Направления
Направление
Huawei
- HCIAST — HCIA-Storage V5.0
- Длительность: 5 дней (40 часов)
 - Код курса: HCIAST
 - Стоимость
 - Очный формат: 969 000 ₸
 - Онлайн формат: 952 000 ₸
 
Описание курса
Objectives
After completing the training, you will be able to:
1. Understand definitions of information and data.
2. Understand development trends of data storage products.
3. Understand functions and components of controller enclosures and disk enclosures.
4. Understand concepts of scale-up and scale-out, as well as related cables and interface modules.
5. Understand working principles of RAID 2.0+.
6. Understand dynamic RAID and RAID-TP.
7. Understand common protocols used in storage systems.
8. Understand working principles and characteristics of different protocols.
9. Understand storage network architecture evolution.
10. Understand storage networking technology evolution.
11. Be familiar with the features and positioning of storage products.
12. Understand DeviceManager, CLI, and UltraPath storage system management tools.
13. Understand service characteristics, implementation principles, and application scenarios of resource tuning technologies.
14. Understand service characteristics, implementation principles, and application scenarios of data protection technologies.
15. Be familiar with common storage system O&M management tools and typical O&M processes.Target Audience
1. Personnel who want to become storage engineers
2. Personnel who want to obtain HCIA-Storage V5.0 certificationPrerequisites
Basic knowledge of IT technologies and networks
Training Content
1. Storage Technology Trends
Storage Technology Trends2. Basic Storage Technologies
Intelligent Data Storage System
RAID Technologies
Common Storage Protocols
Storage Network Architecture3. Huawei Intelligent Storage Products and Features
Huawei Intelligent Storage Products
Storage System Operation Management
Storage Resource Tuning Technologies and Applications
Storage Data Protection Technologies and Applications4. Storage System O&M Management
Storage System O&M Management - HCIPST — HCIP-Storage V5.5
- Длительность: 5 дней (40 часов)
 - Код курса: HCIPST
 - Стоимость
 - Очный формат: 1 064 000 ₸
 - Онлайн формат: 1 048 500 ₸
 
Описание курса
HCIP-Storage V5.5
Objectives
On completion of this program, the participants will be able to:
Know about Product overview
Know Software and hardware architecture
Understand Key technologies
Understand Value-added features
Know Typical application scenarios
Understand the installation process of storage products
Understand the service configuration process of storage products
Understand concepts related to storage performance
Have general knowledge of storage performance evaluation methods
Understand the methods of locating storage system performance problems
Have a good command of storage system performance tuning methods
Have a good command of storage system performance tests and tool usage
Understand how to use storage O&M management tools
Understand routine storage management operations
Understand the basics of storage system troubleshooting
Understand the procedures for troubleshooting a storage system
Understand different ways to troubleshoot a storage system
Understand how to replace partsTarget Audience
Those who want to be storage engineer
Those who want to achieve HCIP-Storage certification
Administrator of storage arrayPrerequisites
Understand basic network knowledge
Understand computer components
Understand the basic knowledge of the Windows and Linux operating systems
Have a good command of HCIA-StorageTraining Content
Storage Technologies and Applications
Flash Storage Technologies and Applications
Product overview
Software and hardware architecture
Key technologies
Value-added features
Typical application scenariosData Protection Technologies and Applications
OceanProtect backup storage
OceanStor BCManager
Typical application scenariosScale-Out Storage Technologies and Applications
Concepts and development trends of scale-out storage
Software and hardware architectures of OceanStor Pacific products
Key technologies of OceanStor Pacific products
Key features of OceanStor Pacific products
Application scenarios of OceanStor Pacific productsStorage Product Deployment
Flash Storage Product Deployment
Flash Storage Product Installation
Flash Storage Service ConfigurationScale-Out Storage Product Deployment
Hardware Installation Process
Network Planning
Software Installation Process
Service ConfigurationStorage System Performance Tuning
Storage Performance Overview
Storage Performance Evaluation
Storage Performance Problems
Storage Performance Tuning
Storage Performance TestStorage System O&M and Troubleshooting
Storage System O&M Management
Storage System O&M Management Tools
Routine ManagementStorage System Troubleshooting
Basics of Troubleshooting
Troubleshooting Procedure
Collecting Information and Reporting a Fault
Replacing Parts
Case Analysis - DORADO — Администрирование Dorado v.6
- Длительность: 5 дней (40 часов)
 - Код курса: DORADO
 - Стоимость
 - Очный формат: 1 064 000 ₸
 - Онлайн формат: 1 048 500 ₸
 
Описание курса
Кому следует посетить
Системным администраторам систем хранения данных
Предварительные требования
Базовые знания в области систем хранения данных
Цели курса
После прохождения данного курса слушатели будут уметь:
Понимать позиционирование Dorado V6, особенности аппаратного обеспечения и программного обеспечения
Производить первичную настройку Dorado V6
Понимать расширенные функции системы
Настраивать расширенные функции
Понимать задачи ежедневного обслуживания и управления
Знать методологию поиска и устранения неполадокПрограмма курса
Введение в Dorado V6
Позиционирование продукта, спецификации
Обзор аппаратного обеспечения
Обзор программного обеспеченияБазовая настройка Dorado V6
Процесс первичной конфигурации
Процесс базовой настройки сервисовРасширенные функции Dorado V6
Механизмы защиты данных в Dorado V6
Технические принципы и приложения HyperSnap
Технические принципы и приложения HyperMetro
Технические принципы и приложения HyperClone
Технические принципы и приложения HyperReplicationПроизводительность Dorado V6, оптимизация ресурсов
Технические принципы и приложения SmartTier technical
Технические принципы и приложения SmartDeduplication&Compression
Технические принципы и приложения SmartVirtualization
Технические принципы и приложения SmartQuotaЗадачи обслуживания Dorado V6, процесс поиска и устранения неполадок
Управление и обслуживание Dorado V6
Ежедневное обслуживание
УправлениеПоиск и устранение неполадок Dorado V6
Методы и инструменты для поиска неисправностей
Распространенные сценарии проблем - ANT-HS000 — Устранение неполадок СХД Huawei OceanStor
- Длительность: 3 дня (24 часа)
 - Код курса: ANT-HS000
 - Стоимость
 - Очный формат: 788 500 ₸
 - Онлайн формат: 772 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы и инструменты диагностики и устранения неисправностей СХД Huawei OceanStor, а также подходы к оптимизации их использования.
Аудитория курса:
Cпециалисты, имеющих опыт работы с системами хранения данных и желающих углубить свои навыки по диагностике и решению комплексных проблем функционирования и производительности СХД OceanStor.
Предварительные требования к аудитории:
Базовые знания концепций хранения данных и опыт работы с системами Huawei OceanStor
Длительность курса:
3 дня.
Содержание курса:
Модуль 1 – Обзор архитектуры и компонентов Huawei OceanStor.
Архитектура системы хранения
Структурные компоненты: контроллеры, дисковые полки, сетевые коммутаторы.
Взаимодействие компонентов.
Логическая и физическая архитектура
Управляющие контроллеры.
Диски и блоки хранения данных.
Программное обеспечение и его компоненты
Лабораторная работа 1. Первичная настройка и подготовка СХД OceanStorМодуль 2 – Инструменты диагностики и мониторинга
Возможности инструментов SmartKit
Журналирование событий и снятие метрик
Лабораторная работа 2. Использование SmartKit для обследования устройства и настройка мониторинга СХД OceanStorМодуль 3 – Диагностика и устранение неполадок файлового доступа
Настройки и мониторинг NFS
Настройки и мониторинг CIFS
Устранение неполадок работы протоколов файлового доступа
Лабораторная работа 3. Устранение неполадок протоколов CIFS и NFSМодуль 4 – Диагностика и устранение неполадок блочного доступа
Настройки и мониторинг iSCSI
Настройки и мониторинг FC
Настройки и мониторинг NVMe
Лабораторная работа 4. Устранение неполадок протоколов блочного доступаМодуль 5 – Мониторинг и оптимизация производительности
Мониторинг производительности
Настройки и инструменты управления производительностью
Лабораторная работа 5. Устранение неполадок производительностиМодуль 6 – Неполадки аппаратных компонентов
Неполадки контроллеров
Неполадки дисковой подсистемы
Неполадки сетевых подключений и сетевых адаптеров
Восстановление после сбоев и резервирование конфигурации
Лабораторная работа 6. Диагностика проблем аппаратного обеспечения - HCIASE — HCIA-Security
- Длительность: 5 дней (40 часов)
 - Код курса: HCIASE
 - Стоимость
 - Очный формат: 1 117 500 ₸
 - Онлайн формат: 1 104 500 ₸
 
Описание курса
Objectives:
On completion of this program, the participants will be able to:
Describe the definition and characteristics of network security
Describe the development history and trend of network security
Understand the data definition and transmission process
Describe the working principles of the TCP/IP protocol stack
Describe the working principles of common protocols
Describe common security threats to enterprise networks
Describe how to cope with common network security threats
Describe firewall security zones
Describe the stateful inspection and session mechanisms of the firewall
Describe the technical background of NAT
Know the classification and working principles of NAT
Know the application scenarios of different types of NAT
Understand the hot standby fundamentals
Master the basic hot standby configurations
Describe user authentication technologies
Describe the different types of intrusion prevention
Describe the fundamentals of intrusion prevention
Deploy network antivirus policies
Development of encryption and decryption technologies
Processes of various encryption and decryption methods
Principles of encryption and decryption algorithms
Describe data communication security technologies
Describe the PKI certificate system architecture
Describe the PKI working mechanism
Application scenarios of encryption technologies
Configuration methods for different VPN technologiesTarget Audience:
Cyber security junior engineer who hopes to have information security capabilities.
Prerequisites:
Basic knowledge of TCP/IP
Basic knowledge of Routing and SwitchingTraining Content:
1. Security information and security overview
Network Security Concepts and Specifications
Network Security Definition
Future Network Security Trends
Information Security Standards and Specifications
Network Basics
Network Reference Model
Common Network Devices
Common Network Security Threats and Threat Prevention
Overview of Enterprise Network Security Threats
Communication Network Security Requirements and Solutions
Zone Border Security Threats and Threat Prevention
Computing Environment Security Threats and Threat Prevention
Security Requirements and Solutions of the Management Center2. Network Security Basis
Firewall Security Policies
Firewall Basic Principles
Application Scenarios of Firewalls in Cyber Security Solutions
Firewall NAT Technologies
Overview of NAT
Source NAT
Destination NAT
Bidirectional NAT
NAT ALG and NAT Server
Firewall Hot Standby Technologies
Hot Standby Fundamentals
Hot Standby Basic Networking and Configuration
Firewall User Management Technologies
AAA Principles
Firewall User Authentication and Application
Firewall IPS
Intrusion Overview
Intrusion Prevention
Antivirus3. Application of Encryption and Decryption
Fundamentals of Encryption and Decryption Technologies
Encryption/Decryption Technology Development
Encryption/Decryption Technology Fundamentals
Common Encryption/Decryption Algorithms
Hash Algorithms
PKI Certificate System
Data Communication Security Technologies
PKI System Structure
PKI Working Mechanism
Encryption Technology Applications
Application of Cryptography
VPN Overview
VPN Configuration - HCIPS — HCIP-Security
- Длительность: 10 дней (80 часов)
 - Код курса: HCIPS
 - Стоимость
 - Очный формат: 1 747 000 ₸
 - Онлайн формат: 1 725 000 ₸
 
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe the principles of firewall high reliability technologies
Understand the high reliability networking mode of the firewall
Describe the application scenarios of firewall high reliability technologies
Describe the application scenarios of bandwidth management
Describe the fundamentals of bandwidth management
Describe the application scenarios of quota control policies
Describe the fundamentals of quota control policies
Master the configurations of firewall traffic management
Describe the application scenarios of virtual systems
Describe the basic concepts of virtual systems
Master how to configure virtual systems
Describe basic concepts of intelligent uplink selection
Describe the application scenarios of intelligent uplink selection
Master the configuration procedure of intelligent uplink selection
Understand the basic principles of IPsec VPN
Understand the typical application scenarios of IPsec VPN
Master the highly reliable IPsec VPN configuration method
Master IPsec VPN troubleshooting method
Understand application scenarios of SSL VPN
Master the main functions and principles of SSL VPN
Understand the SSL VPN networking
Master the configuration of SSL VPN
Describe the principles of common single-packet attacks
Describe the principles of common DDoS attacks
Describe the principles of defending against single-packet attacks
Describe the principles of defending against DDoS attacks
Describe the anti-DDoS solution and related defense principles
Describe the cyber kill chain
Describe the harm of vulnerabilities
Master vulnerability defense measures
Describe the technical background of the content security filtering technologies
Describe basic principles of content security filtering technologies
Master the configuration of content security filtering technologies
Describe the basic concepts of cyber security emergency response
Describe the handling process of cyber security emergency response
Understand technologies related to cyber security emergency response
Describe the basic concepts of NAC
Describe the working principles of user identity authentication
Describe common access authentication modes and their working principles
Configure user access authentication
Apply various network security technologies
Design the network security solution
Deploy the network security solution
Be familiar with network security O&MTarget Audience
Those who hope to become a network security professional
Cyber Security engineersPrerequisites
HCIA certification or the similar knowledge
Training Content
1 Secure communication network
Overview of Cyber Security Certification
Capability Models for Cyber Security Engineers
Cyber Security Certification
Firewall High Reliability Technologies
Overview of Firewall High Reliability Technologies
Firewall Hot Standby
Firewall Link High Reliability
Hot Standby Version Upgrade and Troubleshooting
Firewall Traffic Management
Firewall Bandwidth Management
Firewall Quota Control Policies
Example for Configuring Traffic Management
Firewall Virtual System
Virtual System Overview
Basic Concepts of Virtual Systems
Communication Between Virtual Systems
Virtual System Configuration
Firewall Intelligent Uplink Selection
Overview of Intelligent Uplink Selection
Principles of Intelligent Uplink Selection
Configuration of Intelligent Uplink Selection
IPsec VPN Technology and Application
Basic Principles of IPsec VPN
Application Scenarios of IPsec VPN
High Reliability of IPsec VPN
Troubleshooting of IPsec VPN
SSL VPN Technology and Application
Overview of SSL VPN
Service Functions of SSL VPN
Examples for Configuring the SSL VPN
SSL VPN Troubleshooting2 Security zone border
Cyber Attacks and Defense
Firewall Attack Defense Technologies
Single-Packet Attack Defense
DDoS Mitigation
Anti-DDoS
Vulnerability Defense and Penetration Testing
Vulnerability
Vulnerability Defense
Penetration Testing
Content Security Filtering Technologies
Overview of Content Security Filtering Technologies
Principles of Content Security Filtering Technologies
Examples for Configuring Content Security Filtering Technologies3 Security management center
Emergency Response
Emergency Response Overview
Emergency Response Process
Emergency Response Technologies and Cases
Network Access Control
Overview of NAC
User Identity Authentication
Access Authentication
NAC Configuration
Comprehensive Cases of Enterprise Network Security
Overview of Enterprise Network Security Requirements
Enterprise Network Security Solution Design and Deployment
Enterprise Network Security Troubleshooting - HCIAW — HCIA-WLAN V3.0
- Длительность: 5 дней (40 часов)
 - Код курса: HCIAW
 - Стоимость
 - Очный формат: 1 033 000 ₸
 - Онлайн формат: 1 017 500 ₸
 
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe the basic concepts and development history of WLAN.
Compare WLAN and Wi-Fi.
Describe typical application scenarios of WLAN technologies.
Illustrate the challenges and development trend of WLAN.
Describe basic concepts of wireless communication.
Distinguish 802.11 protocols and describe Wi-Fi generations.
Describe the highlights of Wi-Fi 6.
Describe key WLAN technologies.
Describe basic concepts in WLAN.
Describe WLAN networking modes.
Differentiate WLAN forwarding models.
Evaluate Huawei’s typical WLAN networking solutions.
Describe the origin and implementation of CAPWAP.
Understand the CAPWAP tunnel establishment process.
Describe how an AP joins an AC and how STAs go online.
Master the working mechanism of STA roaming.
Explain the WLAN development process.
Classify Huawei WLAN products.
Describe features of Huawei WLAN products.
Identify power supply modes of APs.
Describe development of the VRP.
Use VRP basic operation commands.
Learn the methods of upgrading ACs and APs.
Distinguish characteristics of Fit and Fat APs.
Perform service configuration of Fat APs.
Describe WLAN security threats.
Describe WLAN security defense mechanisms.
List common WLAN access authentication modes.
Understand the WLAN service configuration procedure.
Configure basic WLAN services.
Summarize common WLAN faults.
Describe the WLAN troubleshooting process.
Know common troubleshooting methods.
Describe the definition, functions, and classification of antennas.
Understand the fundamentals and key performance indicators of antennas.
Distinguish parameters of different antennas.
Describe the WLAN network planning and delivery process.
Describe WLAN network requirement collection and site survey.
Describe the capacity, frequency, and coverage planning of the WLAN network.
Describe the WLAN network channel planning, AP deployment design, power supply and cabling design, and AP installation mode design.
Describe WLAN project acceptance methods.Target Audience
Personnel who want to become WLAN assistant engineers
Those who wish to obtain the HCIA-WLAN certificate
People who want to learn WLAN technologyPrerequisites
Be familiar with the PC operating system.
Basic computer knowledge
HCIA-DataCom certification or equivalent technical levelTraining Content
WLAN Technology Basics
WLAN Overview
Enterprise WLAN Overview
Challenges Faced by Enterprise WLAN
Next-Generation Enterprise WLAN SolutionWLAN Basics
Basic Concepts of Wireless Communication
Introduction to 802.11 Standards
Key WLAN TechnologiesWLAN Fundamentals
CAPWAP Tunnel
Key 802.11 Frames
STA Going-Online Process
WLAN RoamingWi-Fi 6 Technologies and Products
Wi-Fi 6 Technologies
Huawei WLAN Product Family
Features of Huawei WLAN Products
AP Power SupplyWLAN Networking Models
Basic Concepts in WLAN
WLAN Networking Architectures
Typical WLAN Networking SolutionsWLAN Security and Configuration
Huawei VRP and Device Upgrade
Huawei VRP Overview
Command Line Basics
WLAN Device Upgrade
Fat AP ConfigurationWLAN Security
WLAN Security Threats and Defense
WLAN Access Security
WLAN Data Security
WLAN Network Access Control
WLAN Security ConfigurationWLAN Service Configuration
WLAN Service Configuration Procedure
WLAN Configuration ApplicationWLAN Troubleshooting
WLAN Troubleshooting Basics
Overview of WLAN Troubleshooting
Troubleshooting APs’ Failures to Go Online
Troubleshooting STAs’ Failures to Go Online
Troubleshooting AP Signal Issues
Troubleshooting Slow Internet Access of STAsWLAN Project Deployment
WLAN Antenna Technology
Antenna Overview
Concepts Related to Antennas
Antenna Selection
Traditional Indoor Distribution SystemOverview of Common WLAN Deployment
Introduction to WLAN Planning and Design
WLAN Planning and Design Details
WLAN Project Acceptance
WLAN Planning Cases - HCIPW — HCIP-WLAN V2.0
- Длительность: 10 дней (80 часов)
 - Код курса: HCIPW
 - Стоимость
 - Очный формат: 1 747 000 ₸
 - Онлайн формат: 1 725 000 ₸
 
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe WLAN networking modes.
Configure WLAN services.
Describe the WLAN networking application scenarios.
Describe common WLAN reliability networking modes.
Know how to configure WLAN reliability solutions.
Understand the architecture and main functions of iMaster NCE-Campus.
Understand the cloud-based WAC management network architecture.
Understand how to configure cloud-based WAC management.
Understand the cloud-based AP management network architecture.
Understand how to configure cloud-based AP management.
Describe the basic process for WLAN access.
Understand the implementation of the STA blacklist and whitelist.
Describe common user access security policies.
Understand how to configure different security policies.
Describe common access control technologies.
Understand how to configure different access control technologies.
Understand basic concepts of roaming.
Understand the data forwarding path of a STA after roaming.
Understand common roaming optimization technologies.
Understand the implementation principles of smart roaming.
Describe the main factors that affect air interface performance.
Describe common RRM technologies, including radio calibration, band steering, load balancing, and user CAC.
Understand the factors that affect WLAN coverage.
Understand the concepts of and relationship between power and signal strength.
Understand the factors that affect WLAN capacity.
Master skills of using the WLAN Planner.
Use the WLAN Planner for indoor 3D simulation.
Use the network planning functions of the CloudCampus APP.
Understand the WLAN planning process.
Understand requirements collection and site survey in WLAN planning.
Understand device selection, coverage analysis, and capacity design in WLAN planning.
Understand the channel planning, power supply cabling design, and AP installation mode design in WLAN planning.
Describe common WLAN service types in enterprise office scenarios.
Describe WLAN planning methods in enterprise office scenarios.
Describe WLAN deployment solutions in enterprise office scenarios.
Describe common service types and challenges in education scenarios.
Describe WLAN planning methods in education scenarios.
Describe WLAN deployment solutions in education scenarios.
Describe common service types and challenges in hotel scenarios.
Describe WLAN planning methods in hotel scenarios.
Understand WLAN deployment solutions in hotel scenarios.
Describe common WLAN service types in healthcare scenarios.
Describe WLAN planning methods in healthcare scenarios.
Understand WLAN deployment solutions in healthcare scenarios.
Understand common service types and challenges in the shopping mall and supermarket scenarios.
Understand the WLAN planning process in shopping mall and supermarket scenarios.
Understand WLAN construction standards and deployment solutions in shopping mall and supermarket scenarios.
Describe common service types and challenges in shop floor and warehouse scenarios.
Describe WLAN planning methods in shop floor and warehouse scenarios.
Understand WLAN deployment solutions in shop floor and warehouse scenarios.
Understand common service types and challenges in outdoor coverage scenarios.
Master WLAN planning methods for outdoor coverage scenarios.
Master WLAN deployment solutions for outdoor coverage scenarios.
Describe common services, characteristics, and challenges in outdoor backhaul scenarios.
Understand AP and antenna selection policies in outdoor backhaul scenarios.
Understand how to calculate the mesh link bandwidth in outdoor backhaul scenarios.
Describe the WLAN planning process in outdoor backhaul scenarios.
Master WLAN deployment solutions for outdoor backhaul scenarios.
Describe common service types and challenges in high-density scenarios.
Describe the WLAN planning process in high-density scenarios.
Understand WLAN deployment solutions in high-density scenarios.
Describe the WLAN optimization process.
Describe the contents of WLAN optimization.
Understand how to use WLAN optimization tools.
Describe the traditional WLAN O&M solution.
Describe the CampusInsight intelligent O&M solution.
Describe CampusInsight functions and features.
Understand how to locate common WLAN problems or faults.
Describe the troubleshooting process.
Understand WLAN troubleshooting methods.Target Audience
Those who hope to become senior WLAN engineers
Those who hope to become WLAN planning and optimization experts
Those who hope to obtain an HCIP-WLAN certificatePrerequisites
HCIA-WLAN certificate or similar knowledge
Training Content
WLAN Network Features
WLAN Networking Architectures
WLAN Networking Overview
WLAN Networking Architectures
WLAN Networking Application ScenariosWLAN Reliability Technology
WLAN Reliability Technology Overview
VRRP HSB
Dual-Link HSB
Dual-Link Cold Backup
N+1 BackupWLAN Cloud Management Solution
Introduction to iMaster NCE-Campus
Cloud-based WAC Management
Cloud-based AP ManagementUser Access and Authentication
User Access Security
STA Blacklist and Whitelist
Security Policy
Access ControlWLAN Roaming
WLAN Roaming Overview
Process of Traffic Forwarding During Roaming
Roaming Optimization Technologies
Smart RoamingWLAN Radio Resource Management
Air Interface Performance
Radio Calibration
STA Steering
Band Steering
AP-based Load Balancing
User CACWLAN Network Planning
WLAN Planning Basics
WLAN Planning Overview
WLAN Coverage Design
WLAN Capacity DesignWLAN Planning Tools
WLAN Planner
CloudCampus APPWLAN Planning Process
WLAN Planning Overview
WLAN Planning Process
WLAN Planning CaseWLAN Planning for Enterprise Office Scenarios
Introduction to Enterprise Office Scenarios
WLAN Planning Process in Enterprise Office Scenarios
WLAN Planning Solutions in Enterprise Office ScenariosWLAN Planning for Education Scenarios
Introduction to Education Scenarios
WLAN Planning Process in Education Scenarios
WLAN Planning Solutions in Education ScenariosWLAN Planning for Hotel Scenarios
Introduction to Hotel Scenarios
WLAN Planning Process in Hotel Scenarios
WLAN Planning Solutions in Hotel ScenariosWLAN Planning for Healthcare Scenarios
Introduction to Healthcare Scenarios
WLAN Planning Process in Healthcare Scenarios
WLAN Planning Solutions for Healthcare ScenariosWLAN Planning for Retail Scenarios
Introduction to Shopping Mall and Supermarket Scenarios
WLAN Planning Process in Shopping Mall and Supermarket Scenarios
WLAN Planning Solutions for Shopping Mall and Supermarket ScenariosWLAN Planning for Shop Floor and Warehouse Scenarios
Introduction to Shop Floor and Warehouse Scenarios
WLAN Planning Process in Shop Floor and Warehouse Scenarios
WLAN Planning Solutions in Shop Floor and Warehouse ScenariosWLAN Planning for Outdoor Coverage Scenarios
Introduction to Outdoor Coverage Scenarios
WLAN Planning Process in Outdoor Coverage Scenarios
WLAN Planning Solutions for Outdoor Coverage ScenariosWLAN Planning for Outdoor Backhaul Scenarios
Introduction to Outdoor Backhaul Scenarios
WLAN Planning Process in Outdoor Backhaul Scenarios
WLAN Planning Solutions in Outdoor Backhaul ScenariosWLAN Planning for High-Density Scenarios
Introduction to High-Density Scenarios
WLAN Planning Process in High-Density Scenarios
WLAN Planning Solutions for High-Density Scenarios
WLAN network optimization and troubleshootingWLAN Optimization Solution
Overview of WLAN Optimization
WLAN Optimization Tools
WLAN Optimization Solutions
WLAN Optimization CasesWLAN O&M
Overview of Network O&M
Traditional WLAN O&M
CampusInsight Intelligent O&MWLAN Troubleshooting
Overview of WLAN Troubleshooting
Reliability Faults
Cloud Management Faults
Wireless Bridge Faults
Radio Resource Management Faults
Roaming Faults - HCIEW — HCIE-WLAN
- Длительность: 10 дней (80 часов)
 - Код курса: HCIEW
 - Стоимость
 - Очный формат: 1 905 000 ₸
 - Онлайн формат: 1 891 500 ₸
 
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe Huawei WLAN technical architecture
Describe Huawei HCIE-WLAN Certification architecture
Master WLAN networking technologies
Master WLAN roaming technologies
Master WLAN radio resource management
Master WLAN multicast technologies and mDNS principles
Master WLAN security and defense
Implement WLAN admission control
Describe Huawei WLAN and IoT convergence solution
Describe the principles and solutions of the wireless positioning technology
Master how to construct an IPv6 WLAN
Describe the CloudCampus solution
Master the design and deployment of CloudCampus large-scale campus networks
Master the design and deployment of CloudCampus small- and medium-sized campus networks
Master WLAN troubleshooting methods
Describe CampusInsight intelligent O&M
Master WLAN optimization design and implementation
Describe the WLAN project lifecycleTarget Audience
Technical personnel who want to obtain HCIE-WLAN knowledge
Prerequisites
You are advised to pass the HCIP-WLAN certification or pass the HCIE-WLAN written exam. It is recommended to have at least five years of ICT experience, have experience in designing, planning, implementing, and O&M of medium- and large-sized WLAN networks
Training Content
1. Build a Reliable WLAN Network Huawei WLAN Certification Overview
Introduction to Huawei WLAN Career Certification
Introduction to WLAN Reliability
Improving Wireless User Experience
Building a Secure, Trustworthy WLAN Campus Network
Building an Open, Converged WLAN Campus Network
WLAN O&M and Optimization
WLAN Network Planning and Deployment WLAN Networking Technology
WLAN Networking Architecture
Principles and Configurations of Navi AC
Principles and Configurations of Leader AP
Principles and Configurations of Mesh
Principles and Configurations of GRE and IPSec VPN WLAN Reliability
WLAN Reliability Overview
HSB Technologies
Dual-Link Cold Backup
N+1 Backup
CAPWAP Link Failover WLAN Roaming
WLAN Roaming Overview
WLAN Roaming Technologies
WLAN Roaming Optimization
Typical Roaming Scenarios of Huawei WLAN Solution
WLAN Roaming Fault Rectification2. Improve Wireless User Experience WLAN Radio Resource Management
WLAN Radio Calibration
WLAN Load Balancing
WLAN Anti-Interference
WLAN QoS
VIP User Experience Guarantee WLAN Multicast and mDNS
IP Multicast Fundamentals
WLAN Multicast Network Optimization
mDNS and mDNS Gateway3. Constructing a Secure and Trusted WLAN Network WLAN Security and Defense
Overview of WLAN Security Threats and Security Solutions
WLAN Management Plane Security
WLAN Control Plane Security
WLAN Forwarding Plane Security
WLAN Network Security Configuration Example WLAN Network Admission Control (NAC)
Overview of NAC
Commonly Used NAC Methods and Their Working Mechanism
Huawei NAC Solution
Typical NAC Configuration4. Constructing an Open and Converged WLAN Network WLAN and IoT Convergence
Overview and Development Trends of IoT Networks
Overview of Short-Range Wireless IoT Technologies
Huawei’s CloudCampus IoT Solutions WLAN Wireless Positioning Technologies
Overview of Wireless Positioning
Implementation of Wireless Positioning Technologies
Huawei’s Wireless Positioning Solutions Constructing an IPv6 WLAN
IPv6 Overview
IPv6-based WLAN Networking and Applications
IPv6-based WLAN Access Control
IPv6-based WLAN Security
WLAN Evolution to IPv65. Constructing a New WLAN Network Huawei CloudCampus Solution
CloudCampus Overview
Ultra-Broadband Connectivity
Simplified Network
Multi-Purpose Network
Access Authentication
Intelligent Policy
Intelligent O&M CloudCampus Solution for Large and Medium-Sized Campus Networks
VXLAN-based Virtualized Campus Network and Solution
Underlay Design
Fabric Design
Overlay Design
Admission Control and Free Mobility Design
WLAN Design
O&M Design CloudCampus Solution for Small and Medium-Sized Campus Networks
Service Requirements and Challenges Facing Small and Medium-Sized Campus Networks
Introduction to Huawei CloudCampus Solution
Huawei CloudCampus Solution Design for Small and Medium-Sized Campus Networks
Typical Industry Application Scenarios CloudCampus Solution Deployment for Large Campus Networks
Basic Concepts
Deployment Planning and Process
Deployment Guide CloudCampus Solution Deployment for Small and Medium-Sized Campus
Deployment Process Overview
Deployment Design
Software and Hardware Installation
Deployment
Service Deployment
O&M Management
Acceptance Test6. WLAN Network O&M and Troubleshooting WLAN Troubleshooting
WLAN Troubleshooting Roadmap
Auxiliary Methods for Troubleshooting WLAN Faults
WLAN Fault Cases Intelligent O&M
CampusInsight Overview
CampusInsight Functions and Demonstration7. WLAN Network Planning and Optimization Enterprise WLAN Optimization Design
Introduction to Enterprise WLAN Optimization
Enterprise WLAN Evaluation
Enterprise WLAN Optimization Solution Design
Solution Implementation and Acceptance Large WLAN Networking Practice
WLAN Project Lifecycle
WLAN Project Deliverables
WLAN Project Cases - HCIAT — HCIA-Transmission Training V2.5
- Длительность: 5 дней (40 часов)
 - Код курса: HCIAT
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 1 542 000 ₸
 
Описание курса
Course Objectives
On completion of this program, the participants will be able to:
Describe transmission network concepts.
Understand main transmission network technologies.
Understand Huawei transmission network solutions.
Understand the application scenarios of SDH networks.
Describe the SDH frame structure and the functions of each component.
Be familiar with the procedure for multiplexing SDH signals.
Describe the major overhead bytes and alarms of the SDH frame structure.
Describe the pointers and functions of the SDH frame structure.
Understand the composition of the logical functional modules of SDH devices.
Understand the PCM technology and its solutions.
Describe the positioning and application scenarios of Huawei OptiXtrans E9600/E6600 series and OptiXtrans DC908.
Understand the appearance and cabinets of Huawei OptiXtrans E9600/E6600 series and OptiXtrans DC908.
List the boards and functions of Huawei OptiXtrans E9600/E6600 series and OptiXtrans DC908.
Understand the basic knowledge of NCE-T, such as product positioning, architecture, and deployment solutions.
Describe the functions of NCE-T, such as network management and optical service provisioning.
Describe the classification and basic concepts of Ethernet.
Describe the working mechanisms of VLAN and Layer 2 switches.
Explain the concatenation and encapsulation technologies of Ethernet.
Describe the application scenarios of Ethernet services.
Distinguish Ethernet service types.
Describe Ethernet features.
Understand the basic concepts, principles, transmission modes, and basic composition of WDM.
Know the WDM transmission media.
Have a good command of WDM technical principles and key technologies.
List NG WDM site types.
Describe the signal flows of different types of NG WDM sites.
Describe the application scenarios of NG WDM sites.
List the basic elements of NG WDM networking.
Understand positions and functions of different overheads at each OTN layer.
Understand basic functions of OTN electrical-layer overheads.
Understand how OTN electrical-layer alarms are generated and learn how to use electrical-layer overheads to analyze and locate faults.
Understand the basic concepts of transmission network protection.
Understand device-level protection of the transmission network.
Distinguish linear protection from ring protection supported by SDH products.
Understand optical-layer protection supported by NG WDM products.
Understand electrical-layer protection supported by NG WDM products.
Understand PCM protection.
Complete Equipment Commissioning
Perform TDM Service Configuration
Perform Ethernet Service Configuration
Perform PCM Service Configuration
Perform OTN Electrical-Layer Service Configuration
Perform OptiXtrans DC908 Service Configuration
Perform NG WDM Optical-Layer Protection ConfigurationPrerequisites
Having a general knowledge of telecommunications
Target Audience
Personnel who are going to take HCIA-Transmission exam
Personnel who expect to learn about basic optical transmission principles and Huawei SDH equipment operationTraining Content
Transmission Network Overview
Basic Concepts of Transmission Networks
Transmission Network Technologies
Huawei Transmission Network SolutionsSDH Principles
SDH Overview
SDH Frame Structure and Multiplexing Procedure
Overheads and Pointers
Logical Functional Modules
Application of SDH Trail Layers and Overheads
PCM TechnologyTransmission Network Products
Product Overview
Cabinets and Subracks
Boards
Introduction to NCE-T
System Architecture of NCE-T
Basic Functions of NCE-T
Key Features of NCE-TIntroduction to Ethernet Principles and Services
Ethernet Principles
Ethernet ServicesWDM Principles
System Overview
WDM Transmission Media
Key Technologies of WDMNG WDM Equipment Networking and Applications
Network Layers and System Architecture
Site Types
Basic Networking Elements
OTN Protocol
OTN Overview
OTN Interface Structures and Multiplexing/Mapping Principles
OTN Frame Structure
Frame Structure and Meaning of OTN Electrical-Layer Overheads
Evolution to Liquid OTNTransmission Network Protection Principles
Basics
Device-Level Protection
Network-Level ProtectionHCIA-Transmission Lab Guide
Equipment Commissioning
TDM Service Configuration
Ethernet Service Configuration
PCM Service Configuration
OTN Electrical-Layer Service Configuration
OptiXtrans DC908 Service Configuration
NG WDM Optical-Layer Protection Configuration - HCIAD — HCIA Datacom
- Длительность: 10 дней (80 часов)
 - Код курса: HCIAD
 - Стоимость
 - Очный формат: 1 190 000 ₸
 - Онлайн формат: 1 173 500 ₸
 
Описание курса
Objectives
After completing the training, you will be able to:
Understand the definition of data communication and the capability model of data communication engineers.
Understand the network reference model and the entire data communication process.
Be familiar with the VRP system and be able to perform basic operations.
Understand IPv4 address protocol and related concepts
Understand the forwarding principles of Layer 3 devices such as routers and Layer 3 switches.
Understand the concept of routing and use static route or OSPF to build a Layer 3 network.
Understand basic Ethernet concepts and describe the functions and working principles of Layer 2 switching devices.
Be familiar with common Ethernet protocols, such as VLAN, Spanning Tree Protocol , link aggregation and stacking.
Configure ACLs and AAA to provide basic security solutions for the network.
Be familiar with the NAT protocol and master the NAT configuration in different scenarios.
Master the configuration of common services on enterprise networks, such as DHCP, FTP and Telnet.
Understand basic WLAN concepts and complete basic configurations of small or medium-sized WLAN networks.
Understand basic WAN concepts and WAN solutions such as MPLS and SR.
Have general knowledge of basic concepts of enterprise network management.
Be familiar with traditional network management and SDN-based network management solutions.
Have a good command of IPv6 protocols and be able to build small-scale IPv6 networks.
Have a good command of the campus network construction process.
Be able to independently construct small-sized campus networks.
Understand the basic concepts of SDN and programming automation and master the basics of Python.Target Audience
Who wants to become Data Communication Engineers
Who wants to obtain the HCIA-Datacom Certification
Prerequisites
Be familiar with PC operations.
Basic understanding of IT technologies and network knowledgeTraining Content
1. Data Communication and Network Basics
1.1 Data Communication Network Basics
Basic Concepts of Data Communication
Data Transfer Process
Network Devices and Basic Functions
Network Type and Topology Type
Network Engineering
Network Engineers1.2 Network Reference Model
What is Data and Data Transfer
Common Standard Protocols
Layered Model Concept
Application Layer and Related Protocols
Transport Layer and Related Protocols
Network Layer and Related Protocols
Data link Layer and Related Protocols
Physical Layer and Related Protocols
Data Transfer, Encapsulation and Decapsulation1.3 Huawei VRP Basics
Common Network Devices
VRP Basics
CLI Command Views
Basic Commands and Function Keys of the CLI2. Constructing an Interconnected IP Network
2.1 Network Layer Protocol and IP Addressing
Network Layer Protocol
Concept, Classification, and Special IP Addresses of IPv4
IP Network and IP Subnet Calculation
IP Network Address Planning2.2 IP Routing Basics
Basic Working Principles of Routers
Routing Table Concepts
Routing and Forwarding Features
Static Route Configuration2.3 OSPF Basics
Basic Features of OSPF
OSPF Application Scenarios
Working Principle of OSPF
Basic OSPF configurations3. Constructing an Ethernet Switching Network
3.1 Ethernet Switching Basics
Basic Concepts of Ethernet
Concept of MAC Address
Working Process and Principles of Layer 2 Switches
Composition and Formation of a MAC Address Table3.2 VLAN Principles and Configuration
Background of VLAN
Basic Concepts and Principles of VLAN
VLAN Data Communication Process on a Layer 2 Network
Basic VLAN Configuration3.3 Spanning Tree Protocol
Background of STP
Basic Concepts and Working Principles of STP
Basic Concepts of RSTP and Improvements Compared with STP
Basic STP Configuration
Other Layer 2 Loop Elimination Technologies3.4 Ethernet Link Aggregation and Switch Stacking
Basic Concepts of Link Aggregation
Working Principles of Manual Link Aggregation
Working Principles and Features of Link Aggregation in LACP Mode
Basic Concepts of iStack and CSS3.5 Implements Communication Between VLANs.
Working Principles of Sub-interfaces
Working Mechanism of Layer 3 Switches
Sub-interface Configuration
VLANIF Configuration4. Network Security and Network Access Basics
4.1 ACL Principles and Configuration
Basic Principles and Functions of ACLs
Basic Structure and Matching Order of ACL Rules
Usage of Wildcard mask
Basic ACL Configuration4.2 AAA Principles and Configuration
Basic Principles and Application Scenarios of AAA
Basic Configuration of the Local AAA4.3 NAT Basics
Background of NAT
NAT Classification and Technical Principles
NAT Configuration in Different Scenarios5. Network Services and Applications
5.1 Network Services and Applications
Principles of TFTP, FTP, DHCP, and HTTP
Configuration of FTP and DHCP6. WLAN Basics
6.1 WLAN Overview
Basic Concepts of WLAN and History of 802.11 Protocol suite
WLAN devices
WLAN Networking Mode
WLAN Working Process
Basic WLAN Configuration7. WAN Basics
7.1 WAN Technology Basics
Basic WAN Concepts
Common WAN Technologies
Working Principles of PPP and PPPoE
Configuring PPP and PPPoE
Basic Concepts of MPLS/SR8. Network Management and O&M
8.1 Network Management and O&M
Basic Concepts of the NMS and O&M
Common NMS and O&M Methods and Tools
Working Principle of SNMP
SDN-based NMS and O&M Solution9. IPv6 Basics
9.1 IPv6 Basics
Comparison Between IPv6 and IPv4
Basic Concepts of IPv6
Format and Principle of the IPv6 Packet Header
IPv6 Address Format and Address Type
IPv6 Address Configuration Method and Procedure
Static and Dynamic IPv6 Address Configuration
IPv6 Static Route Configuration10. SDN and Automation Basics
10.1 SDN and NFV Basics
Basic SDN Concepts
Huawei SDN Products and Solutions
Basic NFV Concepts
Huawei NFV Products and Solutions10.2 Network Programming and Automation
Traditional Network O&M Status Analysis
Implementation of Network Automation
Programming Language
Python Coding Specifications
Implement Basic Automatic O&M Using Python telnetlib.11. Typical Campus Network Architectures and Practices
11.1 Typical Networking Architecture and Cases
Campus Network Architecture
Campus Network Lifecycle
Campus Network Construction Cases
Campus Network Construction Practice - HCIPD-CORE — Datacom Core Technology
- Длительность: 10 дней (80 часов)
 - Код курса: HCIPD-CORE
 - Стоимость
 - Очный формат: 1 269 500 ₸
 - Онлайн формат: 1 252 000 ₸
 
Описание курса
Objectives:
After completing the HCIP-Datacom-Core Technology training, you will be able to:
Understand the entire process of forwarding data packets by network devices.
Understand the working principles and configurations of OSPF, IS-IS, and BGP.
Deploy route control and traffic path control.
Understand the working principles of RSTP/MSTP.
Understand the working principles of stacking technology.
Understand the working principle of multicast and set up a multicast network.
Configure ICMPv6, NDP, and IPv6 addresses.
Master Huawei firewall technologies.
Configure basic security features for network devices.
Master the basic configurations for network reliability.
Describe common network management protocols.
Understand Huawei enterprise datacom solutions.Prerequisites
Be familiar with common operations of Huawei network devices. Have the knowledge and skills described in the HCIA-Datacom and HCIP-Datacom-Core Technology course.
Training Content
1. IP Routing Basics
Introduction to Network Devices: Hardware modules of modular switches, Three planes of network devices, Packet processing on network devices.
IP Routing Basics: RIB and FIB, Route import scenario.2. OSPF Core Knowledge
OSPF Basics: Introduction to dynamic routing protocols, Basic OSPF concepts, Process of establishing an OSPF neighbor relationship, Basic OSPF configuration
OSPF Route Calculation: Intra-area route calculation, Inter-area route calculation, External route calculation
OSPF Special Area and Other Features: Stub area and totally stub area, NSSA area and totally NSSA area, Inter-area route summarization and external route summarization, OSPF Features3. IS-IS Core Knowledge
IS-IS Principles and Configuration: Basic concepts of IS-IS, IS-IS working principle, Basic IS-IS configuration
4. BGP Core Knowledge
BGP Basics: BGP overview, Basic concepts of BGP, Basic BGP configuration
BGP Path Attributes and RRs
BGP route selection
BGP EVPN Basics: MP-BGP, EVPN overview, Common EVPN routes, Typical EVPN application scenarios5. Routing and Traffic Control
Routing Policy and Route Control: Route matching tool, Routing policy tool, Route control cases
Traffic Filtering and Forwarding Path Control: Policy-based routing, MQC, Traffic filtering6. Switching Core Knowledge
RSTP Principles and Configuration: RSTP overview, Improvements of RSTP over STP, RSTP working process, Basic RSTP configurations
MSTP Principles and Configuration: MSTP overview, Basic concepts of MSTP, Working principles of MSTP, Basic MSTP configuration
Stack and CSS: Overview of Stack and CSS technologies, Stacking principles, CSS principles, Basic configuration7. Multicast Basics
IP Multicast Basics: Basic concepts of IP multicast, Multicast data forwarding principle
IGMP Principles and Configuration: IGMP working principle, Introduction to the IGMP feature
PIM Principles and Configuration: PIM basics, PIM-DM, PM-SM8. IPv6 Core Knowledge
IPv6 Overview: IPv6 overview, Introduction to IPv6 addresses
ICMPv6 and NDP: ICMPv6 overview, NDP overview, Router discovery, Duplicate address detection, Redirection
IPv6 address configuration: IPv6 address configuration mode, Stateless IPv6 address autoconfiguration, DHCPv6, Implementation of IPv6 address autoconfiguration9. Network Security Basics
Huawei Firewall Technology: Firewall overview, Basic concepts of firewalls, Basic firewall configuration
Network Device Security Features: Security hardening policies for common devices, Network device security hardening deployment example
VPN Technology Overview: VPN technology overview, Common VPN technologies
Basic Concepts and Applications of VRF10. Network Reliability
BFD Principles and Configuration: BFD Overview, BFD working principle, BFD application scenarios, Basic BFD configurations
VRRP Principles and Configuration:VRRP overview, VRRP working principles, Typical VRRP application, Basic VRRP configuration11. Network Service and Management
DHCP Principles and Configuration: DHCP background, DHCP working principle and configuration, DHCP Relay working principle and configuration
Introduction to Network Management Protocols: Development of network management, Functional features of network management, Network management protocols, Application scenarios of network management12. Large-scale WLAN Architecture
Large-Scale WLAN Networking and Deployment: Overview of large-scale WLAN networking, VLAN pool, DHCP technology, Roaming technology, High reliability technology, Network Admission Control technology
13. Network Solution
Enterprise Datacom Solution Overview: Campus, Data center , SDN-WAN, SD-WAN
 - HCIPD-ARST — Datacom Advanced Routing & Switching Technology
- Длительность: 5 дней (40 часов)
 - Код курса: HCIPD-ARST
 - Стоимость
 - Очный формат: 878 000 ₸
 - Онлайн формат: 864 000 ₸
 
Описание курса
Objectives:
After completing the HCIP-HCIP-Datacom-Advanced Routing & Switching Technology Training Content, you will be able to:
Describe OSPF and IS-IS fast convergence technologies.
Configure OSPF and IS-IS equal-cost routes.
Describe the application scenarios of OSPF forwarding addresses.
Using regular expressions in AS_Path filter and community filter configurations.
Configure BGP ORF and peer group functions.
Analyze the differences between OSPFv3 and OSPFv2.
Describe the IPv6 extensions of IS-IS.
Describe the IPv6 extensions of BGP.
Describe the working principle of VLAN aggregation.
Describe the application scenarios of MUX VLAN.
Describe the QinQ implementation mode.
Describe the types and configurations of port isolation.
Describe the technical principles of port security.
Implements MAC address flapping detection.
Expound the switch traffic suppression and storm control functions.
Describe the application scenarios of DHCP snooping.
Describe the working principle of IP Source Guard.
Describe the working principle of MPLS.
Describe the basic concepts and working mechanism of LDP.
Describe the basic concepts of MPLS VPN.
Describe route transmission and label distribution of MPLS VPN.
Describe the MPLS VPN data forwarding process.
MPLS VPN Deployment (Intranet Solution).
MPLS VPN Deployment (Hub&Spoke Solution).
Describe the extended functions and features of OSPF for MPLS VPN.
Describe routine maintenance items.
Describe the functions and features of Information Center.
Using Common Maintenance Tools.
Describe troubleshooting methods.
Analyze the fault that the neighbor relationship of the routing protocol cannot be established.
Write the troubleshooting guide.
Describe the operation procedure and specifications of the migration.
Describe common migration scenarios.Target Audience
Who want to become senior Data Communication engineers. Who wants to obtain the HCIP-Datacom-Advanced Routing & Switching Technology Certification.
Prerequisites
Be familiar with common operations of Huawei network devices. Have the knowledge and skills described in the HCIA-Datacom and HCIP-Datacom-Core Technology course.
Training Content
1. Advanced IGP Features
Advanced IGP Features: OSPF fast convergence, OSPF Route Control, Other OSPF Features, Advanced IS-IS Features
2. Advanced BGP Features
Advanced BGP Features: BGP route control, Introduction to BGP Features, Networking of BGP RRs
3. IPv6 Routing
IPv6 Routing: IPv6 static route, OSPFv3 Principles and Configuration, IS-IS (IPv6) Principles and Configuration, BGP4+ Principles and Configuration
4. Advanced Ethernet Technologies
Advanced VLAN Technology: Super-VLAN, MUX-VLAN, QinQ
Ethernet Switching Security: Port Isolation , MAC Table Security, Port security , MAC Address Flapping Prevention and Detection , MACsec , Switch traffic control , DHCP Snooping , IP Source Guard5. MPLS Technology
MPLS Principles and Configuration: MPLS Overview, MPLS Forwarding, Static LSP
MPLS LDP Principles and Configuration: Basic Concepts of LDP, Working Principle of LDP, Basic LDP Configurations
MPLS VPN Principles and Configuration: MPLS VPN Overview, MPLS VPN route exchange, MPLS VPN packet forwarding, MPLS VPN Configuration and Implementation
MPLS VPN Deployment and Application: MPLS VPN Application and Networking Overview, Typical Application Scenarios and Deployment of MPLS VPN, OSPF VPN expansion - SD-WAN — HCIP-Datacom-SD-WAN Planning and Deployment
- Длительность: 5 дней (40 часов)
 - Код курса: SD-WAN
 - Стоимость
 - Очный формат: 1 274 500 ₸
 - Онлайн формат: 1 259 000 ₸
 
Описание курса
Course Objectives
On completion of this program, the participants will be able to:
Describe basic concepts of SD-WAN deployment planning.
Describe the management boundary of SD-WAN multi-tenant.
Describe SD-WAN deployment modes and application scenarios.
Describe the overall process of implementing application experience.
Describe the function of link quality detection.
Describe HQoS application scenarios.
Describes the basic principles and application scenarios of the service security function in the SD-WAN solution.
Describes various visualized monitoring functions provided by iMaster NCE-WAN.
Describes various fault diagnosis methods provided by iMaster NCE-WAN.
Describe the basic concepts of tunnels.
Describe the basic working principles of GRE.
Describe the basic security mechanism of GRE.
Describe the basic application scenarios of GRE.
Describe the basic concepts of IPsec.
Describe the basic working principles of IPsec.
Describe the basic application scenarios of IPsec.
Describe the basic concepts of MP-BGP.
Describe the origin of EVPN.
Describe common EVPN route types.
Describe the background of QoS.
Describe the working principle of the QoS DiffServ model.
Describe the application scenarios of different QoS functions.
Describe basic QoS configurations.
Describe common technologies and principles of link detection.
Describe common technologies and principles of link backup.
Describe the basic working principles and application scenarios of the SAC.
Describe the basic working principles and application scenarios of SPR.
Describe the functions and features supported by AR routers.
Describe the WLAN service features of AR routers.
Describe the security service features of AR routers.
Describe the disadvantages of the SNMP protocol.
Describe how NETCONF flexibly controls devices.
Describe the advantages of Telemetry collection of device status and performance.
Describe the northbound RESTful interface of the NMS/controller.
Describe the common network faults
Describe typical services in the financial industry.
Describe the informatization development trend of the financial industry
Describe the network architecture of the financial industry
Describe the SD-WAN design roadmap for the financial industry
Describe the challenges of WAN interconnection in the cloud environment.
Explain the basic concepts of SDN.
Explain the basic concepts of SD-WAN.
Describe the Huawei SD-WAN solution.
Describe the traditional WAN interconnection solution.
Describe technologies used in WANs.
Describe the three application scenarios of SD-WAN.Target Audience
Those who wants to be datacom SD-WAN senior engineers
Those who wants to achieve the HCIP-Datacom-SD-WAN Planning and Deployment CertificationPrerequisites
Suggest to acquire HCIP-Datacom-Core Technology abilities
Training Content
SD-WAN Solution Deployment and Design
Huawei SD-WAN Solution Technical Overview
Architecture and Components of Huawei SD-WAN Solution
Huawei iMaster NCE-WAN Controller
Huawei SD-WAN Solution Principles
Introduction to Huawei SD-WAN CPESD-WAN Deployment
SD-WAN Deployment Overview
SD-WAN Tenant Management
SD-WAN Zero Touch ProvisioningSD-WAN Networking Principles and Planning
Basic Concepts of SD-WAN Networking
SD-WAN Networking Principles
SD-WAN Networking DesignSD-WAN Application Experience
Application Experience Solution Overview
Application identification and intelligent traffic steering
HQoS
WAN optimizationSD-WAN Security
SD-WAN Security Overview
System security
Service securitySD-WAN Intelligent O&M
Intelligent O&M Overview
monitoring
maintenanceKey Technologies for WAN Interconnection
GRE Technology
Basic Principles of GRE
GRE Security Mechanism
GRE Application Scenario
GRE ConfigurationIPsec VPN Technology
Basic Concepts of IPsec
Basic Principles of IPsec
IPsec Application Scenarios
IPsec ConfigurationBGP EVPN Basics
MP-BGP
EVPNBasic Principles of QoS
QoS Technology Overview
QoS traffic classification and marking
Traffic Rate Limiting
Congestion avoidance technology
Congestion Management Technology
Introduction to HQoSHA technology
Link reliability
Network reliability
Service reliabilityIntroduction to the Multi-Service Gateway
AR Functions and Features
AR WLAN Service Features
AR Security Service FeaturesManagement and O&M
Introduction to Zero Touch Provisioning
Introduction to Network Maintenance
Network O&MSD-WAN Design Practice (Financial Scenario)
Background of the Finance Industry
Overall SD-WAN Design for the Finance Industry
SD-WAN Design Cases in the Finance IndustryWAN Interconnection Overview
Enterprise WAN Interconnection Status
Challenges to Enterprise WAN Interconnection
Birth of SD-WAN
Introduction to Huawei SD-WAN SolutionWAN Interconnection Technologies and Typical Scenarios
Traditional enterprise WAN interconnection solution
Enterprise WAN Interconnection Technology Application
SD-WAN Application Scenarios - NE40E — Маршрутизаторы Huawei
- Длительность: 4 дня (32 часа)
 - Код курса: NE40E
 - Стоимость
 - Очный формат: 1 002 000 ₸
 - Онлайн формат: 989 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям познакомиться с архитектурой, принципами настройки и эксплуатации маршрутизаторов Huawei NE40E. В рамках курса рассматривается настройка основных функций маршрутизаторов с точки зрения задач сервис-провайдера.
Аудитория курса:
Специалисты, занимающиеся пуско-наладкой, а также эксплуатацией маршрутизаторов Huawei NE40E.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP.
Содержание курса:
Модуль 1 – Платформа маршрутизации Huawei NE40E.
Модельный ряд маршрутизаторов серии NE.
Шасси NE40E.
Линейные карты NE40E и возможности чипсета Solar.Модуль 2 – Позиционирование платформы NE40E.
Архитектура WAN3.0.
Программное управление и SDN.
Data-Center Interconnect.
Mobile backhaul.Модуль 3 – Настройка маршрутизаторов NE40E.
Принципы работы с cli NE40E.
Работа с файлами конфигурации.
Настройка системных параметров.
Настройка удаленного доступа.
Настройка механизмов контроля доступа.
Настройка функций log’ирования.
Настройка интерфейсов и IP-адресов.
Настройка статической маршрутизации.Модуль 4 – Функции маршрутизации NE40E для решения задач сервис-провайдера
Настройка динамической маршрутизации OSPF.
Настройка динамической маршрутизации IS-IS.
Настройка динамической маршрутизации BGP.
Настройка туннелей IPsec VPN.
Настройка туннелей GRE.Модуль 5 – Функции MPLS VPN на платформе NE40E.
Настройка MPLS L3 VPN.
Настройка MPLS L2 VPN.
Настройка Inter-AS MPLS VPN.Модуль 6 – Функции Segment-Routing на платформе NE40E.
Настройка MPLS SR.
Настройка IPv6 SR.Модуль 7 – Сервисные функции на платформе NE40E.
Настройка функции O&M.
Настройка BFD.
Настройка QoS.
Настройка NAT.
Настройка Multicast’а.
Настройка агрегирования каналов. LAG/MC-LAG.Модуль 8 – Обслуживание маршрутизаторов NE40E.
Обновление программного обеспечения.
Поиск и устранение неисправностей. - HCIED — HCIE Datacom
- Длительность: 10 дней (80 часов)
 - Код курса: HCIED
 - Стоимость
 - Очный формат: 1 904 000 ₸
 - Онлайн формат: 1 887 500 ₸
 
Описание курса
Objectives:
On completion of this program, the participants will be able to:
Describe OSPF and IS-IS fast convergence technologies.
Configure OSPF and IS-IS equal-cost routes.
Describe OSPF and IS-IS default routes advertisement.
Describe the application scenarios of OSPF and IS-IS multi-process.
Describe the GR and NSR principles of OSPF and IS-IS.
Describe the application scenarios of OSPF forwarding addresses.
Describe the working principles of IS-IS LSP fragment extension.
Use AS_Path Filter and Community Filter to implement BGP route control.
Apply the ORF function and peer group function of BGP.
Understand basic configuration for implementing BGP security.
Describe the concept and usage of the 4-byte AS number.
Describe the networking of BGP RRs.
Clarify the types and configurations of port isolation.
Clarify the technical principles of port security.
Detect MAC address flapping.
Clarify switch traffic suppression and storm control functions.
Describe application scenarios of DHCP snooping.
Clarify how IP Source Guard works.
Describe the working scenarios of dual-system hot backup.
Describe the basic concepts and terms of MPLS.
Describe the working principles of MPLS.
Configure static LSPs.
Describe the MPLS forwarding process.
Describe the basic concepts and working mechanism of LDP.
Describe the MPLS label distribution control mode, advertisement mode, and retention mode.
Understand Basic LDP configuration.
Describe the MPLS VPN model.
Describe the basic concepts of MPLS VPN.
Describe MPLS VPN routing and label distribution.
Describe the MPLS VPN data forwarding process.
Perform basic MPLS VPN configurations.
Describe the principles of the three cross-domain solutions.
Understand basic configuration of three cross-domain solutions.
Describe the application scenarios of the three cross-domain solutions.
Describe the development histories of EVPN.
Describe how EVPN solves VPLS problems.
Describe the common routing types and working principles of EVPN.
Describe the principles of inter-AS EVPN.
Describe typical application scenarios of EVPN.
Configure IPv6 static routes.
Analyze the differences between OSPFv3 and OSPFv2.
Understand basic OSPFv3 configuration.
Describes IS-IS extensions to IPv6.
Understand basic IS-IS (IPv6) configuration.Training Content
1. Advanced Routing and Switching Technology
Advanced IGP Features
Advanced BGP Features
Network Security Technologies
MPLS Fundamentals and Configuration
MPLS LDP Fundamentals and Configuration
MPLS VPN Fundamentals and Configuration
MPLS VPN Deployment and Application
Inter-AS MPLS L3VPN
EVPN Fundamentals and Configuration
IPv6 Routing
IPv6 Transition Technologies
QoS Fundamentals
Network O&M
Network Troubleshooting
Network Migration2. Campus Network Planning and Deployment
Enterprise Network Introduction
Enterprise Campus Network Overview
VXLAN and Campus Network Virtualization
Network Admission Control
Free Mobility
Large- and Medium-Sized Virtualized Campus Network Design
Virtualized Campus Network Deployment Guide
Small- and Medium-Sized Cloud-Managed Campus Network Design
CampusInsight Intelligent O&M3. WAN Interconnection Network Planning and Deployment
WAN Interconnection Solution and Technologies Overview
Key Technologies of WAN Interconnection
SD-WAN Solution Planning and Design4. Bearer WAN Planning and Deployment
Enterprise Bearer WAN Solution
Enterprise Bearer WAN Architecture and Key Technologies
Segment Routing
SRv6 Fundamentals and Configuration
Enterprise Bearer WAN Design
IPE Key Technologies and Evolution Trends5. Network Automation
Network Automation Overview
SSH Fundamentals and Practice
NETCONF YANG Fundamentals and Practice
Telemetry Fundamentals and Practice
OPS Fundamentals and Practice
RESTful Fundamentals and Practice
iMaster NCE-Campus Open APIs Introduction
iMaster NCE Service Openness And Programmability 
VMware
- VCDDCM106 — VMware Cloud Director: Deploy, Configure, Manage
- Длительность: 5 дней (40 часов)
 - Код курса: VCDDCM106
 - Стоимость
 - Очный формат: 1 221 500 ₸
 - Онлайн формат: 1 197 500 ₸
 
Описание курса
Course Description
In this five-day course, you focus on installing, configuring, and managing on-premises VMware Cloud Director 10.6. You will learn how to set up and manage VMware Cloud Director, including the provisioning of workloads, creating organizations and Virtual Data Centers (VDCs), and use catalog services that include predefined virtual machines. You will learn about different networks that a system administrator and an organization administrator can configure and use with virtual machines and vApps.
Who should attend
Cloud architects, systems engineers, data center administrators, and cloud administrators with experience in managed services or managing a service provider environment.
Prerequisites
This course requires completion of the following course and equivalent knowledge:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware NSX: Install, Configure, Manage [V4.0] (NSXICM4)Course Objectives
By the end of the course, you should be able to meet the following objectives:Describe the architecture and main components of VMware Cloud Director
Explain the features and benefits of VMware Cloud Director
Deploy high availability VMware Cloud Director cluster
Create VMware Cloud Director provider virtual data centers and organizations
Configure and create vApps and VMs
Create users and role-based access control
Create and manage VMware Cloud Director catalogs
Create and manage VMware Cloud Director networks
Create VM sizing and placement policies
Discuss additional features of VMware Cloud DirectorCourse Content
Course Introduction
VMware Cloud Director Deployment and Configuration
VMware Cloud Director Provider Configuration
VMware Cloud Director User, Roles, and Quota Management
VMware Cloud Director Virtual Machines and vApps
Managing Catalogs and Templates
VMware Cloud Director Networking
Sub-Provider in VMware Cloud Director
VMware Avi Load Balancer
Edge Data Center Group Networking
Additional Features of VMware Cloud Director - VAAICM817 — VMware Aria Automation: Install, Configure, Manage [V8.17]
- Длительность: 5 дней (40 часов)
 - Код курса: VAAICM817
 - Стоимость
 - Очный формат: 938 500 ₸
 - Онлайн формат: 911 500 ₸
 
Описание курса
Course Overview
During this five-day course, you focus on installing, configuring, and managing VMware® Aria Automation™ 8.17 on- premises systems. You learn to use VMware Aria Automation to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how VMware® Aria Automation Service Broker™ can aggregate content in native formats from multiple clouds and platforms into a common catalog.
This course also covers interfacing VMware Aria Automation with other systems using VMware® Aria Automation Orchestrator™ and how to use VMware Aria Automation to manage Kubernetes systems and use other systems. In this course, you will use VMware® Aria Automation Config™ as a configuration management tool.Who should attend
System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation
Certifications
This course is part of the following Certifications:
VMware Certified Professional – Cloud Management and Automation
VMware Certified Advanced Professional – Cloud Management and Automation DesignPrerequisites
This course requires the students to have strong knowledge on basic VMware vSphere® concepts.Students should be able to perform the following tasks with no assistance or guidance before enrolling in this course:Create VMware® vCenter® objects, such as data centers and folders
Create a virtual machine using a wizard or a template
Modify a virtual machine’s hardware
Navigate through the VMware vSphere ClientCourse Objectives
By the end of the course, you should be able to meet the following objectives:Install and configure VMware Aria Automation
Describe the VMware Aria Automation architecture and its use cases in multitenant cloud environments
Identify the roles of VMware Identity Manager and VMware Aria Suite Lifecycle
Configure and manage cloud accounts and projects for compute resources
Configure, customize, and manage VMware Aria Automation Templates
Configure VMware Aria Automation Service Broker for creating a self-service catalog
Use the self-service portal to request and manage deployments in VMware Aria Automation
Integrate NSX with VMware Aria Automation
Integrate VMware Aria Automation with VMware Cloud Foundation
Describe VMware Aria Automation extensibility
Use and manage Kubernetes clusters from VMware Aria Automation
Use VMware Aria Automation Config for software deployment and configuration management
Identify the key log files and commands to troubleshoot VMware Aria AutomationCourse Content
Course Introduction
VMware Aria Automation Overview and Architecture
Installing VMware Aria Automation
Authentication and Authorization
Basic Initial Configuration
VMware Aria Automation Templates
Using VMware Aria Automation Tags
Configuring Storage in VMware Aria Automation
Integrating NSX With VMware Aria Automation
Integrating VMware Aria Automation with Cloud Systems
Using VMware Aria Automation Service Broker
VMware Aria Automation Extensibility
Integration with Kubernetes
Introduction to VMware Aria Automation Config
Troubleshooting and Integration with VMware Aria Suite - AOLICM812 — VMware Aria Operations for Logs: Install, Configure, Manage [V8.12]
- Длительность: 3 дня (24 часа)
 - Код курса: AOLICM812
 - Стоимость
 - Очный формат: 856 000 ₸
 - Онлайн формат: 836 000 ₸
 
Описание курса
Course Overview
This three-day course features hands-on training that focuses on deploying, configuring, and managing VMware Aria Operations™ for Logs 8.12. You will learn the UI enhancements, features, architecture, use cases, and benefits of VMware Aria Operations for Logs. This course provides you with the knowledge and skills to use VMware Aria Operations for Logs 8.12 to monitor your environment.
Product Alignment
VMware vSphere 8.0 U1
VMware Aria Operations for Logs 8.12
VMware Aria Operations 8.12Course Content
Course Introduction
Introductions and course logistics
Course objectives
Introduction to VMware Aria Operations for LogsDescribe the VMware Aria cloud management platform
Describe the VMware Aria™ use cases
Describe the key capabilities of VMware Aria Operations for Logs
Describe the requirements for a log analytics solution
Explain the importance of efficient log management
Navigate the VMware Aria Operations for Logs UI
Describe the various stages of log processingVMware Aria Operations for Logs Architecture and Deployment
Identify the minimum requirements for deploying VMware Aria Operations for Logs
Explain how to use the VMware Aria Operations for Logs sizing calculator
Describe VMware Aria Operations for Logs compatibility with other VMware products
Describe the VMware Aria Operations for Logs architecture
Explain how to install the VMware Aria Operations for Logs virtual applianceVMware Aria Operations for Logs Queries and Dashboards
Describe the primary functions of the VMware Aria Operations for Logs UI
Use the Interactive Analytics tab to get a deeper understanding of log data
Create and manage queries
Create VMware Aria Operations for Logs custom dashboards
Describe and use the VMware Aria Operations for Logs widgetsAdministering VMware Aria Operations for Logs
Describe user access control in VMware Aria Operations for Logs
Describe user management
Access the VMware Aria Operations for Logs Administration page
Configure VMware Aria Operations for Logs settings
Manage certificates
Configure system notifications
Explain how to upgrade VMware Aria Operations for Logs
Describe the VMware Aria Operations for Logs ImporterVMware Aria Operations for Logs Integrations
Describe how to integrate vRealize Operations with VMware Aria Operations for Logs
Discuss the advantages of integrating vRealize Operations with VMware Aria Operations for Logs
Discuss the advantages of using the vSAN content pack
Explain how to install NSX content packsVMware Aria Operations for Logs (SaaS)
Explain the VMware Aria Operations for Logs (SaaS) architecture
Describe the ingestion options for Aria Operations for Logs (SaaS)
Discuss integration with on-premises Aria Operations for Logs
Configure log forwarding to VMware Aria Operations for Logs (SaaS) without deploying additional VMware Cloud Proxy instancesWho should attend
System administrators
System engineers
ConsultantsPrerequisites
System administration experience with VMware vSphere® deployments or completion of one of the following courses:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware vSphere: Operate, Scale and Secure [V8] (VSOSS8)Course Objectives
By the end of the course, you should be able to meet the following objectives:
Identify the features and benefits of VMware Aria Operations for Logs
Determine which VMware Aria Operations for Logs cluster meets your monitoring requirements
Describe the VMware Aria Operations for Logs architecture and use cases
Deploy and configure a VMware Aria Operations for Logs cluster
Use the Explore Logs page to get a deep understanding of log data
Create and manage queries
Manage VMware Aria Operations for Logs agents and agent Groups
Create custom dashboards
Explain how to use the VMware Aria Operations for Logs widgets
Extend the capabilities of VMware Aria Operations for Logs by adding content packs and configuring solutions
Discuss VMware Aria Operations for Logs (SaaS) - VSICM8 — VMware vSphere v8: Install, Configure, Manage
- Длительность: 5 дней (40 часов)
 - Код курса: VSICM8
 - Стоимость
 - Очный формат: 824 500 ₸
 - Онлайн формат: 797 000 ₸
 
Описание курса
Overview
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8. This course prepares you to administer a vSphere infrastructure for an organization of any size.
This course is the foundation for most VMware technologies in the software-defined data center.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Objectives
By the end of the course, you should be able to meet the following objectives:
Install and configure ESXi hosts
Deploy and configure vCenter
Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users
Create virtual networks using vSphere standard switches and distributed switches
Create and configure datastores using storage technologies supported by vSphere
Use the vSphere® Client™ to create virtual machines, templates, clones, and snapshots
Create content libraries for managing templates and deploying virtual machines
Manage virtual machine resource allocation
Migrate virtual machines with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
Create and configure a vSphere cluster that is enabled with VMware vSphere® High Availability and
VMware vSphere® Distributed Resource Scheduler™
Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to datePrerequisites
This course has the following prerequisites:
System administration experience on Microsoft Windows or Linux operating systems
Audience
System administrators
System engineersOutline
1 Course Introduction
Introductions and course logistics
Course objectives2 vSphere and Virtualization Overview
Explain basic virtualization concepts
Describe how vSphere fits in the software-defined data center and the cloud infrastructure
Recognize the user interfaces for accessing vSphere
Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs3 Installing and Configuring ESXi
Install an ESXi host
Recognize ESXi user account best practices
Configure the ESXi host settings using the DCUI and VMware Host Client4 Deploying and Configuring vCenter
Recognize ESXi hosts communication with vCenter
Deploy vCenter Server Appliance
Configure vCenter settings
Use the vSphere Client to add and manage license keys
Create and organize vCenter inventory objects
Recognize the rules for applying vCenter permissions
View vCenter logs and events5 Configuring vSphere Networking
Configure and view standard switch configurations
Configure and view distributed switch configurations
Recognize the difference between standard switches and distributed switches
Explain how to set networking policies on standard and distributed switches6 Configuring vSphere Storage
Recognize vSphere storage technologies
Identify types of vSphere datastores
Describe Fibre Channel components and addressing
Describe iSCSI components and addressing
Configure iSCSI storage on ESXi
Create and manage VMFS datastores
Configure and manage NFS datastores7 Deploying Virtual Machines
Create and provision VMs
Explain the importance of VMware Tools
Identify the files that make up a VM
Recognize the components of a VM
Navigate the vSphere Client and examine VM settings and options
Modify VMs by dynamically increasing resources
Create VM templates and deploy VMs from them
Clone VMs
Create customization specifications for guest operating systems
Create local, published, and subscribed content libraries
Deploy VMs from content libraries
Manage multiple versions of VM templates in content libraries8 Managing Virtual Machines
Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances
Migrate VMs using vSphere vMotion
Describe the role of Enhanced vMotion Compatibility in migrations
Migrate VMs using vSphere Storage vMotion
Take a snapshot of a VM
Manage, consolidate, and delete snapshots
Describe CPU and memory concepts in relation to a virtualized environment
Describe how VMs compete for resources
Define CPU and memory shares, reservations, and limits9 Deploying and Configuring vSphere Clusters
Create a vSphere cluster enabled for vSphere DRS and vSphere HA
View information about a vSphere cluster
Explain how vSphere DRS determines VM placement on hosts in the cluster
Recognize use cases for vSphere DRS settings
Monitor a vSphere DRS cluster
Describe how vSphere HA responds to various types of failures
Identify options for configuring network redundancy in a vSphere HA cluster
Recognize vSphere HA design considerations
Recognize the use cases for various vSphere HA settings
Configure a vSphere HA cluster
Recognize when to use vSphere Fault Tolerance10 Managing the vSphere Lifecycle
Enable vSphere Lifecycle Manager in a vSphere cluster
Describe features of the vCenter Update Planner
Run vCenter upgrade prechecks and interoperability reports
Recognize features of VMware vSphere® Lifecycle Manager™
Distinguish between managing hosts using baselines and managing hosts using images
Describe how to update hosts using baselines
Describe ESXi images
Validate ESXi host compliance against a cluster image and update ESXi hosts
Update ESXi hosts using vSphere Lifecycle Manager
Describe vSphere Lifecycle Manager automatic recommendations
Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware - VSOSS8 — VMware vSphere: Operate, Scale and Secure V8
- Длительность: 5 дней (40 часов)
 - Код курса: VSOSS8
 - Стоимость
 - Очный формат: 824 500 ₸
 - Онлайн формат: 797 000 ₸
 
Описание курса
Overview
This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Objectives
By the end of the course, you should be able to meet the following objectives:
Configure and manage a VMware Tools Repository
Configure vSphere Replication and recover replicated VMs
Manage VM resource usage with resource pools
Configure and manage vSphere networking and storage for a large and sophisticated enterprise
Configure VMware vCenter Server® High Availability
Use host profiles to manage VMware ESXi™ 8 host compliance
Use the vSphere Client and the command line to manage certificates
Monitor the vCenter, ESXi, and VMs performance in the vSphere client
Secure VMware vCenter® 8, ESXi, and VMs in your vSphere environment
Use Identity Federation to configure the vCenter to use external identity sources
Use VMware vSphere® Trust Authority™ secure the infrastructure for encrypted VMsPrerequisites
This course requires the following:
Attend VMware vSphere: Install, Configure, Manage [V8]
Equivalent knowledge and administration experience with ESXi and vCenter
Experience with working at the command line is highly recommended.Audience
Experienced system administrators
System engineers
System integratorsOutline
1 Course Introduction
Introductions and course logistics
Course objectives2 Virtual Machine Operations
Recognize the role of a VMware ToolsTM Repository
Configure a VMware Tools Repository
Recognize the backup and restore solution for VMs
Identify the components in the VMware vSphere® ReplicationTM architecture
Deploy and configure vSphere Replication and VMware Site RecoveryTM instances
Recover replicated VMs3 vSphere Cluster Operations
Create and manage resource pools in a cluster
Describe how scalable shares work
Describe the function of the vCLS
Recognize operations that might disrupt the healthy functioning of vCLS VMs4 Network Operations
Configure and manage vSphere distributed switches
Describe how VMware vSphere® Network I/O Control enhances performance
Explain distributed switch features such as port mirroring and NetFlow
Define vSphere Distributed Services Engine
Describe the use cases and benefits of VMware vSphere® Distributed Services EngineTM5 Storage Operations
Discuss vSphere support for NVMe and iSER technologies
Describe the architecture and requirements of vSAN configuration
Describe storage policy-based management
Recognize components in the VMware vSphere® Virtual VolumesTM architecture
Configure Storage I/O Control6 vCenter and ESXi Operations
Create a vCenter backup schedule
Recognize the importance of vCenter High Availability
Explain how vCenter Server High Availability works
Use host profiles to manage ESXi configuration compliance
Recognize the benefits of using configuration profiles
Use the vSphere client and the command line to manage certificates7 vSphere Monitoring
Monitor the key factors that can affect a virtual machine’s performance
Describe the factors that influence vCenter performance
Use vCenter tools to monitor resource use
Create custom alarms in vCenter
Describe the benefits and capabilities of VMware SkylineTM
Recognize uses for VMware Skyline AdvisorTM Pro8 vSphere Security and Access Control
Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines
Describe vSphere support for security standards and protocols
Describe identity federation and recognize its use cases
Configure identity federation to allow vCenter to use an external identity provider9 vSphere Trusted Environments and VM Encryption
Configure ESXi Host Access and Authentication
Describe virtual machine security features
Describe the components of a VM encryption architecture
Create, manage, and migrate encrypted VMs
List VM encryption events and alarms
Describe the benefits and use cases of vSphere Trust Authority - VSFT8 — VMware vSphere: Fast Track V8
- Длительность: 5 дней (40 часов)
 - Код курса: VSFT8
 - Стоимость
 - Очный формат: 1 180 000 ₸
 - Онлайн формат: 1 152 500 ₸
 
Описание курса
Overview
This five-day, extended hour course takes you from introductory to advanced VMware vSphere® 8 management skills. Building on the installation and configuration content from our best-selling course, you will also develop advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will install, configure, and manage vSphere 7. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter Server® 8.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Objectives
By the end of the course, you should be able to meet the following objectives:
Install and configure ESXi hosts
Deploy and configure vCenter
Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users
Configure vCenter High Availability
Create and configure virtual networks using vSphere standard switches and distributed switches
Create and configure datastores using storage technologies supported by vSphere
Use the vSphere Client to create virtual machines, templates, clones, and snapshots
Configure and manage a VMware Tools Repository
Create content libraries for managing templates and deploying virtual machines
Manage virtual machine resource use
Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion
Create and configure a vSphere cluster that is enabled with vSphere High Availability and vSphere Distributed Resource
Scheduler
Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date
Configure and manage vSphere networking and storage for a large and sophisticated enterprise
Use host profiles to manage VMware ESXi host compliance
Monitor the vCenter, ESXi, and VMs performance in the vSphere clientPrerequisites
This course has the following prerequisites:
System administration experience on Microsoft Windows or Linux operating systems
Audience
System administrators
System engineersOutline
1 Course Introduction
Introductions and course logistics
Course objectives2 vSphere and Virtualization Overview
Explain basic virtualization concepts
Describe how vSphere fits in the software-defined data center and the cloud infrastructure
Recognize the user interfaces for accessing vSphere
Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs
Install an ESXi host3 vCenter Management
Recognize ESXi hosts communication with vCenter
Deploy vCenter Server Appliance
Configure vCenter settings
Use the vSphere Client to add and manage license keys
Create and organize vCenter inventory objects
Recognize the rules for applying vCenter permissions
View vSphere tasks and events
Create a vCenter backup schedule
Recognize the importance of vCenter High Availability
Explain how vCenter High Availability works4 Configure and Manage vSphere Networking
Configure and view standard switch configurations
Configure and view distributed switch configurations
Recognize the difference between standard switches and distributed switches
Explain how to set networking policies on standard and distributed switches5 Configure and Manage vSphere Storage
Recognize vSphere storage technologies
Identify types of vSphere datastores
Describe Fibre Channel components and addressing
Describe iSCSI components and addressing
Configure iSCSI storage on ESXi
Create and manage VMFS datastores
Configure and manage NFS datastores
Discuss vSphere support for NVMe and iSER technologies6 Deploying Virtual Machines
Create and provision VMs
Explain the importance of VMware Tools
Identify the files that make up a VM
Recognize the components of a VM
Navigate the vSphere Client and examine VM settings and options
Modify VMs by dynamically increasing resources
Create VM templates and deploy VMs from them
Clone VMs
Create customization specifications for guest operating systems
Create local, published, and subscribed content libraries
Deploy VMs from content libraries
Manage multiple versions of VM templates in content libraries7 Managing Virtual Machines
Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances
Migrate VMs using vSphere vMotion
Describe the role of Enhanced vMotion Compatibility in migrations
Migrate VMs using vSphere Storage vMotion
Take a snapshot of a VM
Manage, consolidate, and delete snapshots
Describe CPU and memory concepts in relation to a virtualized environment
Describe how VMs compete for resources
Define CPU and memory shares, reservations, and limits
Recognize the role of a VMware Tools Repository
Configure a VMware Tools Repository
Recognize the backup and restore solution for VMs8 vSphere Cluster Management
Use Cluster Quickstart to enable vSphere cluster services and configure the cluster
View information about a vSphere cluster
Explain how vSphere DRS determines VM placement on hosts in the cluster
Recognize use cases for vSphere DRS settings
Monitor a vSphere DRS cluster
Describe how vSphere HA responds to different types of failures
Identify options for configuring network redundancy in a vSphere HA cluster
Recognize the use cases for various vSphere HA settings
Configure a cluster enabled for vSphere DRS and vSphere HA
Recognize when to use vSphere Fault Tolerance
Describe the function of the vCLS
Recognize operations that might disrupt the healthy functioning of vCLS VMs9 Managing the vSphere Lifecycle
Generate vCenter interoperability reports
Recognize features of vSphere Lifecycle Manager
Describe ESXi images and image depots
Enable vSphere Lifecycle Manager in a vSphere cluster
Validate ESXi host compliance against a cluster image and remediate ESXi hosts using vSphere Lifecycle Manager
Describe vSphere Lifecycle Manager automatic recommendations
Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware10 Network Operations
Configure and manage vSphere distributed switches
Describe how VMware vSphere Network I/O Control enhances performance
Define vSphere Distributed Services Engine
Describe the use cases and benefits of vSphere Distributed Services Engine11 Storage Operations
Describe the architecture and requirements of vSAN configuration
Describe storage policy-based management
Recognize components in the vSphere Virtual Volumes architecture
Configure Storage I/O Control12 ESXi Operations
Use host profiles to manage ESXi configuration compliance
Recognize the benefits of using configuration profiles13 vSphere Monitoring
Monitor the key factors that can affect a virtual machine’s performance
Describe the factors that influence vCenter performance
Use vCenter tools to monitor resource use
Create custom alarms in vCenter
Describe the benefits and capabilities of VMware Skyline
Recognize uses for Skyline Advisor Pro - VSTS8 — VMware vSphere: Troubleshooting V8
- Длительность: 5 дней (40 часов)
 - Код курса: VSTS8
 - Стоимость
 - Очный формат: 833 000 ₸
 - Онлайн формат: 813 000 ₸
 
Описание курса
Overview
This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere® Client™, log files, and other tools to analyze and solve problems.
Product Alignment
VMware ESXi 8.0
VMware vCenter Server 8.0Objectives
By the end of the course, you should be able to meet the following objectives:
Introduce troubleshooting principles and procedures
Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment
Explain the purpose of common vSphere log files
Identify networking issues based on reported symptoms
Validate and troubleshoot the reported networking issue
Identify the root cause of networking issue
Implement the appropriate resolution to recover from networking problems
Analyze storage failure scenarios using a logical troubleshooting methodology identify the root cause of storage failure
Apply the appropriate resolution to resolve storage failure problems
Troubleshoot vSphere cluster failure scenarios
Analyze possible vSphere cluster failure causes
Diagnose common VMware vSphere® High Availability problems and provide solutions
Identify and validate VMware ESXiTM host and VMware vCenter® problems
Analyze failure scenarios of ESXi host and vCenter problems
Select the correct resolution for the failure of ESXi host and vCenter problems
Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems
Troubleshoot performance problems with vSphere componentsPrerequisites
This course requires completion of one the following courses:
VCP-DCV certification
VMware vSphere: Install, Configure, Manage
VMware vSphere: Operate, Scale and SecureThe course material presumes that you can perform the following tasks with no assistance or guidance before enrolling in this course:
Install and configure ESXi
Install vCenter Server
Create vCenter Server objects, such as data centers and folders
Create and modify a standard switch
Create and modify a distributed switch
Connect an ESXi host to NAS, iSCSI, or Fibre Channel storage
Create a VMware vSphere VMFS datastore
Modify a virtual machine’s hardware
Migrate a virtual machine with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
Configure and manage a VMware vSphere® Distributed Resource SchedulerTM cluster
Configure and manage a VMware vSphere HA cluster
Basic knowledge of command line tools like ESXCLI, DCLI, and PowerCLI
If you cannot complete these tasks, VMware recommends that you take the VMware vSphere: Install, Configure, Manage [V8] course instead.Audience
System architects and system administrators
Outline
1 Course Introduction
Introductions and course logistics
Course objectives2 Introduction to Troubleshooting
Define the scope of troubleshooting
Use a structured approach to solve configuration and operational problems
Apply troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiency3 Troubleshooting Tools
Discuss the various methods to run commands
Discuss the various ways to access ESXi Shell
Use commands to view, configure, and manage your vSphere components
Use the vSphere CLI
Use ESXCLI commands from the vSphere CLI
Use Data Center CLI commands
Identify the best tool for command-line interface troubleshooting
Identify important log files for troubleshooting vCenter Server and ESXi
Describe the benefits and capabilities of VMware SkylineTM
Explain how VMware Skyline works
Describe VMware SkylineTM Health
Describe VMware Skyline AdvisorTM4 Troubleshooting Virtual Networking
Analyze and troubleshoot standard switch problems
Analyze and troubleshoot virtual machine connectivity problems
Analyze and troubleshoot management network problems
Analyze and troubleshoot distributed switch problems5 Troubleshooting Storage
Discuss the vSphere storage architecture
Identify the possible causes of problems in the various types of datastores
Analyze the common storage connectivity and configuration problems
Discuss the possible storage problems causes
Solve the storage connectivity problems, correct misconfigurations, and restore LUN visibility
Review vSphere storage architecture and functionality necessary to troubleshoot storage problems
Use ESXi and Linux commands to troubleshoot storage problems
Analyze log file entries to identify the root cause of storage problems
Investigate ESXi storage issues
Troubleshoot VM snapshots
Troubleshoot storage performance problems
Review multipathing
Identify the common causes of missing paths, including PDL and APD conditions
Solve the missing path problems between hosts and storage devices6 Troubleshooting vSphere Clusters
Identify and troubleshoot vSphere HA problems
Analyze and solve vSphere vMotion problems
Diagnose and troubleshoot common vSphere DRS problems7 Troubleshooting Virtual Machines
Discuss virtual machine files and disk content IDs
Identify, analyze, and solve virtual machine snapshot problems
Troubleshoot virtual machine power-on problems
Identify possible causes and troubleshoot virtual machine connection state problems
Diagnose and recover from VMware Tools installation failures8 Troubleshooting vCenter Server and ESXi
Analyze and solve vCenter Server service problems
Diagnose and troubleshoot vCenter Server database problems
Use vCenter Server Appliance shell and the Bash shell to identify and solve problems
Identify and troubleshoot ESXi host problems - VSD8 — VMware vSphere: Design V8
- Длительность: 3 дня (24 часа)
 - Код курса: VSD8
 - Стоимость
 - Очный формат: 545 500 ₸
 - Онлайн формат: 525 500 ₸
 
