a Suddenly Slow System Structural System Performance Root Cause Analysis Analyzing Memory Issues Analyzing CPU Issues Analyzing Expensive Statements Issues Analyzing Disk and I/O Issues Proactive Monitoring and Performance Safeguarding Configuring SAP HANA Alerting Framework Setting up SAP HANA Workload Management Using SAP HANA Capture and Replay Additional course details: Nexus Humans SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP HANA 2.0 SPS04 - Using Monitoring and Performance Tools course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This basic course is for those who will be administering Information Server and its product components. Overview List Information Server functional categories and the Information Server products and components that support themList and describe the Information Server architectural tiersAccess Information Server clients, including thin clients using the Information Server Launch Pad, the Information Server Engine clients, and the Information Server Console clients including Information Analyzer and Information Services DirectorCreate and configure Information Server users and groupsManage Information Server active sessionsManage Information Server reportingWork with Information Server command-line tools including tools for session administration, user and group management, and encryptionUse the istool functionality to query, export, and import Information Server Repository assets This course gets those charged with administering Information Server v11.5 and its suite of many products and components started with the basic administrative tasks necessary to support Information Server users and developers. Information Server Technical Overview List the Information Server functional categories List the Information Server products and components that support these functional categories List the Information Server architectural tiers Working with Information Server Clients Use the Information Server Launch Pad to access Information Server thin clients including the Administrative Console, Information Governance Catalog, and Metadata Asset Manager Access Information Server Engine Clients including DataStage, QualityStage, FastTrack, and Information Server Manager Access Information Server Console Clients including Information Analyzer and Information Services Director Authentication and Suite Security Configure Suite users and groups Configure DataStage credentials for Engine users Session Management View a list of active sessions View session properties Disconnect sessions Configure global session properties Managing Reports Create and manage report folders Create a report Run a report View report results Administrative Tools Session Admin tool Directory Command tool Encrypt tool Managing Information Server Repository Assets Use istool to export and import common metadata assets Use istool to query information assets Use istool to export and import security assets Use istool to export and import reporting assets
Duration 2 Days 12 CPD hours This course is intended for This in an introductory-level class for intermediate skilled team members. Students should have prior software development experience or exposure, have some basic familiarity with containers, and should also be able to navigate the command line. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert facilitator, students will explore: What a Kubernetes cluster is, and how to deploy and manage them on-premises and in the cloud. How Kubernetes fits into the cloud-native ecosystem, and how it interfaces with other important technologies such as Docker. The major Kubernetes components that let us deploy and manage applications in a modern cloud-native fashion. How to define and manage applications with declarative manifest files that should be version-controlled and treated like code. Containerization has taken the IT world by storm in the last few years. Large software houses, starting from Google and Amazon, are running significant portions of their production load in containers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This is a hands-on workshop style course that teaches core features and functionality of Kubernetes. You will leave this course knowing how to build a Kubernetes cluster, and how to deploy and manage applications on that cluster. Getting Started Our sample application Kubernetes concepts Declarative vs imperative Kubernetes network model First contact with kubectl Setting up Kubernetes Working with Containers Running our first containers on Kubernetes Exposing containers Shipping images with a registry Running our application on Kubernetes Exploring the Kubernetes Dashboard The Kubernetes dashboard Security implications of kubectl apply Scaling a deployment Daemon sets Labels and selectors Rolling updates Next Steps Accessing logs from the CLI Managing stacks with Helm Namespaces Next steps
Duration 2 Days 12 CPD hours This course is intended for Enterprise Network System Installers System Integrators System Administrators Network Administrators Solutions Designers Overview Upon completion of this course, you will be able to: Identify the various components and architecture of the Cisco SD-WAN solution. Deploy vEdge routers in a secure extensible network. Create templates to aide in the deployment and operation of the secure extensible network. Configure and verify overlay routing in the secure extensible network. Create simple policies to control traffic flow in the secure extensible network. The Cisco SD WAN Operation and Deployment (SDWFND) v1.0 is a 2-day, instructor-led, hands-on course that addresses the Cisco SD-WAN Operations and Deployment functions. Cisco SD-WAN is a new technology, this training covers salient features such as zero-touch provisioning, secure network bring-up, configuration using feature templates, configuration of Overlay Management Protocol (OMP) and policies for network traffic management. Module 1: SD-WAN Solution Components Lesson 1: SD-WAN Solution Overview Lesson 2: SD-WAN Components Lesson 3: Managing SD-WAN Components Module 2: Secure Extensible Network Deployment Lesson 1: Secure Control Plane Operation Lesson 2: Secure Control Plane Deployment Lesson 3: Secure Data Plane Operation Lesson 4: Cloud Deployments and Redundancy Module 3: SD-WAN Template Deployment Lesson 1: Templates Overview Lesson 2: Feature Templates Lesson 3: Device Templates Lesson 4: Attaching Devices to Templates Module 4: SD-WAN Overlay Routing Lesson 1: Overlay Routing Overview Lesson 2: OMP Route Advertisements Lesson 3: OMP Route Redistribution and Network Segmentation Lesson 4: Configuring and Verifying Overlay Routing Module 5: SD-WAN Policies and QoS Lesson 1: Policy Overview and Framework Lesson 2: vSmart Policy Operation and Construction Lesson 3: Forwarding and QoS Overview Lesson 4: Configuring and Monitoring QoS Forwarding Lab outline Lab 1: Manage and Monitor SD-WAN Components Lab 2: Deploy and Verify SD-WAN vEdge Routers Lab 3: Deploy SD-WAN Templates Lab 4: SD-WAN Overlay Routing Lab 5: SD-WAN Policies