Описание курса
Overview
This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Objectives
By the end of the course, you should be able to meet the following objectives:
Create a vSphere design given a case study
Identify and assess the business objectives of the vSphere environment
Identify business requirements, constraints, assumptions, and risks, for all layers in the vSphere environment
Apply a framework to a design
Analyze design choices for vCenter, ESXi, storage, networking, vSphere clusters, and virtual machine
Identify design decisions to ensure manageability, which include scalability, capacity planning and lifecycle management
Identify design decisions to ensure that the vSphere environment is highly available
Identify design decisions to ensure that the vSphere environment performs well
Identify design decisions to ensure that the vSphere environment is secure
Identify design decisions to ensure that the vSphere environment can recover from data loss or disasterPrerequisites
This course requires completion of the one of the following:
VMware vSphere: Install, Configure, Manage
VMware vSphere: Operate, Scale, and SecureAudience
System integrators
Consultants
Solution architectsOutline
1 Course Introduction
Introductions and course logistics
Course objectives2 Infrastructure Assessment
Describe various design framework principles
Follow a proven process to design a virtualization solution
Define customer business objectives and requirements
Use a systematic method to evaluate and document a conceptual model
Create a logical design from a conceptual model
Recognize key information contained in the physical design3 Designing for Manageability: Capacity Planning
Make capacity planning design decisions that adhere to business requirements
Design capacity planning strategies that meet the needs of the vSphere environment and follow VMware best practices
Calculate compute and storage requirements for the VMs in the vSphere environment4 Designing for Manageability: Scalability
Make scalability design decisions that adhere to business requirements
Design scalability strategies that meet the needs of the vSphere environment and follow VMware best practices5 Designing for Manageability: Lifecycle Management
Make lifecycle management design decisions that adhere to business requirements
Design lifecycle management strategies that meet the needs of the vSphere environment and follow VMware best practices6 Designing for Availability
Make availability design decisions that adhere to business requirements
Design availability strategies that meet the needs of the vSphere environment and follow VMware best practices7 Designing for Performance
Make performance design decisions that adhere to business requirements
Design performance strategies that meet the needs of the vSphere environment and follow VMware best practices8 Designing for Security
Make security design decisions that adhere to business requirements
Design security strategies that meet the needs of the vSphere environment and follow VMware best practices9 Designing for Recoverability
Make recoverability design decisions that adhere to business requirements
Design recoverability strategies that meet the needs of the vSphere environment and follow VMware best practices - VSAA8 — VMware vSphere: Advanced Administration V8
- Длительность: 5 дней (40 часов)
 - Код курса: VSAA8
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere 8 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure.
This course uses scenario-based lab exercises and does not provide guided step-by-step instructions. To complete the scenario-based lab exercises, you are required to analyze the task, research, and deduce the required solution. References and suggested documentation are provided. This course utilizes labs to teach students how to effectively navigate and manage vSphere. The course aligns fully with the VMware Certified Advanced Professional – Data Center Virtualization Deploy exam objectives.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesCreating and Configuring Management Clusters
Create a vSphere cluster for management workloads
Activate vSphere cluster features that help to improve resource allocation and availability of virtual machines
Use standard virtual switches to create networking in a cluster
Select the appropriate vSphere storage types to meet requirements
Configure iSCSI storage
Configure VMFS and NFS datastores
Recognize when to configure ESXi NTP and PTP support
Recognize ESXi user account best practices
Configure ESXi host settings
Use vSphere configuration profiles to maintain consistent ESXi host configurationsCreating and Configuring Production Clusters
Use Cluster Quickstart to create a vSAN-activated cluster
Configure advanced vSphere HA settings
Configure the vCenter identity provider
Assign specific permissions and roles to Active Directory Federation Services (ADFS) users
Configure Enhanced vMotion Compatibility on a cluster and a VM
Perform a Cross vCenter Server migration
Use content libraries to share virtual machine templates between sites
Manage VM and ESXi host resources using resource pools, scalable shares, and vSphere DRS rulesTroubleshooting vSphere and Backing Up Configurations
Troubleshoot ESXi connectivity issues
Troubleshoot ESXi storage issues
Troubleshoot vSphere cluster issues
Troubleshoot PowerCLI issues
Generate vCenter and ESXi log bundles
Back up vCenter
Create a vCenter profile to standardize configurations in the environmentLifecycle Management
Troubleshoot upgrade-blocking issues
Increase logging levels on vCenter
Configure a VMware Tools™ shared repository
Upgrade vCenter
Upgrade ESXi
Upgrade VMware Tools
Upgrade virtual machine hardware compatibilityvSphere Security
Configure a key management server
Encrypt virtual machines using vSphere VM encryption
Secure VMs in transit with encrypted vSphere vMotion
Identify and implement different ESXi CPU scheduler options
Apply security hardening guidelines to ESXi hosts
Replace vCenter certificates with trusted CA-signed certificates
Reconfigure the primary network identifier for a vCenter instanceWho should attend
System administrators
System engineersPrerequisites
This course requires completion of the following prerequisites:
VMware vSphere: Install, Configure, Manage
VMware vSphere: Operate, Scale, and Secure
Working knowledge of VMware vSAN™
System administration experience on Microsoft Windows or Linux operating systemsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Configure VMware vCenter® and VMware ESXi™
Configure and manage a vSphere cluster solution for vSphere HA, vSphere DRS, and vSAN
Configure vSphere storage and networking
Perform lifecycle operations on vSphere components
Troubleshoot vSphere infrastructure and connectivity issues
Back up vCenter configurations
Implement solutions for securing the vSphere infrastructure - VSWN8 — VMware vSphere: What’s New V8
- Длительность: 2 дня(16 часов)
 - Код курса: VSWN8
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Overview
In this two-day course, you explore the new features and enhancements following VMware vCenter Server 8.0 and VMware ESXi 8.0. Real-world use-case scenarios, hands-on lab exercises, and lectures teach you the skills that you need to effectively implement and configure VMware vSphere 8.0.
Product Alignment
VMware ESXi 8.0
VMware vCenter Server 8.0Objectives
By the end of the course, you should be able to meet the following objectives:
Recognize the importance of key features and enhancements in vSphere 8.0
Describe vCenter Server, VMware ESXi, storage, virtual machine, and security enhancements in vSphere 8.0
Describe the purpose of vSphere Distributed Services Engine
Update an ESXi host equipped with a Data Processing Unit (DPU) using vSphere Lifecycle Manager
Identify devices supported for system storage on ESXi 8.0
Recognize enhancements to VM hardware compatibility settings
VMware vSphere Memory Monitoring and Remediation and the improvements to vSphere DRS
Recognize the new Virtual Non-Uniform Memory Access (vNUMA) topology settings of a VM in vSphere Client
Use vSphere Lifecycle Manager and Auto Deploy to manage the configuration specifications for the hosts in a cluster
Recognize the vSphere Lifecycle Manager and Auto Deploy enhancements in vSphere 8.0
Recognize the cloud benefits that VMware vSphere+ brings to on-premises workloads
Recognize technology that is discontinued or deprecated in vSphere 8.0Prerequisites
This course requires completion of one of the following courses, or equivalent knowledge, plus administration experience with ESXi and vCenter Server:
VMware vSphere: Install, Configure, Manage
VMware vSphere: Optimize and Scale
VMware vSphere: Fast Track
VMware vSphere: Troubleshooting
Experience with working at the command line is helpful.
The course material presumes that you can perform the following tasks with no assistance or guidance before enrolling in this course:
Install and configure ESXi
Install vCenter Server
Create vCenter Server objects, such as data centers and folders
Create and manage vCenter Server roles and permissions
Create and modify a standard switch
Create and modify a distributed switch
Connect an ESXi host to NAS, iSCSI, or Fibre Channel storage
Create a VMware vSphere VMFS datastore
Use a content library template to create a virtual machine
Modify a virtual machine’s hardware
Migrate a virtual machine with VMware vSphere vMotion and VMware vSphere Storage vMotion
Configure and manage a VMware vSphere Distributed Resource Scheduler cluster
Configure and manage a VMware vSphere High Availability cluster
Use VMware vSphere Lifecycle Manager to perform upgrades to ESXi hosts and VMsAudience
System architects, system administrators, IT managers, VMware partners, and individuals responsible for implementing and managing vSphere architectures who want to deploy vSphere 8.0 into their existing vSphere environment.
Outline
1 Course Introduction
Introductions and course logistics
Course objectives2 Artificial Intelligence and Machine Learning
Describe how device groups support AI and ML in vSphere 8
Describe how device virtualization extensions support AI and ML in vSphere 83 vSphere Distributed Services Engine
Describe the benefits of Distributed Services Engine
Explain how Distributed Services Engine works
Recognize use cases for Distributed Services Engine
Install ESXi on a host equipped with a DPU
View DPU information in vSphere Client
Add an ESXi host equipped with a DPU to a cluster
Update an ESXi host equipped with a DPU using vSphere Lifecycle Manager
Create a vSphere Distributed Switch for network offloads
Add a host with a DPU to the vSphere Distributed Switch
Configure a VM to use Uniform Passthrough Mode4 vSphere and vCenter Management
Review the improvements to the communication between vCenter and ESXi hosts
Review the enhancements to the vCenter recovery process5 ESXi Enhancements
Describe the function of the central configuration store in ESXi
Explain how ConfigStore affects your interaction with ESXi configuration files
Recognize the supported system storage partition configuration on ESXi 8.0
Identify devices supported for system storage on ESXi 8.0
Configure an RDMA host local device on ESXi6 vSphere Storage
Describe the vSAN Express Storage Architecture
Recognize the benefits of using vSAN Express Storage Architecture
Describe the benefits of using NVMe
Recognize the support for NVMe devices in vSphere7 Guest OS and Workloads
Review the enhancements of the latest virtual hardware versions
Describe the features introduced with virtual hardware version 20
Create a snapshot of a VM with an NVDIMM device8 Resource Management
View energy and carbon emission metrics in vRealize Operations Manager
Describe the VMware vSphere Memory Monitoring and Remediation (vMMR) functionality
Describe how vMMR enhances the performance of vSphere DRS9 Security and Compliance
Describe how to handle vTPM secrets when cloning a VM
Manage OVF templates for VMs that are configured with vTPM
Deploy an OVF template with vTPM
Describe the enhancements to trusted binary enforcement in ESXi
Describe ESXi 8 enhanced security features10 vSphere Lifecycle Manager
Describe the enhancements to life cycle management of standalone ESXi hosts
Manage the configuration profiles of ESXi hosts in a cluster with vSphere LifecycleManager
Use Auto Deploy to boot a host with the desired image and configuration specifications
Upgrade multiple ESXi hosts in a cluster in parallel
Stage an ESXi host image prior to remediation11 Auto Deploy
Manage custom host certificates using Auto Deploy
12 vSphere with Tanzu
Describe the features of the Tanzu Kubernetes Grid 2.0 offering
13 Announcing vSphere+
Describe the functionality and benefits of vSphere+
 - DCVCTS — VMware Data Center Virtualization: Core Technical Skills
- Длительность: 4 дня (32 часа)
 - Код курса: DCVCTS
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This four-day, hands-on training course is an introduction to VMware vSphere®. In this course, you acquire the skills needed to perform Day 2 operational tasks that are typically assigned to the roles of operator or junior administrator in a vSphere environment.
Product Alignment
VMware ESXi 7.0
VMware vCenter Server 7.0Who should attend
Technical professionals with basic system administration skills and operators responsible for managing virtual machines using VMware ESXi™ and VMware vCenter Server®
Certifications
This course is part of the following Certifications:
VMware Certified Technical Associate ‒ Data Center Virtualization 2023
Prerequisites
This course has the following prerequisites:
Working knowledge of operating systems
Understanding of basic network, storage, and computer hardware conceptsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Describe virtualization and virtual machines
Describe vSphere components and the software-defined data center (SDDC)
Explain the concepts of server, network, and storage virtualization
Monitor network and datastore configurations in VMware vSphere® Client™
Deploy, configure, and clone virtual machines
Migrate, monitor, and manage virtual machines
Monitor tasks and events in VMware vSphere® Client™
Recognize how vSphere DRS and VMware vSphere® High Availability improve performance and availability of a vSphere clusterCourse Outline:
Course Introduction
Introductions and course logistics
Course objectivesVirtualization and vSphere Concepts
Describe how virtual machines (VMs) work
Recognize the purpose of a hypervisor
Describe how VMs share resources in a virtualized environment
Recognize the components of an SDDC
Describe the relationship between vSphere, the SDDC, and cloud computing
Recognize the functions of the components in a vSphere environment
Access and view vSphere graphical user interfaces
Identify VMware solutions that integrate with vSphere in the SDDCNavigating the vSphere Client
View and organize the inventory objects managed by vCenter Server
Add and assign vSphere licenses
Change the log level of vCenter Server
Edit the startup policy of ESXi services
Describe how vCenter Server roles and permissions work
Add permissions to virtual machinesLifecycle of Virtual Machines
Add and remove VM virtual hardware components
Identify the purpose of different VM files
Configure VM settings
Create and delete virtual machines
Recognize the benefits of installing VMware Tools™
Install VMware Tools into a guest operating system
Upgrade VMware Tools and VM hardware compatibilityvSphere Networking
Describe virtual networking
Recognize ways that virtual switches connect VMs and ESXi hosts to the network
View components and properties of a vSphere standard switch configuration
View a vSphere distributed switch configuration in vSphere Client
Recognize when and how to use the settings for the security networking policy
Recognize when and how to use the settings for the traffic shaping networking policy
Describe how the NIC teaming and failover policy helps maintain network connectivity
Perform basic checks to diagnose VM connectivity issuesvSphere Storage
Describe the function of a datastore
Recognize types of vSphere datastores
View datastore information in vSphere Client
Monitor datastore usage in vSphere ClientVirtual Machine Management
Recognize the benefits of using VM templates
Create and update a VM template
Deploy a VM from an existing template
Clone a virtual machine
Recognize how to use guest OS customization specifications
Deploy VMs from a content library
Deploy a virtual appliance from an OVF template
Perform a hot and cold migrations of VMs
Identify requirements for using VMware vSphere® Storage vMotion®
Perform a vSphere Storage vMotion migration
Identify use cases for VM snapshots
Create and manage snapshots of a virtual machine
Resource Monitoring
Recognize the purpose of each type of VM resource control
Configure the resource allocation settings of a VM
Observe the behavior of virtual machines with different share values
Manage and acknowledge vSphere alarms
Use performance charts to monitor VM CPU and memory usage
Monitor tasks and events in vSphere ClientvSphere Clusters
View information about the services that a vSphere cluster offers
Recognize how vSphere HA responds to different types of failures
Monitor vSphere HA during a host failure
Describe how vSphere DRS works
Interpret DRS scores given to VMs
Recognize how to apply the appropriate vSphere DRS automation and migration threshold levels
Describe how vSphere Fault Tolerance works
Recognize how Enhanced vMotion Compatibility works - VCFPMO5 — VMware Cloud Foundation: Deploy, Configure, Manage v5.0
- Длительность: 5 дней (40 часов)
 - Код курса: VCFPMO5
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.0. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment.
Product Alignment
VMware Cloud Foundation 5.0
VMware vSphere 8.0
VMware NSX 4
vSphere with TanzuCourse Content
Course Introduction
VMware cloud foundation overview
VMware Cloud Foundation+ and VMware Cloud Connectivity
Day Zero Tasks
Post-Deployment Operations
VMware Cloud Foundation Networking with NSX
Managing Workload Domains
vSphere with Tanzu in VMware Cloud Foundation
VMware Cloud Foundation Storage Management
Availability and Business Continuity
VMware Cloud Foundation Certificate Management
VMware Cloud Foundation Lifecycle Management
VMware Cloud Foundation TroubleshootingWho should attend
System architects and system administrators
Prerequisites
The course material presumes that you have the following skills or experience:
Operational capabilities with VMware vSphere processes and architecture
Operational capabilities with VMware NSX
Operational knowledge of vSANCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Plan a deployment for VMware Cloud Foundation
Understand VMware Cloud Foundation and supporting architecture
Configure VMware Cloud Foundation for VMware Cloud Connectivity
Understand the VMware Cloud Foundation subscription licensing model
Perform Day-Zero tasks
Perform VMware Cloud Foundation platform onboarding
Manage user credentials in VMware Cloud Foundation
Configure NSX networking in VMware Cloud Foundation
Deploy and manage Workload Domains
Deploy vSphere with Tanzu on VMware Cloud Foundation
Understand and implement storage solutions and related policies
Perform maintenance tasks for the VMware Cloud Foundation platform
Manage certificates for VMware Cloud Foundation and connected technologies
Manage the lifecycle for VMware Cloud Foundation
Engage with VMware Cloud Foundation Technical SupportOutline:
Course Introduction
Introductions and course logistics
Course objectivesVMware cloud foundation overview
Describe the VMware Cloud Foundation solution
Describe VMware Cloud Foundation architecture
Identify VMware Cloud Foundation components
Describe the VMware Cloud Foundation topologyVMware Cloud Foundation+ and VMware Cloud Connectivity
Describe the VMware Cloud Foundation+ architecture
Identify the pre-requisites for VMware Cloud Foundation+
Describe VMware Cloud Foundation+ value added features
Configure subscription-based licensing parameters
Describe the vCenter Cloud Gateway functionality
Identify the vCenter Cloud Gateway components
Describe the vCenter Cloud Gateway architecture
Connect the vCenter Cloud Gateway to VMware Cloud
Describe the VMware Cloud platform
Describe the VMware vSphere+ services used in VMware Cloud Foundation+
Demonstrate the capabilities of the VMware Cloud user interface for VMware Cloud Foundation+Day Zero Tasks
Identify the requirements for deploying VMware Cloud Foundation
Describe the VMware Cloud Foundation bring-up process
Identify the information required for the Planning and Preparation Workbook
Complete the Deployment Parameter Workbook
Describe how VMware Cloud Builder automates the deployment process
Identify the configuration validation process performed by VMware Cloud Builder
Describe the deployment of the management domainPost-Deployment Operations
Complete the Onboarding Wizard
Understand VMware Cloud Foundation integration with VMware Single Sign-On
Configure user access to VMware Cloud Foundation
Describe the importance of user roles in vSphere
Configure identity sources for VMware Cloud Foundation
Perform the SDDC Manager backup and restore process
Identify steps in the NSX backup and restore process
Manage passwords in VMware Cloud Foundation
Explain the importance of using VMware Cloud Foundation to manage passwords for vSphere components
Manage and secure a primary password list
Describe the process for rotating passwords not managed by VMware Cloud FoundationVMware Cloud Foundation Networking with NSX
Describe network virtualization with NSX
Recognize NSX operational planes
Identify NSX components
Describe logical switching
Describe NSX Data Center deployment in VMware Cloud Foundation
Explain how logical routing works in NSX
Identify NSX Edge functions
Describe data plane preparation for NSX Edge nodes in a workload domain
Recognize Tier-0 and Tier-1 gateway topologies
Define application virtual networks
Describe management domain rack options
List NSX Edge cluster requirements for vSphere with Tanzu
Discuss NSX Edge cluster placement considerationsManaging Workload Domains
Define workload domains
List the types of workload domains
Identify workload domain prerequisites
Understand the scalability limits for workload domains
Identify use cases for multiple clusters in a workload domain
Create network pools
Size network pools
Commission hosts with SDDC Manager
Create workload domains
Scale workload domains
Decommission hosts from a workload domain
Remove workload domains
Describe distinctive design decisions for VMware Cloud Foundation componentsvSphere with Tanzu in VMware Cloud Foundation
Explain vSphere with Tanzu
Define the role of the Spherelet
Describe the supervisor cluster control plane
Create vSphere with Tanzu namespaces
Describe the role of NSX networking components in vSphere with Tanzu
Discuss vSphere with Tanzu networking topology
Describe control plane VM management networking requirements
Plan appropriate IP address ranges for pod, ingress, and egress networking
Describe prerequisites for vSphere with Tanzu cluster compatibility
Deploy vSphere with Kubernetes
Create a vSphere namespace
Configure limits and permissions for a vSphere namespaceVMware Cloud Foundation Storage Management
Identify storage use cases in VMware Cloud Foundation
Determine the most appropriate storage option for a workload domain
Describe different vSphere-native storage design options
Identify vSAN architecture and components
Describe vSAN requirements for the management and workload domains
Configure deduplication and compression
Discuss how to scale vSAN clusters in VMware Cloud Foundation
Configure storage policies for vSAN
Explain storage policy failure tolerance rules
Identify a virtual machine storage policy compliance status
Explain how vSAN storage policies protect VMware Cloud Foundation componentsAvailability and Business Continuity
Explain the importance of external service availability
Describe availability options native to VMware vSphere
Identify stretched cluster use cases
Identify stretched cluster components
Recognize stretched cluster requirements in VMware Cloud Foundation
Prepare and deploy a vSAN stretched cluster using APIsVMware Cloud Foundation Certificate Management
Learn the basics of public key infrastructure (PKI)
Describe the purpose of certificate signing requests (CSRs)
Describe available options in SDDC Manager for certificate authorities
View certificates for VMware Cloud Foundation components
Install and replace certificates for VMware Cloud Foundation components
Configure the integrated Certificate Authorities in SDDC Manager
Configure a certificate template in Microsoft Certificate Authority server
Configure the OpenSSL certificate authority in SDDC Manager
Install certificates issued by Microsoft, OpenSSL, and third-party certificate authoritiesVMware Cloud Foundation Lifecycle Management
Describe VMware Cloud Foundation Life Cycle Management
List the products managed by VMware Cloud Foundation Lifecycle management
Use online and offline bundle downloads using VMware Cloud Foundation Lifecycle management
Understand the role of vSphere Lifecycle Management in VMware Cloud Foundation
Understand vSphere Lifecycle Manager features
Understand how and when to use cluster images
Describe the importance of Hardware Support Managers
Describe the upgrade prerequisites
Outline the upgrade precheck process
Describe the order of upgrade for VMware Cloud Foundation componentsVMware Cloud Foundation Troubleshooting
Use the SoS command-line tool to create log bundles, perform health checks, and check password validity
List VMware Cloud Foundation services
Identify VMware Cloud Foundation log files
Use token IDs to troubleshoot failed workflows - MVCF5 — Migrating to VMware Cloud Foundation v5.0
- Длительность: 3 дня (24 часа)
 - Код курса: MVCF5
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This three-day course is designed to provide VMware vSphere® administrators with the knowledge and hands-on experience in managing VMware Cloud Foundation™ in a hybrid cloud environment and utilizing VMware HCX® for workload migration.
Product Alignment
VMware Cloud Foundation 5.0
VMware HCX 4.7Who should attend
Experienced System Administrators
System Engineers
System Integrators
Migration Engineers
Migration ArchitectsPrerequisites
This course requires the following knowledge/experience;
Experience administering vSphere environment
Experience administering VMware Cloud Foundation environment
This knowledge/experience can be acquired by completion of the following courses:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware Cloud Foundation: Deploy, Configure, Manage [V5.0] (VCFPMO5)Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the components and architecture of VMware Cloud Foundation
Describe the key features and capabilities of VMware HCX
Explain the architecture of VMware HCX and its components
Understand the migration types that VMware HCX supports, including VMware HCX® vMotion®, HCX Bulk migration, and HCX Replication Assisted vMotion
Plan and execute migrations using VMware HCX migration plans
Describe how VMware HCX addresses migration challenges through its network extension capabilities
Define the concept of network extension within the context of VMware HCXOutline:
1 Course Introduction
Introductions and course logistics
Course objectives2 VMware Cloud Foundation Overview
Describe the components and architecture of VMware Cloud Foundation
Explain the benefits of VMware Cloud Foundation in a hybrid cloud environment
Identify the features of VMware Cloud Console3 Introduction to VMware HCX
Describe the key features and capabilities of VMware HCX
Explain the architecture of VMware HCX and its components
Discuss the purpose of HCX Manager, HCX Interconnect, and HCX mobility components
Install and configure HCX Manager
Set up interconnects between a legacy vSphere environment and VMware Cloud Foundation
Manage VMware HCX services and networks4 Workload Migration with VMware HCX
Describe the migration types that VMware HCX supports, including vSphere vMotion, HCX Bulk migration, and HCX Replication Assisted vMotion
Perform live migration of workloads between legacy vSphere and VMware Cloud Foundation environments using VMware HCX
Plan and execute migrations using VMware HCX migration plans
Explain how VMware HCX enables seamless connectivity between on-premises data centers and cloud environments
Identify common challenges associated with establishing network connectivity in hybrid cloud scenarios
Describe how VMware HCX addresses these challenges through its network extension capabilities
Define the concept of network extension in the context of VMware HCXCourse Outline
1. Introducing Cisco Secure Firewall Threat Defense
2. Describing Advanced Deployment Options on Cisco Secure Firewall Threat Defense
3. Configuring Advanced Device Settings on Cisco Secure Firewall Threat Defense
4. Configuring Dynamic Routing on Cisco Secure Firewall Threat Defense
5. Configuring Advanced NAT on Cisco Secure Firewall Threat Defense
6. Configuring SSL Policy on Cisco Secure Firewall Threat Defense
7. Deploying Remote Access VPN on Cisco Secure Firewall Threat Defense
8. Deploying Identity-Based Policies on Cisco Secure Firewall Threat Defense
9. Deploying Site-to-Site VPN on Cisco Secure Firewall Threat Defense
10. Configuring Snort Rules and Network Analysis Policies
11. Describing Advanced Event Management Cisco Secure Firewall Threat Defense
12. Describing Integrations on Cisco Secure Firewall Threat Defense
13. Troubleshooting Advanced Traffic Flow on Cisco Secure Firewall Threat Defense
14. Automating Cisco Secure Firewall Threat Defense
15. Migrating to Cisco Secure Firewall Threat DefenseLab Outline
1. Deploy Advanced Connection Settings
2. Configure Dynamic Routing
3. Configure SSL Policy
4. Configure Remote Access VPN
5. Configure Site-to-Site VPN
6. Customize IPS and NAP Policies
7. Configure Cisco Secure Firewall Threat Defense Integrations
8. Troubleshoot Cisco Secure Firewall Threat Defense
9. Migrate Configuration from Cisco Secure Firewall ASA - HCXDCM — VMware HCX: Deploy, Configure, Manage
- Длительность: 3 дня (24 часа)
 - Код курса: HCXDCM
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This three-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware HCX. This course teaches you how to deploy the different architectural components of HCX, and perform the tasks required to migrate and rebalance workloads across data centers and clouds.
Product Alignment
VMware HCX 4.7
VMware vSphere 8.x
VMware NSX 4.xWho should attend
System administrators, system engineers, migration engineers, and migration architects.
Prerequisites
The course has the following required prerequisites:
VMware NSX: Install, Configure, Manage [V4.0] (NSXICM4) or equivalent strong networking experience.
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
Disaster recovery and business continuity fundamentals.Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the workload mobility challenges that VMware HCX addresses.
Recognize uses cases for VMware HCX.
Describe the HCX management plane and data plane components.
Describe the services provided by HCX and recognize the HCX appliances deployed to support each service.
Deploy HCX Cloud and HCX Connector and configure site-pairing.
Use network and compute profiles to deploy the HCX Service Mesh.
Explain the use cases and benefits of HCX+.
Perform site onboarding and configuration on HCX+
Describe and configure HCX Network Extension.
Describe the WAN Optimization and Traffic Engineering capabilities of HCX.
Differentiate between HCX migration types and their use cases.
Use VMware HCX to implement a business continuity strategy.
Manage the lifecycle of VMware HCX.Course Content
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to VMware HCX
Describe the workload mobility challenges that VMware HCX addresses.
Recognize uses cases for VMware HCX.
Describe the VMware HCX uses cases related to application migration, upgrades or re-platforms, workload rebalancing, and business continuity and protection.HCX Architecture
Describe the HCX management plane and data plane components.
Distinguish between the types of HCX Manager deployments.
Explain the role of HCX Cloud and HCX Connector.
Describe site-pairing at the management plane level.
Describe the services provided by HCX.
Recognize the HCX appliances deployed to support each HCX service.
Explain HCX Service Mesh and its benefits.HCX Deployment
Identify the type of environments that can be interconnected in HCX.
Explain the different deployment topologies for HCX.
Deploy HCX Cloud on SDDC and on the public cloud.
Deploy HCX Connector on-premises.
Establish site pairing between the source and destination sites.
Troubleshoot common HCX Manager deployment and site pairing problems.Service Mesh Deployment
Use network and compute profiles to deploy the HCX Service Mesh.
Recognize different types of Service Mesh topologies.
Identify and troubleshoot common issues with Service Mesh deployments.HCX+ Overview
Explain the use cases and benefits of HCX+.
Perform site onboarding and configuration on HCX+HCX Network Extension
Explain the functionality, benefits and use cases of HCX Network Extension.
Compare HCX Network Extension with other L2 extension solutions.
Distinguish between HCX Network Extension topologies.
Describe the benefits of HCX Network Extension High Availability.
Create a network extension and validate its configuration.
Describe the benefits of Mobility Optimized Networking (MON).
Configure a HCX Network Extension with MON.
Identify and troubleshoot common issues with HCX Network Extension and MON.WAN Optimization and Traffic Engineering
Describe the benefits and used cases of WAN Optimization and Traffic Engineering.
Configure WAN Optimization and Traffic Engineering.
Identify and troubleshoot common issues with WAN Optimization and Traffic Engineering.Workload Mobility
Identify the different phases of an HCX migration.
Differentiate between HCX migration types and their use cases.
Describe the workflow for HCX Cold and vMotion migrations.
Explain the considerations and limitations of HCX Cold and vMotion migrations.
Perform HCX Cold and vMotion migrations.
Identify and troubleshoot common issues with HCX Cold and vMotion migrations.
Describe the workflow for Bulk Migrations and Replication Assisted vMotion migrations.
Explain the considerations and limitations of Bulk Migrations and Replication Assisted vMotion migrations.
Perform Bulk Migrations and Replication Assisted vMotion migrations.
Identify and troubleshoot common issues with Bulk Migrations and Replication Assisted vMotion migrations.
Describe the workflow for HCX OS Assisted migrations.
Explain the considerations and limitations of HCX OS Assisted migrations.
Perform HCX OS Assisted migrations.
Identify and troubleshoot common issues with HCX OS Assisted migrations.Business Continuity and Disaster Recovery
Explain disaster recovery concepts and considerations.
Use VMware HCX to implement a business continuity strategy.HCX Lifecycle Management
Backup and restore the HCX Manager.
Upgrade HCX components. - VSTDCM8 — VMware vSphere with Tanzu: Deploy, Configure, Manage V8
- Длительность: 3 дня (24 часа)
 - Код курса: VSTDCM8
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
During this three-day course, you focus on deploying and managing VMware vSphere® with VMware Tanzu® in a VMware vSphere® 8 environment. You learn how vSphere with Tanzu provides services to deploy and manage virtual machines, vSphere Pods, Supervisor Services, and VMware Tanzu® Kubernetes Grid™ clusters. You will also gain experience with day 2 operations and life cycle management of a vSphere with Tanzu environment.
Product Alignment
VMware vSphere® 8 Update 1
VMware NSX® Advanced Load Balancer™ 22.1.3
VMware Tanzu® Kubernetes Grid™ 2.0Who should attend
vSphere administrators and platform operators who are responsible for deploying and managing workloads and services in vSphere with Tanzu
Prerequisites
Experience deploying and managing vSphere
Understanding of Kubernetes and the Kubernetes cluster architecture
Attending one of the following courses is recommended:
VMware vSphere: Install, Configure, Manage
Kubernetes Fundamentals and Cluster OperationsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Describe how vSphere with Tanzu fits in the VMware Tanzu® portfolio
Describe the vSphere with Tanzu concepts and architecture
Describe vSphere with Tanzu on VMware NSX®
Describe vSphere with Tanzu on VMware vSphere® Distributed Switch™
List the load balancer solutions supported by vSphere with Tanzu
Describe the vSphere with Tanzu storage components
Deploy and manage Supervisors
Describe vSphere Pod capabilities and components
Deploy and configure Contour as a Supervisor Service
Deploy and configure ExternalDNS as a Supervisor Service
Deploy and configure Harbor as a Supervisor Service
Deploy and manage Tanzu Kubernetes Grid workload clusters
Deploy and manage virtual machines using the VM Service
Deploy applications in a vSphere with Tanzu environment
Perform a backup using Velero
Use the vSphere UI and CLI to monitor the health of the vSphere with Tanzu environment
Use logs and CLI commands to troubleshoot the vSphere with Tanzu environmentCourse Content
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to Containers and Kubernetes
Differentiate between containers and virtual machines
Identify the parts of a container system
List the steps in a basic Docker workflow
Explain the importance of Kubernetes
Identify the basic architecture of Kubernetes
Describe a basic Kubernetes workflowIntroducing vSphere with Tanzu
Describe vSphere with Tanzu
Describe Tanzu Kubernetes Grid
Describe VMware Tanzu® Mission Control
Describe VMware Tanzu® for Kubernetes Operations
Explain the purpose of vSphere with Tanzu
Identify the capabilities of vSphere with Tanzu
Describe the vSphere with Tanzu Supervisor
Identify the components of the vSphere with Tanzu Supervisor
Describe vSphere Namespaces
Describe the Supervisor Services
Describe the VM Service
Describe Tanzu Kubernetes Grid clustersvSphere with Tanzu Infrastructure
Discuss storage concepts for vSphere with Tanzu
Describe storage policies
Describe content libraries
Explain the Container Storage Interface plug-in functionalities
Discuss storage for Tanzu Kubernetes Grid clusters
Describe the vSAN Direct datastore for vSphere with Tanzu
Identify the two network stacks available for vSphere with Tanzu deployments
List the VDS components that vSphere with Tanzu supports
List the NSX components that vSphere with Tanzu supports
Outline the supported load balancer solutions by vSphere with TanzuvSphere with Tanzu Architecture
Describe the Supervisor architecture
List the different options for deploying the Supervisor
Outline the requirements for deploying a Supervisor
Outline the licensing requirements for the Supervisor
Describe vSphere Namespaces
List vSphere Namespace resources and Kubernetes object limits
Define content libraries and VM images
Explain VM classes
Describe Kubernetes CLI Tools for vSphere
List the different types of authentication available in vSphere with Tanzu
Explain vSphere privileges
Explain roles and permissions in vSphere Namespaces
Explain Tanzu Kubernetes Grid RBAC
List the Tanzu Kubernetes Grid authentication methods
List the vSphere with Tanzu services and workloads
Identify the supportability for vSphere with Tanzu services and workloads based on the Supervisor deployment typesvSphere with Tanzu Workloads and Services
Describe the characteristics of vSphere Pods
Identify the capabilities of vSphere Pods
List the components of vSphere Pods
Explain the concept of Supervisor Services
Describe the Supervisor Services catalog and its available services
Discuss how to add Supervisor Services and manage their life cycle
Describe Tanzu Kubernetes Grid clusters
List the components of Tanzu Kubernetes Grid
List the options for deploying Tanzu Kubernetes Grid workload clusters
List the different types of Tanzu Kubernetes Grid workload clusters
Outline the requirements for deploying a Tanzu Kubernetes Grid workload cluster
Describe the VM Service
Explain the use cases of the VM Service
List the VM Service parameters
Outline the requirements for deploying a VM using the VM ServiceDay 2 Operations
Explain how to view Kubernetes namespace events
List the ways to monitor vSphere Pod, Tanzu Kubernetes Grid cluster, and VM performance and utilization
Describe vSphere with Tanzu control plane certificate management
Describe load balancer certificate management
Describe the prerequisites and steps for updating vSphere with Tanzu
Describe the Supervisor updates
Describe the vSphere Namespace updates
Describe the update process of Tanzu Kubernetes Grid clusters
List the steps to back up the vSphere with Tanzu components
Explain how to back up a Supervisor
Define Velero Plugin for vSphere and standalone Velero
Identify the steps to install Velero on workload clusters
Explain how to back up and restore vSphere with Tanzu workloads with the Velero CLI
Describe the various vSphere with Tanzu logs
Explain how to generate a vSphere with Tanzu support bundle
Explain how to use SSH to connect to Supervisor control plane nodes - VSKDM7 — VMware vSphere with Tanzu: Deploy and Manage V7
- Длительность: 3 дня (24 часа)
 - Код курса: VSKDM7
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
During this 3-day course, you focus on deploying and managing VMware vSphere® with Tanzu. You learn about how vSphere with Tanzu can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a vSphere environment. Product Alignment
VMware vSphere 7
Course Content
Course Introduction
Introduction to Containers and Kubernetes
Introduction to vSphere with Tanzu
vSphere with Tanzu Core Services
VMware Tanzu Kubernetes Grid service
Monitoring and Troubleshooting
vSphere with Tanzu Life CycleWho should attend
Experienced system administrators and system integrators responsible for designing and implementing vSphere with Tanzu
Prerequisites
This course requires completion of the following courses:
VMware vSphere: Install, Configure, Manage [V7] (VSICM7) OR VMware vSphere: Optimize and Scale [V7] (VSOS7)
AND
Experience working at the command line is helpful.
This course requires that a student be able to perform the following tasks with no assistance or guidance before enrolling in this course:
Create VMware vCenter Server® objects, such as data centers and folders
Create a virtual machine using a wizard or a template
Modify a virtual machine’s hardware
Migrate a virtual machine with VMware vSphere® vMotion®
Migrate a virtual machine with VMware vSphere Storage vMotion
Configure and manage a vSphere DRS cluster with resource pools
Configure and manage a VMware vSphere® High Availability cluster
If you cannot perform all of these tasks, VMware recommends that you complete one of the prerequisite courses before enrolling in VMware vSphere with Tanzu: Deploy & Manage.Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe vSphere with Tanzu and use cases in on-premises environments
Deploy vSphere with Tanzu
Describe VMware Tanzu Mission Control
Describe the VMware NSX® networking requirements for vSphere with Tanzu.
Describe vSphere with Tanzu on NSX-T Data Center
Describe vSphere with Tanzu on vSphere Distributed Switch
Create and manage vSphere with Tanzu namespaces
Deploy and run container applications on vSphere with Tanzu
Deploy and configure Harbor
Describe the VMware Tanzu™ Kubernetes Grid™ service
Deploy a Tanzu Kubernetes Grid cluster
Deploy and run container applications on a Tanzu Kubernetes Grid cluster
Describe the vSphere with Tanzu lifecycle
Use logs and CLI commands to monitor and troubleshoot vSphere with TanzuOutline:
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to Containers and Kubernetes
Describe virtual machines and containers
Describe container hosts
Describe container engines
Describe Dockerfile
Describe container images
Describe image registry
Describe the purpose and functionality of Kubernetes
Describe YAML manifest files
Explain pods
Explain Replica Sets
Explain services
Explain deployments
Explain network policiesIntroduction to vSphere with Tanzu
Introduce the Cloud Native Computing Foundation
Introduce the VMware Tanzu™ portfolio
Describe the purpose and functionality of vSphere with Tanzu
Describe the capabilities of vSphere with Tanzu
Describe the components of vSphere with Tanzu
Contrast vSphere with Tanzu to traditional Kubernetes
Describe the requirements for vSphere with Tanzu
Describe the NSX components required for vSphere with Tanzu
Describe the network topology of vSphere with Tanzu
Explain the networking requirements of vSphere with Tanzu
Compare NSX networking objects with Kubernetes networking objects
Describe the kubectl command line interfacevSphere with Tanzu Core Services
Explain the architecture of the vSphere with Tanzu core services
Describe the use cases of vSphere with Tanzu
Enable vSphere with Tanzu
Deploy Harbor Registry
Describe a vSphere with Tanzu namespace
Describe resource quotas
Explain authentication and authorization to vSphere with Tanzu
Create a namespace
Use kubectl to interact with vSphere with Tanzu
Describe using kubectl pod deployment
Explain scaling a pod deployment
Explain deleting pods
Use kubectl to deploy a pod
Use kubectl to scale a pod
Describe a Container Storage Interface
Explain VM Storage Policies and Persistent Volumes
Monitor Cloud Native Storage
Create a Persistent Volume
Describe the NSX Container Plugin
Explain Supervisor Cluster Network Topology
Explain Container Objects in NSX
Describe Kubernetes Services
Describe Kubernetes Network Policies
Describe vSphere with Tanzu on vSphere Distributed Switch
Describe Harbor Image Registry
Explain Harbor integration with vSphere with Tanzu
Enable Harbor
Push container images to Harbor
Deploy containers from HarborVMware Tanzu Kubernetes Grid service
Introduce Kubernetes Cluster API
Explain Tanzu Kubernetes Grid service
Describe the use cases for Tanzu Kubernetes Grid clusters
Describe enabling Tanzu Kubernetes Clusters
Deploy a Tanzu Kubernetes Cluster
Scale a Tanzu Kubernetes Cluster
Explain the life cycle of Tanzu Kubernetes Clusters
Deploy pods to a Tanzu Kubernetes Cluster
Describe monitoring of Tanzu Kubernetes ClustersMonitoring and Troubleshooting
Describe the monitoring tools for vSphere with Tanzu
Describe the troubleshooting tools for vSphere with Tanzu
Describe VMware vRealize® Operations Manager™ integration
Describe VMware Tanzu Mission Control
Describe the integration between vSphere with Tanzu and VMware Tanzu MissionControl
Describe vCenter Server events
Describe vSphere with Tanzu events
Describe gathering vSphere with Tanzu support log bundlesvSphere with Tanzu Life Cycle
Introduce Kubernetes version
Explain Kubernetes release cadence
Describe vSphere with Tanzu life cycle
Describe NSX component life cycle
Describe vSphere with Tanzu Certificate Management - TKGICM2 — VMware Tanzu Kubernetes Grid: Install, Configure, Manage V2.0
- Длительность: 4 дня (32 часа)
 - Код курса: TKGICM2
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
During this four-day course, you focus on installing VMware Tanzu® Kubernetes Grid™ in a VMware vSphere® environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multipod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds.
Course Content
Course Introduction
Introductions and course logistics
Course objectivesIntroducing VMware Tanzu Kubernetes Grid
Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them
Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management, supervisor, and workload clusters
List the components of a Tanzu Kubernetes Grid instanceVMware Tanzu Kubernetes Grid CLI and API
Illustrate how to use the Tanzu CLI
Define the Carvel Tool set
Define Cluster API
Identify the infrastructure providers
List the Cluster API controllers
Identify the Cluster API custom resource definitionsAuthentication
Explain how Kubernetes manages authentication with Management clusters
Explain how Kubernetes manages authentication with supervisor clusters
Define Pinniped
Define Dex
Describe the Pinniped authentication workflowLoad Balancers
Illustrate how load balancing works for the Kubernetes control plane
Illustrate how load balancing works for application workload
Explain how Tanzu Kubernetes Grid integrates with VMware NSX Advanced Load Balancer
List load balancing options available on public cloudsVMware Tanzu Kubernetes Grid on vSphere
List the requirements for deploying a supervisor cluster
List the steps to install a Tanzu Kubernetes Grid supervisor cluster
Summarize the events of a supervisor cluster creation
List the requirements for deploying a management cluster
List the steps to install a Tanzu Kubernetes Grid management cluster
Summarize the events of a management cluster creation
Demonstrate how to use commands when working with management clustersVMware Tanzu Kubernetes Grid on Public Clouds
List the requirements for deploying a management cluster on AWS and Microsoft Azure
List the configuration options to install a Tanzu Kubernetes Grid a management cluster on AWS and AzureTanzu Kubernetes Workload Clusters
List the steps to build a custom image
Describe the available customizations
Identify the options for deploying Tanzu Kubernetes Grid clusters
Explain the difference between the v1alpha3 and v1beta1 APIs
Explain how Tanzu Kubernetes Grid clusters are created
Discuss which VMs compose a Tanzu Kubernetes Grid cluster
List the pods that run on a Tanzu Kubernetes Grid cluster
Describe the Tanzu Kubernetes Grid core add-ons that are installed on a clusterTanzu Kubernetes Grid Packages
Define the Tanzu Kubernetes Grid packages
Explain the difference between Auto-Managed and CLI-Managed packages
Define packages repositoriesConfiguring and Managing Tanzu Kubernetes Grid Operation and Analytics Packages
Describe Cert-Manager
Describe the Harbor Image Registry
Describe Fluent Bit
Identify the logs that Fluent Bit collects
Explain basic Fluent Bit configuration
Describe Prometheus and GrafanaConfiguring and Managing Tanzu Kubernetes Grid Networking Packages
Describe the Contour ingress controller
Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster
Describe ExternalDNS
Demonstrate how to install Service Discovery with ExternalDNS
Describe Multus CNITanzu Kubernetes Grid Day 2 Operations
List the load balancer configuration options in vSphere to load balance applications
Demonstrate how to configure Ingress with the NodePortLocal Mode
Explain how to install VMware Tanzu Application Platform
Describe life cycle management in Tanzu Kubernetes Grid
Explain how backup and restore are implemented in Tanzu Kubernetes Grid
Describe Velero and Restic
List the steps to back up a Workload cluster using Velero and ResticTroubleshooting Tanzu Kubernetes Grid
Discuss the various Tanzu Kubernetes Grid logs
Identify the location of Tanzu Kubernetes Grid logs
Explain the purpose of crash diagnostics
Demonstrate how to check the health of a Tanzu Kubernetes Grid cluster
Explain packages cleanup procedures
Explain management recovery proceduresWho should attend
Platform operators who are responsible for deploying and managing Tanzu Kubernetes clusters
Prerequisites
Understanding of Kubernetes and the Kubernetes cluster architecture
Experience deploying and managing multiple Kubernetes clustersCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Describe how Tanzu Kubernetes Grid fits in the VMware Tanzu® portfolio
Describe the Tanzu Kubernetes Grid architecture
Deploy and manage Tanzu Kubernetes Grid management and supervisor clusters
Deploy and manage Tanzu Kubernetes Grid workload clusters
Deploy, configure, and manage Tanzu Kubernetes Grid packages
Perform basic troubleshooting - KFCO — Kubernetes Fundamentals and Cluster Operations
- Длительность: 4 дня (32 часа)
 - Код курса: KFCO
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes.
Course Content
Course Introduction
Introductions and objectives
Containers
What and Why containers
Building images
Running containers
Registry and image managementKubernetes Overview
Kubernetes project
Plugin interfaces
Building Kubernetes
Kubectl CLIBeyond Kubernetes Basics
Kubernetes objects
YAML
Pods, replicas, and deployments
Services
Deployment management
Rolling updates
Controlling deployments
Pod and container configurationsKubernetes Networking
Networking within a pod
Pod-to-Pod Networking
Services to PodsClusterIP, NodePort, and LoadBalancer
Ingress controllers
Service Discovery via DNS
Stateful Applications in Kubernetes
Stateless versus Stateful
Volumes
Persistent volumes claims
StorageClasses
StatefulSetsAdditional Kubernetes Considerations
Dynamic configuration
ConfigMaps
Secrets
Jobs, CronJobsSecurity
Network policy
Applying a NetworkPolicy
SecurityContext
runAsUser/Group
Service accounts
Role-based access controlLogging and Monitoring
Logging for various objects
Sidecar logging
Node logging
Audit logging
Monitoring architecture
Monitoring solutions
Octant
VMware vRealize® Operations Manager™Cluster Operations
Onboarding new applications
Backups
Upgrading
Drain and cordon commands
Impact of an upgrade to running applications
Troubleshooting commands
VMware Tanzu™ portfolio overviewWho should attend
Anyone who is preparing to build and run Kubernetes clusters
Prerequisites
Linux concepts and command line proficiency
General networking proficiencyCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Build, test, and publish Docker container images
Become familiar with YAML files that define Kubernetes objects
Understand Kubernetes core user-facing concepts, including pods, services, and deployments
Use kubectl, the Kubernetes CLI, and become familiar with its commands and options
Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet)
Learn how to troubleshoot issues with deployments on Kubernetes
Apply resource requests, limits, and probes to deployments
Manage dynamic application configuration using ConfigMaps and Secrets
Deploy other workloads, including DaemonSets, Jobs, and CronJobs
Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies - VSANICM8 — VMware vSAN: Install, Configure, Manage
- Длительность: 4 дня (32 часа)
 - Код курса: VSANICM8
 - Стоимость
 - Очный формат: 873 000 ₸
 - Онлайн формат: 850 000 ₸
 
Описание курса
Overview
During this four-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities and hands-on lab exercises.
Product Alignment
VMware ESXi™ 8.0
VMware vCenter Server® 8.0
VMware vSAN 8.0Objectives
By the end of the course, you should be able to meet the following objectives:
Describe vSAN concepts
Detail the underlying vSAN architecture and components
Explain the key features and use cases for vSAN
Identify requirements and planning considerations for vSAN clusters
Explain the importance vSAN node hardware compatibility
Describe the different vSAN deployment options
Explain how to configure vSAN fault domains
Detail how to define and create a VM storage policy
Discuss the impact of vSAN storage policy changes
Detail vSAN resilience and data availability
Describe vSAN storage space efficiency
Explain how vSAN encryption works
Detail VMware HCI Mesh™ technology and architecture
Detail vSAN File Service architecture and configuration
Describe how to setup a stretched and a two-node vSAN cluster
Describe vSAN maintenance mode and data evacuation options
Define the steps to shut down a vSAN cluster for maintenance
Explain how to use proactive tests to check the integrity of a vSAN cluster
Use VMware Skyline Health™ for monitoring vSAN health
Use VMware Skyline Health to investigate and help determine failure conditions
Discuss vSAN troubleshooting best practices
Describe vSAN Express Storage ArchitectureTM conceptsPrerequisites
Equivalent knowledge or completion of the following course is required:
VMware vSphere: Install, Configure, Manage
Audience
Storage and virtual infrastructure consultants
Solution architects
Administrators who are responsible for production support and administration of VMware vSAN 8.0.Outline
Course Introduction
Introduction and course logistics
Course objectivesIntroduction to vSAN
Describe vSAN architecture
Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT
Identify vSAN objects and components
Describe the advantages of object-based storage
Describe the difference between All-Flash and Hybrid vSAN architecture
Explain the key features and use cases for vSAN
Discuss the vSAN integration and compatibility with other VMware technologiesPlanning a vSAN Cluster
Identify requirements and planning considerations for vSAN clusters
Apply vSAN cluster planning and deployment best practices
Determine and plan for storage consumption by data growth and failure tolerance
Design vSAN hosts for operational needs
Identify vSAN networking features and requirements
Describe ways of controlling traffic in a vSAN environment
Recognize best practices for vSAN network configurationsDeploying a vSAN Cluster
Recognize the importance of hardware compatibility
Ensure the compatibility of driver and firmware versioning
Use tools to automate driver validation and installation
Apply host hardware settings for optimum performance
Use VMware vSphere® Lifecycle ManagerTM to perform upgrades
Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard
Manually configure a vSAN Cluster using VMware vSphere® Client™
Explain and configure vSAN fault domains
Using VMware vSphere® High Availability with vSAN
Understand vSAN Cluster maintenance capabilities
Describe the difference between implicit and explicit fault domains
Create explicit fault domainsvSAN Storage Policies
Describe a vSAN object
Describe how objects are split into components
Explain the purpose of witness components
Explain how vSAN stores large objects
View object and component placement on the vSAN datastore
Explain how storage policies work with vSAN
Define and create a virtual machine storage policy
Apply and modify virtual machine storage policies
Change virtual machine storage policies dynamically
Identify virtual machine storage policy compliance statusvSAN Resilience and Data Availability
Describe and configure the Object Repair Timer advanced option
Plan disk replacement in a vSAN cluster
Plan maintenance tasks to avoid vSAN object failures
Recognize the importance of managing snapshot utilization in a vSAN clusterManaging vSAN Storage Space Efficiency
Discuss deduplication and compression techniques
Understand deduplication and compression overhead
Discuss compression only mode
Configure erasure coding
Configure swap object thin provisioning
Discuss reclaiming storage space with SCSI UNMAP
Configure TRIM/UNMAPvSAN Security Operations
Identify differences between VM encryption and vSAN encryption
Perform ongoing operations to maintain data security
Describe the workflow of data-in transit encryption
Identify the steps involved in replacing Key Management ServervSAN HCI Mesh
Understand the purpose of vSAN HCI Mesh
Detail vSAN HCI Mesh technology and architecture
Perform mount and unmount of a remote datastorevSAN File Service and iSCSI Target Service
Understand the purpose of vSAN File Services
Detail vSAN File Services architecture
Configure vSAN File Shares
Describe vSAN iSCSI Target ServicevSAN Stretched and Two Node Clusters
Describe the architecture and uses case for stretched clusters
Detail the deployment and replacement of a vSAN witness node
Describe the architecture and uses case for two-node clusters
Explain storage policies for vSAN stretched clustervSAN Cluster Maintenance
Perform typical vSAN maintenance operations
Describe vSAN maintenance modes and data evacuation options
Assess the impact on cluster objects of entering maintenance mode
Determine the specific data actions required after exiting maintenance mode
Define the steps to shut down and reboot hosts and vSAN clusters
Use best practices for boot devices
Replace vSAN nodesvSAN Cluster Monitoring
Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services
Use VMware Skyline Health for monitoring vSAN cluster health
Manage alerts, alarms, and notifications related to vSAN in VMware vSphere® Client™
Create and configure custom alarms to trigger vSAN health issues
Use IOInsight metrics for monitoring vSAN performance
Use a vSAN proactive test to detect and diagnose cluster issuesvSAN Troubleshooting
Use a structured approach to solve configuration and operational problems
Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency
Use VMware Skyline Health to investigate and help determine failure conditions
Explain which log files are useful for vSAN troubleshootingvSAN Express Storage Architecture
Understand the purpose of vSAN Express Storage Architecture
Describe the vSAN Express Storage Architecture components
Identify Storage Policy differences
Understand compression and encryption operation differences - VSANPD7 — VMware vSAN: Plan and Deploy V7
- Длительность: 2 дня (16 часов)
 - Код курса: VSANPD7
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This two-day, hands-on training course provides you with the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. In this course, you are taught the many considerations that the end vSAN configuration has on the initial planning of the vSAN datastore. You also perform a fully manual configuration of a vSAN cluster.
Product Alignment
VMware vSAN 7.0 U1
Course Content
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to vSAN
Describe vSAN architecture
Identify vSAN objects and components
Describe the advantages of object-based storage
Describe the difference between All-Flash and Hybrid vSAN architecture
Explain the key features and use cases for vSAN
Discuss the vSAN integration and compatibility with other VMware technologiesPlanning a vSAN Cluster
Identify requirements and planning considerations for vSAN clusters
Apply vSAN cluster planning and deployment best practices
Determine and plan for storage consumption by data growth and failure tolerance
Design vSAN hosts for operational needs
Identify vSAN networking features and requirements
Describe ways of controlling traffic in a vSAN environment
Recognize best practices for vSAN network configurationsDeploying a vSAN Cluster
Deploy and configure a vSAN cluster using the Cluster Quickstart wizard
Manually configure a vSAN cluster using vSphere Client
Explain and configure vSAN fault domains
Using VMware vSphere® High Availability with vSAN
Understand vSAN cluster maintenance capabilities
Describe the difference between implicit and explicit fault domains
Create explicit fault domainsvSAN Storage Policies
Describe a vSAN object
Describe how objects are split into components
Explain the purpose of witness components
Explain how vSAN stores large objects
View object and component placement on the vSAN datastore
Explain how storage policies work with vSAN
Define and create a virtual machine storage policy
Apply and modify virtual machine storage policies
Change virtual machine storage policies dynamically
Identify virtual machine storage policy compliance statusIntroduction to Advanced vSAN Configurations
Define and configure compression and deduplication in the vSAN cluster
Define and configure encryption in the vSAN cluster
Understand the remote vSAN datastore topology
Identify the operations involved in managing the remote vSAN datastore
Understand the steps involved in creating the vSAN iSCSI target servicevSAN Stretched and Two-Node Clusters
Describe the architecture and use cases for stretched clusters
Detail the deployment and replacement of a vSAN witness node
Describe the architecture and uses case for two-node clusters
Explain the benefits of vSphere HA and vSphere Site Recovery Manager in a vSAN stretched cluster
Explain storage policies for vSAN stretched clusterWho should attend
Experienced VMware vSphere® administrators
Prerequisites
You should have the following understanding or knowledge:
Understanding of concepts presented in the VMware vSphere: Install, Configure, Manage [V7] (VSICM7) course
Knowledge of basic storage concepts
Experience using vSphere Client to perform administrative tasks on vSphere clustersCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Explain the key features and use cases for vSAN
Detail the underlying vSAN architecture and components
Describe the different vSAN deployment options
Detail vSAN cluster requirements and considerations
Apply recommended vSAN design considerations and capacity sizing practices
Determine and plan for storage consumption by data growth and failure tolerance
Design vSAN hosts for operational needs
Explain Maintenance Mode use and its impacts on vSAN
Apply best practices for vSAN network configurations
Manually configure a vSAN cluster using VMware vSphere® Client™
Explain and configure vSAN fault domains
Understand and apply vSAN storage policies
Define encryption in the vSAN cluster
Describe the architecture and use cases for stretched clusters
Describe the architecture and use cases for two-node clusters
Understand the steps involved in creating the vSAN iSCSI target services - VSANMO7 — VMware vSAN: Management and Operations V7
- Длительность: 3 дня (32 часа)
 - Код курса: VSANMO7
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
In this three-day course, you learn about managing and operating VMware vSAN™ 7. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as, vSAN node management, cluster maintenance, security operations and advanced vSAN cluster operations. You also gain practical experience through the completion of instructor-led activities and hands-on lab exercises.
Product Alignment
VMware ESXi™ 7.0 U1
VMware vCenter Server® 7.0 U1
VMware vSAN 7.0 U1Course Content
Course Introduction
vSAN Node Management
vSAN Resilience and Data Availability Operations
vSAN Cluster Maintenance
vSAN Storage Space Efficiency
vSAN Cluster Performance Monitoring
vSAN Security Operations
vSAN Direct
Remote vSAN
vSAN Native File Service
Manage Advanced vSAN Cluster OperationsWho should attend
Storage and virtual infrastructure administrators who are responsible for production support and administration of VMware vSAN 7.
Prerequisites
Completion of the following courses is required:
VMware vSphere: Install, Configure, Manage [V7] (VSICM7) or equivalent knowledge
VMware vSAN: Plan and Deploy [V7] (VSANPD7)Course Objectives
By the end of the course, you should be able to meet the following objectives:
Define the tasks involved in vSAN node management
Updating and upgrading vSAN using VMware vSphere Lifecycle Manager™
Explain vSAN resilience and data availability features
Reconfigure vSAN storage policies and observe the cluster-wide impact
Perform vSAN cluster scale-out and scale-up operations
Describe common vSAN cluster maintenance operations
Control vSAN resync operations
Configure vSAN storage efficiency and reclamation features
Use VMware Skyline™ Health to monitor cluster health, performance, and storage capacity
Describe vSAN security operations
Configure vSAN Direct for cloud native applications
Configure remote vSAN datastore and vSAN native file services
Manage two-node cluster and stretched cluster advance operationsOutline:
Course Introduction
Introductions and course logistics
Course objectivesvSAN Node Management
Recognize the importance of hardware compatibility
Ensure the compatibility of driver and firmware versioning
Use tools to automate driver validation and installation
Apply host hardware settings for optimum performance
Use vSphere Lifecycle Manager to perform upgradesvSAN Resilience and Data Availability Operations
Describe vSAN storage policies
Recognize the impact of a vSAN storage policy change
Describe and configure the Object Repair Timer advanced option
Plan disk replacement in a vSAN cluster
Plan maintenance tasks to avoid vSAN object failures
Recognize the importance of managing snapshot utilization in a vSAN cluster
Configure the vSAN fault domainsvSAN Cluster Maintenance
Perform typical vSAN maintenance operations
Describe vSAN maintenance modes and data evacuation options
Assess the impact on cluster objects of entering maintenance mode
Determine the specific data actions required after exiting maintenance mode
Define the steps to shut down and reboot hosts and vSAN clusters
Use best practices for boot devices
Replace vSAN nodesvSAN Storage Space Efficiency
Discuss deduplication and compression techniques
Understand deduplication and compression overhead
Discuss compression only mode
Configure erasure coding
Configure swap object thin provisioning
Discuss reclaiming storage space with SCSI UNMAP
Configure TRIM/UNMAPvSAN Cluster Performance Monitoring
Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services
Use vSphere Skyline Health for monitoring vSAN cluster health
Manage alerts, alarms, and notifications related to vSAN in VMware vSphere® Client™
Create and configure custom alarms to trigger vSAN health issues
Use IO Insight metrics for monitoring vSAN performance
Analyse vsantop performance metrics
Use a vSAN proactive test to detect and diagnose cluster issuesvSAN Security Operations
Identify differences between VM encryption and vSAN encryption
Perform ongoing operations to maintain data security
Describe the workflow of data-in transit encryption
Identify the steps involved in replacing Key Management Server (KMS)vSAN Direct
Discuss the use cases for vSAN Direct
Understand the overall architecture of vSAN Direct
Describe the workflow of vSAN Direct datastore creation
Explore how vSAN Direct works with storage policy taggingRemote vSAN
Discuss the use cases for remote vSAN
Understand the high-level architecture
Describe remote datastore operations
Discuss the network requirement
Interoperability between remote vSAN and VMware vSphere® High AvailabilityvSAN Native File Service
Discuss the use cases for vSAN file service
Understand the high-level architecture of vSAN file service
Discuss the authentication model
Configure file shares
Monitor file share health and capacity utilizationManage Advanced vSAN Cluster Operations
Describe the architecture for stretched clusters and two-node clusters
Understand the importance of witness node
Describe how stretched cluster storage policies affect vSAN objects
Create and apply a vSAN stretched cluster policy to meet specific needs
Discuss stretched cluster failure scenarios and responses - VSANTS8 — VMware vSAN: Troubleshooting v8
- Длительность: 2 дня (16 часов)
 - Код курса: VSANTS8
 - Стоимость
 - Очный формат: 493 000 ₸
 - Онлайн формат: 464 000 ₸
 
Описание курса
Course Overview
This two-day, hands-on training course provides the knowledge to troubleshoot VMware vSAN™ clusters. In this course, you will learn the best practices to maintain a healthy vSAN environment and mitigate potential issues that may occur with operation of the software. You will learn the GUI and CLI vSAN monitoring and troubleshooting tools. The course provides a logical framework for a systematic troubleshooting approach. You will learn how to troubleshoot vSAN common issues with examples. The labs provided in the course simulate real-world problems to evaluate and enhance your troubleshooting skills.
Product Alignment
VMware ESXi™ 8.0
VMware vCenter Server® 8.0
VMware vSAN 8.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesvSAN Best Practice and Problems Prevention
Discuss the importance of vSAN planning and availability best practice
Discuss vSAN networking best practice
Discuss the importance of vSAN Data protection
Understand the Data protection best Practice
Discuss the importance of vSAN hardware compatibility
Learn how to check hardware compatibility for vSAN
List the factors that impact vSAN performance
Learn how to benchmark vSAN performance
Discuss the importance of Skyline Advisor
Learn how to use Skyline AdvisorvSAN Monitoring and Troubleshooting tools
Explain vSAN Skyline Health features
Discuss the other vSAN cluster-level monitoring in the VMware vSphere® client
Discuss vSAN host-level monitoring in the vSphere client
Discuss vSAN VM-level monitoring in the vSphere Client
Understand tasks and events views within the vSphere client
Describe vSphere Alarms
Learn how to use the CLI to find information about vSAN clustervSAN Best Practice and Problems Prevention
Discuss the importance of vSAN planning and availability best practice
Discuss vSAN networking best practice
Discuss the importance of vSAN Data protection
Understand the Data protection best Practice
Discuss the importance of vSAN hardware compatibility
Learn how to check hardware compatibility for vSAN
List the factors that impact vSAN performance
Learn how to benchmark vSAN performance
Discuss the importance of Skyline Advisor
Learn how to use Skyline AdvisorTroubleshooting Process
Learn the recommended vSAN troubleshooting process
Describe the PNOMA framework
Learn how to troubleshoot vSAN common issues
Getting Support
Discuss how to get further support from the community and the knowledge base articles
Learn how to effectively contact VMware technical support
Troubleshooting Labs
Enhance and test vSAN troubleshooting skills through labsWho should attend
Experienced system vSAN administrators
Customers, cloud architects, systems engineers, data center administratorsPrerequisites
Before taking this course, you must complete at least one of the following courses:
VMware vSphere: Install, Configure, Manage [V8]
VMware vSAN: Install, Configure, Manage [V8]You should also have understanding or knowledge of these technologies:
Good understanding of storage concepts
Good understanding of network conceptsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Learn vSAN best practices for planning and availability
Outline vSAN networking best practices
Describe Skyline Advisor™ Pro
Learn about vSAN Skyline™ Health
Discuss vSAN monitoring and troubleshooting tools integrated within vSphere
Outline the common vSAN troubleshooting commands
Understand how to benchmark vSAN performance
Identify factors which may impact vSAN performance
Outline vSAN troubleshooting framework
List the most common vSAN issues
Learn how to troubleshoot vSAN common issues
Discuss how to get further support from the VMware community and knowledge base articles
Learn how to effectively contact VMware technical support
Enhance and test vSAN troubleshooting skills through labs - SRMICM86 — VMware Site Recovery Manager: Install, Configure, Manage 8.6
- Длительность: 2 дня (16 часов)
 - Код курса: SRMICM86
 - Стоимость
 - Очный формат: 521 500 ₸
 - Онлайн формат: 500 500 ₸
 
Описание курса
Course Overview
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Summarize the components of Site Recovery Manager architecture
Deploy and configure the Site Recovery Manager appliance
Describe the principal disaster recovery topologies that are used with Site Recovery Manager
Configure inventory and resource mappings
Describe the storage replication options that are used with Site Recovery Manager
Configure Site Recovery Manager to leverage array-based replication
Describe VMware vSphere® Replication™ functionality
Describe the vSphere Replication architecture
Deploy and configure vSphere Replication for use with Site Recovery Manager
Build Site Recovery Manager array-based protection groups, protection groups based on vSphere Replication, and
Virtual Volumes protection groups.
Build, edit, execute, test, and remove a recovery plan
Perform a planned migrationTarget Audience
vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager
Prerequisites
Before taking this course, you should have completed one of the following course(s):
VMware vSphere: Install, Configure, Manage
VMware vSphere: Fast Track
VMware vSphere: What’s New
VMware vSphere: Troubleshooting
Or equivalent knowledge and administration experience with VMware ESXi™ and VMware vCenter Server™.Product Alignment
VMware Site Recovery Manager [V8.6]
1. Course Introduction
Introductions and course logistics
Course objectives2 Site Recovery Manager Architecture
Describe Site Recovery Manager architecture
Identify disaster recovery options with Site Recovery Manager
Evaluate how Site Recovery Manager integrates with VMware products
Describe Site Recovery Manager licensing options
List the disaster recovery topologies supported by Site Recovery Manager
Describe how VMware Site Recovery for VMware Cloud on AWS integrates with Site Recovery Manager3 Deploying and Configuring Site Recovery Manager
Identify the vSphere and vCenter Server requirements for deploying Site Recovery Manager
Define Site Recovery Manager virtual appliance system requirements
Deploy the Site Recovery Manager appliance
Navigate the Site Recovery Manager configuration UI
Describe the process for registering Site Recovery Manager with vCenter Server
Describe how to start and stop services in Site Recovery Manager
Identify ways to perform updates to the Site Recovery Manager appliance
Describe the options for accessing the Site Recovery Manager
Describe the process for configuring site pairing
Describe how to import and export Site Recovery Manager configuration
Navigate the Site Recovery Manager configuration UIDescribe the process for registering Site Recovery Manager with vCenter Server
Describe how to start and stop services in Site Recovery Manager
Identify ways to perform updates to the Site Recovery Manager appliance
Describe the options for accessing the Site Recovery Manager
Describe the process for configuring site pairing
Describe how to import and export Site Recovery Manager configuration4 Configuring Inventory Mappings
Explain the importance of inventory mappings
Identify configuration options for inventory mappings
Describe the importance of placeholder virtual machines and datastores
Describe the importance of the vSphere inventory changes for Site Recovery Manager operation5 Using Array-Based Replication
Describe array-based replication
Describe Storage Replication Adapters and explain their role for the array-based replication
Describe the concept and configuration of array pairs
Describe datastore groups and the relationship between devices and datastore groups
Describe the role of consistency groups
Identify the advantages of array-based replication6 vSphere Replication
Describe Site Recovery Manager with vSphere Replication Architecture
Discuss the role of vSphere Replication components
Discuss use cases for vSphere Replication
Discuss system requirements and operational limits of vSphere Replication
Determine how to calculate bandwidth requirements for vSphere Replication - NSXICM4 — VMware NSX: Install, Configure, Manage v4.x
- Длительность: 5 дней (40 часов)
 - Код курса: NSXICM4
 - Стоимость
 - Очный формат: 945 000 ₸
 - Онлайн формат: 919 500 ₸
 
Описание курса
Course Overview
This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.
Product Alignment
NSX 4.0.0.1
NSX 4.0.1Who should attend
Experienced security administrators or network administrators
Prerequisites
Good understanding of TCP/IP services and protocols
Knowledge and working experience of computer networking, including switching and routing technologies (L2 through L3) and L2 through L7 firewall
Knowledge and working experience with VMware vSphere® environments
Knowledge and working experience with Kubernetes or VMware vSphere® with VMware Tanzu® environments
Solid understanding of concepts presented in the following courses:
VMware Virtual Cloud Network Core Technical Skills
VMware Data Center Virtualization: Core Technical Skills
Kubernetes FundamentalsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the architecture and main components of NSX
Explain the features and benefits of NSX
Deploy the NSX Management cluster and VMware NSX® Edge™ nodes
Prepare VMware ESXi™ hosts to participate in NSX networking
Create and configure segments for layer 2 forwarding
Create and configure Tier-0 and Tier-1 gateways for logical routing
Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX
Configure Advanced Threat Prevention features
Configure network services on NSX Edge nodes
Use VMware Identity Manager™ and LDAP to manage users and access
Explain the use cases, importance, and architecture of FederationCourse Content
Course Introduction
Introductions and course logistics
Course objectivesVMware Virtual Cloud Network and VMware NSX
Introduce the VMware Virtual Cloud Network vision
Describe the NSX product portfolio
Discuss NSX features, use cases, and benefits
Explain NSX architecture and components
Explain the management, control, data, and consumption planes and their functions.Preparing the NSX Infrastructure
Deploy VMware NSX® ManagerTM nodes on ESXi hypervisors
Navigate through the NSX UI
Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more
Perform transport node preparation and configure the data plane infrastructure
Verify transport node status and connectivity
Explain DPU-based acceleration in NSX
Install NSX using DPUsNSX Logical Switching
Introduce key components and terminology in logical switching
Describe the function and types of L2 segments
Explain tunneling and the Geneve encapsulation
Configure logical segments and attach hosts using NSX UI
Describe the function and types of segment profiles
Create segment profiles and apply them to segments and ports
Explain the function of MAC, ARP, and TEP tables used in packet forwarding
Demonstrate L2 unicast packet flow
Explain ARP suppression and BUM traffic handlingNSX Logical Routing
Describe the logical routing function and use cases
Introduce the two-tier routing architecture, topologies, and components
Explain the Tier-0 and Tier-1 gateway functions
Describe the logical router components: Service Router and Distributed Router
Discuss the architecture and function of NSX Edge nodes
Discuss deployment options of NSX Edge nodes
Configure NSX Edge nodes and create NSX Edge clusters
Configure Tier-0 and Tier-1 gateways
Examine single-tier and multitier packet flows
Configure static routing and dynamic routing, including BGP and OSPF
Enable ECMP on a Tier-0 gateway
Describe NSX Edge HA, failure detection, and failback modes
Configure VRF LiteNSX Bridging
Describe the function of logical bridging
Discuss the logical bridging use cases
Compare routing and bridging solutions
Explain the components of logical bridging
Create bridge clusters and bridge profilesNSX Firewalls
Describe NSX segmentation
Identify the steps to enforce Zero-Trust with NSX segmentation
Describe the Distributed Firewall architecture, components, and function
Configure Distributed Firewall sections and rules
Configure the Distributed Firewall on VDS
Describe the Gateway Firewall architecture, components, and function
Configure Gateway Firewall sections and rulesNSX Advanced Threat Prevention
Explain NSX IDS/IPS and its use cases
Configure NSX IDS/IPS
Deploy NSX Application Platform
Identify the components and architecture of NSX Malware Prevention
Configure NSX Malware Prevention for east-west and north-south traffic
Describe the use cases and architecture of VMware NSX® Intelligence™
Identify the components and architecture of VMware NSX® Network Detection and Response™
Use NSX Network Detection and Response to analyze network traffic events.NSX Services
Explain and configure Network Address Translation (NAT)
Explain and configure DNS and DHCP services
Describe VMware NSX® Advanced Load Balancer™ architecture, components, topologies, and use cases.
Configure NSX Advanced Load Balancer
Discuss the IPSec VPN and L2 VPN function and use cases
Configure IPSec VPN and L2 VPN using the NSX UINSX User and Role Management
Describe the function and benefits of VMware Identity Manager™ in NSX
Integrate VMware Identity Manager with NSX
Integrate LDAP with NSX
Identify the various types of users, authentication policies, and permissions
Use role-based access control to restrict user access
Explain object-based access control in NSXNSX Federation
Introduce the NSX Federation key concepts, terminology, and use cases.
Explain the onboarding process of NSX Federation
Describe the NSX Federation switching and routing functions.
Describe the NSX Federation security concepts. - NSXTICM32 — VMware NSX-T Data Center: Install, Configure, Manage V3.2
- Длительность: 5 дней (40 часов)
 - Код курса: NSXTICM32
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Overview
This five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T™ Data Center environment. This course covers key NSX-T Data Center features and functionality offered in the NSX-T Data Center 3.2 release, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.
Product Alignment
VMware NSX-T Data Center 3.2
Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the architecture and main components of NSX-T Data Center
Explain the features and benefits of NSX-T Data Center
Deploy the NSX Management cluster and VMware NSX® Edge™ nodes
Prepare VMware ESXi™ and KVM hosts to participate in NSX-T Data Center networking
Create and configure segments for layer 2 forwarding
Create and configure Tier-0 and Tier-1 gateways for logical routing
Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX-T Data Center
Configure Advanced Threat Prevention features
Configure network services on NSX Edge nodes
Use VMware Identity Manager and LDAP to manage users and access
Explain the use cases, importance, and architecture of FederationIntended Audience
Experienced security administrators or network administrators
Prerequisites
Good understanding of TCP/IP services and protocols
Knowledge and working experience of computer networking, including switching and routing technologies (L2-L3) and L2-L7 firewall
Knowledge and working experience with VMware vSphere® environments
Knowledge and working experience with Kubernetes or vSphere with VMware Tanzu™ environmentsSolid understanding of concepts presented in the following courses:
VMware Virtual Cloud Network: Core Technical Skills
VMware Data Center Virtualization: Core Technical Skills
Kubernetes FundamentalsOutline
1 Course Introduction
Introductions and course logistics
Course objectives2 VMware Virtual Cloud Network and NSX-T Data Center
Introduce the VMware Virtual Cloud Network vision
Discuss NSX-T Data Center solutions, use cases, and benefits
Explain NSX-T Data Center architecture and components
Describe the VMware NSXTM product portfolio and features
Explain the management, control, data, and consumption planes and function3 Preparing the NSX-T Data Center Infrastructure
Describe NSX Management Cluster
Deploy VMware NSXTM ManagerTM nodes on VMware ESXi and KVM hypervisors
Navigate through the NSX Manager UI
Explain data-plane components such as
N-VDS/VDS, transport nodes, transport zones, profiles, and more
Perform transport node preparation and establish the data center infrastructure
Verify transport node status and connectivity4 NSX-T Data Center Logical Switching
Introduce key components and terminology in logical switching
Describe the function and types of L2 segments
Explain tunneling and the GENEVE encapsulation
Configure logical segments and attach hosts using NSX Manager UI
Describe the function and types of segment profiles
Create segment profiles and apply them to segments and ports
Explain the function of MAC, ARP, and TEP tables used in packet forwarding
Demonstrate L2 unicast packet flow
Explain ARP suppression and BUM traffic handling5 NSX-T Data Center Logical Routing
Describe the logical routing function and use cases
Introduce the two-tier routing architecture, topologies, and components
Explain the Tier-0 and Tier-1 Gateway functions
Describe the logical router components: Service Router and Distributed Router
Discuss the architecture and function of NSX Edge nodes
Discuss deployment options of NSX Edge nodes
Configure NSX Edge nodes and create NSX Edge clusters
Configure Tier-0 and Tier-1 Gateways
Examine the single-tier and multitier packet flow
Configure static routing and dynamic routing, including BGP and OSPF
Enable ECMP on Tier-0 Gateway
Describe NSX Edge HA, failure detection, and failback modes
Configure VRF Lite6 NSX-T Data Center Bridging
Describe the function of logical bridging
Discuss the logical bridging use cases
Compare routing and bridging solutions
Explain the components of logical bridging
Create bridge clusters and bridge profiles7 NSX-T Data Center Firewalls
Describe NSX segmentation
Identify the steps to enforce Zero-Trust with NSX segmentation
Describe the Distributed Firewall architecture, components, and function
Configure Distributed Firewall sections and rules
Configure the Distributed Firewall on VDS
Describe the Gateway Firewall architecture, components, and function
Configure Gateway Firewall sections and rules8 NSX-T Data Center Advanced Threat Prevention
Explain NSX IDS/IPS and its use cases
Configure NSX IDS/IPS
Deploy the NSX Application Platform
Identify the components and architecture of NSX Malware Prevention
Configure NSX Malware Prevention for east-west and north-south traffic
Describe the use cases and architecture of NSX Intelligence
Identify the components and architecture of VMware NSX® Network Detection and Response™
Use NSX Network Detection and Response to analyze network traffic events.9 NSX-T Data Center Services
Describe NSX-T Data Center services
Explain and configure Network Address Translation (NAT)
Explain and configure DNS and DHCP services
Describe VMware NSX® Advanced Load Balancer™ architecture, components, topologies, and use cases.
Configure NSX Advanced Load Balancer
Discuss the IPSec VPN and L2 VPN function and use cases
Configure IPSec VPN and L2 VPN using the NSX Manager UI10 NSX-T Data Center User and Role Management
Describe the function and benefits of VMware Identity Manager™ in NSX-T Data Center
Integrate VMware Identity Manager with NSX-T Data Center
Integrate LDAP with NSX-T Data Center
Identify the various types of users, authentication policies, and permissions
Use role-based access control to restrict user access11 NSX-T Data Center Federation
Introduce the NSX-T Data Center Federation key concepts, terminology, and use-cases.
Explain the onboarding process of NSX-T Data Center Federation
Describe the NSX-T Data Center Federation switching and routing functions.
Describe the NSX-T Data Center Federation security concepts. - NSXTO — VMware NSX: Troubleshooting and Operations
- Длительность: 5 дней (40 часов)
 - Код курса: NSXTO
 - Стоимость
 - Очный формат: 1 028 000 ₸
 - Онлайн формат: 1 005 500 ₸
 
Описание курса
Overview
This five-day, hands-on training course provides the advanced knowledge, skills, and tools to achieve competency in operating and troubleshooting the VMware NSX infrastructure. This course introduces you to workflows of various networking and security constructs along with several operational and troubleshooting tools that help you manage and troubleshoot your VMware NSX environment.
In addition, various types of technical problems are presented to you, which you will identify, analyze, and solve through a systematic process.
Product Alignment
NSX 4.0.0.1
NSX 4.0.1Objectives
By the end of the course, you should be able to meet the following objectives:
Use the native tools available in NSX to identify and troubleshoot the problems.
Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to identify and troubleshoot problems related to the NSX environment
Explain the NSX infrastructure components and the communications between them
Identify, analyze, and troubleshoot problems related to the management, control, and data planes in NSX
Identify, analyze, and troubleshoot problems related to infrastructure preparation and VMware NSX Edge deployments
Identify, analyze, and troubleshoot problems related to logical switching and logical routing
Identify, analyze, and troubleshoot network security problems related to the Distributed firewalls, Gateway firewalls, and Distributed IDS/IPS.
Identify, analyze, and troubleshoot problems related to VPN and VMware NSX Advanced Load Balancer
Identify the components and packet flows involved in the NSX datapath and troubleshoot related problemsPrerequisites
Before taking this course, you must complete the following course:
VMware NSX: Install, Configure, Manage [V4.0]
You should also have understanding or knowledge of these technologies:
Good understanding of TCP/IP services and protocols
Knowledge and working experience of computer networking and security, including:
Switching and routing technologies (L2 andL3)
Network and application delivery services (L4 through L7)
Firewalling (L4 through L7)
VMware vSphere environments
The VMware Certified Professional – Network Virtualization certification is recommended.Audience
Experienced system administrators and network administrators
Network and security professionals who work with enterprise networksOutline
1 Course Introduction
Introduction and course logistics
Course objectives2 NSX Operations and Tools
Explain and validate the native troubleshooting tools for NSX
Configure syslog, IPFIX, and log collections for the NSX environment
Integrate NSX with VMware Aria Operations for Logs and VMware Aria Operations for Networks
Validate and review the API methods available to configure the NSX environment3 Troubleshooting the NSX Management Cluster
Describe the NSX Management cluster architecture, components, and communication channels
Identify the workflows involved in configuring the NSX Management cluster
Validate and troubleshoot the NSX Management cluster formation4 Troubleshooting Infrastructure Preparation
Describe the data plane architecture, components, and communication channels
Explain and troubleshoot VMware ESXi transport node preparation issues
Explain and troubleshoot NSX Edge deployment issues5 Troubleshooting Logical Switching
Describe the architecture of logical switching
List the modules and processes involved in configuring logical switching
Explain the importance of VDS in transport nodes
Review the architecture and workflows involved in attaching workloads to segments
Identify and troubleshoot common logical switching issues6 Troubleshooting Logical Routing
Review the architecture of logical routing
Explain the workflows involved in the configuration of Tier-0 and Tier-1 gateways
Explain the high availability modes and validate logical router placements
Identify and troubleshoot common logical routing issues using both BGP and OSPF7 Troubleshooting Security
Review the architecture of the Distributed Firewall
Explain the workflows involved in configuring the Distributed Firewall
Review the architecture of the Gateway Firewall
Explain the workflows involved in configuring the Gateway Firewall
Identify and troubleshoot common Distributed firewall and Gateway Firewall issues
Review the architecture and workflows involved in configuring Distributed IDS/IPS
Identify and troubleshoot common Distributed IDS/IPS problems.8 Troubleshooting the NSX Advanced Load Balancer and VPN Services
Review the NSX Advanced Load Balancer architecture and components
Identify and troubleshoot common NSX Advanced Load Balancer issues
Review the IPsec and L2 VPN architecture and components
Identify and troubleshoot common IPsec and L2 VPN issues9 Datapath Walkthrough
Verify and validate the path of the packet on the NSX datapath
Identify and perform packet captures at various points in the datapath
Use NSX CLI and native hypervisor commands to retrieve configurations involved in the NSX datapath - NSXTD4 — VMware NSX: Design v4.x
- Длительность: 5 дней (40 часов)
 - Код курса: NSXTD4
 - Стоимость
 - Очный формат: 1 521 500 ₸
 - Онлайн формат: 1 499 000 ₸
 
Описание курса
Course Overview
This five-day course provides comprehensive training on considerations and practices to design a VMware NSX® environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer’s business needs.
Product Alignment
VMware NSX 4.1.0
Who should attend
Network and security architects and consultants who design the enterprise and data center networks and NSX environments
Prerequisites
Before taking this course, you must complete the following course:
VMware NSX: Install, Configure, Manage [V4.0] (NSXICM4)
You should also have understanding or knowledge of these technologies:Good understanding of TCP/IP services and protocols
Knowledge and working experience of computer networking and security, including:
Switching and routing technologies (L2 and L3)
Network and application delivery services (L4 through L7)
Firewalling (L4 through L7)
vSphere environments
The VMware Certified Professional – Network Virtualization certification is recommended.Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe and apply a design framework
Apply a design process for gathering requirements, constraints, assumptions, and risks
Design a VMware vSphere® virtual data center to support NSX requirements
Create a VMware NSX® Manager™ cluster design
Create a VMware NSX® Edge™ cluster design to support traffic and service requirements in NSX
Design logical switching and routing
Recognize NSX security best practices
Design logical network services
Design a physical network to support network virtualization in a software-defined data center
Create a design to support the NSX infrastructure across multiple sites
Describe the factors that drive performance in NSXCourse Outline
Course Introduction
Introduction and course logistics
Course objectivesNSX Design Concepts
Identify design terms
Describe framework and project methodology
Describe the role of VMware Cloud Foundation™ in NSX design
Identify customers’ requirements, assumptions, constraints, and risks
Explain the conceptual design
Explain the logical design
Explain the physical designNSX Architecture and Components
Recognize the main elements in the NSX architecture
Describe the NSX management cluster and the management plane
Identify the functions and components of management, control, and data planes
Describe the NSX Manager sizing options
Recognize the justification and implication of NSX Manager cluster design decisions
Identify the NSX management cluster design optionsNSX Edge Design
Explain the leading practices for edge design
Describe the NSX Edge VM reference designs
Describe the bare-metal NSX Edge reference designs
Explain the leading practices for edge cluster design
Explain the effect of stateful services placement
Explain the growth patterns for edge clusters
Identify design considerations when using L2 bridging servicesNSX Logical Switching Design
Describe concepts and terminology in logical switching
Identify segment and transport zone design considerations
Identify virtual switch design considerations
Identify uplink profile and transport node profile design considerations
Identify Geneve tunneling design considerations
Identify BUM replication mode design considerationsNSX Logical Routing Design
Explain the function and features of logical routing
Describe the NSX single-tier and multitier routing architectures
Identify guidelines when selecting a routing topology
Describe the BGP and OSPF routing protocol configuration options
Explain gateway high availability modes of operation and failure detection mechanisms
Identify how multitier architectures provide control over stateful service location
Identify EVPN requirements and design considerations
Identify VRF Lite requirements and considerations
Identify the typical NSX scalable architecturesNSX Security Design
Identify different security features available in NSX
Describe the advantages of an NSX Distributed Firewall
Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall
Determine a security policy methodology
Recognize the NSX security best practicesNSX Network Services
Identify the stateful services available in different edge cluster high availability modes
Describe failover detection mechanisms
Compare NSX NAT solutions
Explain how to select DHCP and DNS services
Compare policy-based and route-based IPSec VPN
Describe an L2 VPN topology that can be used to interconnect data centers
Explain the design considerations for integrating VMware NSX® Advanced Load Balancer™ with NSXPhysical Infrastructure Design
Identify the components of a switch fabric design
Assess Layer 2 and Layer 3 switch fabric design implications
Review guidelines when designing top-of-rack switches
Review options for connecting transport hosts to the switch fabric
Describe typical designs for VMware ESXi™ compute hypervisors with two pNICs
Describe typical designs for ESXi compute hypervisors with four or more pNICs
Differentiate dedicated and collapsed cluster approaches to SDDC designNSX Multilocation Design
Explain scale considerations in an NSX multisite design
Describe the main components of the NSX Federation architecture
Describe the stretched networking capability in Federation
Describe stretched security use cases in Federation
Compare the Federation disaster recovery designsNSX Optimization and DPU-Based Acceleration
Describe Geneve Offload
Describe the benefits of Receive Side Scaling and Geneve Rx Filters
Explain the benefits of SSL Offload
Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput
Explain the available enhanced datapath modes and use cases
List the key performance factors for compute nodes and NSX Edge nodes
Describe DPU-Based Acceleration
Define the NSX features supported by DPUs
Describe the hardware and networking configurations supported with DPUs - NSXIS4 — VMware NSX for Intrinsic Security v4.x
- Длительность: 5 дней (40 часов)
 - Код курса: NSXTIS4
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX® for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX® Intelligence™, and VMware NSX® NDR™. In addition, this course presents common configuration issues and gives a methodology to resolve them.
This course is also available in an On Demand format. For more information, select this link: VMware NSX for Intrinsic Security [V4.x] — On Demand.
Product Alignment
VMware NSX 4.1.0
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Define the concepts related to information security
Explain the different types of firewalls and their use cases
Describe the operation of intrusion detection and intrusion prevention systems
Differentiate between Malware Prevention approaches
Describe the VMware intrinsic security portfolio
Use NSX segmentation to implement Zero-Trust Security
Configure user and role management
Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies
Configure and troubleshoot Gateway Security
Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls
Explain the security best practices related to grouping, tagging, and rule configuration
Describe north-south and east-west service insertion
Describe endpoint protection
Configure and troubleshoot IDS/IPS
Deploy NSX Application Platform
Configure and troubleshoot NSX Malware Prevention
Describe the capabilities of NSX Intelligence and NSX NDRCourse Content
Course Introduction
Security Basics
VMware Intrinsic Security
Implementing Zero-Trust Security
User and Role Management
Distributed Firewall
Gateway Security
Operating Internal Firewalls
Network Introspection
Endpoint Protection
Intrusion Detection and Prevention
NSX Application Platform
NSX Malware Prevention
NSX Intelligence and NSX NDRWho should attend
Experienced security administrators
Prerequisites
You should also have the following understanding or knowledge:
Good understanding of TCP/IP services and protocols
Knowledge and working experience of network security, including:
L2 through L7 firewalling
Intrusion detection and prevention systems
Malware prevention systems
Knowledge of and working experience with VMware vSphere® environments
The VMware Certified Technical Associate — Network Virtualization is recommended.Course Outline
Course Introduction
Introduction and course logistics
Course objectivesSecurity Basics
Define the concepts related to information security
Explain the different types of firewalls and their use cases
Describe the operation of IDS/IPS
Differentiate between Malware Prevention approachesVMware Intrinsic Security
Define the VMware intrinsic security strategy
Describe the VMware intrinsic security portfolio
Explain how NSX aligns with the intrinsic security strategyImplementing Zero-Trust Security
Define Zero-Trust Security
Describe the five pillars of a Zero-Trust architecture
Define NSX segmentation and its use cases
Describe the steps needed to enforce Zero-Trust with NSX segmentationUser and Role Management
Integrate NSX and VMware Identity Manager™
Integrate NSX and LDAP
Describe the native users and roles in NSX
Create and assign custom user roles
Explain object-based RBAC in a multitenancy environmentDistributed Firewall
Configure Distributed Firewall rules and policies
Describe the NSX Distributed Firewall architecture
Troubleshoot common problems related to NSX Distributed Firewall
Configure time-based policies
Configure Identity Firewall rules
Configure the distributed firewall to block malicious IPs
Gateway SecurityConfigure Gateway Firewall rules and policies
Describe the architecture of the Gateway Firewall
Identify and troubleshoot common Gateway Firewall issues
Configure TLS Inspection to decrypt traffic for both internal and external services
Configure URL filtering and identify common configuration issueOperating Internal Firewalls
Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls
Explain security best practices related to grouping, tagging, and rule configurationNetwork Introspection
Explain network introspection
Describe the architecture and workflows of north-south and east-west service insertion
Troubleshoot north-south and east-west service insertionEndpoint Protection
Explain endpoint protection
Describe the architecture and workflows of endpoint protection
Troubleshoot endpoint protectionIntrusion Detection and Prevention
Describe the MITRE ATT&CK framework
Explain the different phases of a cyber attack
Describe how NSX security solutions can be used to protect against cyber attacks
Configure and troubleshoot Distributed IDS/IPS
Configure and troubleshoot North-South IDS/IPSNSX Application Platform
Describe NSX Application Platform and its use cases
Identify the topologies supported for the deployment of NSX Application Platform
Deploy NSX Application Platform
Explain the NSX Application Platform architecture and services
Validate the NSX Application Platform deployment and troubleshoot common issuesNSX Malware Prevention
Identify use cases for NSX Malware Prevention
Identify the components in the NSX Malware Prevention architecture
Describe the NSX Malware Prevention packet flows for known and unknown files
Configure NSX Malware Prevention for east-west and north-south trafficNSX Intelligence and NSX NDR
Describe NSX Intelligence and its use cases
Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities
Describe NSX NDR and its use cases
Explain the architecture of NSX NDR in NSX
Describe the visualization capabilities of NSX NDR - VRAOE13 — VMware Aria Automation: Orchestration and Extensibility V8.13
- Длительность: 5 дней (40 часов)
 - Код курса: VRAOE13
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
During this five-day course, you focus on using VMware Aria Automation Orchestrator™ to extend the functionality of VMware Aria Automation™. You learn how to provide XaaS (Anything as a Service) and implement machine lifecycle extensibility using the VMware Aria Automation Event Broker. You also learn how to create VMware Aria Automation Orchestrator workflows and VMware Aria Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in VMware Aria Automation Orchestrator.
The course introduces the VMware Aria Automation Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plug-ins and scripts. This course is designed to give you the tools to craft custom solutions in the product.
Product Alignment
VMware vSphere® 8.0
VMware Aria Automation 8.13
VMware Aria Automation Orchestrator 8.13
VMware Aria Suite Lifecycle™ 8.12Who should attend
Experienced VMware administrators, automation and orchestration specialists, system integrators, private cloud administrators, and public cloud administrators
Prerequisites
Before taking this course, you should have completed the following course:
VMware Aria Automation: Install, Configure, Manage [V8.10] (VAAICM810)
You should also have the following understanding or knowledge:
Knowledge of VMware vSphere
Working knowledge of scripting or programming using JavaScript, Windows PowerShell, Perl, Java, Python, or similar languages. All code is provided during class.Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the features, benefits, components, and integration of VMware Aria Automation Orchestrator and VMware Aria Automation
Describe the role of VMware Aria Automation Orchestrator workflows and content elements in automation
Use the VMware Aria Automation Orchestrator client to access and navigate the VMware Aria Automation Orchestrator platform, and to import and run VMware Aria Automation Orchestrator library workflows
Design, develop, and run custom reusable VMware Aria Automation Orchestrator workflows
Use VMware APIs in the VMware Aria Automation Orchestrator workflow
Integrate VMware Aria Automation with VMware Aria Automation Orchestrator instances to extend infrastructure as a service (IaaS) system life-cycle processes and to enhance and deliver custom IT services
Use anything as a service (XaaS) to extend VMware Aria Automation to other enterprise systems
Use the VMware Aria Automation Event Broker service to trigger specific VMware Aria Automation Orchestrator workflowsOutline:
1 Course Introduction
Introductions and course logistics
Course objectives2 Overview of VMware Aria Automation and VMware Aria Automation Orchestrator
Define the purpose of VMware Aria Automation
Outline the purpose of VMware Aria Automation Orchestrator
Describe the main components of VMware Aria Automation
Describe the main components of VMware Aria Automation Orchestrator3 Using Schema Elements
Describe a scriptable task
Run a Polyglot script from a VMware Aria Automation Orchestrator workflow
Run JavaScript from a VMware Aria Automation Orchestrator workflow
Run a VMware Aria Automation Orchestrator workflow from a VMware Aria Automation Orchestrator workflow
Run an action from a VMware Aria Automation Orchestrator workflow
Use VMware Aria Automation Orchestrator workflows both synchronously and asynchronously4 Working with Variables
Define inputs, outputs, and variables in VMware Aria Automation Orchestrator workflows
Bind variables in VMware Aria Automation Orchestrator workflows
Explain the purpose of binding in VMware Aria Automation Orchestrator workflows
Wrap VMware Aria Automation Orchestrator workflows
Using APIs and the API Explorer
Create actions in VMware Aria Automation Orchestrator
Use VMware Aria Automation Orchestrator input forms
Handle user interactions in VMware Aria Automation Orchestrator5 Handling Exceptions, Logging, and Debugging
Identify the function of exception handling
Handle exceptions in VMware Aria Automation Orchestrator workflows
Use logs in VMware Aria Automation Orchestrator workflows
Debug VMware Aria Automation Orchestrator workflows
Monitor variable values6 Branching and Looping
Use decision schema element for branching in VMware Aria Automation Orchestrator workflows
Use switch schema element for branching in VMware Aria Automation Orchestrator workflows
Use loops in VMware Aria Automation Orchestrator workflows7 Working with Assets
Create and use configuration elements in VMware Aria Automation Orchestrator
Use resources in VMware Aria Automation Orchestrator
Create and use packages in VMware Aria Automation Orchestrator8 Working with Plug-Ins
Explain the functionality of VMware Aria Automation Orchestrator plug-ins
Download and install plug-Ins
Use the SSH plug-In in VMware Aria Automation Orchestrator
Use the REST plug-in in VMware Aria Automation Orchestrator
Use the VMware Aria Automation plug-in in VMware Aria Automation Orchestrator
Use the PowerShell plug-in in VMware Aria Automation Orchestrator
Use dynamic types in VMware Aria Automation Orchestrator9 Working with Versioning and Git
Manage versioning in VMware Aria Automation Orchestrator
Use Git in VMware Aria Automation Orchestrator10 Working with Time-Related Schema Elements
Use scheduling in VMware Aria Automation Orchestrator
Use sleeping in VMware Aria Automation Orchestrator
Use waiting in VMware Aria Automation Orchestrator11 Introduction to Extensibility
Introduction to VMware Aria Automation extensibility
Explain the Event Broker Service
Explain life cycle integration12 Using the Event Broker
Explain the functionality of the Event Broker Service
Overview of VMware Aria Automation Event Broker
Create VMware Aria Automation subscriptions
Data exchange between VMware Aria Automation and VMware Aria Automation Orchestrator13 Using ABX Actions
Overview of Action Based Extensibility (ABX)
Describe Function as a Service (FaaS)
Differentiate between VMware Aria Automation Orchestrator and ABX
Create an ABX action that is called by a VMware Aria Automation subscription14 Working with Services, Custom Resources, and Resource Actions
Describe the service broker service
Use VMware Aria Automation Orchestrator as a content source in VMware Aria Automation
Create custom resources in VMware Aria Automation
Create resource actions in VMware Aria Automation15 Capturing the vSphere Client Code
Use vSphere Client code capture to capture code in VMware Aria Automation Orchestrator workflow, JavaScript, PowerCLI or other languages
Use the captured code in VMware Aria Automation Orchestrator workflows or actions - VAONICM68 — VMware Aria Operations for Networks: Install, Configure, Manage V6.8
- Длительность: 2 дня (16 часов)
 - Код курса: VAONICM68
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This two-day, hands-on course gives you the skills to deploy and use VMware Aria Operations™ for Networks to ensure an optimized, highly available, and secure infrastructure for your applications. You will learn the features, components, architecture, and benefits of VMware Aria Operations for Networks and how to use it to simplify daily operation and troubleshooting tasks.
Who should attend
Network professionals and who design, build, operate, manage, and troubleshoot software-defined networking and security, and application owners who need visibility across multi-cloud environments.
Prerequisites
Students taking this course should have general networking concepts including TCP/IP service and protocols, security knowledge and familiar with NSX architecture.
Before taking this course, students are recommended to take the following courses or have equivalent knowledge and experience:
VMware NSX-T Data Center: Install, Configure, Manage
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Explain the features and architecture of VMware Aria Operations for Networks
Describe the VMware Aria Operations for Networks installation processes and requirements
Navigate the VMware Aria Operations for Networks GUI
Recognize major use cases for VMware Aria Operations for Networks and their benefits
Deploy VMware Aria Operations for Networks
Use VMware Aria Operations for Networks to monitor, operate, analyze, and troubleshoot the infrastructure supporting your applicationsOutline:
1 Course Introduction
Introductions and course logistics
Course objectives2 Introduction to VMware Aria Operations for Networks
Identify the use cases for VMware Aria Operations for Networks
Access the VMware Aria Operations for Networks Home page
View VMware Aria Operations for Networks entity data
Perform searches for specific entity data
Create entity search queries
Find and use event data3 VMware Aria Operations for Networks Architecture and Components
Identify the components of VMware Aria Operations for Networks
Describe the function of each component and how the components interact
Check the health of VMware Aria Operations for Networks components4 VMware Aria Operations for Networks Installation
Deploy VMware Aria Operations for Networks components
Configure the pairing relationship between the platform VM and the collector VM
Troubleshoot platform VM and collector VM configuration problems
Explain how data sources export flow information
Add VMware vCenter Server® to VMware Aria Operations for Networks
Add a VMware NSX to VMware Aria Operations for Networks
Configure IPFIX
Distinguish between the mechanisms used to scale VMware Aria Operations for Networks
Select the appropriate scaling mechanism for your environment
Describe how clusters are expanded
Integrate VMware Aria Operations with VMware Aria Operations for Networks
Import a VMware Aria Operations for Networks instance into VMware Aria Suite Lifecycle5 VMware Aria Operations for Networks Use Cases
Explain use cases for VMware Aria Operations for Networks
Create VMware Aria Operations for Networks applications
Perform application discovery
Plan and optimize micro-segmentation and security for applications
Explain the use of flow analytics
Use flow information from physical devices in security planning
Generate virtual machine path topologies between entities using flows
Extract useful information from path topologies
Validate NSX deployments
Monitor and troubleshoot NSX events6 Operations and Troubleshooting Common Issues
Perform VMware Aria Operations for Networks operations by using VMware vSphere® tags
Use the flow analytics dashboards to perform flow analysis
Set and configure Intents to identify aberrations in the behaviour of entities
Use VMware Aria Operations for Networks tools to troubleshoot common problems - VASLICM810 — VMware Aria Suite Lifecycle: Install, Configure, Manage v8.10
- Длительность: 2 дня (16 часов)
 - Код курса: VASLICM810
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Course Overview
This two-day, hands-on training course focuses on installing, configuring, and managing VMware Aria Suite Lifecycle™, which manages products such as VMware Aria Operations™, VMware Aria Operations™ for Logs, and VMware Aria Automation™. This course prepares you to perform Day 0 to Day 2 operations for your environment using VMware Aria Suite Lifecycle.
Who should attend
Experienced system administrators and system engineers
Prerequisites
You should also have the following understanding or knowledge:
Knowledge and working experience of VMware vSphere™ environments
Good understanding of one or more VMware Aria Suite productsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
List the use cases for VMware Aria Suite Lifecycle
Deploy and configure VMware Aria Suite Lifecycle
Manage certificates in VMware Aria Suite Lifecycle environments
Create, manage, and scale VMware Aria Suite Lifecycle environments
Add VMware Aria Suite products to VMware Aria Suite Lifecycle
Manage VMware Aria Suite products with VMware Aria Suite Lifecycle
Use VMware Aria Suite Lifecycle to perform content life cycle management
Migrate a legacy VMware Aria Suite Lifecycle instance
Explain the VMware Aria Suite Lifecycle component settings
Troubleshoot day-to-day operations of VMware Aria Suite LifecycleCourse Outline
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to VMware Aria Suite Lifecycle
Describe the use cases for VMware Aria Suite Lifecycle
List the features of VMware Aria Suite Lifecycle
List system requirements for VMware Aria Suite Lifecycle
Use Easy Installer to deploy VMware Aria Suite LifecycleVMware Aria Suite Lifecycle Configuration
Create Certificate Signing Requests (CSRs) for VMware Aria Suite product instances
Configure VMware Aria Suite Lifecycle settings
Add certificates to VMware Aria Suite product instances
Add VMware Aria Suite Lifecycle environments
Add VMware Aria Suite product binariesAdding VMware Aria Suite Products
Deploy a new VMware Aria Suite product
Manage a VMware Aria Suite product using VMware Aria Suite Lifecycle
Add an existing VMware Aria Suite product to an environmentVMware Aria Suite Lifecycle Day 2 Operations
Perform ongoing management tasks
Monitor the health of the environment
Use content from the marketplace
Use VMware Aria Suite Lifecycle to perform content life cycle managementVMware Aria Suite Lifecyle Migration
Prepare a legacy VMware Aria Suite Lifecycle instance for migration
Migrate VMware Aria Suite Lifecycle using Easy InstallerTroubleshooting VMware Aria Suite Lifecycle
Identify the VMware Aria Suite Lifecycle component settings
Describe the procedure to generate and download the log bundle
Use Linux commands to assist with troubleshooting VMware Aria Suite Lifecycle
Recognize entries in commonly accessed VMware Aria Suite Lifecycle log files 
Безопасность по стандартам ISO
- ИБ01 — Система управления информационной безопасностью ISO 27001 и управление рисками ISO 27005
- Длительность: 5 дней (40 часов)
 - Код курса: ИБ01
 - Стоимость
 - Очный формат: 392 000 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Аннотация
Основными задачами курса являются: ознакомление слушателей с современными взглядами и подходами к обеспечению информационной безопасности (ИБ), понятию и управлению рисками ИБ, раскрытие значения ИБ для успешного осуществления деятельности предприятия, пояснение основных этапов разработки и внедрения системы управления ИБ и рисками ИБ.
Данный курс адаптирован к действующим международным версиям стандартов ИСО/МЭК 27001:2022 и ИСО/МЭК 27005:2018.
Эти стандарты являются обобщением мирового опыта в организации управления информационной безопасностью и определяет общую организацию, направления планирования, использование оценки риска, оценки эффективности, контроля улучшений и т.д. в контексте информационной безопасности.Аудитория
Курс предназначен для руководителей проектов по внедрению СУИБ, руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка
Начальный курс «Управление информационной безопасностью. Организация, подходы, принципы».
Опыт работы в подразделениях информационных технологий или информационной безопасности.Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 80% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью финального тестирования.Результаты курса
По окончании курса слушатели смогут:
Сформировать план разработки и внедрения СУИБ у себя на предприятии
Определить механизмы и подходы к управлению актуальных рисков ИБ
Внедрить у себя в организации (при необходимости скорректировать имеющийся) процесс управления рисками ИБ
Обоснованно подходить к выбору механизмов контроля требуемого уровня безопасности
Оценить качество выполнения работ внутренними и внешними аудиторами ИБ.
Ориентироваться в проблемах информационных рисков, в современных технологиях управления рисками
Выявлять актуальные угрозы, имеющиеся уязвимости и определять приоритетные направления деятельности по нейтрализации рисков у себя в компанииПрограмма курса
1. Информация, информационная безопасность и защита информации
Определение ИБ, виды информации, соотношение понятий ИБ и ЗИ
2. Объекты защиты и угрозы
Виды классификаций активов, угроз, уязвимостей
3. Основные термины и определения ИБ
Риски ИБ и стратегии их обработки
Понятие, подходы и стратегии управления рисками. Факторы, определяющие риск4. Комплексность и системность при управлении ИБ
Применение принципов комплексности и системности на практике.
5. Процессный подход в управлении ИБ
«Семейство» стандартов ИСО по системам управления. Понятие процессного подхода. История его использования и тенденции.
6. Назначение стандартов ИСО 27001 и ИСО 27002
Механизм взаимодействия и применения стандартов. Их структура. Термины и определения.
7. Область действия СУИБ и Политика ИБ
Определение границ СУИБ. Концепция и политика ИБ, методы их формирования.
8. Процесс управления рисками ИБ. Основные этапы, их разработка и реализация.
Идентификация рисков ИБ, их оценка, анализ, оценивание и обработка.
9. Инвентаризация активов
Инвентаризация активов, их оценка и ранжирование. Факторы, влияющие на ценность активов
10. Понятие процесса управления рисками управления ИБ. Основные его стадии.
Понятие информационных рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления информационными рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
11. Процесс управления рисками ИБ. Основные этапы, их разработка и реализация.
Идентификация рисков ИБ, их оценка, анализ, оценивание и обработка.
12. Инвентаризация активов
Инвентаризация активов, их оценка и ранжирование. Факторы, влияющие на ценность активов
13. Понятие процесса управления рисками управления ИБ. Основные его стадии.
Понятие информационных рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления информационными рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
14. Выбор и обоснование средств обработки рисков
Выбор стратегий и средств управления рисками. Рекомендации Стандарта, документ «Положение о применимости». Остаточные риски.
15. Значение рисков в современных системах информационной безопасности
Принцип комплексности и системности в контексте обеспечения ИБ, его обоснование и отражение в ведущих международных стандартах по информационной безопасности. Организационные, правовые и программно-технические механизмы безопасности, их согласованное применение и критерии выбора.
16. Обязательные процессы управления ИБ
Основы построения СУИБ. Требования Стандарта.
17. Завершение внедрения СУИБ
Документация СУИБ. Матрица применимости. Записи СУИБ. Механизмы анализа и пересмотра СУИБ.
18. Жизненный цикл PDCA
Цикл Деминга-Шухарта в применении к СУИБ
19. Сертификация СУИБ
Этапы сертификационного процесса, сроки и ориентировочный бюджет.
20. Аудит информационной безопасности
Планирование аудита. Подготовка аудитора. Документы. Сбор свидетельств. Техника аудита. Ведение записей. Формулирование несоответствий.
21. Экзамен
Оценка уровня усвоения слушателями материалов курса.
 - ИБ03 — Управление рисками информационной безопасности (ISO 27005)
- Длительность: 5 дней (40 часов)
 - Код курса: ИБ03
 - Стоимость
 - Очный формат: 392 000 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Аннотация
Основными задачами курса являются: ознакомление слушателей с современными взглядами и подходами к обеспечению информационной безопасности (ИБ), раскрытие значения рисков для успешного обеспечения информационной безопасности предприятия, пояснение основных этапов разработки и внедрения системы управления рисками ИБ, ознакомление с основными положениями ведущих мировых стандартов по ИБ.
Аудитория
Курс предназначен для руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка
Курс рассчитан на слушателей, имеющих практический опыт, как в вопросах комплексных систем ИБ, так и специализирующихся в какой-либо отдельной области обеспечения ИБ.
Знание слушателями основ современных информационных технологий желательно, но не обязательно.
Обучение по настоящему курсу рекомендуется проходить после курсов «Управление информационной безопасностью. Организация, подходы, принципы» или «Система Управления Информационной безопасностью. ИСО/МЭК 27001».
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Результаты курса
По окончанию курса слушатели смогут:
Ориентироваться:
в проблемах информационных рисков
в современных технологиях управления рисками
Выявлять актуальные угрозы, имеющиеся уязвимости и определять приоритетные направления деятельности по нейтрализации рисков у себя в компании
Обоснованно подходить к выбору необходимых средств защиты информации
Дополнительно
Каждый слушатель получает на руки презентации всех частей курса в печатном виде.В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
1. Введение в предмет «Управление рисками Информационной безопасности»
Основные информационные угрозы и атаки, уязвимости систем безопасности и условия для их возникновения. Термины и определения.
2. Основные механизмы и средства защиты ресурсов информационных систем
Идентификация и аутентификация, разграничение доступа, регистрация и аудит, контроль целостности, криптографические механизмы обеспечения конфиденциальности, целостности и аутентичности информации, контроль содержимого, обнаружение и противодействие атакам, анализ защищенности и др.
3. Значение рисков в современных системах Информационной безопасности
Принцип комплексности и системности в контексте обеспечения ИБ, его обоснование и отражение в ведущих международных стандартах по информационной безопасности. Организационные, правовые и программно-технические механизмы безопасности, их согласованное применение и критерии выбора.
4. Введение в процесс управления рисками ИБ
Понятие информационных рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления информационными рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
Понятие процесса управления рисками управления ИБ. Основные его стадии.
5. Определение уровня рисков ИБ
Анализ и оценка рисков. Идентификация и ранжирование активов, угроз, уязвимостей, возможного ущерба. Практическое вычисление уровня рисков.
6. Обработка рисков ИБ
Выбор стратегии управления рисками ИБ. Обоснование необходимых мер безопасности.
7. Обмен информацией о рисках информационной безопасности
Процедуры по обмену информацией о рисках между должностными лицами и заинтересованными сторонами.
8. Мониторинг и переоценка рисков ИБ
Построение системы контроля рисков, влияющих на них факторов и критериев их оценки.
 - ИБ04 — Аудит информационной безопасности (ISO 27001)
- Длительность: 5 дней (40 часов)
 - Код курса: ИБ04
 - Стоимость
 - Очный формат: 392 000 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Аннотация
Аудит – это ключевой момент любой Системы Менеджмента, на котором лежит ответственность за преодоление любых препятствий на всех этапах жизненного цикла Системы Менеджмента.
Настоящий курс является первым шагом на пути практического изучения деятельности аудитора информационной безопасности по стандарту ИСО/МЭК 27001.
Стандарт ИСО/МЭК 27001 является обобщением мирового опыта в организации управления информационной безопасностью и определяет общую организацию, направления планирования, использование оценки риска, оценки эффективности, контроля улучшений и т.д. в контексте информационной безопасности.
Аудитория
Курс предназначен для руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Потенциальные кандидаты:
Те, кто собирается внедрять СУИБ в соответствии с требованиями ИСО/МЭК 27001;
Консультанты по разработке и внедрению СУИБ;
Профессионалы в области IT-технологий и ISO 9001
Предварительная подготовка
Опыт работы в подразделениях информационных технологий или информационной безопасности.
Курсы «Управление информационной безопасностью. Организация, подходы, принципы» и «Система Управления Информационной Безопасностью. ИСО 27001»
Форма проведения
Обучение предусматривает проведение теоретических занятий, практическую работу в группах, а также ролевые игры. Основные занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится не менее 50% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью финального тестирования.
Результаты курса
По окончании настоящего курса слушатели смогут:
Сформировать план разработки и внедрения у себя на предприятии системы контроля эффективности информационной безопасности
Определить механизмы и подходы к проведению оценки соответствия применимым требованиям ИБ
Оценить качество выполнения работ внутренними и внешними аудиторами ИБ.
Программа курса
Программа курса включает в себя материалы из области разработки, внедрения и проведения аудита СУИБ, рассматриваются проблемы и сложности, часто встречающихся при работе по этим направлениям.
Основными разделами курса являются:
Информационная безопасность. Подходы, принципы, организация.
ИСО/МЭК27001 и ИСО/МЭК 27002 (17799)
Управление рисками информационной безопасности
Международный стандарт по проведению аудита систем управления ИСО 19011
Место аудита безопасности в процессах СУИБ
Проведение аудита по стандарту ИСО/МЭК 27001
Техника аудита по стандарту ИСО/МЭК 27001
Разработка плана
Процессы аудита
Управление командой аудиторов
Техника интервьюирования
Отчётность аудитора. Структура, формирование.
 - ИБ05 — Система управления противодействием коррупции (ISO 37001)
- Длительность: 5 дней (40 часов)
 - Код курса: ИБ05
 - Стоимость
 - Очный формат: 392 000 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
В 2016 году Международная Организация по Стандартизации ИСО выпускает новый стандарт из «семейства систем управления» — ИСО 37001 «Система управления антикоррупционными мероприятиями».
Коррупция значительно замедляет общее развитие бизнеса во многих странах и секторах экономики. Систематическое взяточничество снижает темпы экономического роста и выступает препятствием для инвестиционных потоков. Оно стимулирует рост бедности и социального неравенства. И, что самое главное, коррупцию очень трудно искоренить.
Стандарт ИСО 37001 предназначен для упрощения решения этой серьезной задачи путем использования международного опыта в области антикоррупционных инициатив. Стандартописывает «Систему Управления Противодействием Коррупции» (СУПК), определяет общую организацию, направления планирования, использование оценки рисков, оценки эффективности, контроля улучшений и т.д. в контексте борьбы со взяточничеством.Он применим для любых организаций независимо от их размера, формы собственности и области деятельности.
Настоящий курс предназначен для представления концепции антикоррупционных мероприятий, выявления преимуществ использования СУПК, пояснения ключевых требования стандарта ИСО 37001 и возможностей его использования в РК, освещения основных этапов разработки, внедрения и сопровождения СУПК.
Аудитория
Курс предназначен для лиц, которые отвечают за управление антикоррупционными мероприятиями, соблюдении в компании норм корпоративной этики, корпоративное управление, риски и обеспечение соответствие, системы управления, человеческие ресурсы, закуп, а также лиц, кто управляет бизнес-партнерами или выбирает их, особенно при работе в условиях высоких рисков взяточничества.
В число рекомендуемых должностей входят: руководители высшего и среднего звена, HR-менеджеры, юристы, риск-менеджеры и менеджеры по обеспечению соответствия, менеджеры по закупу, группы расследования внутренних нарушений, внутренние аудиторы, а также иные, которым требуется повысить уровень своей компетенции в области антикоррупционных мероприятий.
Предварительная подготовка
Фиксированных требований к предварительной подготовке слушателей нет. Однако приветствуется опыт управленческой деятельности, работы с системами управления ИСО, в подразделениях контроля, аудита и/или риск-менеджмента.
Форма проведения
Занятия курса проводятся в аудиторной форме путем сочетания лекций, практических занятий в группах и живого обсуждения. Для практических занятий не менее 60% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью ряда промежуточных и финального тестирований.
Результаты курса
По окончанию настоящего курса слушатели смогут:
оценить текущие риски взяточничества в своей организации
помочь бизнесу осознать ключевые понятия и выгоды применения СУПК
разработать и реализовать в своей организации проект по внедрению СУПК с использованием цикла PDCA
определить и реализовать процессы поддержания функционирования и непрерывного улучшения СУПК
Дополнительно
Каждый слушатель получает на руки презентации всего курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
Часть 1. Введение управление противодействием коррупции
«происхождение» стандарта ИСО 37001
История и условия возникновения Стандарта. Понятие коррупции, ее виды и проблемы борьбы.
объекты защиты и угрозы
Защищаемые активы, угроз, уязвимостей
риски АК и стратегии их обработки
Понятие, подходы и стратегии управления рисками. Факторы, определяющие риск
комплексность и системность при управлении АК
Применение принципов комплексности и системности на практике.
процессный подход в управлении СУПК
«Семейство» стандартов ИСО по системам управления. Понятие процессного подхода. История его использования и тенденции. Цикл PDCA
использование цикла PDCA в Стандарте
Соответствие разделов Стандарта циклу PDCA. Его структура и возможность интеграции с иными стандартами «семейства систем управления» ИСО
Часть 2. Разработка и внедрение Системы Управления Противодействием Коррупции
Определение контекста организации
Определение границ СУПК. Область действия, понимание потребностей заинтересованных сторон, оценка антикоррупционных рисков. Учет антикоррупционного законодательства РК.
Лидерство
Антикоррупционная политика. Организационная структура и распределение ролей СУПК.
Планирование и поддержка
Выбор стратегий и обработка антикоррупционных рисков. Выбор средств управления АК. Необходимые ресурсы, работа с персоналом, коммуникации.
Завершение внедрения СУПК
Документация СУПК. Критерии оценки средств управления АК.
Часть 3. Сопровождение и улучшение СУПК
Поддержание функционирования СУПК
Обострение проблем. Обработка событий и инцидентов СУПК (случаев взяточничества, создания условий для них). Финансовые и нефинансовые средства управления.
Оценка исполнения и улучшение СУПК
Аудит, анализ со стороны руководства. Мониторинг, измерения, анализ и оценивание. Формулирование несоответствий. Коррекция и корректирующие действия.
Сертификация СУПК
Выгоды сертификации, ее основные этапы и длительность. Участники процесса сертификации.
«Экзамен»
Оценка уровня усвоения слушателями материалов курса.
 - ИБ06 — Система управления рисками (ISO 31000)
- Длительность: 5 дней (40 часов)
 - Код курса: ИБ06
 - Стоимость
 - Очный формат: 392 000 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
Настоящий учебный курс имеет целью ознакомление слушателей с современным принятым в ИСО (Международная организация по сертификации) подходом к управлению рисками, раскрытие значения рисков для успешного функционирования инфраструктуры предприятия, пояснение основных этапов разработки и внедрения системы управления рисками, ознакомление с возможностями автоматизации процесса управления рисками.
Данный Курс разработан на основе международного стандарта ИСО 31000 «Управление рисками. Принципы и руководящие указания».
Аудитория
Курс предназначен для руководителей структурных подразделений организаций, руководителей и специалистов, отвечающих за обеспечение безопасности и/или техническую поддержку, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка
Курс рассчитан на слушателей, имеющих практический опыт, например,
в вопросах поддержки и сопровождения комплексных инфраструктурных систем,
в отдельных специализированных областях обеспечения безопасности,
стратегического планирования,
руководства организациями и отдельными структурными подразделениями
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Результаты курса
По окончании настоящего курса слушатели смогут:
Ориентироваться:в вопросах идентификации, анализа рисков и оценивания рисков
в современных технологиях обработки рисками
в вопросах разработки своих методик для оценки рисков в различных областях
Выявлять актуальные угрозы, имеющиеся уязвимости и определять приоритетные направления деятельности по нейтрализации рисков у себя в компании
Обоснованно подходить к выбору необходимых средств нейтрализации рисков
Дополнительно
Каждый слушатель получает на руки презентации всех частей курса в печатном виде.В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
1. Введение в предмет «Управление рисками»
Понятия угрозы, уязвимости, объекта защиты и воздействия на бизнес, средств нейтрализации рисков, вероятности риска и сценария инцидента. Термины и определения.
·Значение рисков в современных комплексных системах корпоративного управления
Принцип комплексности и системности управления рисками в контексте корпоративного управления, его обоснование и отражение в ведущих международных стандартах ИСО семейства систем управления. Организационные, правовые и программно-технические механизмы нейтрализации рисков, их согласованное применение и критерии выбора.
2. Введение в процесс «Управления рисками»
Понятие рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
Понятие процесса управления рисками. Основные его стадии
3. Идентификация рисков
Анализ и оценивание рисков. Идентификация и ранжирование активов, угроз, уязвимостей, возможного ущерба. Практическое вычисление уровня рисков.
4. Обработка рисков
Выбор стратегии обработки риска. Обоснование необходимых мер безопасности.
5. Обмен информацией о рисках
Процедуры по обмену информацией о рисках между должностными лицами и заинтересованными сторонами.
6. Мониторинг и переоценка рисков
Построение системы контроля рисков, влияющих на них факторов и критериев их оценки.
7. Поддержание и корректировка системы управления рисками
Разработка и внедрение цикла PDCA применительно к системе управления рисками с целью ее непрерывного совершенствования.
 - ИБ07 — Система управления непрерывностью бизнеса (ISO 22301)
- Длительность: 5 дней (40 часов)
 - Код курса: ИБ07
 - Стоимость
 - Очный формат: 392 000 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
Обеспечение бесперебойной работы – серьёзная проблема, требующая решения в каждой Компании, а управление непрерывностью бизнеса является ключевым элементом системы управления Компании, вне зависимости от её типа и масштаба, направления деятельности или отрасли экономики. Способность Компании поддерживать свои критичные операции в процессе и по завершении инцидента, также, как и скорость полного восстановления работоспособности, может стать основным фактором в решении задач целесообразности дальнейшего существования бизнеса Компании после инцидента любого масштаба.
Потребность в едином стандарте управления непрерывностью бизнеса (Business Continuity Management, BCM), основанном на передовом мировом опыте, стала причиной публикации BSI Стандарта BS 25999, определяющего высокоуровневую структуру управления непрерывностью бизнеса. В 2012 году Стандарт BS 25999 был признан международной организацией по стандартизации и приобрел статус ISO 22301.
Курс «Система управления непрерывностью бизнеса. ИСО 22301» (СУНБ) имеет целью ознакомление слушателей с современным подходом к обеспечению непрерывности бизнеса (НБ), раскрытие значения НБ для успешного осуществления деятельности предприятия, пояснение основных этапов разработки и внедрения системы управления НБ, ознакомление с моделью СУНБ, описанной в международном стандарте ИСО 22301.
Настоящий курс позволяет руководителям и специалистам, прошедшим обучение, обоснованно подойти к разработке, внедрению и поддержанию функционирования СУНБ у себя в Компании, а также (если потребуется) подготовиться к прохождению сертификации на соответствие требованиям международного стандарта ИСО 22301.
Аудитория
Курс предназначен для консультантов, руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка (желательно)
Любые курсы по стандартам из «семейства» систем управления: управление качеством (ИСО 9001), энергосбережением (ИСО 50000), информационной безопасностью (ИСО 27001), экологической безопасностью (ИСО 14001), ИТ-сервисами (ИСО 20000) и т.п.
Опыт работы на руководящих должностях.
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью входного и финального тестирования.
Результаты курса
По окончании настоящего курса слушатели смогут:
Сформировать план разработки и внедрения СУНБ у себя на предприятииОпределить механизмы и подходы к учету бизнес-потребностей организации в процессах обеспечения НБ
Оценивать риски НБ, создавать свои методики оценки рисков
Обоснованно подходить к выбору механизмов и средств поддержания требуемого уровня непрерывности бизнеса
Организовать работу внутренних аудиторов. Оценивать качество выполнения работ как внутренними, так и внешними аудиторами НБ.
Дополнительно
Каждый слушатель получает на руки презентации всего курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
Модуль 1. Знакомство со стандартом ИСО 22301 (далее Стандарт)
Аспекты проблем непрерывности бизнеса
Основные задачи и принципы управления непрерывностью бизнеса. Преимущества для бизнеса от внедрения СУНБ. Основные препятствия и факторы успеха для СУНБ в РК.
Непрерывность бизнеса и стратегия развития Компании
Понятие анализа внутреннего и внешнего контекста Компании. Учет НБ в планах развития Компании. Основные роли и функции СУНБ.
Основные понятия и термины в области непрерывности бизнеса
Термины и определения Стандарта, его структура. Сопутствующие документы и стандарты. Механизм их взаимодействия и применения. Взаимосвязь с иными стандартами ИСО из «семейства» систем управления.
Жизненный цикл СУНБ
Модель PDCA в применении к НБ.
Инциденты, непрерывность бизнеса, восстановления
Соотношение понятий. Структура планов и механизмов функционирования.
Модуль 2. Разработка и внедрение системы управления непрерывностью бизнеса
Определение области действия и разработка политики СУНБ
Входные данные. Требования к области действия и политике НБ. Их место в структуре документации Компании в общем и документации НБ в частности.
Анализ Компании
Понимание потребностей Компании. Этапы процесса анализа.
Стратегия и планирование НБ
Входные данные, Построение процессов НБ.
Разработка планов
Планы управления инцидентами (IMP). Планы обеспечения НБ (BCP). Планы восстановления (DRP).
Обучение в области НБ для сотрудников Компании
Описание процесса. Подходы и методы.
Непрерывное улучшение и корректировка СУНБ
Входные данные. Инициация улучшения. Коррекция, корректирующие и превентивные действия.
Завершение внедрения СУНБ
Документация СУНБ. Записи СУНБ. Механизмы анализа и пересмотра СУНБ.
Модуль 3. Обеспечение и контроль функционирования СУНБ
Понятие контроля СУНБ
Необходимость контроля его виды, цели, задачи.
Подготовка к аудиту и его проведение.
Планирование аудита. Подготовка аудитора. Документы. Сбор свидетельств. Техника проведения аудита. Ведение записей. Формулирование несоответствий.
Завершение аудита
Общий отчет. Заключительное совещание.
Сертификация на соответствие требованиям Стандарта
Международная и национальная системы сертификации. Особенности и преимущества сертификации СУНБ. Основные этапы сертификационного процесса, его сроки и ориентировочная стоимость.
 - ИБ08 — Управление инцидентами информационной безопасности (ISO 27035)
- Длительность: 3 дня (24 часа)
 - Код курса: ИБ08
 - Стоимость
 - Очный формат: 299 500 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Продолжительность:
3 дн 24 ак.часа, при условии предварительного прохождения курса: Система управления информационной безопасностью (ISO 27001)
Без предварительной подготовки: 5 дн 40 ак. часовОписание курса:
Курс «Управление инцидентами информационной безопасности, ISO 27035, нацелен на ознакомление слушателей с основными подходами и фазами процесса управления инцидентами информационной безопасности (ИБ).
В настоящее время данный курс адаптирован к действующей международной версии стандарта: ISO 27035:2016.
Стандарт ISO 27035 является обобщением мирового опыта в организации управления инцидентами ИБ и содержит лучшие практики по следующим видам деятельности в отношении инцидентов ИБ: выявление, оповещение, оценка, реагирование, а также извлечение уроков.
Настоящий курс позволяет руководителям и специалистам, прошедшим обучение, разработать и внедрить процесс управления ИБ в рамках действующей (разрабатываемой) Системы Управления Информационной Безопасности, соответствующей международному стандарту ISO 27001.Аудитория:
Курс предназначен для руководителей проектов по внедрению СУИБ, руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений ИБ и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка (желательно):
Курсы «Основы по управлению информационной безопасностью.» и/или «Система управления информационной безопасностью (ISO 27001)».
Опыт работы в подразделениях информационных технологий и/или информационной безопасности приветствуется.Формат проведения:
Занятия проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 80% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью финального тестирования.По окончании настоящего курса слушатели будут уметь:
Формировать план разработки и внедрения процесса управления инцидентами ИБ у себя на предприятии
Адаптировать рекомендации Стандарта к своей организации в зависимости от ее типа, размера и видов деятельности
Интегрировать процесс управления инцидентами ИБ с процессами оценки рисков и контроля ИБ
Оценить степень зрелости существующего в организации процесса управления инцидентами ИБ
Выполнить вышеприведенные работы для предприятий-заказчиков в рамках аутсорсинговых сервисовДополнительно:
Каждый слушатель получает на руки презентацию курса в распечатанном виде.
В случае успешного завершения обучения слушателям выдаются сертификаты.Программа курса:
Часть 1. Введение в управление информационной безопасностью.
Информация, информационная безопасность и защита информации
Определение ИБ, виды информации, соотношение понятий ИБ и ЗИ
Объекты защиты и угрозыВиды классификаций активов, угроз, уязвимостей
Основные термины и определения ИБ
Риски ИБ и стратегии их обработки
Понятие, подходы и стратегии управления рисками. Факторы, определяющие риск
Комплексность и системность при управлении ИБ
Применение принципов комплексности и системности на практике.
Процессный подход в управлении ИБ
«СемействоЭ стандартов ISO по системам управления. Понятие процессного подхода.История его использования и тенденции.
Назначение стандартов ISO 27001 и ISO 27002
Механизм взаимодействия и применения стандартов. Их структура. Термины и определения.Часть 2. Структурированный подход к реализации процесса управления инцидентами информационной безопасности.
Основные концепции и принципы процесса
Цели процесса
Определение границ. Концепция и политика, методы их формирования.
Структурирование процесса и его преимущества
Классификация и категорирование инцидентов ИБ. Жизненный цикл PDCA в отношении процесса. Основные операции, их последовательность. Критерии и оценка их исполнения.
Интеграция с процессами оценки рисков и контроля ИБ
Критерии оценки процессов и их операций. Совместное планирование процессов. Синергетический эффект интеграции и его оценка.Часть 3. Реализация процесса управления инцидентами информационной безопасности.
Документация процесса
Структура документации. Обязательные документы, их назначение.
Поэтапная реализация процесса
Этапы разработки и планирования, выявления и оповещения, оценки и принятия решений, реагирования, извлечения уроков.
Управление инцидентами и процессы расследование
Записи, их формирование и защита. Законодательная база, национальная и международная.
Управление инцидентами и анализ воздействия на бизнес
Учет результатов процесса управления инцидентами в процессе анализа воздействия на бизнес (BIA) организации. Варианты представления результатов инцидентов для высшего руководства организации
«Экзамен» — обсуждение результатов обучения и оценка уровня усвоения слушателями материалов курса. - ИБ09 — Анализ корневых причин
- Длительность: 2 дня (16 часов)
 - Код курса: ИБ09
 - Стоимость
 - Очный формат: 252 500 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Описание курса:
Курс «Анализ корневых причин» имеет целью ознакомление слушателей с основными подходами к установлению и выбору корневых причин существующих проблем.
Настоящий курс разработан в рамках программ специализированного продолженного обучения в таких областях, как управление рисками, расследование инцидентов, проведение аудита, целеполагание и пр.
Курс применим к специалистам любого профиля, независимо от сферы их деятельности: безопасность (любая), корпоративное управление, охрана труда, управление качеством, расследование, планирование и пр.
В рамках курса разбирается ряд рабочих методик, на практику отводится до 90% учебного времени. В связи с этим обучение проводится только в очной аудиторной форме.Результаты курса
Настоящий курс позволяет слушателям, прошедшим обучение:
принципиально повысить уровень аналитической обработки информации в своей области;
упростить процессы идентификации проблем и путей их решения;
существенно снизить затраты на устранение проблем и их причин;
повысить уверенность в том, что снятые проблемы не проявятся повторно в будущем;
обосновать свои решения и предложения перед вышестоящим руководством;
обучить освоенным техникам своих подчиненных и коллег.Аудитория курса:
Курс предназначен в первую очередь для руководителей любого уровня, а также специалистов в области аналитики, рисков, аудита и/или инцидентов.
Предварительные требования к аудитории:
Практические навыки в какой-либо из следующих областей:
управление подразделением/компанией,
проведение анализа данных,
управление рисками,
обработка инцидентов,
проведение и/или сопровождение аудитаФорма проведения
Занятия курса проводятся в форме семинаров. Краткие теоретические блоки используются только как вступительная часть перед практической отработкой. Практика курса построена на групповой работе с последующим общим разбором и нарастанием сложности заданий.
Дополнительно
Каждый слушатель получает на руки презентацию всего курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.Содержание курса:
Оценка входного уровня слушателей
1. Введение в аналитическую обработку информации
Что такое аналитика и ее значимость в современном корпоративном управлении
Корпоративное управление и процессный подход
Основные этапы процессов аудита, управления рисками, инцидентами
Основные виды аналитической обработки информации2. Причинно-следственная методика
Ознакомление с методикой
Практическая отработка методики3. Структурно-причинная методика
Ознакомление с методикой
Практическая отработка методики4. Комплексная методика
Ознакомление с методикой
Практическая отработка методики
Подведение итогов
Оценка выходного уровня слушателей - ИБ10 — Система управления сервисами. ISO/IEC 20000
- Длительность: 5 дней (40 часов)
 - Код курса: ИБ10
 - Стоимость
 - Очный формат: 392 000 ₸
 - Онлайн формат: Не проводится (только очный формат)
 
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
Курс «Система управления сервисами. ISO/IEC 20000» имеет целью ознакомление слушателей с современным подходом к управлению предоставляемыми или закупаемыми сервисами, раскрытие значимости управления сервисами, подходами к обоснованию инициатив в этой области, пояснение основных этапов разработки и внедрения системы управления сервисами.
В настоящее время курс адаптирован к действующей версии международного стандарта ISO/IEC 20000-1:2018. Данный стандарт призван помочь организации в создании и эффективном использовании Системы Управления Сервисами (СУС), для чего в нем определяются требования к ее внедрению, поддержанию, оцениванию и улучшению. При этом оцениваются возможности организации по удовлетворению потребностей пользователей (как внутренних, так и внешних) с учетом особенностей бизнеса.
Данный стандарт входит в т.н. «семейство» стандартов ИСО в отношении систем управления. Он способствует внедрению процессного подхода и стратегии жизненного цикла услуг в организации с целью обеспечения актуальности и повышения ценности предоставляемых или потребляемых сервисов.
Изначально стандарт ISO/IEC 20000 был разработан для управления ИТ-услугами. Однако заложенные в нем системные принципы и требования, как оказалось, также могут эффективно использоваться для управления любыми иными (внутренними или внешними) сервисами организации: транспорт, консалтинг, сопровождение, разработка, экспертиза, обучение и пр.Аудитория
Курс ориентирован на сотрудников, ответственных за разработку и внедрение СУС как в компании в целом, так и непосредственно в своих бизнес-процессах.
Также курс будет полезен для руководителей и сотрудников подразделений организаций, занятых в области ИТ, информационной безопасности, поддержания и обеспечения качества предоставляемых сервисов, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.Предварительная подготовка
Курс рассчитан на персонал любого уровня, которому необходимо знакомство с стандартом ISO/IEC 20000 и процессом аудита в соответствии с ним.
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Результаты курса
По окончании настоящего курса слушатели смогут:
Сформировать план разработки и внедрения СУC у себя в организации
Определить механизмы и подходы к управлению актуальных для сервисов рисков
Обоснованно подходить к выбору механизмов контроля требуемого уровня сервисов
Интегрировать СУС с иными системами управления у себя в компании (СМК, СУИБ, СУНБ и пр.)
Оценить качество выполнения работ внутренними и внешними аудиторами СУС.Дополнительно
Каждый слушатель получает на руки презентации всех частей курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.Программа курса
Модуль «Внедрение СУС»
Введение в предмет «Управление сервисами»
Процессный подход в управлении сервисами
Разработка плана внедрения СУС
Управление рисками и возможностями в рамках СУС
Структура документация СУСМодуль «Функционирование СУС»
Планирование сервисов, управление активами, конфигурацией
Управление бизнес-отношениями, уровнем обслуживания, поставщиками
Бюджетирование и учет, управление спросом, мощностями,
Проектирование, выпуск и развертывание, управление изменениями
Управление инцидентами, запросами, проблемами
Управление доступностью, непрерывностью, информационной безопасностьюМодуль «Оценивание и улучшение СУС»
Внутренний аудит СУС: подход, планирование, проведение, оценка результатов, документация
Анализ СУС со стороны руководства
Обработка несоответствий и проблем, коррекция и корректирующие действия, возможности для улучшенияМодуль «Что дальше?»
Интеграция СУС с иными «родственными» системами управления
Сертификация СУС и персонала
Экзамен 
Информационная безопасность
- CYAA — Базовый курс по информационной безопасности “Cybersecurity Awareness”
- Длительность: 3 дня (24 часа)
 - Код курса: CYAA
 - Стоимость
 - Очный формат: Только в корпоративном формате, цена по запросу
 - Онлайн формат: 218 000 ₸
 
Описание курса
Описание курса:
Материал данного курса состоит из множества модулей, которые позволят слушателям познакомиться с актуальными проблемами кибербезопасности и научиться противостоять угрозам кибератак и мошенников, а также контролировать персональную информацию, которую они «выкладывают» в сеть.
Аудитория курса:
Сотрудники компаний любой квалификации.
Содержание курса:
Направление 1 – Что такое кибербезопасность.
Кибератаки и хакеры.
Кто такие хакеры.
Источники киберугроз.
Опасности социальной инженерии.Методы защиты от кибератак.
Ваша роль в обеспечении кибербезопасности.
Средства защиты от киберугроз на персональных устройствах.
Средства защиты от киберугроз на корпоративных устройствах.Направление 2 – Защита персональных устройств.
Обновления.
Зачем нужны обновления.
Могут ли обновления нести угрозу.
Как правильно обновляться.Антивирус.
Что такое антивирус и зачем он нужен.
Лучше ли один антивирус другого.
Как использовать антивирус.USB-флешки.
Какие угрозы несут USB-флешки.
Как правильно пользоваться USB-флешками.
Как проверять файлы на USB-флешках.Резервные копии.
Зачем нужны резервные копии.
Как создавать резервные копии.Мобильные устройства.
Какие угрозы несут мобильные устройства.
Клоны SIM-карт и защита от них.Данные на персональных устройствах.
Использование VPN.
Защита персональных устройств в поездках.Направление 3 – Безопасность в Интернете.
Защита E-mail.
Что такое спам.
Как сообщить о спаме.
Что такое фишинг.
Как сообщить о фишинге через Outlook.
Как сообщить о фишинге через Google Chrome.
Переписка с руководством компании.
Что делать с вложениями в электронные письма.Безопасность браузера.
Как безопасно искать информацию в интернете.
Скачивание файлов из интернета.
Ссылки в интернете.Безопасность мессенджеров.
Безопасность переписки в мессенджерах.
Как безопасно отправить свои и чужие контакты.
Безопасный обмен файлами в мессенджерах.Информация в интернете.
Как распознать Deep Fake’и, созданные ИИ.
Как проверять информацию в интернете.Направление 4 – Защита частной информации.
Защита информации в социальных сетях.
Как информация о вас может быть использована против вас.
«Романтические» знакомства через соц. сети.Защита от мошенников.
Как распознать мошенника при звонке или смс.
Что такое программы-вымогатели.
Как защититься от программ-вымогателей.Использование паролей.
Как правильно создавать пароли.
Как правильно использовать пароли.Безопасность банковских операций.
Как безопасно использовать банковские карты.
Как безопасно пользоваться платёжными системами.Направление 5 – Безопасность Wi-Fi.
Настройки Wi-Fi сети.
Как настроить безопасный доступ к Wi-Fi.Wi-Fi оборудование.
Можно ли пользоваться открытым Wi-Fi.Направление 6 – Корпоративная безопасность.
Организация безопасной работы.
Безопасность при удаленной работе.
Как пользоваться персональными устройствами на работе.
Кибербезопасность SCADA.Безопасное использование инструментов ИИ.
Проблемы кибербезопасности при использовании ИИ и МО.
Безопасность при подготовке данных для инструментов ИИ и МО.
Защита данных от изменений злоумышленниками.
Безопасность при объединении нескольких инструментов ИИ и МО.
Защита интеллектуальной собственности от кражи при её использовании ИИ и МО.
Проблемы приватности при использовании ИИ и МО.
Соблюдение принципов приватности при использовании ИИ и МО.
Проблемы этичности при использовании ИИ.Политики безопасности в компании.
Что такое политики безопасности.
Как применять политики безопасности при работе.
Как взаимодействовать со службой безопасности.Инциденты кибербезопасности.
Признаки кибератаки.
Как сообщить о подозрительной активности.
Что делать при, если вы стали жертвой кебератаки.Внутренняя безопасность.
Ситуация конфликта интересов.
Утечка корпоративных данных.
Интеллектуальная собственность.
Как правильно уничтожить данные.
Инсайдерские угрозы.
Взятки и коррупция.Направление 7 – Кибербезопасность для топ-менеджмента.
Сколько стоит кибербезопасность.
Что такое риски кибербезопасности и сколько они «стоят».
Как оценивать продукты и услуги кибербезопасности.
Как принимать решения на основании данных кибербезопасности.
Насколько эффективна ваша кибербезопасность.Роль топ-менеджмента в обеспечении кибербезопасности.
Угрозы, направленные на руководство компании.
Проблемы социальной инженирии в руководстве компании.
Поддержка и развитие инициатив кибербезопасности. Требования регуляторов.
Какие регуляторы действуют на территории РК и РФ.
Требования регуляторов и издержки по их обеспечению. - CISSP — Certified Information Systems Security Professional Base
- Длительность: 5 дней (40 часов)
 - Код курса: CISSP
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Описание курса:
Данный курс предназначен для специалистов в области информационной безопасности, и помогает основательно проверить теоретические знания по информационной безопасности, а также дает хорошую базу для развития профессиональных навыков в будущем. Также курс помогает подготовиться к сдаче экзамена на получение престижной вендор-независимой сертификации в области информационной безопасности CISSP (Certified Information Systems Security Professional), учитывая, что контент данного курса покрывает все 8 доменов CISSP CBK.
Программа курса:
1. Безопасность и управление рисками
1.1. Концепция конфиденциальности, целостности и доступности
1.2. Принципы управления безопасностью
1.3. Соответствие требованиям
1.4. Нормативные вопросы
1.5. Профессиональная этика
1.6. Политики безопасности, стандарты и процедуры2. Безопасность активов (защита безопасности активов)
2.1. Классификация информации и активов
2.2. Владение
2.3. Защита конфиденциальности
2.4. Элементы управления безопасностью данных
2.5. Требования к обработке3. Инжиниринг безопасности
3.1. Процессы инжиниринга и проектирование защищенной инфраструктуры
3.2. Концептуальные концепции безопасности
3.3. Модели оценки безопасности
3.4. Возможности безопасности информационных систем
3.5. Архитектуры безопасности, проектирование и уязвимости элементов решений
3.6. Уязвимости веб-систем
3.7. Уязвимости мобильных систем
3.8. Встраиваемые устройства и уязвимости в кибер-физических системах
3.9. Криптография
3.10. Принципы проектирования безопасности объектов
3.11. Физическая охрана4. Сетевая и телекоммуникационная безопасность
4.1. Проектирование защищенной сетевой архитектуры
4.2. Компоненты сетевой безопасности
4.3. Защита каналов связи
4.4. Сетевые атаки5. Управление доступом
5.1. Управление физическими и логическими ресурсами
5.2. Идентификация и аутентификация людей и устройств
5.3. Идентификация как сервис
5.4. Сторонние службы идентификации
5.5. Атаки на управление доступом
5.6. Жизненный цикл управления доступом6. Оценка и тестирование безопасности
6.1. Стратегии оценки и тестирования
6.2. Данные процесса безопасности
6.3. Тестирование контроля безопасности
6.4. Обработка данных тестирования
6.5. Уязвимости архитектуры безопасности7. Операционное управление безопасностью
7.1. Поддержка расследований и требования
7.2. Деятельность по ведению журнала и мониторингу
7.3. Выделение ресурсов
7.4. Основные концепции операционной безопасности
7.5. Методы защиты ресурсов
7.6. Управление инцидентами
7.7. Превентивные меры
7.8. Управление патчами и уязвимостями
7.9. Процессы управления изменениями
7.10. Стратегии восстановления
7.11. Процессы и планирование аварийного восстановления
7.12. Планирование непрерывности бизнеса
7.13. Физическая безопасность
7.14. Безопасность персонала8. Безопасность разработки программного обеспечения
8.1. Безопасность в жизненном цикле разработки программного обеспечения
8.2. Средства контроля безопасности среды разработки
8.3. Эффективность обеспечения безопасности программного обеспечения
8.4. Влияние безопасности на процессы разработки программного обеспечения - CEH — Этичный хакинг: тестирование на проникновение (v.13)
- Длительность: 5 дней (40 часов)
 - Код курса: CEH
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Цель курса
Дать слушателям знания и навыки для формирования системного подхода к обеспечению компьютерной безопасности, научить методам проверки безопасности различных узлов компьютерной сети и познакомить слушателей с инструментарием злоумышленников, с их преимуществами и ограничениями.
Аудитория
Этот курс предоставляет развернутые знания по обеспечению компьютерной безопасности современных систем и будет важен администраторам безопасности в качестве справочника по различным методам и средствам взлома компьютерных сетей и систем. Также курс полезен сотрудникам службы безопасности для повышения эффективности работы с учетом новых уловок злоумышленников, и бесспорно данный курс будет интересен руководителям отделов ИТ для формирования реалистичной оценки современной ситуации в сфере обеспечения компьютерной безопасности. Кроме того, курс полезен специалистам в сфере безопасности в качестве подготовки к получению международной сертификации.
По окончании курса слушатели смогут:
Понимать взаимосвязь компонентов безопасности сети, сферу ответственности и влияния каждого из узлов;
Знать и управлять уязвимыми местами сети;
Самостоятельно обнаруживать уязвимости;
Работать с инструментами взлома сетей и систем;
Знать хакерские уловки для проникновения в системы и сети;
Проводить тестирование любых компонентов сети на предмет взлома;
Классифицировать рабочие станции по степени риска проведения атаки;
Понимать ход мыслей злоумышленника;
Оценить масштаб потенциально возможных атак;
Противодействовать несанкционированному сбору информации о сети организации;
Понимать стратегию злоумышленника;
Оценивать защищенность платформ виртуализации и облачных вычислений;
Определять атаку на основе социальной инженерии;
Изучить методы взлома беспроводной сети;
Определить наиболее уязвимые места мобильных платформ;
Противодействовать криптографическим атакам;
Понимать процесс вторжения в систему;
Проводить аудит систем безопасности;
Противодействовать вторжению.Сертификационные экзамены
Курс помогает подготовиться к следующим сертификационным экзаменам:
312-50: Certified Ethical HackerНеобходимая подготовка
Для эффективного обучения на курсе слушатели должны обладать следующими знаниями и навыками:
Опыт работы с клиентским и серверными ОС;
Понимание работы сети и сетевых устройств;
Понимание базовых концепций безопасности.Материалы слушателя
Слушателям предоставляется фирменное учебное пособие и руководство по проведению лабораторных работ (в электронном виде), а также прочие материалы и программное обеспечение, необходимые для выполнения этих работ.
Содержание курса
Модуль 1: Введение в этичный хакинг
Обзор концепций информационной безопасности
Угрозы информационной безопасности и векторы атак
Концепции хакинга
Этапы хакинга
Типы атак
Управление обеспечением информационной безопасности (ИБ) предприятия
Модель угроз ИБ
Политики, процедуры и процессы обеспечения ИБ
Методы оценки защищенности — аудит, анализ уязвимостей и тестирование на проникновение
Планирование и проведение тестирования на проникновение
Законодательство и стандарты в области ИБ
Лабораторная работа:
Подготовка тестовой среды;Модуль 2: Предварительный сбор информации о цели
Концепции изучения целевой системы
Угрозы утечки информации об информационной системе организации
Методологии сбора информации из открытых источников
Средства сбора информации
Меры противодействия утечкам информации
Тестирование на предмет получения информации об информационной системе организации
Лабораторная работа:
Сбор информации об Интернет-ресурсах исследуемой организации;
Получение данных об инфраструктуре сети и используемых технологиях;
Анализ публичных сайтов организации;Модуль 3: Сканирование сети
Обзор возможностей сканирования сети
Методология сканирования
Техники обнаружения открытых портов
Техника скрытого сканирования
Техники уклонения от систем обнаружения вторжений
Анализ баннеров
Сканирование уязвимостей
Построение диаграмм топологии сети
Подготовка прокси
Техники туннелирования
Анонимайзеры
Спуфинг IP адреса и меры противодействия
Сканирование сети как этап тестирования на проникновение
Лабораторная работа:
Мониторинг TCP/IP соединения;
Сканирование портов;
Построение топологии сети;Модуль 4: Инвентаризация ресурсов
Концепции инвентаризации
Инвентаризация NetBIOS
Инвентаризация SNMP
Инвентаризация LDAP
Инвентаризация NTP
Инвентаризация SMTP
Инвентаризация DNS
Меры противодействия инвентаризации
Инвентаризации ресурсов как этап тестирования на проникновение
Лабораторная работа:
Инвентаризация целевой сети;
Получение доступа на основе стандартных паролей;Модуль 5: Хакинг системы
Цели взлома системы
Методология взлома системы
Последовательность хакинга системы
Взлом паролей
Повышение привилегий
Выполнение приложений
Сокрытие файлов
Сокрытие следов
Тестирование на предмет взлома системы
Лабораторная работа:
Взлом базы паролей и получение прав администратора;
Сокрытие информации в NTFS;
Использование стеганографии;Модуль 6: Вредоносный код
Классификация вредоносного ПО — трояны, вирусы и черви
Пути проникновения вредоносного ПО
Методы и средства анализа вредоносного ПО
Методы обнаружения вредоносного ПО
Меры противодействия и средства защиты
Тестирование на предмет запуска вредоносных программ
Лабораторная работа:
Создание трояна;
Создание червя;
Выявление и деактивация трояна;Модуль 7: Снифферы
Концепции сниффинга
MAC атаки
DHCP атаки
ARP атаки
Спуфинг адресов
Отравление кэша DNS
Инструменты сниффинга
Меры противодействия сниффингу
Лабораторная работа:;
Подмена MAC-адресов;
MITM-атака через отравление таблиц ARP;
Использование анализаторов трафика;Модуль 8: Социальная инженерия
Концепции социальной инженерии
Методы и техники социальной инженерии
Подмена личности в социальных сетях
Кража персональных данных
Меры противодействия социальной инженерии
Тестирование на предмет противодействия социальной инженерии
Лабораторная работа:
Фишинговые технологии;Модуль 9: Отказ в обслуживании
Концепции атак на доступность системы (отказ в обслуживании, Denial-of-Service)
Распределенный отказ в обслуживании (DDoS атака)
Методы и средства организации DoS/DDoS атак
Бот-сети
Изучение примера реализация DDoS атаки
Инструменты проведения DoS атак
Меры противодействия DoS атакам
Инструменты защиты от DoS
Тестирование на предмет устойчивости к DoS атакам
Лабораторная работа:
Проведение простейших DoS атак — SYN- и HTTP-flood, slowloris;
Обнаружение DoS путем анализа трафика;Модуль 10: Перехват сесии
Концепции перехвата сессии
Типы и методы перехвата сессий
Перехват на прикладном уровне
Перехват на сетевом уровне
Инструменты для перехвата сессий
Меры противодействия перехвату сессий
Оценка возможности перехвата сессии ка этап тестирования на проникновение
Лабораторная работа:
Перехват сессии на уровне приложения;Модуль 11: Хакинг веб-серверов
Концепции веб-серверов
Типы атак на веб-серверы
Методология атак
Инструменты взлома веб-серверов
Меры противодействия взлому веб-серверов
Управление исправлениями
Повышение безопасности веб-серверов
Управление патчами
Тестирование на предмет взлома веб-сервера
Лабораторная работа:
Изучение веб-сервера;
Взлом веб-сервера;
Использование уязвимости браузера;Модуль 12: Хакинг веб-приложений
Концепции веб-приложений
Угрозы веб-приложениям
Методология атаки на веб-приложения
Инструменты взлома веб-приложений
Меры противодействия взлому веб-приложений
Инструменты защиты веб-приложений
Тестирование на предмет взлома веб-сервера
Лабораторная работа:
Взлом веб-приложений;
Тестирование веб-приложений на предмет взлома;Модуль 13: SQL инъекции
Концепции SQL инъекции
Тестирование на SQL возможность инъекции
Типы SQL инъекций
Слепая SQL инъекция
Методология SQL инъекции
Примеры применения SQL инъекции
Средства для выполнения SQL инъекции
Сокрытие SQL инъекции от IDS
Меры противодействия SQL инъекции
Лабораторная работа:
SQL инъекция;
Тестирование с использованием SQL инъекции;Модуль 14: Хакинг беспроводных сетей
Концепции построения беспроводных сетей
Шифрование в беспроводных сетях
Угрозы беспроводным сетям
Методология взлома беспроводных сетей
Основные этапы атаки на беспроводную сеть
Получение несанкционированногог доступа к беспроводной сети
Инструменты хакинга беспроводных сетей
Взлом Bluetooth
Меры противодействия атакам на беспроводные сети
Инструменты защиты беспроводных сетей
Тестирование беспроводной сети на проникновение
Лабораторная работа:
Обнаружение беспроводных устройств;
Взлом беспроводной сети;Модуль 15: Хакинг мобильных платформ
Векторы атаки на мобильные платформы
Взлом Android OS
Техники и инструменты получения прав администратора Android
Взлом iOS
Техники и инструменты джейлбрейка
Взлом Windows Phone OS
Уязвимости Windows Phone 8
Взлом BlackBerry
Атаки на телефоны BlackBerry
Управление мобильными устройствами и современные MDM-решения
Инструменты и рекомендации по защите мобильных устройств
Тестирование на проникновение в мобильные платформы
Лабораторная работа:
Взлом мобильной ОС Android с помощью Metasploit Framework;
Средства защиты ОС Android;Модуль 16: Обход систем обнаружения вторжений, брандмауэры и Honey Pot
Концепции IDS, брандмауэра и Honey Pot
Системы IDS, брандмауэра и Honey Pot
Уклонение от IDS
Обход брандмауэра
Обнаружение Honey Pot
Инструменты обхода брандмауэра
Противодействие обходу систем обнаружения
Тестирование системы на предмет обхода системы обнаружения вторжений и брандмауэра
Лабораторная работа:
Конфигурирование IDS;
Обход брандмауэра;Модуль 17: Облачные вычисления
Концепции облачных вычислений
Основные угрозы ИБ при использовании облачных вычислений
Атаки на среду виртуализации и облачные платформы
Обеспечение безопасности вычислительных облаков
Методы и средства защиты облачной инфраструктуры
Тестирование облачных приложений на проникновение
Лабораторная работа:
Исследование работы платформ wamp и ownCloud;
Атака на облачную среду с использованием уязвимости в Java;
Автоматизированный анализ уязвимостей облачной среды;Модуль 18: Криптография
Концепции криптографии
Алгоритмы шифрования
Криптографические средства
Инфраструктура публичных ключей
Шифрование почты
Шифрование диска
Криптографические атаки
Средства крипто анализа
Лабораторная работа:
Работа со средствами криптографии; - CHFI — Расследование инцидентов компьютерной безопасности (v.9)
- Длительность: 5 дней (40 часов)
 - Код курса: CHFI
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Цель курса
Дать слушателям знания и навыки работы с ключевыми методиками обнаружения компьютерных преступлений как в локальной сети, так и при взаимодействии в сети Интернет с мобильными клиентами и облачными сервисами. Также в курсе широко представлены программные продукты по сбору и восстановлению информации, свидетельствующей о вторжении в систему.
Аудитория
Этот курс предоставляет развернутые знания по анализу безопасности современных компьютерных сетей и будет полезен всем заинтересованным ИТ-специалистам, в том числе сетевым и системным администраторам и ИТ-руководителям. Курс будет интересен сотрудникам службы информационной безопасности, сотрудникам правоохранительных органов и военным представителям, связанным с расследованием вторжений в компьютерные сети. Кроме того, курс полезен специалистам в сфере безопасности в качестве подготовки к получению международной сертификации.
По окончании курса слушатели смогут:
Самостоятельно обнаруживать вторжения в ОС, веб-приложения, мобильные устройства и облачные сервисы;
Использовать проверенные методы обнаружения вторжений;
Собирать доказательную базу для подтверждения вторжения;
Использовать специализированные инструменты для анализа вторжений;
Анализировать потоки текстового, графического или медиа трафика на предмет наличия закладок;
Проводить анализ систем хранения для обнаружения следов вторжения;
Восстанавливать и анализировать состояние постоянной(энергонезависимой) и оперативной(энергозависимой) памяти из ОС Windows, Mac и Linux;
Восстанавливать удалённые файлы и разделы в Windows, Mac и Linux;
Анализировать состояние систем на предмет атак инсайдеров;
Применять технику обратного инжиниринга для анализа атакующего кода;
Обнаруживать взлом (или попытку взлома) запароленных файлов;
Извлекать и анализировать журналы прокси-серверов, брандмауэров, систем обнаружения/предотвращения вторжений, рабочих станций, серверов, коммутаторов, маршрутизаторов, контроллеров домена, DNS и DHCP серверов, систем управления доступом и других устройств;
Выполнять необходимые мероприятия для передачи доказательств в правоохранительные органы.Сертификационные экзамены
Курс помогает подготовиться к следующим сертификационным экзаменам:
312-49: Computer Hacking Forensic InvestigatorНеобходимая подготовка
Для эффективного обучения на курсе слушатели должны обладать следующими знаниями и навыками:
Опыт работы с клиентским и серверными ОС;
Понимание работы сети и сетевых устройств;
Понимание базовых концепций безопасности;
Курсы CEH и CND или эквивалентные знания и навыки.
Материалы слушателя
Слушателям предоставляется фирменное учебное пособие и руководство по проведению лабораторных работ (в электронном виде) а также прочие материалы и программное обеспечение, необходимые для выполнения этих работ.Модуль 1: Расследование инцидентов ИБ в современном мире
Определение компьютерных угроз
Классификация кибер-атак
Вызовы для исследователей кибер-преступлений
Типы кибер-атак и основные правила расследования
Правила сбора доказательств и основные типы цифровых улик
Оценка готовности к рассмотрению инцидента и план действий
Сфера деятельности исследователей инцидентов компьютерной безопасности и сфера ответственности
Обзор юридических, этических и конфиденциальных вопросов при расследовании инцидентаМодуль 2: Процесс расследования инцидента ИБ
Процесс расследования инцидента ИБ
Этапы процесса расследования инцидента ИБ
Требования к лабораторной среде и команде исследователей инцидента
Программное обеспечение для исследования
Задачи первых исследователей инцидента ИБ
Поиск улик и сбор доказательств
Размещение и хранение доказательств
Дедупликация данных, восстановление удалённых данных и проверка доказательств
Написание отчёта
Лабораторная работа:
Восстановление данных с помощью EasyUS Data Recovery Wizard;
Использование HashCalc для вычисления хэша, контрольной суммы или HMAC;
Использование MD5 Calculator;
Просмотр файлов различных форматов через File Viewer;
Обнаружение следов работы с данными с помощью P2 Commander;
Создание образа раздела с помощью R-Drive Image.Модуль 3: Сбор доказательств с дисков и файловых систем
Классификация средств обеспечения безопасности компьютерных сетей
Методы и средства контроля доступа
Методы и средства аутентификации, авторизации и аудита доступа
Краткий обзор основных методов криптографической защиты информации
Основные классы технических и программных средств защиты компьютерных сетей и принципы их работы
Сетевые протоколы, предназначенные для обеспечения безопасности, и принципы их работы
Лабораторная работа:
Обнаружение удалённых файлов с помощью WinHex;
Анализ файловых систем с помощью The Sleuth Kit;
Анализ Raw-изображений с помощью Autopsy.Модуль 4: Расследование инцидентов, связанных с операционной системой
Способы получения данных
Получение текущих данных
Поучение статических данных
Дупликация данных
Блокировка изменения устройств
Методы и средства получения данных
Получение данных в Windows и Linux
Лабораторная работа:
Исследование NTFS раздела с помощью DiskExplorer for NTFS;
Просмотр графического контента с помощью FTK Imager Tool.Модуль 5: Противодействие методам сокрытия доказательств
Противодействие методам сокрытия доказательств и цели противодействия
Обзор техник противодействия методам сокрытия доказательств
Извлечение доказательств с удалённых файлов и разделов, файлы с парольной защитой и стеганография
Запутывание кода, зачистка артефактов, перезапись данных/метаданных и шифрование
Методы обнаружения протоколов шифрования, упаковщиков программ и руткитов
Контр-меры по противодействию методов сокрытия улик
Лабораторная работа:
Взлом паролей приложений;
Обнаружение стеганографии.Модуль 6: Методы сбора и копирования данных
Проверка изменяющихся и неизменяющихся данных Windows
Анализ памяти и реестра Windows
Проверка кэша, куки-файлов и истории браузера
Проверка файлов и метаданных Windows
Анализ текстовых журналов и журналов событий Windows
Команды и файлы журналов Linux
Проверка журналов Mac
Лабораторная работа:
Обнаружение и извлечение скрытых на компьютере материалов с помощью OSForensics;
Получение информации о процессе загрузки с помощью ProcessExplorer;
Просмотр, мониторинг и анализ событий с помощью Event Log Explorer;
Исследование компьютера на предмет проникновения с помощью Helix;
Получение изменяющихся (оперативных) данных в Linux;
Анализ неизменяющихся (статичных) данных в Linux.Модуль 7: Расследование инцидентов, связанных с сетевыми технологиями
Сетевые вторжения
Основные концепции журналирования
Обзор способов сопоставления событий
Проверка маршрутизаторов, брандмауэров, IDS, DHCP и журналов ODBC
Проверка сетевого трафика
Сбор доказательств по проникновению в сеть
Реконструкция вторжения
Лабораторная работа:;
Перехват и анализ событий с помощью GFI EventsManager;
Расследование инцидента и сбор данных с помощью XpoLog Center Suite;
Расследование сетевых атак с помощью Kiwi Log Viewer;
Отслеживание сетевого трафика с помощью Wireshark.Модуль 8: Расследование атак на веб-приложения
Угрозы для веб-приложений
Архитектура веб-приложений
Веб-атаки и шаги их осуществления
Веб-атаки на сервера Windows
Архитектура сервера IIS и работа с его журналом
Архитектура веб-сервера Apache и работа с его журналом
Способы атак на веб-приложения
Лабораторная работа:
Анализ сети домена и запросов IP-адресов с помощью SmartWhois.Модуль 9: Расследование инцидентов, связанных с СУБД
Угрозы базам данных
Угрозы MSSQL
Признаки вторжения в базе данных
Сбор доказательств вторжения с помощью SQL Server Management Studio и Apex SQL DBA
Угрозы MySQL
Архитектура MySQL и определение структуры директорий данных
Утилиты для анализа и сбора доказательств проникновения в MySQL
Угрозы MySQL для баз веб-приложений на WordPress
Лабораторная работа:
Извлечение базы данных с Android-устройств с помощью Andriller;
Анализ базы SQLiteс помощью DB Browser for SQLite;
Изучение базы данных на MySQL.Модуль 10: Расследование инцидентов, связанных с облачными приложениями
Описание принципов облачных вычислений
Атаки на облако
Способы защиты облаков
Заинтересованные лица защите облаков
Облачные сервисы DropBox и GoogleDrive
Лабораторная работа:
Обнаружение уязвимостей в DropBox;
Исследование Google Drive.Модуль 11: Расследование инцидентов, связанных с вредоносным кодом
Способы проникновения вредоносного ПО в ОС
Базовые компоненты и распространение вредоносного ПО
Концепции защиты от вредоносного ПО
Обнаружение и извлечение вредоносного ПО из систем
Анализ вредоносного ПО – правила анализа и тестовая среда
Статический и динамический анализ вредоносного ПО
Лабораторная работа:
Статический анализ подозрительных файлов;
Динамический анализ вредоносного кода;
Анализ заражённых PDF-файлов;
Сканирование PDF-файлов с помощью веб-ресурсов;
Сканирование подозрительных файлов MS Office.Модуль 12: Расследование инцидентов, связанных с электронной почтой
Почтовые системы, почтовые клиенты и почтовые сервера
Управление аккаунтами
Атаки на электронную почту
Компоненты сообщений электронной почты
Общие заголовки и X-заголовки
Обнаружения атак на почту
Средства анализа почтовых сообщений
Американский закон CAN-SPAM
Лабораторная работа:
Восстановление удалённых сообщений в эл.почте с помощью Recover My Email;
Обнаружение опасных сообщений с помощью Paraben’s Email Examiner;
Отслеживание эл.сообщений с помощью eMailTrackerPro.Модуль 13: Расследование инцидентов, связанных с мобильными устройствами
Угрозы мобильным устройствам
Особенности взлома мобильных устройств и мобильных ОС
Архитектура мобильных устройств
Архитектура стека Android и процесс загрузки
Архитектура стека iOS и процесс загрузки
Хранилища мобильных данных
Подготовка и вторжение в мобильную ОС
Лабораторная работа:
Анализ опасных изображений и восстановление удалённых файлов с помощью Autopsy;
Исследование Android-устройства с помощью Andriller.Модуль 14: Подготовка отчетов о расследовании инцидента
Структура отчёта о расследование инцидента
Признаки хорошего отчёта
Шаблон отчёта о расследовании инцидента
Классификация отчётов и руководства по их написанию
Экспертные заключения в отчёте
Различия технических и экспертных заключений
Стандарты Дауберта (Daubert) и Фёе (Fyre)
Этические нормы при ведении расследования - CCSP — Certified Cloud Security Professional
- Длительность: 5 дней (40 часов)
 - Код курса: CCSP
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Обучение ориентированно на:
Экспертов, готовящихся к международно-признаваемой сертификации в области обеспечения информационной безопасности при применении облачной модели потребления ИТ-услуг (ISC)2 Certified Cloud Security Professional
Предварительные требования к участникам:
Сертификация CompTIA Security+ или эквивалентный набор знаний и навыков
5-летний опыт в сфере обеспечения информационной безопасности, например, ISACA Certified Information Systems Auditor, (ISC)2 Certified Information Systems Security Professional или ISACA Certified Information Systems ManagerФормат и продолжительность обучения:
Семинар 5 дней 40 часов (80% времени лекции/20% практические занятия)
Методические материалы:
Учебное пособие с теоретической и практической частью
Документ об окончании курса:
Сертификат учебного центра «Human Growth Kazakhstan».
Программа курса
Модуль 0. Оценочный тест.
Модуль 1. Архитектурные концепции и требования к проектированию
Урок 1.1. Концепция облачных вычислений
Урок 1.2. Эталонная архитектура облачных вычислений
Урок 1.3. Концепции безопасности для облачных вычислений
Урок 1.4. Принципы построения безопасных облачных вычислений
Урок 1.5. Доверенные облачные службы
Домашнее задание – промежуточный тест.Модуль 2. Безопасность облачных данных
Урок 2.1. Жизненный цикл облачных данных
Урок 2.2. Проектирование и реализация архитектур облачных хранилищ данных
Урок 2.3. Разработка и применение стратегий обеспечения безопасности данных
Урок 2.4. Внедрение технологий обнаружения и классификации данных
Урок 2.5. Разработка и внедрение соответствующих юрисдикции мер защиты персональных данных
Урок 2.6. Разработка и внедрение средств управления правами доступа к данным
Урок 2.7. Планирование и внедрение политик хранения, удаления и архивирования данных
Урок 2.8. Проектирование и внедрение аудита, отслеживания и учета событий данных
Домашнее задание – промежуточный тест.Модуль 3. Безопасность облачной платформы и инфраструктуры
Урок 3.1. Осмысление компонентов облачной инфраструктуры
Урок 3.2. Анализ рисков, связанных с облачной инфраструктурой
Урок 3.3. Проектирование и планирование средств контроля безопасности
Урок 3.4. Планирование аварийного восстановления и управления непрерывностью бизнеса
Домашнее задание – промежуточный тест.Модуль 4. Безопасность облачных приложений
Урок 4.1. Обучение и осведомленность в области безопасности приложений
Урок 4.2. Гарантия и проверка облачного программного обеспечения
Урок 4.3. Использование проверенного безопасного программного обеспечения
Урок 4.4. Процесс жизненного цикла разработки программного обеспечения
Урок 4.5. Применение жизненного цикла разработки безопасного программного обеспечения
Урок 4.6. Архитектура облачных приложений
Урок 4.7. Разработка соответствующих решений управления идентификацией и доступом.
Домашнее задание – промежуточный тест.Модуль 5. Операции
Урок 5.1. Поддержка процесса планирования для проектирования центра обработки данных
Урок 5.2. Реализация и построение физической инфраструктуры для облачной среды
Урок 5.3. Запуск физической инфраструктуры для облачной среды
Урок 5.4. Управление физической инфраструктурой для облачной среды
Урок 5.5. Построение логической инфраструктуры для облачной среды
Урок 5.6. Запуск логической инфраструктуры для облачной среды
Урок 5.7. Управление логической инфраструктурой для облачной среды
Урок 5.8. Обеспечение соответствия правилам и средствам контроля (например, ITIL, ISO/IEC 20000-1)
Урок 5.9 Проведение оценки риска для логической и физической инфраструктуры
Урок 5.10. Сбор, получение и сохранение цифровых доказательств
Урок 5.11. Управление связью с соответствующими сторонами
Домашнее задание – промежуточный тест.Модуль 6. Закон и требования регуляторов
Урок 6.1. Правовые требования и уникальные риски в облачных вычислениях
Урок 6.2. Вопросы конфиденциальности с учетом изменения юрисдикции
Урок 6.3. Процесс аудита, методологии и необходимые адаптации для облачной среды
Урок 6.4. Последствия облачных вычислений для корпоративного управления рисками
Урок 6.5. Аутсорсинг и оформление облачных контрактов
Урок 6.6. Выполнение управления поставщиками
Домашнее задание – промежуточный тест.Модуль 7. Знакомство с экзаменом.
Модуль 8. Итоговый тест.
 - CISA — Certified Information Systems Auditor
- Длительность: 5 дней (40 часов)
 - Код курса: CISA
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Обучение ориентированно на:
Аудиторов информационных систем, готовящихся к сдаче сертификационного экзамена CISA
Предварительные требования к подготовке слушателей:
Сертификация CompTIA Security+ или ISC2 SSCP или эквивалентный набор знаний и навыков по основам ИБ
5-летний опыт в одном и более доменах CISA, например, в качестве архитектора систем защиты CompTIA CASP; практика по управлению непрерывностью бизнеса DRII ABCP; специалиста по форензике GIAC GASF и пр.Формат и продолжительность:
семинар 5 дней (80% времени лекции/20% практические занятия)
Методические материалы:
Учебное пособие с теоретической и практической частью на английском языке
Программа курса:
Модуль 1.Основы аудита информационных систем
Модуль 2. Стратегическое управление ИТ
Модуль 3. Процесс аудита
Модуль 4. Основы сетевых технологий
Модуль 5. Управление жизненным циклом информационных систем
Модуль 6. Использование, обслуживание и поддержка информационных систем
Модуль 7. Защита информационных ресурсов
Модуль 8. Непрерывность бизнеса и восстановление после катастрофВ качестве практики в обучение включены оценочный, промежуточные и итоговый тесты, 600 вопросов которые соответствуют официальным экзаменационным вопросам.
Соответствие доменов экзамена и модулей курса:
Domain 1— Information Systems Auditing Process Systems (21%)
Модули: 1,3
Domain 2— Governance and Management of IT (17%)
Модули: 2,8
Domain 3— Information Systems Acquisition, development, and Implementation (12%)
Модули: 4,5
Domain 4— Information Systems Operations, and Business Resilience (23%)
Модули: 4,6,8
Domain 5— Protection of Information Assets (27%)
Модули: 4,7 - CISSPEX — Подготовка к сертификациям CISSP и CISM
- Длительность: 5 дней (40 часов)
 - Код курса: CISSPEX
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Курс ориентирован на:
Руководителей/экспертов в области обеспечения информационной безопасности (далее ИБ), готовящихся к международно-признаваемым сертификациям (ISC)2 Certified Information Systems Security Professional и ISACA Certified Information Systems Manager
Предварительные требования к знаниям слушателей курса:
1) Сертификация CompTIA Security+ или ISC2 SSCP или эквивалентный набор знаний и навыков по основам ИБ
2) 5-летний опыт в сфере обеспечения ИБ в 2х и более доменах, например, в качестве аудитора информационных систем ISACA Certified Information Systems Auditor; архитектора систем защиты CompTIA CASP; практика по управлению непрерывностью бизнеса DRII ABCP; специалиста по форензике GIAC GASF и пр.Формат и продолжительность:
5 дней (80% времени лекции/20% практические занятия)
Методические материалы:
Учебное пособие с теоретической и практической частью на английском языке
Сертификационные статусы и экзамены:
Сертификация ISC2 Certified Information Systems Security Professional
Сертификация ISACA Certified Information Systems Manager
Руководителей и экспертов мы готовим к получению сертификации являющейся Золотым Стандартом в сфере ИБ Certified Information Systems Security Professional (CISSP) от консорциума ISC2 и Certified Information Systems Manager от ISACAПрограмма курса:
Модуль 01. Security Governance Through Principles and Policies
Модуль 02. Personnel Security and Risk Management Concepts
Модуль 03 Business Continuity Planning
Модуль 04 Laws, Regulations, and Compliance
Модуль 05 Protecting Security of Assets
Модуль 06 Cryptography and Symmetric Key Algorithms
Модуль 07 PKI and Cryptographic Applications
Модуль 08 Principles of Security Models, Design, and Capabilities
Модуль 09 Security Vulnerabilities, Threats, and Countermeasures
Модуль 10 Physical Security Requirements
Модуль 11 Secure Network Architecture and Securing Network Components
Модуль 12 Secure Communications and Network Attacks
Модуль 13 Managing Identity and Authentication
Модуль 14 Controlling and Monitoring Access
Модуль 15 Security Assessment and Testing
Модуль 16 Managing Security Operations
Модуль 17 Preventing and Responding to Incidents
Модуль 18 Disaster Recovery Planning
Модуль 19 Investigations and Ethics
Модуль 20 Software Development Security
Модуль 21 Malicious Code and Application Attacks
В качестве практики в обучение включены оценочный, промежуточные и итоговый тесты, 600 вопросов которые соответствуют официальным экзаменационным вопросам.Соответствие доменов экзамена CISSP и модулей:
Модуль 1, 2, 3, и 4: Security и Risk Management
Модуль 5: Asset Security
Модуль 6, 7, 8, 9, и 10: Security Architecture и Engineering
Модуль 11 и 12: Communication и Network Security
Модуль 13 и 14: Identity и Access Management (IAM)
Модуль 15: Security Assessment и Testing
Модуль 16, 17, 18, и 19: Security Operations
Модуль 20, 21: Software Development Security
Всем четырем доменам экзамена CISM соответствуют модули курса, изучаемые в первые 3 дня. - ESCA — EC-Council Certified Security Analyst
- Длительность: 5 дней (40 часов)
 - Код курса: ESCA
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Описание:
Этот курс посвящен освоению методики проведения тестов на проникновение (pentest’ов), а также подготовке к соответствующему сертификационному экзамену. На курсе разбираются практики подготовки к проведению тестов на проникновение, особенности применения различных методов проникновения и специализированного программного и аппаратного обеспечения. Также рассматриваются вопросы подготовки сопроводительной документации и составления отчета о проведении теста на проникновение, включая анализ выявленных угроз и уязвимостей, корректную интерпретацию результатов и выработку необходимых рекомендаций.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся тестированием на проникновения, обработкой инцидентов ИБ, и обеспечением информационной безопасности корпоративной инфраструктуры.
Материалы курсы включают также материалы для самоподготовки!Программа курса:
Модуль 01: Introduction to Penetration Testing and Methodologies
(Введение в тестирование на проникновения и соответствующие методики).Модуль 02: Penetration Testing Scoping and Engagement Methodology
(Рамки проведения тестов на проникновение и методология работы с подобными проектами).Модуль 03: Open-Source Intelligence (OSINT) Methodology
(Конкурентная разведка в открытых источниках информации).Модуль 04: Social Engineering Penetration Testing Methodology
(Методика использования методов социальной инженерии).Модуль 05: Network Penetration Testing Methodology – External
(Методика проведения тестов на проникновение «извне»).Модуль 06: Network Penetration Testing Methodology – Internal
(Методика проведения тестов на проникновение «изнутри»).Модуль 07: Network Penetration Testing Methodology – Perimeter Devices
(Методика проникновения за периметр безопасности).Модуль 08: Web Application Penetration Testing Methodology.
(Методика тестов на проникновение, направленных на web-приложения).Модуль 09: Database Penetration Testing Methodology
(Методика тестов на проникновение, направленных на базы данных).Модуль 10: Wireless Penetration Testing Methodology.
(Методика тестов на проникновение, направленных на беспроводные сети передачи данных).Модуль 11: Cloud Penetration Testing Methodology.
(Методика проведения тестов на проникновения в облачных средах).Модуль 12: Report Writing and Post Testing Actions.
(Составления отчета и рекомендаций по результатам проведения теста на проникновение). - GCFA — GIAC Certified Forensic Analyst
- Длительность: 5 дней (40 часов)
 - Код курса: GCFA
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Описание:
Данный курс направлен на подготовку к сертификационному экзамену GIAC Forensic Analyst. На курсе рассматриваются методы цифровой криминалистики, конкретные механизмы и инструменты обработки инцидентов информационной безопасности.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся цифровой криминалистикой и обработкой инцидентов информационной безопасности. Специалистам из “синих” и “красных” команд, аудиторам информационной безопасности.
Программа курса:
Модуль00: Enterprise Environment Incident Response
(Работа с инцидентами ИБ в корпоративной среде).Модуль 01: File System Timeline Artifact Analysis
(Анализ артефактов в файловых системах).Модуль 02: Identification of Malicious System and User Activity
(Обнаружение вредоносной активности систем и пользователей).Модуль 03: Identification of Normal System and User Activity
(Построение шаблонов нормальной работы систем и пользователей).Модуль 04: Introduction to File System Timeline Forensics
(Введение в построение и анализ временных последовательностей событий в файловых системах).Модуль 05: Introduction to Volatile Data Forensics
(Анализ волатильной информации).Модуль 06: NTFS Artifact Analysis
(Анализ артефактов файловой системы NTFS).Модуль 07: Volatile Data Artifact Analysis of Malicious Events
(Анализ волатильных артефактов вредоносных событий).Модуль 08: Volatile Data Artifact Analysis of Windows Events
(Анализ волатильных артефактов вредоносных событий в ОС Windows).Модуль 09: Windows Artifact Analysis
(Анализ артефактов в ОС Windows). - GPEN — GIAC Penetration Tester
- Длительность: 5 дней (40 часов)
 - Код курса: GPEN
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Описание:
Данный курс направлен на подготовку к сертификационному экзамену GIAC Penetration Tester. На курсе рассматриваются методики и конкретные механизмы проведения рекогносцировки IT-инфраструктуры, а также применения эксплойтов при тестировании на проникновение.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся проведением тестов на проникновение, моделированием угроз, выявлением существующих уязвимостей. Специалистам из «синих» и «красных» команд, аудиторам информационной безопасности.
Программа курса:
Модуль00: Advanced Password Attacks
(Расширенные атаки на пароли).Модуль 01: Attacking Password Hashes
(Атаки на хэшированные пароли).Модуль 02: Domain Escalation and Persistence Attacks
(Направленные атаки).Модуль 03: Escalation and Exploitation
(Эскалация и эксплуатация).Модуль 04: Exploitation Fundamentals
(Основы создания эксплойтов).Модуль 05: Kerberos Attacks
(Атаки на Kerberos).Модуль 06: Metasploit
Модуль 07: Moving Files with Exploits
(Передача файлов с помощью эксплойтов).Модуль 08: Password Attacks
(Атаки на пароли).Модуль 09: Password Formats and Hashes
(Форматы хранения паролей).Модуль 10: Penetration Test Planning
(Планирование тестов на проникновение).Модуль 11: Penetration Testing with PowerShell and the Windows Command Line (Тестирование на проникновение с помощью инструментов Windows: cmd, PowerShell).
Модуль 12: Reconnaissance
(Рекогносцировка).Модуль 13: Scanning and Host Discovery
(Сканирование и обнаружение хостов).Модуль 14: Vulnerability Scanning
(Сканирование уязвимостей).Модуль 15: Web Application Injection Attacks
(Атаки инъекций на Web-приложения).Модуль 16: Web Application Reconnaissance
(Рекогносцировка Web-приложений). - HGK08 — Аудит IT систем
- Длительность: 3 дней (24 часа)
 - Код курса: HGK08
 - Стоимость
 - Очный формат: 527 500 ₸
 - Онлайн формат: 502 000 ₸
 
Описание курса
Назначение курса:
Данный курс описывает основы аудита информационных технологий и процессов их работы в корпоративных инфраструктурах. Подробно приводится методика построение самого процесса аудита, а также описываются инструменты, полезные про проведении аудита IT-систем.
Курс будет интересен:
Специалистам, занимающимся аудитом IT-систем.
Содержание курса:
1. Аудит информационных технологий
IT-инфраструктура
Необходимость и текущие тренды аудита
Внутренний и внешний аудит
IT-аудит2. Процесс IT-аудита
Основные framework’и процесса IT-аудита
Планирование IT-аудита
Формулирование целей и желаемых результатов IT-аудита
Документация для IT-аудита3. Инструменты для проведения IT-аудита
Метрики проведения IT-аудита
Работа с данными
Анализ данных на компьютере
Управление ресурсами IT-аудита4. Особенности работы IT-систем
Основные framework’и процессов работы IT-систем
Метрики работы IT-систем
Стратегия развития и бизнес-задачи IT-систем5. Управление рисками
Основные подходы управления рисками
Основные framework’и процесса управления рисками6. Управление IT-проектами
Планирование IT-проекта
Оценка эффективности IT-проекта
Аудит IT-проектов7. Аудит IT-приложений
Риски для приложений
Риски для пользователей приложений
Контроль приложений
Специальные инструменты для аудита IT-приложений8. Управление процессами контроля изменений[в IT-системах]
Процесс контроля изменений
Процедуры контроля изменений
Аудит процессов контроля изменений9. Управление резервным копирование и восстановлением
Обработка данных в IT-системах
Проектирование решений резервного копирования
Отказоустойчивость IT-систем
Аудит резервного копирования и отказоустойчивости IT-систем10. Информационная безопасность
Основные процессы информационной безопасности
Основные стандарты и framework’и процессов информационной безопасности
Политики информационной безопасности
Управление информационной безопасностью
Механизмы контроля доступа
Аудит процессов информационной безопасности - HGK09 — Как продавать проекты Информационной Безопасности
- Длительность: 4 дня (32 часа)
 - Код курса: HGK09
 - Стоимость
 - Очный формат: 382 000 ₸
 - Онлайн формат: 373 000 ₸
 
Описание курса
Аннотация
Основными задачами курса «Как продавать проекты ИБ» являются:
Ознакомление слушателей с современными взглядами и подходами к продаже проектов информационной безопасности.
Определение ИБ, как неотъемлемой части любого бизнеса, ознакомление с основными положениями международных стандартов в области ИБ
Определение категорий продуктов, решений и сервисов ИБ
Определение категорий потенциальных заказчиков для правильного подбора решений ИБ
Ознакомление с методиками продаж в области ИБ
Ознакомление с этапами подготовки пилотных проектов и проектов внедрения.Аудитория
Курс ориентирован на сотрудников отдела продаж.
Потенциальные кандидаты:
Менеджеры по продажам, имеющие небольшой опыт в продаже ИТ/ИБ решений.
Продукт-менеджеры ИТ/ИБ решений.
Руководители отдела продажПредварительная подготовка
Опыт работы в продажах B2B
Форма проведения
Обучение предусматривает проведение теоретических занятий, практическую работу в группах. Основные занятия курса проводятся в форме лекций-семинаров.
При разборе практических примеров используются приемы тренинга. Для практических занятий отводится не менее 50% учебного времени.
Контроль усвоения слушателями материала курса определяется по результатам выполнения практических заданий и экзамена.Результаты курса
По окончанию курса слушатели смогут:
Понимать и определять задачи заказчика в области ИБ, и подбирать актуальные продукты защиты.
Писать продающие письма, проводить результативные звонки, подготавливать и проводить презентации решений или проектов ИБ.
Формировать и руководить командой пилотного проекта, проводить пилотные проекты, переходящие в продажу.
Готовить уникальные предложения с описанием проекта ИБ.
Формировать и руководить командой проекта по внедрению решений ИБ.Программа курса
Что такое информационная безопасность:
Международные стандарты ИБ и законодательство РК в области ИБ, как инструменты в работе с заказчиком. (ISO 27001, NIST, ISO 27005, МЦРИАП и др.)
Что такое ИБ с позиции международных стандартов и законодательства.
Понимание концепции ИБ, какие классы продуктов и сервисов используют и почему.Инструменты информационной безопасности:
Классификация продуктов и сервисов ИБ
Продукты защиты конечных точек
Продукты для выявления угроз на конечных точках
Продукты для выявления угроз в корпоративной сети
Продукты для защиты корпоративной сети
Продукты для предотвращения утечки данных
Продукты для управления инцидентамиЗаказчики информационной безопасности:
Классификация заказчиков – по размерам бизнеса, по направлениям бизнеса.
Типы заказчиков и их задачи в ИБ
Как формировать предложение для каждого типа заказчиковВход к заказчику:
Холодные звонки – Что это такое? Как правильно готовиться к холодным звонкам? Как правильно делать холодные звонки? Самые распространённые ошибки в холодных звонках.
Продающие письма – Что это такое? Как правильно готовить продающие письма?
Холодные встречи – когда этот инструмент эффективен и как его использовать?Презентация решения информационной безопасности:
Как готовить презентацию онлайн/оффлайн
Как проводить презентацию онлайн/оффлайн
Как отвечать на сложные вопросы
Что делать, когда ситуация выходит из под контроля?Пилотный проект информационной безопасности:
Что такое пилотный проект?
Документация проекта – готовим документы пилотного проекта ИБ
Процессы проекта – разрабатываем процессы для проведения пилотного проекта
Регламенты проекта – разрабатываем регламенты для проведения пилотного проектаПодготовка уникального предложения проекта:
Шаблоны предложений на все случаи жизни.
Подготовка ценовых предложений
Подготовка коммерческих предложений.Проект внедрения информационной безопасности:
Что такое проект внедрения?
В чём отличие проекта внедрения от проекта пилота
Документация проекта внедрения
Процессы проекта внедрения
Регламенты проекта внедрения - DDoS — Защита от DDoS атак с помощью Radware vDefensePro для Cisco FirePower
- Длительность: 2 дня (16 часов)
 - Код курса: DDOS
 - Стоимость
 - Очный формат: 632 000 ₸
 - Онлайн формат: 602 000 ₸
 
Описание курса
Назначение курса:
на данном курсе рассматриваются методы защиты от различных DDoS-атак с помощью Radware virtual DefensePro для Cisco FirePower.
Содержание:
1. Классификация DDoS атак.
DoS и DDoS атаки.
Сетевые DDoS атак.
DDoS атаки приложений.
Мультивекторные DDoS атаки.
Botnet’ы.
Основные метода защиты от DDoS атак.2. Radware vDefensePro для Cisco FirePower.
Система защиты от DDoS атак Radware DefensePro.
UTM-система Cisco FirePower.
Установка компонента vDefensePro на платформу Cisco FirePower.
Процесс обработки сетевого трафика и архитектура комбинированной системы Cisco FirePower + Radware vDefensePro.3. Настройка Radware vDefensePro.
Системные настройки Radware vDefensePro на Cisco FirePower.
Настройка Protection Profile’ов для защиты от DDoS атак.
Мониторинг системы защиты от DDoS атак. - GREM — GIAC Reverse Engineering Malware
- Длительность: 5 дней (40 часов)
 - Код курса: GREM
 - Стоимость
 - Очный формат: 760 000 ₸
 - Онлайн формат: 722 000 ₸
 
Описание курса
Описание:
Данный курс направлен на подготовку к сертификационному экзамену GIAC Reverse Engineering Malware. На курсе рассматриваются методы и средства reverse engineering’а вредоносного п/о.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся reverse engineering’ом, выявлением существующих уязвимостей. Специалистам из “синих” и “красных” команд, аудиторам информационной безопасности.
Программа курса:
Модуль00: Analysis of Malicious Document Files
(Анализ вредоносных файлов документов).Модуль 01: Analyzing Protected Executables
(Анализ зищищённых исполнимых файлов).Модуль 02: Analyzing Web-Based Malware
(Анализ вредоносных компонентов Web-приложений).Модуль 03: Common Windows Malware Characteristics in Assembly
(Основные характеристики вредоносного п/о Windows с т.з. Ассемблера).Модуль 04: In-Depth Analysis of Malicious Browser Scripts
(Глубокий анализ вредоносных скриптов браузеров).Модуль 05: In-Depth Analysis of Malicious Executables
(Глубокий анализ вредоносных исполнимых файлов).Модуль 06: Malware Analysis Using Memory Forensics
(Анализ вредоносного п/о методами анализа оперативной памяти).Модуль 07: Malware Code and Behavioral Analysis Fundamentals
(Основы анализа вредоносного исходного кода и поведенческий анализ).Модуль 08: Windows Assembly Code Concepts for Reverse-Engineering
(Основы ассемблера в ОС Windows для reverse engineering’а). 
Checkpoint
- CP01 — Управление и настройка UTM-продуктов Checkpoint R81.10
- Длительность: 5 дней (40 часов)
 - Код курса: CP01
 - Стоимость
 - Очный формат: 656 000 ₸
 - Онлайн формат: 641 000 ₸
 
Описание курса
Описание курса:
в рамках данного пятидневного курса рассматриваются вопросы установки и настройка UTM-продуктов Checkpoint под управление операционной системы Gaia R81.10. Основной теоретический материал курса посвящен управлению данными устройствами с позиции внедрения и поддержки механизмов сетевой безопасности, в том числе: межсетевого экранирования, механизмов превентивного контроля доступа с использованием контекстной информации, виртуальных частных сетей, аудита сетевой безопасности. Кроме того, рассматриваются вопросы построения отказоустойчивой и гибкой инфраструктуры сетевой безопасности на базе устройств Checkpoint. Данный курс рекомендован для подготовки к сертификации CCSA.
Аудитория курса:
инженеры информационной безопасности, администраторы устройств Checkpoint, персонал группы реагирования на инциденты ИБ.
Предварительные требования к аудитории: понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности.
Содержание:
1. Архитектура Checkpoint
• Основные компоненты архитектуры Checkpoint
• Шлюзы безопасности
• Сервер управления
• Процедуры установки и начальной настройки Checkpoint
• Приложения управления продуктами Checkpoint
• Приложения мониторинга продуктов и трафика
• Варианты развертывания продуктов Checkpoint
• Работа с командной строкой
• Базовое администрирование продуктов Checkpoint2. Политики безопасности
• Правила и политики безопасности
• База данных правил безопасности
• Встроенные правила безопасности
• Принципы обработки трафика правилами безопасности
• Объекты и база данных объектов
• Пакеты политик безопасности
• Унифицированные (Unified) политики безопасности
• Политики контроля доступа (Access Control Policies)
• Политики управления угрозами (Threat Prevention Policies)
• Фильтрация приложений и URL.
• Политики QoS.
• Многоуровневое построение политик безопасности3. Трансляция сетевых адресов (NAT)
• Правила трансляции сетевых адресов и портов на устройствах Checkpoint
• Автоматические и ручные правила трансляции
• Hide NAT
• Static NAT
• Обеспечение сетевой инфраструктуры для работы NAT4. Администрирование Checkoint
• Активация и деактивация программных компонентов Checkpoint
• Лицензирование и работа с приложением SmartUpdate
• Процедура регистрации и файлы контрактов
• Работа с учетными записями пользователей Checkpoint
• Ведение аудита действий пользователей
• Сбор логов и мониторинг событий информационной безопасности через приложения5. VPN и защищенные каналы связи
• Концепция и механика VPN
• Архитектуры и классификация VPN
• Проблемы построения защищенных каналов связи
• Шифрование и типы криптографических систем
• Технологии VPN в инфраструктуре Checkpoint
• Site-to-Site и Remote Access VPN на Checkpoint
• Основы IPsec VPN на Checkpoint
• Основы TLS VPN на Checkpoint
• Работа с трафиком в рамках VPN Checkpoint6. Идентификация пользователей
• Пользователи и группы пользователей
• Программный компонент Identity Awareness
• Интеграция Checkpoint с LDAP
• Механизм Captive Portal
• Формирование ролей доступа
• Политик безопасности на основе информации о пользователях7. Кластеризация средствами Checkpoint
• Механизм ClusterXL
• Legacy/New HA кластер
• Load Balancing кластер
• Мониторинг работы кластера8. Мониторинг, поиск и устранение неисправностей
• Логирование и поиск логов
• Утилиты командной строки для мониторинга сетевой активности
• Утилиты командной строки для поиска и устранения неисправностей
• CPinfo
• CPview
• Fw - CP02 — Углубленное управление продуктами Checkpoint R81.10
- Длительность: 5 дней (40 часов)
 - Код курса: CP02
 - Стоимость
 - Очный формат: 656 000 ₸
 - Онлайн формат: 641 000 ₸
 
Описание курса
Описание курса:
в рамках данного пятидневного курса рассматриваются вопросы углубленной настройки и управления UTM-продуктами Checkpoint под управление операционной системы Gaia R81.10. Основной теоретический материал курса посвящен управлению данными устройствами с позиции поддержки, поиска и устранения неисправностей в механизмах сетевой безопасности, в том числе: межсетевого экранирования, превентивного контроля доступа с использованием контекстной информации, виртуальных частных сетей, аудита сетевой безопасности. Кроме того, рассматриваются вопросы построения отказоустойчивой и гибкой инфраструктуры сетевой безопасности на базе устройств Checkpoint. Данный курс рекомендован для подготовки к сертификации CCSE и CCSM.
Аудитория курса:
инженеры информационной безопасности, администраторы устройств Checkpoint, персонал группы реагирования на инциденты ИБ.
Предварительные требования к аудитории:
глубокое понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности в продуктах Checkpoint.
Содержание:
1. Операционная система Gaia
• Командная строка Gaia
• Архитектура шлюзов безопасности Checkpoint
• Обработка пакетов шлюзом безопасности
• Отладка процесса обработки пакетов
• Использование fw monitor
• User-space и kernel-space процессы, их взаимодействие
• Отладка основных процессов на шлюзе безопасности и на сервере управления
• Основные kernel-таблицы и структуры данных шлюза безопасности
• Отладка компонентов kernel-space
• Работка с различными модуля ядра Gaia
• Отладка процессов трансляции сетевых адресов (NAT)
• Процесс установки политик безопасности на шлюз безопасности
• Неисправности при установке политик безопаcности
• Отладка процесса установки политик безопасности2. Оптимизация работы шлюза безопасности Checkpoint
• Механизм CoreXL
• Механизм SecureXL
• Механизмы шаблонизации сетевых соединений
• Акселерация процесса обработки пакетов
• SND (Security Network Dispatcher)
• Механизм Multi-Queue
• Механизм Priority queue
• Практика оптимизации работы шлюза безопасности
• Отладка и мониторинг процессов акселерации3. Механизмы VPN
• Отладка и мониторинг механизмов и процессов VPN
• Route-based Site-to-Site VPN
• Механизмы Remote-Access VPN
• Checkpoint Capsule
• SNX
• Mobile Access Portal4. Защита от APT средствами Checkpoint
• Дешифрование HTTPS
• IPS. Компоненты и отладка
• GEO-политики
• URL фильтрация. Компоненты и отладка
• Anti-bot и Antivirus. Технологии SandBlast.
• Content Awareness
• Antispam5. Кластеризация и отказоустойчивость Checkpoint
• Режимы работы ClusterXL
• Мониторинг кластера
• Отладка синхронизации кластера
• Обновление кластера
• VRRP6. Мониторинг, поиск и устранение неисправностей
• Логирование и поиск логов
• Работа с базой данных SOLR
• Работа с приложением SmartEvent
• Настройка правил корреляции событий7. Автоматизация Checkpoint
• Предоставляемые API
• TCL
• Python
• Web services8. Работа с IPv6
 
Fortinet
- FG1 — FortiGate Security on FortiOS
Описание курса
Описание курса:
в этом трехдневном курсе Вы узнаете как использовать базовый функционал устройств FortiGate, включая профили безопасности. В ходе интерактивных лабораторных работ Вы разберетесь с политиками межсетевого экранирования, аутентификацией пользователей, SSL VPN, dial-up IPsec VPN, а также научитесь защищать Вашу сеть, используя такие профили безопасности как IPS, AV, WEB-фильтрация, AC, и другие. Эти основы администрирования позволят Вам сформировать целостное представление о внедрении механизмов сетевой безопасности с помощью продуктов FortiNet. Данный курс рекомендован для подготовки к сертификации NSE4.
Аудитория курса:
профессионалы в области информационной безопасности, занимающиеся управлением, настройкой, администрированием и мониторингом устройств FortiGate для обеспечения сетевой безопасности своей организации.
Предварительные требования к аудитории: понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности.
Содержание:
1. Основы работы с FortiGate и фабрика безопасности
2. Политики межсетевого экранирования
3. Трансляция адресов
4. Аутентификация средствами межсетевого экрана
5. Аудит и мониторинг
6. Работа цифровых сертификатов
7. WEB-фильтрация
8. Контроль за приложениями
9. Антивирус
10. Система предотвращения вторжений
11. TLS VPN
12. Dial-UP IPsec VPN
13. Предотвращение утечек данных - FG2 — FortiGate Infrastructure on FortiOS
- Длительность: 2 дня (16 часов)
 - Код курса: FG2
 - Стоимость
 - Очный формат: 553 000 ₸
 - Онлайн формат: 537 500 ₸
 
Описание курса
Описание курса:
в этом двухдневном курсе Вы узнаете как использовать расширенные возможности устройств FortiGate в области сетевой безопасности. Темы включают в себя разделы, описывающие наиболее часто применяемые в крупных инфраструктурах механизмы сетевой безопасности, включая transparent режим, site-to-site VPN, единый вход (SSO), web-proxy, а также маршрутизация, кластеризацию и диагностику. Данный курс рекомендован для подготовки к сертификации NSE4.
Аудитория курса:
профессионалы в области информационной безопасности, занимающиеся управлением, настройкой, администрированием и мониторингом устройств FortiGate для обеспечения сетевой безопасности своей организации.
Предварительные требования к аудитории: понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности. Знание основ настройки механизмов безопасности на устройствах FortiGate.
Содержание:
1. Маршрутизация
2. SD-WAN
3. Коммутация
4. Виртуальные домены
5. Site-to-Site VPN
6. Единый вход FortiNet (FSSO)
7. Высокая доступность (HA)
8. Web proxy
9. Диагностика - FG3 — FortiGate Enterprise FireWall Management and Troubleshooting
Описание курса
Описание курса:
в этом трехдневном курсе Вы узнаете как внедрять, поддерживать, устранять неисправности и управлять инфраструктурой информационной безопасности предприятия, построенной на устройствах FortiGate. Данный курс рекомендован для подготовки к сертификации NSE7.
Аудитория курса:
профессионалы в области информационной безопасности, занимающиеся управлением, настройкой, администрированием и мониторингом устройств FortiGate для обеспечения сетевой безопасности своей организации.
Предварительные требования к аудитории:
глубокое понимание работы сетей пакетной передачи данных. Знание принципов настройки и работы механизмов безопасности на устройствах FortiGate. Практические навыки работы с устройствами FortiGate.
Содержание:
1. Основные подходы и методики по поиску и устранению неисправностей
2. Архитектура FortiOS
3. Устранение системных неисправностей FortiOS
4. Мониторинг трафика и сессий
5. Устранение неисправностей маршрутизации
6. OSPF
7. IS-IS
8. BGP
9. Устранение неисправностей с FortiGuard
10. Централизованное управление инфраструктурой
11. Расширенные возможности Web-фильтрации
12. Пользовательские сигнатуры и возможности IPS
13. Устранение неисправностей с IPsec
14. ADVPN - FG4 — Использование решения Web Application Firewall
Описание курса
Содержание курса
В ходе данного трехдневного курса слушатели узнают, как разворачивать, настраивать и устранять неполадки в работе механизма Fortinet Web Application Firewall: FortiWeb.
Преподаватели объяснят ключевые концепции безопасности веб-приложений и проведут лабораторные занятия, в ходе которых слушатели изучат особенности защиты и механизмы для оптимизации производительности. В лабораторных работах используются симуляции трафика с атаками на реальные веб-приложения. Слушатели будут работать с этими симуляциями, чтобы узнать, как лучше распределять нагрузку с виртуальных серверов на реальные серверы, как проверять поток трафика, как обеспечить безопасность файлов cookies сеанса HTTP.
Цели курса
После прохождения данного курса слушатели будут уметь:
Знать угрозы, который могут возникнуть на уровне приложений
Защищать сеть от атак DoS
Предотвращать атаки нулевого дня без сбора полезного трафика
Делать приложения совместимыми с OWASP Top 10 и PCI DSS 3.0
Обнаруживать уязвимости на серверах и в размещенных веб-приложениях
Настраивать FortiGate совместно с системой FortiWeb для усиленной защиты HTTP и XML
Предотвращать сканирование FTP и SSH
Настраивать централизованную отчетность
Выбирать подходящий режим работы
Балансировать нагрузку между пудами серверов
Использовать SSL/TLS, аутентификацию, комплексный контроль доступа для незащищенных приложений, трафик которых передается в открытом виде
Тренировать FortiWeb для защиты специфичных приложений
Создавать черные списки подозрительных адресов, и участников DDoS
Устранять неполадки в обработке трафика FTP/SSH.
Диагностировать ложные срабатывания и настраивать исключения
Оптимизировать производительностьКому следует посетить
Специалистам по сетевым технологиям и безопасности, которые занимаются занимаются администрированием и поддержкой FortiWeb.
Предварительные требования
Для прохождения данного курса требуется обладать следующими знаниями и навыками:
Знание уровней модели OSI и протокола HTTP
Базовый опыт работы с HTML, JavaScript, языками программирования для создания динамических сайтов, например, PHP
Базовый опыт работы с платформой FortiGatПрограмма курса
Введение
Базовые настройки
Интеграция с внешней системой SIEM
Интеграция Front-End SNAT & Load Balancers
DoS & Defacement
Подписи и автообучение
SSL & TLS
Аутентификация и контроль доступа
Соответствие PCI DSS 3.0
Кэширование и сжатие
Перенаправление трафика
Устранение неполадок - FG5 — FortiMail — NSE 6 — Защита почтового email-трафика
Описание курса
Содержание курса
В ходе данного трехдневного курса, слушатели узнают, как использовать FortiMail для защиты корпоративной сети от атак, которые берут свое начало в инфраструктуре почтового трафика, а также, как использовать FortiSandbox для детектирования и срочного блокирования угроз. В ходе интерактивных лабораторных работ, слушатели познакомятся с ролью FortiMail в сети, проанализируют функции платформы, которые расширяют функционал FortiGate по фильтрации почтового трафика, протестируют работу отказоустойчивой модели внедрения. Инструктор в ходе курса поможет слушателям решать основные вопросы, связанные с обслуживанием, поддержкой, поиском и устранением неполадок в работе платформы FortiMail.
Цели курса
После прохождения данного курса слушатели будут уметь:
Внедрять FortiMail в уже существующую или вновь построенную инфраструктуру электронной почты, используя гибкие модели развертывания
Понимать архитектуру системы FortiMail: как письма проходят через модули системы и обрабатываются ими, как защищать MTA
Использовать корпоративный LDAP-сервер для управления и аутентификации пользователей
Защищать процесс передачи электронных сообщений, используя для этого лучшие рекомендованные технологии: SMTPS, SMTP over TLS, Identity Based Encryption
Блокировать спам, используя встроенные комплексные механизмы, например, глубокое инспектирование заголовков, правила фильтрации, эвристический анализ, облачный сервис FortiGuard Antispam
Обнаруживать в почтовом трафике фишинговые ссылки и вирусы нулевого дня
Интегрировать FortiMail c FortiSandbox для расширенной защиты от угроз
Предотвращать утечку конфиденциальных данных в исходящем почтовом трафике
Создавать резервные копии
Внедрять архитектуру высокой доступности для того, чтобы инфраструктура корпоративной почты работала без простоев
Диагностировать и устранять распространенные проблемы в настройках платформы FortiMailКому следует посетить
Сетевым инженерам и специалистам по информационной безопасности, которые ответственны за администрирование и поддержку решения FortiMailКому следует посетить
Сетевым инженерам и специалистам по информационной безопасности, которые ответственны за администрирование и поддержку решения FortiMail
Предварительные требования
Базовые знания о работе сетей TCP/IP и механизмах сетевой безопасности
Опыт работы с технологиями Simple Mail Transfer Protocol, Public Key Infrastructure, Secure Sockets Layer, Transport Layer Security, Remote Authentication Dial-In User Service, Lightweight Directory.
Знания о протоколах контроля доступаПрограмма курса
Концепции передачи email-трафика
Первичные базовые настройки FortiMail
Политики и контроль доступа
Аутентификация
Управление сессиями
Антивирусная проверка и проверка контента
Антиспам
Защищенные соединения
Технологии обеспечения отказоустойчивости
Server Mode
Transparent Mode
Обслуживание и устранение неполадок в работе FortiMail - FA-AN — Forti Analyzer Analyst
- Длительность: 1 день (8 часов)
 - Код курса: FA-AN
 - Стоимость
 - Очный формат: 362 000 ₸
 - Онлайн формат: 347 000 ₸
 
Описание курса
In this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products.
Objectives
After completing this course, you should be able to:
Understand basic FortiAnalyzer concepts and features
Describe the purpose of collecting and storing logs
View and search for logs in Log View and FortiView
Understand SOC features
Manage events and event handlers
Configure and analyze incidents
Perform threat hunting tasks
Understand outbreak alerts
Describe how reports function within ADOMs
Customize and create charts and datasets
Customize and run reports
Configure external storage for reports
Attach reports to incidents
Troubleshoot reports
Understand playbook concepts
Create and monitor playbooksPrerequisites
Familiarity with all topics presented in the FCP – FortiGate Security and FCP – FortiGate Infrastructure courses
Knowledge of SQL SELECT syntax is helpfulSystem Requirements
If you take the online format of this class, you must use a computer that has the following:
A high-speed Internet connection
An up-to-date web browser
A PDF viewer
Speakers or headphones
One of the following:
HTML 5 support
An up-to-date Java Runtime Environment (JRE) with Java Plugin enabled on your web browser
You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.Course Outline
Agenda
Introduction and Initial Access
Logging
Incidents and Events
Reports
Playbooks 
Juniper
- JL3VPNs — Junos Layer 3 VPNs
- Длительность: 3 дня (24 часа)
 - Код курса: JL3VPNs
 - Стоимость
 - Очный формат: 561 500 ₸
 - Онлайн формат: 547 000 ₸
 
Описание курса
Описание курса
Этот трехдневный курс был разработан для ознакомления слушателей с возможностями построения сетей L3 VPN (Layer 3 VPN) на основе технологии MPLS и соответствующими примерами настройки оборудования Juniper. Курс включает обзор концепций L3 VPN на основе MPLS, масштабирование сетей L3 VPN, интернет-доступ, межпровайдерские L3VPN, мультикаст для L3VPN. Курс также описывает характерные именно для операционной системы Junos виртуальные маршрутизаторы для L3 VPN. В лаборатории используется JunOS версии 16.1R3.10.
Примеры и лабораторные работы дают слушателям возможность приобрести опыт в настройке и мониторинге Junos и работы устройств.
Цели
After successfully completing this course, you should be able to:
Describe the value of MPLS VPNs.
Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs.
Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
List the provider-provisioned MPLS VPN features supported by the Junos OS software.
Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN.
Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers.
Describe the propagation of VPN routing information within an AS.
List the BGP design constraints to enable Layer 3 VPNs within a provider network.
Explain the operation of the Layer 3 VPN data plane within a provider network.
Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets.
Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities.
List the steps necessary for proper operation of a PE-CE dynamic routing protocol.
List the troubleshooting and monitoring techniques for routing instances.
Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance.
Monitor the operation of a CE-PE dynamic routing protocol.
Explain the operation of a PE multi-access interface in a Layer 3 VPN and list commands to modify that behavior.
Describe ways to support communication between sites attached to a common PE router.
Provision and troubleshoot hub-and-spoke Layer 3 VPNs,
Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN.
Describe QoS mechanisms available in L3VPNs.
Configure L3VPN over GRE tunnels.
Describe the RFC 4364 VPN options.
Describe the carrier-of-carriers model.
Configure the carrier-of-carriers and «Option C» configuration.
Describe the flow of control and data traffic in a draft-rosen multicast VPN.
Describe the configuration steps for establishing a draft-rosen multicast VPN.
Monitor and verify the operation of draft-rosen multicast VPNs.
Describe the flow of control traffic and data traffic in a next-generation multicast VPN.
Describe the configuration steps for establishing a next-generation multicast VPN.
Monitor and verify the operation of next-generation multicast VPNs.
Describe the flow of control traffic and data traffic when using MPVNs for Internet multicast.
Describe the configuration steps for enabling internet multicast using MVPNs.
Monitor and verify the operation of MVPN internet multicast.Требования
Это курс среднего уровня и предполагает понимание работы протоколов маршрутизации OSPF, IS-IS и BGP, политик маршрутизации, знания MPLS и его настройки в операционной системе Junos.
Слушатели должны предварительно прослушать курсы:
Вводный курс по операционной системе Junos (IJOS)
Маршрутизация в ОС Junos (JIR)
Основы MPLS в ОС Junos (JMF)Программа курса
День 1
Модуль 1: Введение
Модуль 2: Обзор VPN
Обзор VPN
VPN, реализуемые на оборудовании конечного пользователя
VPN, реализуемые на сети провайдераМодуль 3: VPN уровня 3
Терминология
Структура адреса VPN-IPv4
Дополнительные характеристики и параметрыМодуль 4: Базовая конфигурация VPN уровня 3
Подготовительные этапы конфигурации
Настройка PE-маршрутизатора
Лабораторная работа № 7: Настройка VPN уровня 3 со статической и BGP PE-CE маршрутизациейМодуль 5: Масштабирование VPN уровня 3 и обеспечение доступа в Интернет
Масштабирование VPN уровня 3
Обеспечение доступа в Интернет
Лабораторная работа № 8: Применение функции Route Reflector и обеспечение доступа в ИнтернетДень 2
Модуль 6: VPN уровня 3. Изучение вопросов повышенной сложности
Обмен маршрутами между VRF-таблицами
Топологии Hub-and-Spoke
Опции CoS в технологии VPN уровня 3
Интеграция VPN уровня 3 и GRE туннелирования
Интеграция VPN уровня 3 и IPsec
Egress Protection для VPN уровня 3
Лабораторная работа № 9: Интеграция VPN уровня 3 и GRE туннелированияМодуль 7: Организация VPN между провайдерами
Иерархические модели VPN
Модель «Провайдер для провайдеров» (Carrier-of-Carriers)
Применение Carrier-of-Carriers VPN
Лабораторная работа № 13: Carrier-of-Carriers VPNМодуль 8: VPN уровня 3. Поиск и устранение неисправностей
Базовый подход для поиска неисправностей
Использование ключа routing-instance
Трассировка с PE- и CE-маршрутизаторов
Просмотр VRF-таблиц и сигнализации на участке PE-PE
Мониторинг протоколов сигнализации на участке PE-CEМодуль 9: Групповое вещание в виртуальных частных сетях (Multicast VPNs)
Групповое вещание в виртуальных частных сетях. Обзор
Реализация группового вещания в виртуальных частных сетях
Конфигурирование
Мониторинг
Лабораторная работа (Optional) № 14: Конфигурирование и мониторинг Multicast VPN - JL2VPNs — Junos Layer 2 VPNs
- Длительность: 3 дня (24 часа)
 - Код курса: JL2VPNs
 - Стоимость
 - Очный формат: 561 500 ₸
 - Онлайн формат: 547 000 ₸
 
Описание курса
Описание курса
Этот двухдневный курс был разработан для ознакомления слушателей с возможностями построения сетей VPN 2 уровня (Layer 2 VPN, L2 VPN) на основе технологии MPLS и соответствующими примерами настройки оборудования Juniper. Курс включает обзор концепций L2 VPN на основе MPLS, таких как BGP L2 VPN, L2 LDP сети, автообнаружение с использованием опции 129 эквивалентных классов продвижения (Forwarding Equivalent Classes (FEC) 129) протокола BGP, службы виртуальных частных сетей (VPLS), Ethernet VPN (EVPN), L2 VPN между разными автономными системами. Курс также описывает характерные именно для операционной системы Junos виртуальные маршрутизаторы для L2 VPN, VPLS и EVPN. Примеры и лабораторные работы дают слушателям возможность приобрести опыт в настройке и мониторинге Junos и работы устройств.
Цели
After successfully completing this course, you should be able to:
Define the term virtual private network.
Describe the business drivers for MPLS VPNs.
Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs.
Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN.
Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN.
Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning.
Monitor and troubleshoot a BGP Layer 2 VPN.
Explain the BGP Layer 2 VPN scaling mechanisms and route reflection.
Describe the Junos OS BGP Layer 2 VPN CoS support.
Describe the flow of control and data traffic for an LDP Layer 2 circuit.
Configure an LDP Layer 2 circuit.
Monitor and troubleshoot an LDP Layer 2 circuit.
Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs.
Configure a FEC 129 BGP autodiscovery Layer 2 VPN.
Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs.
Describe the difference between Layer 2 MPLS VPNs and VPLS.
Explain the purpose of the PE device, the CE device, and the P device.
Explain the provisioning of CE and PE routers.
Describe the signaling process of VPLS.
Describe the learning and forwarding process of VPLS.
Describe the potential loops in a VPLS environment.
Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS.
Troubleshoot VPLS.
Describe the purpose and features of Ethernet VPN.
Configure Ethernet VPN.
Monitor and troubleshoot Ethernet VPN.
Describe the Junos OS support for hierarchical VPN models.
Describe the Junos OS support for Carrier-of-Carriers VPN Option C.
Configure the interprovider VPN Option C.
Describe the Junos OS support for multisegment pseudowire for FEC 129.
Describe and configure circuit cross-connect (CCC).Требования
Это курс среднего уровня и предполагает у слушателей понимания работы протоколов маршрутизации OSPF, IS-IS и BGP, политик маршрутизации, знания MPLS и его настройки в операционной системе Junos.
Слушатели должны предварительно прослушать курсы:Вводный курс по операционной системе Junos (V15) (IJOS)
Коммутация данных для операторов связи (JSPX)
Маршрутизация в ОС Junos (JIR)
Основы MPLS в ОС Junos (JMF)Программа курса
День 1
Модуль 1 Введение
Модуль 2: MPLS VPN
MPLS VPN
VPN на сети провайдераМодуль 3: VPN уровня 2 с применением протокола BGP
Обзор VPN уровня 2, реализуемых на сети провайдера
VPN уровня 2: описание работы плоскости управления (control plane)
VPN уровня 2: описание работы плоскости передачи данных (data plane)
Подготовительные этапы конфигурации
Конфигурирование VPN уровня 2 с применением протокола BGP
Мониторинг и устранение неисправностей VPN уровня 2
Лабораторная работа: VPN уровня 2 с применением протокола BGPМодуль 4: Масштабирование VPN уровня 2 и CoS
Обзор способов масштабирования
VPN уровня 2 и CoS
Лабораторная работа: Масштабирование VPN уровня 2Модуль 5: VPN уровня 2 с применением протокола LDP (LDP Layer 2 Circuits)
Описание работы VPN уровня 2 с применением протокола LDP
Конфигурирование VPN уровня 2 с применением протокола LDP
Мониторинг и устранение неисправностей VPN уровня 2
Работа автообнаружения с использованием FEC 129 BGP в сетях уровня 2
Настройка автообнаружения с использованием FEC 129 BGP в сетях уровня 2
Мониторинг и отладка автообнаружения с использованием FEC 129 BGP
Лабораторная работа: VPN уровня 2 с применением протокола LDP и автообнаружение с использованием FEC 129 BGP в сетях уровня 2День 2
Модуль 6: VPLS сервисы
Сравнение L2 MPLS VPN и VPLS
BGP VPLS, работа плоскости управления
BGP VPLS, работа плоскости передачи данных
Процесс изучения и процесс продвижения данных
Варианты появления петельМодуль 7: Конфигурирование VPLS
Конфигурирование VPLS
Поиск и устранение неисправностей VPLS
Лабораторная работа: VPLSМодуль 8: Ethernet VPN (EVPN)
Обзор EVPN
EVPN, работа плоскости управления
Функционирование EVPN
Настройка EVPN
Поиск и устранение неисправностей EVPN
Лабораторная работа: EVPNПриложение А: Организация VPN между провайдерами
Иерархические модели VPN
Модель «Провайдер для провайдеров» (Carrier-of-Carriers)
Применение Carrier-of-Carriers VPN
Мультисегментные псевдопроводаПриложение Б: Circuit Cross-Connect
Circuit Cross-Connect
Лабораторная работа: Circuit Cross-Connect (необязательная) - JMF — Junos MPLS Fundamentals
- Длительность: 2 дня (16 часов)
 - Код курса: JMF
 - Стоимость
 - Очный формат: 476 500 ₸
 - Онлайн формат: 441 000 ₸
 
Описание курса
Course Objectives
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco IOS Software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of transmission control protocol and the internet protocol (TCP/IP) and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP transport layer and application layer
Explore the functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement and verify virtual local area networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of open shortest path first (OSPF)
Explain how spanning tree protocol (STP) and rapid spanning tree protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic wide-area network (WAN) and virtual private network (VPN) concepts
Describe the operation of access control lists (ACLs) and their applications in the network
Configure internet access using dynamic host configuration protocol (DHCP) clients and explain and configure network address translation (NAT) on Cisco routers
Describe the basic quality of service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC
Describe network and device architectures and introduce virtualization
Explain software-defined networks
Configure basic Cisco IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Discuss the need of network programmability in Enterprise networks, common programmability protocols, and configuration management tools
Describe AI and ML in network operationsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Basic IP address knowledge
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco IOS Software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of transmission control protocol and the internet protocol (TCP/IP) and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP transport layer and application layer
Explore the functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement and verify virtual local area networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of open shortest path first (OSPF)
Explain how spanning tree protocol (STP) and rapid spanning tree protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic wide-area network (WAN) and virtual private network (VPN) concepts
Describe the operation of access control lists (ACLs) and their applications in the network
Configure internet access using dynamic host configuration protocol (DHCP) clients and explain and configure network address translation (NAT) on Cisco routers
Describe the basic quality of service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC
Describe network and device architectures and introduce virtualization
Explain software-defined networks
Configure basic Cisco IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Discuss the need of network programmability in Enterprise networks, common programmability protocols, and configuration management tools
Describe AI and ML in network operationsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Basic IP address knowledgeCourse Outline:
Exploring the Functions of Networking
Introducing the Host-To-Host Communications Model
Operating Cisco IOS Software
Introducing LANs
Exploring the TCP/IP Link Layer
Starting a Switch
Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets
Explaining the TCP/IP Transport Layer and Application Layer
Exploring the Functions of Routing
Configuring a Cisco Router
Exploring the Packet Delivery Process
Troubleshooting a Simple Network
Introducing Basic IPv6
Configuring Static Routing
Implementing VLANs and Trunks
Routing Between VLANs
Introducing OSPF
Building Redundant Switched Topologies
Improving Redundant Switched Topologies with EtherChannel
Explaining the Basics of ACL
Enabling Internet Connectivity
Introducing AI and ML in Network Operations
Introducing System Monitoring
Managing Cisco Devices
Securing Administrative Access
Implementing Device Hardening
Exploring Layer 3 Redundancy
Introducing WAN Technologies
Introducing QoS
Explaining Wireless Fundamentals
Introducing Architectures and Virtualization
Explaining Software-Defined Networking
Introducing Network Programmability
Examining the Security Threat Landscape
Implementing Threat Defense TechnologiesLab Outline
Get Started with Cisco CLI
Observe How a Switch Operates
Perform Basic Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure IPv6 Static Routes
Configure VLANs and Trunks
Configure Inter-VLAN Routing
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Configure and Verify IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and PAT
Configure and Verify NTP
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Configure and Verify Port Security - IJOS — Вводный курс по операционной системе JUNOS v1.5
- Длительность: 2 дня (16 часа)
 - Код курса: IJOS
 - Стоимость
 - Очный формат: 476 500 ₸
 - Онлайн формат: 441 000 ₸
 
Описание курса
Аннотация
Курс дает слушателям базовые знания, необходимые для работы с операционной системой Junos. Курс содержит краткий обзор семейств устройств, работающих под управлением операционной системы Junos, и особенностей их архитектуры. Основные темы курса включают работу с интерфейсом пользователя с упором на командную строку, базовую настройку системы, настройку интерфейсов с рабочими примерами, настройку дополнительных параметров, а также основы мониторинга и технического обслуживания устройств. Далее следует описание основ маршрутизации, политики маршрутизации и фаервольных фильтров, сопровождаемое примерами использования.
Содержание курса:
Модуль 1: Введение
Модуль 2: Основы операционной системы Junos
Операционная система Junos
Процесс обработки трафика
Обзор платформ JunosМодуль 3: Основы пользовательского интерфейса
Опции пользовательского интерфейса
Основы работы в командной строке
Командная строка, режим Operational
Командная строка, режим Configuration
Лабораторная работа №1: Работа в командной строкеМодуль 4: Начальная настройка
Настройка Factory-Default
Начальная настройка
Настройка интерфейсов
Лабораторная работа №2: Начальная настройка оборудованияМодуль 5: Вторичная конфигурация системы
Настройка пользователей и аутентификация
Мониторинг и запись лог-файлов
Протокол NTP
Архивация конфигурации
Протокол SNMP
Лабораторная работа №3: Вторичная конфигурация системыМодуль 6: Мониторинг и техническое обслуживание
Мониторинг платформ и функционирование интерфейсов
Сетевые утилиты
Защита программного обеспечения JUNOS
Восстановление пароля
Очистка системы
Лабораторная работа №4: Эксплуатационный мониторинг системыМодуль 7: Примеры настройки интерфейсов
Обзор иерархии интерфейсов
Примеры настройки интерфейсов
Использование групп для настройкиМодуль 8: J-Web интерфейс
Графическая система управления J-Web
Настройка интерфейса
Лабораторная работа №5: Интерфейс J-WebМодуль 9: Основы маршрутизации
Концепция маршрутизации, основы маршрутизации
Таблицы маршрутизации
Концепция виртуальных маршрутизаторов (Routing Instances)
Статическая маршрутизация
Динамическая маршрутизация
Лабораторная работа №6: Основы маршрутизацииМодуль 10: Политики маршрутизации
Обзор политик маршрутизации
Политики маршрутизации на конкретных примерах
Лабораторная работа №7: Политики маршрутизацииМодуль 11: Использование фильтров (Firewall Filters)
Обзор настройки и применения фильтров
Примеры использования фильтров
Использование проверки «Unicast Reverse-Path-Forwarding»
Лабораторная работа №8: Конфигурирование фильтровМодуль 12: Классы обслуживания
Обзор классов обслуживания
Классификация трафика
Процесс постановки трафика в очередь
Распределение трафика
Классы обслуживания на конкретных примерах
Лабораторная работа №9: Класс обслуживания - JIR — Маршрутизация в ОС JUNOS
- Длительность: 2 дня (16 часов)
 - Код курса: JIR
 - Стоимость
 - Очный формат: 476 500 ₸
 - Онлайн формат: 441 000 ₸
 
Описание курса
Кому следует посетить:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и техническим обслуживанием устройств, работающих под программным обеспечением JUNOS.
Сертификации
Этот курс является частью следующих программ сертификаций:
Juniper Networks Certified Internet Specialist Enterprise Routing & Switching (JNCIS-ENT)
Juniper Networks Certified Internet Specialist Service Provider Routing & Switching (JNCIS-SP)
Предварительные требования
Слушатели должны понимать базовые принципы работы протоколов TCP/IP и маршрутизации и посетить курсы Introduction to JUNOS Software (IJS) and JUNOS Routing Essentials (JRE).Цели курса:
Настраивать статические, агрегированные и генерированные маршруты
Настраивать и использовать routing instances
Конфигурировать балансировку маршрутов.
Конфигурировать маршрутизацию на основе фильтров
Понимать логику работы OSPF.
Конфигурировать и отлаживать OSPF
Понимать логику работы BGP
Конфигурировать и настраивать BGP
Понимать концепцию IP tunneling
Конфигурировать и отлаживать GRE и туннели IP-IP
Понимать и настраивать различные возможности высокой доступности (high availability)Содержание курса:
2-дневный курс JIR дает знания о процессе маршрутизации и рассматривает примеры конфигурации. Основными темами курса являются статическая маршрутизация, балансировка нагрузки, изменение процесса обработки трафика при помощи фильтров, протоколы маршрутизации OSPF и BGP, туннелирование IP-трафика и обеспечение надежности. Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения JUNOS, получат навыки контроля за работой оборудования.
Программа курса:
Модуль 1: Введение
Модуль 2: Статическая маршрутизация
Статические маршруты
Суммаризирующие агрегатные маршруты
Суммаризирующие генерированные маршруты
Немаршрутизируемые адресы
Концепция виртуальных маршрутизаторов
Лабораторная работа №1: Статическая маршрутизацияМодуль 3: Балансировка нагрузки и фильтрация трафика
Методы балансировки нагрузки
Настройка и мониторинг балансировки
Изменение процесса обработки трафика при помощи фильтров
Настройка и мониторинг фильтров
Лабораторная работа №3: Балансировка нагрузки и фильтрация трафикаМодуль 4: Протокол OSPF
Обзор протокола OSPF
Процесс формирования соседства и выбор ведущего маршрутизатора
Обеспечение масштабируемости протокола OSPF
Настройка и мониторинг протокола OSPF
Лабораторная работа №4: Протокол OSPFМодуль 5: Протокол BGP
Обзор протокола BGP
Атрибуты протокола BGP
IBGP и EBGP
Настройка и мониторинг протокола BGP
Лабораторная работа №4: Протокол BGPМодуль 6: Туннелирование IP-трафика
Обзор туннелирования
Туннели GRE и IP-IP
Построение туннелей GRE и IP-IP
Лабораторная работа №5: Туннелирование IP-трафикаМодуль 7: Обеспечение надежности
Обзор обеспечения надежности сетей
Переключение на запасной RE
Обеспечение непрерывной работы маршрутизатора
Протокол BFD
Протокол VRRP
Лабораторная работа №5: Обеспечение надежностиПриложение А: IPv6
Введение в IPv6
Примеры конфигурации
Туннелирование IPv6 поверх IPv4Приложение Б: Протокол IS-IS
Обзор протокола IS-IS
Обзор протокольных сообщений IS-IS
Процесс формирования соседства и выбор ведущего маршрутизатора
Настройка и мониторинг протокола IS-IS - JEX-ELS — Управление коммутаторами для предприятий на ОС Junos c поддержкой ELS
- Длительность: 2 дня (16 часов)
 - Код курса: JEX-ELS
 - Стоимость
 - Очный формат: 476 500 ₸
 - Онлайн формат: 441 000 ₸
 
Описание курса
Предварительные требования:
Слушатели должны понимать базовые принципы работы протоколов TCP/IP и посетить курсы Introduction to Junos Software (IJOS) и Junos Routing Essentials (JRE).
Описание курса:
Двухдневный курс JEX-ELS дает знания о процессе коммутации данных и рассматривает примеры конфигурации для EX-платформ с программным обеспечением Junos Enhanced Layer 2 Software. Основными темами курса являются обзор принципов коммутации, виртуальные локальные вычислительные сети (VLAN), протокол STP, функции по обеспечению безопасности портов и коммутатора, способы реализации надежности. Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения Junos, получат навыки контроля за работой оборудования. Данный курс базируется на версии 13.2X51-D20.3.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и техническим обслуживанием коммутаторов EX-серии c программным обеспечением Junos Enhanced Layer 2 Software, начиная с версии 13.2X50.
Программа курса:
Модуль 1: Введение
Модуль 2: Коммутация на канальном уровне
Основы прозрачной коммутации Ethernet (Ethernet Bridging)
Разбор терминологии и дизайна сети
Обзор коммутаторов для предприятий
Активирование и мониторинг коммутации на канальном уровне
Лабораторная работа № 1: Ввод в эксплуатацию коммутаторов канального уровня.Модуль 3: Виртуальные локальные компьютерные сети (VLAN)
Обзор виртуальных локальных компьютерных сетей (VLAN)
Настройка и мониторинг VLAN
Голосовые VLAN (Voice VLAN)
Нетегированные VLAN (Native VLAN)
Маршрутизируемые VLAN-интерфейсы (RVI)
Лабораторная работа № 2: Настройка и мониторинг VLAN.Модуль 4: Виртуализация с использованием Routing Instances
Виртуализация с использованием Routing Instances. Обзор
Настройка и мониторинг виртуальных коммутаторов.Модуль 5: Механизм Spanning Tree
Протокол Spanning Tree (STP)
Протокол RSTP
Настройка и мониторинг протоколов STP и RSTP
Защитные функции (BPDU Protection, Loop Protection, Root Protection)
Лабораторная работа № 3: Протокол RSTP и защитные функции.Модуль 6: Обеспечение защиты порта
Ограничение количества MAC-адресов
Запоминание MAC-адресов
DHCP Snooping
Защита от атак с использованием протокола ARP (Dynamic ARP Inspection)
Функция IP Source Guard
Лабораторная работа № 4: Включение защитных функций порта.Модуль 7: Фильтры и защита коммутатора
Защита от широковещательного шторма (Storm Control)
Настройка фильтров
Лабораторная работа № 5: Включение защитных функций коммутатора и настройка фильтров.Модуль 8: Виртуальное шасси (Virtual Chassis)
Виртуальное шасси. Обзор
Настройка и мониторинг работы коммутаторов, собранных в виртуальное шасси
Лабораторная работа № 6: Настройка виртуального шасси.Модуль 9: Обеспечение надежности
Обзор функционала
Агрегированные каналы (LAGs)
Redundant Trunk Groups (RTG)
Переключение активного Routing Engine (GRES)
Непрерывная маршрутизация (NSR)
Непрерывная коммутация (NSB)
Лабораторная работа № 7: Внедрение функционала обеспечения надежности
Приложение А: Механизм защиты от петель в кольце (Ethernet Ring Protection)Обзор механизма Ring Protection
Настройка и мониторинг механизма Ring Protection
Приложение Б: Протокол MSTPОбзор протокола MSTP
Настройка и мониторинг протокола MSTP. - JSEC — Программное обеспечение JUNOS для оборудования безопасности
- Длительность: 5 дней (40 часов)
 - Код курса: JSEC
 - Стоимость
 - Очный формат: 661 500 ₸
 - Онлайн формат: 647 500 ₸
 
Описание курса
Описание курса:
5-дневный курс JSEC посвящен изучению внедрения, настройки и функционирования оборудования семейства SRX в типичном сетевом окружении. Основные темы курса включают настройку зон безопасности, политик безопасности, механизмов обнаружения вторжений (IDP), адресной трансляции и отказоустойчивых кластерных конфигураций, а также подробности базовых действий по настройке, управлению и внедрению оборудования. Кроме того, курс описывает возможности централизованного управления с помощью Junos Space и Security Director. Данный курс включает в себя практические занятия, в процессе выполнения которых слушатели приобретут навыки настройки и мониторинга оборудования безопасности на программном обеспечении Junos OS.
Целевая аудитория:
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки, инженерам предпродажной поддержки и другим специалистам, работающим с оборудованием обеспечения безопасности семейства SRX.
Минимальные требования:
Данный курс предполагает наличие у слушателей базовых знаний сетевых технологий, модели OSI и стека TCP/IP. Слушатели должны также пройти курс IJOS или иметь эквивалентный опыт по работе с операционной системой JUNOS.
Содержание курса:
Модуль 1: Введение
Модуль 2: Введение в систему безопасности Junos
Традиционная маршрутизация и традиционное обеспечение безопасности
Архитектура программного обеспечения Junos OS. обзор оборудования
Прохождение пакета через устройство Junos, операции над пакетом
Обзор программ Junos Space и Security DirectorМодуль 3: Зоны (Zones) и защита на 3-4 уровне (Screen Options)
Формулировка понятия зоны
Конфигурация зоны
Мониторинг зон
Настройка Screen Options, примеры применения
Лабораторная работа №1: Настройка зон и Screen OptionsМодуль 4: Политики безопасности
Обзор политик безопасности
Компоненты политик
Конкретные примеры политик безопасности
Лабораторная работа №2: Политики безопасностиМодуль 5: Настройка политик в Security Director
Настройка политик
Порядок применения политик
Развертывание готовых политик
Мониторинг политик
Лабораторная работа №3: Настройка политик в Security DirectorМодуль 6: Дополнительные настройки политик
Управление сессиями
Настройка ALG
Создание и применение расписаний
Логирование
Применение Security Director для дополнительных настроек
Лабораторная работа №4: Дополнительные настройки политикМодуль 7: Отладка настройки зон и политик
Общая отладка устройств Junos
Инструменты отладки
Отладка настойки и работы зон и политик
Примеры применения механизмов отладки
Лабораторная работа №5: Отладка зон и политикМодуль 8: Трансляция адресов (NAT)
Обзор механизмов трансляции
Трансляция адреса источника. Описание работы и настройка
Трансляция адреса получателя. Описание работы и настройка
Статическая трансляция. Описание работы и настройка
Proxy ARP
Настройка адресной трансляции через Security Director
Лабораторная работа №6: Трансляция адресовМодуль 9: Дополнительные настройки адресной трансляции
Persistent NAT
Обработка DNS запросов (DNS Doctoring)
Трансляция IPv6 адресов
Нестандартные сценарии NAT
Отладка работы адресной трансляции
Лабораторная работа №7: Дополнительные настройки адресной трансляцииМодуль 10: Основы виртуальных частных сетей на основе протокола IPsec (IPsec VPNs)
Типы виртуальных частных сетей
Требования к безопасности виртуальных частных сетей
Построение туннеля IPsec
Обработка трафика в туннеле IPsecМодуль 11: Реализация туннелей IPsec
Настройка IPsec
Примеры настроек туннелей
Выбор Proxy ID
Мониторинг туннелей
Лабораторная работа №8: Построение туннеля IPsecМодуль 12: Hub-and-Spoke VPN
Обзор технологии Hub-and-Spoke
Настройка и мониторинг Hub-and-Spoke туннелей
Настройка Hub-and-Spoke с помощью Security Director
Лабораторная работа №9: Построение Hub-and-Spoke VPNМодуль 13: Групповые VPN (Group VPN)
Обзор групповых VPN
Настройка и мониторинг групповых VPN
Лабораторная работа №10: Построение групповой VPNМодуль 14: PKI и VPN с автообнаружением (AutoDiscovery VPN(ADVPN)
Концепции PKI
Обзор ADVPV
Настройка и мониторинг ADVPN
Лабораторная работа №11: Развертывание PKI и ADVPNМодуль 15: Углубленные настройки VPN
Использование адресной трансляции в VPN
Настройка классов обслуживания в VPN
Рекомендации по работе в сети предприятия
Использование OSPF в VPN
Настройка VPN в случае перекрывающихся диапазонов адресов
Построение VPN для шлюза с динамическим адресом
Лабораторная работа №12: Сложные сценарии построения VPNМодуль 16: Отладка работы VPN
Обзор механизмов отладки
Отладка функционирования фаз 1 и 2
Логирование работы IPsec
Примеры отладки IPsec
Лабораторная работа №13: Отладка IPsecМодуль 17: Теория построения отказоустойчивого кластера
Обзор кластера
Компоненты кластера
Рассмотрение работы кластераМодуль 18: Практика построения отказоустойчивого кластера
Настройка кластера
Углубленные параметры настройки кластера
Лабораторная работа №14: Построение отказоустойчивого кластераМодуль 19: Отладка работы кластера
Приемы отладки работы кластера
Примеры применения инструментов отладки кластера
Лабораторная работа №15: Отладка работы кластераПриложение А: Оборудование семейства SRX и типы интерфейсов
Обзор платформ младшего уровня (Branch)
Обзор платформ старшего уровня (High End)
Прохождение трафика через устройства семейства SRX
ИнтерфейсыПриложение Б: Виртуальные SRX
Обзор виртуализации
Виртуализация сетей и SDN
Обзор виртуальных SRX
Сценарии развертывания
Интеграция с облаком AWS - JSB — Учебный курс для подготовки к экзамену JNCIE-SEC
- Длительность: 5 дней (40 часов)
 - Код курса: JSB
 - Стоимость
 - Очный формат: 661 500 ₸
 - Онлайн формат: 647 500 ₸
 
Описание курса
Предварительные требования:
Для прохождения данного курса слушатели должны иметь сертификат JNCIP-SEC или обладать эквивалентными знаниями и навыками.
Описание курса:
Этот пятидневный курс разработан для подготовки к экзамену Juniper Network Certified Internet Expert – Security (JNCIE-SEC). В курсе освещаются особенности экзаменационных заданий и даются советы, полезные будущим экзаменующимся. Особенное внимание уделяется практическим заданиям, представляющим собой набор лабораторных работ с ограничениями по времени выполнения. В последний день курса слушатели выполняют шестичасовую лабораторную работу, имитирующую тестовые задания и ситуацию реального экзамена.
Для кого предназначен курс:
Курс предназначен для тех, кто обладает глубокими знаниями по сетевой безопасности уровня предприятия и нуждается в рекомендациях и практических упражнениях для подготовки к экзамену JNCIE-SEC.
Программа курса:
Модуль 1: Введение
Модуль 2: Экзаменационная стратегия
Подготовка к экзамену
Сдача экзамена
Завершение экзамена.Модуль 3: Концепции инфраструктуры
Темы разделов
Системные задачи
Зоны
Особенности и советы
Лабораторная работа №1: Инфраструктура и зоны.Модуль 4: Построение кластеров
Настройка кластеризации
Redundancy группы и Reth интерфейсы
Обработка сбоев
Особенности и советы
Лабораторная работа №2: Построение кластеров.Модуль 5: Политики безопасности
Политики безопасности
ALG
Работа политик по расписанию
Аутентификация пользователей
Пропуск трафика в пакетном режиме
Файлы регистрации
Особенности и советы
Лабораторная работа №3: Построение политик безопасности.Модуль 6: IPsec VPN
Обзор настроек VPN
Наборы предложений, политики и шлюзы IKE
Наборы предложений, политики и туннели IPsec
Различные типы туннелей — динамические, основанные на маршрутизации, с использованием сертификатов
Отладка построения туннелей
Особенности и советы
Лабораторная работа №4: Построение IPsec VPN.Модуль 7: Трансляция адресов
Использование трансляции адресов
Трансляция адреса источника
Трансляция адреса получателя
Статическая трансляция
Пересекающиеся диапазоны адресов
Команды проверки и общие проблемы трансляции
Лабораторная работа №5: Трансляция адресов.Модуль 8: Предотвращение атак
Обзор механизмов предотвращения атак
IDP
Дополнительные возможности по предотвращению атак
Особенности и советы
Лабораторная работа №6: Предотвращение атак.Модуль 9: Унифицированное управление защитой от угроз (UTM) и опции SCREEN
Обзор механизмов UTM
Фильтрация WEB-адресов
Антивирус
Опции SCREEN
Лабораторная работа №7: Унифицированное управление защитой от угроз и опции SCREEN.Модуль 10: Дополнительные возможности развертывания
Прозрачный режим
Продвижение на основе правил (Filter-Based Forwarding)
Лабораторная работа №8: Дополнительные возможности развертыванияИмитация экзамена JNCIE-SEC.
 - AJS — Углубленное изучение ОС JUNOS для оборудования безопасности
- Длительность: 5 дней (40 часов)
 - Код курса: AJS
 - Стоимость
 - Очный формат: 661 500 ₸
 - Онлайн формат: 647 500 ₸
 
Описание курса
Предварительные требования:
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и другим специалистам, работающим с оборудованием обеспечения безопасности под программным обеспечением Junos.
Описание курса:
5-дневный курс AJSEC является продолжением курса JSEC и посвящен углубленному изучению функционала безопасности ОС Junos. В курсе изучается оборудование SRX-серии и рассматриваются темы виртуализации, улучшенной защиты от угроз Sky ATP, безопасности приложений (AppSecure), обеспечения надежности, внедрения IPsec, NAT и реализации безопасности на канальном уровне.
Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели приобретут навыки работы с оборудованием безопасности, изучат основные принципы настройки и мониторинга оборудования безопасности на программном обеспечении Junos.
Для кого предназначен курс:
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и другим специалистам, работающим с оборудованием обеспечения безопасности под программным обеспечением Junos.
Программа курса:
Модуль 1: Введение
Модуль 2: Обработка пакетов и безопасность на канальном уровне
Безопасность в «прозрачном режиме» (Transparent Mode)
Secure Wire
Коммутация на канальном уровне
MACsec
Лабораторная работа №1: Применение механизмов безопасности на канальном уровне.Модуль 3: Виртуализация
Обзор механизмов виртуализации
Виртуальные маршрутизаторы (Routing Instances)
Логические системы (Logical Systems)
Лабораторная работа №2: Настройка виртуальных маршрутизаторов.Модуль 4: Теоретические основы обеспечения безопасности приложений (AppSecure)
Обзор технологии AppSecure
Основы опознавания приложений (AppID)
Технология AppID
Кэш приложений (Application System Cache)
Создание собственных сигнатур приложений.Модуль 5: Использование AppSecure
Отслеживание трафика приложений (AppTrack)
Разрешение и запрет приложений (AppFW)
Реализация QoS для приложений (AppQoS)
Маршрутизация в зависимости от приложения (APBR)
Работа в режиме SSL Proxy
Лабораторная работа № 3: Применение AppSecure.Модуль 6: Работа с системой Log Director
Обзор системы Log Director
Компоненты Log Director
Инсталляция и настройка Log Director
Кластеризация с виртуальной машиной Log Concentrator
Администрирование Log Director
Лабораторная работа №4: Развертывание Log Director.Модуль 7: Теоретические основы Sky ATP
Обзор Sky ATP
Мониторинг Sky ATP
Анализ и обнаружение вредоносного кода.Модуль 8: Применение Sky ATP
Настройка Sky ATP
Инсталляция Sky ATP
Анализ и детектирование вредоносного кода
Пример исследования зараженного хоста
Лабораторная работа №5: Демонстрация инструктором возможностей Sky ATP.Модуль 9: Развертывание UTM
Обзор UTM
Модуль AntiSpam
Работа с антивирусом
Фильтрация содержимого сессий и URL
Лабораторная работа №6: Применение UTM.Модуль 10: Введение в технологию IPS
Обзор IPS
Защита компонентов сети
Методы проникновения атак в сеть
Защита от проникновения
Последовательность действий по обнаружению вторжений.Модуль 11: Политики и настройки IPS
Требования в устройствам SRX для инсталляции IPS
Режимы работы IPS
Базовый обзор системы IPS
Функционирование базы правил IPS
Лабораторная работа №7: Развертывание базовой политики IPS.Модуль 12: Software-Defined Security Networks (SDSN)
Обзор SDSN
Компоненты SDSN
Настройка SDSN
Отладка работы системы Policy Enforcer
Примеры настройки SDSN
Лабораторная работа №8: Внедрение SDSN.Модуль 13: Применение политики, мониторинг и построение отчетов
Обзор механизмов аутентификации пользователей, в том числе интегрированной
Развертывание межсетевого экрана с аутентификацией пользователей
Мониторинг аутентификации
Развертывание интегрированной аутентификации
Мониторинг интегрированной аутентификации
Лабораторная работа №9: Настройка механизмов аутентификации.Модуль 14: Поиск и устранение неисправностей в настройках безопасности ОС Junos
Методология поиска и устранения неисправностей
Средства поиска и устранения неисправностей
Отладка построения IPsec туннелей
Лабораторная работа №10: Выполнение поиска и устранения неисправностей в настройках безопасности
Приложение А: Оборудование SRX-серии и типы интерфейсовОбзор платформ младшего уровня (Branch)
Обзор платформ старшего уровня (High End)
Прохождение трафика через устройства семейства SRX
Интерфейсы. - JAUT — Junos Automation
- Длительность: 4 дня (32 часа)
 - Код курса: JAUT
 - Стоимость
 - Очный формат: 623 000 ₸
 - Онлайн формат: 608 000 ₸
 
Описание курса
Предварительные требования:
Слушатели должны иметь базовые знания в области сетей передачи данных, а также знания по операционной системе JUNOS в рамках курсов Introduction to the Junos Operating System (IJOS) и Junos Routing Essentials (JRE). Также рекомендуется знакомство с каким-либо из языков программирования, таким как C, C++, Perl, Java.
Цели курса:
Это курс среднего уровня сложности. После успешного окончания курса слушатели получат следующие знания и навыки:
Преимущества автоматизации Junos
Разница между commit, op, и event скриптами
Формат документа XML
Использование XML в Junos в операционном и конфигурационном режимах
Взаимодействие скриптов с XML
Структура скрипта SLAX
Переменные SLAX и контроль выполнения
Создание и тест SLAX-скриптов
Функции расширения Junos
Использование commit скриптов для изменения конфигурации
Использование commit скриптов для вывода сообщений и проверки конфигурации
Настройка и подключение commit скриптов
Использование op скриптов
Определение аргументов и вызов команд операционного режима
Использование op скриптов для изменения конфигурации
Настройка op скриптов
Политики и скрипты, выполняемые по событию (event)
Настройка event скриптов.Описание курса:
Этот курс спроектирован с целью дать слушателям знания и практические навыки, необходимые для разработки сценариев (скриптов) при работе с ОС Junos. Курс содержит обзор языков Extensible Markup Language (XML) и Stylesheet Language Alternative Syntax (SLAX), шаблонов и библиотек Junos, и скриптов трех видов: commit, operation и event. Благодаря подробному изложению теоретического материала и большому количеству лабораторных работ, слушатели получат достаточный для практической работы опыт создания скриптов и автоматизации JunOS.
Для кого предназначен курс:
Для специалистов операторов связи.
Программа курса:
Глава 1: Введение
Глава 2: Основы автоматизации
Обзор
Введение в commit, op, и event скрипты
Решения по автоматизации.Глава 3: XML
Обзор XML
XML в Junos
XML в скриптах
Лабораторная работа 1.Глава 4: SLAX
Введение в SLAX
Шаблоны
XML-тэги
Переменные
Контроль выполнения в SLAX
Структура скрипта
Дополнительные ссылки
Лабораторная работа 2.Глава 5: Библиотека функций Junos
Функции расширения Junos
Логические функции
Манипулирование данными
Ввод-вывод
Утилиты
Аргументы
Лабораторная работа 3.Глава 6: Commit-скрипты
Введение
Внесение изменений в конфигурацию
Вывод сообщений об ошибках
Собственные настройки в конфигурации
Настройка и подключение commit скриптов
Лабораторная работа 4.Глава 7: Op-скрипты
Введение
Простой пример
Аргументы
Вызов команд операционного режима
Вывод
Использование op скриптов для изменения конфигурации
Настройка скриптов
Лабораторная работа 5.Глава 8: Event-скрипты
Введение
Обработка событий
Event policy
Написание event-скриптов
Лабораторная работа 6
Дополнение А: XSLTВведение в XSLT
Шаблоны
Контроль выполнения в XSLT
Структура скрипта в XSLT
Дополнительные сcылки. - JSM — Junos Subscriber Management
Описание курса
Предварительные требования:
Слушатели должны иметь твердые знания сетевых технологий и концепции широкополосного доступа, уметь управлять маршрутизаторами на операционной системе Junos через интерфейс командной строки и посетить курс IJOS. Вводный курс по операционной системе JUNOS (IJOS).
Описание курса:
3-дневный курс JSM дает знания, необходимые для настройки и управления широкополосным абонентским доступом на устройствах с операционной системой Junos. В курсе изучается конфигурирование основных компонентов широкополосного доступа: AAA (authentication, authorization and accounting), приложений DHCP local server и DHCP relay/proxy agent, протокола PPP, профилей автоматической настройки (Dynamic profiles), абонентских интерфейсов и адресации, сервиса Layer 3 and Layer2 wholesale, внедрение фильтров защиты, функционала CoS и multicast-сервиса через профили автоматической настройки.
Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга приложений широкополосного доступа в маршрутизаторах MX-серии.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой и мониторингом приложений широкополосного доступа в маршрутизаторах MX-серии на операционной системе Junos.
Программа курса:
Модуль 1: Введение
Модуль 2: Концепция широкополосного доступа
Обзор используемых терминов
Концепция и дизайн сети
Компоненты, используемые при конфигурации, и порядок взаимодействия с серверами
Требуемые лицензии.Модуль 3: Организация и управление доступом абонентов
Обзор тематики
Сервисы AAA
Приложение Extended DHCP Local Server
Приложение Extended DHCP Relay
Назначение адреса абоненту
Организация доступа с применением протокола L2TP
Лабораторная работа №1: Организация и управление доступом абонентов.Модуль 4: Создание абонентских интерфейсов и профилей автоматической настройки (Dynamic Profiles)
Обзор интерфейсов и их идентификации в операционной системе Junos
Варианты настройки VLAN
Профили автоматической настройки (Dynamic Profiles)
Статический и динамический способы создания абонентских интерфейсов
Средства мониторинга и устранения неисправностей
Лабораторная работа №2: Конфигурирование интерфейсов и профилей автоматической настройки.Модуль 5: Использование протокола PPPoE для организации абонентского доступа
Обзор протокола PPPoE
Использование протокола PPPoE для автоматического создания интерфейсов (Dynamic PPPoE)
Конфигурация Dynamic PPPoE
Автоматическое создание интерфейсов с применением сервисных таблиц (PPPoE Service Name Tables)
Лабораторная работа №3: Организация абонентского доступа с применением протокола PPPoE.Модуль 6: Сервисы Layer 3 and Layer2 wholesale
Обзор сервисов Wholesale
Layer 3 DHCP Wholesale
Layer 3 PPPoE Wholesale
Layer 2 Wholesale
Лабораторная работа №4: Конфигурирование Layer 3 Wholesale сервиса.Модуль 7: Применение фильтров защиты через профили автоматической настройки
Обзор функционала фильтрации трафика
Внедрение фильтров защиты через профили автоматической настройки
Мониторинг работы фильтров и просмотр счетчиков
Лабораторная работа №5: Конфигурирование и применение фильтров защиты.Модуль 8: Внедрение функционала CoS через профили автоматической настройки
Обзор функционала CoS (Class of Service)
Классификация трафика, распределение ресурсов между очередями
Варианты внедрения CoS для абонента
Средства мониторинга и устранения неисправностей
Лабораторная работа №6: Конфигурирование CoS для абонента.Модуль 9: Внедрение multicast-сервиса через профили автоматической настройки
Обзор протокола IGMP
Внедрение multicast-сервиса через профили автоматической настройки
Мониторинг multicast-сервиса и протокола IGMP
Лабораторная работа №7: Конфигурирование multicast-сервиса через профили автоматической настройки
Приложение А: Протокол ANCP (Access Node Control Protocol)
Обзор протокола ANCP
Настройка протокола ANCP
Мониторинг протокола ANCP. - IPV6 — Junos IP version 6
- Длительность: 2 дня (16 часов)
 - Код курса: IPV6
 - Стоимость
 - Очный формат: 476 500 ₸
 - Онлайн формат: 441 000 ₸
 
Описание курса
Предварительные требования:
Intermediate-level of networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite.
Attend the IJOS. Вводный курс по операционной системе JUNOS (IJOS), the JRE. Программное обеспечение JUNOS. Основные вопросы маршрутизации (JRE), and the JIR. Маршрутизация в ОС JUNOS (JIR) courses prior to attending this class.Цели курса:
After successfully completing this course, you should be able to:
Describe the similarities and differences between IP version 4 (IPv4) and IPv6.
Explain the different extension headers and their uses.
Identify the different IPv6 address types.
Explain the IPv6 neighbor discovery process.
Describe the maximum transmission unit (MTU) discovery process.
Configure and monitor the Virtual Router Redundancy Protocol (VRRP).
Define the routing tables used for IPv6 routing.
Explain and configure static, aggregated, and generated IPv6 routes.
Identify and explain IPv6 firewall filters.
Describe and implement OSPFv3 routing.
Explain and configure IPv6 networks using IS-IS.
Describe and implement BGP peering sessions using IPv6.
Identify the different transition methods.
Explain concepts for using dual stack.
Explain and identify the different methods for tunneling IPv6 traffic.
Describe a basic troubleshooting method.
Identify and explain common operational mode commands used for troubleshooting IPv6 problems.
Explain protocol enhancements in Routing Information Protocol next generation (RIPng).
Describe and configure RIPng.Описание курса:
This two-day course provides detailed coverage of IP version 6 (IPv6) operations including Neighbor Discovery, ICMPv6, IPv6 protocol independent routing, OSPFv3, IS-IS, BGP, RIPng, transitions methods, and troubleshooting methodology and commands supported by the Junos operating system.
Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the Junos operating system and in monitoring device and IPv6 protocol operations. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1R1.9.
Для кого предназначен курс:
This course benefits individuals responsible for configuring and monitoring IPv6 in the Junos OS.
Программа курса:
Chapter 1: Course Introduction
Chapter 2: Introduction to IPv6 Addressing
Comparing IPv4 and IPv6
Extension Headers
IPv6 Address
Subnetting
Interface Configuration
Lab 1: Configuring IPv6 Interfaces.Chapter 3: IPv6 Protocol and Services
ICMPv6 Overview
Neighbor Discovery
MTU Discovery
VRRP
DHCPv6
DNS
Lab 2: Configuring IPv6 Services.Chapter 4: Protocol Independent Routing and Filters
IPv6 Routing Tables
Protocol Independent Routing
Firewall Filters
Lab 3: Configuring Protocol Independent Routing.Chapter 5: OSPFv3
OSPFv3 Overview
OSPFv3 Configuration
Lab 4: Configuring OSPFv3Chapter 6: IS-IS
IS-IS Overview
IS-IS Configuration
Lab 5: Configuring IS-IS.Chapter 7: BGP
BGP Overview
BGP Configuration
Lab 6: Configuring BGP.Chapter 8: Transition Methods
Transition Plans
Dual Stack
Tunneling
Lab 7: Configuring GRE Tunneling.Chapter 9: Troubleshooting
Basic Troubleshooting Guide
IPv6 Show Commands
Lab 8: Troubleshooting
Appendix A: RIPng
Introduction to RIPng
Configuring RIPng
Lab 9: Configuring RIPng (Optional). - AJSPR — Advanced Junos Service Provider Routing
- Длительность: 5 дней (40 часов)
 - Код курса: AJSPR
 - Стоимость
 - Очный формат: 661 500 ₸
 - Онлайн формат: 647 500 ₸
 
Описание курса
Кому следует посетить:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и устранением неисправностей в работе компонентов сетевого уровня на оборудовании операторов связи.
Предварительные требования:
Слушатели должны иметь базовые знания в области сетей передачи данных, понимать модель Open Systems Interconnection (OSI) и стек протоколов TCP/IP
Слушатели должны иметь знания по операционной системе JUNOS в рамках курсов Introduction to the Junos Operating System (IJOS) и Junos Intermediate Routing (JIR)Цели курса:
После прохождения данного курса слушатели будут уметь:
Понимать разницу между различными типами OSPF link-state advertisement (LSA)
Объяснять лавинную рассылку LSA в сети OSPF
Описывать алгоритм поиска кратчайшего пути (SPF), понимать метрику каналов
Настраивать различные методы аутентификации OSPF
Объяснять ключевые различия между OSPFv2 и OSPFv3
Настраивать различные типы областей OSPF
Суммировать маршруты
Настраивать перераспределение маршрутов в домене OSPF
Понимать концепции и принцип действия IS-IS
Составлять список правил смежности IS-IS и устранять типичные проблемы смежности
Настраивать и контролировать работу IS-IS
Выполнять расширенные параметры конфигурации IS-IS
Настраивать и контролировать многоуровневую сеть IS-IS
Разбираться в ключевых особенностях и атрибутах BGP
Оптимизировать процесс выбора маршрута для BGP
Влиять на процесс передачи трафика с помощью политик BGP
Подробно описывать атрибуты Origin, MED и communities BGP и их работу
Управляйте атрибутами BGP с помощью политики маршрутизации
Знать BGP route reflection
Понимать особенности BGP confederation
Описывать DDoS-атаки и методы их предотвращения
Настраивать и контролировать FlowSpec
Искать и устранять неполадки в архитектуре маршрутизацииСодержание курса:
Данный пятидневный курс AJSPR дает слушателям подробные знания и навыки настройки протоколов маршрутизации OSPF, IS-IS, BGP и политик маршрутизации в JUNOS. Данный курс состоит из теоретического материала и практических занятий, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения Junos, получат навыки контроля за работой оборудования и протоколов маршрутизации.
В курсе используются маршрутизаторы Juniper Networks серии vMX для выполнения практических заданий, но это не исключает возможности применения настроек и на других аппаратных платформах Juniper под управлением ОС Junos. Курс основан на версии 19.3 ОС JunosПрограмма курса:
Глава 1: Введение
Глава 2: Протокол OSPF
Обзор OSPFv2
Разновидности Link State Advertisements
Работа протокола OSPF
Аутентификация OSPF
Лабораторная работа №1: Настройка и мониторинг протокола OSPFГлава 3: Разновидности областей OSPF
Обзор разновидностей областей OSPF
Работа OSPF в области “Stub”
Настройка области “Stub”
Работа OSPF в области “NSSA”
Настройка области “NSSA”
Суммаризация маршрутов
Лабораторная работа №2: Суммаризация маршрутовГлава 4:Протокол OSPF. Примеры настроек и решений
Виртуальные линки
Multiarea Adjacency
Организация достижимости внешних сетей (External Reachability)
Лабораторная работа №3: Настройка и мониторинг политик маршрутизации и специальных опций OSPFГлава 5:Отладка работы протокола OSPF
Поиск и устранение неполадок в работе протокола OSPF
Лабораторная работа №4: Отладка работы протокола OSPFГлава 6:Протокол IS-IS
Обзор протокола IS-IS
Протокольные сообщения IS-IS (PDUs)
Соседи и установление связи между соседями по протоколу IS-IS
Настройка и мониторинг протокола IS-IS
Лабораторная работа №5: Настройка и мониторинг протокола IS-ISГлава 7:Работа протокола IS-IS и возможности конфигурирования
Работа протокола IS-IS
Возможности конфигурирования
Применение политик маршрутизации к протоколу IS-IS
Лабораторная работа №6: Настройка и мониторинг политик и опций протокола IS-ISГлава 8:Настройка многоуровневой топологии IS-IS
Работа протокола IS-IS на первом и втором уровнях
Настройка многоуровневой топологии
Лабораторная работа №7: Настройка многоуровневой топологии IS-ISГлава 9:Отладка работы протокола IS-IS
Поиск и устранение неполадок в работе протокола IS-IS
Лабораторная работа №8: Отладка работы протокола IS-ISГлава 10:Протокол BGP
Обзор протокола BGP
Работа протокола BGP
Алгоритм выбора лучшего маршрута
Изучение конфигурационных параметров
Лабораторная работа №9: Настройка протокола BGP и его атрибутовГлава 11:Атрибуты протокола BGP и использование политик — первая часть
Применение политик к протоколу BGP
Атрибут Next-Hop
Атрибуты Origin и MED
Атрибут AS Path
Лабораторная работа №10: Изучение атрибутов: Next-Hop, Origin, MED и AS PathГлава 12:Атрибуты протокола BGP и использование политик — вторая часть
Атрибут Local Preference
Атрибут Communities
Лабораторная работа №11: Изучение атрибутов: Local Preference и CommunitiesГлава 13:Масштабирование с отражением маршрутов и применением конфедераций
Масштабирование с отражением маршрутов
Конфигурирование и распространение маршрутной информации
Масштабирование с применением конфедераций
Лабораторная работа №12: Масштабирование протокола BGPГлава 14:BGP FlowSpec
Обзор атак DDoS
Методы предотвращения DDoS
Обзор FlowSpec
Настройка и мониторинг FlowSpec
Лабораторная работа №13: BGP FlowSpecГлава 15:Отладка работы протокола BGP
Поиск и устранение неполадок в работе протокола BGP
Лабораторная работа №14: Отладка работы протокола BGPГлава 16:Отладка работы политик маршрутизации
Поиск и устранение неполадок в работе политик маршрутизации
Лабораторная работа №15: Отладка работы политик маршрутизацииГлава 17:Итоговый контроль знаний
 - JSPX — Коммутация данных для операторов связи в ОС JUNOS
- Длительность: 2 дня (16 часов)
 - Код курса: JSPX
 - Стоимость
 - Очный формат: 476 500 ₸
 - Онлайн формат: 441 000 ₸
 
Описание курса
Предварительные требования:
Слушатели должны понимать базовые принципы работы протоколов TCP/IP и маршрутизации и посетить курсы Introduction to JUNOS Software (IJS) and JUNOS Routing Essentials (JRE).
Описание курса:
2-дневный курс JSPX дает знания о процессе коммутации данных и рассматривает примеры конфигурации. Основными темами курса являются обзор принципов коммутации, локальные вычислительные сети (LAN), виртуальные локальные компьютерные сети (VLAN), процесс определения адресов на втором уровне, режим прозрачной коммутации (bridging), протокол STP, функции OAM в сетях Ethernet. Также курс включает материал о реализации интерфейсов, совмещающих функции маршрутизации и коммутации (IRB), виртуальных инстанций, виртуальных коммутаторов, балансировки нагрузки и зеркалирования портов. Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения JUNOS, получат навыки контроля за работой оборудования.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и техническим обслуживанием устройств, работающих под программным обеспечением JUNOS.
Программа курса:
Модуль 1: Введение
Модуль 2: Ethernet-коммутация и виртуальные локальные компьютерные сети (VLAN)
Локальные вычислительные сети на технологии Ethernet
Режим прозрачной коммутации (bridging)
Настройка и мониторинг VLAN
Автоматическое администрирование VLAN
Настройка и мониторинг интерфейсов IRB
Определение адресов на втором уровне и передача данных
Применение фильтров на втором уровне
Лабораторная работа №1: Ethernet-коммутация и VLAN.Модуль 3: Концепция виртуальных коммутаторов
Обзор виртуальных инстанций
Настройка и мониторинг виртуальных коммутаторов
Взаимодействие виртуальных инстанций
Логические системы
Лабораторная работа №2: Виртуальные коммутаторы.Модуль 4: Режим прозрачной коммутации (Bridging)
Развитие сетей с прозрачной коммутацией
Режим прозрачной коммутации в операторских сетях
Настройка и мониторинг
Лабораторная работа №3: Режим прозрачной коммутации в операторских сетях.Модуль 5: Протоколы STP
Обзор протокола STP
Обзор протокола RSTP
Обзор протокола MSTP
Обзор протокола VSTP
Настройка и мониторинг протоколов STP
Рассмотрение понятий BPDU, Loop и Root Pritection
Лабораторная работа №4: Протокол MSTP.Модуль 6: Функции OAM в сетях Ethernet
Обзор функций OAM
LFM
CFM
Настройка и мониторинг
Лабораторная работа №5: Функции OAM в сетях Ethernet.Модуль 7: Высокая доступность и оптимизация сетей
Обзор механизма зашиты ERP (Ethernet Ring Protection)
Настройка и мониторинг ERP
Обзор групп агрегированных линков (LAG)
Настройка и мониторинг LAG
Обзор технологии MC-LAG (агрегирование линков с разных устройств)
Настройка и мониторинг технологии MC-LAG
Лабораторная работа №6: Высокая доступность и оптимизация сетей.Модуль 8: Поиск неисправностей и мониторинг
Введение в поиск неисправностей и мониторинг
Инструменты для поиска неисправностей и мониторинга
Пример поиска неисправностей: перегрузка на сети
Лабораторная работа №7: Поиск неисправностей и мониторинг - AJSPT — Углубленный курс по поиску и устранению неисправностей на ОС JUNOS
- Длительность: 2 дня (16 часов)
 - Код курса: AJSPT
 - Стоимость
 - Очный формат: 476 500 ₸
 - Онлайн формат: 441 000 ₸
 
Описание курса
Предварительные требования:
Данный курс является курсом повышенной сложности и для того, чтобы курс прошел максимально эффективно для слушателей, необходимо посетить следующие курсы:
Junos Troubleshooting in the NOC (JTNOC);
Advanced Junos Service Provider Routing (AJSPR);
Junos MPLS and VPNs (JMV);
Junos Multicast Routing (JMR);
Junos Class of Service (JCOS).Описание курса:
2-дневный курс AJSPT включает следующие темы: поиск и устранение неисправностей аппаратной и программной частей маршрутизатора, протоколов OSPF, IS-IS, BGP,политик маршрутизации, MPLS, VPN (2 и 3 уровней), CoS, а также работа с проблемами, возникающими в результате потери и задержки пакетов. Данный курс состоит из теоретического материала и практических занятий, в процессе выполнения которых слушатели изучат основные принципы и команды, используемые в процессе мониторинга и устранения неисправностей. Лабораторные работы выполняются на оборудовании MX-серии, но это не препятствует использовать полученные знания и навыки при работе с другими платформами под ОС JUNOS.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и устранением неисправностей на оборудовании операторов связи.
Программа курса:
Модуль 1: Введение
Модуль 2: Методы поиска и устранения неисправностей
Процесс поиска и устранения неисправностей
Сбор информации о проблеме
Воспроизведение ситуации в лаборатории
Анализ причины
Отработка проблемы потери пакетов
Отработка проблемы задержки пакетов
Лабораторная работа: Отработка проблемы потери пакетов.Модуль 3: Поиск и устранение неисправностей в аппаратной части
Основные компоненты в составе шасси
Обеспечение надежности
Изучение примера.Модуль 4: Поиск и устранение неисправностей интерфейсов
Классификация интерфейсов
Основные типы интерфейсов
IPv4 и IPv6
Изучение примеров
Лабораторная работа: Поиск и устранение неисправностей интерфейсов.Модуль 5: Поиск и устранение неисправностей в программной части
Выявление проблемы
Использование базы данных клиентских запросов на сайте (PR)
Использование базы знаний на сайте (KB)
Временные и постоянные варианты решений проблемы
Изучение примеров.Модуль 6: Поиск и устранение неисправностей внутренних протоколов маршрутизации (IGP)
Протокол OSPF
Протокол OSPFv3
Протокол IS-IS
Лабораторная работа: Поиск и устранение неисправностей внутренних протоколов маршрутизации.Модуль 7: Поиск и устранение неисправностей протокола BGP
IBGP (Internal BGP)
EBGP (External BGP)
Лабораторная работа: Поиск и устранение неисправностей протокола BGP.Модуль 8: Поиск и устранение неисправностей в работе политик маршрутизации
Обзор политик маршрутизации и их применение
Структура политики
Использование регулярных выражений
Полезные команды
Изучение примеров
Лабораторная работа: Поиск и устранение неисправностей в работе политик маршрутизации.Модуль 9: Поиск и устранение неисправностей MPLSи VPNs
MPLS
VPN3-го уровня
VPN 2-го уровня
VPLS
Лабораторная работа: Поиск и устранение неисправностей MPLSи VPNs.Модуль 10: Поиск и устранение неисправностей. Дополнительные темы
Широковещание (Multicast)
Качество обслуживания (Classofservice)
Лабораторная работа. 
Palo Alto
- PAN-210 — Инсталляция, настройка, управление межсетевым экраном Palo Alto
- Длительность: 5 дней (40 часов)
 - Код курса: PAN-210
 - Стоимость
 - Очный формат: 656 000 ₸
 - Онлайн формат: 642 000 ₸
 
Описание курса
Описание курса
Данный пятидневный курс обеспечивает слушателям глубокие теоретические знания и практические навыки по инсталляции, настройке и управлению всеми межсетевыми экранами из линейки Next-Generation компании Palo Alto Networks. Слушатели познакомятся с механизмами настройки безопасности, сетевого взаимодействия, предупреждения угроз, идентификации приложений, идентификации пользователей, построения VPN туннелей, логирования и построения отчетов операционной системы Palo Alto Networks Operation System (PAN-OS).
Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
Данный курс предполагает наличие у слушателей базовых знаний сетевых технологий, включая основы маршрутизации, коммутации и формирования IP адресов. Слушатели также должны быть знакомы с концепцией обеспечения безопасности с помощью пакетных фильтров. Приветствуются углубленные знания в области компьютерной безопасности — IPS, content filtering, proxy.
Содержание курса
День 1
Модуль 0: Введение
Модуль 1: Обзор платформ и архитектуры
Обзор платформ безопасности
Архитектура обеспечения проверки за один проход
Модель безопасности Zero Trust
Аппаратные платформыМодуль 2: Первоначальная настройка устройства
Графическая среда управления, командная строка и API
Первоначальный доступ к системе
Управление конфигурацией
Установка обновлений операционной системы и программ, лицензирование
Управление учетными записями администраторов
Просмотр и фильтрация логов
Лабораторная работа — Первоначальная настройкаМодуль 3: Настройка интерфейсов
Зоны (Security Zones) и интерфейсы
Типы интерфейсов — L2, L3, Virtual Wire, Tap, VLAN, loopback
Сабинтерфейсы
Виртуальные маршрутизаторы
Маршрутизация на основе политик (Policy Based Forwarding)
Лабораторная работа — Настройка интерфейсовДень 2
Модуль 4: Политики безопасности и адресной трансляции
Базовые концепции политики безопасности
Настройка и управление политикой безопасности
Политика трансляции адресов
Настройка трансляции адреса источника (Source NAT)
Настройка трансляции адреса получателя (Destination NAT)
Лабораторная работа — Политика безопасности
Модуль 5: Идентификация приложений (App-ID)
Процесс идентификации приложений
Использование приложений в политике безопасности
Идентификация неизвестных приложений
Обновление сигнатур приложений
Миграция с правил для портов на правила для приложений
Лабораторная работа — Основы идентификации приложенийМодуль 6: Идентификация контента (Content-ID)
Обзор механизмов идентификации контента
Защита от атак на уязвимости
Антивирус
Защита от программ-шпионов
Блокирование передачи файлов
Блокирование трафика, содержащего запрещенные для передачи данные
Использование идентификации контента в политике безопасности
Телеметрия и анализ угроз
Защита от DoS атак
Лабораторная работа — Идентификация контентаДень 3
Модуль 7: Фильтрация URL
Профайлы фильтрации URL
Применение профайлов в политике безопасности
Лабораторная работа — Фильтрация URLМодуль 8: Расшифровка
Концепции расшифровки SSL
Работа с сертификатами
Расшифровка исходящего SSL трафика
Расшифровка входящего SSL трафика
Дополнительные настройки — неподдерживаемые приложения, отказ от расшифровки, зеркалирование трафика, аппараттные модули, отладка и исправление неполадок
Лабораторная работа — Расшифровка SSL трафикаМодуль 9: WildFire
Концепции WildFire
Настройка и управление WildFire
Отчеты WildFire
Лабораторная работа — WildFireДень 4
Модуль 10: Идентификация пользователей
Обзор механизма идентификации пользователей
Методы сопоставления пользователей с адресами
Настройка идентификации пользователей
Настройка встроенного агента идентификации
Настройки агента идентификации под Windows
Соотнесение пользователей с группами
Использование учетных записей в политике безопасности
Лабораторная работа — Идентификация пользователейМодуль 11: GlobalProtect
Обзор технологии Global Protect
Подготовка межсетевого экрана к использованию Global Protect
Настройка портала
Настройка шлюза
Настройка агентов
Лабораторная работа — Global ProtectМодуль 12: IPSec VPN
Обзор технологии IPSec
Построение туннеля между двумя межсетевыми экранами
Отладка IPSec туннелей
Лабораторная работа — Построение IPSec туннеляДень 5
Модуль 13: Мониторинг и построение отчетов
Работа с закладками Dashboard, ACC и Monitor
Перенаправление логов на внешние сервера
Использование syslog
Настройка SNMP
Лабораторная работа — Мониторинг и построение отчетовМодуль 14: Отказоустойчивость (High Availability, HA)
Компоненты и функционирование HA
Настройка режима Active/Passive
Мониторинг состояния HA
Лабораторная работа — High AvailabilityМодуль 15: Дополнительные возможности и настройки
Рекомендации по настройке и применению
Анализ информации в закладке ACC
Оптимизация профайлов защиты
«Узкие места» и рекомендации по настройке
Лабораторная работа — Полная настройка системыМодуль 16: Что дальше?
Рекомендации по дальнейшему прохождению курсов для разных типов работ
Рекомендации по подготовке к сдаче сертификационных экзаменов - PAN-214 — Firewall 9.0: оптимизация межсетевого экрана для профилактики угроз
- Длительность: 4 дня (32 часа)
 - Код курса: PAN-214
 - Стоимость
 - Очный формат: 566 500 ₸
 - Онлайн формат: 557 000 ₸
 
Описание курса
Описание курса
Данный четырехдневный курс позволит слушателям научиться настраивать, управлять и эксплуатировать систему предотвращения угроз PAN-OS®. Слушатели получают практический опыт настройки, управления и мониторинга системы предотвращения угроз в лабораторной среде. Дополнительно слушатели получат глубокие теоретические знания и практические навыки по темам:
жизненный цикл кибератаки и распознавание общих форм атак;
возможности системы профилактики угроз PAN-OS®;
использование данных журнала событий и отчетов при выборе настроек системы;
настройка межсетевого экрана для обнаружения, блокирования и протоколирования угроз.Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
На курс допускаются слушатели, ранее успешно завершившие обучение на курсе PAN-210 Основы инсталляции, настройки и управления межсетевым экраном Palo Alto версии 9.0 и имеющие опыт работы с межсетевыми экранами Palo Alto Networks не менее 6 месяцев. Также слушатели должны иметь знания в области сетевых технологий, включая основы маршрутизации, коммутации и IP-адресации.
Содержание курса
Модуль 1: Жизненный цикл кибератаки
Модуль 2: Блокирование Packet- и Protocol-Based атак
Модуль 3: Блокирование угроз от известных источников
Модуль 4: Блокирование угроз с использованием AppID™
Модуль 5: Блокирование угроз с использованием приложений пользователей
Модуль 6: Создание сигнатур
Модуль 7: Блокирование угроз в зашифрованном трафике
Модуль 8: Блокирование угроз в отрытом трафике
Модуль 9: Блокирование угроз после кражи учетных данных
Модуль 10: Анализ информации об угрозах и трафике - PAN-220 — Panorama 9.0: масштабирование управления межсетевыми экранами
- Длительность: 2 дня (16 часов)
 - Код курса: PAN-220
 - Стоимость
 - Очный формат: 463 500 ₸
 - Онлайн формат: 451 500 ₸
 
Описание курса
Описание курса
Данный двухдневный курс обеспечивает слушателям глубокие теоретические знания и практические навыки по настройке и работе с сервером управления межсетевыми экранами Palo Alto Networks® Panorama™. Слушатели познакомятся с механизмами создания агрегированных отчетов, обеспечивающих целостное наблюдение за межсетевыми экранами Palo Alto Networks®.
По результатам обучения слушатели
смогут настраивать и управлять сервером Panorama™
получат опыт настройки шаблонов и групп устройств
получат опыт администрирования и работы с функциями сбора, регистрации и создания отчетов
получат опыт решения проблем, возникающих при работе с сервером Panorama™ в отказоустойчивых конфигурациях
изучат возможности сервера Panorama™ при сборе статистики и при работе в публичной облачной среде и в облачном решении GlobalProtect™.Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
На курс допускаются слушатели, ранее успешно завершившие обучение на курсе PAN-210 Основы инсталляции, настройки и управления межсетевым экраном Palo Alto версии 9.0 и имеющие опыт работы с межсетевыми экранами Palo Alto Networks не менее 6 месяцев. Также слушатели должны иметь знания в области сетевых технологий, включая основы маршрутизации, коммутации и IP-адресации.
Содержание курса
Модуль 1: Первоначальная настройка
Модуль 2: Добавление межсетевых экранов
Модуль 3: Шаблоны
Модуль 4: Группы устройств
Модуль 5: Административные аккаунты
Модуль 6: Перенаправление и сбор логов
Модуль 7: Агрегированные мониторинг и создание отчетов
Модуль 8: Примеры реализации
Модуль 9: Поиск и устранение неисправностей - PAN-330 — Firewall 9.0: поиск и решение проблем
- Длительность: 3 дня (24 часа)
 - Код курса: PAN-330
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса
Данный трехдневный курс позволит слушателям получить глубокие теоретические знания и практические навыки по решению сетевых проблем с помощью встроенных инструментов межсетевого экрана, включая интерфейс командной строки, позволит изучить рекомендованные методы решения проблем для различных ситуаций, научит анализировать детальные журналы событий для реальных сценариев и решать сложные проблемы
Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
На курс допускаются слушатели, ранее успешно завершившие обучение на курсе PAN-210 Основы инсталляции, настройки и управления межсетевым экраном Palo Alto версии 9.0 и имеющие опыт работы с межсетевыми экранами Palo Alto Networks не менее 6 месяцев. Также слушатели должны иметь знания в области сетевых технологий, включая основы маршрутизации, коммутации и IP-адресации.
Содержание курса
Модуль 1: Инструменты и ресурсы
Модуль 2: Основы CLI
Модуль 3: Логика работы
Модуль 4: Захват пакетов
Модуль 5: Журналы диагностических событий
Модуль 6: Входящий трафик
Модуль 7: Транзитный трафик
Модуль 8: Системные функции
Модуль 9: Расшифровка SSL
Модуль 10: Идентификация пользователей User-ID™
Модуль 11: Технология GlobalProtect™
Модуль 12: Эскалация и RMA 
Бизнес тренинги
- BT01 — Управление финансами бизнеса
- Длительность: 3 дня (24 часа)
 - Код курса: BT01
 - Стоимость
 - Очный формат: 200 000 ₸
 - Онлайн формат: По запросу
 
Описание курса
Для кого тренинг:
Собственников, учредителей или соучредителей бизнеса, чтобы увеличивать прибыль, получать стабильно дивиденды, сосредоточиться на стратегическом развитии и масштабироваться, используя инструменты финансового менеджмента.
Руководителей компании, чтобы принимать взвешенные управленческие решения, подкреплённые цифрами и финансовыми показателями, а также грамотно ставить задачи руководителям подразделений и финансистам.
Руководителей нефинансовых подразделений, чтобы анализировать и правильно планировать финансовые результаты подконтрольных подразделений.На тренинге «Управление финансами бизнеса» Вы узнаете:
Как повысить эффективность управления бизнесом и масштабироваться за счёт грамотного управления финансами.
Зачем нужен управленческий финансовый учёт, и как разбираться в сложных финансовых отчётах и терминологии.
Сколько необходимо продавать для достижения целевой прибыли, и как можно управлять прибылью.
Какие основные показатели необходимы для оценки эффективности работы бизнеса.
Как своевременно выявить причины, приводящие бизнес к проблемам с ликвидностью, и какие мероприятия необходимы для поддержания платежеспособности и финансовой стабильности компании.
Как правильно определить оптимальное соотношение собственных и заёмных средств для финансирования вашего бизнеса.
Что такое финансовый рычаг, и как с его помощью «заставить» заёмные средства работать на пользу бизнеса.
Как, грамотно управляя оборотными средствами (деньги, запасы, задолженность), увеличить прибыль бизнеса и предотвратить кассовые разрывы.
Какие инструменты планирования (платёжный календарь, план движения денег, бюджет, финансовая модель) нужны для роста и развития бизнеса.
Как избежать основные ошибки при внедрении системы управления финансами.По итогам тренинга «Управление финансами бизнеса» Вы сможете:
Прогнозировать, а, главное, предотвращать кассовые разрывы (недостаток денег) в компании;
Внедрить план движения денег и платёжный календарь;
Рассчитать точку безубыточности (минимальный объём продаж) и научиться управлять прибыль, используя маржинальный анализ;
Использовать финансовые показатели для анализа эффективности работы компании и принимать на их основе грамотные управленческие решения;
Определить оптимальное соотношение собственных и заёмных средств компании;
Управлять оборотными средствами (деньги, запасы, задолженность), чтобы увеличить доход бизнеса;
Внедрить важные инструменты финансового планирования: бюджет и финансовая модель;
Организовать работу по управлению финансами в компании (постановка управленческого учёта и управление финансовыми службами);<
Понимать управленческую финансовую отчётность компании и терминологию;
Ставить личные финансовые цели и планировать величину своих дивидендов.Программа тренинга:
День 1
УПРАВЛЕНИЕ ФИНАНСАМИ
Финансы компании и финансовый менеджмент: что это и зачем
Управленческий учёт и отчётность: задачи и организация
Основные инструменты управления финансами компании
Основные формы управленческой финансовой отчётности:
Отчёт о движении денежных средств (ОДДС): назначение отчёта, основные элементыУПРАВЛЕНИЕ ДЕНЕЖНЫМИ СРЕДСТВАМИ
Практическое задание: научимся понимать «Отчёт о движении денежных средств»
Как избежать кассовые разрывы: планирование и управление деньгами
Практическое задание: научимся планировать и контролировать движение денег в компании
Научимся составлять платёжный календарьУПРАВЛЕНИЕ ПРИБЫЛЬЮ
Основные формы управленческой финансовой отчётности:
Отчёт о прибылях и убытках (ОПУ): назначение отчёта, основные элементы
Основные виды прибыли
Практическое задание: определим основные виды прибыли компании
Практическое задание: научимся понимать «Отчёт о прибылях и убытках»День 2
УПРАВЛЕНИЕ ПРИБЫЛЬЮ
Маржинальный анализ: управление прибылью компании:
Постоянные и переменные затраты
Маржинальная прибыль
Точка безубыточности
Практическое задание: посчитаем точку безубыточности, маржинальность и определим объём продаж для достижения целевой (желаемой) прибылиФИНАНСОВОЕ СОСТОЯНИЕ КОМПАНИИ
Основные формы управленческой финансовой отчётности:
Отчёт о финансовом положении (ОФП) или Баланс: назначение отчёта, основные разделы и элементы баланса
Практическое задание: научимся понимать Отчёт о финансовом положении (Баланс)
Практическое задание: разберём взаимосвязь управленческих отчётов
Алгоритм внедрения системы управления финансами. Этапы внедрения. Основные ошибки и необходимость автоматизацииАНАЛИЗ ДЕЯТЕЛЬНОСТИ БИЗНЕСА
Финансовые показатели: показатели ликвидности, платежеспособности и финансовой устойчивости
Источники финансирования бизнеса: оптимальная структура капитала
Практическое задание: рассчитаем показатели платёжеспособности и финансовой устойчивостиДень 3
АНАЛИЗ ДЕЯТЕЛЬНОСТИ БИЗНЕСА
Оценка эффективности бизнеса: показатели рентабельности (эффективности)
Практическое задание: рассчитаем показатели рентабельности
Понятие финансового рычага: сколько заёмных средств нужно бизнесу для устойчивого развития
Практическое задание: рассчитаем рентабельность собственного капиталаЭФФЕКТИВНОСТЬ УПРАВЛЕНИЯ ОБОРОТНЫМИ СРЕДСТВАМИ
Эффективность управления оборотными средствами компании: деньги, запасы, дебиторская и кредиторская задолженности
Операционный, производственный и финансовый циклы: что это и как с их помощью можно увеличить прибыль
Практическое задание: рассчитаем операционный, производственный и финансовый циклыФИНАНСОВОЕ ПЛАНИРОВАНИЕ
Бюджетирование: цели и общие вопросы составления бюджета
Практическое задание: рассмотрим алгоритм составления бюджета
Финансовая модель: цели, пользователи и этапы составления
Практическое задание: рассмотрим финансовую модель 
Veeam
- VMCEv12.3 — Veeam Backup & Replication v12.3: Configure, Manage and Recover
- Длительность: 4 дня (32 часа)
 - Код курса: VMCEv12.3
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 824 000 ₸
 
Описание курса
Overview
The Veeam® Backup & Replication™ v12.3: Configure, Manage and Recover training course is a four-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v12.3 solution. With extensive hands-on labs, the class promotes situational resiliency in responding to recovery scenarios and enables administrators and engineers to effectively protect and manage data in an ever-changing technical and business
environment, bringing tangible benefit to business in the digital world. This course is based on Veeam Backup & Replication v12.3, part of Veeam Data Platform.Certification
Completion of this course satisfies the prerequisite for taking Veeam Certified Engineer (VMCE™) v12 exam.Objectives
After completing this course, students will be able to:
Describe Veeam security concepts
Given a scenario, configure a backup job and a backup copy job
Explain network-attached storage (NAS) backups and configuration
Describe Veeam’s replication capabilities
Determine appropriate use case for backups, replicas and/or continuous data protection
Configure backup infrastructure components, including proxy and repository servers
Given a scenario, evaluate when and how to apply immutability settings
Given a scenario, recover data from backupsPrerequisites
Students should have fundamental IT experience working with networking, servers, storage, cloud, virtualization and operating systems.
To get the most out of this course, students should be familiar with the core fundamental concepts of Veeam Backup & Replication through hands-on experience.Audience
This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Backup & Replication v12.3 environment.Course Contents
Data protection strategies
Review of key data protection strategies that ensure the safety of your data.Analysis of risks to data
Explore different risk scenarios, what risks do we face daily within our environment?What is protected?
Review of Veeam Data Platform and introduction to the class scenario.Security and protection considerations
Describe strategies and tools to secure the Veeam backup server to avoid unauthorized access and data leaks.Protecting workloads
Efficiently protect VMware and Hyper-V virtual machines based on well-defined SLAs through the creation of backup jobs.Deploying agents
Identify the use of protection groups to automate the installation of Veeam Agents and protecting workloads with agent backup jobs.Unstructured data backup
List required components and features available to protect unstructured data.Optimizing your backups
Analyze features and settings that allow backup storage optimization, faster backups and data consistency.Immutability and hardened repositories
Describe backup data protection mechanisms to avoid premature deletion and unwanted modifications. Identify characteristics and deployment steps of Linux Hardened Repositories to achieve backup data immutability.Backup infrastructure optimization
List deployment options and additional settings to improve general backup solution performance.Replication
Describe use cases, architectures and features of replication jobs and continuous data protection (CDP) policies.Backup copy jobs
Ensure recoverability and adhere to the 3-2-1 Rule with backup copy jobs.Long-term retention
List different mechanisms for data archiving, including grandfather-father-son retention policies.Scale-out Backup Repository™
Describe architecture, placement policies, data tiers and management of Scale-out Backup Repositories.Move and copy backups with VeeaMover
Identify use cases for virtual machine and backup migrations with VeeaMover.Recovery verification
Create automated tests to ensure recoverability from backups and replicas.Veeam Backup Enterprise Manager
Describe the use cases for Veeam Backup Enterprise Manager.Incident Response Planning
Integrating Veeam Backup and Replication into your incident response plan.Advanced recovery features
Explore some more in-depth recovery features of Veeam Backup and Replication.Selecting the ideal recovery method
What are the implications of different recovery methods and selecting the correct recovery method.Enacting a recovery
Get practice in recovering different recovery types with a variety of data types.Malware Detection
Using Veeam’s malware detection capabilities.Post-incident processes
Investigate post-incident activities. - VMCAv12.1 — Veeam Backup & Replication v12.1: Architecture and Design
- Длительность: 3 дня (24 часов)
 - Код курса: VMCAv12.1
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 756 500 ₸
 
Описание курса
Course Description:
The three-day, Veeam® Backup & Replication™ v12.1: Architecture and Design training course is focused on teaching IT professionals how to effectively architect a Veeam solution through attaining technical excellence following the Veeam Architecture Methodology used by Veeam’s own Solution Architects. During the three days, attendees will explore the goals of requirement gathering and infrastructure assessment and use that information to design Veeam solutions within team exercises. Attendees will analyze considerations when turning logical designs into physical designs and describe the obligations to the implementation team that will implement that design. Other topics covered will include security, governance and validation impacts when architecting a Veeam solution and how to build these into the overall design.
Attendees should expect to contribute to team exercises, present designs and defend decision making.Objectives
After completing this course attendees should be able to:
• Design and architect a Veeam solution in a real-world environment
• Describe best practices, review an existing infrastructure and assess business/project requirements
• Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing
• Provide implementation and testing guidelines in line with designs
• Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirementsPrerequisites
Ideally VMCE certified, attendees should have extensive commercial experience with Veeam and a broad sphere of technical knowledge of servers, storage, networks, virtualization and cloud environments.
Audience
Senior Engineers and Architects responsible for creating architectures for Veeam environments.
Certification
Completion of this course satisfies the prerequisite for taking the Veeam Certified Architect (VMCA) exam, the highest level of Veeam certification. VMCA certification proves knowledge of architecture and design concepts, highlighting the level of skill required to efficiently architect a Veeam solution in a range of
real-world environments.Course Contents
Review the architecture principles
Explore what a successful architecture looks like
Review Veeam’s architecture methodology
Discovery
Analyze the existing environment
Uncover relevant infrastructure metrics
Uncover assumptions and risks
Identify complexity in the environmentConceptual design
Review scenario and data from discovery phase
Identify logical groups of objects that will share resources based on requirements
Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks
Review infrastructure data with each product component in mind
Create high level design and data flowLogical design
Match critical components and features of VBR with requirements
Create logical groupings
Determine location of components and relationship to logical grouping
Aggregate totals of component resources needed per logical grouping
Calculate component (storage, CPU, memory) quantity sizingPhysical design
Convert the logical design into a physical design
Physical hardware sizing
Create a list of physical Veeam backup componentsImplementation and Governance
Review physical design and implantation plan
Review Veeam deployment hardening
Describe the architect’s obligations to the implementation team
Provide guidance on implementation specifics that relate to the designValidation and Iteration
Provide framework for how to test the design
Further develop the design according to a modification scenario 
Kubernetes
- ANT_KU101 — Kubernetes и Docker
- Длительность: 5 дней (40 часов)
 - Код курса: ANT_KU101
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 690 000 ₸
 
Описание курса
Описание курса:
Материал данного курса дает слушателям знания и практический опыт работы с системой контейнеризации
Kubernetes, которые они впоследствии смогут использовать для развертывания, управления и масштабирования контейнерных приложений.Аудитория курса:
Инженеры DevOps, разработчики ПО, системные администраторы и IT-специалисты, желающие получить углубленные знания и опыт работы с технологиями Docker и Kubernetes.
Предварительные требования к аудитории:
Необходимо знание основ работы с сетями и концепций виртуализации, а также владение интерфейсом командной строки Linux или знания в области системного администрирования. Опыт разработки и развертывания ПО будет полезен, но не обязателен.
Содержание курса:
Модуль 1 – Основы Docker
Введение в контейнерную виртуализацию и Docker
Архитектура и компоненты Docker
Установка и первичная настройка Docker
Образы и контейнеры
Перенос приложений в Docker
Лабораторная работа 1 Установка Docker и запуск контейнеров.
Лабораторная работа 2 Создание мульти-контейнерного приложения с
помощью Docker ComposeМодуль 2 – Основы Kubernetes
Введение в Kubernetes
Архитектура и компоненты Kubernetes
Внедрение Kubernetes
Объекты Kubernetes
Pods
Services
Deployments
Масштабирование и обновление приложений в Kubernetes
Лабораторная работа 3 Установка и настройка Kubernetes
Лабораторная работа 4 Запуск и обслуживание приложений в KubernetesМодуль 3 – Расширенные возможности Kubernetes
Сетевые настройки Kubernetes и Service Discovery
Настройка Persistent Storage в Kubernetes
Продвинутые стратегии развертывания
Rolling Updates
Canary Deployments
Использование Config Maps и Secrets
Мониторинг и журналирование в Kubernetes
Лабораторная работа 5 Масштабирование приложений с Persistent Storage в KubernetesМодуль 4 – Безопасность и обслуживание Kubernetes
Обеспечение безопасности Kubernetes кластеров
Role-Based Access Control в Kubernetes
Обслуживание Secrets и шифрование
Обслуживание конфигурации приложений
Поиск и устранение неполадок в Kubernetes
Лабораторная работа 6 Внедрение политик RBAC и повышение безопасности кластера KubernetesМодуль 5 – Дополнительные инструменты Kubernetes
Операторы
Custom Resource Definitions (CRD)
Менеджер пакетов Helm
Введение в Istio Service Mesh
Применение CI/CD в Kubernetes
Лабораторная работа 7 Внедрение и обслуживание приложений с помощью Helm - ANT_KU102 — Администрирование Kubernetes
- Длительность: 5 дней (40 часов)
 - Код курса: ANT_KU102
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 690 000 ₸
 
Описание курса
Описание курса:
Материал данного курса знакомит слушателей с основами администрирования системы дирижирования контейнерными приложениями. Кроме того, на курсе рассматриваются вопросы выполнения операционных задач в кластере Kubernetes, а также вопросы обеспечения её отказоустойчивости и надежности.
Аудитория курса:
Курс подходит для IT-специалистов, системных администраторов, разработчиков ПО и других специалистов, занимающихся администрированием и развертыванием инфраструктуры на базе Kubernetes.
Предварительные требования к аудитории:
Необходимо знание основных понятий и инструментов облачных вычислений, опыт работы с Docker и контейнеризацией, а также базовое понимание сетевых технологий и умение работать в командной строке. Понимание концепций микросервисной архитектуры будет полезно, но не обязательно.
Содержание курса:
Модуль 1 – Введение в Kubernetes и установка кластера
Проблемы контейнерных инфраструктур
Введение в Kubernetes
Архитектура Kubernetes
Подготовка и установка Kubernetes
Утилита kubectl
Лабораторная работа 1 Установка и настройка Kubernetes
Лабораторная работа 2 Проверка компонентов KubernetesМодуль 2 – Объекты и сетевые настройки
Понятие объектов Kubernetes
Pods, ReplicaSets, Deployments
Сетевые настройки Kubernetes и передача трафика в кластере
CNI плагины
Балансировщики нагрузки
Лабораторная работа 3 Настройка сети в Kubernetes
Лабораторная работа 4 Развертывание приложений в KubernetesМодуль 3 – Хранение данных приложений и хранение образов
Хранение данных кластера, CSI плагины
Persistent Volumes, Persistent Volume Claims, Storage Classes
Реестры образов, Harbor Registry
Config Maps и Secrets
Масштабирование приложений
Лабораторная работа 5 Установка и настройка Harbor Registry
Лабораторная работа 6 Создание и монтирование Persistent VolumesМодуль 4 – Управление ресурсами Kubernetes и повышение отказоустойчивости
Управление размещением приложений в кластере
Управление ресурсами приложений
Обеспечение отказоустойчивости
Резервное копирование и восстановление etcd базы данных
Управление доступом в кластер и Kubernetes RBAC
Лабораторная работа 7 Управление ресурсами приложений
Лабораторная работа 8 Управление планировщиком и мониторинг кластераМодуль 5 – Мониторинг и устранение неполадок Kubernetes
Обновление кластера Kubernetes
Журналирование кластера и узлов Kubernetes
Мониторинг приложений и контейнеров
Поиск и устранение неполадок
Обзор вспомогательных инструментов и утилит
Лабораторная работа 9 Мониторинг кластера Kubernetes и приложений
Лабораторная работа 10 Использование дополнительных инструментов - ANT_KU103 — GitOps в Kubernetes
- Длительность: 5 дней (40 часов)
 - Код курса: ANT_KU103
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 690 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить возможности по интеграции Git c Kubernetes для автоматизации развертывания контейнерных приложений в рамках работы CI/CD pipeline’ов. Кроме того, на курсе также рассматриваются вопросы использования этой же интеграции для управления конфигурациями и настройками программных инфраструктур.
Аудитория курса:
Курс «GitOps в Kubernetes» подходит для IT-специалистов, системных администраторов разработчиков, инженеров по автоматизации, DevOps специалистов и администраторов систем, которые уже имеют базовые знания и опыт работы с Kubernetes и Git.
Предварительные требования к аудитории:
Слушатели должны иметь предварительный опыт работы с контейнеризацией, управлением версиями и использованием командной строки. Также желательно наличие опыта работы с CI/CD и понимание основных принципов DevOps.
Содержание курса:
Модуль 1 – Введение в GitOps
Роль GitOps в управлении инфраструктуры Kubernetes
Принципы GitOps
Инструменты GitOps и их применение в Kubernetes
Лабораторная работа 1 Подготовка инфраструктуры для GitOps
Лабораторная работа 2 Установка инструментов GitOpsМодуль 2 – Управление конфигурацией в GitOps
Использование Git для управления конфигурацией
Создание и управление манифестами Kubernetes
Лабораторная работа 3 Управление конфигурациями в GitOpsМодуль 3 – Автоматизация развертывания
Создание пайплайнов развертывания и обновления инфраструктуры
Интеграция GitOps с CI/CD инструментами
Контроль изменений и управление версиями кода в GitOps
Лабораторная работа 4 Автоматизация развертывания в GitOpsМодуль 4 – Обеспечение надежности и безопасности в GitOps
Управление безопасностью и доступом в GitOps
Резервное восстановление состояния систем
Откат изменений и обеспечение надежности инфраструктуры
Лабораторная работа 5 Резервное восстановление состояния
Лабораторная работа 6 Откат изменений инфраструктурыМодуль 5 – Оптимизация процессов разработки и доставки
Изучение лучших практик оптимизации процессов разработки доставки при помощи GitOps
Методы увеличения скорости развертывания и обновлений в среде Kuberentes
Лабораторная работа 7 Оптимизация процессов в GitOps - ANT_KU104 — Безопасность Kubernetes
- Длительность: 5 дней (40 часов)
 - Код курса: ANT_KU104
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 690 000 ₸
 
Описание курса
Описание курса:
Материал данного курса знакомит слушателей с основными аспектами обеспечения безопасности в инфраструктурах Kubernetes и дает знания в таких областях, как:
подготовка и развертывание безопасных Kubernetes кластеров;
сетевая и системная безопасность Kubernetes;
устранение уязвимостей микросервисных приложений;
обеспечение безопасности образов и реестров приложений;
мониторинг и журналирование уязвимостей.Аудитория курса:
Курс разработан для IT-профессионалов, специализирующихся администрировании, развертывании и обеспечении безопасности инфраструктуры на базе Kubernetes. Также курс может быть полезен для разработчиков, занимающихся разработкой и тестированием кластеров Kubernetes, архитекторов, которые планируют внедрить Kubernetes в своих организациях, и специалистов по безопасности, заинтересованных в обеспечении безопасности контейнерных приложений.
Предварительные требования к аудитории:
Знание администрирования среды Kubernetes, включая понимание основных концепций управления контейнерными приложениями в Kubernetes, настройку и масштабирование кластеров, управление ресурсами, внедрение управление конфигурациями в Kubernetes.
Содержание курса:
Модуль 0 – Развертывание безопасного кластера
Модель угроз для кластера Kubernetes
Основные типы контроля доступа и механизмы их реализации в кластере Kubernetes.
Паттерны безопасности для кластера KubernetesМодуль 1 – Развертывание безопасного кластера
Сетевые политики безопасности
Защита узлов и компонентов Ingress
Ограничение GUI и других сервисов
Ограничение доступа к Kubernetes API
RBAC в кластерах Kubernetes
Управление сервисными аккаунтами
Лабораторная работа 1 Обеспечение базовой безопасности кластера KubernetesМодуль 2 – Системная безопасность
Минимизация поверхности для атак на уровне OS
Минимизация прав ролей IAM
Ограничение внешнего сетевого доступа
Инструменты обеспечения безопасности на уровне ядра
Лабораторная работа 2 Настройка инструментов системной безопасности KubernetesМодуль 3 – Устранение уязвимостей микросервисов
Домены безопасности уровня OS
Управление секретами в Kubernetes
Использование специализированных сред исполнения контейнеров
Использование mTLS для управления взаимодействия подов
Лабораторная работа 3 Обеспечение безопасной работы микросервисовМодуль 4 – Безопасность образов и реестров приложений
Минимизация образов приложений
Белые списки реестров и валидация образов
Защищенные реестры образов
Статический анализ приложений
Обнаружение уязвимостей в образах
Лабораторная работа 4 Обеспечение безопасности образов и реестровМодуль 5 – Мониторинг и журналирование сред выполнения контейнеров
Обнаружение вредоносного поведения на уровне узлов и контейнеров
Обнаружение уязвимостей физической инфраструктуры
Обнаружение фаз атак и их распространение
Идентификация и изучение вредоносного ПО в инфраструктуре
Консистентность контейнерных приложений
Лабораторная работа 5 Мониторинг безопасности работы кластера Kubernetes и приложений 
HAproxy
- ANT-HA101 — Балансировка нагрузки с HAproxy
- Длительность: 3 дня (24 часа)
 - Код курса: ANT-HA101
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям научиться организовывать балансировку нагрузки к корпоративным приложениями посредствам HAproxy.
Аудитория курса:
Системные администраторы, администраторы приложений.
Предварительные требования к аудитории:
Необходим опыт системного администрирования.
Длительность курса:
3 дня.
Содержание курса:
Модуль 1 – HAproxy.
Архитектура и компоненты HA-proxy
Установка HA-proxyМодуль 2 – Принципы и алгоритмы балансировки нагрузки.
Принципы балансировки нагрузки
TCP-based LB
HTTPS-based LB
Механизм proxy
Алгоритмы балансировки нагрузкиМодуль 3 – Управление трафиком.
Content switching
Использование URL пути и параметров
Использование HTTP заголовков
Перенаправление по URL
Использование геолокации
Правила изменения контентаМодуль 4 – Работа с серверами приложений.
Мониторинг серверов приложений при балансировке
Механизмы health-check
Мониторинг ошибок
Отправка оповещений
Механизмы persistenceМодуль 5 – Задачи администрирования HAproxy.
Логирование
SSL/TLS
Обеспечение безопасности HA-proxy
Функции High Availability 
Оптические коммуникации
- ANT-DW101 — Основы оптических коммуникаций
- Длительность: 3 дня (24 часа)
 - Код курса: ANT-DW101
 - Стоимость
 - Очный формат: 589 000 ₸
 - Онлайн формат: 566 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить технологии оптических коммуникаций: особенности использования света как переносчика информационного сигнала, оборудование, обеспечивающее работу сегментов оптических коммуникаций, механизмы повышения эффективности использования оптических линий, такие как DWDM. Также на курсе рассматриваются такие технологические стеки как SONET/SDN и OTN.
Аудитория курса:
Люди, начинающие знакомиться с технологиями оптических коммуникаций
Предварительные требования к аудитории:
Желательно обладать знаниями о т.н. электросвязи.
Дополнение:
Курс является теоретическим без лабораторных работ.
Содержание курса:
Модуль 1 – Основы оптических коммуникаций.
Сегменты применения оптических коммуникаций.
Развитие Optical Transport Network.
Типы развертывания
Типы протоколов, используемых в технологиях OTNМодуль 2 – Характеристики света как переносчика сигнала
Оптический спектр
Характеристики световой волны
Энергия света
Характеристики светового канала
Виды дисперсии света и светового канала
Методы компенсации дисперсии
Нелинейные эффекты светового каналаМодуль 3 – Оптическая модуляция.
Техники оптической модуляции
Символьная и битовая скорости
QAMМодуль 4 – Оптические передатчики.
Принципы работы оптических передатчиков
Лазеры
Лазерные диоды
Distributed Feedback Laser
Fabry Perot Laser
Физическое подключение диодных лазеров
Факторы производительности диодных лазеровМодуль 5 – Оптические ресиверы.
Принципы работы оптических ресиверов
Компоненты оптических ресиверов
Фотодиоды и когерентные детекторыМодуль 6 – Световой канал передачи данных.
Конфигурация оптоволокна
Типы оптоволокна
Типы оптоволоконного кабеля
Потери и помехи в оптоволокнеМодуль 7 – Системы DWDM.
Принципы работы DWDM
Компоненты DWDM
Оптические фильтры
Optical Protection Switch
Transponder Protection Tray
Оптические усилителиМодуль 8 – Типы оптических сетей.
Архитектура современных транспортных сетей
Сети PDH
Сети SONET/SDH
DWDM и OTN
Характеристики и требования оптических транспортных сетей
ROADM
Связь с логическими технологиями TCP/IPМодуль 9 – Архитектура и работа сетей SONET.
Основы технологий SONET
Фрейм SONET
Электрические и оптические скорости
Синхронизация
Топологии сети SONETМодуль 10 – Optical Transport Networks.
Принципы построения OTN
OTN over SONET/SDN
Мультиплексирование OTN
Компоненты Control Plane в OTN 
Microsoft
- MSBI06 — SAP BO Web Intelligence
- Длительность: 5 дней (40 часов)
 - Код курса: MSBI06
 - Стоимость
 - Очный формат: 473 500 ₸
 - Онлайн формат: 449 500 ₸
 
Описание курса
Программа курса:
День 1. Введение и основы WebI
Тема 1. Основные понятия
Введение в BI-систему SAP BusinessObjects
Архитектура Web Intelligence XI
Что такое Юниверс (Universe)? Роль в извлечении данных
Построение схемы запроса, структура микрокуба
Этапы создания документа WebI
Запуск и настройка BI Launch Pad
Создание базовых документов WebI
Практика:
Подключение к BI Launch Pad
Создание документа с простым запросом
Настройка интерфейса пользователяДень 2. Форматирование и визуальное представление
Тема 2. Приемы и опции форматирования
Графика в ячейках (фон, текст, HTML, гиперссылки)
Стили и шаблоны: шрифты, цвета, выравнивание
Сортировка данных в отчетах
Тема 3. Представление данных
Кросстаблицы
Диаграммы и их типы
Стандартные вычисления и формулы
Создание пользовательских переменных
Практика:
Добавление форматирования к отчету
Создание графиков и таблиц с различными уровнями детализации
Использование переменныхДень 3. Работа с условиями и фильтрацией
Тема 4. Условия в запросах
Динамические параметры
Контексты выполнения запроса
Использование списков значений из других микрокубов
Условия с подзапросами
Тема 5. Фильтрация и секционирование
Фильтрация на уровне блока, секции, отчета
Разрывы и секции
Ранжирование
Создание сигнализаторов (алертов)
Практика:
Применение условий в запросах
Построение подзапросов
Настройка фильтров и сигнализаторовДень 4. Расширенные вычисления и аналитика
Тема 6. Расширенный синтаксис вычислений
Контексты вычислений (In, ForEach, ForAll)
Нарастающие вычисления (RunningSum, Previous, etc.)
Тема 7. Работа с несколькими источниками
Связывание и синхронизация запросов
Анализ иерархий (DrillDown и детализация)
Комбинирование запросов
Отслеживание изменений данных
Практика:
Построение сложных расчетов с контекстами
Сравнение данных из разных источников
Использование функций аналитикиДень 5. Интеграция и автоматизация
Тема 8. Автоматизация и расширенные функции
Использование QAAWS (Query As A Web Service)
Создание гиперссылок на другие отчеты
Создание связанных документов
Планирование и публикация отчетовИзучение расширенных функций Web Intelligence:
Сложные переменные;
Различные типы объединений данных (merged dimensions);
Использование множественных источников данных;
Работа с графиками и визуализациями;
Настройка подсказок (promts) и пользовательских фильтров;
Создание интерактивных панелей и отчетов;
Использование Publication и Scheduling для автоматизации рассылки отчетов.Финальная практика:
Создание итогового отчета с фильтрацией, иерархиями, форматированием, алертами и ссылками
Индивидуальное задание: подготовить дашборд и защитить - MSBI01 — Microsoft Power BI базовый курс
- Длительность: 2 дня (16 часов)
 - Код курса: MSBI01
 - Стоимость
 - Очный формат: 207 500 ₸
 - Онлайн формат: 191 500 ₸
 
Описание курса
Программа обучения
Основы Power BI и работа с данными
Модуль 1. Введение в Power BI
Введение в Power BI, его компоненты (Desktop, Service, Mobile)
Как Power BI используется в бизнесе
Основные элементы интерфейсаМодуль 2. Подключение данных
Подключение к Excel, CSV, SQL
Различие между Import Mode и DirectQuery
Основные принципы работы с Power Query
Практическое заданиеМодуль 3. Очистка и трансформация данных в Power Query
Очистка и форматирование данных
Удаление дубликатов, изменение типов данных
Объединение таблиц
Практическое заданиеМодуль 4. Основы моделирования данных
Создание связей между таблицами
Основы звёздной схемы
Использование LOOKUP и RELATED
Визуализация и работа с отчетами
Практическое заданиеМодуль 5. Основные виды визуализаций
Гистограммы, линейные графики, KPI-индикаторы
Работа с фильтрами и срезами
Использование условного форматирования
Практическое заданиеМодуль 6. Основы DAX
Разница между вычисляемыми столбцами, мерами и таблицами
Основные функции DAX: SUM, AVERAGE, COUNT, CALCULATE
Работа с фильтрацией
Практическое заданиеМодуль 7. Публикация и совместная работа
Публикация отчетов в Power BI Service
Создание дашбордов
Основы совместной работы и настройки прав доступа
Практическое заданиеМодуль 8. Итоговый мини-проект
Разработка отчета на основе реального бизнес-кейса
Обратная связь и разбор ошибокИтоговое практическое задание:
Создать интерактивный дашборд по продажам с KPI и динамическими фильтрами
Практическое задание - MSBI02 — Microsoft Power BI для аналитиков
- Длительность: 2 дня (16 часов)
 - Код курса: MSBI02
 - Стоимость
 - Очный формат: 229 500 ₸
 - Онлайн формат: 213 500 ₸
 
Описание курса
Работа с данными и оптимизация
Модуль 1. Архитектура данных в Power BI
Различие между Import Mode, DirectQuery и Composite Mode
Оптимизация моделей данных
Практическое заданиеМодуль 2. Продвинутый Power Query
Использование M-кода
Работа с параметрами
Автоматизация загрузки данных
Практическое заданиеМодуль 3. Глубокий DAX
Использование функции CALCULATE
Контексты фильтрации и итерационные функции (SUMX, AVERAGEX)
Time Intelligence (DATESYTD, SAMEPERIODLASTYEAR)
Практическое задание:Модуль 4. Динамические отчеты
Использование Drillthrough и закладок
Динамическое изменение графиков по выбору пользователя
Практическое заданиеМодуль 5. Безопасность данных
Настройка Row-Level Security (RLS)
Разграничение прав в Power BI Service
Практическое заданиеМодуль 6. Интеграция Power BI с внешними системами
Подключение к SQL Server
Интеграция с Power Automate
Практическое заданиеМодуль 7. Итоговый мини-проект
Создание аналитического дашборда с динамическими расчетами
Итоговое практическое задание:
Разработать дашборд с показателями эффективности бизнеса
 - MSBI03 — Microsoft Power BI углубленный курс
- Длительность: 2 дня (16 часов)
 - Код курса: MSBI03
 - Стоимость
 - Очный формат: 229 500 ₸
 - Онлайн формат: 209 500 ₸
 
Описание курса
Для кого предназначен курс:
Курс разработан для специалистов, уже имеющих базовые знания Power BI и опыт работы с основными функциями платформы. Курс подходит для:
Аналитиков, желающим углубить свои знания и навыки;
Менеджеров, ответственных за визуализацию данных и отчетность;
IT- специалистов, участвующих в разработке корпоративной аналитики.Цели курса:
Освоить продвинутые техники трансформации данных в Power Query.
Углубленно изучить язык DAX для анализа и моделирования данных.
Научиться строить сложные модели данных и оптимизировать их производительность.
Создавать интерактивные дашборды с улучшенной визуализацией.
Разрабатывать отчеты, поддерживающие инкрементальное обновление и большие объемы данных.
Управлять доступом к данным через Row-Level Security (RLS) и Power BI Service.Программа обучения
Углубленная работа с данными и визуализация.
Введение и цели обучения.
Обзор программы курса.
Знакомство с участниками, их ожидания и проекты.
Продвинутые техники работы с Power Query.
Оптимизация загрузки данных: работа с большими объемами.
Параметры и функции в Power Query.
Расширенные примеры: настройка динамических источников данных.
Практика: настройка многоэтапной трансформации.
Моделирование данных: создание эффективных моделей.
Работа с ключами и отношениями таблиц.
Фильтрация, иерархии и справочники.
Лучшие практики: оптимизация схемы «звезда».
Практика: построение сложной модели данных.
DAX для анализа данных.
Расширенные функции DAX: работа с временными рядами.
Контекст вычислений: фильтрующий и строковый.
Создание сложных вычисляемых столбцов и мер.
Практика: создание временных вычислений и анализа изменений.
Создание интерактивных визуализаций.
Продвинутые настройки визуализаций.
Использование bookmark’ов, tooltip’ов и conditional formatting.
Настройка пользовательских визуализаций.
Практика: создание интерактивного дашборда.Углубленный анализ и управление проектами в Power BI
DAX для анализа данных.
Сложные вычисления с использованием функции VAR и RETURN.
Функции для ранжирования, ранней статистики и сегментации.
Примеры из реальной практики: анализ ABC, RFM, ROI.
Практика: разработка анализа KPI на основе DAX.
Инкрементальное обновление и работа с большими данными.
Принципы работы с большими наборами данных.
Настройка инкрементального обновления.
Работа с DirectQuery и Composite Models.
Практика: настройка обновляемых отчетов.
Управление доступом и публикация отчетов.
Настройка RLS (Row-Level Security).
Публикация и управление пространством Power BI Service.
Интеграция с другими сервисами (SharePoint, Teams, Power Automate).
Практика: настройка RLS и публикация проекта.Итоговое практическое задание:
Создание итогового проекта, разработка дашборда с использованием всех изученных техник. Оптимизация отчетов и работа с отзывами.
После завершения курса участники смогут:
Создавать сложные дашборды с использованием продвинутых техник.
Моделировать данные для крупных проектов.
Использовать DAX для детального анализа и прогнозирования.
Автоматизировать обновление данных и управлять доступом к отчетам.
Публиковать и управлять корпоративными отчетами в Power BI Service. 
Cisco
- DCFNDU — Understanding Cisco Data Center Foundations
- Длительность: 5 дней (40 часов)
 - Код курса: DCFNDU
 - Стоимость
 - Очный формат: 1 452 500 ₸
 - Онлайн формат: 1 440 500 ₸
 
Описание курса
Course Description
The Understanding Cisco Data Center Foundations (DCFNDU) training helps you prepare for entry-level data center roles. In this training, you will learn the foundational knowledge and skills you need to configure Cisco® data center technologies, including networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS).
This training does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several Cisco Certified Network Professional (CCNP) and other professional-level data center trainings and exams. This training also earns you 25 Continuing Education (CE) credits toward recertification
How You'll Benefit
This training will help you:
Prepare for entry-level job roles in the high-demand area of data center environments
Prepare for trainings that support the CCNP Data Center certification exams
Gain knowledge and hands-on skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Earn 25 CE credits toward recertificationWho Should Enroll
Data Center Designers
Data Administrators
Data Center Engineers
Systems Engineers
Technical Solutions Architects
Network Architects
Cisco Integrators and Partners
Server Administrators
Network Managers
Storage Administrators
Program Managers
Project ManagersCourse Objectives
Describe the foundations of data center networking
Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools
Describe Layer 3 first-hop redundancy
Describe Ethernet port channels and vPCs
Introduce switch virtualization
Introduce machine virtualization
Describe network virtualization
Compare storage connectivity options in the data center
Describe Fibre Channel communication between the initiator server and the target storage
Describe Fibre Channel zone types and their uses
Describe NPV and NPIV
Describe data center Ethernet enhancements that provide a lossless fabric
Describe FCoE
Describe data center server connectivity
Describe Cisco UCS Manager
Describe the purpose and advantages of APIs
Describe Cisco ACI
Describe Nexus Dashboard
Describe the basic concepts of cloud computingCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Good foundation of networking protocols
Basic knowledge of computer virtualization
Basic computer literacy
Basic knowledge of computer operating systems
Basic internet usage skillsIn addition, CCNA-level knowledge is recommended as a prerequisite for success in this certification:
Implementing and Administering Cisco Solutions (CCNA)Course Outline
Describing the Data Center Network Architectures
Describing the Cisco Nexus Family and Cisco NX-OS Software
Describing Layer 3 First-Hop Redundancy
Describing Port Channels and vPCs
Describing Switch Virtualization
Describing Machine Virtualization
Describing Network Virtualization
Introducing Basic Data Center Storage Concepts
Describing the Cisco MDS Family
Describing Fibre Channel Communication Between the Initiator Server and the Target Storage
Describing Fibre Channel Zone Types and Their Uses
Describing Cisco NPV Mode and NPIV
Describing FCoE
Describing Cisco UCS and UCS-X Components
Describing Cisco UCS Manager and Cisco Intersight
Automating the Data Center
Describing Cisco Nexus Dashboard
Describing Cisco ACI
Describing Cloud ComputingLab Outline
Explore the Cisco NX-OS CLI
Explore Topology Discovery
Configure HSRP
Configure vPCs
Configure VRF
Explore CoPP and Spanning Tree on Cisco Nexus Switches
Install VMware ESXi and vCenter
Configure VSANs
Validate FLOGI and FCNS
Configure Zoning
Review Unified Ports on a Cisco Nexus Switch and Implement FCoE
Explore the Cisco UCS Server Environment
Configure a Cisco UCS Service Profile
Configure Cisco NX-OS with APIs
Explore the Cisco UCS Manager XML API Management Information Tree
Explore Cisco ACI - DCAIE — AI Solutions on Cisco Infrastructure Essentials
- Длительность: 4 дня (32 часа)
 - Код курса: DCAIE
 - Стоимость
 - Очный формат: 1 258 000 ₸
 - Онлайн формат: 1 236 000 ₸
 
Описание курса
Course Description
The AI Solutions on Cisco Infrastructure Essentials (DCAIE) training covers the essentials of deploying, migrating, and operating AI solutions on Cisco data center infrastructure. You'll be introduced to key AI workloads and elements, as well as foundational architecture, design, and security practices critical to successful delivery and maintenance of AI solutions on Cisco infrastructure.
This training also earns 34 Continuing Education (CE) credits toward recertification.
This training will help you:
Gain the knowledge you need to deploy, migrate, and operate AI solutions on Cisco data center infrastructure
Qualify for professional-level job data center roles
Earn 34 CE credits toward recertificationWho Should Enroll
Network Designers
Network Administrators
Storage Administrators
Network Engineers
Systems Engineers
Data Center Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators/Partners
Field Engineers
Server Administrators
Network Managers
Program Managers
Project ManagersCourse Objectives
Describe key concepts in artificial intelligence, focusing on traditional AI, machine learning, and deep learning techniques and their applications
Describe generative AI, its challenges, and future trends, while examining the nuances between traditional and modern AI methodologies
Explain how AI enhances network management and security through intelligent automation, predictive analytics, and anomaly detection
Describe the key concepts, architecture, and basic management principles of AI-ML clusters, as well as describe the process of acquiring, fine-tuning, optimizing and using pre-trained ML models
Use the capabilities of Jupyter Lab and Generative AI to automate network operations, write Python code, and leverage AI models for enhanced productivity
Describe the essential components and considerations for setting up robust AI infrastructure
Evaluate and implement effective workload placement strategies and ensure interoperability within AI systems
Explore compliance standards, policies, and governance frameworks relevant to AI systems
Describe sustainable AI infrastructure practices, focusing on environmental and economic sustainability
Guide AI infrastructure decisions to optimize efficiency and cost
Describe key network challenges from the perspective of AI/ML application requirements
Describe the role of optical and copper technologies in enabling AI/ML data center workloads
Describe network connectivity models and network designs
Describe important Layer 2 and Layer 3 protocols for AI and fog computing for Distributed AI processing
Migrate AI workloads to dedicated AI network
Explain the mechanisms and operations of RDMA and RoCE protocols
Understand the architecture and features of high-performance Ethernet fabrics
Explain the network mechanisms and QoS tools needed for building high-performance, lossless RoCE networks
Describe ECN and PFC mechanisms, introduce Cisco Nexus Dashboard Insights for congestion monitoring, explore how different stages of AI/ML applications impact data center infrastructure, and vice versa
Introduce the basic steps, challenges, and techniques regarding the data preparation process
Use Cisco Nexus Dashboard Insights for monitoring AI/ML traffic flows
Describe the importance of AI-specific hardware in reducing training times and supporting the advanced processing requirements of AI tasks
Understand the computer hardware required to run AI/ML solutions
Understand existing AI/ML solutions
Describe virtual infrastructure options and their considerations when deploying
Explain data storage strategies, storage protocols, and software-defined storage
Use NDFC to configure a fabric optimized for AI/ML workloads
Use locally hosted GPT models with RAG for network engineering tasksCourse Prerequisites
There are no prerequisites for this training. This is an essentials training that progresses from beginner to intermediate content. Familiarity with Cisco data center networking and computing solutions is a plus but not a requirement. However, the knowledge and skills you are recommended to have before attending this training are:
Cisco UCS compute architecture and operations
Cisco Nexus switch portfolio and features
Data Center core technologiesThese skills can be found in the following Cisco Learning Offerings:
Introducing Cisco Unified Computing Systems (DCIUCS)
Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX)
Implementing Cisco Data Center Core Technologies (DCCOR)Course Outline
Fundamentals of AI
Generative AI
AI Use Cases
AI-ML Clusters and Models
AI Toolset Mastery - Jupyter Notebook
AI Infrastructure
AI Workload Placements and Interoperability
AI Policies
AI Sustainability
AI Infrastructure Design
Key Network Challenges and Requirements for AI Workloads
AI Transport
Connectivity Models
AI Network
Architecture Migration to AI/ML Network
Application-Level Protocols
High Throughput Converged Fabrics
Building Lossless Fabrics
Congestive Visibility
Data Preparation for AI
AI/ML Workload Data Performance
AI-Enabling Hardware
Compute Resources
Compute Resource Solutions
Virtual Resources
Storage Resources
Setting Up AI Cluster
Deploy and Use Open Source GPT Models for RAGLab Outline
AI Toolset—Jupyter Notebook
AI/ML Workload Data Performance
Setting Up AI Cluster
Deploy and Use Open Source GPT Models for RAG - SDSI — Designing Cisco Security Infrastructure
- Длительность: 5 дней (40 часов)
 - Код курса: SDSI
 - Стоимость
 - Очный формат: 1 191 000 ₸
 - Онлайн формат: 1 158 000 ₸
 
Описание курса
Course Description
The Designing Cisco Security Infrastructure (SDSI) training teaches you about security architecture design, including secure infrastructure, applications, risk, events, requirements, artificial intelligence (AI), automation, and DevSecOps.
This training prepares you for the 300-745 SDSI v1.0 exam. If passed, you earn the Cisco Certified Specialist – Designing Cisco Security Infrastructure certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification. This training also earns you 41 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain hands-on experience of security architecture design
Qualify for professional and expert-level security job roles
Prepare for the 300-745 SDSI v1.0 exam
Earn 41 CE credits toward recertificationWho Should Enroll
Cisco and Partner’s Systems Engineers
Customer Network & Infrastructure Engineers
Customer Security/NOC EngineersWhat to Expect in the Exam
Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 is a 90-minute exam associated with the Cisco Certified Specialist - Designing Cisco Security Infrastructure certification and satisfies the core exam requirement for the CCNP Security certification.
This exam tests your knowledge of security architecture design, including:
Secure infrastructure
Applications
Risk
Events
Requirements
Artificial intelligence and Automation
DevSecOpsCourse Objectives
Identify and explain the fundamental concepts of security architecture and how they support the design, building, and maintenance of a secure infrastructure
Identify the layers of security infrastructure, core security technologies, and infrastructure concepts
Explain how security designs principles contribute to secure infrastructure
Identify and discuss security design and management frameworks that can be used for infrastructure security design
Explain the importance of and methods for enforcement of regulatory compliance in security design
Identify tools that enable detection and response to infrastructure security incidents
Explain various strategies that can be implemented to modify traditional security architectures to meet the technical requirements of modern enterprise networks
Implement secure network access methods, such as 802.1X, MAC Authentication Bypass (MAB), and web-based authentication
Describe security technologies that can be applied to enterprise Wide Area Network (WAN) connections
Compare methods to secure network management and control plane traffic
Compare the differences between traditional firewalls and next-gen firewalls (NGFWs) and identify the advanced features that NGFWs provide
Explain how web application firewalls (WAFs) secure web applications from threats
Describe the key features and best practices for deploying intrusion detection system (IDS) and intrusion prevention system (IPS) as part of the enterprise infrastructure security design
Explain how endpoints and services in cloud-native or microservice environments can be protected with host-based or distributed firewalls
Discuss security technologies that address application data and data that is in transit
Identify several security solutions for cloud-native applications, microservices, and containers
Explain how technology advancements allow for improvements in today’s infrastructure security
Identify tools that enable detection and response to infrastructure security incidents
Describe frameworks and controls to access and mitigate security risks for infrastructure
Explain how to make security adjustments following a security incident
Identify DevSecOps integrations that improve security management and response
Discuss how to ensure that automated services are secure
Discuss how AI can aid in threat detection and responseCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Cisco CCNP Security or equivalent knowledge
Familiarity with Microsoft Windows Operating Systems
Familiarity with the Cisco Security portfolioThese skills can be found in the following Cisco Learning Offerings:
Implementing and Operating Cisco Security Core Technologies (SCOR)
Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)
Implementing and Configuring Cisco Identity Services Engine (SISE)
Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPA)
Implementing Automation for Cisco Security Solutions (SAUI)
Implementing Secure Solutions with Virtual Private Networks (SVPN)
Introducing Automation for Cisco Solutions (CSAU)
Securing Email with Cisco Email Security Appliance (SESA)
Securing the Web with Cisco Web Security Appliance (SWSA)Course Outline
Definition and Purpose of Security Architecture
Components of Security Infrastructure
Security Design Principles
Security and Design Frameworks
Compliance and Regulatory Requirements
Security Approaches to Protect Against Threats
Modify the Security Architecture to Meet Technical Requirements
Network Access Security
VPN and Tunneling Solutions
Secure Infrastructure Management and Control Planes
Nextgen Firewalls
Web Application Firewall (WAF)
IPS/IDS Deployment
Host-Based Firewalls and Distributed Firewalls
Security Solutions Based on Application and Flow Data
Security for Cloud-Native Applications, Microservices, and Containers
Emerging Technologies in Application Security
SOC Tools for Incident Handling and Response
Modify Design to Mitigate Risk
Incident-Driven Security Adjustments
DevSecOps Integration
Secure Automated Workflows and Pipelines
AI’s Role in Securing Infrastructure - BGP — Configuring BGP on Cisco Routers V4.0
- Длительность: 5 дней (40 часов)
 - Код курса: BGP
 - Стоимость
 - Очный формат: 636 500 ₸
 - Онлайн формат: 630 500 ₸
 
Описание курса
Course Description
The Configuring BGP on Cisco Routers training teaches the underlying foundations of the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares students to design and implement efficient, optimal, and trouble-free BGP networks covering:
The theory of BGP and configuration of BGP on Cisco IOS routers
Detailed troubleshooting information and hands-on exercises that provide students with the skills needed to configure and troubleshoot BGP networks in customer environments
BGP network design issues and usage rules for various BGP featuresWho Should Enroll
Network administrators
Network engineers
Network managers
Systems engineers (who would like to implement BGP)Course Objectives
Upon completion of this course, you will be able to:
Describe how to configure, monitor, and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains
Describe how to use BGP policy controls to influence the BGP route selection process in a network scenario in which you must support connections to multiple ISPs
Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections.
Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented
Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems.
Enable route reflection as possible solution to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems.
Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP networkCourse Prerequisites
The knowledge and skills that a learner must have before attending this course are as follows:
Intermediate to advanced knowledge of Cisco IOS Software configuration
Configuring and troubleshooting RIP, EIGRP, OSPF and IS-IS
Skills and knowledge equivalent to those learned in:
Implementing and Administering Cisco Solutions (CCNA)
Implementing Cisco Advanced Routing and Services (ENARSI)
Implementing and Operating Cisco Service Provider Core Technologies (SPCOR)Course Outline
Module 1: BGP Overview
Module 2: BGP Transit Autonomous Systems
Module 3: Route Selection Using Policy Controls
Module 4: Route Selection Using Attributes
Module 5: Customer to Provider Connectivity with BGP
Module 6: Scaling Service Provider Networks
Module 7: Optimizing BGP ScalabilityLab Outline
Discovery 1: Configure Basic BGP
Discovery 2: Announcing Networks in BGP
Discovery 3: Implement BGP TTL Security Check
Discovery 4: BGP Route Propagation
Discovery 5: IBGP Full Mesh
Discovery 6: BGP Administrative Distance
Discovery 7: Configure Non-Transit Autonomous System
Discovery 8: Filtering Customer Prefixes
Discovery 9: Prefix-Based Outbound Route Filtering
Discovery 10: Configure Route Maps as BGP Filters
Discovery 11: Configure Per-Neighbor Weights
Discovery 12: Configure and Monitor Local Preference
Discovery 13: Configure Local Preference Using Route Maps
Discovery 14: Configure AS Path Prepending
Discovery 15: Configure MED
Discovery 16: Configure Local Preference Using the Communities
Discovery 17: Configure Route Reflector
Discovery 18: Configure BGP Route Limiting
Discovery 19: Configure BGP Peer Groups - MPLS — Implementing Cisco MPLS v3.0
- Длительность: 5 дней (40 часов)
 - Код курса: MPLS
 - Стоимость
 - Очный формат: 644 500 ₸
 - Онлайн формат: 630 500 ₸
 
Описание курса
Course Description
The Implementing Cisco Multiprotocol Label Switching training teaches you the high-performance method for forwarding packets through a network. MPLS enables routers at the edge of a network to apply simple labels to packets. This practice allows the edge devices to switch packets according to labels, with minimal lookup overhead. MPLS integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility of network Layer 3 routing. When used in conjunction with other standard technologies, MPLS gives the ability to support value-added features.
How You'll Benefit
Acquire the skill of implementing MPLS high-performance methods for forwarding packets in a network
Learn to configure routers at the network edge to apply simple labels to packets
Gain the knowledge to enable edge devices, ATM switches, or existing routers to switch packets based on labels within the service provider core
Master the skill of minimizing lookup overhead in the packet-switching process
Gain proficiency in integrating the performance and traffic-management capabilities of data-link Layer 2 using MPLS
Acquire the skill of combining the scalability and flexibility of network Layer 3 routing through MPLS
Learn to leverage MPLS with other standard technologies to implement value-added features for service providers' networksWho Should Enroll
Network administrators
Network engineers
Network managers
Systems engineers (who would like to implement MPLS and MPLS Traffic Engineering)Course Objectives
Upon completion of the course, students will have the knowledge and skills to:
Describe the features of MPLS
Describe how MPLS labels are assigned and distributed
Identify the Cisco IOS tasks and command syntax necessary to implement MPLS on frame-mode Cisco IOS platforms
Describe the MPLS peer-to-peer architecture and explain the routing and packet forwarding model in this architecture
Identify the Cisco IOS command syntax required to successfully configure, monitor, and troubleshoot VPN operations
Identify how the MPLS VPN model can be used to implement managed services and internet access
Describe the various internet access implementations that are available and the benefits and drawbacks of each model
Provide an overview of MPLS Traffic EngineeringCourse Prerequisites
It is recommended, but not required, to have the following skills and knowledge before attending this course:
Intermediate to advanced knowledge of Cisco IOS Software configuration
Configuring and troubleshooting EIGRP, OSPF, IS-IS and BGP
The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
MPLS Features
Label Assignment and Distribution
Frame-Mode MPLS Implementation on Cisco IOS Platforms
MPLS Virtual Private Network Technology
MPLS VPN Implementation
Complex MPLS VPNs
Internet Access and MPLS VPNs
MPLS Traffic Engineering OverviewLab Outline
Verifying CEF Switching
Enabling MPLS
Change IP TTL Propagation
Configure MP-IBGP
Configure the VRF Instances
Configure RIP as a PE-CE Routing Protocol
Configure EIGRP as a PE-CE Routing Protocol
Configure OSPF as a PE-CE Routing Protocol
Configure BGP as a PE-CE Routing Protocol
Configure a Central Services VPN
Configure MPLS Traffic Engineering
Implement the Service Provider's and Customer's IP Addressing and IGP Routing
Implement the Core MPLS Environment in the Service Provider Network
Implement EIGRP Based VPNs
Implement OSPF Based MPLS VPNs
Implement BGP Based MPLS VPNs
Implement MPLS Traffic Engineering - IP6FD — Основы протокола IPv6, дизайн и построение сетей на его основе
- Длительность: 5 дней (40 часов)
 - Код курса: IP6FD
 - Стоимость
 - Очный формат: 804 000 ₸
 - Онлайн формат: 784 500 ₸
 
Описание курса
Course Description
IPv6 Fundamentals, Design, and Deployment (IP6FD) is a five-day training that provides you with the knowledge and skills needed to implement and configure the IP version 6 (IPv6) features of Cisco IOS software. The training also provides an overview of IPv6 technologies; covers IPv6 design and implementation; describes IPv6 operations, addressing, routing, services, and transition; and describes deployment of IPv6 in enterprise networks as well as in service provider networks. The training includes case studies that are useful for deployment scenarios and remote labs.
This training also earns you 40 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Learn how to successfully configure the IP version 6 features of Cisco IOS Software
Gain leading-edge skills for high-demand responsibilities in the enterprise sector
Earn 40 CE credits toward recertificationWho Should Enroll
Network Engineers
Course Objectives
Describe the history of IP version 4 (IPv4) and the rationale for implementing IPv6 to resolve IPv4 addressing and security issues
Explain the benefits of addressing with IPv6 and describe how larger IPv6 address sizes facilitate auto configuration and aggregation
Describe the market drivers that help promote IPv6 as the key technology of the future
Describe the IPv6 addressing architecture, including types of addresses and address representation
Describe changes in the IPv6 header and the purpose of extension headers
Describe and use Cisco IOS software commands to enable IPv6 on Cisco routers
Describe internet control message protocol (ICMP) types and codes and IPv6 neighbor discovery, which is the process in which neighbors discover each other and autoconfigure addresses
Describe the IPv6 configuration process on Cisco IOS software and provide some basic methods for troubleshooting issues that relate to IPv6 configurations
Explain IP mobility in general and describe the IPv6 network mobility model with possible usages
Describe how domain name system (DNS) works in an IPv6 environment
Describe dynamic host configuration protocol (DHCP) version 6 (DHCPv6) for IPv6 operations, including how DHCP operation in IPv6 differs from its operation in IPv4 and how you can implement DHCPv6 prefix delegation to improve the IPv6 numbering process
Describe the fields in the IPv6 header that are used to support quality of service (QoS) and explain how these fields differ from the IPv4 QoS model
Describe Cisco IOS tools, such as Telnet, Trivial File Transfer Protocol (TFTP), Secure Shell Protocol (SSH), and others
Describe open shortest path first (OSPF)v3, the IPv6-capable version of the OSPF routing protocol, including its operations, configuration, and commands
Describe Cisco enhanced interior gateway routing protocol (EIGRP), including its operation, configuration, and commands
Explore multiprotocol border gateway protocol (MP-BGP), including operation, IPv6-related configuration, and commands
Explain the issues when using policy-based routing (PBR) and when disabling the processing of extension headers
Describe the characteristics of first hop redundancy protocol (FHRP) for IPv6, which are used to offer redundant connections on the network layer for upstream connectivity
Describe redistribution of IPv6 routing information, differences among various routing protocols, and changes in the behavior of redistribution compared to IPv4
Describe the IPv6 multicast addresses format, including a real-life multicast example
Describe IPv6 multicast addressing options, media access control (MAC) address mappings, and multicast address scoping
Describe the dual-stacking approach to integrating IPv6 functionality into an existing IPv4-only environment
Describe tunneling mechanisms for IPv4-to-IPv6 transition, or for supporting IPv4 and IPv6 coexistence
Explain the benefits of adopting IPv6 single stack instead of using both IPv4 and IPv6 and the process for converting networks from IPv4 to IPv6
Describe the features of access control lists (ACLs) in an IPv6 environment
Describe how security is implemented in IPv6
Describe security issues in an IPv6 transition environment
Describe security practices for IPv6 deployment
Describe how Cisco IOS Firewall works and how to configure it in Pv6 traffic
Describe the IPv6 networking environments in use today, the process of becoming an IPv6 internet service provider (ISPs), address allocation policies and organizations, and strategies for connecting to the IPv6 internet
Identify an IPv6 multihoming issue and prescribe a potential solution
Describe several IPv6 enterprise deployment strategies
Explain how to deploy IPv6 over a multi-protocol label switching (MPLS) network
Describe IPv6 broadband access services and digital subscriber line (DSL)-based access in particular
Describe how to plan and implement IPv6 in enterprise networks
Describe how plan and implement IPv6 cloud and software-defined deployments
Describe and identify the most common planning and implementation approaches as they pertain to moving to IPv6 in branch networksCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Understanding of networking and routing (on Cisco CCNP level, but no formal certification is required)
Working knowledge of the Microsoft Windows operating system
These skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA)Course Outline
Explaining the Rationale for IPv6
IPv6 Features and Benefits
Market Drivers
IPv6 Addressing Architecture
IPv6 Header Format
Enabling IPv6 on Cisco Routers
Using ICMPv6 and Neighbor Discovery
Troubleshooting IPv6
IPv6 Mobility
DNS in an IPv6 Environment
DHCPv6 Operations
QoS Support in an IPv6 Environment
Cisco IOS XE Software Features
Examining OSPFv3
Examining EIGRP for IPv6
Introducing MP-BGP
Configuring IPv6 Policy-Based Routing
Configuring FHRP for IPv6
Configuring Route Redistribution
Implementing Multicast in an IPv6 Network
Using IPv6 MLD
Implementing Dual-Stack
IPv6 Tunneling Mechanisms
Transition to Single-Stack Deployments
Configuring IPv6 ACLs
Using IPsec, IKE, and VPNs
Security Issues in an IPv6 Transition Environment
IPv6 Security Practices
Configuring Cisco IOS Firewall for IPv6
IPv6 Address Allocation
IPv6 Multihoming Issues
IPv6 Enterprise Deployment Strategies
Support for IPv6 in MPLS
IPv6 Broadband Access Services
Planning and Implementing IPv6 Cloud and Software-Defined Deployments
Planning and Implementing IPv6 in Enterprise Networks
Planning and Implementing IPv6 in Branch NetworksLab Outline
Using Neighbor Discovery
Using Prefix Delegation
Routing with OSPFv3
Routing with EIGRP Routing with BGP and MP-BGP
Multicasting
Implementing Tunnels for IPv6
Configuring Advanced ACLs
Implementing IPsec and IKE
Configuring Cisco IOS Firewall - SPFNDU — Understanding Cisco Service Provider Network Foundations
- Длительность: 5 дней (40 часов)
 - Код курса: SPFNDU
 - Стоимость
 - Очный формат: 705 000 ₸
 - Онлайн формат: 691 500 ₸
 
Описание курса
Course Overview
The Understanding Cisco Service Provider Network Foundations (SPFNDU) v1.0 course is designed to provide you with the foundational knowledge for the suite of Cisco® CCNP® Service Provider courses. The course expands what you learned from the Cisco CCNA® course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. This course also earns you 30 Continuing Education (CE) credits towards recertification.
Who should attend
Network administrator
Network engineer
Network manager
System engineer
Project manager
Network designerCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Knowledge of IPv4 and IPv6 Transmission Control Protocol/Internet Protocol (TCP/IP) networking
Familiarity with a typical service provider environment
Basic knowledge about networking devices and their rolesThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA)Course Objectives
Describe network architectures, devices, and software used by service providers
Describe the various Internet governance organizations, their roles, and tools available for governance information verification
Configure Cisco Internetwork Operating System (Cisco IOS®) and Cisco IOS XE routers
Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks
Describe various access and core technologies used by service providers
Describe various major switching technologies used by service providers
Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN)
Describe various major routing protocols used by service providers
Configure Layer 3 services used by service providers
Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage
Describe usage of various services used and maintained by service providers
Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR softwareLab Topology
Review Lab Environment
Examine Governance Data
Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration
Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices
Perform Initial Cisco IOS XR Configuration
Configure and Verify Connectivity on Cisco IOS XR
Configure Intermediate System to Intermediate System (IS-IS)
Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng)
Configure Basic Border Gateway Protocol (BGP)
Configure MPLS
Configure Internet Protocol Service Level Agreement (IP SLA)
Configure Hot Standby Router Protocol (HSRP) with Object Tracking
Configure Virtual Routing and Forwarding (VRFs)
Configure Network Time Protocol (NTP)
Use Linux Command Line Interface
Configure IOS XR Using a Bash ScriptOutline:
Introducing Service Provider Architectures
Describing Internet Governance Organizations
Configuring the Cisco IOS and Cisco IOS XE Router
Configuring Cisco IOS XR Router
Introducing Access and Core Technologies in the Service Provider Environment
Introducing Routing Technologies in the Service Provider Environment
Describing MPLS
Implementing Layer 3 Services
Introducing Switching Technologies in the Service Provider Environment
Introducing Overlay Technologies
Implementing Service Provider Services
Introducing Programmability on Cisco IOS XR Routers - SPCOR — Implementing and Operating Cisco Service Provider Network Core Technologies
- Длительность: 5 дней (40 часов)
 - Код курса: SPCOR
 - Стоимость
 - Очный формат: 705 000 ₸
 - Онлайн формат: 691 500 ₸
 
Описание курса
Course Description
The Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training expands your knowledge and skills of service provider core networks. You will gain the theoretical and practical knowledge needed to implement and operate service provider networks using technologies such as core architecture, services, networking, automation, quality of service (QoS), security, and network assurance.
This training prepares you for the 350-501 SPCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider and Cisco Certified Internetwork Expert (CCIE) Service Provider certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Configure, verify, troubleshoot, and optimize next-generation, service provider internet protocol (IP) network infrastructures
Deepen your understanding of service provider technologies, including core architecture, services, networking, automation, quality of services, security, and network assurance
Prepare for the 350-501 SPCOR v1.0 exam
Earn 64 CE credits towards recertificationWho Should Enroll
Network Administrators
Network Engineers
Network Managers
System Engineers
Project Managers
Network DesignersWhat to Expect in the Exam
Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) v1.0 is a 120-minute exam associated with the Cisco Certified Specialist – Service Provider Core certification and satisfies the core exam requirement for the CCNP Service Provider and CCIE Service Provider certifications.
This exam tests your knowledge of core service provider network technologies, including:
Core architecture
Services
Networking
Automation
Quality of services
Security
Network assuranceCourse Objectives
Describe the service provider network architectures, concepts, and transport technologies
Describe the Cisco IOS software architectures, main internetwork operating system (IOS) types, and their differences
Implement open shortest path first (OSPF) in the service provider network
Implement integrated intermediate system to intermediate system (IS-IS) in the service provider network
Implement border gateway protocol (BGP) routing in service provider environments
Implement route maps and routing policy language
Describe IPv6 transition mechanisms used in the service provider networks
Implement high availability mechanisms in Cisco IOS XR software
Implement traffic engineering in modern service provider networks for optimal resource utilization
Describe segment routing and segment routing traffic engineering concepts
Describe the virtual private network (VPN) technologies used in the service provider environment
Configure and verify multi-protocol label switching (MPLS) L2VPN in service provider environments
Configure and verify MPLS L3VPN in service provider environments
Implement IP multicast services
Describe the QoS architecture and QoS benefits for service provider networks
Implement QoS in service provider environment
Implement control plane security in Cisco devices
Implement management plane security in Cisco devices
Implement data plane security in Cisco devices
Describe the YANG data modeling language
Implement automation and assurance tools and protocols
Describe the role of Cisco Network Services Orchestrator (NSO) in service provider environments
Implement virtualization technologies in service provider environmentCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Intermediate knowledge of Cisco IOS or IOS XE
Familiarity with Cisco IOS or IOS XE and Cisco IOS XR software configuration
Knowledge of IPv4 and IPv6 transmission control protocol (TCP)/IP networking
Intermediate knowledge of IP routing protocols
Understanding of MPLS technologies
Familiarity with VPN technologiesThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA®)
Understanding Cisco Service Provided Network Foundations (SPFNDU)Course Outline
Describing Service Provider Network Architectures
Describing Cisco IOS Software Architectures
Implementing OSPF for Cisco IOS XR
Implementing IS-IS for Cisco IOS XR
Implementing BGP in Service Provider Network
Implementing Route Maps and RPL
Transitioning to IPv6 for Cisco IOS XR and IOS XE
Implementing High Availability in Networking
Implementing MPLS for Cisco IOS XR
Implementing Cisco MPLS Traffic Engineering
Describing Segment Routing
Describing VPN Services
Configuring L2VPN Services
Configuring L3VPN Services
Implementing Multicast for Cisco IOS XR
Describing QoS Architecture
Implementing QoS for Cisco IOS XR
Implementing Control Plane Security
Implementing Management Plane Security
Implementing Data Plane Security
Introducing Network Programmability
Implementing Automation and Assurance
Introducing Cisco NSO
Implementing Virtualization in Service Provider EnvironmentLab Outline
Deploy Cisco IOS XR and IOS XE Basic Device Configuration
Implement OSPF Routing
Implement Integrated IS-IS Routing
Implement Basic BGP Routing
Filter BGP Prefixes Using RPL
Implement MPLS in the Service Provider Core
Implement Cisco MPLS TE
Implement Segment Routing
Implement EoMPLS
Implement MPLS L3VPN
Implement BGP Security
Implement RTBH Filtering - SPRI — Implementing Cisco Service Provider Advanced Routing Solutions
- Длительность: 5 дней (40 часов)
 - Код курса: SPRI
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) training teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.
This training prepares you for the 300-510 SPRI v1.1 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification. This training also earns you 37 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the high-demand skills to maintain and operate advanced technologies related to Service Provider core networks
Increase your knowledge and skills for implementing Service Provider core advanced technologies through hands-on application and practical instruction
Prepare for the 300-510 SPRI v1.1 exam
Earn 37 CE credits toward recertificationWho Should Enroll
Network Administrators
System Engineers
Project Managers
Network DesignersWhat to Expect in the Exam
Implementing Cisco Service Provider Advanced Routing Solutions (300-510 SPRI) v1.1 is a 90-minute exam associated with the Cisco Certified Specialist – Service Provider certification and satisfies the concentration exam requirement for the CCNP Service Provider certification.
This exam tests your knowledge of implementing service provider advanced routing technologies, including:
Routing protocols
Policy language
MPLS
Segment routingCourse Objectives
Configure multiarea OSPF
Configure OSPF special area types and optimization features
Configure IS-IS multilevel networks and optimization features
Configure BGP to influence outbound and inbound BGP route selection
Implement BGP route reflectors and confederations
Describe the main characteristics of routing protocol tools that are used in service provider environments
Implement the Routing Policy Language
Configure route redistribution
Troubleshoot routing protocols in the service provider network
Describe, implement, and troubleshoot MPLS in service provider network
Describe and implement segment routing technology
Introduce and implement segment routing IPv6
Implement BGP security options
Implement advanced features to improve convergence in BGP networks
Implement Topology Independent Loop-Free Alternate (TI-LFA)
Describe Cisco MPLS traffic engineering
Describe how traffic engineering is used in segment routing networks
Implement and configure advanced SR-TE features
Implement IPv6 tunneling mechanisms
Describe IP multicast concepts and technologies
Implement and verifying the PM-SM protocol
Implement enhanced PIM-SM features
Implement MSDP in the interdomain environment
Implement mechanisms for dynamic RP distributionCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Intermediate to advanced knowledge of Cisco Internetwork Operating System (Cisco IOS®) or IOS XE and Cisco IOS XR Software configuration
Knowledge of IPv4 and IPv6 TCP/IP networking
Intermediate knowledge of BGP, OSPF, and ISIS routing protocols
Understanding of MPLS technologies
Understanding of multicast technologies
Familiarity with segment routingThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)Course Outline
Configure OSPF Multiarea Networks
Configure OSPF Special Area Types
Configure OSPF Optimization Features
Configure IS-IS Multilevel Networks
Configure IS-IS Optimization Features
Introducing Routing Protocol Tools
Introducing Routing Policy Language
Influencing Outbound BGP Route Selection
Influencing Inbound BGP Route Selection
Scaling BGP in Service Provider Networks
Implementing Route Redistribution
Troubleshooting Routing Protocols
Improving BGP Convergence and Implementing Advanced Operations
Multiprotocol Label Switching
Cisco MPLS Traffic Engineering
Troubleshooting MPLS
Segment Routing
Implementing Segment Routing
Segment Routing for IPv6
Implementing Segment Routing for IPv6
Segment Routing TI-LFA
Segment Routing Traffic Engineering
Advanced Segment Routing Traffic Engineering Features
Securing BGP
Deploying IPv6 Tunneling Mechanisms
IP Multicast Concepts and Technologies
Implementing PIM-SM Protocol
Implementing PIM-SM Enhancements
Implementing Interdomain IP Multicast
Implementing MPLS
Implementing Distributed Rendezvous Point Solution in Multicast NetworkLab Outline
Implement OSPF Special Area Types (IPv4 and IPv6)
Implement OSPF Route Summarization (IPv4 and IPv6)
Implement Multiarea IS-IS
Implement IS-IS Route Summarization
Implement Outbound BGP Route Selection
Implement Inbound BGP Route Selection
Implement BGP Route Reflectors
Implement Route Redistribution
Troubleshoot Routing Protocols
Configure and Verify IGP Segment Routing
Configure and Verify SRv6
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR-TE Using OSPF
Configure and Verify SR-TE Using IS-IS
Configure and Verify ODN and Flexible Algorithm
Implement BGP Security Options
Implement Tunnels for IPv6
Enable and Optimize PIM-SM
Implement PIM-SM Enhancements
Implement MPLS in the Service Provider Core
Implement Rendezvous Point Distribution - SPVI — Implementing Cisco Service Provider VPN Services
- Длительность: 5 дней (40 часов)
 - Код курса: SPVI
 - Стоимость
 - Очный формат: 794 000 ₸
 - Онлайн формат: 774 000 ₸
 
Описание курса
Course Overview
The Implementing Cisco Service Provider VPN Services (SPVI) v1.0 course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.
This course prepares you for the 300-515 Implementing Cisco® Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist – Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP® Service Provider certification.
What to expect in the exam
The 300-515 SPVI exam certifies your knowledge of implementing service provider VPN services including Layer 2, Layer 3, and IPv6. After you pass 300-515 SPVI, you earn the Cisco Certified Specialist – Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP Service Provider certification.
Who should attend
This course is for network professionals who need to learn the techniques to implement, configure, monitor, and support Service Provider VPN solutions based on MPLS backbones.
Network administrators
Network engineers
Network supervisors
Network managers
Network Operations Center (NOC) personnel
Network designers
Network architects
Channel partnersHow You'll Benefit
This course will help you:
Gain valuable skills in reinforcing MPLS VPN fundamental concepts, benefits, and classifications
Learn to configure optional paths for traffic to avoid network congestion
Earn 40 CE credits toward recertification
Prepare to take the 300-515 SPVI examCourse Objectives
After taking this course, you should be able to:
Describe VPN concepts and operation in a Service Provider environment
Implement Layer 3 MPLS VPN operations in a Service Provider environment
Implement Layer 3 Inter-domain MPLS VPN services traversing multiple Service Providers
Implement Layer 3 Multicast MPLS VPN operations in a Service Provider environment
Troubleshoot typical issues in Layer 3 MPLS VPN environments
Implement Layer 2 VPN operations in a Service Provider environment
Troubleshoot Layer 2 VPN issues in a Service Provider network
Implement MPLS VPN solutions for IPv6 environments
Troubleshoot MPLS VPN solutions for IPv6 environmentsCourse Prerequisites
Before taking this course, you should have Service Provider knowledge at the professional level, equivalent to the material in the following Cisco courses:
Building Cisco Service Provider Next-Generation Networks Part 1 (SPNGN1)2
Building Cisco Service Provider Next-Generation Networks Part 2 (SPNGN2)2
Deploying Cisco Service Provider Network Routing (SPROUTE)In the new certification program, foundational material is covered in these courses:
Implementing and Administering Cisco Solutions (CCNA®)
Understanding Cisco Service Provider Network Foundations (SPFNDU)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)Outline:
Introducing VPN Services
VPN Fundamentals
MPLS VPN Control Plane OperationTroubleshooting MPLS VPN Underlay
Troubleshoot Core Interior Gateway Protocol (IGP)
Troubleshoot Border Gateway Protocol (BGP)Implementing Layer 3 MPLS VPNs
Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs
Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNsImplementing Layer 3 Interdomain MPLS VPNs
Inter-Autonomous System (AS) for Layer 3 MPLS VPNs
Content Security and Control (CSC) for Layer 3 MPLS VPNsImplementing Layer 3 Multicast MPLS VPNs
Multicast VPN (MVPN) Fundamentals
Implement Intranet MVPNTroubleshooting Intra-AS Layer 3 VPNs
Troubleshoot PE-CE Connectivity
Troubleshoot PE-to-Route ReflectorImplementing Layer 2 VPNs
Layer 2 Service Architecture and Carrier Ethernet Services
Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree SolutionsTroubleshooting Layer 2 VPNs
Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions
Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) SolutionsImplementing Layer 3 IPv6 MPLS VPNs
Classical Solutions for Deploying IPv6 over IPv4 Environments
Using 6VPE to Deploy IPv6 Connectivity over MPLS EnvironmentTroubleshooting Layer 3 IPv6 MPLS VPNs
Troubleshooting PE-to-PE ConnectivityLab Outline
Verify the Service Provider Backbone Operation for MPLS VPN
Work with VRF Instances
Troubleshoot the MPLS VPN Backbone
Configure MP-BGP as the PE-CE Routing Protocol
Configure and Verify PE-to-CE Routing Requirements
Enable Shared Services VPN
Deploy Internet Access as a VPN Service
Troubleshoot Layer 3 MPLS VPN End-Customer Connectivity
Implement Different EVPN Solutions
Troubleshoot EVPN VPWS
Implement IPv6 VPN Provider Edge Router (6VPE) - SEGRTE201 — Implementing Segment Routing on Cisco IOS XR
- Длительность: 4 дня (32 часа)
 - Код курса: SEGRTE201
 - Стоимость
 - Очный формат: 880 500 ₸
 - Онлайн формат: 790 500 ₸
 
Описание курса
Course Overview
The Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of Segment Routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement Topology-Independent Loop-Free Alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP).
How you’ll benefit
This course will help you:
Learn how to configure and verify segment routing within an Interior Gateway Protocol (IGP)
Prepare to implement topology-independent loop-free alternate using segment routing
Learn to implement segment routing within Border Gateway ProtocolWho should attend
Systems engineers
Network engineers
Field engineers
Technical support personnel
Channel partners and resellersPrerequisites
Before taking this course, you should have:
Familiarity with Cisco Internetwork Operating System (IOS®) XR software
Knowledge of general networking conceptsCourse Objectives
After taking this course, you should be able to:
Describe the key concepts of segment routing
Implement and verify IGP segment routing
Migrate an existing Multiprotocol Label Switching (MPLS) LDP-based network to segment routing
Implement and verify TI-LFA segment routing
Instantiate segment routing policies
Instantiate multidomain segment routing policies
Configure and verify BGP prefix segments and SR-based servicesLab Topology
Configuring and Verifying IGP Segment Routing
Migrating from LDP to Segment Routing
Configuring and Verifying TI-LFA Fast Reroute
Configuring and Verifying SR Policies
Configuring and Verifying Multidomain SR-TE
Configuring and Verifying BGP Segment RoutingOutline:
Introduction to Segment Routing
IGP Segment Routing Implementation and Verification
Segment Routing and LDP Interworking
Topology Independent – Loop Free Alternate
Segment Routing Policies – Traffic Engineering (SR-TE)
Multidomain SR Policies
BGP Prefix Segment and Egress Peer Engineering - EPNM — Cisco SP Technologies and Management with EPNM
- Длительность: 5 дней (40 часов)
 - Код курса: EPNM
 - Стоимость
 - Очный формат: 1 636 500 ₸
 - Онлайн формат: 1 624 500 ₸
 
Описание курса
Содержание курса:
Module 1. The Concept of Service Provider Routing
1.1. SP Routing Overview
1.2. Link State IGP Routing
1.3. BGP Introduction
1.4. BGP ScalabilityModule 2. Implementing MPLS L3 VPN
2.1. MPLS Overview
2.2. SP VPN Technology Overview
2.3. The concept of VRFs
2.4. Using MP-BGP between PEs
2.5. CE-PE Routing Using Different Protocols
2.6. Multipoint MPLS L3 VPNModule 3. Implementing MPLS L2 VPN
3.1. Metro Ethernet Introduction
3.2. MPLS L2 Pseudowires
3.3. Virtual Private Lan Service.
3.4. VPLS BGP Auto-Discovery
3.5. MPLS EVPNModule 4. Traffic Engineering
4.1. The Concept of Traffic Engineering
4.2. RSVP Based Traffic Engineering
4.3. Introduction to Segment Routing (SR)
4.4. SR and LDP Interworking
4.5. TI-LFA
4.6. Segment Routing Traffic Engineering (SR-TE)Module 5. Cisco Evolved Packet Network Manager
5.1. Exploring Cisco EPN Manager
5.2. Viewing Devices and Inventory
5.3. Viewing Network Topologies and Circuits
5.4. Using Dashboards
5.5. Managing Alarms and Events
5.6. Generating Reports
5.7. Performing Basic Administration
5.8. Adding Devices
5.9. Backup and Restoring
5.10. Performing System Maintenance
5.11. Software Image Management (SWIM)
5.12. Configuration Management
5.13. Monitoring with Policies
5.14. Provisioning Carrier Ethernet Services
5.15. Provisioning Cisco MPLS Traffic Engineering ServicesLabs
 - ASR9KE — Cisco Aggregation Services Router 9000 Series Essentials
- Длительность: 4 дня (32 часа)
 - Код курса: ASR9KE
 - Стоимость
 - Очный формат: 968 500 ₸
 - Онлайн формат: 954 500 ₸
 
Описание курса
Course Overview
The Cisco Aggregation Services Router 9000 Series Essentials v6.1 course introduces you to the features and functions of the Cisco® Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS® XR 64-Bit software packages.
This course will help you:
Understand the essential features and functions of the ASR 9000 Series routers running Cisco IOS XR 64-Bit software
Practice Cisco IOS XR 64-Bit configurations on the ASR 9900 Series router in lab exercises
Configure Cisco ASR 9900 configuration changes and restore older versions of the configuration
Install the Cisco IOS XR 64-Bit Software operating system, Package Information Envelopes (PIEs), and Software Maintenance Updates (SMUs)
Understand data flow through the Cisco ASR 9000 and ASR 9900 Series routerWho should attend
This course is designed for technical professionals who need to know how to deploy Cisco ASR 9000 Series routers in their network environment. The primary audience for this course includes:
System engineers
Technical support personnel
Channel partners, resellersPrerequisites
Before attending this course, you should have the following knowledge and skills:
Basic IOS XR 64-Bit Software configuration commands
Basic knowledge of router installation and some experience with installation tools
Routing protocol configuration experience with BGP, Intermediate System-to-Intermediate System (IS-IS), and Open Shortest Path First (OSPF)
Knowledge of Layer 2 IEEE switching and related protocols
Strong knowledge of MPLS configuration or multicast configuration experience
Experience troubleshooting Cisco routers in a large network environmentCourse Objectives
After taking this course, you should be able to:
List and describe the major features and benefits of a Cisco ASR 9000 Series router
List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system
Understand data flow through the Cisco ASR 9000 Series router
Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration
Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes, and software maintenance updates
Enable multicast routing on a Cisco ASR 9900 Series router
Configure Layer 3 VPN services
Configure Ethernet link bundles
Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN)
Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN
Configure EoMPLS with pseudowire backup
Configure local Ethernet LAN (E-LAN) L2VPN
Describe Virtual Private LAN Service (VPLS) L2VPN
Describe VPLS with Border Gateway Protocol (BGP) autodiscovery
Configure service-based Connectivity Fault Management (CFM)
Configure Layer 2 multicast features
Describe basic QoS implementation
Describe how to configure and verify network Virtualization (nV) on the ASR 9000 seriesCourse Outline:
Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE)
Cisco ASR 9000 Series Hardware
Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals
Cisco IOS XR 64-Bit Software Installation
Cisco IOS XR 64-Bit Software Configuration Basics
Cisco IOS XR 64-Bit Software Routing Protocols
Multicast Routing
Cisco Multiprotocol Label Switching
Cisco IOS XR 64-Bit Segment Routing
Layer 3 VPNs
Cisco ASR 9000 Layer 2 Architecture
Point-to-Point Layer 2 Services
Layer 2 Multicast
Quality of ServiceLab Topology
ASR 9904 Hardware Discovery Lab
Device Discovery and Initial Configuration
Installing Cisco IOS XR 64-Bit Software
Cisco IOS XR 64-Bit Software Operations
Configuring IS-IS Routing
Configuring OSPF Routing
Configuring Internal BGP (iBGP) Routing
IPv4 Multicast Configuration
Configuring Multiprotocol Label Switching
Configuring and Verifying IGP Segment Routing
Configuring Layer 3 Virtual Private Network
Local E-Line Service
EoMPLS Service - NSO201 — NSO Essentials for Programmers and Network Architects v4.0
- Длительность: 4 дня (32 часа)
 - Код курса: NSO201
 - Стоимость
 - Очный формат: 880 000 ₸
 - Онлайн формат: 790 000 ₸
 
Описание курса
Course Overview
The NSO Essentials for Programmers and Network Architects (NSO201) training introduces you to Cisco Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This training provides an overview of NSO as a network automation solution as well as introducing you to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO.
How You’ll Benefit
This course will help you:
Learn to install Cisco Network Services Orchestrator (NSO)
Practice configuring devices with NSO
Practice designing and managing services with YANG models
Gain confidence with NSO configurationWho Should Enroll
This training is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:
Network administrators
Solutions designers
System installers
System integrators
System administratorsPrerequisites
Cisco require students to have the following knowledge and skills:
Basic knowledge of the Cisco Command-Line Interface (CLI) or the CLI of UNIX-like operating systems
Working knowledge of UNIX-based operating systems and basic tasks
Basic knowledge of programming constructs
Basic knowledge of YANG data modeling
Basic knowledge of the NETCONF communication protocol
Knowledge of XML data structures and schemas
Basic management of network components (routers, switches, etc.)
The following Cisco courses can help you gain the necessary backgroundProgramming for Network Engineers (PRNE)
Introducing Automation for Cisco Solutions (CSAU)Course Objectives
Explain the transactional service activation and how it relates to business requirements
Explain how Cisco NSO communicates with network devices
Understand the NETCONF protocol and be able to read and write simple YANG models
Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable
Understand the support for candidate configuration and confirmed commit support
Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices
Explain the YANG service model structure
Design a real-world usable service
Explain the mapping logic of service parameters to device models and consequently to device configurations
Describe the use of different integration options and APIs
Explain how to implement action with use of config-templates in NSO package
Explain the use of Reactive FASTMAP in for manipulating and implementing advanced NFV components
Describe the use of feature components and function packs
Define and explain the ETSI MANO principles and solution
Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures
Describe Cisco NSO 5.3 new features and changes in NSOCourse Outline:
Cisco Network Service Orchestrator (NSO) Essentials for Programmers and Network Architects (v4.0) (NSO201)
Introducing Service Orchestration with Cisco NSO
Exploring Cisco NSO Architecture
Orchestrating Network Solutions
Describing Cisco NSO Operation
Installing Cisco NSO
Exploring the Advantages of NETCONF
Managing Devices Using the Device Manager
Creating YANG Models
Using Services
Implementing Services with Model-to-Model Mapping
Designing Services in Cisco NSO
Managing the Service Lifecycle
Programming with Python in Cisco NSO
Configuring and Troubleshooting System Settings
Discovering Cisco NSO Northbound APIs
Managing Alarms and Reporting
Configuring Cisco NSO for Scalability and Performance
Describing Cisco NSO VNF Manager and Function PacksLab Topology
Install Cisco NSO
Use Device Manager
Create a Device Template
Create a Loopback Template Service
Create a VLAN Template Service
Create an L3VPN Template Service
Migrate a CDM Device
Set Up a Device Using Python Scripts
Create an SVI Python Template Service
Use NSO RESTCONF API with Postman - NSO300 — NSO Advanced for Python Programmers
- Длительность: 5 дней (40 часов)
 - Код курса: NSO300
 - Стоимость
 - Очный формат: 871 000 ₸
 - Онлайн формат: 778 000 ₸
 
Описание курса
Course Overview
The Cisco Network Services Orchestrator (NSO) Advanced for Python Programmers (NSO300) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 course with NSO to include customizing templates with Python programming, Docker deployment, and Nano services. You will learn to create advanced services using the NSO application framework and Python scripting with both new and existing Layer 3 Multiprotocol Label Switching (MPLS) VPN services. You will also learn how to manage and scale these services to reduce operation consumption, and increase both security and available physical space, since Virtualized Network Functions (VNFs) replace physical hardware. You will use Network Functions Virtualization (NFV) orchestration features, and Cisco Elastic Services Controller (ESC) to manage virtualized network functions.
This course will help you:
Tailor a Cisco Network Services Orchestrator solution for your organization
Manage virtualized network functions (VNFs) automated, efficient, and dynamic network functioningWho should attend
System engineers
System integrators
System programmers
System administrators
Network administrators
Solutions designersPrerequisites
Before you take this course, Cisco recommends that you have the knowledge and skills obtainable by attending the Cisco Network Service Orchestrator (NSO) Essentials for Programmers and Network Architects (v4.0) (NSO201) class, plus have knowledge in the following areas:
Basic knowledge of the command line of UNIX-like operating systems
Basic knowledge of Network Configuration Protocol (NETCONF)
Basic knowledge of Yet Another Next Generation (YANG) data modelling
Basic knowledge of Python software developmentCourse Objectives
Describe the NSO application framework
Deploy NSO in Docker
Implement Python- and template-based service
Describe service lifecycle integration
Describe the implementation of Layer 3 MPLS VPN service for a new service deployment
Implement Nano services
Describe the implementation of Layer 3 MPLS VPN service for an existing deployment
Describe managed services
Implement stacked services
Describe how to scale service orchestration
Describe the European Telecommunications Standards Institute Management and Orchestration (ETSI MANO) Framework
Manage VNF Lifecycle with Cisco ESC
Implement NFVCourse Outline:
Discovering the NSO Application Framework
NSO Transaction Model and Mapping Options
NSO Python API OverviewDeploying NSO in Docker Containers
Comparing NSO Deployments
NSO in Docker OverviewDeveloping Python and Template-Based Service
Service Strategy
Service Design—Service ModelIntegrating Service Lifecycle
Service Lifecycle Overview
Integration Options OverviewDeveloping a Layer 3 MPLS VPN Service for New Service Deployment
Service Strategy
Service Design—Service ModelDeveloping Nano Services
Nano Services
Service Design Manual Resource AllocationDeveloping Layer 3 MPLS VPN Service for Existing Deployment
Existing Service Deployment Strategy
Existing Service Deployment DesignIntroducing Managed Services
Managed Services Overview
Resource AllocationImplementing Stacked Services
Stacked Services Strategy
Implementing Resource-Facing ServicesScaling Service Orchestration
Optimization Options
Layered Services Architecture DesignDiscovering the ETSI MANO Framework
Network Functions Virtualization Initiative
ETSI MANOManaging VNF Lifecycle with Cisco ESC
Introduction to Cisco ESC
VNF Lifecycle ManagementOrchestrating NFV
NFV Orchestration (NFVO) Bundle Introduction
VNF DescriptorLab Topology
Create NSO Docker Environments
Create Switch Virtual Interface (SVI) Service Using Premodification Service Callback
Implement Nano Services
Create an L3VPN Service Using Dynamic ID Allocation
Perform an L3VPN Service Upgrade
Implement Stacked Services
Deploy Link State Advertisement (LSA) Service
Integrate Cisco ESC and OpenStack
Deploy NFV for Demilitarized Zone [[OK?]](DMZ) Service
Implement Self-Test Action - NSO303 — Cisco NSO Administration and DevOps
- Длительность: 4 дня (32 часа)
 - Код курса: NSO303
 - Стоимость
 - Очный формат: 702 000 ₸
 - Онлайн формат: 604 000 ₸
 
Описание курса
Course Overview
The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 and NSO Advanced for Python Programmers (NSO300) v4.0 courses by introducing you to the system administration and DevOps focusing on NSO; the robust bridge linking network automation and orchestration tools, examining the development, operation, and administration task functions. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and learn best practices for using DevOps. The examples shown in this course demonstrate real-world scenarios to prepare you for deployment and management of new or existing NSO instances. The course guides you through the setup of a production ready NSO instances using system installation with access control settings, the deployment of NSO in Docker containers, and introduces modern DevOps concepts and tools such as Git and Continuous Delivery/Continuous Deployment (CI/CD). You will learn how to migrate CDM devices, how to build NETCONF NEDs from the NSO CLI, how to handle NSO Alarms, and many more features that benefit you in your journey with Cisco NSO.
How You'll Benefit
This training will help you:
Install, configure, and maintain a Cisco Network Services Orchestrator solution
Apply DevOps best practices for Cisco NSO development, operations, and administrative tasks
Implement Layered Service Architecture (LSA) within a Cisco NSO solution
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level networking roles
Earn 32 CE credits toward recertification
Who Should EnrollDevOps Engineers
Integration Engineers
Network and Software architects
Network Engineers
Software Engineers
System AdministratorsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic knowledge of the Cisco CLI
Basic knowledge of the CLI of UNIX-like operating systems
Basic knowledge of Yet Another Next Generation (YANG) data modelling
Basic knowledge of Python software developmentThese skills can be found in the following Cisco Learning Offerings:
NSO Essentials for Programmers and Network Architects (NSO201) 4.2
NSO Advanced for Python Programmers (NSO300) 4.0Course Objectives
Describe network and IT convergence
Describe Cisco NSO architecture
Describe Linux
Configure Cisco NSO
Set up access control to Cisco NSO system
Describe Cisco NSO Integration Options
Explain version control systems and basic git concepts
Describe the purpose of continuous integration and continuous delivery
Implement Cisco NSO high availability
Describe scalable system management
Describe software development methodologies
Describe service maintenance
Perform NED upgrades
Use Cisco NSO for managing services and their associated device configurations
Describe Cisco NSO change management
Explain service problem management
Use Cisco NSO for service monitoring and compliance reporting
Describe Cisco NSO inventory management
Describe Cisco NSO use casesCourse Outline:
Introducing Network and IT Convergence
Introducing Cisco NSO Architecture
Introducing Linux
Explaining Cisco NSO Setup
Exploring Access Control
Describing Integration Options
Explaining Version Control System
Describing Continuous Integration and Continuous Delivery
Introducing Scalability and High Availability
Describing Scalable System Management
Describing Software Development Methodologies
Introducing Service Maintenance
Performing Network Element Driver (NED) Upgrades
Introducing Configuration Management
Describing Change Management
Explaining Service Problem Management
Explaining Service Monitoring and Compliance Reporting
Introducing Inventory Management
Describing Cisco NSO Use CasesLab Topology
Perform NSO System Install
Implement Role-Based Access and PAM
Using Cisco NSO APIs
Learn to work with Git
Use NSO in Docker
Configure High Availability
Migrating a Monolithic Service to LSA
Deploying the LSA Services
Use the Network Connectivity Tool (NCT)
Perform Service Backup and Restore
Migrate a CDM Device
Build a NETCONF NED
Replacing a Device
Troubleshoot NSO Alarms and Services
Creating a Compliance Report - OPT201 — Cisco NCS 2000 Deploying 96-Channel Flex Spectrum
- Длительность: 3 дня (24 часа)
 - Код курса: OPT201
 - Стоимость
 - Очный формат: 931 000 ₸
 - Онлайн формат: 836 000 ₸
 
Описание курса
Course Overview
The Cisco NCS2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 course shows you how to plan, configure, and control optical networks using the Cisco® Network Convergence System (NCS) 2000 series Flex Spectrum platform.
The course teaches you how to design Flex Spectrum networks with multi-degree Reconfigurable Optical Add-Drop Multiplexer (ROADM) multi-shelf nodes using the Cisco Transport Planner (CTP) software.
You’ll learn how to:
Install the Cisco NCS 2000 series hardware
Configure an optical network and circuits using the Cisco Transport Controller (CTC) software
Learn which components and configurations take advantage of and/or are required for the Flex Spectrum 96-channel feature
Configure optical networks with multidegree ROADM multishelf nodes
Configure optical networks with colorless, contentionless, omnidirectional, and MPO cross-connect advanced features
Describe and configure the NCS 2000 400-Gbps Xponder line card
How you’ll benefitThis class will help you:
Gain an in-depth understanding of how to install, deploy, and maintain a Cisco Optical Networking Services (ONS) 15454 Multiple Spanning Tree Protocol (MSTP) network
Practice what you learn through hands-on labsWho should attend
This course is designed for technical professionals who need to know how to deploy a Cisco NCS 2000 Series Dense Wavelength-Division Multiplexing (DWDM) network with Flex Spectrum.
The primary audience for this course includes:
Designers
Systems engineers and implementation staff
Network operations center personnel
Technical support personnel who are involved with the deployment, operations, and maintenance of the Cisco NCS 2000 Series
Channel partners and resellersCourse Prerequisites
Before taking this training, it is recommended to take the Cisco Optical Technology Foundations (OPTFND) training first. However, if you have some knowledge of optical fiber networking, single and multimode fibers, and small form-factor pluggables (SFPs), you should already have the necessary skills to complete this training.
Course Objectives
After taking this course, you should be able to:
Describe the hardware and components required and used with the Flex Spectrum feature
Design optical networks in the Cisco Transport Planner software
Install the hardware, including multishelf nodes
Perform node turn-up and create circuits using the Cisco Transport Controller software
Configure optical networks with multidegree ROADM multishelf nodes
Configure optical networks with colorless, contentionless, omnidirectional, and MPO cross-connect advanced features
Describe and configure the NCS 2000 400-Gbps Xponder line card
Add a node to an existing DWDM ring
Describe the NCS 2000 Troubleshooting Guide
Use the features and documentation with Transport Controller to perform maintenance, testing, and basic troubleshootingCourse Outline:
DWDM and Flex Spectrum Foundation
NCS 2000 Chassis and Cards
Design ROADM Networks with CTP
Hardware Installation and Multishelf
Node Turn-Up and Circuit Creation
Advanced Feature Networks and Circuits
Testing, Maintenance, and Basic Troubleshooting
Spectrum Switched Optical NetworkLab Topology
Cisco Transport Controller
Cisco Transport Planner
Adding a Node to Existing DWDM Ring Network
Optical Channel Network Connection (OCHNC) Circuits
Optical Channel Client Connection (OCHCC) Circuits
Colorless Ports and Circuits
Contentionless Circuits
Connection Verification
Performing the Optical Time Domain Reflectometer (OTDR) Test
Maintenance and Performance Monitoring
MSTP Troubleshooting
Configuring the 400XP card - PRNE — Programming for Network Engineers
- Длительность: 4 дня (32 часа)
 - Код курса: PRNE
 - Стоимость
 - Очный формат: 880 000 ₸
 - Онлайн формат: 790 000 ₸
 
Описание курса
Course Overview
The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts.
This course will help you:
Explain the need for network engineers to learn how to program
Explain how programming relates to the journey into network automation and programmability
Create useful and practical scripts to retrieve data and configure network devices
Create, apply, and troubleshoot simple network automation scripts
Gain hands-on experience with Python programmingWho should attend
This course is intended for:
Network administrators
Network engineers with little or no programming or Python experience
Network managers
Systems engineersPrerequisites
Before taking this course, you should have:
Familiarity with Cisco IOS®-XE software or other Cisco network device configuration and operation skills
Basic network management knowledge
Cisco CCNA® certification or equivalent knowledgeThe following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Administering Cisco Solutions (CCNA)Course Objectives
After taking this course, you should be able to:
Create a Python script
Describe data types commonly used in Python coding
Describe Python strings and their use cases
Describe Python loops, conditionals, operators, and their purposes and use cases
Describe Python classes, methods, functions, namespaces, and scopes
Describe the options for Python data manipulation and storage
Describe Python modules and packages, their uses, and their benefits
Explain how to manipulate user input in Python
Describe error and exception management in Python
Describe Python code debugging methodsCourse Outline:
Introducing Programmability and Python for Network Engineers
Scripting with Python
Examining Python Data Types
Manipulating Strings
Describing Conditionals, Loops, and Operators
Exploring Classes, Methods, Functions, Namespaces, and Scopes
Exploring Data Storage Options
Exploring Python Modules and Packages
Gathering and Validating User Input
Analyzing Exceptions and Error Management
Examining Debugging Methods
Course SummaryLab Topology
Execute Your First Python Program
Use the Python Interactive Shell
Explore Foundation Python Data Types
Explore Complex Python Data Types
Use Standard String Operations
Use Basic Pattern Matching
Reformat MAC Addresses
Use the if-else Construct
Use for Loops
Use while Loops
Create and Use Functions
Create and Use Classes
Use the Python main() Construct
Traverse the File Structure
Read Data in Comma-Separated Values (CSV) Format
Read, Store, and Retrieve Data in XML Format
Read, Store, and Retrieve Date in JavaScript Object Notation (JSON) Format
Read, Store, and Retrieve Data in a Raw or Unstructured Format
Import Modules from the Python Standard Library
Import External Libraries
Create a Python Module
Prompt the User for Input
Use Command-Line Arguments
Manage Exceptions with the try-except Structure
Manage Exceptions with the try-except-finally Structure
Use Assertions
Use Simple Debugging Methods
Use the Python Debugger
Code a Practical Debugging Script - SPMBL100 — Cisco Service Provider 5G Technologies Foundations
- Длительность: 4 дня (32 часа)
 - Код курса: SPMBL100
 - Стоимость
 - Очный формат: 880 500 ₸
 - Онлайн формат: 790 500 ₸
 
Описание курса
Course Overview
The Cisco Service Provider 5G Technologies Foundations (SPMBL100) v1.0 course introduces mobile network components, basic 5G concepts, and features of 5G technology including faster data speeds, higher device capacity, and improved user experience. You will examine the mobile packet core solutions, 5G transport architecture, and Cisco® automation and orchestration tools used in 5G networks. You will also learn about the Cisco 5G Non-standalone (NSA) and the Cisco Ultra Cloud Core 5G standalone (SA) platform solutions, the Cisco 5G converged Software-Defined Networking (SDN) transport architecture, and Cisco edge computing solutions. You will study the Cisco Network Function Virtualization (NFVI) architecture, Cisco Network Services Orchestrator (NSO), and Cisco Elastic Services Controller (ESC). You will learn how 5G is distributed with Telco Data Center (DC) with Cisco Application Centric Infrastructure (Cisco ACI®). And finally, Zero-Touch Provisioning (ZTP), Cisco Crosswork™, and the Cisco 5G security architecture will also be presented.
How you’ll benefit
This course will help you:
Use the higher data speeds of 5G to access data more quickly and accommodate every device with increased capacity
Learn how 5G technology delivers lower latency, higher device capacity, and a more uniform user experienceWho Should Enroll
This course is designed for network and software engineers and hold job roles such as:
Network administrator
Network engineer
Network manager
System engineer
Project manager
Network designerPrerequisites
Before enrolling in this course, you should have knowledge in the following areas:
Knowledge of general networking concepts
Experience working with command-line interface (CLI)-based network devices
Basic understanding of Multiprotocol Label Switching (MPLS)
Familiarity with service provider architecturesThe following Cisco course may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Service Provider Network Foundations (SPFNDU)Course Objectives
After taking this course, you should be able to:
Describe mobile network architecture basics
List enabling technologies for 5G and describe 5G key use cases
Perform basic operations on a Cisco 5G NSA mobile packet core
Describe the Cisco 5G Converged SDN Transport Architecture
Describe Cisco NFVI and perform basic operations using Cisco ESC and Cisco Virtualized Infrastructure Manager (VIM)
Describe Cisco service provider automation and orchestration solutions to deploy and manage 5G network functions
Describe the Cisco Ultra Cloud Core architecture and deploy the Cisco SMI
Explain the 5G ready distributed Telco DC with Cisco ACI solution
Describe the Cisco 5G security architectureCourse Outline:
Mobile Network Fundamentals
5G Key Use Cases
Examining Mobile Network ComponentsEnabling Technologies for 5G
Introduction to 5G NR Characteristics
Cloud Radio Access network (RAN)Cisco 5G NSA Solution
5G NSA Basics
5G NSA StarOS ConfigurationsCisco 5G Converged SDN Transport Architecture
Cisco 5G Transport Ready Devices
Application Awareness and Network Slicing with Segment RoutingCisco NFV Infrastructure, Cisco Virtualized Network Functions (VNFs), Cisco VIM, and Cisco ESC
NFVI and SDN Architecture Overview
Cisco VIM Pod ConfigurationsCisco Service Provider Automation and Orchestration
Telemetry Basics
ZTP FundamentalsCisco Ultra Cloud Core
Cisco Ultra Cloud Core Basics
Kubernetes and Docker Fundamentals5G Ready Distributed DC with Cisco ACI
Cisco ACI in Telco Data Centers
5GC DeploymentMitigating Threats in 5G
Introduction to 5G Cybersecurity Risks
Mitigating 5G Cybersecurity Risks - SPWAE — Operating and Implementing Cisco WAN Automation Engine
- Длительность: 3 дня (24 часа)
 - Код курса: SPWAE
 - Стоимость
 - Очный формат: 673 000 ₸
 - Онлайн формат: 578 000 ₸
 
Описание курса
Course Description
The Operating and Implementing Cisco WAN Automation Engine (SPWAE) v1.0 course teaches you, through a combination of lectures and labs, how to install the Cisco® WAN Automation Engine (WAE), builds your confidence with Cisco WAE configuration and basic troubleshooting, and enables you to practice designing and managing bandwidth and traffic engineering.
Additionally, you’ll learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solutions.
How You'll Benefit
This course will help you:
Learn to install Cisco WAN Automation Engine
Gain confidence with Cisco WAE configuration and basic troubleshooting
Practice designing and managing bandwidth and traffic engineeringWho Should Enroll
This course is designed for:
System installers
System integrators
System administrators
Network administrators
Solutions designersCourse Objectives
After taking this course, you should be able to:
Explain WAE basics, the purpose of WAE, and its capabilities
Understand the Cisco WAE solution implementation
Describe the network module configuration process
Describe WAE Design software tools, demands creation, BGP modeling, and Failure and Simulation analysis
Describe Cisco WAE Design traffic engineering and QoS modeling
Explain how to use API with WAE Design and WAE Server
Describe the function, components, and processes of Cisco WAE LiveCourse Prerequisites
Before taking this course, you should have the following knowledge and skills:
Knowledge of general networking and routing concepts
Basic knowledge of routing protocols: Open Shortest Path First (OSPF), Intermediate System-to-Intermediate System (IS-IS), Border Gateway Protocol (BGP)
Understanding of Cisco Multiprotocol Label Switching Traffic Engineering (MPLS TE) technologies
Understanding of Segment Routing Traffic Engineering (SR-TE) technologies
Basic knowledge of Linux server operation and Linux tools
Basic understanding of network automation and Software-Defined Networking (SDN) conceptsThe following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Administering Cisco Solutions (CCNA®)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Implementing Segment Routing on Cisco IOS XR (SEGRTE201)Course Outline
WAE Solution and Architecture Overview
Implementing a Cisco WAE Solution
Network Model Configuration
WAE Design Fundamentals
Cisco WAE Design Traffic Engineering and Optimization
Introducing Cisco WAE API
Cisco WAE Live DeploymentLab Outline
Start with Cisco WAE
Cisco WAE Server Setup and Collector Configuration
Get Started with Cisco WAE Design
Describe Traffic with Demands
Failures and Simulation Analysis
Engineer Traffic Using Metrics and SR-TE
Cisco WAE Design Remote Procedure Call (RPC) API
Configure Cisco WAE Live - NCS540HWE — Implementing the Cisco NCS540 Series Routers
- Длительность: 5 дней (40 часов)
 - Код курса: NCS540HWE
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Implementing the Cisco NCS 540 Series Routers (NCS540HWE) training teaches you how to deploy Cisco Network Convergence System (NCS) 540 Series routers in a network environment. You will be introduced to the features and functions of the Cisco NCS 540 series platforms, system architecture, services implementation, quality of service (QoS), system security, model-driven telemetry, and programmability. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Gain hands-on experience deploying Cisco NCS 540 Series routers in a network environment
Qualify for professional network job roles
Earn 40 CE credits towards recertificationWho Should Enroll
System Engineers
Network Engineers
Field Engineers
Technical Support Personnel
Channel partners, resellers System Engineers
Network Engineers
Field Engineers
Technical Support Personnel
Channel Partners
Channel ResellersCourse Objectives
Classify the Cisco NCS 540 platform hardware and understand the variations between large, medium, small, and fronthaul form factors, their features, use cases, and positioning
Describe the hardware architecture of the NCS 540 series and the components necessary for packet queuing and forwarding, understand the life of a packet on ingress and egress traffic
Explain the system architecture for traffic queuing, scheduling, and forwarding to introduce concepts of Cisco IOS XR modular QoS on the NCS 540 platform
Describe the methods and protocols for establishing timing and synchronization on Cisco IOS XR router platforms
Describe the Cisco NCS 540 fronthaul router family and its features and how they can be used to make mobile network architecture simpler
Describe Cisco IOS XR software architecture, its programmable features, and how to install software packages
Explain how to install Cisco IOS XR software packages
Recognize, implement, and manage system security features within Cisco IOS XR software systems, ensuring the protection of network infrastructure and data
Describe the main factors leading to the development and deployment of segment routing, segment types, segment routing global block (SRGB), and configure and verify intermediate system to intermediate system (IS-IS) and open shortest path first (OSPF) segment routing operation
Discuss how topology independent loop-free alternate (TI-LFA) is implemented in Cisco IOS XR software
Demonstrate segment routing traffic engineering (SR-TE) and the traffic engineering components used in segment routing
Implement and configure advanced SR-TE features and SR IPv6
Describe the components and functionality of Layer 3 multiprotocol label switching (MPLS) virtual private networks (VPNs) implementation in Cisco IOS XR software deployments
Implement Layer 2 VPN operations in a service provider environment
Explain how Ethernet VPN (EVPN) gets around the problems that regular Layer 2 VPNs have, what the model for EVPN delivery is, and how to implement and troubleshoot EVPN solutions
Comprehend and implement model-driven telemetry for enhanced network visibility and managementCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Knowledge of core Cisco networking technologies
Understanding of implementing and operating Cisco networking solutions
Recognition of general networking concepts and protocols
Basic knowledge of router installation and some experience with installation tools
Routing protocol configuration experience with border gateway protocol (BGP), IS-IS, and OSPFCourse Outline
Cisco NCS 540 Series Hardware Overview
Cisco NCS 540 System Architecture
Cisco NCS 540 QoS Architecture
Timing and Synchronization
Cisco NCS 540 xHaul Design
Cisco IOS XR Software Fundamentals
Cisco IOS XR Software Installation and Upgrade
Cisco IOS XR Software System Security
Segment Routing Fundamentals
Segment Routing Topology-Independent Loop-Free Alternate
Segment Routing Traffic Engineering
Advanced Segment Routing Traffic Engineering Features
Segment Routing IPv6
Layer 3 MPLS VPN Implementation with Cisco IOS XR Software
Layer 2 VPNs and Ethernet Services Fundamentals
Cisco IOS XR Software EVPN Operation and Implementation
Cisco IOS XR Software Programmability
Model-Driven TelemetryLab Outline
Configure and Verify NTP
Cisco IOS XR Software Installation
Configure and Verify MPP
Configure and Verify uRPF
Configure and Verify Segment Routing
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR TE Using IS-IS
Configure and Verify SR TE Using OSPF
Configure and Verify ODN and Flexible Algorithm
Configure and Verify SRv6
Configure and Verify Layer 3 VPN
Configure and Verify EVPN VPWS
Configure and Verify Devices by Using Model-Driven Programmability
Configure and Verify Model-Driven Telemetry - SPCNI — Designing and Implementing Cisco Service Provider Cloud Network Infrastructure
- Длительность: 5 дней (40 часов)
 - Код курса: SPCNI
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Designing and Implementing Cisco Service Provider Cloud Network Infrastructure training teaches you how to design and implement virtualization cloud infrastructures in a service provider network. You will learn about virtualized network function infrastructures and how to use programmability and orchestration to manage virtualization cloud infrastructures. You will also learn about cloud computing and implementation of cloud interconnect and data center interconnect solutions. In addition, you will learn how to monitor and secure virtualization cloud infrastructures and provide optimization and high availability within the infrastructures.
This training prepares you for the 300-540 SPCNI v1.0 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Cloud Network Infrastructure certification and satisfy the concentration exam requirement for the Cisco Certified Networking Professional (CCNP) Service Provider certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Design and implement virtualization cloud infrastructures in a service provider network
Learn about virtualized network function infrastructures
Learn how to use programmability and orchestration to manage virtualization cloud infrastructures
Learn about cloud computing
Learn about cloud interconnect and data center interconnect solutions
Learn how to implement various interconnect solutions
Learn how to monitor and secure virtualization cloud infrastructures and provide optimization and high availability within the infrastructures
Earn 40 CE credits toward recertificationWho Should Enroll
System Engineers
Technical Support Personnel
Channel Partners
ResellersWhat to Expect in the Exam
300-540 SPCNI: Designing and Implementing Cisco Service Provider Cloud Network Infrastructure is a 90-minute exam associated with the Cisco Certified Specialist – Service Provider Cloud Network Infrastructure certification and satisfies the concentration exam requirement for the CCNP Service Provider certification.
The multiple-choice format tests your knowledge of:
Designing and implementing virtualized architecture
Cloud interconnect
High availability
Security
Service assurance
Optimization best practicesCourse Objectives
Get an overview of Cisco Network Function Infrastructure, Cisco Network Infrastructure Manager, Cisco Virtualized Infrastructure Manager (VIM), and Cisco Network Service Orchestrator (NSO) Virtualized Infrastructure Manager
Understand the concept of networking and deployment operation in OpenStack platform
Get an overview the security features available in Cisco Network Functions Virtualization (NFVI) solution
Describe the application hosting architecture on a Cisco IOS XR router
Introduce containers and describe container architecture
Describe Kubernetes concepts, such as Kubernetes objects, and how nodes, pods, and clusters fit into them
Describe cloud computing, cloud deployment models, cloud service models, and Carrier-Neutral Facilities (CNFs)
Implement and configure Multi-Protocol Label Switching (MPLS), Segment Routing (SR), and SRv6
Describe the operation and data flow of the Layer 3 Virtual Private Network (VPN) control plane
Configure Label Distribution Protocol (LDP) and Border Gateway Protocol (BGP) security and optimization options
Describe Interior Gateway Protocol (IGP) control plane security mechanisms
Configure unicast reverse path forwarding, Media Access Control Security (MACsec), and remote-triggered black-hole filtering
Get an overview of high-availability technologies and multi-homing scenarios in the service provider network
Describe the benefits, enablement, implementation, and configuration of Segment Routing Traffic Engineering (SR-TE)
Describe Quality of Service (QoS) options for public cloud connectivity
Discuss high availability mechanisms used in routing (anycast) and services Domain Name System (DNS)
Implement On-Demand Next Hop
Comprehend and implement model-driven telemetry and use Cisco ThousandEyes for enhanced network visibility and management
Describe the basic concepts, history, and purpose of telemetry, including the telemetry push model and telemetry collectors
Discuss the efficiency and ease of use of various encoding methods, including Google Protocol Buffers (GPB), Compact GPB, and Key-value GPB, as well as JavaScript Object Notation (JSON) and transport protocols
Describe gNMI subscription modes, gRPC outputs, performance with different encodings, and key ideas related to gRPC
Describe features, the architecture, and components of Cisco Crosswork Network Controller (CNC)Course Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Routing protocol configuration experience with BGP, Intermediate System-to-Intermediate System (IS-IS), and Open Shortest Path First (OSPF)
Knowledge of Layer 2 IEEE switching and related protocols, including MPLS configuration and troubleshooting of Cisco routers in a large network environmentThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA) 2.0
Understanding Cisco Service Provided Network Foundations (SPFNDU) 1.0
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) 1.1Course Outline
Cisco NFV Infrastructure
Cloud Computing
Service Provider Model-Driven Programmability
Network Orchestration using NSO
Container Orchestration
Cisco Crosswork Network Controller
Cloud Interconnect Solutions
Data Center Interconnect Solutions
Service Provider High Availability
Service Provider Core Optimization
Service Provider Performance Monitoring
Service Provider Control Plane Security
Service Provider Data Plane SecurityLab Outline
Deploy a VNF Using OpenStack
Configure and Verify Devices by Using Model-Driven Programmability
Network Orchestration using NSO
Configure and Verify Application Hosting Within a Docker Container
Configure and Verify Layer 3 VPN
Configure and Verify EVPN VPWS
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR-TE Using IS-IS
Configure and Verify SR-TE Using OSPF
Configure and Verify ODN and Flexible Algorithm
Configure and Verify Model-Driven Telemetry
Implement BGP Security
Implement RTBH Filtering - XRVPNS — Leveraging Cisco IOS XR VPN Services
- Длительность: 3 дня (24 часов)
 - Код курса: XRVPNS
 - Стоимость
 - Очный формат: 750 500 ₸
 - Онлайн формат: 655 500 ₸
 
Описание курса
Course Description
The Leveraging Cisco IOS XR VPN Services (XRVPNS) training teaches you how to implement and troubleshoot Layer 2 and Layer 3 Virtual Private Network services in a service provider network operating on Cisco IOS XR software. Cisco IOS XR is the foundational operating system of most service provider networks and operates Cisco’s service provider portfolio of network devices. You will learn how to implement a label switched network infrastructure for the enablement of VPN services using Multiprotocol Label Switching (MPLS) or Segment Routing (SR). You will also learn how to implement and troubleshoot both IPv4 and IPv6 Layer 3 VPN services and Multicast VPN services using IOS XR. In addition, you will learn how to implement Ethernet VPN (EVPN) services including EVPN Integrated Routing and Bridging (EVPN IRB) and EVPN-SR data center fabric. Finally, you will learn how to implement EVPN advanced features. This training also earns you 24 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn how to implement and troubleshoot Layer 2 and Layer 3 Virtual Private Network services in a service provider network operating on Cisco IOS XR software.
Gain knowledge of protocols, solutions, and designs to acquire professional-level and expert-level networking roles.
Earn 24 CE credits toward recertification.Who Should Enroll
Network Engineers
Systems Engineers
Network Administrators
Network Managers
Network DesignersCourse Objectives
Implement and configure MPLS and describe MPLS label propagation in service provider networks
Describe the main factors leading to the development and deployment of segment routing, describe the various types of segments that are used in segment routing, describe the Segment Routing Global Block (SRGB), and configure and verify Intermediate System to Intermediate System (IS-IS) and Open Shortest Path First (OSPF) segment routing operation
Implement and configure Segment Routing IPv6
Describe the components and functionality of Layer 3 MPLS VPNs implementation in Cisco IOS XR Software deployments
Identify the routing protocol and LDP information necessary for Layer 3 MPLS VPN troubleshooting
Discuss Multicast LDP (MLDP) implementation and troubleshooting method for Layer 3 multicast MPLS VPN
Implement MPLS VPN solutions for IPv6 environments
Describe common issues and fixes for provider edge to provider edge (PE-PE) and provider edge to customer edge (PE-CE) connectivity in an IPv6 MPLS VPN environment
Implement Layer 2 VPN operations in a service provider environment
Explain how EVPN gets around the problems that regular Layer 2 VPNs have, what the model for EVPN delivery is, and how to implement and troubleshoot EVPN solutions
Explain the advantages of EVPN IRB, how it is implemented, and how to troubleshoot problems when building EVPN IRB solutions
Demonstrate how to configure EVPN-SR data center fabric solutions
Explain advanced EVPN features to support network engineers in designing, implementing, and troubleshooting complex EVPN networksCourse Prerequisites
The knowledge and skills you are expected to have before attending this course are:
Familiarity with service provider network operation
Familiarity with Cisco IOS XR software configuration and operation
Ability to implement and troubleshoot routing protocol including OSPF, IS-IS, and Border Gateway Protocol (BGP) in a service provider networkThese skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Service Provider Network Foundations (SPFNDU v 1.0)
Cisco IOS XR Software Essentials (IOSXRE v 1.0)Course Outline
Cisco IOS XR Software MPLS Operation and Implementation
Segment Routing Fundamentals
Segment Routing IPv6
Layer 3 MPLS VPN Implementation with Cisco IOS XR Software
Layer 3 MPLS VPN Troubleshooting
Layer 3 Multicast MPLS VPN Implementation
Layer 3 IPv6 MPLS VPNs Implementation
Layer 3 IPv6 MPLS VPN Troubleshooting
Layer 2 VPNs and Ethernet Services Fundamentals
Cisco IOS XR Software EVPN Operation and Implementation
Cisco IOS XR Software EVPN IRB
EVPN-SR Data Center Fabric
EVPN Advanced FeaturesLab Outline
Configure and Verify MPLS
Configure and Verify Segment Routing
Configure and Verify SRv6
Configure and Verify Layer 3 VPN
Implement 6VPE
Configure and Verify EVPN Virtual Private Wire Service (VPWS) - SP8KE — Cisco 8000 Series Routers Essentials
- Длительность: 5 дней (40 часов)
 - Код курса: SP8KE
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Cisco 8000 Series Routers Essentials (SP8KE) v1.0 course introduces you to the features and functions of the Cisco® 8000 Series router platforms. Through a combination of lectures and labs, you will gain an understanding of all major aspects of the platform, including hardware, software, Layer 2 and Layer 3 services, Quality of Service (QoS) features, network virtualization, and programmability.
How You'll Benefit
This class will help you:
Increase your experience with the Cisco 8000 Series system
Describe and implement the Cisco 8000 Series system and its components
Gain hands-on experience with the Cisco 8000 Series system in a lab settingWho Should Enroll
This course is designed for the following roles:
System engineers
Technical support personnel
Channel partners and resellersCourse Objectives
After taking this course, you should be able to:
Describe the various Cisco 8000 Series hardware components
Explain the system architecture of the Cisco 8000 Series systems
Describe the packet flows through the Cisco 8000 Series Router and Command-Line Interface (CLI) commands for verifying packet flows through various Cisco 8000 Series router components
Describe how the QoS features are implemented within the Cisco 8000 Series router, how to examine the Virtual Output Queueing (VOQ) QoS architecture, and describe how to implement modular VOQ, including congestion avoidance, priority flow control, and congestion management
Describe the Software for Open Networking in the Cloud (SONiC) Operating System
Describe Cisco Internetwork Operating System (Cisco IOS®) XR Software architecture
Explain how to install Cisco IOS XR software packages
Describe how to provision network devices by using Zero Touch Provisioning (ZTP)
Implement and configure Multiprotocol Label Switching (MPLS) and describe MPLS label propagation in service provider networks
Describe the main factors leading to the development and deployment of segment routing, describe the various types of segments that are used in segment routing, describe the Segment Routing Global Block (SRGB), and configure and verify IS-IS and OSPF segment routing operation
Describe how to implement and verify Topology Independent Loop-Free Alternate (TI-LFA) in a segment routing environment, the benefits of Segment Routing for Traffic Engineering (SR-TE), and briefly describe the tools required for enabling it
Describe the fundamentals of Ethernet VPN (EVPN), how to configure and verify EVPN Native, and how to configure and verify EVPN Virtual Private Wire Service (VPWS)
Describe the operation and data flow of the Layer 3 VPN control plane, describe different Layer 3 MPLS VPN models, and describe how to configure and verify a basic Layer 3 VPN by using Cisco IOS XR 64-bit software
Implement and configure advanced SR-TE features
Implement and configure Segment Routing over IPv6 (SRv6)
Implement and configure model-driven telemetry
Describe programmable features of Cisco IOS XR software
Describe the application hosting architecture and how to deploy a third-party application on a Cisco IOS XR routerCourse Prerequisites
Before taking this course, you should have:
Basic knowledge of router installation and some experience with installation tools
Routing protocol configuration experience with Border Gateway Protocol (BGP), Intermediate System-to- Intermediate System (IS-IS), and Open Shortest Path First (OSPF)
Knowledge of Layer 2 IEEE switching and related protocols
Strong knowledge of MPLS configuration experience
Experience troubleshooting Cisco routers in a large network environmentCourse Outline
Cisco 8000 Series Hardware Fundamentals
Cisco 8000 System Architectur
Packet Flow Through the Cisco 8000 Series Router
Traffic Management and QoS on Cisco 8000 Routers
SONiC Basics
Cisco IOS XR Software Architecture
Cisco IOS XR Software Installation
Automatic Provisioning
Cisco IOS XR MPLS
Introducing Segment Routing
Segment Routing TI-LFA and Traffic Engineering
EVPN Layer 2 Basics
Layer 3 VPNs
Advanced SR-TE Features
SRv6
Telemetry
Cisco IOS XR Programmability
Application Hosting OverviewLab Outline
Investigate and Monitor Cisco 8000 Series Hardware
Troubleshoot Traffic Through the Cisco 8000 Router
Cisco IOS XR Software Installation
Configure and Verify Zero Touch Provisioning (ZTP)
Configure and Verify Multiprotocol Label Switching
Configure and Verify Segment Routing (SR)
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR-TE Using IS-IS
Configure and Verify SR-TE Using OSPF
Configure and Verify Basic EVPN
Configure and Verify Layer 3 VPN
Configure and Verify On-Demand Next-Hop (ODN) and Flexible Algorithm
Configure and Verify Segment Routing over IPv6 (SRv6)
Configure and Verify Model-Driven Telemetry
Configure and Verify Devices by Using Model-Driven Programmability
Configure and Verify Application Hosting Within a Docker Container - IOSXRE — Cisco IOS XR Software Essentials
- Длительность: 4 дня (32 часа)
 - Код курса: IOSXRE
 - Стоимость
 - Очный формат: 880 500 ₸
 - Онлайн формат: 790 500 ₸
 
Описание курса
Course Description
The Cisco IOS XR Software Essentials (IOSXRE) training introduces you to the essential features and functions of the Cisco IOS XR Software operating system that powers many Cisco products. Through a combination of lectures and hands-on lab exercises, you will gain an understanding of all major aspects of the operating system including the architecture, installation and upgrade, automatic provisioning, and using the software command-line interface (CLI). You will also learn how to implement essential software services including system security, logging, timing and synchronization, AAA services, and how to use modular QoS. In addition, you will learn how to implement basic routing and forwarding using Multiprotocol Label Switching (MPLS). Finally, you will learn how to implement and use programmability and monitoring features including Simple Network Management Protocol (SNMP), telemetry, process monitoring, and IOS XR programmability. This training also earns you 24 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn how to describe and implement fundamental concepts and configurations on Cisco IOS XR Software.
Gain leading-edge skills for high-demand responsibilities focused on software services.
Earn 24 CE credits toward recertification.Who Should Enroll
Network Engineers
Systems Engineers
Network Administrators
Network Managers
Network DesignersCourse Objectives
Describe Cisco IOS XR Software architecture
Explain how to install Cisco IOS XR Software packages
Describe how to provision network devices by using zero touch provisioning
Describe how to perform initial configurations on a Cisco IOS XR router
Recognize, implement, and manage system security features within Cisco IOS XR Software systems, ensuring the protection of network infrastructure and data
Monitor device performance through CLI and logging services
Describe the methods and protocols for establishing timing and synchronization on Cisco IOS XR router platforms
Describe the operation of Cisco IOS XR AAA Software services, task-based security mechanisms and user security policies
Configure, manage, and troubleshoot Cisco IOS XR Software AAA services in a network environment
Recognize how to implement QoS in various scenarios and environments, including Cisco IOS XR Software and a service provider environment
Define the Cisco IOS XR implementation requirements for deploying common routing protocols and managing the Routing Information Base, Route Policy, forwarding, and load balancing mechanisms
Implement and configure MPLS and describe MPLS label propagation in service provider networks
Configure SNMP in Cisco IOS XR Software environments for optimum performance and efficient management of network resources
Describe the programmable features of Cisco IOS XR Software
Comprehend and implement model-driven telemetry for enhanced network visibility and management
Describe the application hosting architecture and how to deploy a third-party application on a Cisco IOS XR router
Illustrate how to efficiently monitor processes using process monitoring concepts and tools such as employing the monitor processes command to track and manage system activitiesCourse Prerequisites
The knowledge and skills you are expected to have before attending this course are:
Experience working with CLI-based network devices
Knowledge of general routing conceptsThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions 1.0Course Outline
Cisco IOS XR Software Fundamentals
Cisco IOS XR Software Installation and Upgrades
Automatic Provisioning
Cisco IOS XR Software CLI Basics
Cisco IOS XR Software System Security
Cisco IOS XR Software Logging Configuration
Timing and Synchronization
Cisco IOS XR Software AAA Service Fundamentals
Cisco IOS XR Software AAA Service Implementation
Cisco IOS XR Software Modular QoS
Cisco IOS XR Software Routing Protocol Configuration
Cisco IOS XR Software MPLS Operation and Implementation
Network Management with SNMP on Cisco IOS XR Software
Cisco IOS XR Software Programmability
Model-Driven Telemetry
Application Hosting Overview
Cisco IOS XR Software Process MonitoringLab Outline
Cisco IOS XR Software Installation
Configure and Verify ZTP
Initial Configuration of a Cisco IOS XR Router
Configuration Commit and Rollback
Configure and Verify MPP
Configure and Verify uRPF
Configure and Verify Logging
Configure and Verify NTP
Configure and Verify User Security Policies
Cisco IOS XR AAA Configuration
Configure and Verify Modular QoS
Configure and Verify IS-IS
Configure and Verify OSPF
Configure and Verify BGP
Configure and Verify MPLS
Configure and Verify SNMP
Configure and Verify Devices by Using Model-Driven Programmability
Configure and Verify Model-Driven Telemetry
Configure and Verify Application Hosting Within a Docker Container - SPSDNTXP — Implementing Cisco Converged SDN Transport Solution
- Длительность: 4 дня (32 часа)
 - Код курса: SPSDNTXP
 - Стоимость
 - Очный формат: 913 000 ₸
 - Онлайн формат: 823 000 ₸
 
Описание курса
Course Description
The Implementing Converged SDN Transport Solutions (SPSDNTXP) v1.0 course introduces you to Software-Defined Networking (SDN)-ready architecture. This architecture evolves traditional Metro network design into an SDN-enabled programmable network capable of delivering all services (residential, business, 5G mobile backhauling, video, and IoT) on the premise of simplicity, full programmability, and cloud integration with guaranteed service level agreements (SLAs).
You will examine the evolution of service provider design principles such as Unified Multiprotocol Label Switching, Evolved Programmable Networks, and the Cisco® Compass Metro Fabric. Additionally, you’ll explore and configure individual components of the design including segment routing and its supporting features.
How You'll Benefit
This course will help you:
Describe the Converged SDN Transport solution
Describe the basic implementation of SDN component features
Establish a foundation to take a deeper dive into SDN solutionsWho Should Enroll
This course is suited for the following audiences:
Network architects
Network engineers
Network consulting engineers
Customer support engineersCourse Prerequisites
To fully benefit from this course, you should have:
Knowledge of general networking concepts
Experience working with CLI-based network devicesCourse Outline
Converged SDN Transport Fundamentals
Introducing Segment Routing
Segment Routing Topology-Independent Loop-Free Alternative (TI-LFA) and Traffic Engineering (TE)
Multidomain SR-TE
VPN and Services Overview
EVPN Layer 2 Basics
Layer 3 VPNs
Operation Simplification and Automation Foundation
Network Orchestration Using NSO
Network Automation Using Cisco WAELab Outline
Configure and Verify Segment Routing
Configure and Verify SR TI-LFA
Configure and Verify SR-TE
Configure and Verify Multidomain SR-TE
Configure and Verify Basic EVPN
Configure and Verify Layer 3 VPN
Cisco NSO Overview
Cisco WAE Overview - SPAUI — Implementing Automation for Cisco Service Provider Solutions
- Длительность: 3 дня (24 часа)
 - Код курса: SPAUI
 - Стоимость
 - Очный формат: 464 000 ₸
 - Онлайн формат: 452 000 ₸
 
Описание курса
Course Description
The Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 course prepares you to implement and support automation solutions in a Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms. Through a combination of lessons and hands-on labs, you will learn to deploy, configure, monitor, and operate Service Provider network environments using modern data models. These models allow you to represent operational data and new network management protocols in order to administer hundreds or thousands of devices in a single operation, replacing traditional, time-consuming, error prone, device-by-device Command Line Interface (CLI) management. The course also introduces powerful automation solutions that can streamline network operations.
This course covers Yet Another Next Generation (YANG) data models and validation tools, Representational State Transfer Configuration Protocol RESTCONF and Network Configuration Protocol (NETCONF) management protocols, model-driven telemetry with Google Remote Procedure Call (gRPC) and Google Network Management Interface (gNMI), traffic automation with XR Transport Control (XTC), Secure Shell (SSH)-based automation tools like NetMiko and Ansible, orchestration provided by Network Services Orchestration (NSO), Network Function Virtualization (NFV) lifecycle management with Elastic Services Controller (ESC), and network operations automation with WAN Automation Engine (WAE).This course prepares you for the 300-535 Automating and Programming Cisco® Service Provider Solutions (SPAUTO) exam.
Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Service Provider Solutions (SPAUI) because it provides crucial foundational knowledge essential to success. This course also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This course will help you:
Use network programmability to scale and streamline Service Provider network infrastructure
Gain hands-on experience in using modern data models to manage Service Provider network infrastructure
Earn 24 CE credits toward recertification
Prepare for the 300-535 SPAUTO exam.Who Should Enroll
This course is designed for Service Provider networking professionals in job roles such as:
Network administrators
Network architects
Network designers
Network engineers
Network managers
Network Operations Center (NOC) personnel
Network supervisorsWhat to Expect in the Exam
The 300-535 SPAUTO exam certifies your knowledge and skills related to implementing service provider automated solutions, including programming concepts, orchestration, programming OS, and automation tools.
After you pass 300-535 SPAUTO, you earn the Cisco Certified DevNet Specialist - Service Provider Automation and Programmability certification, and you satisfy the concentration exam requirement for these professional-level certifications:
CCNP Service Provider
Cisco Certified DevNet ProfessionalCourse Objectives
After taking this course, you should be able to:
Use NETCONF and RESTCONF programmability protocols on Cisco devices
Describe and use tools to validate YANG data models on Cisco devices
Describe and configure model-driven telemetry on Cisco devices
Describe and configure network traffic automation with Cisco XTC
Describe and use network automation tools that utilize SSH
Automate service provider network configuration with Cisco NSO
Describe how to automate virtualized resources with Cisco ESC
Describe how to automate service provider WAN with Cisco WAECourse Prerequisites
Before taking this course, you should have the following knowledge and skills:
CCNP equivalent level of knowledge for Routing and Switching (R and S)
Cisco Internetworking Operating System (IOS XE) and Cisco IOS XR working experience
SP Operations experience with routing, Multi-Protocol Label Switching (MPLS) and Virtual Private Network (VPN) Solutions
Network Programmability Basics (Network Programming Foundations, APIs and Protocols, Network Model Driven APIs and Protocols, Configuration Management with Ansible, Service Provider Network Automation workflows)The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Introducing Automation for Cisco Solutions (CSAU)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Implementing Cisco Service Provider Advanced Routing Solutions (SPRI)
Implementing Cisco Service Provider VPN Services (SPVI)Course Outline
Implementing Network Device Programmability Interfaces with NETCONF and RESTCONF
Implement NETCONF Protocol
Implement RESTCONF ProtocolImplementing Model-Driven Programmability with YANG
YANG Data Models
YANG Tools
YANG Development KitImplementing Model-Driven Telemetry
Implementing Model-Driven Telemetry with gRPC
Implementing Model-Driven Telemetry with gNMIAutomating Service Provider Network Traffic with Cisco XTC
Cisco XTC Fundamentals
Configure Cisco XTCAutomating Networks with Tools That Utilize SSH
Implement Device Configurations with Python Netmiko Library
Implement Device Configurations with Ansible PlaybooksOrchestrating Network Services with Cisco NSO
Cisco NSO Fundamentals
Cisco NSO Device Manager
Cisco NSO Services
Implement Device Configurations with PythonAutomating Virtualized Resources with Cisco Elastic Services Controller
Cisco ESC Architecture
Cisco ESC Resource ManagementAutomating the WAN with Cisco WAE
Describe the Cisco WAE ComponentsLab Outline
Explore NETCONF Protocol in Cisco Devices
Configure Cisco IOS XE Devices with RESTCONF
Explore Cisco and OpenConfig YANG Data Models with YANG Tools
Use ncclient and Python to Configure Cisco Devices
Use YANG Development Kit (YDK) to Configure Cisco Devices
Configure Model-Driven Telemetry with gRPC
Configure Model-Driven Telemetry with gNMI
Configure Path Disjointness with Cisco XTC
Use Python Netmiko Library to Configure Cisco Devices
Use Ansible to Configure Cisco Devices
Use Cisco NSO Device Manager
Create a Loopback Service Template
Use Cisco NSO REST API with Postman
Explore and Use Cisco WAE Features - CSAU — Introducing Automation for Cisco Solutions
- Длительность: 3 дня (24 часов)
 - Код курса: CSAU
 - Стоимость
 - Очный формат: 1 022 000 ₸
 - Онлайн формат: 928 000 ₸
 
Описание курса
Course Description
The Introducing Automation for Cisco Solutions (CSAU) training gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with representational state transfer configuration protocol (RESTCONF) and network configuration protocol (NETCONF) protocols. The training also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain’t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git.
How You'll Benefit
This training will help you:
Gain an overview of the skills you need to become a next-generation engineer
Prepare to accelerate network automation in your organization
Increase collaboration across internal and external teams using version control systems
Earn 16 CE credits toward recertificationWho Should Enroll
Automation Architects
Automation Engineers
Consulting Systems Engineers
DevOps Engineers
Network Administrators
Network Architects
Network Consulting Engineers
Network Design Engineers
Network Engineers
Network Operators
Network Reliability Engineers
Sales Engineers
Site Reliability Engineers
Systems Engineers
Technical Solutions Architects
Application Developers
Collaboration Developers
Collaboration Solutions Architects
IT Directors
Mobile Developers
Network Operations Center (NOC) Managers
Software Architects
Web DevelopersCourse Objectives
Articulate the role network automation and programmability play in the context of end-to-end network management and operations
Define and differentiate between waterfall and agile software development methodologies
Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
Describe how DevOps principles, tools, and pipelines can be applied to network operations
Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
Understand and construct HTTP-based application programming interface (API) calls to network devices
Articulate the differences among and common use cases for XML, JSON, YAML, and protocol buffer (protobuf)
Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs
Understand the role YANG plays in network automation
Understand that several tools exist to simplify working with YANG models
Describe the functionality of RESTCONF and NETCONF and the differences between them
Construct Ansible playbooks to configure network devices and retrieve operational state data from them
Build Jinja2 templates and YAML data structures to generate desired state configurationsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Routing and switching including open shortest path first (OSPF), border gateway protocol (BGP), and basic configuration features such as interfaces, simple network management protocol (SNMP), and static routes
Fundamentals of Python data structures and programming constructs, such as loops, conditionals, and classes, or the equivalent of 3–6 months of experience writing Python scripts
Basic Linux commands for navigating the file system and executing scripts
Knowledge of working with text editorsThe following recommended Cisco offering may help you meet these prerequisites:
Implementing and Administrating Cisco Solutions (CCNA)Course Outline
Examining Network Management and Operations
Exploring Software Development Methodologies
Using Python for Network Automation
Describing NetDevOps: DevOps for Networking
Managing Automation Development Environments
Introducing HTTP Network APIs
Reviewing Data Formats and Data Encoding
Using Python Requests to Automate HTTP-Based APIs
Exploring YANG
Using YANG Tools
Automating Model-Driven APIs with Python
Introducing Ansible for Network Automation
Templating Configurations with Jinja2Lab Outline
Use Network Automation Scripts
Enforce Python Fundamentals on the Interactive Interpreter
Automate Networks with Netmiko
Use the Git Version-Control System and Collaborate on an Internal Project
Build Reproduceable Automation Environments
Use HTTP-Based APIs with Postman
Explore YAML and JSON Data
Consume HTTP-Based APIs with Python Requests
Explore YANG Tools
Explore RESTCONF with Python
Explore NETCONF with Python
Configure Network Devices with Ansible
Collect Network Data with Ansible
Build and Deploy Configurations with Ansible - DEVCOR — Developing Applications Using Cisco Core Platforms and APIs
- Длительность: 5 дней (40 часов)
 - Код курса: DEVCOR
 - Стоимость
 - Очный формат: 1 730 000 ₸
 - Онлайн формат: 1 646 000 ₸
 
Описание курса
Course Description
The Developing Applications Using Cisco Core Platforms and APIs training is designed to help you prepare for the Cisco DevNet Professional certification and professional-level network automation engineer roles. The focus of this training is implementation of network applications using Cisco platforms as a base, from initial software design to diverse system integration, as well as testing and deployment automation. The training provides hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools.
This training prepares you for the 350-901 DEVCOR exam. If passed, you earn the Cisco Certified DevNet Specialist – Core certification and satisfy the core exam requirement for the Cisco Certified DevNet Professional and Cisco Certified DevNet Expert certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Take full advantage of the network and software development practices when implementing applications to fulfill business needs
Design and implement automated workflows for network provisioning
Design and develop applications built on Cisco platforms
Design and implement integration of custom applications with Cisco platforms and devices
Understand challenges in network programmability and system integration
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level DevOps roles
Earn 64 CE credits toward recertificationWho Should Enroll
Sr. Network Automation Engineer
Sr. Software Developer
Sr. System Integration Programmer
Sr. Infrastructure Architect
Sr. Network Designer
Test Development EngineerWhat to Expect in the Exam
350-901: Developing Applications Using Cisco Core Platforms and APIs is a 120-minute exam associated with the Cisco Certified DevNet Specialist – Core certification and satisfies the core exam requirement for the Cisco Certified DevNet Professional and Cisco Certified DevNet Expert certifications.
The exam tests your knowledge of software development and design, including:
Using APIs
Cisco platforms
Application deployment and security
Infrastructure and automationCourse Objectives
Describe the architectural traits and patterns that improve application maintainability and serviceability
Identify steps to design and build a ChatOps application
Implement robust Representational State Transfer (REST) API integrations with network error handling, pagination, and error flow control
Describe the necessary steps for applications and their user and system data
Identify common tasks in automated application release process
Describe best practices for application deployment
Describe methodologies for designing distributed systems
Describe the concepts of infrastructure configuration management and device automation
Utilize Yet Another Next Generation (YANG) data models to describe network configurations and telemetry
Compare various relational and nonrelational database types and how to select the appropriate type based on requirementsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Knowledge of program design and coding with focus on Python
Familiarity with Ethernet, Transmission Control Protocol Internet Protocol (TCP/IP) and internet-related networking
Understand the utilization of APIs
Understanding of software development and design methodologies
Hands-on experience with a programming language (specifically Python)These skills can be found in the following Cisco Learning Offering:
Developing Applications and Automating Workflows using Cisco Platforms 1.0Course Outline
Designing for Maintainability
Designing for Serviceability
Implementing ChatOps Application
Advanced REST API Integration
Securing Application Data
Securing Web and Mobile Applications
Automating Application Release
Deploying Applications
Exploring Distributed Systems
Orchestrating Network and Infrastructure
Modeling Data with YANG
Using Relational and Nonrelational DatabasesLab Outline
Construct Sequence Diagram
Construct Web Sequence Diagram
Use Paginated REST API Endpoint
Use REST API Error Control Flow Techniques
Evaluate Application for Common OWASP Vulnerabilities
Resolve Merge Conflicts with Git
Containerize Application Using Docker
Integrate Application into Existing CI/CD Environment
Diagnose Problems Using Application Logs
Automate and Manage Cisco IOS XE Network Infrastructure with Terraform and GitLab CI/CD Pipelines
Configure Network Parameters Using Ansible
Synchronize Firepower Device Configuration
Utilize RESTCONF for Network Configuration
Query Relational Database
Query Document Store
Query Time Series Database
Query Graph Database - DEVASC — Developing Applications and Automating Workflows Using Cisco Platforms
- Длительность: 5 дней (40 часов)
 - Код курса: DEVASC
 - Стоимость
 - Очный формат: 1 691 000 ₸
 - Онлайн формат: 1 606 000 ₸
 
Описание курса
Course Description
The Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC) training helps you prepare for Cisco® DevNet Associate certification and for associate-level network automation engineer roles. You will learn how to implement basic network applications using Cisco platforms as a base, and how to implement automation workflows across network, security, collaboration, and computing infrastructure. The course gives you hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools.
This training helps you prepare to take the 200-901 DevNet Associate (DEVASC) exam. By passing this exam, you earn Cisco Certified DevNet Associate certification.
How You'll Benefit
This training will help you:
Take advantage of the network when you implement applications to fulfill business needs
Gain a foundation in the essentials of applications, automation, and Cisco platforms
Earn 48 CE credits toward recertification
Prepare for the 200-901 DEVASC examWho Should Enroll
This training is designed for anyone who performs or seeks to perform a developer role and has one or more years of hands-on experience developing and maintaining applications that are built on top of Cisco platforms.
The training is appropriate for software developers, application developers, and network engineers who want to expand their skill base and validate their skills in programmability, software, and automation. Students preparing for Cisco Certified DevNet Associate certification will also find this material useful.
The job roles best suited to the material in this course are:
Network automation engineer
Software developer
System integration programmerAdditional job roles that might be interested:
Infrastructure architect
Network designerWhat to Expect in the Exam
The 200-901 DEVASC exam certifies your knowledge of software development and design including understanding and using APIs, Cisco platforms and development, application development and security, and infrastructure and automation.
After you pass 200-901 DEVASC, you earn Cisco Certified DevNet Associate certification.Course Objectives
After taking this training, you should be able to:
Describe the importance of APIs and use of version control tools in modern software development
Describe common processes and practices used in software development
Describe options for organizing and constructing modular software
Describe HTTP concepts and how they apply to network-based APIs
Apply Representational State Transfer (REST) concepts to integration with HTTP-based APIs
Describe Cisco platforms and their capabilities
Describe programmability features of different Cisco platforms
Describe basic networking concepts and interpret simple network topology
Describe interaction of applications with the network and tools used for troubleshooting issues
Apply concepts of model-driven programmability to automate common tasks with Python scripts
Identify common application deployment models and components in the development pipeline
Describe common security concerns and types of tests, and utilize containerization for local development
Utilize tools to automate infrastructure through scripting and model-driven programmabilityCourse Prerequisites
There are no formal prerequisites for Cisco Certified DevNet Associate certification, but you should make sure to have a good understanding of the exam topics before taking the exam.
And before taking this training, you should have:
Basic computer literacy
Basic PC operating system navigation skills
Basic Internet usage skills
Hands-on experience with a programming language (specifically Python)Here are Cisco learning resources that can help you prepare:
Python Programming for Network Engineers (PRNE)
Explore the DevNet Certification area for specific topics and labs related to this course and certificationCourse Outline
This class includes lecture sections and self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning courses, the lectures are on recorded videos. In both versions, you will need to review self-study sections on your own before taking the certification exam.
Practicing Modern Software Development — Lecture
Describing Software Development Process — Self-study
Designing Software — Self-study
Introducing Network-Based APIs — Lecture
Consuming REST-Based APIs — Lecture
Employing Programmability on Cisco Platforms — Lecture
Introducing Cisco Platforms — Self-study
Describing IP Networks (ELT only) — Self-study
Relating Network and Applications — Lecture
Employing Model-Driven Programmability with YANG — Lecture
Deploying Applications — Lecture
Testing and Securing Applications — Lecture
Automating Infrastructure — LectureLab Outline
Parse API Data Formats with Python
Use Git for Version Control
Identify Software Architecture and Design Patterns on a Diagram
Implement Singleton Pattern and Abstraction-Based Method
Inspect HTTP Protocol Messages
Use Postman
Troubleshoot an HTTP Error Response
Utilize APIs with Python
Use the Cisco Controller APIs
Use the Cisco Webex Teams™ Collaboration API
Interpret a Basic Network Topology Diagram
Identify the Cause of Application Connectivity Issues
Perform Basic Network Configuration Protocol (NETCONF) Operations
Use Cisco Software Development Kit (SDK) and Python for Automation Scripting
Utilize Bash Commands for Local Development
Construct a Python Unit Test
Interpret a Dockerfile
Utilize Docker Commands to Manage Local Developer Environment
Exploit Insufficient Parameter Sanitization
Construct Infrastructure Automation Workflow - CBROPS — Understanding Cisco Cybersecurity Operations Fundamentals
- Длительность: 5 дней (40 часов)
 - Код курса: CBROPS
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) training provides an understanding of the network infrastructure devices, operations, and vulnerabilities of the TCP/IP protocol suite, and basic information security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data that are used to investigate security incidents. After completing this training, you will have the basic knowledge that is required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center (SOC).
This training prepares you for the 200-201 CBROPS v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Associate certification and the role of a junior or entry-level cybersecurity operations analyst in a SOC. This training also earns you 30 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn the fundamental skills, techniques, technologies, and the hands-on practice necessary to prevent and defend against cyberattacks as part of a SOC team
Prepare for the 200-201 CBROPS v1.2 exam
Earn 30 CE credits toward recertificationWho Should Enroll
This training is designed for associate-level cybersecurity analysts who are working in security operation centers.
What to Expect in the Exam
Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) v1.2 is a 120-minute exam associated with the Cisco Certified Cybersecurity Associate certification.
This exam tests your knowledge and skills related to:
Security concepts
Security monitoring
Host-based analysis
Network intrusion analysis
Security policies and proceduresCourse Objectives
Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
Explain the data that is available to the network security analyst.
Describe the basic concepts and uses of cryptography.
Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
Understand common endpoint security technologies.
Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
Identify resources for hunting cyber threats.
Explain the need for event data normalization and event correlation.
Identify the common attack vectors.
Identify malicious activities.
Identify patterns of suspicious behaviors.
Conduct security incident investigations.
Explain the use of a typical playbook in the SOC.
Explain the use of SOC metrics to measure the effectiveness of the SOC.
Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.Course Prerequisites
Before taking this course, you should have the following knowledge and skills:
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows and Linux operating systems
Familiarity with basics of networking security conceptsCourse Outline
Defining the Security Operations Center
Understanding SOC Metrics
Understanding SOC Workflow and Automation
Understanding Windows Operating System Basics
Understanding Linux Operating System Basics
Understanding Endpoint Security Technologies
Understanding Network Infrastructure and Network Security Monitoring Tools
Understanding Common TCP/IP Attacks
Exploring Data Type Categories
Understanding Basic Cryptography Concepts
Cloud Security Fundamentals
Securing Cloud Deployments
Understanding Incident Analysis in a Threat-Centric SOC
Identifying Common Attack Vectors
Identifying Malicious Activity
Identifying Patterns of Suspicious Behavior
Identifying Resources for Hunting Cyber Threats
Understanding Event Correlation and Normalization
Conducting Security Incident Investigations
Using a Playbook Model to Organize Security MonitoringLab Outline
Explore the Windows Operating System
Explore the Linux Operating System
Explore Endpoint Security
Explore TCP/IP Attacks
Use NSM Tools to Analyze Data Categories
Explore Cryptographic Technologies
Investigate Hacker Methodology
Investigate Browser-Based Attacks
Analyze Suspicious DNS Activity
Explore Security Data for Analysis
Investigate Suspicious Activity Using Security Onion
Hunt Malicious Traffic
Cisco XDR to Splunk Enterprise Integration Simulation
Correlate Event Logs, PCAPs, and Alerts of an Attack
Investigate Advanced Persistent Threats
Explore SOC Playbooks - CBRTHD — Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps
- Длительность: 5 дней (40 часов)
 - Код курса: CBRTHD
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting training that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.
This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified CyberOps Professional certification. This training also earns you 40 credits towards recertification.
How You'll Benefit
This training will help you:
Learn how to perform a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools
Gain leading-edge career skills focused on cybersecurity
Prepare for the 300-220 CBRTHD v1.0 exam
Earn 40 CE credits toward recertificationWho Should Enroll
Security Operations Center staff
Security Operations Center (SOC) Tier 2 Analysts
Threat Hunters
Cyber Threat Analysts
Threat Managers
Risk ManagementsWhat to Expect in the Exam
Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (300-220 CBRTHD v1.0) is a 90-minute exam associated with the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfies the concentration exam requirement for the Cisco Certified CyberOps Professional certification.
The exam tests your knowledge of conducting threat hunting and defending, including:
Threat modeling techniques
Threat actor attribution techniques
Threat hunting techniques, processes, and outcomesCourse Objectives
Define threat hunting and identify core concepts used to conduct threat hunting investigations
Examine threat hunting investigation concepts, frameworks, and threat models
Define cyber threat hunting process fundamentals
Define threat hunting methodologies and procedures
Describe network-based threat hunting
Identify and review endpoint-based threat hunting
Identify and review endpoint memory-based threats and develop endpoint-based threat detection
Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting
Describe the process of threat hunting from a practical perspective
Describe the process of threat hunt reportingCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
General knowledge of networks and network securityThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Performing CyberOps Using Cisco Security Technologies (CBRCOR)Course Outline
Threat Hunting Theory
Threat Hunting Concepts, Frameworks, and Threat Models
Threat Hunting Process Fundamentals
Threat Hunting Methodologies and Procedures
Network-Based Threat Hunting
Endpoint-Based Threat Hunting
Endpoint-Based Threat Detection Development
Threat Hunting with Cisco Tools
Threat Hunting Investigation Summary: A Practical Approach
Reporting the Aftermath of a Threat Hunt InvestigationLab Outline
Categorize Threats with MITRE ATTACK Tactics and Techniques
Compare Techniques Used by Different APTs with MITRE ATTACK Navigator
Model Threats Using MITRE ATTACK and D3FEND
Prioritize Threat Hunting Using the MITRE ATTACK Framework and Cyber Kill Chain
Determine the Priority Level of Attacks Using MITRE CAPEC
Explore the TaHiTI Methodology
Perform Threat Analysis Searches Using OSINT
Attribute Threats to Adversary Groups and Software with MITRE ATTACK
Emulate Adversaries with MITRE Caldera
Find Evidence of Compromise Using Native Windows Tools
Hunt for Suspicious Activities Using Open-Source Tools and SIEM
Capturing of Network Traffic
Extraction of IOC from Network Packets
Usage of ELK Stack for Hunting Large Volumes of Network Data
Analyzing Windows Event Logs and Mapping Them with MITRE Matrix
Endpoint Data Acquisition
Inspect Endpoints with PowerShell
Perform Memory Forensics with Velociraptor
Detect Malicious Processes on Endpoints
Identify Suspicious Files Using Threat Analysis
Conduct Threat Hunting Using Cisco Secure Firewall, Cisco Secure Network Analytics, and Splunk
Conduct Threat Hunt Using Cisco XDR Control Center and Investigate
Initiate, Conduct, and Conclude a Threat Hunt - CBRCOR — Performing CyberOps Using Cisco Security Technologies
- Длительность: 5 дней (40 часов)
 - Код курса: CBRCOR
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.
This course also earns you 40 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam.
How You'll Benefit
This course will help you:
Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
Configure common tools and platforms used by security operation teams via practical application
Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
Prepare for the 350-201 CBRCOR core exam
Earn 40 CE credits toward recertificationWho Should Enroll
Although there are no mandatory prerequisites, the course is particularly suited for the following audiences:
Cybersecurity engineer
Cybersecurity investigator
Incident manager
Incident responder
Network engineer
SOC analysts currently functioning at entry level with a minimum of 1 year of experienceWhat to Expect in the Exam
350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR) is a 120-minute exam associated with the Cisco Certified CyberOps Professional certification. The multiple-choice format tests knowledge of core cybersecurity operations including cybersecurity fundamentals, techniques, policies, processes, and automation. The exam will test for knowledge in the following areas:
Monitoring for cyberattacks
Analyzing high volume of data using automation tools and platforms—both open source and commercial
Accurately identifying the nature of attack and formulate a mitigation plan
Scenario-based questions; for example, using a screenshot of output from a tool, you may be asked to interpret portions of output and establish conclusionsCourse Objectives
After taking this course, you should be able to:
Describe the types of service coverage within a SOC and operational responsibilities associated with each.
Compare security operations considerations of cloud platforms.
Describe the general methodologies of SOC platforms development, management, and automation.
Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
Describe Zero Trust and associated approaches, as part of asset controls and protections.
Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
Use different types of core security technology platforms for security monitoring, investigation, and response.
Describe the DevOps and SecDevOps processes.
Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
Describe API authentication mechanisms.
Analyze the approach and strategies of threat detection, during monitoring, investigation, and response.
Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
Interpret the sequence of events during an attack based on analysis of traffic patterns.
Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
Analyze anomalous user and entity behavior (UEBA).
Perform proactive threat hunting following best practices.Course Prerequisites
Although there are no mandatory prerequisites, to fully benefit from this course, you should have the following knowledge:
Familiarity with UNIX/Linux shells (bash, csh) and shell commands
Familiarity with the Splunk search and navigation functions
Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar.Recommended Cisco offerings that may help you prepare for this course:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Implementing and Administering Cisco Solutions (CCNA)Recommended third-party resources:
Splunk Fundamentals 1
Blue Team Handbook: Incident Response Edition by Don Murdoch
Threat Modeling- Designing for Security y Adam Shostack
Red Team Field Manual by Ben Clark
Blue Team Field Manual by Alan J White
Purple Team Field Manual by Tim Bryant
Applied Network Security and Monitoring by Chris Sanders and Jason SmithCourse Outline
Understanding Risk Management and SOC Operations
Understanding Analytical Processes and Playbooks
Investigating Packet Captures, Logs, and Traffic Analysis
Investigating Endpoint and Appliance Logs
Understanding Cloud Service Model Security Responsibilities
Understanding Enterprise Environment Assets
Implementing Threat Tuning
Threat Research and Threat Intelligence Practices
Understanding APIs
Understanding SOC Development and Deployment Models
Performing Security Analytics and Reports in a SOC
Malware Forensics Basics
Threat Hunting Basics
Performing Incident Investigation and ResponseLab Outline
Explore Cisco SecureX Orchestration
Explore Splunk Phantom Playbooks
Examine Cisco Firepower Packet Captures and PCAP Analysis
Validate an Attack and Determine the Incident Response
Submit a Malicious File to Cisco Threat Grid for Analysis
Endpoint-Based Attack Scenario Referencing MITRE ATTACK
Evaluate Assets in a Typical Enterprise Environment
Explore Cisco Firepower NGFW Access Control Policy and Snort Rules
Investigate IOCs from Cisco Talos Blog Using Cisco SecureX
Explore the ThreatConnect Threat Intelligence Platform
Track the TTPs of a Successful Attack Using a TIP
Query Cisco Umbrella Using Postman API Client
Fix a Python API Script
Create Bash Basic Scripts
Reverse Engineer Malware
Perform Threat Hunting
Conduct an Incident Response - DTCSM — Cisco Customer Success Manager
- Длительность: 3 дня (24 часов)
 - Код курса: DTCSM
 - Стоимость
 - Очный формат: 806 000 ₸
 - Онлайн формат: 711 000 ₸
 
Описание курса
Course Description
The Cisco Customer Success Manager (DTCSM) v2.2 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers.
This course is based on understanding the customer lifecycle and how to optimize that journey, increasing the value realized by the customer, and maximizing your likelihood to maintain their loyalty and renew or expand their business opportunities. The course helps you prepare for the 820-605 Cisco Customer Success Manager (CSM) exam. By passing this exam, you earn the Cisco Customer Success Manager Specialist certification.
How You'll Benefit
This course will help you:
Develop skills and knowledge around the increasingly crucial CSM role, which drives organizational and business outcomes from technology solutions in customer engagements
Understand key concepts and terminologies related to the CSM role
Prepare for the 820-605 CSM exam, which earns the Cisco Customer Success Manager Specialist certification examWho Should Enroll
Individuals preparing for the Cisco Customer Success ManagerSpecialist certification
Individuals who have experience working with customers to determine, measure, and deliver business outcomes through the implementation of technologyWhat to Expect in the Exam
What to expect in the exam
The 820-605 CSM exam certifies your knowledge and skills related to developing and integrating solutions, identifying adoption barriers and actions to remove them, implementing adoption frameworks, and interpreting customer usage data while leading customers to renewals and cultivating new sales opportunities through the entire customer lifecycle.Course Objectives
After taking this course, you should be able to:
Describe the role of the Customer Success Manager
Describe the tools that the Customer Success Manager uses to ensure customer experience
Describe the lifecycle approach to customer experienceCourse Prerequisites
This course has no formal prerequisites, but we recommend that you have:
Experience working with customers to determine, measure, and deliver business outcomes through the implementation of technologyCourse Outline
Transition to Subscription Economy
Customer and Industry Trends
Defining Customer Success and the CSM Role
Engaging the Customer for Success
Engaging the Customer for Success
Addressing Barriers
Customer Success Management Activities
Success Plan Elements
Customer Success Management Activities - CSE01 — Cisco Technical Overview for Sales
- Длительность: 3 дня (24 часа)
 - Код курса: CSE01
 - Стоимость
 - Очный формат: 471 500 ₸
 - Онлайн формат: 453 000 ₸
 
Описание курса
Day 1.
Cisco Catalyst Enterprise Wireless and Wired Solutions
Cisco SD-WAN Architecture and Solutions
Cisco SD-Access Architecture
Cisco Meraki FamilyDay 2.
Cisco Access Control Technologies
Enterprise Access Control with ISE and Duo
Cisco Threat Defense Technologies
Cisco Secure Firewall, Secure Email and Secure Web Solutions
Cisco Security Monitoring with Secure Network Analytics
Cisco Client Security Solutions. Cisco Secure Endpoint and UmbrellaDay 3.
Cisco Unified Computing System Solution
Cisco Data Center LAN Networking with Nexus
Cisco Data Center SAN Networking with MDS
Cisco Application Centric Infrastructure
Cisco Collaboration Architecture
Cisco Collaboration Solutions - CSE02 — Cisco Technical Overview for Sales
- Длительность: 5 дней (40 часов)
 - Код курса: CSE02
 - Стоимость
 - Очный формат: 577 500 ₸
 - Онлайн формат: 565 000 ₸
 
Описание курса
Module 1. Cisco WLAN Technologies and Catalyst Wireless Solutions
Module 2. Cisco Routing and Switching Technologies and Catalyst Wired Solutions
Module 3. Cisco SD-WAN Architecture and Solutions
Module 4. Cisco SD-Access Architecture. Catalyst Center SDA and Assurance Solutions
Module 5. Cisco Access Control Technologies
Module 6. Enterprise Access Control with ISE and Duo
Module 7. Cisco Threat Defense Technologies
Module 8. Cisco Secure Firewall, Secure Email and Secure Web Solutions
Module 9. Cisco Security Monitoring with Secure Network Analytics
Module 10. Cisco Client Security Solutions. Cisco Secure Endpoint and Umbrella
Module 11. Cisco Meraki Family
Module 12. Cisco Data Center Unified Computing
Module 13. Cisco Data Center Networking Technologies
Module 14. Cisco MDS, Nexus and Application Centric Infrastructure
Module 15. Cisco Secure AI Factory with NVIDIA and Cisco AI PODs
Module 16. Voice-over-IP Technologies and Protocols
Module 17. Cisco Collaboration Core and Edge Solutions
Module 18. Summary and Exam - SCAZT — Designing and Implementing Secure Cloud Access for Users and Endpoints
- Длительность: 5 дней (40 часов)
 - Код курса: SCAZT
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Designing and Implementing Secure Cloud Access for Users and Endpoints training teaches you the skills for designing and implementing cloud security architecture, user and device security, network and cloud security, cloud application and data security, cloud visibility and assurance, and responding to cloud threats.
This training prepares you for the 300-740 SCAZT v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Secure Cloud Access certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification.
How You'll Benefit
This training will help you:
Attain skills for designing and implementing cloud security architecture, user and device security, network and cloud security, cloud application and data security, cloud visibility and assurance, and responding to cloud threats
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level cloud design and implementation rolesWho Should Enroll
Network Engineers
Network Security Engineers
Network Architects
Sales/Presales EngineersWhat to Expect in the Exam
300-740 SCAZT v1.0: Designing and Implementing Secure Cloud Access for Users and Endpoints is a 90-minute exam associated with the Cisco Certified Specialist – Secure Cloud Access certification and satisfies the concentration exam requirement for the CCNP Security certification.
The exam tests your knowledge of designing and implementing:
Cloud security architecture
User and device security
Network and cloud security
Application and data security
Visibility and assurance
Threat responseCourse Objectives
Compare and contrast the National Institute of Standards and Technology (NIST), Cybersecurity and Infrastructure Security Agency (CISA), and Defense Information Systems Agency (DISA) security frameworks, and understand the importance of adopting standardized frameworks for cybersecurity in enhancing an organization’s security posture
Describe the Cisco Security Reference Architecture and its five main components
Describe commonly deployed use cases and recommend the necessary capabilities within an integrated security architecture to address them effectively
Describe the Cisco Secure Architecture for Everyone (SAFE) architecture
Review the benefits, components, and process of certificate-based authentication for both users and devices
Enable Duo multi-factor authentication (MFA) to protect an application from the Duo Administration Portal, and then configure the application to use Duo MFA for user login authentication
Install Cisco Duo and implement its multifactor authentication on remote access virtual private network (VPN)
Configure endpoint compliance
Review and demonstrate the ability to understand Stateful Switchover (SSO) using security assertion markup language (SAML) or OpenID Connect together with Cisco Duo
Describe Cisco software-defined wide-area network (SD-WAN) on-box and integrated threat prevention security services
Describe SD-WAN on-box and integrated content filtering security services
Describe the features and capabilities of Cisco Umbrella Secure Internet Gateway (SIG), such as DNS Security, Cloud-Delivered Firewall (CDFW), intrusion prevention systems (IPS), and interaction with Cisco SD-WAN
Introduce the reverse proxy for internet-facing applications protections
Explore the Cisco Umbrella SIG use case to secure cloud application access, the limitations and benefits of the solution, and the features available to discover and control access to cloud delivered applications
Explore the Cisco ThousandEyes capabilities for monitoring the Cisco SD-WAN deployment
Describe the challenges of accessing SaaS applications in modern business environments and explore the Cisco SD-WAN Cloud OnRamp for SaaS solution with direct or centralized internet access
Introduce the Cisco Secure Firewall platforms, use cases, and security capabilities
Demonstrate a comprehesive understanding of web application firewalls
Demonstrate a comprehensive understanding of Cisco Secure Workload capabilities, deployment options, agents, and connectors
Demonstrate a comprehensive understanding of Cisco Secure Workload application dependency mapping and policy discovery
Demonstrate a comprehensive understanding of common cloud attack tactics and mitigation strategies
Demonstrate a comprehensive understanding of multicloud security requirements and policy capabilities
Introduce the security issues with the adoption of public clouds and common capabilities of cloud visibility and assurance tools to mitigate these issues
Introduce Cisco Secure Network Analytics and Cisco Security Analytics and Logging
Describe Cisco Attack Surface Management
Describe how Application Program Interfaces (APIs) and automation can help in troubleshooting cloud policy, especially in the context of misconfigurations
Demonstrate a comprehensive knowledge of the appropriate responses to cloud threats in specific scenarios
Demonstrate the comprehensive knowledge required to use automation for cloud threat detection and responseCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic understanding of enterprise routing
Basic understanding of WAN networking
Basic understanding of Cisco SD-WAN
Basic understanding of Public Cloud servicesThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions 2.0
Implementing Cisco SD-WAN Solutions 3.0
Cisco SD-WAN Operation and Deployment 2.0Course Outline
Industry Security Frameworks
Cisco Security Reference Architecture Fundamentals
Cisco Security Reference Architecture Common Use Cases
Cisco SAFE Architecture
Certificate-Based User and Device Authentication
Cisco Duo Multifactor Authentication for Application Protection
Cisco Duo with AnyConnect VPN for Remote Access
Introducing Cisco ISE Endpoint Compliance Services
SSO using SAML or OpenID Connect
Deploying On-Premises Threat Prevention
Examining Content Filtering
Exploring Cisco Umbrella SIG
Reverse Proxy
Securing Cloud Application with Cisco Umbrella SIG
Exploring Cisco SD-WAN ThousandEyes
Optimizing SaaS Applications
Security Policies for Remote Access VPN
Cisco Secure Access
Cisco Secure Firewall
Web Application Firewall
Cisco Secure Workload Deployments, Agents, and Connectors
Cisco Secure Workload Structure and Policy
Cloud Security Attacks and Mitigations
Multicloud Security Policies
Cloud Visibility and Assurance
Cisco Secure Network Analytics and Cisco Secure Analytics and Logging
Cisco XDR
Cisco Attack Surface Management
Cloud Applications and Data Access Verifications
Automation of Cloud Policy
Response to Cloud Threats
Automation of Cloud Threat Detection and ResponseLab Outline
Explore Cisco SecureX
Windows Client BYOD Onboarding Interactive Activity
Use Cisco Duo MFA to Protect the Splunk Application
Integrate the Cisco Duo Authentication Proxy to Implement MFA for Cisco Security Secure Firewall AnyConnect Remote Access VPN
Configure Cisco ISE Compliance Services
Configure Threat Prevention
Implement Web Security
Deploy DIA Security with Unified Security Policy
Configure Cisco Umbrella DNS Policies
Deploy Cisco Umbrella Secure Internet Gateway
Implement CASB Security
Microsoft 365 SaaS Testing by Using Cisco ThousandEyes
Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
Configure Cisco Secure Firewall Policies
Explore Cisco Secure Workload
Explore the ATT&CK Matrix Cloud-Based Techniques
Explore Cisco Secure Network Analytics
Explore Cisco XDR Incident Response Tasks - SISE — Implementing and Configuring Cisco Identity Services Engine
- Длительность: 5 дней (40 часов)
 - Код курса: SISE
 - Стоимость
 - Очный формат: 1 073 500 ₸
 - Онлайн формат: 1 040 000 ₸
 
Описание курса
Course Overview
The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist — Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification
How You’ll Benefit
This class will help you use Cisco ISE to:
Develop and implement SASE architecture
Understand application of ISE capabilities towards development of a Zero Trust approach
Enable BYOD and guest access
Centrally configure and manage posture, authentication, and authorization services in a single webbased GUI console
Gain leading-edge career skills for high-demand job roles and responsibilities focused on enterprise security
Earn 40 CE credits toward recertificationWho should attend
Network security engineers
Network security architects
ISE administrators
Senior Security Operations Center (SOC) personnel responsible for Incidence Response
Cisco integrators and partnersPrerequisites
To fully benefit from this course, you should have the following knowledge:
Familiarity with the Cisco IOS® Software Command-Line Interface (CLI) for wired and wireless devices
Familiarity with Cisco AnyConnect® Secure Mobility Client
Familiarity with Microsoft Windows operating systems
Familiarity with 802.1XCourse Objectives
After taking this course, you should be able to:
Describe the Cisco Identity Services Engine (ISE)
Explain Cisco ISE deployment
Describe Cisco ISE policy enforcement components
Describe Cisco ISE policy configuration
Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support
Configure guest access
Configure hotspots and guest portals
Describe the Cisco ISE profiler services
Describe profiling best practices and reporting
Configure a Cisco ISE BYOD solution
Configure endpoint compliance
Configure client posture services
Configure Cisco ISE device administration
Describe Cisco ISE TrustSec configurationsOutline
Introducing Cisco ISE Architecture
Introducing Cisco ISE Deployment
Introducing Cisco ISE Policy Enforcement Components
Introducing Cisco ISE Policy Configuration
Troubleshooting Cisco ISE Policy and Third-Party NAD Support
Introducing Web Authentication and Guest Services
Configuring Hotspots and Guest Portals
Introducing the Cisco ISE Profiler
Introducing Profiling Best Practices and Reporting
Configuring Cisco ISE BYOD
Introducing Cisco ISE Endpoint Compliance Services
Configuring Client Posture Services and Compliance
Working With Network Access Devices
Exploring Cisco TrustSecLab Topology
Configure Initial Cisco ISE Setup and System Certificate Usage
Integrate Cisco ISE with Active Directory
Configure Cisco ISE Policy for MAC Authentication Bypass (MAB)
Configure Cisco ISE Policy for 802.1X
Configure Guest Access
Configure Hotspot and Self-Registered Guest Access
Configure Sponsor-Approved and Fully Sponsored Guest Access
Create Guest Reports
Configure Profiling
Customize the Cisco ISE Profiling Configuration
Create Cisco ISE Profiling Reports
Configure BYOD
Manage a Lost or Stolen BYOD Device
Configure Cisco ISE Compliance Services
Configure Client Provisioning
Configure Posture Policies
Test and Monitor Compliance-Based Access
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization
Configure Cisco TrustSec - SWSA — Securing the Web with Cisco Web Security Appliance v3.0
- Длительность: 2 дня (16 часов)
 - Код курса: SWSA
 - Стоимость
 - Очный формат: 632 000 ₸
 - Онлайн формат: 532 000 ₸
 
Описание курса
Course Description
The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA), which leads to CCNP® Security and the Cisco Certified Specialist - Web Content Security. This course also earns you 16 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This class will help you:
Implement Cisco WSA to secure web gateways, provide malware protection, and use policy controls to address the challenges of securing and controlling web traffic
Gain valuable hands-on skills focused on web security
Earn 16 CE credits toward recertificationWho Should Enroll
Security architects
System designers
Network administrators
Operations engineers
Network managers, network or security technicians, and security engineers and managers responsible for web security
Cisco integrators and partnersWhat to Expect in the Exam
This exam certifies your knowledge of Cisco Web Security Appliance including proxy services, authentication, decryption policies, differentiated traffic access policies and identification policies, acceptable use control settings, malware defense, and data security and data loss prevention.
After you pass 300-725 SWSA:
You earn the Cisco Certified Specialist - Web Content Security certification.
You will have satisfied the concentration exam requirement for new the CCNP Security certification. To complete CCNP Security, you also need to pass the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam or its equivalent.Course Objectives
After taking this course, you should be able to:
Describe Cisco WSA
Deploy proxy services
Utilize authentication
Describe decryption policies to control HTTPS traffic
Understand differentiated traffic access policies and identification profiles
Enforce acceptable use control settings
Defend against malware
Describe data security and data loss prevention
Perform administration and troubleshootingCourse Prerequisites
To fully benefit from this course, you should have knowledge of these topics:
TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
IP routingYou are expected to have one or more of the following basic technical competencies or equivalent knowledge:
Cisco certification (CCENT certification or higher)
Relevant industry certification [International Information System Security Certification Consortium ((ISC)2), Computing Technology Industry Association (CompTIA) Security+, International Council of Electronic Commerce Consultants (EC-Council), Global Information Assurance Certification (GIAC), ISACA]
Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE)], CompTIA (A+, Network+, Server+)Course Outline
Describing Cisco WSA
Deploying Proxy Services
Utilizing Authentication
Creating Decryption Policies to Control HTTPS Traffic
Understanding Differentiated Traffic Access Policies and Identification Profiles
Defending Against Malware
Enforcing Acceptable Use Control Settings
Data Security and Data Loss Prevention
Performing Administration and Troubleshooting
ReferencesLab Outline
Configure the Cisco Web Security Appliance
Deploy Proxy Services
Configure Proxy Authentication
Configure HTTPS Inspection
Create and Enforce a Time/Date-Based Acceptable Use Policy
Configure Advanced Malware Protection
Configure Referrer Header Exceptions
Utilize Third-Party Security Feeds and MS Office 365 External Feed
Validate an Intermediate Certificate
View Reporting Services and Web Tracking
Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA - SESA — Securing Email with Cisco Email Security Appliance v3.0
- Длительность: 4 дня (32 часа)
 - Код курса: SESA
 - Стоимость
 - Очный формат: 1 200 500 ₸
 - Онлайн формат: 1 186 500 ₸
 
Описание курса
Course Description
The Securing Email with Cisco Email Security Appliance (SESA) training shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on training provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities, such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.
This training prepares you for the 300-720 SESA v1.1 exam. If passed, you earn the Cisco Certified Specialist – Email Content Security certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
Gain leading-edge career skills focused on enterprise security
Prepare for the 300-720 SESA v1.1 exam
Earn 24 CE credits toward recertificationWho Should Enroll
Security Engineers
Security Administrators
Security Architects
Operations Engineers
Network Engineers
Network Administrators
Network or Security Technicians
Network Managers
System Designers
Cisco Integrators and PartnersCourse Objectives
Describe and administer the Cisco Email Security Appliance
Control sender and recipient domains
Control spam with Talos SenderBase and anti-spam
Use anti-virus and outbreak filters
Use mail policies
Use content filters
Use message filters
Prevent data loss
Perform lightweight directory access protocol (LDAP) queries
Authenticate simple mail transfer protocol (SMTP) sessions
Authenticate email
Encrypt email
Use system quarantines and delivery methods
Perform centralized management using clusters
Test and troubleshootCourse Prerequisites
The basic technical competencies you are expected to have before attending this training are:
Cisco certification, such as Cisco Certified Support Technician (CCST) Cybersecurity certification or higher
Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
Windows expertise, such as Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], and CompTIA (A+, Network+, Server+)The knowledge and skills you are expected to have before attending this training are:
Transmission control protocol/internet protocol (TCP/IP) services, including domain name system (DNS), secure shell (SSH), file transfer protocol (FTP), simple network management protocol (SNMP), hypertext transfer protocol (HTTP), and hypertext transfer protocol secure (HTTPS)
Experience with IP routingCourse Outline
Describing the Cisco Email Security Appliance
Controlling Sender and Recipient Domains
Controlling Spam with Talos SenderBase and Anti-Spam
Using Anti-Virus and Outbreak Filters
Using Mail Polices
Using Content Filters
Using Message Filters
Preventing Data Loss
Using LDAP
Describing SMTP Session Authentication
Using Email Authentication
Using Email Encryption
Administering the Cisco Email Security Appliance
Using System Quarantines and Delivery Methods
Centralizing Management Using Clusters
Testing and TroubleshootingLab Outline
Verify and Test Cisco ESA Configuration
Advanced Malware in Attachments (Macro Detection)
Protect Against Malicious or Undesirable URLs Beneath Shortened URLs
Protect Against Malicious or Undesirable URLs Inside Attachments
Intelligently Handle Unscannable Messages
Leverage AMP Cloud Intelligence Via Pre-Classification Enhancement
Integrate Cisco ESA with AMP Console
Prevent Threats with Anti-Virus Protection
Applying Outbreak Filters
Configure Attachment Scanning
Configure Outbound Data Loss Prevention
Integrate Cisco ESA with LDAP and Enable the LDAP Accept Query
Domain Keys Identified Mail (DKIM)
Sender Policy Framework (SPF)
Forged Email Detection
Perform Basic Administration
Configure the Cisco Secure Email and Web Manager for Tracking and Reporting - SCOR — Implementing and Operating Cisco Security Core Technologies
- Длительность: 5 дней (40 часов)
 - Код курса: SCOR
 - Стоимость
 - Очный формат: 785 500 ₸
 - Онлайн формат: 771 500 ₸
 
Описание курса
Course Description
The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.
This training prepares you for the 350-701 SCOR v1.1 exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
Qualify for professional and expert-level security job roles
Prepare for the 350-701 SCOR v1.1 exam
Earn 64 CE credits toward recertificationWho Should Enroll
Security Engineers
Network Engineers
Network Designers
Network Administrators
Systems Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators and Partners
Network Managers
Program Managers
Project ManagersWhat to Expect in the Exam
Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) v1.1 is a 120-minute exam associated with the Cisco Certified Specialist - Security Core certification and satisfies the core exam requirement for the CCNP Security and CCIE Security certifications.
This exam tests your knowledge of implementing and operating core security technologies, including:
Network security
Cloud security
Content security
Endpoint protection and detection
Secure network access
Visibility and enforcementCourse Objectives
Describe information security concepts and strategies within the network
Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
Describe network application-based attacks
Describe how various network security technologies work together to guard against attacks
Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
Deploy Cisco Secure Firewall Threat Defense basic configurations
Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
Deploy Cisco Secure Email Gateway basic configurations
Deploy Cisco Secure Email Gateway policy configurations
Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
Describe various attack techniques against the endpoints
Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
Describe Cisco Secure Endpoint architecture and basic features
Describe Cisco Secure Network Access solutions
Describe 802.1X and extensible authentication protocol (EAP) authentication
Configure devices for 802.1X operations
Introduce VPNs and describe cryptography solutions and algorithms
Describe Cisco secure site-to-site connectivity solutions
Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describe Cisco secure remote access connectivity solutions
Deploy Cisco secure remote access connectivity solutions
Provide an overview of network infrastructure protection controls
Examine various defenses on Cisco devices that protect the control plane
Configure and verify Cisco IOS software layer 2 data plane controls
Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
Examine various defenses on Cisco devices that protect the management plane
Describe the baseline forms of telemetry recommended for network infrastructure and security devices
Describe deploying Cisco Secure Network Analytics
Describe basics of cloud computing and common cloud attacks
Describe how to secure cloud environment
Describe the deployment of Cisco Secure Cloud Analytics
Describe basics of software-defined networks and network programmabilityCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows operating system
Working knowledge of Cisco IOS networking and concepts
Familiarity with basics of networking security conceptsThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA®)Course Outline
Network Security Technologies
Cisco Secure Firewall ASA Deployment
Cisco Secure Firewall Threat Defense Basics
Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
Cisco Secure Email Gateway Basics
Cisco Secure Email Policy Configuration
Cisco Secure Web Appliance Deployment
VPN Technologies and Cryptography Concepts
Cisco Secure Site-to-Site VPN Solutions
Cisco IOS VTI-Based Point-to-Point IPsec VPNs
Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Cisco Secure Remote-Access VPN Solutions
Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describing Information Security Concepts
Describe Common TCP/IP Attacks
Describe Common Network Application Attacks
Common Endpoint Attacks
Cisco Umbrella Deployment
Endpoint Security Technologies
Cisco Secure Endpoint
Cisco Secure Network Access Solutions
802.1X Authentication
802.1X Authentication Configuration
Network Infrastructure Protection
Control Plane Security Solutions
Layer 2 Data Plane Security Controls
Layer 3 Data Plane Security Controls
Management Plane Security Controls
Traffic Telemetry Methods
Cisco Secure Network Analytics Deployment
Cloud Computing and Cloud Security
Cloud Security
Cisco Secure Cloud Analytics Deployment
Software-Defined NetworkingLab Outline
Configure Network Settings and NAT on Cisco Secure Firewall ASA
Configure Cisco Secure Firewall ASA Access Control Policies
Configure Cisco Secure Firewall Threat Defense NAT
Configure Cisco Secure Firewall Threat Defense Access Control Policy
Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
Configure Cisco Secure Firewall Threat Defense Malware and File Policy
Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
Configure Cisco Secure Email Policies
Configure Proxy Services, Authentication, and HTTPS Decryption
Enforce Acceptable Use Control and Malware Protection
Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
Examine Cisco Umbrella Dashboard and DNS Security
Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
Explore Cisco Umbrella CASB Functionalities
Explore Cisco Secure Endpoint
Perform Endpoint Analysis Using Cisco Secure Endpoint Console
Explore File Ransomware Protection by Cisco Secure Endpoint Console
Explore Secure Network Analytics v7.4.2
Explore Global Threat Alerts Integration and ETA Cryptographic Audit
Explore Cloud Analytics Dashboard and Operations
Explore Secure Cloud Private and Public Cloud Monitoring - SVPN — Implementing Secure Solutions with Virtual Private Networks
- Длительность: 5 дней (40 часов)
 - Код курса: SVPN
 - Стоимость
 - Очный формат: 1 379 500 ₸
 - Онлайн формат: 1 366 500 ₸
 
Описание курса
Course Description
The Implementing Secure Solutions with Virtual Private Networks (SVPN) training teaches you how to implement, configure, monitor, and support enterprise virtual private network (VPN) solutions. Through a combination of lessons and hands-on experiences, you will acquire the knowledge and skills to deploy and troubleshoot traditional internet protocol security (IPsec), dynamic multipoint virtual private network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.
This training prepares you for the 300-730 SVPN v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Acquire the knowledge and skills to enhance internet privacy, speed, and performance
Gain hands-on experience using the tools to ensure premium data security
Prepare for the 300-730 SVPN v1.1 exam
Earn 40 CE credits toward recertificationWho Should Enroll
Network Security Engineers
CCNP Security Candidates
Channel Partners
Cisco CustomersWhat to Expect in the Exam
Implementing Secure Solutions with Virtual Private Networks (300-730 SVPN v1.1) is a 90-minute exam associated with the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfies the concentration exam requirement for the CCNP Security certification.
The exam tests your knowledge of implementing secure remote communications with VPN solutions, including:
Secure communications
Architectures
TroubleshootingCourse Objectives
Introduce site-to-site VPN options available on Cisco router and firewalls
Introduce remote access VPN options available on Cisco router and firewalls
Review site-to-site and remote access VPN design options
Review troubleshooting processes for various VPN options available on Cisco router and firewallsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Familiarity with the various Cisco router and firewall command modes
Experience navigating and managing Cisco routers and firewalls
Clear understanding of the benefits of site-to-site and remote access VPN options
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA®)
Implementing and Operating Cisco Security Core Technologies (SCOR)Course Outline
Introducing VPN Technology Fundamentals
Implementing Site-to-Site VPN Solutions
Implementing Cisco IOS Site-to-Site Flex VPN Solutions
Implement Cisco IOS GET VPN Solutions
Implementing Cisco AnyConnect VPNs
Implementing Clientless VPNsLab Outline
Explore IPsec Technologies
Implement and Verify Cisco IOS Point-to-Point VPN
Implement and Verify Cisco ASA Point-to-Point VPN
Implement and Verify Cisco IOS VTI VPN
Implement and Verify DMVPN
Troubleshoot DMVPN
Implement and Verify FlexVPN with Smart Defaults
Implement and Verify Point-to-Point FlexVPN
Implement and Verify Hub-and-Spoke FlexVPN
Implement and Verify Spoke-to-Spoke FlexVPN
Troubleshoot Cisco IOS FlexVPN
Implement and Verify AnyConnect TLS VPN on ASA
Implement and Verify Advanced AAA on Cisco AnyConnect VPN
Implement and Verify Clientless VPN on ASA - SECICC — Introducing Cisco Cloud Consumer Security
- Длительность: 1 день (8 часов)
 - Код курса: SECICC
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 433 500 ₸
 
Описание курса
Длительность обучения:
Instructor-led training: 1 day in the classroom
Virtual instructor-led training: 1 day of web-based classes
E-learning: Equivalent of 1 day of instruction with hands-on lab practiceКому следует посетить:
This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures:
Security architects
Cloud architects
Network engineers and administrators
System engineers and adminstrators
Cloud security consumers
Cloud application administrators
IT managers
Line of business managers
Cisco integrators and partnersПредварительные требования:
This course has no prerequisites, but you’ll get the most from the course if you have the following knowledge and skills:
Basic computer literacy
Basic PC operating system navigation skills
Basic Internet usage skills
Basic IP address knowledge
We also recommend that you have the following skills:
Prior knowledge of cloud computing and virtualization software basicsПрограмма курса:
After taking this course, you should be able to:
Describe public, private, and hybrid cloud models, concepts, and design
Explain the concepts and components for securing cloud environments
Describe Cisco security offerings for Amazon Web Services (AWS)
Define methods to secure SaaS application usageДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
 - SECCLD — Securing Cloud Deployments with Cisco Technologies
- Длительность: 4 дня (32 часа)
 - Код курса: SECCLD
 - Стоимость
 - Очный формат: 1 318 500 ₸
 - Онлайн формат: 1 302 000 ₸
 
Описание курса
Длительность обучения:
Instructor-led training: 4 days in the classroom with hands-on lab practice
Virtual instructor-led training: 4 days of web-based classes with hands-on lab practice
E-learning: Equivalent of 4 days of instruction with videos, practice, and challengesКому следует посетить:
This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments:
Security architects
Cloud architects
Security engineers
Cloud engineers
System engineers
Cisco integrators and partnersПредварительные требования:
To fully benefit from this course, you should have completed the following course or obtained the equivalent knowledge and skills:
Knowledge of cloud computing and virtualization software basics
Ability to perform basic UNIX-like OS commands
Cisco CCNP® security knowledge or understanding of the following topic areas:
Topic areas/Available in these courses
Cisco Adaptive Security Appliance (ASA) and Adaptive Security Virtual Appliance (ASAv) deployment, and Cisco IOS® Flexible NetFlow operations/Implementing Cisco Edge Network Security Solutions (SENSS)
Cisco NGFW (Cisco Firepower Threat Defense [FTD]), Cisco Firepower, and Cisco Firepower Management Center (FMC) deployment
Cisco Content Security operations including Cisco Web Security Appliance (WSA)/ Cisco Email Security Appliance (ESA)/Cisco Cloud Web Security (CWS)Cisco AMP for network and endpoints deployment/Implementing Cisco Threat Control Solutions (SITCS)
Cisco ISE operations and Cisco TrustSec architecture/Implementing Cisco Secure Access Solutions (SISAS)
VPN operation/Implementing Cisco Secure Mobility Solutions (SIMOS)Программа курса:
After taking this course, you should be able to:
Contrast the various cloud service and deployment models
Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services
Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security
Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud
Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec®
Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments
Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilitiesДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
 - UCSEC — Implementing Cisco Unified Communications Security
- Длительность: 5 дней (40 часов)
 - Код курса: UCSEC
 - Стоимость
 - Очный формат: 1 583 000 ₸
 - Онлайн формат: 1 561 500 ₸
 
Описание курса
Кому следует посетить:
Курс предназначен для тех, кто работает на стыке телефонии и информационной безопасности, а также всем инженерам, работающим с архитектурой и продуктами UC. Данный курс следует посетить сетевым администраторам, сетевым инженерам, а также системным инженерам.
Предварительные требования:
Перед посещением данного курса слушатели должны обладать следующими навыками:
Практические знания конвергентных голосовых сетей и СХД
Знакомство с Cisco IOS gateway, Cisco Unified SRST gateway и Cisco Unified Border Element
Знание продуктов Cisco Unified Communications Manager и Cisco Unified Communications Manager Express
Рекомендовано наличие сертификата CCNP® VoiceДополнительные навыки, которые будут полезны:
Знание основ сетевой безопасности
Знание технологий Cisco IOS Firewall и Cisco ASA adaptive security appliance firewalls
Знакомство с IPsec и SSL VPNs
Рекомендовано наличие сертификата CCNA® SecurityЦели курса:
После посещения тренинга слушатели смогут:
Определять уязвимые места в сетях Cisco Unified Communications, а также описывать стратегии безопасности, криптографические сервисы , PKI и технологии VPN
Использовать функционал системы безопасности сетевой инфраструктуры
Внедрять Cisco Unified Communications Manager и Cisco Unified Communications endpoint security featuresСодержание курса:
5-дневный курс UCSEC посвящен описанию уязвимостей и атак на инфраструктуру IP-телефонии, а также методов борьбы с ними и методов обеспечения безопасности инфраструктуры. За время курса слушатели научатся определять уязвимые места в сетях Cisco Unified Communications, а также описывать стратегии безопасности, криптографические сервисы PKI и технологии VPN, использовать функционал системы безопасности сетевой инфраструктуры и внедрять функции безопасности в Cisco Unified Communications Manager и терминалах Cisco.
Программа курса
1. Введение
2. Уязвимости сети Cisco Unified Communications и основы безопасности
2.1. Оценка уязвимостей сети Cisco Unified Communications
2.2. Стратегии реализации безопасности
2.3. Криптографические службы и функции
2.4. Управления ключами и PKI
2.5. IPsec и Cisco AnyConnect SSL VPN
2.6. Лабораторная работа 1: Идентификация уязвимых мест в Cisco UC сетях3. Функционал системы безопасности сетевой инфраструктуры
3.1. Разделение сети и фильтрация пакетов
3.2. Функции безопасности коммутаторов
3.3. Cisco AnyConnect SSL VPN в сетях Cisco Unified Communications
3.4. Лабораторная работа 2: Внедрение межсетевых экранов
3.5. Лабораторная работа 3: Внедрение 802.1X
3.6. Лабораторная работа 4: Внедрение Cisco AnyConnect SSL VPN-ов4. Cisco Unified Communications Manager и функции защиты абонентских устройств
4.1. Повышение защиты абонентских устройств
4.2. Предотвращение мошеннических звонков
4.3. Встроенные функции безопасности Cisco Unified Communications Manager
4.4. Функции безопасности Cisco Unified Communications Manager, основанные на маркерах безопасности
4.5. Лабораторная работа 5: Внедрение механизмов безопасности Cisco Unified Communications Manager, основанных на безопасных токенах5. Интеграция Cisco Unified Communications с внешними элементами защиты
5.1. Применение SRTP для шлюзов и защита сигнала средствами IPSec
5.2. Применение SRTP для шлюзов и защита сигнала в SRST and Cisco Unified Communications Manager Express
5.3. Trusted Relay Points
5.4. Прокси
5.5. Лабораторная работа 6: Внедрение SRTP на шлюзах и защита сигнализации с помощью IPsec
5.6. Лабораторная работа 7: Внедрение безопасного SRST и безопасного Cisco Unified Communications Manager Express
5.7. Лабораторная работа 8: Внедрение Trusted Relay Points
5.8. Лабораторная работа 9: Внедрение прокси для сигнализации и RTP потоков - 802.1x — Introduction to 802.1X Operations for Cisco Security Professionals
- Длительность: 3 дня (24 часа)
 - Код курса: 802.1X
 - Стоимость
 - Очный формат: 752 000 ₸
 - Онлайн формат: 657 000 ₸
 
Описание курса
Course Description
The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.
How You'll Benefit
This class will help you:
Learn about and practice configuring Cisco Identity-Based Networking Services solutions at your own pace
Build your skills using Cisco Identity-Based Networking Services (IBNS) to secure network connectivity and resources.Who Should Enroll
Security architects
Design engineers
Network engineers
Cisco integrators and partnersCourse Objectives
After taking this course, you should be able to:
Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks.
Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications.
Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation.
Describe how to configure access for non-supplicant devices in an 802.1X deployment.
Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X.Course Prerequisites
To fully benefit from this course, you should have knowledge of these topics:
Cisco wireless LAN controllers
Basic command-line configuration of Cisco Catalyst switches
Microsoft Windows Server Active Directory
Here are some recommended Cisco learning offerings that can help you meet these prerequisites:Cisco CCNA® Security Certification training
Cisco CCNA Routing and Switching Certification training
Cisco CCNA Wireless Certification trainingCourse Outline
Describing Cisco Identity-Based Networking Services
Cisco IBNS Overview
Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS
Compare Cisco IBNS and Cisco ISE Solutions
Explore Cisco IBNS Architecture Components
Explore Cisco TrustSecDescribing 802.1X EAP Authentication
Explore the IEEE 802.1X Standard
Explore 802.1X and EAP
Explain EAP Methods
Describe the Role of RADIUS in EAP CommunicationsConfiguring Devices for 802.1X Operation
Identify 802.1X Components and Topologies
Configure Cisco Catalyst Switch for 802.1X
Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch
Configure Cisco WLC for 802.1X
Configure Cisco ISE for 802.1X
Configure Supplicants for 802.1X OperationConfiguring Access for Non-Supplicant Devices
Configure Cisco IBNS for Non-Supplicant Devices
Explore IBNS 2.0 for Non-Supplicant Devices
Configure Cisco Central Web Authentication for GuestsDesigning Cisco IBNS Networks with Cisco ISE and 802.1X
Cisco ISE Architectural Components
Introducing the Cisco ISE Bring Your Own Device (BYOD) Process
Identify Cisco ISE Deployment Options
Identify Component Compatibilities with 802.1X
Review 802.1X Design ConsiderationsLab Outline
Configure and Test 802.1X Operations
 - SSFIPS — Securing Networks with Cisco Firepower Next-Generation IPS
- Длительность: 5 дней (40 часов)
 - Код курса: SSFIPS
 - Стоимость
 - Очный формат: 1 096 500 ₸
 - Онлайн формат: 1 080 500 ₸
 
Описание курса
Кому следует посетить:
Этот курс предназначен для технических специалистов, которым необходимо знать, как развертывать Cisco Firepower NGIPS и управлять им в своей сетевой среде.
Администраторы безопасности
Консультанты по безопасности
Сетевые администраторы
Системные инженеры
Персонал технической поддержки
Торговые партнеры и реселлерыПредварительные требования:
Для прохождения данного курса рекомендуется обладать знаниями и навыками:
Базовое понимание работы TCP/IP сетей
Базовые знания о работе систем IDS и IPSЦели курса:
После прохождения данного курса слушатели будут уметь:
Описывать компоненты Cisco Firepower Threat Defense, управлять процессом регистрации устройства
Настраивать политику обнаружения устройств
Внедрять политик контроля доступа
Настраивать intrusion-политики
Создавать и анализировать отчеты Firepower Management Center
Интегрировать Firepower Management Center с внешними системами логирования
Обновлять ПО и управлять административными аккаунтами Firepower Management Center
Использовать базовые команды и инструменты для поиска и устранения неполадок в работе Firepower Management Center и устройств Firepower Threat DefenseПрограмма курса:
Введение
Обзор Cisco Firepower Threat Defense
Сравнение и анализ систем предотвращения вторжений и межсетевых экранов
Основные функции и компоненты системы Firepower Threat Defense
Сравнение модельного ряда
Принципы лицензирования
Процесс внедрения FirepowerНастройки устройства Firepower NGFW
FXOS и Firepower Device Manager
Управление устройствами
Исследование политик Firepower Management Center
Системные настройки, показатели здоровья устройстваКонтроль трафика
Packet Processing
BypassingМеханизм анализа сети Firepower Discovery
Обзор механизма анализа сети
Анализ профиля хоста
Работа с идентификационной информацией пользователяПолитика контроля доступа к ресурсам
Введение, анализ работы политики
Анализ списка правил, действие по умолчанию
Further Inspection
Расширенные функции
Рекомендации для внедрения политики контроля доступаМеханизм Security Intelligence
Обзор механизма Security Intelligence
Объекты Security Intelligence
Настройка Security Intelligence, анализ логовКонтроль файлов и расширенная защита от вредоносного ПО
Анализ файловой политики
Анализ сервиса AMPСистема предотвращения вторжений
Введение, Snort-правила
Variables, Variable Set
Создание IPS-политики
Настройка IPS-политики
Управление IPS-политикойПолитика анализа сети
Исследование работы препроцессора
Обзор политики анализа сетиДополнительные техники анализа
Анализ событий
Типа событий
Контекстная информация
Инструменты для анализаИнтеграция с другими платформами
Интеграция с Cisco ISE
Интеграция со SplunkПолитики корреляции и оповещения
Оповещение внешних систем
Политика корреляцииСистемное администрирование
Обновления ПО
Управление пользовательскими аккаунтамиПоиск и устранение неполадок в работе системы Firepower
Распространенные ошибки в настройках
Команды для поиска и устранения неполадок
Packet Capture - FTD — Cisco Secure Firewall 7.2 Implementation
- Длительность: 5 дней (40 часов)
 - Код курса: FTD
 - Стоимость
 - Очный формат: 1 593 500 ₸
 - Онлайн формат: 1 567 000 ₸
 
Описание курса
Этот курс поможет Вам:
Получить знания и навыки, которые необходимы для настройки и эксплуатации передовой сетевой системы защиты информации Cisco.
В процессе прохождения данного курса Вы научитесь:
Понимать архитектуру, разбираться в управляющих и исполнительных компонентах системы, понимать взаимодействия между компонентами системы;
Понимать принципы лицензирования;
Понимать возможные варианты разворачивания компонентов системы;
Понимать назначение, редактировать и создавать политики Management;
Понимать возможные пути прохождения трафика через систему;
Использовать механизм Discovery для анализа сети и создания профилей хостов;
Использовать механизм Security Intelligence;
Понимать принципы работы, редактировать и создавать политики контроля доступа к ресурсам, политики контроля файлов и сервиса AMP, политики системы предотвращения вторжений, политики анализа сети;
Работать с инструментами для анализа событий;
Искать и устранять неполадки в работе системы.Предварительные требования:
Данный курс предполагает наличие у слушателей базового знания сетевых технологий, терминологии в области ИБ, умения работать с Windows Workstation, понимания TCP/IP.
Course Outline
1. Cisco Secure Firewall Family
2. Cisco Firepower Threat Defense Components and Features
3. Firepower Threat Defense High Availability and Clustering
4. Routing for Firepower Threat Defense
5. Network Address Translation (NAT)
6. Firepower Discovery
7. Prefiltering and Prefilter Policies
8. Security Intelligence
9. SSL Policy
10. Access Control Policy
11. File Control and Advanced Malware Protection
12. Next-Generation Intrusion Prevention Systems
13. Network Analysis Policies
14. Correlation Policy
15. Firepower QoS
16. Firepower Threat Defense VPN
17. Cisco Threat Intelligence Director
18. Event Analysis Techniques
19. Cisco Secure Firewall TroubleshootingLab Outline
1. Navigating Firepower Management Center
2. FTD Device Configuration
3. NAT Configuration
4. Network Discovery Policy
5. Object Management
6. Access Control Policy
7. Security Intelligence
8. File Policy
9. Intrusion Policy
10. Network Analysis Policy
11. SSL Policy Configuration
12. QoS Policy Configuration
13. Correlation Policy - SDAFND — Understanding Cisco SDA Fundamentals
- Длительность: 3 дня (24 часа)
 - Код курса: SDAFND
 - Стоимость
 - Очный формат: 1 011 000 ₸
 - Онлайн формат: 917 000 ₸
 
Описание курса
Course Overview
The Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco® Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks. You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFND will introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks.
This course will help you:
Deploy Cisco SD-Access networks
Explain Cisco Software-Designed Access
Operate, manage, and integrate Cisco DNA Center™
Prepare for various Cisco certifications: Cisco Certified Specialist – Enterprise Core (ENCOR), and Cisco Certified Specialist – Enterprise Design (ENSLD)Who should attend
Field engineers
Network engineers
Network administrators
System engineersPrerequisites
To fully benefit from this course, you should have the following knowledge and skills:
CCNP® level core networking knowledge
Ability to use Windows and Linux CLI tools such as ping, SSH, or running scriptsThese are the recommended Cisco offerings that may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Objectives
After taking this course, you should be able to:
Describe Cisco SD-Access architecture and its components
Explain Cisco DNA Center deployment models, scaling, and high availability
Identify Cisco SD-Access fabric protocols and node roles
Understand the Cisco SD-Access Wireless deployment models
Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP
Deploy simple Cisco SD-Access fabric networks
Monitor health and performance of the network with Cisco DNA Center Assurance
Interact with the Cisco DNA Center Platform Intent APIsCourse Outline:
Understanding Cisco SDA Fundamentals (SDAFND)
Introducing Cisco SD-Access
Introducing Cisco DNA Center
Exploring Cisco SD-Access Solution Components
Exploring Cisco SD-Access Wireless Architecture
Automating Network Changes with Cisco DNA Center
Deploying Fabric Networks with Cisco DNA Center
Exploring Cisco DNA Center Assurance
Exploring Cisco DNA Center ProgrammabilityLab Topology
Explore Cisco DNA Center User Interface
Verify Location Identifier Separation Protocol (LISP) Operation in Cisco SD-Access
Integrate Cisco DNA Center and Cisco Identity Services Engine (Cisco ISE)
Provision Access Points in Cisco DNA Center
Provision Underlay Networks with Cisco DNA Center LAN Automation
Provision Underlay Networks with Cisco DNA Center LAN Automation (cont.)
Deploy Cisco SD-Access Single Site Fabric
Deploy Cisco SD-Access Single Site Fabric (cont.)
Explore Cisco DNA Center Assurance
Cisco DNA Assurance Issues and Guided Remediation
Interact with Cisco DNA Center Intent APIs Using Python - SSFRULES — Securing Cisco Networks with Snort Rule Writing Best Practices
- Длительность: 3 дня (24 часа)
 - Код курса: SSFRULES
 - Стоимость
 - Очный формат: 750 500 ₸
 - Онлайн формат: 655 500 ₸
 
Описание курса
Course Overview
The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules.
This course will help you:
Gain an understanding of characteristics of a typical Snort rule development environment
Gain hands-on practices on creating rules for Snort
Gain knowledge in Snort rule development, Snort rule language, standard and advanced rule optionsWho should attend
This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes:
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel using open source IDS and IPS
Channel partners and resellersPrerequisites
To fully benefit from this course, you should have:
Basic understanding of networking and network protocols
Basic knowledge of Linux command-line utilities
Basic knowledge of text editing utilities commonly found in Linux
Basic knowledge of network security concepts
Basic knowledge of a Snort-based IDS/IPS systemCourse Objectives
After taking this course, you should be able to:
Describe the Snort rule development process
Describe the Snort basic rule syntax and usage
Describe how traffic is processed by Snort
Describe several advanced rule options used by Snort
Describe OpenAppID features and functionality
Describe how to monitor the performance of Snort and how to tune rulesCourse Outline:
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
Introduction to Snort Rule Development
Snort Rule Syntax and Usage
Traffic Flow Through Snort Rules
Advanced Rule Options
OpenAppID Detection
Tuning SnortLab Topology
Connecting to the Lab Environment
Introducing Snort Rule Development
Basic Rule Syntax and Usage
Advanced Rule Options
OpenAppID
Tuning Snort - SSFSNORT — Securing Cisco Networks with Open Source Snort
- Длительность: 4 дня (32 часа)
 - Код курса: SSFSNORT
 - Стоимость
 - Очный формат: 1 206 000 ₸
 - Онлайн формат: 1 116 000 ₸
 
Описание курса
Course Overview
The Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more.
How You'll Benefit
This training will help you:
Learn how to implement Snort, an open-source, rule-based, intrusion detection and prevention system
Gain leading-edge skills for high-demand responsibilities focused on security
Earn 32 CE credits towards recertificationWho should attend
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel
Channel partners and resellersCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Technical understanding of transmission control protocol/internet protocol (TCP/IP) networking and network architecture
Proficiency with Linux and UNIX text editing tools, such as vi editorThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA)Course Objectives
Describe Snort technology and identify resources available for maintaining a Snort deployment
Install Snort on a Linux-based operating system
Describe the Snort operation modes and their command-line options
Describe the Snort intrusion detection output options
Download and deploy a new rule set to Snort
Describe and configure the snort.conf file
Configure Snort for inline operation and configure the inline-only features
Describe the Snort basic rule syntax and usage
Describe how traffic is processed by the Snort engine
Describe several advanced rule options used by Snort
Describe OpenAppID features and functionality
Describe how to monitor Snort performance and how to tune rules
Course BenefitsCourse Outline
Snort Installation
Snort Operation
Snort Intrusion Detection Output
Rule Management
Snort Configuration
Inline Operation and Configuration
Snort Rule Syntax and Usage
Traffic Flow Through Snort Rules
Advanced Rule Options
OpenAppID Detection
Tuning SnortLab Outline
Connecting to the Lab Environment
Snort Installation
Snort Operation
Snort Intrusion Detection Output
Pulled Pork Installation
Configuring Variables
Reviewing Preprocessor Configurations
Inline Operations
Basic Rule Syntax and Usage
Advanced Rule Options
OpenAppID
Tuning Snort - SSNGFW — Securing Networks with Cisco Firepower Next Generation Firewall
- Длительность: 5 дней (40 часов)
 - Код курса: SSNGFW
 - Стоимость
 - Очный формат: 1 772 000 ₸
 - Онлайн формат: 1 752 500 ₸
 
Описание курса
Course Overview
The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 course shows you how to deploy and use Cisco Firepower® Threat Defense system. This hands-on course gives you knowledge and skills to use and configure Cisco® Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.
Course Prerequisites
Attendees should meet the following prerequisites:
Knowledge of TCP/IP and basic routing protocols — ICND1 or CCNA Recommended
Familiarity with firewall, vpn and IPS concepts — IINS or SFNDU RecommendedRecommended prerequisites:
CCNA — Implementing and Administering Cisco Solutions
SCOR — Implementing and Operating Cisco Security Core TechnologiesTarget Audience:
This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS and NGFW in their network environments.
Course Objectives:
After completing this course, you should be able to:
Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system and identify deployment scenarios
Perform initial Firepower Threat Defense device configuration and setup tasks
Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense
Describe how to implement NAT by using Cisco Firepower Threat Defense
Perform an initial network discovery, using Cisco Firepower to identify hosts, applications and services
Describe the behavior, usage and implementation procedure for access control policies
Describe the concepts and procedures for implementing security Intelligence features
Describe Cisco AMP for Networks and the procedures for implementing file control and Advanced Malware Protection
Implement and manage intrusion policies
Describe the components and configuration of site-to-site VPN
Describe and configure a remote-access SSL VPN that uses Cisco AnyConnect
Describe SSL decryption capabilities and usageCourse Content:
Cisco Firepower Threat Defense Overview:
Examining Firewall and IPS Technology
Firepower Threat Defense Features and Components
Examining Firepower Platforms
Examining Firepower Threat Defense Licensing
Cisco Firepower Implementation Use CasesCisco Firepower NGFW Device Configuration
Firepower Threat Defense Device Registration
FXOS and Firepower Device Manager
Initial Device Setup
Managing NGFW Devices
Examining Firepower Management Center Policies
Examining Objects
Examining System Configuration and Health Monitoring
Device Management
Examining Firepower High Availability
Configuring High Availability
Cisco ASA to Firepower Migration
Migrating from Cisco ASA to Firepower Threat DefenseCisco Firepower NGFW Traffic Control
Firepower Threat Defense Packet Processing
Implementing QoS
Bypassing TrafficCisco Firepower NGFW Address Translation
NAT Basics
Implementing NAT
NAT Rule Examples
Implementing NATCisco Firepower Discovery
Examining Network Discovery
Configuring Network DiscoveryImplementing Access Control Policies
Examining Access Control Policies
Examining Access Control Policy Rules and Default Action
Implementing Further Inspection
Examining Connection Events
Access Control Policy Advanced Settings
Access Control Policy Considerations
Implementing an Access Control PolicySecurity Intelligence
Examining Security Intelligence
Examining Security Intelligence Objects
Security Intelligence Deployment and Logging
Implementing Security IntelligenceFile Control and Advanced Malware Protection
Examining Malware and File Policy
Examining Advanced Malware ProtectionNext-Generation Intrusion Prevention Systems
Examining Intrusion Prevention and Snort Rules
Examining Variables and Variable Sets
Examining Intrusion PoliciesSite-to-Site VPN
Examining IPsec
Site-to-Site VPN Configuration
Site-to-Site VPN Troubleshooting
Implementing Site-to-Site VPNRemote-Access VPN
Examining Remote-Access VPN
Examining Public-Key Cryptography and Certificates
Examining Certificate Enrollment
Remote-Access VPN Configuration
Implementing Remote-Access VPNSSL Decryption
Examining SSL Decryption
Configuring SSL Policies
SSL Decryption Best Practices and MonitoringDetailed Analysis Techniques
Examining Event Analysis
Examining Event Types
Examining Contextual Data
Examining Analysis Tools
Threat AnalysisSystem Administration
Managing Updates
Examining User Account Management Features
Configuring User Accounts
System AdministrationCisco Firepower Troubleshooting
Examining Common Misconfigurations
Examining Troubleshooting Commands
Firepower TroubleshootingLabs
Lab 1: Initial Device Setup
Lab 2: Device Management
Lab 3: Configuring High Availability
Lab 4: Migrating from Cisco ASA to Firepower Threat Defense
Lab 5: Implementing QoS
Lab 6: Implementing NAT
Lab 7: Configuring Network Discovery
Lab 8: Implementing an Access Control Policy
Lab 9: Implementing Security Intelligence
Lab 10: Implementing Site-to-Site VPN
Lab 11: Implementing Remote Access VPN
Lab 12: Threat Analysis
Lab 13: System Administration
Lab 14: Firepower Troubleshooting - SFWIPA — Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention
- Длительность: 5 дней (40 часов)
 - Код курса: SFWIPA
 - Стоимость
 - Очный формат: 1 296 000 ₸
 - Онлайн формат: 1 272 500 ₸
 
Описание курса
Course Description
The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPA) training shows you how to deploy Cisco Secure Firewall Threat Defense system and its features as a data center network firewall or as an Internet Edge firewall with Virtual Private Network (VPN) support. You will learn how to configure identity-based policies, Secure Sockets Layer (SSL) decryption, remote-access VPN, and site-to-site VPN before moving on to advanced Intrusion Prevention System (IPS) configuration and event management, integrations with other systems, and advanced troubleshooting. You will also learn how to automate configuration and operations of Cisco Secure Firewall Threat Defense system using programmability and Application Programming Interfaces (APIs) and how to migrate configuration from Cisco Secure Firewall Adaptive Security Appliances (ASA).
This training prepares you for the Securing Networks with Cisco Firepower (300-710 SNCF) v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security Firepower certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Attain advanced knowledge of Cisco Secure Firewall Threat Defense technology
Gain competency and skills required to implement and manage a Cisco Secure Firewall Threat Defense system regardless of platform
Learn detailed information on policy management, traffic flow through the system, and the system architecture
Deploy and manage many of the advanced features available in the Cisco Secure Firewall Threat Defense system
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level security roles
Prepare for the 300-710 SNCF v1.1 exam
Earn 40 CE credits toward recertificationWho Should Enroll
System Installers
System Integrators
System Administrators
Network Administrators
Solutions DesignersWhat to Expect in the Exam
300-710 SNCF: Securing Networks with Cisco Firepower is a 90-minute exam associated with the Cisco Certified Specialist – Network Security Firepower certification and satisfies the concentration exam requirement for the CCNP Security certification.
The multiple-choice format tests your knowledge of Cisco Firepower Threat Defense and Firepower 7000 and 8000 Series virtual appliances, including:
Policy configurations
Integrations
Deployments
Management and troubleshootingCourse Objectives
Describe Cisco Secure Firewall Threat Defense
Describe advanced deployment options on Cisco Secure Firewall Threat Defense
Describe advanced device settings for Cisco Secure Firewall Threat Defense device
Configure dynamic routing on Cisco Secure Firewall Threat Defense
Configure advanced network address translation on Cisco Secure Firewall Threat Defense
Configure SSL decryption policy on Cisco Secure Firewall Threat Defense
Deploy Remote Access VPN on Cisco Secure Firewall Threat Defense
Deploy identity-based policies on Cisco Secure Firewall Threat Defense
Deploy site-to-site IPsec-based VPN on Cisco Secure Firewall Threat Defense
Deploy advanced access control settings on Cisco Secure Firewall Threat Defense
Describe advanced event management on Cisco Secure Firewall Threat Defense
Describe available integrations with Cisco Secure Firewall Threat Defense
Troubleshoot traffic flow using advanced options on Cisco Secure Firewall Threat Defense
Describe benefits of automating configuration and operations of Cisco Secure Firewall Threat Defense
Describe configuration migration to Cisco Secure Firewall Threat DefenseCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Knowledge of Transmission Control Protocol/Internet Protocol (TCP/IP)
Basic knowledge of routing protocols
Familiarity with the content explained in the Securing Internet Edge with Cisco Secure Firewall Threat Defense trainingThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)Course Outline
Introducing Cisco Secure Firewall Threat Defense
Describing Advanced Deployment Options on Cisco Secure Firewall Threat Defense
Configuring Advanced Device Settings on Cisco Secure Firewall Threat Defense
Configuring Dynamic Routing on Cisco Secure Firewall Threat Defense
Configuring Advanced NAT on Cisco Secure Firewall Threat Defense
Configuring SSL Policy on Cisco Secure Firewall Threat Defense
Deploying Remote Access VPN on Cisco Secure Firewall Threat Defense
Deploying Identity-Based Policies on Cisco Secure Firewall Threat Defense
Deploying Site-to-Site VPN on Cisco Secure Firewall Threat Defense
Configuring Snort Rules and Network Analysis Policies
Describing Advanced Event Management Cisco Secure Firewall Threat Defense
Describing Integrations on Cisco Secure Firewall Threat Defense
Troubleshooting Advanced Traffic Flow on Cisco Secure Firewall Threat Defense
Automating Cisco Secure Firewall Threat Defense
Migrating to Cisco Secure Firewall Threat DefenseLab Outline
Deploy Advanced Connection Settings
Configure Dynamic Routing
Configure SSL Policy
Configure Remote Access VPN
Configure Site-to-Site VPN
Customize IPS and NAP Policies
Configure Cisco Secure Firewall Threat Defense Integrations
Troubleshoot Cisco Secure Firewall Threat Defense
Migrate Configuration from Cisco Secure Firewall ASA - SFWIPF — Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
- Длительность: 5 дней (40 часов)
 - Код курса: SFWIPF
 - Стоимость
 - Очный формат: 871 000 ₸
 - Онлайн формат: 851 000 ₸
 
Описание курса
Course Description
The Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge. You’ll gain an understanding of Cisco Secure Firewall architecture and deployment, base configuration, packet processing and advanced options, and conducting Secure Firewall administration troubleshooting.
This training prepares you for the CCNP Security certification, which requires passing the 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) core exam and one concentration exam such as the 300-710 Securing Networks with Cisco Firepower (SNCF) concentration exam. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will teach you how to implement, configure, and manage Cisco Secure Firewall Threat Defense for deployment, including:
Configure settings and policies on Cisco Secure Firewall Threat Defense
Gain an understanding of Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Perform basic threat analysis and administration tasks using Cisco Secure Firewall Management CenterWho Should Enroll
Network security engineers
AdministratorsWhat to Expect in the Exam
350-701 SCOR: Implementing and Operating Cisco Security Core Technologies is a 120-minute exam associated with the CCNP Security certification. The multiple-choice format tests knowledge and skills related to implementing and operating core security technologies, including:
Network security
Cloud security
Content security
Endpoint protection and detection
Secure network access
Visibility and enforcement300-710 SNCF: Securing Networks with Cisco Firepower is a 90-minute exam associated with the CCNP Security certification. The multiple-choice format tests knowledge of Cisco Firepower® Threat Defense and Firepower® 7000 and 8000 Series virtual appliances, including:
Policy configurations
Integrations
Deployments
Management and troubleshootingCourse Objectives
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco Secure Firewall Threat Defense
Configure basic Network Address Translation on Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense ManagerCourse Prerequisites
Before taking this offering, you should understand:
TCP/IP
Basic routing protocols
Firewall, VPN, and IPS conceptsCourse Outline
Introducing Cisco Secure Firewall Threat Defense
Describing Cisco Secure Firewall Threat Defense Deployment Options
Describing Cisco Secure Firewall Threat Defense Management Options
Configuring Basic Network Settings on Cisco Secure Firewall Threat Defense
Configuring High Availability on Cisco Secure Firewall Threat Defense
Configuring Auto NAT on Cisco Secure Firewall Threat Defense
Describing Packet Processing and Policies on Cisco Secure Firewall Threat Defense
Configuring Discovery Policy on Cisco Secure Firewall Threat Defense
Configuring Prefilter Policy on Cisco Secure Firewall Threat Defense
Configuring Access Control Policy on Cisco Secure Firewall Threat Defense
Configuring Security Intelligence on Cisco Secure Firewall Threat Defense
Configuring File Policy on Cisco Secure Firewall Threat Defense
Configuring Intrusion Policy on Cisco Secure Firewall Threat Defense
Performing Basic Threat Analysis on Cisco Secure Firewall Management Center
Managing Cisco Secure Firewall Threat Defense System
Troubleshooting Basic Traffic Flow
Cisco Secure Firewall Threat Defense Device ManagerLab Outline
Perform Initial Device Setup
Configure High Availability
Configure Network Address Translation
Configure Network Discovery
Configure Prefilter and Access Control Policy
Configure Security Intelligence
Implement File Control and Advanced Malware Protection
Configure Cisco Secure IPS
Detailed Analysis Using the Firewall Management Center
Manage Cisco Secure Firewall Threat Defense System
Secure Firewall Troubleshooting Fundamentals
Configure Managed Devices Using Cisco Secure Firewall Device Manager - C2C — Cisco DoD Comply-to-Connect
- Длительность: 5 дней (40 часов)
 - Код курса: C2C
 - Стоимость
 - Очный формат: 1 247 500 ₸
 - Онлайн формат: 1 163 000 ₸
 
Описание курса
Course Description
The Cisco DoD Comply-to-Connect (C2C) training teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.
How You'll Benefit
This training will help you:
Learn how to operate, manage, configure, and troubleshoot the Cisco C2C solution
Gain an understanding of how the Cisco ISE security components relate to the C2C architecture
Earn 32 CE credits towards recertificationWho Should Enroll
This training is a Department of Defense mandate, ensuring compliance with cybersecurity protocols and procedures. The target audience includes individuals seeking the knowledge and skills involved in deploying, operating, and verifying Cisco DoD C2C network architecture, such as:
Network Security Engineers
Network Administrators
Security AdministratorsCourse Objectives
Define DoD C2C, including its steps and alignment with ISE features/functions and Zero Trust
Describe Cisco Identity-Based Networking Services
Explain 802.1X extensible authentication protocol (EAP)
Configure devices for 802.1X operation
Configure access for non-supplicant devices
Describe the Cisco Identity Services Engine
Explain Cisco ISE deployment
Describe Cisco ISE policy enforcement concepts
Describe Cisco ISE policy configuration
Explain PKI fundamentals, technology, components, roles, and software supplicants
Troubleshoot Cisco ISE policy and third-party network access device (NAD) support
Describe Cisco ISE TrustSec configurations
Describe the Cisco ISE profiler service
Describe profiling best practices and reporting
Configure endpoint compliance
Configure client posture services
Configure Cisco ISE device administration
Describe the four main use cases within C2CCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Familiarity with 802.1X
Familiarity with Microsoft Windows Operating Systems
Familiarity with Cisco IOS CLI for wired and wireless network devices
Familiarity with Cisco Identity Service Engine
The following recommended Cisco offering may help you meet these prerequisites:
Implementing and Operating Cisco Security Core Technologies (SCOR)Course Outline
C2C Fundamentals
Cisco Identity-Based Networking Services
802.1X EAP Authentication
Configure Devices for 802.1X Operation
Configure Access for Non-Supplicant Devices
Introducing Cisco ISE Architecture
Introducing Cisco ISE Deployment
Introducing Cisco ISE Policy Enforcement Components
Introducing Cisco ISE Policy Configuration
PKI and Advanced Supplicants
Troubleshooting Cisco ISE Policy and Third-Party NAD Support
Exploring Cisco TrustSec
Introducing the Cisco ISE Profiler
Introducing Profiling Best Practices and Reporting
Introducing Cisco ISE Endpoint Compliance Services
Configuring Client Posture Services and Compliance
Working with Network Access Devices
C2C Use CasesLab Outline
Configure and Test 802.1X Operations
Configure Initial Cisco ISE Configuration and System Certificate Usage
Integrate Cisco ISE with Active Directory
Configure Cisco ISE Policy for MAB
Configure Cisco ISE Policy for 802.1X
TEAP on Windows
Configure Cisco TrustSec
Configure Profiling
Customize the Cisco ISE Profiling Configuration
Create Cisco ISE Profiling Reports
Configure Cisco ISE Compliance Services
Configure Client Provisioning
Configure Posture Policies
Test and Monitor Compliance-Based Access
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization
DISA Reports
Certificate-Based Authentication for Cisco ISE Administration
Configure Cisco TrustSec
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization - CLCOR — Implementing Cisco Collaboration Core Technologies
- Длительность: 5 дня (40 часов)
 - Код курса: CLCOR
 - Стоимость
 - Очный формат: 1 354 000 ₸
 - Онлайн формат: 1 343 500 ₸
 
Описание курса
Course Description
The Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) training provides you with the knowledge and skills to deploy, configure and troubleshoot core collaboration and networking technologies. Topics include infrastructure design protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, and Quality of Service (QoS). This training also earns you 64 Continuing Education (CE) credits towards recertification.
This training helps prepare you to take the exam:
350-801 Implementing Cisco Collaboration Core Technologies (CLCOR)How You'll Benefit
This course will help you:
Integrate and troubleshoot Cisco Unified Communications Manager with Lightweight Directory Access Protocol (LDAP) for user synchronization and user authentication
Implement Cisco Unified Communications Manager provisioning features
Configure and troubleshoot collaboration endpoints
Earn 64 credits toward recertificationWho Should Enroll
Students preparing to take the CCNP Collaboration certification
Network administrators
Network engineers
Systems engineersCourse Objectives
Describe the Cisco Collaboration solutions architecture
Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
Implement Cisco Unified Communications Manager provisioning features
Describe the different codecs and how they are used to transform analog voice into digital streams
Describe a dial plan and explain call routing in Cisco Unified Communications Manager
Describe cloud calling using the on-premises local gateway option through Webex by Cisco
Configure calling privileges in Cisco Unified Communications Manager
Implement toll fraud prevention
Implement globalized call routing within a Cisco Unified Communications Manager cluster
Implement and troubleshoot media resources in Cisco Unified Communications Manager
Implement and troubleshoot Webex Calling dial plan features in a hybrid environment
Deploy the Webex app in a Cisco Unified Communications Manager environment and migrate from Cisco Jabber to Webex app
Configure and troubleshoot Cisco Unity Connection integration
Configure and troubleshoot Cisco Unity Connection call handlers
Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
Define QoS and its models
Implement classification and marking
Configure classification and marking options on Cisco Catalyst switchesCourse Prerequisites
Before taking this offering, you should have:
Working knowledge of fundamental terms of computer networking, including LANs, WANs, switching, and routing
Basics of digital interfaces, Public Switched Telephone Networks (PSTNs), and Voice over IP (VoIP)
Fundamental knowledge of converged voice and data networks and Cisco Unified Communications Manager deploymentCourse Outline
Module 1: Cisco Collaboration Solutions Architecture
Module 2: Call Signaling over IP Networks
Module 3: Cisco Unified Communications Manager LDAP
Module 4: Cisco Unified Communications Manager Provisioning Features
Module 5: Exploring Codecs
Module 6: Dial Plans and Endpoint Addressing
Module 7: Cloud Calling Hybrid Local Gateway
Module 8: Calling Privileges in Cisco Unified Communications Manager
Module 9: Toll Fraud Prevention
Module 10: Globalized Call Routing
Module 11: Media Resources in Cisco Unified Communications Manager
Module 12: Webex Calling Dial Plan Features
Module 13: Webex App
Module 14: Cisco Unity Connection Integration
Module 15: Cisco Unity Connection Call Handlers
Module 16: Collaboration Edge Architecture
Module 17: Quality Issues in Converged Networks
Module 18: QoS and QoS Models
Module 19: Classification and Marking
Module 20: Classification and Marking on Cisco Catalyst SwitchesLab Outline
Discovery 1: Use Certificates
Discovery 2: Configure IP Network Protocols
Discovery 3: Configure and Troubleshoot Collaboration Endpoints
Discovery 4: Troubleshoot Calling Issues
Discovery 5: Configure and Troubleshoot LDAP Integration in Cisco Unified Communications Manager
Discovery 6: Deploy an IP Phone Through Auto and Manual Registration
Discovery 7: Configure Self-Provisioning
Discovery 8: Configure Batch Provisioning
Discovery 9: Configure Regions and Locations
Discovery 10: Implement Endpoint Addressing and Call Routing
Discovery 11: Configure Calling Privileges
Discovery 12: Implement Toll Fraud Prevention on Cisco Unified Communications Manager
Discovery 13: Implement Globalized Call Routing
Discovery 14: Configure the Integration Between Unity Connection and Cisco Unified CM
Discovery 15: Manage Unity Connection Users
Discovery 16: Configure QoS - CLICA — Implementing Cisco Collaboration Applications
- Длительность: 5 дней (40 часов)
 - Код курса: CLICA
 - Стоимость
 - Очный формат: 1 354 000 ₸
 - Онлайн формат: 1 343 500 ₸
 
Описание курса
Course Description
The Implementing Cisco Collaboration Applications (CLICA) training teaches you the knowledge and skills to configure and troubleshoot Single Sign-On (SSO), Cisco Unity Connection and Cisco Unity Express, and Application clients. Topics covered include streamlining communication procedures, strengthening compliance measures, and enhancing communication systems and devices. This course also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This course will help you:
Learn to implement and troubleshoot voice mail and Interactive Voice Response (IVR) solutions using Cisco Unity Connections and Cisco Unity Express
Prepare for the 300-810 CLICA examWho Should Enroll
Collaboration engineers
Collaboration administratorsWhat to Expect in the Exam
The 300-810 CLICA exam certifies your knowledge and skills related to collaboration applications, including SSO, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
After you pass 300-810 CLICA, you earn the Cisco Certified Specialist - Collaboration Applications Implementation certification, and you satisfy the concentration exam requirement for the CCNP® Collaboration certification.
Course Objectives
Configure Cisco Unity Connection integration
Configure and troubleshoot Cisco Unity Connection and Cisco Unity Connection call handlers
Configure and troubleshoot Cisco Unity Express
Describe SSO for Cisco Unified Communications applications
Describe how Cisco Jabber and Cisco Unified Communications Manager IM and Presence are integrated with other Cisco or third-party applications
Customize the Cisco Unified Communications Manager IM and Presence and Cisco Jabber functionality
Configure and troubleshoot Chat rooms and message archiving
Troubleshoot Cisco Jabber and Cisco Unified Communications Manager IM and Presence
Integrate Cisco Unified Attendant Console Advanced with Cisco Unified Communications Manager and Cisco Unified Communications Manager IM & Presence server
Configure call recording and monitoringCourse Prerequisites
Before taking this offering, you should have:
Basic understanding of networking technologies
Basic understanding of voice and video
Cisco Unified Communications Manager experience including single-site dial plan, single PSTN gateway, and SIP trunks.Course Outline
Module 1: Cisco Unity Connection Integration
Module 2: Cisco Unity Connection Call Handlers
Module 3: Cisco Unity Connection Troubleshooting
Module 4: SSO for Cisco Unified Communications Applications
Module 5: Cisco IM and Presence and Cloud Messaging
Module 6: Cisco IM and Presence and Jabber Customization
Module 7: Cisco IM and Presence Compliance Message Archiving
Module 8: Webex App Troubleshooting
Module 9: Cisco Unified Attendant Console
Module 10: Call Recording and MonitoringLab Outline
Discovery 1: Integrate and Set Up Cisco Unity Connection
Discovery 2: Configure Cisco Unity Connection Call Handlers
Discovery 3: Implement Toll Fraud Prevention
Discovery 4: Troubleshoot Cisco Unity Connection Call Handlers
Discovery 5: Troubleshoot Cisco Unity Connection
Discovery 6: Configure Cisco Unified Communications Manager IM and Presence High Availability
Discovery 7: Implement Cisco Jabber
Discovery 8: Configure Centralized Cisco Unified Communications Manager IM and Presence
Discovery 9: Configure Cisco Unified Communications Manager IM and Presence Service Functionality
Discovery 10: Enable Message Archiving and Chat Rooms
Discovery 11: Troubleshoot the Cisco Unified Communications IM and Presence Database Connection
Discovery 12: Integrate Cisco Unified Attendant Console Advanced
Discovery 13: Implement Call Recording and Monitoring Using a SPAN-Based Solution
Discovery 14: Implement Cisco Unified Communications Manager Call Recording and Monitoring - CLCEI — Implementing Cisco Collaboration Cloud and Edge Solutions
- Длительность: 5 дней (40 часов)
 - Код курса: CLCEI
 - Стоимость
 - Очный формат: 1 445 500 ₸
 - Онлайн формат: 1 440 000 ₸
 
Описание курса
Course Description
The Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) training provides you with an understanding of Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Topics covered also include details about the Webex solutions, and the benefits of hybrid integrations between Cisco on-premises solutions and Webex Meetings in the cloud. This training also earns you 40 Continuing Education (CE) credits towards recertification.
This training helps prepare you to take the exam:
300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)How You'll Benefit
This course will help you:
Acquire the knowledge and skills to use the tools and systems designed to facilitate team-based collaboration whether in-office or remote.
Gain hands-on experience in using Cisco Expressway software for secure, remote access for phones, endpoints, smartphones, tablets, video, and other communication devices to support nontraditional workspaces.
Prepare for the 300-820 CLCEI examWho Should Enroll
Collaboration engineers
Collaboration administratorsWhat to Expect in the Exam
The 300-820 CLCEI exam certifies your knowledge and skills related to collaboration cloud and edge solutions, expressway configurations, and Cisco WebEx Teams™ hybrid and emerging technologies.
After you pass 300-820 CLCEI, you earn the Cisco Certified Specialist - Collaboration Cloud and Edge Implementation certification, and you satisfy the concentration exam requirement for this professional-level certification:
CCNA CollaborationCourse Objectives
Describe the Cisco Expressway Core features and functionality within the collaboration architecture
Describe the Cisco Expressway Core additional features
Configure and troubleshoot Cisco Unified Communications Manager and Cisco Expressway Series integration
Configure and troubleshoot Cisco Collaboration solutions for Business-to-Business calls
Describe how to secure B2B communication with Cisco Expressway Series
Describe the Mobile and Remote Access (MRA) feature
Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity Connection and Cisco Unified Communications Manager IM and Presence Service
Describe deployment models for Cisco Webex cloud-based collaboration, management of users and sites within Webex Control Hub, and other administrative tasks
Describe Cisco Webex Hybrid ServicesCourse Prerequisites
Before taking this training, you should have the following knowledge and skills:
Understanding of networking technologies
Understanding voice and video
Knowledge of Cisco collaboration core technologies
Session Initiation Protocol (SIP) and Extensible Messaging and Presence Protocol (XMPP) signaling protocol fundamentals
Collaboration call control fundamentals of Cisco Unified Communications Manager
The following Cisco trainings can help you gain the knowledge you need to prepare for this training:
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)Course Outline
Configuring and Troubleshooting the Cisco Expressway Series
Configuring Cisco Expressway Additional Features
Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series
Configuring and Troubleshooting Cisco Collaboration Solutions for Business-to-Business
Securing Business-to-Business Communication
Configuring and Troubleshooting Mobile and Remote Access
Integrating and Securing Mobile and Remote Access
Configuring Cisco Webex Hybrid ServicesLab Outline
Discovery 1: Deploy Virtualized Cisco Expressway
Discovery 2: Perform the Initial Cisco Expressway Series Configuration
Discovery 3: Register Endpoints on Cisco Expressway Series
Discovery 4: Call Search History and Registrations
Discovery 5: Troubleshooting Tools
Discovery 6: Configure Cisco Expressway Series Bandwidth Management and Registration Restrictions
Discovery 7: Troubleshoot Cisco Expressway Series Endpoint Registration and Local Dial Plan
Discovery 8: Configure Cisco Expressway Series Security Features
Discovery 9: Configure Cisco Unified Communications Manager to Connect with Cisco Expressway-C
Discovery 10: Troubleshoot Cisco Unified Communications Manager and Cisco Expressway Series Integration
Discovery 11: Configure Cisco Unified Communications Manager and Cisco Expressway Series Integration
Discovery 12: Implement a Business-to-Business Cisco Collaboration Solution
Discovery 13: Troubleshoot Business-to-Business Calls on the Cisco Expressway Series
Discovery 14: Secure a B2B Cisco Collaboration Communication
Discovery 15: Configure MRA on the Cisco Expressway Series
Discovery 16: Troubleshoot MRA on the Cisco Expressway Series
Discovery 17: Configure MRA with Additional Application Integrations
Discovery 18: Prepare for Cisco Webex Integration - CLACCM — Implementing Cisco Advanced Call Control and Mobility Services
- Длительность: 5 дней (40 часов)
 - Код курса: CLACCM
 - Стоимость
 - Очный формат: 1 445 500 ₸
 - Онлайн формат: 1 440 000 ₸
 
Описание курса
Course Description
The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) training provides you with knowledge about advanced call control and mobility services, focusing on Cisco Unified Communications Manager features such as Globalized Call Routing, Global Dial Plan Replication, Cisco Unified Mobility, Cisco Extension Mobility, SIP URI call routing, Call Admission Control, Cisco Unified Communications Manager Express and SRST gateway technologies, Cisco Unified Border Element Call deployments, signaling and media protocols, and features such as call coverage and time of day routing.
This training prepares you for the 300-815 CLACCM exam. If passed, you earn the Cisco Collaboration Specialist – Collaboration Call Control and Mobility Implementation certification and you satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Collaboration certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the skills to deploy advanced call control and mobility services in Cisco Unified Communications Manager, CME and SRST, Cisco Unified Communications Manager Express and advanced SRST gateway technologies, and Cisco Unified Border Element.
Earn 40 CE credits toward recertification.Who Should Enroll
Collaboration Engineers
Collaboration AdministratorsWhat to Expect in the Exam
300-815 CLACCM: Implementing Cisco Advanced Call Control and Mobility Services is a 90-minute exam associated with the Cisco Collaboration Specialist – Collaboration Call Control and Mobility Implementation certification and satisfies the concentration exam requirement for the CCNP Collaboration certification.
The multiple-choice format tests your knowledge of advanced call control and mobility services, including:
Signaling and media protocols
CME/SRST gateway technologies
Cisco Unified Border Element
Call control and dial planning
Cisco Unified CM Call Control
MobilityCourse Objectives
Analyze and troubleshoot SIP and media protocol
Understand call recording options and implement time-of-day routing, call park, call pickup, and Meet-Me conferences in Cisco Unified Communications Manager
Describe call recording options in Cisco Unified Communications Manager
Describe how to implement call coverage in Cisco Unified Communications Manager
Describe how to configure and troubleshoot Cisco Unified Communications Manager Extension Mobility
Describe how to configure and troubleshoot Cisco Unified Communications Manager Unified Mobility
Describe how to implement Cisco Unified Communications Manager Express for SIP phones
Describe how to implement globalized call routing within and between Cisco Unified Communications Manager clusters
Describe how to implement advanced and enhanced SRST in Cisco Unified Communications Manager and Cisco IOS gateways
Describe how to implement CAC and AAR in Cisco Unified Communications Manager
Describe how to implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters
Describe how to troubleshoot multisite Cisco Unified Communications Manager deployments
Describe how to implement ILS between Cisco Unified Communications Manager clusters and enable GDPR
Configure and troubleshoot Cisco Unified Border ElementCourse Prerequisites
The knowledge and skills you are expected to have before attending this course can be found in the following Cisco Learning Offerings:
Understanding Cisco Collaboration Foundations (CLFNDU v1.0)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR v1.2)Course Outline
Signaling and Media Protocols
Cisco Unified Communications Manager Supplemental Services
Call Coverage in Cisco Unified Communications Manager
Cisco Unified Communications Manager Extension Mobility
Cisco Unified Communications Manager Unified Mobility
Cisco Unified Communications Manager Express
Globalized Call Routing
Advanced Remote Site Survivability
Call Admission Control in Cisco Unified Communications Manager
URI Calling in Cisco Unified Communications Manager
Multisite Cisco Unified Communications Manager Deployments
Global Dial Plan Replication
Cisco Unified Border ElementLab Outline
Analyze SIP, H.323, and Media Protocols
Troubleshoot SIP and Media Protocols
Implement Cisco Unified Communications Manager Supplemental Services
Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager
Configure Cisco Unified Communications Manager Extension Mobility
Troubleshoot Cisco Unified Communications Manager Extension Mobility
Configure Cisco Unified Mobility
Troubleshoot Cisco Unified Mobility
Implement Endpoints in Cisco Unified Communications Manager Express
Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express
Implement Calling Privileges in Cisco Unified Communications Manager Express
Implement Globalized Call Routing
Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment
Implement Advanced Survivable Remote Site Telephony
Implement CAC
Implement a URI-Based Dial Plan for Multisite Deployments
Troubleshoot Globalized Call Routing
Troubleshoot Call Admission Control
Implement Global Dial Plan Replication
Implement Cisco Unified Border Element
Troubleshoot Cisco Unified Border Element - CLFNDU — Understanding Cisco Collaboration Foundations
- Длительность: 5 дней (40 часов)
 - Код курса: CLFNDU
 - Стоимость
 - Очный формат: 1 445 500 ₸
 - Онлайн формат: 1 440 000 ₸
 
Описание курса
Course Description
The Understanding Cisco Collaboration Foundations (CLFNDU) training gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (UCM) solution with Session Initiation Protocol (SIP) gateway. The training covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities.
This training does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several Cisco Certified Network Professional (CCNP) and other professional-level collaboration trainings and exams. This training also earns you 21 Continuing Education (CE) credits toward recertification
How You'll Benefit
This training will help you:
Administer a single-site Cisco Unified Communications Manager, handling daily tasks such as add, moves, changes and deletions of phones, video endpoints, and users
Configure Jabber devices and implement common endpoint features including call park, shared lines, pickup groups, and phone button templates
Introduce you to the SIP protocol, how calls are connected, and how media codes are determined
Introduce you to the capabilities and basic configuration of an SIP gateway for PSTN access
Introduce you to the dial plan elements used to route calls, and the class-of-service capabilities to control who can route calls where
Administer Cisco Unity Connection handling daily tasks such as add, moves, and changes and deletions of voicemail boxes and users
Administer maintenance tasks and use the troubleshooting tools available on Cisco Unified Communications Manager and Cisco Real-time Monitoring Tool
Earn 21 CE credits toward recertificationWho Should Enroll
Students preparing to take the CCNP Collaboration certification
Network Administrators
Network Engineers
Systems EngineersCourse Objectives
Describe benefits of using Cisco collaboration solution, collaboration deployment models, and components of collaboration solution in on-premises, cloud, and hybrid deployments
Explore different codecs used in voice and video calls and explain how SIP signaling is used to set up and teardown calls
Identify Cisco Unified Communications Manager User Types and use Active Directory to manage Users in Cisco Unified Communications Manager
Identify the appropriate Cisco Unified IP Phone software solution for registration, recognize different Cisco Unified IP Phone models and their supported software, and identify various models of Webex video endpoints
Provide an understanding of Cisco Unified Communications Manager, including its deployment models, cluster architecture, network requirements, collaboration services, administration tools, and redundancy strategies to design, implement, and maintain robust collaboration networks
Examine the lifecycle of Cisco collaboration endpoints
Understand the dial plans and call routing in Cisco Unified Communications Manager including the key components, digit manipulation techniques, translation patterns, and practical skills to create and configure a basic dial plan
Configure a class of service elements in the Cisco Unified Communications Manager
Provide an overview of the reporting and maintenance tools available for managing and monitoring Cisco Unified Communications systems
Analyze media resources within Cisco Unified Communications systems, including conferencing solutions, transcoders, media termination points, and music on hold, to optimize their configuration and usage
Describe the differences between a rendezvous, Meet-Me and ad hoc conference, describe how to create a SIP Trunk for Cisco Meeting Server in Cisco Unified Communications Manager, and how to set up media resources to support ad hoc and Meet-Me conferences
Analyze the deployment, integration, and use cases of Cisco Instant Messaging and Presence Service alongside Cisco Unified Communications Manager to optimize communication through scalable, redundant, and secure solutions
Evaluate the features, deployment options, and integration of Cisco Jabber with Cisco Unified Communications Manager to optimize communication workflows, enhance team collaboration, and provide a smooth transition to modern communication solutions
Analyze Cisco Unity Connection components, architecture, and call handlers, focusing on the system’s deployment, configuration, and user management to optimize communication workflows and enhance user experience
Describe the Cisco Edge Services Components
Analyze the architecture and configuration of Cisco Expressway Zones, as well as the role of Search Rules, security certificates, and encryption strategies to enable efficient and secure voice, video, and collaboration services between internal and external networks
Analyze the architecture and configuration of Cisco Unified Border Element, including its key features for signaling and media interworking, security demarcation, toll-fraud prevention, and call admission control to enable secure, cost-effective voice and video connectivity across disparate VoIP networks
Describe how to access the Control Hub and navigate the menus to setup a Webex collaboration solution
Introduce User administration in Control Hub
Explore the registration process to Control Hub
Examine Webex Calling options using the Control Hub
Explore admin-configurable features and user configurable features in Webex calling
Describe Reporting and Maintenance
Provide a technical understanding of Cisco Webex cloud and hybrid media resources, including voicemail management, Edge Audio, and Video Mesh
Describe Cisco Webex Hybrid Cloud Connected Unified Communications
Describe Webex Hybrid ServicesCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Internet web browser usability knowledge and general computer usage
Knowledge of Cisco Internetwork Operating System (Cisco IOS®) command lineCourse Outline
Collaboration Technology and Benefits
Codecs and Call Signaling
User Management in Cisco Unified Communications Manager
Endpoints and Phones
Initial Parameters Administration for Cisco Unified Communications Manager
Registration Process to Cisco Unified Communications Manager
Basic Dial Plan
Class of Service
Reporting and Maintenance
Media Resources
Cisco Meeting Server Integration with Cisco Unified Communications Manager
Cisco Instant Messaging and Presence Service
Soft Client Registration to Cisco Unified Communication Manager
Cisco Unity Connection
Edge Services
Cisco Expressway Series
Cisco Unified Border Element
Control Hub
User Management in Control Hub
Registration Process to Control Hub
Webex Calling Options
Webex Calling Features
Cloud Management and Troubleshooting
Cloud and Hybrid Media Resources
Cisco Webex Hybrid Cloud Connected Unified Communications
Cisco Webex Hybrid ServicesLab Outline
Create a Local User Account and Configure LDAP
Configure Cisco Unified Communication Manager Initial Parameters
Configure Cisco Unified Communications Manager Core System Settings
Deploy an IP Phone Through Manual Registration
Create a Basic Dial Plan
Explore Partitions and CSSs
Use Reporting and Maintenance Tools
Register Cisco Meeting Server to Cisco Unified Communications Manager
Register Cisco Jabber Client to Cisco Unified Communications Manager
Configure the Integration Between Cisco Unity Connection and Cisco Unified Communications Manager
Manage Cisco Unity Connection Users
Explore the Configuration of Traversal Zones in Cisco Expressway
Explore the Cisco Unified Border Element Interoperability between VoIP Networks
Explore the Configuration of Webex Control Hub
Add Users to Webex Control Hub
Configure Webex Calling Using Cisco Calling Plans
Configure Webex Calling Features in Control Hub - CLCNF — Implementing Cisco Collaboration Conferencing
- Длительность: 5 дней (40 часов)
 - Код курса: CLCNF
 - Стоимость
 - Очный формат: 1 445 500 ₸
 - Онлайн формат: 1 440 000 ₸
 
Описание курса
ourse Description
The Implementing Cisco Collaboration Conferencing (CLCNF) v1. course focuses on Cisco® on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.
This course offers lessons and hands-on labs to prepare you for the 300-825 Implementing Cisco Collaboration Conferencing (CLCNF) exam.
How You'll Benefit
This class will help you:
Learn how to configure and troubleshoot on-premises conferencing solutions with Cisco Meeting Server.
Integrate on-premises conferencing solutions with other collaboration components to meet the needs of modern-day workplaces.Who Should Enroll
Deployment engineer
Network engineer
Sales engineerWhat to Expect in the Exam
This course will help you:
Learn how to configure and troubleshoot on-premises conferencing solutions with Cisco Meeting Server.
Integrate on-premises conferencing solutions with other collaboration components to meet the needs of modern-day workplaces.Course Objectives
After taking this course, you should be able to:
Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing
Describe the physical deployment options and deployment models for Cisco Meeting Server, including Cisco Meeting Server 1000, 2000, and virtual machine
Configure a Cisco Meeting Server single combined deployment for Web-Real Time Communications (WebRTC) endpoints within the enterprise
Use APIs and the Cisco Meeting Server API Guide to configure profiles using Postman and the Webadmin API tool
Configure a scalable and resilient deployment of Cisco Meeting Server with three servers for WebRTC endpoints within the enterprise
Configure a scalable and resilient deployment of Cisco Meeting Server to support standard Session Initiation Protocol (SIP) and WebRTC connectivity outside the enterprise
Configure a scalable and resilient deployment of Cisco Meeting Server to support recording and streaming of conferences
Configure Cisco Unified Communications Manager and Cisco Meeting Server to support Rendezvous, Scheduled, and Ad-hoc conferencing for Cisco Unified CM registered endpoints
Configure Cisco Meeting Server to integrate with a preconfigured on-premise Microsoft Skype for Business installation
Install Cisco TelePresence Management Suite (Cisco TMS) and Cisco TelePresence Management Suite for Microsoft Exchange (Cisco TMSXE) on a single Microsoft Windows 2012 server and connect to an existing SQL environment
Install and integrate Cisco Meeting Management with Cisco TMS and Cisco Meeting Server
Set up and manage a scheduled conference with Cisco TMS and Cisco Meeting Management
Capture and analyze logs from Cisco Meeting Server and Cisco Meeting Manager to diagnose faults, including a SIP connection errorCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
PC skills
Addition and management of devices and users in Cisco Unified CM
SIP signaling fundamentals
Video endpoint operation and configuration
Management of media resources in Cisco Unified CM
Familiarity with Cisco Expressway ideal but not required
Familiarity with APIs ideal but not required
Recommended Cisco offerings that may help you meet these prerequisites:
Cisco Collaboration Fundamentals (CLFNDU)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)Course Outline
Describing Cisco Conferencing Architecture
Configuring a Single Combined Deployment
Installing Cisco Meeting Server
Using APIs with Cisco Meeting Server
Configuring a Cisco Meeting Server Scalable and Resilient Deployment
Configuring Business to Business (B2B) and WebRTC Firewall Traversal Connectivity for Cisco Meeting Server
Configuring Recording and Streaming with Cisco Meeting Server
Troubleshooting Cisco Meeting Server
Integrating Cisco Meeting Server with Cisco Unified CM
Integrating Cisco Meeting Server with Microsoft Skype for Business
Installing and Operating Cisco TMS and Cisco TMSXE
Installing and Integrating Cisco Meeting ManagementLab Outline
Cisco Meeting Server Initial Configuration
Cisco Meeting Server Single Combined Deployment
Install a Cisco Meeting Server Virtual Machine
Using Postman with Cisco Meeting Server
Using Cisco Meeting Server Webadmin API Tool
Cluster Cisco Meeting Server Databases
Cluster Cisco Meeting Server Call Bridges
Configure Cisco Meeting Server Distributed Spaces and Active Directory
Configure Cisco Meeting Server Scalable and Resilient Web Bridges
Configure External WebRTC Connectivity for Cisco Meeting Server
Configure External B2B Connectivity for Cisco Meeting Server
Configure Cisco Meeting Server Recording
Capturing Log Files in Cisco Meeting Server
Troubleshoot Cisco Meeting Server
Configure Cisco Meeting Server Integration with Cisco Unified CM Using a SIP Trunk
Configure Cisco Meeting Server Integration with Cisco Unified CM as a Conference Resource
Install, Upgrade, and Maintain Cisco TMS and TMSXE
Configure Cisco TMS for Scheduled Conferences
Manage Endpoints in Cisco TMS Part 1
Manage Endpoints in Cisco TMS Part 2
Cisco Meeting Management Initial Installation
Integrate Cisco Meeting Management
Manage Conferences in Cisco TMS and Cisco Meeting Management
Specific Lab Issues - CCER — Reporting Cisco Contact Center Enterprise
- Длительность: 2 дня (16 часов)
 - Код курса: CCER
 - Стоимость
 - Очный формат: 1 091 000 ₸
 - Онлайн формат: 1 082 000 ₸
 
Описание курса
Course Description
The Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. The course explains the nuances of analyzing and troubleshooting in various deployment scenarios: Designed Tier 2/Day 2 Support. The Cisco® Contact Center Enterprise (CCE) solution helps businesses deliver a connected digital experience, enabling you to provide contextual, continuous, and capability-rich journeys for your customers, across time and channels. The course teaches you the business application of the CCE solution providing the framework of interrelationship between both core and optional components required to configure the CCE solution.
How You'll Benefit
This course will help you:
Consolidate disparate data into manageable, comprehensive reports
Understand the business application of the CCE solution and how it provides a framework of correlation between core and optional componentsWho Should Enroll
Administrators
Business liaisons
Deployment engineers
Managers overseeing CCE deploymentsCourse Objectives
After taking this course, you should be able to:
Explain the Cisco Unified Intelligence Center including the benefits and features of the system and describe the high-level architecture of Cisco Unified Intelligence Center in the UCCE environment
Understand the Cisco Unified Intelligence Center administration console to perform Cisco Unified Intelligence Center administrative, maintenance and provisioning functions
Discuss the functional attributes of the Cisco Unified Intelligence Center
Customize Cisco Unified Intelligence Center Reports and ViewsCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of computer networking components: Windows Active Directory (AD) SQL Server and components (servers, routers, switch) is helpful but not required
Understanding of Cisco Packaged Contact Center Enterprise components and call flows
Experience administering Cisco Packaged Contact Center Enterprise
Recommended Cisco offerings that may help you meet these prerequisites:
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Administering Cisco Contact Center Enterprise (CCEA)
Cisco Certified Network Associate (CCNA®)
Understanding Cisco Foundation Collaborations (CLFNDU)Course Outline
Cisco Unified Intelligence Center Foundations
Cisco Unified Intelligence Center - Basics
Cisco Unified Intelligence Center - Deployment Models
Cisco Unified Intelligence Center Administration and Operations Console
Operations Console (OAMP) Console Introduction
Admin User Management
Cisco Unified Intelligence Center Attributes
Stock Reporting
Dashboard Features
Cisco Unified Intelligence Center Custom Reports and Views
Creating Views
Building Report DefinitionsLab outline
Exploring Cisco Unified Intelligence Center (CUIC) OAMP
Working with Stock Reports
Working with Dashboards
Value Lists and Collections
Exploring Supervisor Defaults
Using Groups
Editing Report Views Pt 1 of 2
Editing Report Views Pt 2 of 2
Report Definitions and Drilldowns
Create Custom Route Call Detail (RCD) Report Definition (Database Query) and Report
Value Lists and DrilldownsLab Outline
Exploring Cisco Unified Intelligence Center (CUIC) OAMP
Working with Stock Reports
Working with Dashboards
Value Lists and Collections
Exploring Supervisor Defaults
Using Groups
Editing Report Views Pt 1 of 2
Editing Report Views Pt 2 of 2
Report Definitions and Drilldowns
Create Custom Route Call Detail (RCD) Report Definition (Database Query) and Report
Value Lists and Drilldowns - CCEF — Understanding Cisco Contact Center Enterprise Foundations
- Длительность: 1 день (8 часов)
 - Код курса: CCEF
 - Стоимость
 - Очный формат: 949 500 ₸
 - Онлайн формат: 943 500 ₸
 
Описание курса
Course Description
The Understanding Cisco Contact Center Enterprise Foundations (CCEF) v1.0 course gives you an overview of the Cisco® Packaged Contact Center Enterprise (PCCE) and Unified Contact Center Enterprise solutions. You will gain an understanding of contact center basics and describe the available Cisco contact center solutions and intended target customers. You will also focus on the Cisco Contact Center Enterprise (CCE) family of products and explore key features and functionality of the solution including architecture, major system components, and tools used for administration and reporting. This course is the foundation for additional courses required to deploy, configure, support, and troubleshoot Cisco CCE solutions.
How You'll Benefit
This class will help you:
Learn how to manage timely, disparate data using CCER as a reporting solution
Apply the CCE as a business solution to deploy, troubleshoot, and tailor application usage to support business processes.
Understand the foundational components of Contact Center Enterprise solutionsWho Should Enroll
Account and project managers
Business liaisons
Deployment engineers
Managers overseeing CCE deployments
Technical salesCourse Objectives
After taking this course, you should be able to:
Provide a high-level overview of the Cisco Contact Center portfolio
List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions
Describe how calls flow through PCCE using appropriate terms and naming conventions
Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment
Identify advanced features available within the PCCE solutionCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
Working knowledge of Unified Communications Manager and Voice Gateways
Basic understanding of IP networksRecommended Cisco offerings that may help you meet these prerequisites:
CCNA
Understanding Cisco Foundation Collaborations (CLFNDU)Course Outline
Introduction to CCE
Cisco Contact Center Basics
Cisco Contact Center Fundamentals
Functionality of PCCE Components
Public Switched Telephone Network (PSTN) and Voice Gateways
Cisco Unified Border Element (CUBE)
Terms and Naming Conventions Used in CCE
CCE Access Environment
CCE Routing Configuration
Access Tools Available in CCE
Single Pane of Glass (SPOG)
Cisco Intelligent Contact Management (ICM) Configuration Manager
Discovering CCE Features Beyond Default
Agent Management
Agent Efficiency
Lab outline
This class does not have any labs. - CCEA — Administering Cisco Contact Center Enterprise
- Длительность: 4 дня (32 часа)
 - Код курса: CCEA
 - Стоимость
 - Очный формат: 1 362 000 ₸
 - Онлайн формат: 1 353 000 ₸
 
Описание курса
Course Description
The Administering Cisco Contact Center Enterprise (CCEA) v1.0 course teaches you the contextual information around call flow between components in the Cisco® Unified Contact Center Enterprise (UCCE) solution including intelligent contact routing, call treatment, network-to-desktop Computer Telephony Integration (CTI), and multichannel contact management over an IP infrastructure. You receive hands-on practice using administrative tools to perform routine adds, moves, and changes in an inbound contact center environment.
How You'll Benefit
This class will help you:
Leverage the Cisco Unified Contact Center Enterprise (UCCE) for a smooth integration of inbound and outbound voice applications to support multiple communication channels.
Manage a multichannel contact functionality with IP telephony as a unified solution to rapidly deploy within a distributed contact center infrastructure.Who Should Enroll
Account and project managers
Contact Center Enterprise (CCE) administrators
Deployment engineers
Technical salesCourse Objectives
After taking this course, you should be able to:
Navigate CCE configuration and scripting tools
Configure a dialed number, call type, and media routing domain
Build a basic Cisco Intelligent Contact Management (ICM) script
Configure agents and skill groups
Configure basic Interactive Voice Response (IVR) functionality
Implement attributes and precision queues
Configure Ring-No-Answer (RONA) using CCE configuration tools
Configure and populate an agent team and primary supervisor
Improve agent efficiency through finesse enhancements
Build and test a basic Voice XML (VXML) application
Implement roles, departments, and business hours
Run Cisco Unified Intelligence Center (CUIC) reports using the Reporting toolCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
Working knowledge of Unified Communications Manager and voice gateways
Basic understanding of Cisco Unified Contact Center Enterprise architecture and operationRecommended Cisco offerings that may help you meet these prerequisites:
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Understanding Cisco Collaboration Foundations (CLFNDU)Course Outline
Cisco Unified Contact Center Review
Contact Center Basics
Components and ArchitectureDeploying Basic Call Settings
Associate Basic Call Settings
Explore Media Routing DomainsBuilding a Basic Cisco Unified Contact Center Enterprise Script
Introduce Script Editor
Use Script Editor NodesConfiguring Basic Agent Functionality
Introduce Agent Functionality
Configure Agent Desk SettingsConfiguring Basic Call Treatment and Queuing
Explore Media Server and Files
Introduce MicroappsImplementing Precision Routing
Introduce Precision Routing Basics
Examine the Migration PathConfiguring RONA Support
Introduce RONA Functionality
Identify RONA Timeout ConsiderationsConfiguring Agent Teams and Supervisors
Configuring Teams and Supervisors
Explore Agent RolesAdministering the Cisco Finesse Desktop
Administering Cisco Finesse Desktop
Introduce Cisco Finesse AdministrationImplementing Voice XML Applications
Introduce VXML
Build a Basic Call Studio ProjectConfiguring Roles, Departments, and Business Hours
Examine Post-Call Survey Functionality
Configure Post-Call SurveyRunning Unified CC Enterprise Reports with Unified Intelligence Center (IC)
Configure Unified CC Enterprise Administrators
Configure DepartmentsLab Exercises
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Administering ICM Dialed Numbers and Call Types
Prepare a Basic Label Script
Using ICM Tools for ICM Scripts
Configure ICM for Basic Agent and Skill Group Functionality
Configure UCM for Agent Functionality
Test Basic Skill Group Functionality in an ICM Script
Examine Media Files and Variables in ICM Scripts
Build Basic ICM Scripts with MicroApps
Configure and Implement Precision Routing
Configure RONA
Configure Agent Teams and Supervisors
Cisco Finesse Administration
Configure VXML Server and Install Call Studio
Create and Deploy a Call Studio Project
Integrate VXML Applications with a Unified CC Enterprise Script
Configuring Roles, Departments, and Business Hours
Run Unified IC Stock ReportsLab Outline
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Administering ICM Dialed Numbers and Call Types
Prepare a Basic Label Script
Using ICM Tools for ICM Scripts
Configure ICM for Basic Agent and Skill Group Functionality
Configure UCM for Agent Functionality
Test Basic Skill Group Functionality in an ICM Script
Examine Media Files and Variables in ICM Scripts
Build Basic ICM Scripts with MicroApps
Configure and Implement Precision Routing
Configure RONA
Configure Agent Teams and Supervisors
Cisco Finesse Administration
Configure VXML Server and Install Call Studio
Create and Deploy a Call Studio Project
Integrate VXML Applications with a Unified CC Enterprise Script
Configuring Roles, Departments, and Business Hours
Run Unified IC Stock Reports - CCEAA — Administering Advanced Cisco Contact Center Enterprise
- Длительность: 3 дня (24 часа)
 - Код курса: CCEAA
 - Стоимость
 - Очный формат: 1 264 000 ₸
 - Онлайн формат: 1 258 500 ₸
 
Описание курса
Course Description
The Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco® Contact Center Enterprise (CCE) solution through an in-depth examination of technical and operational requirements, and of the tools used to configure and ensure CCE solution functionality.
This class will help you:
Learn how to optimize management of CCE solutions for proactive management of contact centers tasks
Manage the effects of using CCE solutions for scalability and interaction between the solution components for centralized application managementAfter taking this course, you should be able to:
Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities.
Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration.
Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop.
Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new.
Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop.
Successfully deploy Mobile Agent in a CCE Environment.
Successfully deploy Post Call Survey in a CCE Environment.How You'll Benefit
This class will help you:
Learn how to optimize management of CCE solutions for proactive management of contact centers tasks
Manage the effects of using CCE solutions for scalability and interaction between the solution components for centralized application managementWho Should Enroll
Deployment engineer
Sales engineerCourse Objectives
After taking this course, you should be able to:
Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities.
Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration.
Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop.
Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new.
Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop.
Successfully deploy Mobile Agent in a CCE Environment.
Successfully deploy Post Call Survey in a CCE Environment.Course Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required.
Working knowledge of Unified Communications Manager and voice gateways
Basic understanding of Cisco Unified Contact Center Enterprise architecture and operationRecommended Cisco offerings that may help you meet these prerequisites:
Administering Cisco Contact Center Enterprise (CCEA)
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Understanding Cisco Collaboration Foundations (CLFNDU)Course Outline
PCCE Review
Review PCCE Architecture and Components
Review PCCE ProtocolsIntroducing Bulk Import Tools
Use the PCCE Bulk Import Tool
Use Bulk Import TemplatesConfiguring Advanced Scripting and CCE Data Exchange
Design for Advanced Scripting
CCE Data ExchangeCisco Unified Communications Manager Initiated Call Flows
Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models
Describe Subsequent TransfersUsing Gadgets to Customize the Finesse Desktop
Obtain Finesse Custom Gadgets
Deploy Finesse Custom GadgetsImplementing Mobile Agent
Examine Mobile Agent Functionality
Identify Mobile Agent Architecture and ComponentsImplementing Post Call Survey
Examine Post Call Survey Functionality
Configure Post Call SurveyLab Practice
Review Discovery
Navigate CCE Discovery Architecture and Components
Import Bulk Data
Create a VXML Application Using Call Studio
Configure Precision Queues
Create a CCE Routing Script
Customize the Finesse Desktop
Test Your Call Flow
Configure Cisco Unified Communications Manager (CUCM) as Routing Client and Agent Transfers
Deploy Cisco Finesse Gadgets
Implement Mobile AgentLab Outline
Review Discovery
Navigate CCE Discovery Architecture and Components
Import Bulk Data
Create a VXML Application Using Call Studio
Configure Precision Queues
Create a CCE Routing Script
Customize the Finesse Desktop
Test Your Call Flow
Configure Cisco Unified Communications Manager (CUCM) as Routing Client and Agent Transfers
Deploy Cisco Finesse Gadgets
Implement Mobile Agent - CCEI — Implementing Cisco Contact Center Enterprise
- Длительность: 3 дня (24 часа)
 - Код курса: CCEI
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 918 000 ₸
 
Описание курса
Course Description
The Implementing Cisco Contact Center Enterprise (CCEI) v1.0 course teaches you how to build and implement a Cisco® Packaged Contact Center Enterprise (PCCE) solution, including advanced integration of external data, Single Sign-On (SSO), and process detail for the Contact Center Enterprise (CCE) solution with examples of the various deployment models. This integration process enables businesses and organizations to deliver a connected digital experience of continuous and capability-rich journeys for your customers, across time and channels. This course teaches you to install the CCE solution and provide Tier 2–3 solution support. The focus is on Day 1 support for a new CCE deployment.
How You'll Benefit
This class will help you:
Learn how to optimize management of CCE solutions for smooth, connected, and efficient digital experiences across multiple channels
Manage the effects of using CCE solutions for scalability, flexibility, and growth to support larger contact center enterprisesWho Should Enroll
Deployment engineer
Sales engineerCourse Objectives
After taking this course, you should be able to:
Examine components, protocols, and variables that influence selection of the design and sizing of a PCCE deployment
Identify concepts necessary to create CCE system design specifications and deployment plans
Configure an advanced VXML application implementing DB lookup functionality and digit collection; use Call Studio and CCE Scripting tools to present call data collected from the caller to the gent desktop
Discover how to install CCE software
Administer CA signed security certificates to support the successful addition of a PCCE site
Identify the tasks associated with adding Remote Site functionality to the PCCE environment
Discuss integration of the CUIC, LiveData, and Finesse reporting environments
Configure the PCCE Dial Plan end-to-end, incorporating the use of Cisco Unified Border Element (CUBE), Cisco Unified SIP Proxy (CUSP), Cisco Virtualized Voice Browsers (VVBs), Voice XML (VXML) Gateways (GW), and Significant Digits
Examine concepts necessary to create CCE system design specifications and deployment plans
Create a series of routing scripts using PCCE
Configure Single sign-on for Unified CCECourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Advanced knowledge of computer networking components: Windows A/D, SQL Server, and components
Understanding of IP networks
Strong understanding of Cisco Packaged Contact Center Enterprise functionality
Advanced experience administering of Cisco Packaged Contact Center Enterprise
Working knowledge of Unified Communications Manager and Voice GatewaysRecommended Cisco offerings that may help you meet these prerequisites:
Administering Cisco Contact Center Enterprise (CCEA)
Administering Advanced Cisco Contact Center Enterprise (CCEAA)
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Administering Cisco Solutions (CCNA®)Course Outline
Planning a Cisco Packaged Contact Center Enterprise Deployment
Packaged CCE Component Overview
Call Flows ReviewStaging a Packaged CCE Deployment
PCCE Deployment Planning and System Design Specification
Software Compatibility and OS RequirementsPreparing CCE Software for Installation
General Considerations and System Requirements
Active Directory ConsiderationsAdministering Security Certificates
Security Certificate Overview
Install and Configure Certificate AuthorityIntroducing the Packaged CCE Integration Wizard
PCCE Inventory and Service Accounts
Run the PCCE Wizard Adding a Site to Packaged CCEAdding a Site to Packaged CCE
PCCE Remote Site Overview
Remote Site Security Certificate ConsiderationsIntegrating Cisco Unified Intelligence Center, LiveData, and Finesse
Compare Real Time vs. Live Data
Complete Cisco Unified Intelligence Center IntegrationPersonalizing the Packaged CCE Dial Plan
CCE Dial Plan Components
Ingress Gateway and Cisco Unified Border Element Dial Plans Configuring to Validate DeploymentConfiguring to Validate Deployment
Confirm Configuration Readiness
Cisco Unified Communications Manager AdministrationScripting for Packaged Contact Center Enterprise
Configure Script Editor
Use MicroappsConfiguring Single Sign-On
SSO Overview
Configure SSO PrerequisitesLab Practice
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Observe Installed CCE Software
Navigate Certificate Store
Add a Remote Site to PCCE
Personalize Finesse Server
Configure Site Dial Plan
Verify Configuration Details for Final Testing
Build a Series of Test Scripts
Enable Single Sign-OnLab Outline
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Observe Installed CCE Software
Navigate Certificate Store
Add a Remote Site to PCCE
Personalize Finesse Server
Configure Site Dial Plan
Verify Configuration Details for Final Testing
Build a Series of Test Scripts
Enable Single Sign-On - CCET — Cisco Contact Center Enterprise
- Длительность: 2 дня (16 часов)
 - Код курса: CCET
 - Стоимость
 - Очный формат: 1 106 000 ₸
 - Онлайн формат: 1 097 000 ₸
 
Описание курса
Course Description
The Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco® PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues.
How You'll Benefit
This class will help you:
Learn the troubleshooting techniques to maximize the benefits the prepackaged deployment model PCCE
Anticipate and rectify possible deployment issues by learning the tools and processes that provide solutions for deployment issuesWho Should Enroll
Account manager
Deployment engineer
Deployment project manager
Sales engineerCourse Objectives
After taking this course, you should be able to:
Describe CCE flows and processes required to support and troubleshoot the PCCE deployment
Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment
Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE DeploymentCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Strong knowledge of computer networking components: Windows A/D, SQL Server, and components (servers, routers, switches)
Strong understanding of IP networks
Advanced experience administering of Cisco Packaged Contact Center Enterprise
Experience deploying Cisco Packaged Contact Center Enterprise
Experience administering and troubleshooting Cisco Unified Communications Manager and Voice GatewaysRecommended Cisco offerings that may help you meet these prerequisites:
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Administering Cisco Solutions (CCNA®)
Administering Cisco Contact Center Enterprise (CCEA)
Administering Advanced Cisco Contact Center Enterprise (CCEAA)
Implementing Cisco Contact Center Enterprise (CCEI)Course Outline
CCE Flows and Process Review
Troubleshooting and Support Methodology
PCCE Components
PCCE Call Flow Review
CCE Diagnostic Tools
Diagnostic Framework Suite
Run Analysis Manager
Run Unified System Command-Line Interface (CLI)
Troubleshooting CCE
Troubleshooting Certificates
Troubleshooting Cisco Finesse
Troubleshooting a PCCE DeploymentLab Exercises
Configure Access to Discovery Environment
Explore CCE Components
Explore Diagnostic Framework Suite
Analyze Peripheral Gateway (PG) Logs
Navigate Certificate Store
View Cisco Finesse LogsLab Outline
Configure Access to Discovery Environment
Explore CCE Components
Explore Diagnostic Framework Suite
Analyze Peripheral Gateway (PG) Logs
Navigate Certificate Store
View Cisco Finesse Logs - CVPS — Scripting for Comprehensive Model
- Длительность: 5 дней (40 часов)
 - Код курса: CVPS
 - Стоимость
 - Очный формат: 1 638 500 ₸
 - Онлайн формат: 1 611 500 ₸
 
Описание курса
Lesson 1. What is CVP? CVP Solution Overview
CVP Overview
CVP Components
CVP Comprehensive Model Call Flow (with ICM)Lesson 2. Making VXML projects with Cisco Unified Call Studio
Call Studio Overview
VXML Project Properties
Importing / Exporting VXML Projects
Call Studio Basics
Deploying Call Studio Projects on CVP VXML ServerLesson 3. Troubleshooting, Administration and Logs
General troubleshooting tips
Using logs for Studio applications troubleshooting
Using the Studio Debugger to test applications within Studio
Using Studio Documenter to print Visio-like diagrams of the applicationLesson 4. Using Call Studio Native Elements
Element Properties Overview
VoiceXML Properties
Understanding Variables
Audio Element
Digit / Digit with Confirm, Number / Number with Confirm Elements
Form Element
Menu Elements
Flag Element
Decision Element
Action Element
Counter Element
CVP Subdialog Return Element
Sending data from/to ICMLesson 5. Using Customized Call Studio Elements
*.java to *.jar Conversion via Call Studio
Installing *.jar Files at Call Studio and CVP VXML ServerLesson 6. Integration with MS SQL Database
JNDI Configuration
Database Lookup Element
Processing Multiple MS SQL Queries
Using of Built-in Functions at the ICM
Working with multiple pages at Call Studio. Connectors
Hotlinks & HoteventsLesson 7. Post Call Survey at UCCE
Enabling Post Call Survey at ICM
Configuring CVP Dialed Patterns
ICM and CVP Call Studio Sample Scripts for Post Call Survey
Record Element
Email Element
Math ElementLesson 8. Subflows, Subdialogs, Multi-language Call Studio Application and Transfer to Another VXML Application
Using Subflows in Call Studio projects
Subdialog Invoke
Creating a Multilanguage Call Studio Application
Transfer control from one application to another via Application TransferLesson 9. Courtesy Callback
Courtesy Callback basics
Courtesy Callback call flow
Courtesy Callback configuration
Sample Courtesy Callback enabled ICM scriptLesson 10. Super Lab
Creating a Customer Support Call Studio project.
 - CLWXCALL — The Essentials of Webex Calling
- Длительность: 3 дня (24 часа)
 - Код курса: CLWXCALL
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 705 500 ₸
 
Описание курса
Course Description
The Essentials of Webex Calling (CLWXCALL) training is designed to guide you through a complete Webex Calling setup, from the initial installation of Webex Control Hub and adding users to configuring Webex Calling features through an existing on-premises Cisco Unified Communications Manager (CUCM) and Cisco Unified Border Element (CUBE) public switch telephone network (PSTN) setup. This training also earns you 18 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain an understanding of the Webex solutions, including Webex Meetings, Webex Messaging, and Webex Calling
Learn how to configure and manage the features of the Webex Control Hub
Earn 18 CE credits towards recertificationWho Should Enroll
Collaboration Engineers
Collaboration AdministratorsCourse Objectives
Introduce the components that make up the Webex solution, including Webex Meetings, Webex Messaging, and Webex Calling
Introduce the components that make up Webex Calling Control Hub, including analytics, troubleshooting, and reporting
Introduce the Management feature of Webex Control Hub, including how to set it up for a business
Introduce the Services section of the Webex Control Hub, including the Webex Services, Cloud-Connected Unified Communications Services, and Hybrid Services
Identify the methods available to add users to the Webex Control Hub
Explain Cisco IP Phone software registration with Webex Control Hub, eligible devices, and provisioning methods
Explain how an administrator can configure calling features from the Webex Control Hub that will affect the organization
Understand how users or administrators can configure calling features either from the Webex Control Hub or from their personal user portal
Introduce the three different methods available to bring PSTN calling capabilities into the Webex calling solution
Identify the different types of Cisco routers, as well as third-party routers, that can support the local gateway in a premises-based PSTN deployment
Describe different deployment scenarios using the local gateway in a premises-based PSTN Webex Calling solution
Understand how the high-availability solution within Cisco routers can be used in a Webex Calling deployment to offer failover for the local gateway and the Cisco Unified Border Element
Configure the Webex Control Hub to support Webex Calling in a premises-based PSTN deployment
Configure Cisco Unified Border Element and local gateway settings on a Cisco router to support Webex Calling using a premises-based PSTN deployment
Describe different methods that can be used to troubleshoot setup issues and media issues when configuring Webex Calling using the premises-based PSTN deploymentCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
A basic understanding of unified communications
A basic understanding of cloud-based unified communications solutions
These skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)Course Outline
Webex Overview
Webex Control Hub Overview and Monitoring
Webex Control Hub Management
Webex Control Hub Services
Methods to Add Users to Webex Control Hub
Methods to Add Devices to Webex Control Hub
Admin-Configurable Webex Calling Features
User-Configurable Webex Calling Features
Webex Calling Public Switched Telephone Network Options
Routers Supporting Local Gateway
Deployment Scenarios for Local Gateways
Local Gateway and Cisco Unified Border Element with High Availability
Control Hub Settings for Webex Calling
Router Settings for Webex Calling
Webex Calling TroubleshootingLab Outline
Set Up Webex Control Hub
Add Users to Webex Control Hub
Configure Admin-Configurable Webex Calling Features
Configure User-Configurable Webex Calling Features
Configure High Availability on Cisco Routers
Configure Webex Control Hub for Webex Calling
Configure Local Gateway for Webex Calling
Troubleshooting Issues with Webex Calling - DCCOR — Implementing and Operating Cisco Data Center Core Technologies
- Длительность: 5 дней (40 часов)
 - Код курса: DCCOR
 - Стоимость
 - Очный формат: 1 183 500 ₸
 - Онлайн формат: 1 168 000 ₸
 
Описание курса
Course Description
The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) training teaches you to implement data center local area networks (LANs) and storage area networks (SANs) and compute using Cisco Nexus Switches, Cisco MDS Switches, Cisco Unified Computing System (UCS) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. You will also learn the essentials of automation and security in data centers. The training provides rich, hands-on experience with deploying, securing, operating, and maintaining Cisco data center networking, storage, and computing.
This training prepares you for 350-601 DCCOR v1.2 exam. If passed, you earn the Cisco Certified Specialist – Data Center Core certification and satisfy the core exam requirements for the Cisco Certified Network Professional (CCNP) Data Center and Cisco Certified Internetwork Expert (CCIE) Data Center certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain experience implementing, securing and automating network, compute, and storage infrastructure
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Qualify for professional and expert-level job roles in the high-demand area of enterprise-class data center environments
Prepare for the 350-601 DCCOR v1.2 exam
Earn 64 CE credits toward recertificationWho Should Enroll
Network Designers
Network Administrators
Network Engineers
Systems Engineers
Data Center Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators and Partners
Field Engineers
Server Administrators
Network Managers
Storage Administrators
Program Managers
Project ManagersWhat to Expect in the Exam
Implementing Cisco Data Center Core Technologies (350-601 DCCOR) v1.2 is a 120-minute associated with the Cisco Certified Specialist – Data Center Core certification and satisfies the core exam requirements for the CCNP Data Center and CCIE Data Center certifications.
This exam tests your knowledge of implementing core data center technologies, including:
Network
Compute
Storage network
Automation
SecurityCourse Objectives
Implement spanning tree protocol, port channels, and virtual port channels in the data center
Implement first-hop redundancy protocols in the data center using Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP)
Implement routing in the data center by using Open Shortest Path First (OSPF)v2, OSPFv3, and Border Gateway Protocol (BGP)
Implement multicast functionality in the data center on the Cisco Nexus switches
Implement overlay networks in the data center by using Virtual Extensible LAN (VXLAN)
Implement network infrastructure security features on the Cisco Nexus switches
Understand the architecture and features of high-performance Ethernet fabrics
Introduce high-level Cisco Application Centric Infrastructure (ACI) concepts and describe various fabric discovery parameters
Describe Cisco ACI building blocks and Virtual Machine Manager (VMM) domain integration
Describe packet flow for various traffic types (unicast, multicast, and broadcast) in the data center
Describe Cisco Cloud Service and deployment models
Describe Cisco ACI fabric setup
Implement network configuration management, describe software updates and their impacts, and implement network infrastructure monitoring
Describe Cisco network assurance concepts such as Cisco Streaming Telemetry
Implement Fibre Channel fabric
Implement storage infrastructure services in the data center such as distributed device aliases, zoning, N Port Virtualization (NPV), and Fibre Channel over IP (FCIP)
Implement Fibre Channel over Ethernet (FCoE) unified fabric
Implement storage infrastructure security features in the data center
Describe storage infrastructure software updates and their impacts, and implement infrastructure monitoring
Describe Cisco UCS Server form factors
Implement Cisco UCS Fabric Interconnect and establish network connectivity for the Cisco UCS B-Series Blade Servers and Cisco UCS C-Series Rack Servers
Implement Cisco Unified Computing Server abstraction
Implement SAN connectivity for Cisco UCS
Implement Cisco UCS security features in the data center
Implement Cisco UCS configuration management, describe software updates and their impacts, and implement infrastructure monitoring
Implement Cisco automation and scripting tools in the data center
Describe and evaluate the Cisco integration with automation and orchestration software platforms, such as Ansible, Puppet, and Python
Describe and evaluate Cisco data center automation and orchestration technologiesCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Familiarity with Ethernet and TCP/IP networking
Familiarity with SANs
Familiarity with Fibre Channel protocol
Identify products in the Cisco Data Center Nexus and Cisco MDS families
Understanding of Cisco Enterprise Data Center architecture
Understanding of server system design and architecture
Familiarity with hypervisor technologies (such as VMware)Course Outline
Implementing Data Center Switching Protocols
Implementing First-Hop Redundancy Protocols
Implementing Routing in Data Center
Implementing Multicast in Data Center
Implementing Data Center Overlay Protocols
Implementing Network Infrastructure Security
High-Throughput Converged Fabrics
Describing Cisco Application-Centric Infrastructure
Describing Cisco ACI Building Blocks and VMM Domain Integration
Describing Packet Flow in Data Center Network
Describing Cisco Cloud Service and Deployment Models
Describing Data Center Network Infrastructure Management
Explaining Cisco Network Assurance Concepts
Implementing Fibre Channel Fabric
Implementing Storage Infrastructure Services
Implementing FCoE Unified Fabric
Implementing Storage Infrastructure Security
Describing Data Center Storage Infrastructure Maintenance and Operations
Describing Cisco UCS Server Form Factors
Implementing Cisco Unified Computing Network Connectivity
Implementing Cisco Unified Computing Server Abstraction
Implementing Cisco Unified Computing SAN Connectivity
Implementing Cisco Unified Computing System Security
Describing Data Center Unified Computing Management, Maintenance, and Operations
Implementing Cisco Data Center Automation and Scripting Tools
Describing Cisco Integration with Automation and Orchestration Software Platforms
Describing Cisco Data Center Automation and Orchestration TechnologiesLab Outline
Configure VXLAN
Explore the Cisco ACI Fabric
Implement Cisco ACI Access Policies and Out-of-Band Management
Implement Cisco ACI Tenant Policies
Integrate Cisco ACI with VMware
Configure Fibre Channel
Configure Device Aliases
Configure Zoning
Configure NPV
Provision Cisco UCS Fabric Interconnect
Configure Server and Uplink Ports
Configure VLANs
Configure Cisco UCS Server Profile Using Hardware Identities
Configure Basic Identity Pools
Configure a Cisco UCS Service Profile Using Pools
Configure an iSCSI Service Profile
Configure Cisco UCS Manager to Authenticate Users with Microsoft Active Directory
Configure Cisco Nexus Switches with Ansible
Program a Cisco Nexus Switch with Python - DCID — Designing Cisco Data Center Infrastructure
- Длительность: 5 дней (40 часов)
 - Код курса: DCID
 - Стоимость
 - Очный формат: 1 228 500 ₸
 - Онлайн формат: 1 219 000 ₸
 
Описание курса
Course Description
The Designing Cisco Data Center Infrastructure (DCID) provides training on designing data centers using Cisco data centers solutions and technologies. Topics covered include network designs with virtualization technologies, Layer 2 and Layer 3 technologies and routing protocols, and data center interconnect design options. You’ll learn design practices for the Cisco Unified Computing System™ (Cisco UCS®) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric, while gaining experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This training also earns you 40 Continuing Education (CE) credits towards recertification.
This training helps you prepare to take the exam:
300-610 Designing Cisco Data Center Infrastructure (DCID)How You'll Benefit
This training will help you:
Make design choices for optimal data center infrastructure performance, virtualization, security, and automation
Master the practical and theoretical knowledge necessary to design a scalable, reliable, and intelligent data center based on Cisco technologies
Qualify for professional-level job roles in the high-demand area of enterprise-class data center environmentsWho Should Enroll
IT professionals with five to eight years of experience in these roles:
Data center engineers
Network designers
Network administrators
Network engineers
Systems engineers
Consulting systems engineers
Technical solutions architects
Server administrators
Network managers
Cisco integrators or partnersWhat to Expect in the Exam
This exam certifies your knowledge of data center infrastructure design including network, compute, storage network, and automation.
After you pass 300-610 DCID:
You earn the Cisco Certified Specialist - Data Center Design certification and you will have satisfied the concentration exam requirement for the CCNP Data Center certification.Course Objectives
Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center
Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core
Describe Locator/ID separation protocol
Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding
Describe the hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center
Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV)
Describe security threats and solutions in the data center
Describe advanced data center security technologies and best practices
Describe device management and orchestration in the data center
Describe the storage options for the compute function and the different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective
Describe Fibre Channel concepts and architecture
Describe Fibre Channel topologies and industry terms
Describe Fibre Channel over Ethernet (FCoE)
Describe security options in the storage network
Describe the management and automation options for the storage networking infrastructure
Describe Cisco UCS servers and use cases for various Cisco UCS platforms
Explain the connectivity options for fabric interconnects for southbound and northbound connections
Describe the hyperconverged solution and integrated systems
Describe the systemwide parameters for setting up a Cisco UCS domain
Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager
Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager
Describe the different policies in the service profile
Describe the Ethernet and Fibre Channel interface policies and additional network technologies
Describe the advantages of templates and the difference between initial and updated templates
Describe data center automation toolsCourse Prerequisites
Before taking this offering, you should be able to:
Implement data center networking [Local Area Network (LAN) and Storage Area Network (SAN)]
Describe data center storage
Implement data center virtualization
Implement Cisco Unified Computing System (Cisco UCS)
Implement data center automation and orchestration with the focus on Cisco Application Centric Infrastructure (ACI) and Cisco UCS Director
Describe products in the Cisco Data Center Nexus and MDS familiesCourse Outline
Section 1: Describing High Availability on Layer 2
Section 2: Designing Layer 3 Connectivity
Section 3: Designing Data Center Topologies
Section 4: Designing Data Center Interconnects with Cisco OTV
Section 5: Describing Locator/ID Separation Protocol
Section 6: Describing VXLAN Overlay Networks
Section 7: Describing Hardware and Device Virtualization
Section 8: Describing Cisco FEX Options
Section 9: Describing Basic Data Center Security
Section 10: Describing Advanced Data Center Security
Section 11: Describing Management and Orchestration
Section 12: Describing Storage and RAID Options
Section 13: Describing Fibre Channel Concepts
Section 14: Describing Fibre Channel Topologies
Section 15: Describing FCoE
Section 16: Describing Storage Security
Section 17: Describing SAN Management and Orchestration
Section 18: Describing Cisco UCS Servers and Use Cases
Section 19: Describing Fabric Interconnect Connectivity
Section 20: Describing Hyperconverged and Integrated Systems
Section 21: Describing Cisco UCS Manager Systemwide Parameters
Section 22: Describing Cisco UCS RBAC
Section 23: Describing Pools for Service Profiles
Section 24: Describing Policies for Service Profiles
Section 25: Describing Network-Specific Adapters and Policies
Section 26: Describing Templates in Cisco UCS Manager
Section 27: Designing Data Center Automation.Lab Outline
Module 1: High Availability on Layer 2
Module 2: Designing Layer 3 Connectivity
Module 3: Designing Data Center Topologies
Module 4: Locator/ID Separation Protocol
Module 5: VXLAN Overlay Networks
Module 6: Hardware and Device Virtualization
Module 7: Cisco FEX Options
Module 8: Basic Data Center Security
Module 9: Advanced Data Center Security
Module 10: Management and Orchestration
Module 11: Storage and RAID Options
Module 12: Fibre Channel Topologies
Module 13: Fibre Channel Topologies
Module 14: FCoE
Module 15: Storage Security
Module 16: SAN Management and Orchestration
Module 17: Cisco UCS Servers and Use Cases
Module 18: Fabric Interconnect Connectivity
Module 19: Hyperconverged and Integrated Systems
Module 20: Cisco UCS Manager Systemwide Parameters
Module 21: Cisco UCS RBAC
Module 22: Pools for Service Profiles
Module 23: Policies for Service Profiles
Module 24: Network-Specific Adapters and Policies
Module 25: Templates in Cisco UCS Manager
Module 26: Designing Data Center Automation - DCIT — Troubleshooting Cisco Data Center Infrastructure
- Длительность: 5 дней (40 часов)
 - Код курса: DCIT
 - Стоимость
 - Очный формат: 1 567 500 ₸
 - Онлайн формат: 1 549 000 ₸
 
Описание курса
Course Description
The Troubleshooting Cisco Data Center Infrastructure (DCIT) training builds your knowledge and skills in troubleshooting LANs, SANs, Cisco Unified Fabric, Cisco Unified Computing System (Cisco UCS), and Cisco Application-Centric Infrastructure (Cisco ACI). You’ll gain hands-on experience resolving problems on Cisco Multilayer Director Switch (MDS) switches, Cisco Nexus switches, Cisco Fabric Extenders (FEXs), Cisco UCS, Cisco ACI, and more. This training also earns you 50 Continuing Education (CE) credits towards recertification.
This training helps prepare you to take the exam:
300-615 Troubleshooting Cisco Data Center Infrastructure (DCIT)How You'll Benefit
This training will help you:
Learn how to deploy and troubleshoot various components of Cisco data center infrastructure to support performance, resiliency, scalability needs
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Qualify for professional-level job rolesWho Should Enroll
Network designers
Network administrators
Network engineers
System engineers
Data center engineers
Consulting systems engineers
Technical solutions architects
Server administrators
Network managers
Cisco integrators and partnersWhat to Expect in the Exam
The 300-615 DCIT exam certifies your knowledge of troubleshooting a data center infrastructure including network, compute platforms, storage network, automation, management, and operations.
After you pass 300-615 DCIT, you earn the Cisco Certified Specialist - Data Center Operations certification and you satisfy the concentration exam requirement for new CCNP Data Center certification.Course Objectives
Describe how to troubleshoot the data center network
Describe the troubleshooting tools and methodologies that are available from the Command-Line Interface (CLI) and are used to identify and resolve issues in a Cisco Data Center network architecture
Identify and resolve issues that are related to Virtual LANs (VLANs) and private VLANs (PVLANs)
Identify and resolve issues that are related to port channels and virtual port channels
Identify and resolve issues that are related to VXLAN
Describe troubleshooting of routing and high-availability protocols
Describe troubleshooting of the LAN security features
Identify and resolve issues that are related to a single device
Identify and resolve issues that are related to Fibre Channel interface operation
Identify and resolve Fibre Channel switching issues when the Cisco NX-OS Software is used in switched mode
Identify and resolve issues that are related to Fibre Channel switching when a Cisco NX-OS switch is used in N-Port Virtualization (NPV) mode
Identify and resolve issues that are related to FIP and FCoE, including Fibre Channel over Ethernet (FCoE) performance
Describe Cisco UCS architecture, initial setup, tools, and service aids that are available for Cisco UCS troubleshooting and interpretation of the output
Describe Cisco UCS configuration and troubleshooting
Describe Cisco UCS B-Series Blade Server operation and troubleshoot related issues
Describe Cisco UCS B-Series LAN, SAN, and Fibre Channel operations, including in-depth troubleshooting procedures
Describe Cisco Integrated Management Controller (IMC) tools for validating performance and facilitating data-gathering activities for Cisco UCS C-Series server troubleshooting, and the troubleshooting approach for hardware and firmware failures
Define the proper procedures for configuring Cisco UCS C-Series LAN and SAN connectivity, avoiding issues with the VIC, and troubleshooting connectivity issues
Troubleshoot Cisco UCS C-Series server integration with Cisco UCS Manager
Identify the tools, protocols, and methods to effectively troubleshoot Cisco ACI
Describe how to troubleshoot automation and scripting tools
Describe how to troubleshoot programmabilityCourse Prerequisites
Before taking this offering, you should be able to:
Configure, secure, and maintain LAN and SAN based on Cisco Nexus and MDS switches
Configure, secure, and maintain Cisco Unified Computing System
Configure, secure, and maintain Cisco ACICourse Outline
Section 1: Describing the Troubleshooting Process
Section 2: Understanding CLI Troubleshooting Tools
Section 3: Troubleshooting VLANs and PVLANs
Section 4: Troubleshooting Port Channels and Virtual Port Channels
Section 5: Troubleshooting VXLAN
Section 6: Troubleshooting Routing and High-Availability Protocols
Section 7: Troubleshooting Data Center LAN Security
Section 8: Troubleshooting Platform-Specific Issues
Section 9: Troubleshooting Fibre Channel Interfaces
Section 10: Troubleshooting Fibre Channel Fabric Services
Section 11: Troubleshooting NPV Mode
Section 12: Troubleshooting FCoE
Section 13: Troubleshooting Cisco UCS Architecture and Initialization
Section 14: Troubleshooting Cisco UCS Configuration
Section 15: Troubleshooting Cisco UCS B-Series Servers
Section 16: Troubleshooting Cisco UCS B-Series LAN and SAN Connectivity
Section 17: Troubleshooting Cisco UCS C-Series Servers
Section 18: Troubleshooting Cisco UCS C-Series LAN and SAN Connectivity
Section 19: Troubleshooting Cisco UCS C-Series and Cisco UCS Manager Integration
Section 20: Exploring the Tools and Methodologies for Troubleshooting Cisco ACI
Section 21: Troubleshooting Automation and Scripting Tools
Section 22: Troubleshooting ProgrammabilityLab Outline
Discovery 1: Document the Network Baseline
Discovery 2: Troubleshoot Rapid PVST+
Discovery 3: Troubleshoot LACP
Discovery 4: Troubleshoot vPC
Discovery 5: Troubleshoot VXLAN
Discovery 6: Troubleshoot OSPF
Discovery 7: Troubleshoot FHRP
Discovery 8: Troubleshoot Cisco Fabric Services
Discovery 9: Troubleshoot VRF
Discovery 10: Troubleshoot Cisco FEX
Discovery 11: Troubleshoot Fibre Channel Interfaces
Discovery 12: Troubleshoot Fibre Channel VSANs, Zones, and Domain Services
Discovery 13: Troubleshoot NPV Mode
Discovery 14: Troubleshoot FCoE
Discovery 15: Troubleshoot DCB
Discovery 16: Troubleshoot Cisco UCS Management and Service Profile Deployment
Discovery 17: Troubleshoot Cisco UCS C-Series Server LAN Connectivity
Discovery 18: Troubleshoot Cisco UCS C-Series Server Boot from the Fibre Channel LUN
Discovery 19: Troubleshoot Cisco UCS C-Series Server Management Connectivity
Discovery 20: Troubleshoot Cisco ACI Integration with VMware vCenter
Discovery 21: Troubleshoot Contracts in Cisco ACI
Discovery 22: Troubleshoot Cisco ACI External Layer 3 Connectivity
Discovery 23: Troubleshoot Cisco ACI External Layer 2 Connectivity - DCACI — Implementing Cisco Application Centric Infrastructure
- Длительность: 5 дней (40 часов)
 - Код курса: DCACI
 - Стоимость
 - Очный формат: 1 452 500 ₸
 - Онлайн формат: 1 440 500 ₸
 
Описание курса
Course Description
The Implementing Cisco Application Centric Infrastructure (DCACI) training introduces you to the implementation and management of the Cisco Nexus 9000 Series Switches in Cisco Application Centric Infrastructure (ACI) mode. The 5-day lab-intensive training covers the key components and procedures you need to know to understand, configure, and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and fundamentals of Virtual Machine Manager (VMM) integration.
This training prepares you for the 300-620 DCACI exam, which certifies your knowledge of working with Cisco switches in ACI mode including configuration, implementation, and management. After you pass 300-620 DCACI, you earn the Cisco Certified Specialist – Data Center ACI Implementation certification and you satisfy the concentration exam requirement for the CCNP Data Center certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Gain the skills and hands-on practice integrating the enhanced, automated capabilities of Cisco Nexus 9000 Series Switches in ACI mode for quicker application deployment
Get the knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center job roles
Earn 40 CE credits toward recertificationWho Should Enroll
Primary audience includes:
Network Designer
Network Administrator
Network Engineer
Systems Engineer
Data Center Engineer
Consulting Systems Engineer
Technical Solutions Architect
Cisco Integrators/Partners
Field EngineerSecondary audience includes:
Server Administrator
Network Manager
Storage Administrator
Program Manager
Project ManagerWhat to Expect in the Exam
300-620 DCACI: Implementing Cisco Application Centric Infrastructure is a 90-minute exam associated with the Cisco Certified Specialist – Data Center ACI Implementation certification and satisfies the concentration exam requirement for the CCNP Data Center certification.
The multiple-choice format tests your knowledge of Cisco switches in ACI mode including:
ACI Fabric Infrastructure
ACI Packet Forwarding
External Network Connectivity
Integrations
ACI Management
ACI AnywhereCourse Objectives
Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts
Describe Cisco ACI policy model logical constructs
Describe Cisco ACI basic packet forwarding
Describe external network connectivity
Describe VMM Integration
Describe Layer 4 to Layer 7 integrations
Explain Cisco ACI management featuresCourse Prerequisites:
Before taking this offering, you should have:
Understanding of networking protocols, routing, and switching
Familiarity with Cisco Ethernet switching products
Understanding of Cisco data center architecture
Familiarity of virtualization fundamentalsCourse Outline:
Section 1: Introducing Cisco ACI Fabric Infrastructure and Basic Concepts
Section 2: Describing Cisco ACI Policy Model Logical Constructs
Section 3: Describing Cisco ACI Basic Packet Forwarding
Section 4: Introducing External Network Connectivity
Section 5: Introducing VMM Integration
Section 6: Describing Layer 4 to Layer 7 Integrations
Section 7: Explaining Cisco ACI ManagementLab Outline:
Discovery 1: Validate Fabric Discovery
Discovery 2: Configure NTP
Discovery 3: Create Access Policies and vPC
Discovery 4: Enable Layer 2 Connectivity in the Same EPG
Discovery 5: Enable Inter-EPG Layer 2 Connectivity
Discovery 6: Enable Inter-EPG Layer 3 Connectivity
Discovery 7: Compare Traffic Forwarding Methods in a Bridge Domain
Discovery 8: Configure External Layer 2 Connection
Discovery 9: Configure External Layer 3 (L3Out) Connection
Discovery 10: Integrate Cisco APIC with VMware vCenter Using VMware VDS - DCCUCS — Configuring Cisco Unified Computing System
- Длительность: 3 дня (24 часа)
 - Код курса: DCCUCS
 - Стоимость
 - Очный формат: 1 050 000 ₸
 - Онлайн формат: 1 034 000 ₸
 
Описание курса
Course Description
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System™ (Cisco UCS®) B-series blade servers, Cisco UCS C-Series, and S-Series rack servers for use in data centers. You will learn how to implement management and orchestration software for Cisco UCS. You will gain hands-on practice: configuring key features of Cisco UCS, Cisco UCS Director, and Cisco UCS Manager; implementing UCS management software including Cisco UCS Manager and Cisco Intersight™; and more.
How You'll Benefit
This course will help you:
Gain in-depth experience implementing and maintaining Cisco UCS servers to help you accelerate and provide robust UCS deployments
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and softwareWho Should Enroll
Server administrators
Network engineers
Systems engineers
Consulting systems engineers
Technical solutions architects
Network administrators
Storage administrators
Network managers
Cisco integrators and partnersCourse Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
General knowledge of servers
Routing and switching knowledge
Storage area networking knowledge
Server virtualization knowledge
These are the recommended Cisco courses that may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA) v1.0
Understanding Cisco Data Center Foundations (DCFNDU) v1.0
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
Introducing Cisco Unified Computing System (DCIUCS) v1.0
Introducing Cisco Data Center Networking (DCICN) v6.2
Introducing Cisco Data Center Technologies (DCICT) v6.2
Interconnecting Cisco Networking Devices: Accelerated (CCNAX) or Interconnecting Cisco Networking Devices Part 1 (ICND1) and Interconnecting Cisco Networking Devices Part 2 (ICND2)Course Objectives
After taking this course, you should be able to:
Describe and implement SAN on Cisco UCS
Describe Cisco UCS policies for service profiles
Describe and implement Role-Based Access Control (RBAC) on Cisco UCS
Describe and implement external authentication providers on Cisco UCS Manager
Describe and implement key management on Cisco UCS Manager
Describe Cisco UCS Director
Describe and implement Cisco Intersight
Describe the scripting options for Cisco UCS Manager
Describe and implement monitoring on Cisco UCS ManagerCourse Outline
Implementing Cisco UCS Storage Area Network (SAN)
SAN Introduction
Cisco UCS Fabric Interconnect Fibre Channels modes
Named VSANs
Cisco UCS Fibre Channel and FCoE Storage ConnectivityDescribing Cisco UCS Policies for Service Profiles
Storage Policies and Profiles
Basic Input Output System (BIOS) Policies
Boot Policy
Intelligent Platform Management Interface (IPMI) Policies
Scrub Policies
Maintenance PoliciesDescribing Cisco Adapter FEX and Single Root I/O Virtualization
Cisco FEX Overview
Cisco Adapter FEX
Single Root I/O VirtualizationImplementing RBAC on Cisco UCS
RBAC in Cisco UCS
Users, Roles, and Privileges
Functions of Organizations and Locales
Effective Rights of a UserImplementing External Authentication Providers
Options for External Authentication ProvidersImplementing Key Management on Cisco UCS Manager
Public Key InfrastructureImplementing Cisco UCS Director
Cisco UCS Director Overview
Policies, Virtual Data Centers, and Catalogs
Cisco UCS Director Virtualization Support
Managing Compute with Cisco UCS Director
Cisco UCS Manager Orchestration
Self-Service Portal
Reporting and Monitoring in Cisco UCS DirectorImplementing Cisco Intersight
Cisco UCS Director Overview
Important Features of Cisco IntersightDescribing the Scripting Options for Cisco UCS Manager
Cisco UCS Manager XML API
Cisco UCS Management Information Tree
Managed Object Browser
Cisco UCS PowerTool
Cisco UCS Python Software Development Kit (SDK)Implementing Key Management on Cisco UCS Manager
Public Key InfrastructureImplementing Cisco Intersight
Cisco Intersight Overview
Important Features of Cisco IntersightDescribing the Scripting Options for Cisco UCS Manager
Cisco UCS Manager XML API
Cisco UCS Management Information Tree
Managed Object Browser
Cisco UCS Manager PowerTool
Cisco UCS Python SDKImplementing Monitoring on Cisco UCS Manager
Logging Sources in Cisco UCS Manager
Port Monitoring Capabilities of Cisco UCS Manager
Simple Network Management Protocol (SNMP) Security Ramifications
Cisco UCS Manager Call Home FeatureLab Outline
Configure Pod-Specific Device Aliases
Configure Zoning
Configure VSANs in Cisco UCS Manager
Configure Unified Ports on Cisco UCS Fabric Interconnects
Install and Boot VMware Elastic Sky X Integrated (ESXi) on Cisco UCS from the FCoE Logical Unit Number (LUN) via FCoE
Configure RBAC
Configure Cisco UCS Manager to Authenticate Users via Open Lightweight Directory Access Protocol (OpenLDAP)
Configure a Trusted Point and Key Ring in Cisco UCS Manager
Configure Cisco UCS Manager Using Scripting
Implement Syslog and Call Home - DCIUCS — Introducing Cisco Unified Computing System
- Длительность: 2 дня (16 часов)
 - Код курса: DCIUCS
 - Стоимость
 - Очный формат: 824 000 ₸
 - Онлайн формат: 808 000 ₸
 
Описание курса
Course Description
The Introducing Cisco Unified Computing System (DCIUCS) v1.0 is an introductory course that shows you how to deploy, secure, operate, and maintain the Cisco Unified Computing system (Cisco UCS®) B-Series blade servers, Cisco UCS C-Series and S-Series rack servers, and Cisco HyperFlex™ product family for use in data centers. You will gain hands-on practice on basic Cisco UCS server configuration, performing backup and restore activities, and more.
How You'll Benefit
This course will help you:
Learn how to implement and maintain Cisco UCS servers
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Prepare for data center job rolesWho Should Enroll
Server administrators
Network engineers
Systems engineers
Consulting systems engineers
Technical solutions architects
Network administrators
Storage administrators
Network managers
Sales engineers
Cisco integrators and partnersCourse Objectives
After taking this course, you should be able to:
Describe Cisco UCS server hardware
Describe Cisco UCS connectivity
Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization
Describe and configure Cisco UCS service profiles
Describe and configure Cisco UCS service profile templates
Describe and implement Internet Small Computer Systems Interface (iSCSI) on Cisco UCS
Describe and implement Cisco UCS firmware updates
Describe and implement Cisco UCS backupsCourse Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
General knowledge of servers
Routing and switching
Storage area networking
Server virtualizationThese Cisco courses are recommended to help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA®)
Understanding Cisco Data Center Foundations (DCFNDU) v1.0
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)Course Outline
Describing Cisco UCS Server Hardware
Cisco UCS B-Series Blade Servers
Cisco UCS C-Series Rack Servers
Cisco UCS S-Series Rack Servers
Cisco Virtual Interface Cards
Hyperconvergence Overview
Cisco HyperFlex HX-Series ServersDescribing Cisco UCS Connectivity
Cisco UCS Fabric Interconnect
Cisco UCS B-Series Connectivity
Cisco UCS C-Series Connectivity
Cisco UCS S-Series Connectivity
Cisco HyperFlex Connectivity Architecture
Cisco HyperFlex Edge Connectivity
Cisco UCS Fabric Interconnect Ethernet End-Host Mode Compared to Switching Mode
Cisco UCS Fabric Interconnect Uplink Pinning
Cisco UCS C-Series IntegrationDescribing the Cisco HyperFlex HX Data Platform
Cisco HyperFlex HX Data Platform Software
Writing Data to Cisco HyperFlex HX Data Platform
Reading Data from Cisco HyperFlex HX Data Platform
Data Optimization in Cisco HyperFlex HX Data PlatformConfiguring Cisco UCS Service Profiles
Portability Issue with Nonabstracted Identities
Cisco UCS Service Profile
Identity Pools
Server Pools
IP PoolsConfiguring Cisco UCS Service Profile Templates
Service Profile TemplatesImplementing iSCSI on Cisco UCS
iSCSI Addressing
iSCSI Support in Cisco UCSImplementing Cisco UCS Firmware Updates
Update Cisco UCS C-Series Server Firmware
Download Tasks for the Infrastructure Image
Download Tasks for Cisco UCS B-Series Firmware Packages
Best Practices for Updating Firmware in Cisco UCS Manager
Firmware Upgrades Using Auto Install
Capability Catalog Updates
Host Firmware Packages
Driver Updates for Operating Systems and HypervisorsImplementing Cisco UCS Backups
Compare Backup Options in Cisco UCS Manager
Compare Two Import Types
Policy BackupLab Outline
Explore Cisco UCS Manager GUI
Configure Server and Uplink Ports
Configure VLANs
Configure Basic Identity Pools
Configure a Cisco UCS Service Profile Using Pools
Configure a Service Profile Template
Configure an iSCSI Service Profile on Cisco UCS
Perform Backup and Restore Activities - ENC9K — Implementing Cisco Catalyst 9000 Series Switches
- Длительность: 3 дня (24 часа)
 - Код курса: ENC9K
 - Стоимость
 - Очный формат: 869 000 ₸
 - Онлайн формат: 775 000 ₸
 
Описание курса
Course Description
The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) v4.0 course provides you with insight into Cisco Catalyst 9000 Series Switches and its solution components. You will learn about the architecture, capabilities, positioning, and implementation of the Cisco Catalyst 9000 Series switches, as well as the management of the switches using CLI, Cisco DNA Center, and IOS-XE web user GUI. Additionally, you will be introduced to security, cloud, automation, and other important features of Cisco Catalyst 9000 Series switches.
How You'll Benefit
This course will help you:
Prepare for successful deployment of the Cisco Catalyst 9000 Series Switches
Understand the role of Cisco Catalyst 9000 Series Switches in the SD-Access fabric
Learn to provision Cisco Catalyst 9000 Series Switches using Cisco DNA center as the orchestration platform
Gain hands-on practice through in-depth lab exercisesWho Should Enroll
Network designers
Network managers
System engineersCourse Objectives
After taking this course, you should be able to:
Review the Cisco Catalyst 9000 Series Switches identify the switches’ features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution.
Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration.
Identify the role and value of Cisco Silicon One in a campus environment.
Examine management capabilities of the Cisco Catalyst 9000 Series Switches.
Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches.
Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features.
Describe automation features, Application Programming Interface (API), Infrastructure as Code, and automation tools supported on Cisco Catalyst 9000 Series switches.
Describe the new QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches.
Describe the maintenance features on Cisco Catalyst 9000 Series switches.
Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices.
Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP.
Describe how to manage and host applications on Cisco Catalyst 9000 Series switches using Cisco DNA Center.
Explore a modern approach to cloud-managed networking for Cisco Catalyst 9000 Series switches and wireless access points that uses the Meraki Dashboard and analytics.
Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities.
Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables.
Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports
Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles.
Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features.Course Prerequisites
You are expected to have the following knowledge and skills before attending this course:
Cisco CCNP® certification or equivalent experience
Knowledge of configuring LAN routing and switching with Cisco Catalyst switches
Familiarity with the Cisco IOS XE operating system
Familiarity with using network management software
Familiarity with Cisco Intent-based networking and policy-based management automation technologiesThe following Cisco offerings can help you prepare for this course:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Introducing the Cisco Catalyst 9000 Series Switches
Positioning Cisco Catalyst 9000 Series Switches
Cisco Catalyst Silicon One Architecture
Exploring Cisco Catalyst 9000 Series Switches Management Capabilities
Scale and Performance Features on Cisco Catalyst 9000 Series Switches
Security Features on Cisco Catalyst 9000 Series Switches
Automation Features on Cisco Catalyst 9000 Series Switches
QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches
Maintenance Features on Cisco Catalyst 9000 Series Switches
Cisco SD-Access Solution on Cisco Catalyst 9000 Series Switches
Application Hosting on Cisco Catalyst 9000 Series Switches
Cloud Management for Catalyst 9000 Series Using Meraki Dashboard
Automating Network Changes with Cisco DNA Center
Introducing Cisco Catalyst 9200 Series Switches
Introducing Cisco Catalyst 9300 Series Switches
Introducing Cisco Catalyst 9400 Series Switches
Introducing Cisco Catalyst 9500 Series Switches
Introducing Cisco Catalyst 9600 Series SwitchesLab Outline
Configure and Troubleshoot Network Issues Using WebGUI
Application Hosting on Cisco Catalyst 9000 Series Switches Using the CLI
Configure a Switch Stack Using Cisco Catalyst 9300 Series Switches
Enable and Verify Switch-to-Switch MACSec
Enable and Verify Encrypted Traffic Analytics
Explore Switch Management Automation and Programmability
Network Automation Using Ansible Playbooks and Terraform Scripts on the Cisco IOS XE
Configure Perpetual PoE and fast PoE on the Cisco Catalyst 9000 Series Switches
Configure Packet Capture on Cisco Catalyst 9300 Series Switches
Perform GIR on a Cisco Catalyst 9000 Series Switch
Application Hosting on Cisco Catalyst 9300 Using Cisco DNA Center
Integrate Cisco DNA Center and Cisco ISE
Provision Underlay Networks with Cisco DNA Center LAN Automation - DCAUI — Implementing Automation for Cisco Data Center Solutions
- Длительность: 3 дня (24 часа)
 - Код курса: DCAUI
 - Стоимость
 - Очный формат: 886 500 ₸
 - Онлайн формат: 802 000 ₸
 
Описание курса
Course Description
The Implementing Automation for Cisco Data Center Solutions (DCAUI) training shows you how to implement Cisco Data Center automated solutions, including programming concepts, orchestration, and automation tools. The goal of this 5-day training is to highlight the tools and benefits of leveraging programmability and automation in the Cisco-powered Data Center. Examined platforms include Cisco ACI (the controller-based Data Center environment), Cisco NX-OS on all Cisco Nexus platforms for device-centric automation, and Cisco UCS for Data Center compute. Their current ecosystem of APIs, software development toolkits, and relevant workflows is inspected in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG.
This training prepares you for the 300-635 Automating and Programming Cisco Data Center Solutions (DCAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Data Center Solutions (DCAUI) because it provides crucial foundational knowledge essential to success. This training also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will teach you to implement Cisco Data Center automated solutions to:
Learn the tools and the benefits of leveraging programmability and automation in the Cisco-powered Data Center
Examine platforms include Cisco ACI (the controller-based Data Center environment), Cisco NX-OS on all Cisco Nexus platforms for device-centric automation, and Cisco UCS for Data Center compute
Inspect the current ecosystem of APIs, software development toolkits, and relevant workflows in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANGWho Should Enroll
Channel and Customer Engineers including Network Engineers, System Engineers, Wireless Engineers, Consulting Systems Engineers, Technical Solutions Architects, Network Administrators, Wireless Design Engineers, Network Managers, Site Reliability Engineers, and Deployment Engineers
Channel Sales Engineers
Channel Account ManagersWhat to Expect in the Exam
300-635 DCAUTO: Automating and Programming Cisco Data Center Solutions is a 90-minute exam associated with the Cisco Certified DevNet Specialist–Data Center Automation and Programmability certification and satisfies the concentration exam requirements for these professional-level certifications:
CCNP Data Center
Cisco Certified DevNet ProfessionalThe multiple-choice format tests knowledge and skills related to implementing Data Center automated solutions, including:
Programming concepts
Orchestration
Automation toolsCourse Objectives
Review Cisco ACI fundamental concepts, GUI workflows, and create the case for implementing automation
Introduce the Cisco ACI REST API, the tools already available on the Cisco APIC, and understand basic API interaction using Postman
Understand the functionality provided by the Python ACI libraries and write scripts that apply configuration and verify state on the Cisco ACI fabric
Understand Cisco ACI Ansible modules, build playbooks that apply Infrastructure-as-Code concepts to Cisco ACI tenant configuration, and generate a health report using Ansible
Understand Cisco ACI Apps Center integration and the benefits of integrating Kubernetes infrastructure with Cisco ACI
Understand the API types and capabilities available on Cisco Nexus product family
Understand Day 0 operations and how ZTP, POAP, and iPXE fulfill these goals with their respective tooling
Understand functionality provided by the on-box tooling on the Cisco Nexus series switches and implement simple solutions to improve daily operations
Use Python and Ansible to leverage the NX-API to implement and verify configuration state using modern workflows
Understand the paradigm shift of Model-Driven Telemetry and explore a fully set up pipeline for data collection and analysis
Understand the Cisco UCS developer tools and implement management workflows leveraging Cisco UCS APIs, Python, and Ansible modules
Review Cisco NDFC product capabilities and understand how its API can be leveraged to automate the Cisco Data Center
Understand the advantages of using Cisco Intersight and how to implement automation tasks using its REST APIs via Python and Ansible
Describe Terraform plans for Cisco ACI deploymentsCourse Prerequisites
Before taking this offering, you should have:
Basic knowledge of programming language concepts
Basic understanding of virtualization and VMware
Ability to use Linux and CLI tools, such as SSH and bash
CCNP level data center knowledge
Foundational understanding of Cisco ACICourse Outline
Describing the Cisco ACI Policy Model
Describing the Cisco APIC REST API
Using Python to Interact with the Cisco ACI REST API
Using Ansible to Automate Cisco ACI
Introducing Cisco NX-OS Programmability
Describing Day-Zero Provisioning with Cisco NX-OS
Implementing On-Box Programmability and Automation with Cisco NX-OS
Implementing Off-Box Programmability and Automation with Cisco NX-OS
Automating Cisco UCS Using Developer Tools
Describing Cisco IntersightLab Outline
Use Cisco APCI Web GUI
Discover the Cisco APIC REST API
Use Postman with the APIC REST API
Use Python with Cisco APIC REST API
Configure and Verify Cisco ACI Using Acitoolkit
Use Cobra and Arya to Recreate a Tenant
Manage Configuration Using Ansible
Set Up a New Tenant the NetDevOps Way
Create an Infrastructure Health Report
Set Up Power On Auto Provisioning on the Cisco Nexus 9000
Use Bash and Guest Shell on Cisco NX-OS
Use Python to Enhance CLI Commands
Trigger a Python Script Using EEM
Configure and Verify Using NX-API and Python
Configure and Verify Using NETCONF and YANG
Use Ansible with Cisco NX-OS
Connect, Query, and Modify Cisco UCS Manager Objects Using Cisco UCS PowerTool
Connect, Query, and Modify Cisco UCS IMC Objects Using Cisco UCS PowerTool
Utilize Cisco UCS Python SDK
Utilize Cisco IMC Python SDK
Implement Ansible Playbooks to Modify and Verify the Configuration of Cisco UCS Manager - DCNX — Implementing Cisco NX-OS Switches and Fabrics in the Data Center
- Длительность: 5 дней (40 часов)
 - Код курса: DCNX
 - Стоимость
 - Очный формат: 1 309 000 ₸
 - Онлайн формат: 1 293 500 ₸
 
Описание курса
Course Overview
The Implementing Cisco NX-OS Switches and Fabrics in the Data Center training gives you a detailed understanding of the Cisco® Nexus switch platform and teaches you how to install, configure, and manage Cisco Nexus® switch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) mode.
This training also earns you 40 Continuing Education (CE) credits towards recertification.How you’ll benefit
This course will help you:
Describe, implement, configure, and manage Cisco Nexus product families and platforms, including redundancy protocols and security features, in a scalable environment
Gain valuable hands-on experience with Cisco Nexus products in a lab setting
Develop expertise with the Cisco Nexus product families and platformsWho should attend
Data center systems engineers
Field engineers
Architects
Cisco partners using Cisco Nexus Series switch platformsCourse Objectives
Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families
Describe Cisco Nexus platform implementations
Explain Cisco Nexus platform management
Describe Port Channels and Virtual Port Channels
Configure First Hop Redundancy protocols
Configure security features of Cisco Nexus devices
Describe the Cisco Nexus devices routing and forwarding
Describe Virtual Extensible LAN (VXLAN)
Describe Quality of Service (QoS) on Cisco Nexus Devices
Explain system management and monitoring processes
Describe Cisco NX-OS programmability
Describe Cisco Nexus storage services
Configure device aliases and zoning
Configure FCoE
Configure NPIV and NPV modesCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Be familiar with Cisco data center technologies
Understand networking protocols, routing, and switchingThe following recommended Cisco offerings may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)Course Outline
Describing Cisco Nexus Series Switches
Describing Cisco Nexus Platforms Implementation
Describing Cisco Nexus Platforms Management
Describing Port Channels and Virtual Port Channels
Configuring First Hop Redundancy Protocols
Configuring Cisco Nexus Security Features
Describing Cisco NX-OS Routing and Forwarding
Describing Virtual Extensible LAN
Describing QoS on Cisco Nexus Devices
Configuring System Management and Monitoring
Describing Cisco NX-OS Programmability
Describing Cisco Nexus Storage Services
Configuring Fibre Channel Over Ethernet
Describing Device Aliases and Zoning
Configuring NPIV and NPV ModesLab Topology
Test Cisco Nexus Platforms
Configure User Management
Configure vPC
Configure First Hop Redundancy Protocol (FHRP) Protocols
Configure Cisco Nexus Security Features
Configure Open Shortest Path First (OSPF)
Configure VXLAN
Configure QoS
Configure System Management
Configure Cisco NX-OS On-Box Programmability
Configure Containers on Cisco NX-OS
Configure Cisco NX-OS Using Ansible
Configure Basic Fibre Channel Features
Configure FCoE
Configure Fiber Channel Device Aliases and Zoning
Configure NPV - DCNXA — Implementing Cisco Nexus 9000 Switches in NX-OS Mode — Advanced
- Длительность: 4 дня (32 часа)
 - Код курса: DCNXA
 - Стоимость
 - Очный формат: 1 329 000 ₸
 - Онлайн формат: 1 311 500 ₸
 
Описание курса
Course Overview
The Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced (DCNXA) v1.0 course provides advanced training in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM), implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD) features.
How you’ll benefit
This course will help you:
Learn how you can integrate Cisco Nexus 9000 Switches in NX-OS mode to manage your enterprise IT environment
Understand the common platform architecture and key features of the Cisco Nexus 9000 Series in NX-OS mode to provide a consistent set of provisioning, management, and diagnostic capabilities for applicationsWho Should Enroll
Basic knowledge in the following areas can help you get the most from this course:
Networking protocols, routing, and switching
General Cisco data center technologies
Virtualization fundamentals
Cisco Nexus platform managementThe following course offerings may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA®)
Understanding Cisco Data Center Foundations (DCFNDU)
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
Implementing Cisco Nexus 9000 Switches in NX-OS Mode (DCNX)Prerequisites
Basic knowledge in the following areas can help you get the most from this course:
Networking protocols, routing, and switching
General Cisco data center technologies
Virtualization fundamentals
Cisco Nexus platform managementThe following course offerings may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX)Course Objectives
After taking this course, you should be able to:
Configure VXLAN EVPN in a single site using Cisco DCNM
Configure a Multi-Site VXLAN EVPN
Configure L4-L7 service redirection
Configure external connectivity from a VXLAN EVPN
Configure tenant-level features and Tenant-Routed Multicast (TRM) in VXLAN EVPN
Configure Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD)Course Outline
Describing VXLAN EVPN in Single Site
Describe VXLAN EVPN Control Plane
Describe VXLAN EVPN Data PlaneDescribing Multi-Site VXLAN EVPN
Describe VXLAN EVPN Multi-Site Features
Describe Supported Multi-Site TopologiesDescribing Layer 4-Layer 7 Service Redirection
Describe Layer 4-Layer 7 Service Integration Options
Describe Integration of Active/Standby and Active/Active Service DevicesDescribing External Connectivity from VXLAN EVPN
Describe External VRF-Lite ConnectivityDescribing VXLAN EVPN Functionality Enhancements
Describe Fabric Management Options
Describe Tenant-Level Dynamic Host Configuration Protocol (DHCP) RelayDescribing Cisco NX-OS Enhanced Policy-Based Redirect and Intelligent Traffic Director
Describe Enhanced Policy-Based Redirect
Describe Tenant-Level DHCP RelayLab Topology
Import an Existing VXLAN Border Gateway Protocol (BGP) EVPN Fabric into Cisco DCNM
Configure vPC and Layer 3 Connectivity
Configure Multi-Site VXLAN EVPN
Configure Routed Firewall Integration into VXLAN EVPN Using PBR
Configure External VRF Lite Connectivity and Endpoint Locator
Configure Tenant DHCP Relay
Configure Tenant-Routed Multicast
Configure Enhanced Policy-Based Redirect
Configure Traffic Load-Balancing Using the ITD - DCACIT — Troubleshooting Cisco Application Centric Infrastructure
- Длительность: 2 дня (16 часов)
 - Код курса: DCACIT
 - Стоимость
 - Очный формат: 866 500 ₸
 - Онлайн формат: 849 000 ₸
 
Описание курса
Course Description
The Troubleshooting Cisco Application-Centric Infrastructure (DCACIT) v5.2 course teaches you through a combination of lectures and labs the key components and procedures needed to troubleshoot Cisco Nexus 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. This course is for advanced engineers who have installed and managed existing fabrics or for those who have completed the Implementing Cisco Application-Centric Infrastructure-Advanced (DCACI) course.
How You'll Benefit
This course will help you:
Learn how to design policy-driven automation to streamline the deployment lifecycle
Integrate a comprehensive solution using any hypervisor, supporting any workload, for any location, and in any cloud
Expand your knowledge of Cisco Nexus 9000 Series SwitchesWho Should Enroll
This course is ideal for developers and engineers including:
Network engineers
Systems engineers
Data center engineers
Consulting systems engineers
Technical solutions architects
Cisco integrators/partners
Field engineers
Server administrators
Network managersCourse Objectives
After taking this course, you should be able to:
Apply troubleshooting methodology to Cisco ACI networks
Troubleshoot logical and physical constructs of the Cisco ACI policy
Understand Cisco APIC and its troubleshooting aspects
Troubleshoot endpoint learning in Cisco ACI
Troubleshoot Layer 2 traffic bridging and Layer 3 routing in the Cisco ACI network
Troubleshoot hypervisor integration in Cisco ACI
Troubleshoot Layer 4 to Layer 7 service insertion
Troubleshoot contracts and route leaking in Cisco ACICourse Prerequisites
You should have the following knowledge and skills before attending this course:
Familiarity with data center infrastructure operations
Familiarity with management of Cisco data center switches
Basic programming
Basic network troubleshooting
System or network administration (Linux or Windows)
Data center operations
These are the recommended Cisco offerings that may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA®) v1.0
Understanding Cisco Data Center Foundations (DCFNDU) v1.0
Implementing Cisco Application-Centric Infrastructure (DCACI) v1.0
Cisco Application-Centric Infrastructure Operation and Troubleshooting (DCACIO) v5.2Course Outline
Describing Cisco ACI Troubleshooting Methodology
Troubleshooting Logical and Physical Constructs
Troubleshooting Cisco APIC
Troubleshooting Endpoint Learning
Troubleshooting Layer 2
Troubleshooting Layer 3 Routing
Troubleshooting VMM Integration
Troubleshooting Layer 4-7 Service Insertion
Troubleshooting Contracts and Route LeakingLab Outline
Verify Endpoints
Examine VLANs
Troubleshoot ACI Policy
Troubleshoot CMM integrat - DCNDA — Cisco Nexus Dashboard Advanced
- Длительность: 3 дня (24 часов)
 - Код курса: DCNDA
 - Стоимость
 - Очный формат: 717 500 ₸
 - Онлайн формат: 623 000 ₸
 
Описание курса
Course Description
The Data Center Nexus Dashboard Advanced (DCNDA) training focuses on how to deploy and use Cisco Nexus Dashboard Insights (NDI) and Cisco Nexus Dashboard Orchestrator (NDO) to successfully monitor data center networks, and to provision a Cisco Application Centric Infrastructure (ACI)-based multisite network. The training is three days long and includes several activities that are either lab simulations or live labs. Activities that pertain to Nexus Dashboard Insights are implemented with lab simulations based on a real-world lab environment, while the lab activity related to Nexus Dashboard Orchestrator uses live software.
This training earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Learn how to deploy and use Cisco Nexus Dashboard Insights and Cisco Nexus Dashboard Orchestration to successfully monitor data center networks, and to provision a Cisco ACI-based multisite network
Gain leading-edge skills for a career focused on data center technology
Earn 24 CE credits toward recertificationWho Should Enroll
Data Center Network Administrators
Data Center Network Operators
Data Center Architects
Data Center Engineers
Data Center Technical Managers
IT Managers/Directors
Account ManagersCourse Objectives
Describe Cisco Nexus Dashboard Insights
Describe day-2 operational needs
Describe the Cisco Nexus Dashboard Insights installation on Cisco NexusDashboard
Describe Cisco Nexus Dashboard Insights switch telemetry
Describe assurance analysis including multisite assurance
Describe resource analysis
Describe alerts analysis
Describe Cisco NDI dashboards
Describe the options for exporting data from NDI
Describe Cisco NDI use cases
Explore Cisco Nexus Dashboard Insights
Explore vCenter Integration with Cisco NDI
Explore Cisco NDI Assurance functions
Describe Cisco Nexus Dashboard Orchestrator
Describe Cisco NDO features and use cases
Describe Cisco NDO platform support and the installation process
Describe Cisco intersite connectivity
Describe multisite schemas and templates
Describe multipod and multisite integration
Orchestrate Cisco NDO policiesCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Understanding of Cisco routing and switching in a data center
Fundamentals of network management and network operation
Understanding of Cisco ACI
These skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Data Center Foundations (DCFNDU)
Implementing Cisco Application Centric Infrastructure (DCACI)Course Outline
Cisco Nexus Dashboards Insights Overview
Day-2 Operational Needs
Cisco Nexus Dashboard Insights Installation on Cisco Nexus Dashboard
Cisco Nexus Dashboard Insights Switch Telemetry
Assurance Analysis Including Multisite Assurance
Resource Analysis
Alerts Analysis
Explore Cisco Nexus Dashboard Insights
Cisco Nexus Dashboard Insights Dashboards
Options for Exporting Data from Cisco Nexus Dashboard Insights
Cisco Nexus Dashboard Insights Use Cases
Cisco Nexus Dashboard Insights Integration with vCenter
Explore Cisco NDI Assurance Functions
Cisco NDO Overview
Cisco NDO Features and Use Cases
Cisco NDO Platform Support and Installation
Cisco NDO with Cisco ACI Multisite
Intersite Connectivity
Multisite Schemas and Templates
Multipod and Multisite Integration
Orchestrate Cisco NDO PoliciesLab Outline
Explore Cisco Nexus Dashboard Insights
Configure and Explore vCenter Integration with Cisco NDI
Explore Cisco NDI Assurance Functions
Orchestrate Cisco NDO Policies - DCNDE — Cisco Data Center Nexus Dashboard Essentials
- Длительность: 5 дней (40 часов)
 - Код курса: DCNDE
 - Стоимость
 - Очный формат: 1 022 500 ₸
 - Онлайн формат: 938 000 ₸
 
Описание курса
Course Description
The Cisco Data Center Nexus Dashboard Essentials training teaches you how to plan, implement, manage, operate, monitor, and troubleshoot the infrastructure of your data centers using the Cisco Nexus Dashboard platform.
The goal of this training is to provide fundamental knowledge for the Cisco Nexus Dashboard platform. It discusses the components and the structure of the platform, as well as how to plan for the installment and deployment, looking at the physical and virtual resource requirements, licensing, connectivity, cluster size, and software stack. Additionally, you will be acquainted with the Graphical User Interface (GUI) and the different functions to create and manage sites in the Cisco Nexus Dashboard. You will learn how to monitor, troubleshoot, and administer the platform, covering the authentication and authorization of the administrators’ access. This training also earns you 26 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the needed skills to utilize the Cisco Nexus Dashboard platform
Boost knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center roles
Earn 26 CE credits toward recertificationWho Should Enroll
Personnel seeking professional- or expert-level data center roles
Course Objectives
Explore the Cisco Nexus Dashboard platform
Explain Cisco Nexus Dashboard licensing options, cluster connectivity, GUI, software stack, roles, permissions, tech support, troubleshooting, and installation procedure for adding applications
Perform Cisco Nexus Dashboard firmware upgrades
Configure Cisco Nexus Dashboard remote authentication
Monitor Cisco Nexus Dashboard resources
Describe Cisco Nexus Dashboard Fabric Controller (NDFC) and its dashboards
Explore the Data Center with Cisco NDFC topology, including customizable templates, deployment, existing network devices, Virtual eXtensible Local Area Network (VXLAN) Ethernet Virtual Private Network (EVPN), Representational State Transfer (REST) Application Program Interface (API), migration, and image, license, and network management
Describe enhanced Role-Based Access Control (RBAC) for fabric objectsCourse Prerequisites
none
Course Outline
Cisco Nexus Dashboard Platforms
Cisco Nexus Dashboard Licensing Options
Cisco Nexus Dashboard Cluster Connectivity
Cisco Nexus Dashboard GUI Overview
Cisco Nexus Dashboard Software Stack
Cisco Nexus Dashboard Installation Procedures
Cisco Nexus Dashboard Firmware Upgrades
Application Installation on Cisco Nexus Dashboard
Cisco Nexus Dashboard Roles and Permissions
Cisco Nexus Dashboard Remote Authentication
Cisco Nexus Dashboard Resource Monitoring
Cisco Nexus Dashboard Tech Support and Troubleshooting
Add Sites to Cisco Nexus Dashboard
Explore Cisco Nexus Dashboard
Cisco Nexus Dashboard Fabric Controller Overview
Cisco Nexus Dashboard Fabric Controller Dashboards
Data Center Exploration with Cisco NDFC Topology
Cisco NDFC Customizable Templates
Image Management Using Cisco NDFC
License Management Using Cisco NDFC
Enhanced RBAC for Fabric Objects
Explore Cisco Nexus Dashboard Fabric Controller
Manage the Network with Cisco NDFC
Deploying Cisco Nexus Dashboard Fabric Controller
Discovering Network Devices with Cisco NDFC
Deploy VXLAN EVPN with Cisco NDFC
Managing and Monitoring the Data Center with Cisco NDFC
Cisco Nexus Dashboard Fabric Controller REST API
Cisco Data Center Network Manager to Cisco NDFC Migration
Configure and Execute Cisco NDFC POAP
Configure VXLAN with a BGP Control PlaneLab Outline
Connect Sites to Cisco Nexus Dashboard
Explore Cisco Nexus Dashboard
Explore Cisco Nexus Dashboard Fabric Controller
Manage the Network with Cisco NDFC
Configure and Execute Cisco NDFC POAP
Configure VXLAN with a BGP Control Plane - DCACIO — Cisco Application Centric Infrastructure Operations and Troubleshooting
- Длительность: 3 дня (24 часа)
 - Код курса: DCACIO
 - Стоимость
 - Очный формат: 1 035 500 ₸
 - Онлайн формат: 1 021 500 ₸
 
Описание курса
Course Description
The Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v5.2 course shows you how to manage, monitor, and troubleshoot Cisco® Nexus® 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. Through expert instruction and hands-on practice, you will learn about operational tools, best practices, caveats, and practice troubleshooting common issues on a live fabric. Based on lessons learned in wide range of production deployments, this course gives you the real-world knowledge and skills to boost operational efficiencies in your own deployment.
How You'll Benefit
This course will help you:
Quickly ramp up on Cisco ACI® operational knowledge, skills, and best practices honed from real-world production deployments
Gain hands-on troubleshooting techniques
Optimize the benefits of using Cisco ACI, such as streamlined operationsWho Should Enroll
This course is ideal for developers and engineers including:
Network Engineer
Systems Engineer
Data Center Engineer
Consulting Systems Engineer
Technical Solutions Architect
Cisco Integrators/Partners
Field Engineer
Server Administrator
Network ManagerCourse Objectives
After taking this course, you should be able to:
Describe the Cisco ACI built0in tools for operating and monitoring the fabric.
Describe the complex challenges related to monitoring and Cisco tools that address them: Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights.
Describe fabric installation upgrade, backup, restore, and best practices for Cisco NX-OS-to-ACI migration and Cisco ACI management access.
Describe the tools and best practices for monitoring ACI fabric.
Describe best practices for Cisco ACI naming conventions, Day-0 configuration, VMM integration, and Cisco ACI migrations.Course Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Understanding of ACI architecture and concepts need to get an ACI fabric into production
Familiarity with data center infrastructure operations
Familiarity with management of Cisco data center switches
Data center operationsThe following course will provide you with the required ACI skills:
Implementing Cisco Application-Centric Infrastructure (DCACI)
Implementing and Administering Cisco Solution (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)Course Outline
Describing Cisco ACI Day-0 to Day-2 Operations
Describing Day-2 Operational Tools
Describing Cisco ACI Configuration Management
Describing Cisco ACI Monitoring
Cisco ACI Best PracticesLab Outline
Safeguard ACI Operation Using Network Assurance Engine
Explore Cisco Network Insights and Nexus Dashboard
Configure SNMP and Perform Export/Import Operations
Monitor Cisco ACI and Configure Syslog
Configure ELAM Assistant
Explore the Management Information Tree
Configure SPAN - DCACIA — Implementing Cisco Application Centric Infrastructure — Advanced
- Длительность: 5 дней (40 часов)
 - Код курса: DCACIA
 - Стоимость
 - Очный формат: 1 247 500 ₸
 - Онлайн формат: 1 163 500 ₸
 
Описание курса
Course Description
The Implementing Cisco Application Centric Infrastructure–Advanced (DCACIA) training shows you how to integrate the capabilities of the Cisco Nexus 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode providing enhanced management and policy framework, along with the protocols used in the underlying fabric. The course also covers how to use Cisco ACI as a policy-driven solution that integrates software and hardware, and how to implement Cisco ACI Multi-Pod and Multi-Site deployments. You will gain hands-on practice implementing advanced ACI capabilities such as Rogue Endpoint Feature, Transit Routing, VRF Route Leaking, Contracts and Zoning Rules, Policy Based Redirect to Layer 4–7 Service Node, Multi-Pod Fabric and Cisco ACI Multi-Site Orchestrator.
How You'll Benefit
This course will help you:
Gain the skills and hands-on practice integrating the enhanced, automated capabilities of Cisco Nexus 9000 Series Switches in ACI mode for quicker application deployment
Get the knowledge for protocols, solutions and designs to acquire professional-level and expert-level data center job roles
Earn 40 CE credits toward recertificationWho Should Enroll
This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:
Network Designers
Network Administrators
Network Engineers
Systems Engineers
Data Center Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators/Partners
Field Engineers
Server Administrators
Network Managers
Storage Administrators
Cisco Integrators and PartnersWhat to Expect in the Exam
The 300-630 DCACIA exam certifies your knowledge of working with Cisco switches in ACI mode including configuration, implementation, and management.
After you pass 300-630 DCACIA, you earn the Cisco Certified Specialist – ACI Advanced Implementation certification and you satisfy the concentration exam requirement for the CCNP Data Center certification.
Course Objectives
After completing the course, you should be able to:
Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts
Describe Cisco ACI policy model logical constructs
Describe Cisco ACI basic packet forwarding
Describe external network connectivity
Describe VMM Integration
Describe Layer 4 to Layer 7 integrations
Explain Cisco ACI management featuresCourse Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Understanding of networking protocols, routing, and switching
Familiarity with Cisco Ethernet switching products
Understanding of Cisco data center architecture
Familiarity with virtualization fundamentalsThe following Cisco courses may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)Course Outline
Section 1: Describing Cisco ACI Advanced Packet Forwarding
Section 2: Using Advanced Cisco ACI Policy and Tenant Configuration
Section 3: Implementing Traditional Network in Cisco ACI
Section 4: Describing Cisco ACI Service Graph PBR
Section 5: Describing Cisco ACI Multi-Pod Deployment
Section 6: Describing Cisco ACI MultiSite DeploymentLab Outline
Discovery 1: Examine Local and Remote Endpoint Learning
Discovery 2: Verify Bounce Entries
Discovery 3: Validate IP Learning
Discovery 4: Mitigate IP and MAC Flapping with the Rogue Endpoint Feature
Discovery 5: Enable Transit Routing
Discovery 6: Implement VRF Route Leaking - DCEIS — Cisco Intersight Essentials
- Длительность: 3 дня (24 часа)
 - Код курса: DCEIS
 - Стоимость
 - Очный формат: 750 500 ₸
 - Онлайн формат: 655 500 ₸
 
Описание курса
Course Description
The Cisco Intersight Essentials training teaches you various aspects of Cisco Unified Computing System (UCS), including hardware, connectivity, and management. You will learn Cisco Intersight characteristics, licensing, and features, along with insights into server profile deployment and prerequisites for installing operating systems from Cisco Intersight.
This training prepares you for configuring, managing, and monitoring your network, computing, and storage assets. You will gain experience using features, such as Cisco Intersight Workload Optimizer (IWO), Cisco Intersight Cloud Orchestrator (ICO), and Cisco Intersight Virtualization Services (IVS). Also, you will become familiar with the Cisco Intersight Application Programming Interface (API) by using HashiCorp Terraform to automate Cisco Intersight configuration. This training also earns you 18 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the needed skills to utilize Cisco Intersight
Learn how to centralize configuration, management, and monitoring of the network, computing, storage, and cloud assets under a single pane of glass
Boost knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center roles
Earn 18 CE credits toward recertificationWho Should Enroll
Server Administrators
Network Engineers
Systems Engineers
Consulting Systems Engineers
Network Administrators
Storage Administrators
Network Managers
Sales Engineers
Technical Solutions ArchitectsCourse Objectives
Describe Cisco UCS hardware, connectivity, and management
Describe Cisco Intersight characteristics
Describe Cisco Intersight licensing and its features
Describe Cisco Intersight server profile deployment
Describe prerequisites and various options for installing an operating system from Cisco Intersight
Describe Cisco Intersight Virtual Appliance and how to deploy and configure different deployment modes
Describe the Cisco UCS X-Series Platform
Describe Cisco UCS M6 portfolio of products
Describe firmware management in Intersight for Cisco UCS infrastructure devices
Describe Cisco UCS Converged Infrastructure
Describe Cisco Intersight account creation and the most important settings
Describe Cisco Intersight Managed Mode (IMM)
Describe Cisco HyperFlex Deployment with Cisco Intersight
Describe Cisco Intersight IVS features and functionality and describe additional ecosystem services that support virtualization service
Describe Cisco Intersight IWO, model your environment as a market with buyers and sellers, and discover IWO’s monitoring targets, policies, and planning scenarios to set up a configuration plan
Describe how to use Intersight ICO and Workflow Automation to manage and automate IT operations, create and manage tasks, and design custom workflows using a drag-and-drop interface, resulting in greater efficiency and reduced costs
Provide a brief description of HashiCorp Terraform
Describe Cisco Intersight API
Describe the process of using Cisco Intersight to install vMedia-based operating systems on managed servers in your data center, unattended installations on Cisco UCS C-Series standalone servers, and Cisco Intersight Managed Mode servers
Describe the usage of the IMM Transition ToolCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
General knowledge of Cisco UCS servers
Server virtualization knowledgeCourse Outline
Cisco Unified Computing System Fundamentals
Cisco Intersight Characteristics
Cisco Intersight Licensing Options
Cisco Intersight Server Profile Deployment
Cisco Intersight Server Operating System Installation
Cisco Intersight Virtual Appliance
Cisco Unified Computing System X-Series
Cisco Unified Computing System B- and C-Series Servers
Cisco Intersight Platform Firmware Operation
Cisco Unified Computing System Converged Infrastructure
Accessing Cisco Intersight
Cisco Intersight Managed Mode
Cisco HyperFlex Deployment with Cisco Intersight
Cisco Intersight Virtual Services
Cisco Intersight Workload Optimizer
Cisco Intersight Cloud Orchestration
Terraform Provider Registry
Cisco Intersight API
Deploying VMware ESXi to a Blade Using Cisco Intersight
Cisco IMM Transition ToolLab Outline
Navigate the Cisco Intersight User Interface
Configure Organizations and Roles
Configure Server Features
Create Pools and Policies
Create Server Profile
Create Server Profiles from Server Profile Template
Configure Cisco ICO
Configure Terraform Provider Registry
Configure Cisco Intersight API with Python
Configure Cisco Intersight API with Ansible - CCNA – Implementing and Administering Cisco Solutions 2.2
- Длительность: 5 дней (40 часов)
 - Код курса: CCNA
 - Стоимость
 - Очный формат: 546 500 ₸
 - Онлайн формат: 537 500 ₸
 
Описание курса
Course Description
This training teaches you how to install, operate, configure, and verify a basic IPv4 and IPv6 network, configure network components, such as switches, routers, and wireless local area network (LAN) controllers (WLNs), manage network devices, and identify basic security threats. This training also covers the introduction of AI and machine learning (ML) in network operations.
This Learning Path prepares you for the Cisco Certified Network Associate (200-301 CCNA) v1.1 exam. If passed, you earn your CCNA certification.How You'll Benefit
This training will help you:
Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network
Gain a foundation in the essentials of networking, security, and automation
Prepare for the 200-301 CCNA v1.1 exam
Earn 30 CE credits toward recertificationWho Should Enroll
Entry-level Network Engineers
Entry-level Network Administrators
Entry-level Network Support Technicians
Entry-level Help Desk TechniciansWhat to Expect in the Exam
Cisco Certified Network Associate (200-301 CCNA) v1.1 is a 120-minute exam associated with the CCNA certification.
The exam tests your knowledge and skills related to:
Network fundamentals
Network access
IP connectivity
IP services
Security fundamentals
Automation and programmabilityCourse Objectives
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco IOS Software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of transmission control protocol and the internet protocol (TCP/IP) and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP transport layer and application layer
Explore the functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement and verify virtual local area networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of open shortest path first (OSPF)
Explain how spanning tree protocol (STP) and rapid spanning tree protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic wide-area network (WAN) and virtual private network (VPN) concepts
Describe the operation of access control lists (ACLs) and their applications in the network
Configure internet access using dynamic host configuration protocol (DHCP) clients and explain and configure network address translation (NAT) on Cisco routers
Describe the basic quality of service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC
Describe network and device architectures and introduce virtualization
Explain software-defined networks
Configure basic Cisco IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Discuss the need of network programmability in Enterprise networks, common programmability protocols, and configuration management tools
Describe AI and ML in network operationsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Basic IP address knowledgeCourse Outline
Exploring the Functions of Networking
Introducing the Host-To-Host Communications Model
Operating Cisco IOS Software
Introducing LANs
Exploring the TCP/IP Link Layer
Starting a Switch
Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets
Explaining the TCP/IP Transport Layer and Application Layer
Exploring the Functions of Routing
Configuring a Cisco Router
Exploring the Packet Delivery Process
Troubleshooting a Simple Network
Introducing Basic IPv6
Configuring Static Routing
Implementing VLANs and Trunks
Routing Between VLANs
Introducing OSPF
Building Redundant Switched Topologies
Improving Redundant Switched Topologies with EtherChannel
Explaining the Basics of ACL
Enabling Internet Connectivity
Introducing AI and ML in Network Operations
Introducing System Monitoring
Managing Cisco Devices
Securing Administrative Access
Implementing Device Hardening
Exploring Layer 3 Redundancy
Introducing WAN Technologies
Introducing QoS
Explaining Wireless Fundamentals
Introducing Architectures and Virtualization
Explaining Software-Defined Networking
Introducing Network Programmability
Examining the Security Threat Landscape
Implementing Threat Defense TechnologiesLab Outline
Get Started with Cisco CLI
Observe How a Switch Operates
Perform Basic Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure IPv6 Static Routes
Configure VLANs and Trunks
Configure Inter-VLAN Routing
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Configure and Verify IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and PAT
Configure and Verify NTP
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Configure and Verify Port Security
Log in to and Monitor the WLC
Configure an Open Wireless Network
Define a RADIUS Server and Enable SNMP and Syslog
Configure a WLAN to Use WPA2 PSK - ENCOR — Implementing and Operating Cisco Enterprise Network Core Technologies
- Длительность: 5 дней (40 часов)
 - Код курса: ENCOR
 - Стоимость
 - Очный формат: 636 500 ₸
 - Онлайн формат: 630 500 ₸
 
Описание курса
Course Description
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You’ll also learn to understand and implement security principles and automation and programmability within an enterprise network.
How You'll Benefit
This training will help you:
Configure and implement identified solutions by applying planned implementation processes using Cisco IOS Software commands and applications.
Verify appropriate show and debug commands and applications to ensure correct solution implementation and performance.
Troubleshoot appropriate show and debug commands and applications to identify the cause of basic-level network issues and correctly implement a solution that ensures that the network is performing as desired.Who Should Enroll
Entry- to mid-level network engineers
Network administrators
Network support technicians
Help desk techniciansCourse Objectives
After taking this training, you should be able to:
Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
Compare and contrast the various hardware and software switching mechanisms and operation while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM) along with process switching, fast switching, and Cisco Express Forwarding concepts
Troubleshoot Layer 2 connectivity using VLANs and trunking
Implement redundant switched networks using Spanning Tree Protocol
Troubleshoot link aggregation using Etherchannel
Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types and areas, summarization, and route filtering for IPv4 and IPv6
Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
Implement network redundancy using protocols such as Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
Describe the virtualization technology of servers, switches, and the various network devices and components
Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
Describe the components and concepts of wireless networking, including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
Describe the various wireless deployment models available, including autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
Describe wireless roaming and location services
Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC
Troubleshoot wireless client connectivity issues using various available tools
Troubleshoot Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
Explain basic Python components and conditionals with script writing and analysis
Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
Describe APIs in Cisco DNA Center and ManageCourse Prerequisites
Knowledge and skills you should have before attending this training:
Implementation of Enterprise LAN networks
Basic understanding of Enterprise routing and wireless connectivity
Basic understanding of Python scriptingCourse Outline
Examining Cisco Enterprise Network Architecture
Exploring Cisco Switching Paths
Implementing Campus LAN Connectivity
Building Redundant Switched Topology
Implementing Layer 2 Port Aggregation
Understanding EIGRP
Implementing OSPF
Optimizing OSPF
Exploring EBGP
Implementing Network Redundancy
Implementing NAT
Introducing Virtualization Protocols and Techniques
Understanding Virtual Private Networks and Interfaces
Understanding Wireless Principles
Examining Wireless Deployment Options
Understanding Wireless Roaming and Location Services
Examining Wireless AP Operation
Implementing Wireless Client Authentication
Troubleshooting Wireless Client Connectivity
Implementing Network Services
Using Network Analysis Tools
Implementing Infrastructure Security
Implementing Secure Access Control
Discovering the Basics of Python Programming
Discovering Network Programmability Protocols
Implementing Layer 2 Port Aggregation
Discovering Multicast Protocols
Understanding QoS
Exploring Enterprise Network Security Architecture
Exploring Automation and Assurance Using Cisco DNA Center
Examining the Cisco SD-Access Solution
Understanding the Working Principles of the Cisco SD-WAN SolutionLab Outline
Investigate the CAM
Analyze Cisco Express Forwarding
Troubleshoot VLAN and Trunk Issues
Tune Spanning Tree Protocol (STP) and Configure Rapid Spanning Tree Protocol (RSTP)
Configure Multiple Spanning Tree Protocol
Troubleshoot EtherChannel
Implement Multi-area OSPF
Implement OSPF Tuning
Apply OSPF Optimization
Implement OSPFv3
Configure and Verify Single-Homed EBGP
Implement Hot Standby Routing Protocol (HSRP)
Configure Virtual Router Redundancy Protocol (VRRP)
Implement NAT
Configure and Verify Virtual Routing and Forwarding (VRF)
Configure and Verify a Generic Routing Encapsulation (GRE) Tunnel
Configure Static Virtual Tunnel Interface (VTI) Point-to-Point Tunnels
Configure Wireless Client Authentication in a Centralized Deployment
Troubleshoot Wireless Client Connectivity Issues
Configure Syslog
Configure and Verify Flexible NetFlow
Configure Cisco IOS Embedded Event Manager (EEM)
Troubleshoot Connectivity and Analyze Traffic with Ping, Trace route, and Debug
Configure and Verify Cisco IP SLAs
Configure Standard and Extended ACLs
Configure Control Plane Policing
Implement Local and Server-Based AAA
Write and Troubleshoot Python Scripts
Explore JavaScript Object Notation (JSON) Objects and Scripts in Python
Use NETCONF Via SSH
Use RESTCONF with Cisco IOS XE Software - ENARSI — Implementing Cisco Enterprise Advanced Routing and Services v1.0
- Длительность: 5 дней (40 часов)
 - Код курса: ENARSI
 - Стоимость
 - Очный формат: 636 500 ₸
 - Онлайн формат: 630 500 ₸
 
Описание курса
Course Description
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot a dual stack enterprise network. This training covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) training.
This training prepares you for the 300-410 ENARSI v1.1 exam. If passed, you earn the Cisco Certified Specialist – Enterprise Advanced Infrastructure Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Gain the knowledge you need to install, configure, operate, and troubleshoot a dual stack enterprise network
Qualify for professional-level job roles in advance routing and services
Prepare for the 300-410 ENARSI 1.0 exam
Earn 40 CE credits toward recertificationWho Should Enroll
Entry-Level Network Engineers
Network Administrators
Network Support Technicians
Help Desk TechniciansWhat to Expect in the Exam
Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) v1.1 is a 90-minute exam associated with the Cisco Certified Specialist – Enterprise Advanced Infrastructure Implementation certification and satisfies the core exam requirement for the CCNP Enterprise certification.
This exam tests your knowledge of implementing and troubleshooting for advanced routing technologies and services, including:
Layer 3
VPN services
Infrastructure security
Infrastructure servicesCourse Objectives
Configure, optimize, and troubleshoot enhanced interior gateway routing protocol (EIGRP)
Configure, optimize, and troubleshoot open shortest path first (OSPF)v2 and OSPFv3
Implement and troubleshoot route redistribution using filtering mechanisms
Implement path control using policy-based routing (PBR) and IP service level agreement (SLA)
Configure, optimize, and troubleshoot border gateway protocol (BGP)
Implement multiprotocol BGP (MP-BGP)
Describe the features of multiprotocol label switching (MPLS)
Describe the major architectural components of an MPLS virtual private network (VPN)
Identify the routing and packet forwarding functionalities for MPLS VPNs
Explain how packets are forwarded in an MPLS VPN environment
Implement Cisco internetwork operating system (IOS®) dynamic multipoint VPNs (DMVPNs)
Implement and troubleshoot dynamic host configuration protocol (DHCP)
Describe the tools available to secure the IPV6 first hop
Troubleshoot Cisco router security features
Troubleshoot infrastructure security and services
Troubleshoot network issues with Cisco DNA Center AssuranceCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
General understanding of network fundamentals
Basic knowledge of local area network (LAN) implementation
General understanding of network device management and security
Basic knowledge of network automation
General understanding of interior gateway protocol (IGP) routing, including EIGRP and OSPF
General understanding of BGP
General understanding of infrastructure security and services, including access control lists (ACLs), simple network management protocol (SNMP), DHCP, IP SLA, Syslog, authentication, authorization, and accounting (AAA), and control plane policing (CoPP)These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Implementing EIGRP
Optimizing EIGRP
Troubleshooting EIGRP
Implementing OSPF
Optimizing OSPF
Troubleshooting OSPF
Configuring Redistribution
Troubleshooting Redistribution
Implementing Path Control
Implementing IBGP
Optimizing BGP
Implementing MP-BGP
Troubleshooting BGP
Exploring MPLS
Introducing MPLS L3 VPN Architecture
Introducing MPLS L3 VPN Routing
Configuring VRF-Lite
Implementing DMVPN
Implementing DHCP
Introducing IPv6 First Hop Security
Securing Cisco Routers
Troubleshooting Infrastructure Security and Services
Troubleshooting with DNA Center AssuranceLab Outline
Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6
Verify the EIGRP Topology Table
Configure EIGRP Stub Routing, Summarization, and Default Routing
Configure EIGRP Load Balancing and Authentication
Troubleshoot EIGRP Issues
Configure OSPFv3 for IPv4 and IPv6
Verify the Link-State Database
Configure OSPF Stub Areas and Summarization
Configure OSPF Authentication
Troubleshoot OSPF Issues
Implement Routing Protocol Redistribution
Manipulate Redistribution
Manipulate Redistribution Using Route Maps
Troubleshoot Redistribution Issues
Implement PBR
Configure IBGP and EBGP
Implement BGP Path Selection
Configure BGP Advanced Features
Configure BGP Route Reflectors
Configure MP-BGP for IPv4 and IPv6
Troubleshoot BGP Issues
Configure Routing with VRF-Lite
Implement Cisco IOS DMVPN
Obtain IPv6 Addresses Dynamically
Troubleshoot DHCPv4 and DHCPv6 Issues
Troubleshoot IPv4 and IPv6 ACL Issues
Configure and Verify uRPF
Troubleshoot Network Management Protocol Issues: Lab 1
Troubleshoot Network Management Protocol Issues: Lab 2 - ENSLD — Designing Cisco Enterprise Networks
- Длительность: 5 дней (40 часов)
 - Код курса: ENSLD
 - Стоимость
 - Очный формат: 980 000 ₸
 - Онлайн формат: 964 000 ₸
 
Описание курса
Course Description
The Designing Cisco Enterprise Networks (ENSLD) training deepens your knowledge of designing enterprise networks. Topics covered include enterprise network design, including protocols and media for wired and wireless networks, SD-Access, VPN, Quality of Service (QoS), IPv6, and network programmability. This training earns you 40 Continuing Education (CE) credits towards recertification and helps prepare you to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam, which is part of the CNP Enterprise, Cisco Certified Specialist - Enterprise Design certification.
How You'll Benefit
This training will help you:
Learn the skills, technologies, and best practices needed to design an enterprise network.
Deepen your understanding of enterprise design including advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security services, network services, and software-defined access SDA.
Validate your knowledge and prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam.Who Should Enroll
Network design engineers
Network engineers
System administratorsCourse Objectives
Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise network
Design Open Shortest Path First (OSPF) internal routing for the enterprise network
Design Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise network
Design a network based on customer requirements
Design Border Gateway Protocol (BGP) routing for the enterprise network
Describe the different types and uses of Multiprotocol BGP (MP-BGP) address families
Describe BGP load sharing
Design a BGP network based on customer requirements
Decide where the L2/L3 boundary will be in your Campus network and make design decisions
Describe Layer 2 design considerations for Enterprise Campus networks
Design a LAN network based on customer requirements
Describe Layer 3 design considerations in an Enterprise Campus network
Examine Cisco SD-Access fundamental concepts
Describe Cisco SD-Access Fabric Design
Design a Software-Defined Access (SD-Access) Campus Fabric based on customer requirements
Design service provider-managed VPNs
Design enterprise-managed VPNs
Design a resilient WAN
Design a resilient WAN network based on customer requirements
Examine the Cisco SD-WAN architecture
Describe Cisco SD-WAN deployment options
Understand Cisco SD-WAN – NAT and hybrid design considerations
Design Cisco SD-WAN redundancy
Explain the basic principles of Quality of Service (QoS)
Design QoS for the WAN
Design QoS for enterprise network based on customer requirements
Explain the basic principles of multicast
Explore multicast with PIM-SM
Designing rendezvous point distribution solutions
Describe high-level considerations when doing IP addressing design
Create an IPv6 addressing plan
Plan an IPv6 deployment in an existing enterprise IPv4 network
Describe the challenges that you might encounter when transitioning to IPv6
Design an IPv6 addressing plan based on customer requirements
Describe Network APIs and protocols
Describe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF)Course Prerequisites
Before taking this offering, you should be familiar with the following:
Understanding network fundamentals
Implementing LANs
Implementing LAN connectivityCourse Outline
Module 1: Designing EIGRP routing
Module 2: Designing OSPF routing
Module 3: Designing IS-IS routing
Module 4: Designing BGP routing and redundancy
Module 5: Exploring BGP Address Families and Attributes
Module 6: Designing an Enterprise Campus LAN
Module 7: Designing Layer 2 Campus
Module 8: Designing a Layer 3 Campus
Module 9: Discovering the Cisco SD-Access Architecture
Module 10: Exploring Cisco SD-Access Fabric Design
Module 11: Exploring Cisco SD-Access Site Design Strategy and Considerations
Module 12: Discovering Service Provider-Managed VPNs
Module 13: Designing Enterprise-Managed VPNs
Module 14: Designing WAN Resiliency
Module 15: Examining Cisco SD-WAN Architectures
Module 16: Examining Cisco SD-WAN Deployment Design Considerations
Module 17: Examining Cisco SD-WAN—NAT and Hybrid Design Considerations
Module 18: Designing Cisco SD-WAN Routing and High Availability
Module 19: Exploring QoS
Module 20: Designing LAN and WAN QoS
Module 21: Introducing Multicast
Module 22: Exploring Multicast with PIM-SM
Module 23: Designing Rendezvous Point Distribution Solutions
Module 24: Designing an IPv4 Address Plan
Module 25: Exploring IPv6
Module 26: Deploying IPv6
Module 27: Introducing Network APIs and Protocols
Module 28: Exploring YANG, NETCONF, RESTCONF, and Model-Driven TelemetryLab Outline
Discovery 1: Designing Enterprise Connectivity
Discovery 2: Designing an Enterprise Network with BGP Internet Connectivity
Discovery 3: Designing an Enterprise Campus LAN
Discovery 4: Designing SD-Access in the Enterprise
Discovery 5: Designing Resilient Enterprise WAN
Discovery 6: Designing QoS in an Enterprise Network
Discovery 7: Designing an Enterprise IPv6 Network - ENWLSD — Designing Cisco Enterprise Wireless Networks
- Длительность: 5 дней (40 часов)
 - Код курса: ENWLSD
 - Стоимость
 - Очный формат: 636 500 ₸
 - Онлайн формат: 630 500 ₸
 
Описание курса
Course Description
The Designing Cisco Enterprise Wireless Networks (ENWLSD) training introduces you to concepts you need to know when planning advanced designs of Cisco wireless products. The training covers design specifics from scenario design concepts, through the installation phase, and into post-deployment validation.
This training prepares you for the ENWLSD exam. If passed, you earn the Cisco Enterprise Wireless Design Specialist certification and satisfy the concentration exam requirement for the CCNP Enterprise certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn how to successfully design Cisco Wireless Networks.
Gain leading-edge skills for high-demand responsibilities focused on wireless networks.
Earn 40 CE credits toward recertification.Who Should Enroll
Network Engineers
Systems Engineers
Wireless Engineers
Consulting Systems Engineers
Technical Solutions Architects
Network Administrators
Wireless Design Engineers
Network ManagerWhat to Expect in the Exam
300-425 ENWLSD: Designing Cisco Enterprise Wireless Networks is a 90-minute exam associated with the Cisco Enterprise Wireless Design Specialist certification and satisfies the concentration exam requirement for the CCNP Enterprise certification.
The multiple-choice format tests your knowledge of wireless network design, including:
Site surveys
Wired and wireless infrastructure
Mobility
Wireless Local Area Network (WLAN) high availabilityCourse Objectives
Describe Cisco-recommended structured wireless design methodology
Describe wireless industry standards, amendments, certifications, and Retain for Comments (RFCs)
Examine the wireless technology
Describe and implement Cisco enhanced wireless feature
Describe Cisco mobility, roaming, and Work Group Bridges
Describe the wireless design process
Describe and implement specific wireless application designs
Describe and implement specific wireless network vertical designs
Describe and implement bridge and mesh designs in wireless networks
Describe special considerations in advanced wireless designs
Understand requirements to adapt a wireless network for Cisco Connected Mobile Experiences (CMX) and Cisco Spaces
Describe site survey processes
Describe third-party planning tools
Describe and implement wireless network validation processes
Describe and implement final phases of the design projectCourse Prerequisites
The knowledge and skills you are expected to have before attending this course are:
General knowledge of networks
General knowledge of wireless networks
Routing and switching knowledge
These skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Wireless Foundations (WLFNDU)
Cisco Certified Network Professional Enterprise (CCNP)Course Outline
Structured Wireless Design Methodology
Wireless Industry Protocols and Standards
The Science of Wireless Technology
Cisco Enhanced Wireless Features
Cisco Mobility and Roaming
Wireless Design Process
Wireless Network Design for Specific Applications
Designing Wireless Networks for Specific Vertical Designs
Bridging and Mesh in Wireless Networks
Special Considerations in Advanced Wireless Designs
Cisco CMX and Cisco Spaces
Survey Processes
Wireless Network Design with Third-Party Tools
Wireless Network Validation Processes
Completing the Wireless Design ProjectLab Outline
Examine Ekahau Site Survey Predictive Fundamentals
Create a Site Survey Report
Design a Data Network in an Enterprise Environment
Design a Voice and Data Network in a Healthcare Environment
Convert an Enterprise Data Design to Include Voice
Design a Voice and Data Network in a Warehouse Environment with Directional Antennas
Review a Live Site Survey Using Ekahau Tools
Simulate a Post Installation Network Validation Survey
Analyze Layer 1 Data - ENWLSI — Implementing Cisco Enterprise Wireless Networks
- Длительность: 5 дней (40 часов)
 - Код курса: ENWLSI
 - Стоимость
 - Очный формат: 636 500 ₸
 - Онлайн формат: 630 500 ₸
 
Описание курса
Course Description
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) training helps you implement network settings to provide a secure wireless network infrastructure and troubleshoot any related issues. The goal of this 5-day instructor-led training is to prepare you to secure and implement the wireless infrastructure, and use Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), Cisco DNA Center, Cisco Spaces, and Cisco Connect Mobile Experience to monitor and troubleshoot network issues. This training provides you with hands-on labs to reinforce concepts including deploying Cisco Catalyst 9800 Wireless Controller Release IOS XE Bengaluru 17.6.3, Cisco Digital Network Architecture (DNA) Center Release 2.3.3, Cisco Prime Infrastructure Release 3.5, Cisco Spaces, Cisco CMX Release 10.5, features, and Cisco Identity Services Engine (ISE) Release 3.0.
This training prepares you for the 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks exam. If passed, you earn the Cisco Certified Specialist – Enterprise Wireless Implementation certification and satisfy the concentration exam requirement for the CCNP Enterprise certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the skills to secure the wireless infrastructure, implement the wireless infrastructure, and use Cisco Identity Service Engine (ISE), Cisco DNA Center, Cisco Prime Infrastructure (PI), Cisco Spaces, and Cisco Connected Mobile Experience (CMX) to monitor and troubleshoot network issues
Get the knowledge for protocols, solutions, and designs to acquire professional-level and expert-level enterprise roles
Earn 40 CE credits toward recertificationWho Should Enroll
Wireless Network Engineers
Security Network Engineers
Sales Engineers
Wireless Network Technicians
Test Engineers
Network Designers
Network Administrators
Network Managers
Midlevel Wireless Support Engineers
Project ManagersWhat to Expect in the Exam
300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks is a 90-minute exam associated with the Cisco Certified Specialist – Enterprise Wireless Implementation certification and satisfies the concentration exam requirement for the CCNP Enterprise certification.
The multiple-choice format tests your knowledge of wireless network implementation, including:
FlexConnect
QoS
Multicast
Advanced location services
Security for client connectivity
Monitoring
Device hardeningCourse Objectives
Explain how to secure the wireless network infrastructure
Access and navigate the remote lab
Explain device administration
Describe security best practices for administrative access to Cisco WLC
Describe Cisco WLC configuration and overview for TACACS+
Explain role-based access control in Cisco ISE
Explain how to configure access to the access point
Configure secure port access for the access points
Implement the 802.1X authentication process
Explain how to configure access points and Cisco ISE for the 802.1X authentication
Describe how to monitor and troubleshoot a wireless network
Describe access point joint issue troubleshooting
Describe the tools for CAPWAP access point discovery, DTLS, and join issues troubleshooting
Capture a successful AP authentication
Describe how to monitor and manage the network for rogue devices and RF interferers on Cisco WLC and Cisco Prime Infrastructure
Describe how to implement and add devices to Cisco Prime Infrastructure
Describe how to add access points to maps and monitor wireless clients
Explain reports and their functions in Cisco Prime Infrastructure
Describe enhanced client information with Cisco ISE and location details with Cisco CMX
Discover how to use Cisco Prime Infrastructure for network monitoring
Explain how to observe wireless networks for rogue devices, add devices to, monitor radio frequency interferers, and integrate Cisco DNA Center with external resources
Explain how to troubleshoot access point and WLC issues with Cisco DNA Center Assurance
Explain enhanced network insights with Cisco AI Network Analytics
Observe and learn how to use reports in Cisco DNA Center
Explain how to implement AAA-Based wireless security on Cisco WLC and Cisco ISE
Explain how to configure WLAN for 802.1X on Cisco WLC and wireless clients for 802.1X authentication
Explain how to implement and configure AAA override on Cisco WLC and Cisco ISE
Configure, understand, and perform FlexConnect authentication, identity-based networking, split tunneling, and AAA services on Cisco WLC
Explain how to upgrade FlexConnect access points
Describe how to configure OfficeExtend
Implement guest access in the wireless network
Explain how to implement central web authentication
Describe how to configure Cisco WLC and Cisco ISE for Centralized Web Authentication
Show Cisco WLC configuration for Guest Services
Explain the basics, onboarding process of BYOD
Explain how to configure Cisco ISE for BYOD in the wireless network
Describe how to monitor and troubleshoot client connectivity on Cisco WLC and authentication issues
Show how to capture successful client authentication by using Radioactive Trace and Cisco ISE
Describe the issues that affect client performance
Explain wireless coverage and capacity, how to enhance client performance, and troubleshoot client throughput and data rate issues
Describe how to implement QoS in wireless networks
Describe QoS In wireless networks, marking QoS, and traffic classifications
Explain congestions in the wireless world
Describe IEEE 802.11 QoS fundamentals and how to configure Cisco WLC to support voice traffic
Show how to configure QoS in the wireless network for voice and video services
Describe how to optimize wireless utilization with Cisco Aire Time Fairness, QoS profiles, and Cisco Fastlane
Implement and configure multicast services, forwarding, and Cisco AVC in wireless networks and on Cisco WLC
Implement multicast services
Explain how to configure mDNS and Cisco Media Stream
Describe Cisco DNA Center Service for Bonjour and Cisco Media Stream
Explain the QoS troubleshooting process in the wireless network and on Cisco WLC
Describe how to use AVC to identify issues
Describe how to verify and troubleshoot mDNS and media stream on Cisco WLC
Explain how to deploy Cisco Spaces and Cisco CMX
Describe how to implement location-based services and the provided functionalities
Describe how to design for location services, deploy Cisco Spaces and Cisco CMX, and integrate Cisco Spaces and Cisco XMC with Cisco DNA Center, and Cisco CMS with Cisco Prime Infrastructure
Describe how to deploy and configure Cisco Hyperlocation
Describe how to implement detect and locate services in Cisco Spaces
Describe how to prepare maps for location services in Cisco DNA Center, implement, detect, and locate services on Cisco CMX, analytics services in Cisco Spaces, and on Cisco CMX
Describe how to implement presence services on Cisco CMX
Describe how to implement and configure guest services, monitor, detect, and run analytics on wireless clients, rouge devices, and interferers in Cisco Spaces and with Facebook on Cisco CMX
Describe how to troubleshoot location accuracyCourse Prerequisites
Before taking this offering, you should have:
WLFNDU or equivalent knowledge or Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) trainingCourse Outline
Secure the Wireless Network Infrastructure
Monitor and Troubleshoot Wireless Network
Monitor Wireless Networks with Cisco Prime Infrastructure
Monitor Wireless Network with Cisco DNA Center
Implementing 802.1X Authentication
Configure Cisco FlexConnect
Implement Guest Access
Monitor and Troubleshoot Client Connectivity
Implement QoS in Wireless Network
Implement Cisco AVC in Wireless Networks
Implement Multicast Services
Troubleshoot QoS
Deploy Cisco Spaces and Cisco CMX
Implement Location Services
Monitor Wireless Network with Cisco Spaces and Cisco CMXLab Outline
Lab Familiarization (Base Learning Lab)
Configure Secure Management Access for WLCs and APs
Capture a Successful AP Authentication
Network Monitoring with Cisco Prime Infrastructure
Add Network Devices to Cisco DNA Center
Integrate Cisco DNA Center with External Resources
Use Cisco DNA Center for Network Monitoring
Use Cisco DNA Center Reports
Configure Cisco WLC for AAA Services
Configure Cisco ISE for AAA Services
Configure AAA Services for Cisco FlexConnect
Configure Cisco WLC for Guest Services
Configure Cisco ISE for Guest Services
Configure BYOD in the Wireless Network
Capture Successful Client Authentication Using Radioactive Trace
Capture Successful Client Authentication Using Cisco ISE
Configure QoS in the Wireless Network for Voice and Video Services
Configure Cisco AVC in the Wireless Network - WLFNDU — Understanding Cisco Wireless Foundations
- Длительность: 5 дней (40 часов)
 - Код курса: WLFNDU
 - Стоимость
 - Очный формат: 636 500 ₸
 - Онлайн формат: 630 500 ₸
 
Описание курса
Course Description
The Understanding Cisco Wireless Foundations (WLFNDU) training teaches you the knowledge and skills you need to configure, manage, and troubleshoot a Cisco wireless LAN (WLAN) network. Topics include understanding critical aspects of RF technology, industry standards for Wi-Fi and security, how to design, install, and configure a WLAN network of any size, and using Cisco DNA Center. This training also earns you 30 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Learn the skills, technologies, and best practices needed to manage a Cisco WLAN network
Understand and implement a Cisco wireless network architecture
Design and implement WLAN maintenance and troubleshooting solutionsWho Should Enroll
Network engineer
Systems engineer
Wireless engineer
Technical solutions architect
Network administrator
Wireless design engineer
Network managerCourse Objectives
Describe and implement foundational wireless theory
Describe and implement foundational wireless math and antennas
Describe and implement foundational wireless operation including Wi-Fi 6
Describe security and client access in a wireless network
Implement 802.1X and Extensible Authentication Protocol (EAP)
Implement wireless guest access and configure wireless security
Describe Cisco wireless architecture components and deployment options
Describe Cisco wireless architecture and its deployment modes, the Control and Provisioning of Wireless Access Points (CAPWAP) protocol, and the Cisco WLC and AP line up
Describe the wired support for implementing wireless networks
Deploy Cisco centralized wireless networks using Cisco 9800 WLC
Describe the centralized wireless access model and its configuration
Describe maintenance and troubleshooting in the centralized WLAN model
Describe the management and monitoring of Cisco Wireless Networks with Cisco DNA CenterCourse Prerequisites
Before taking this offering, you should have:
General knowledge of networks
General knowledge of wireless networks
Routing and switching knowledgeCourse Outline
Module 1: RF and WLAN Theory
Module 2: WLAN Math and Antennas
Module 3: Wi-Fi Operations
Module 4: Basic WLAN Security
Module 5: Advanced WLAN Security
Module 6: Configuring WLAN Security
Module 7: Cisco Wireless Network Architecture
Module 8: Implementing Cisco Wireless Network
Module 9: Implementing Cisco Wireless Network Wired Support
Module 10: Deploying Cisco Centralized Wireless Networks
Module 11: Configuring Cisco Centralized Wireless Networks
Module 12: Maintaining and Troubleshooting Cisco Wireless Networks
Module 13: Managing and Monitoring Cisco Wireless Networks with Cisco DNA CenterLab Outline
Discovery 1: Practice RF Math
Discovery 2: Antenna Calculations
Discovery 3: Explore the Wi-Fi Environment
Discovery 4: Analyze Wireless Frames
Discovery 5: Configure Client Access
Discovery 6: Deploy Cisco 9800 WLC
Discovery 7: Configure Cisco 9800 WLC
Discovery 8: Perform Cisco 9800 WLC Maintenance - QOS — Implementing Cisco Quality of Service V3.0
- Длительность: 5 дней (40 часов)
 - Код курса: QOS
 - Стоимость
 - Очный формат: 837 500 ₸
 - Онлайн формат: 806 000 ₸
 
Описание курса
Course Description
The Implementing Cisco Quality of Service (QoS) training provides you with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms. The training covers the theory of QoS, design issues, and configuration of various QoS mechanisms to facilitate the creation of effective administrative policies providing QoS.
The training also gives you design and usage rules for advanced QoS features. This gives you the opportunity to design and implement efficient, optimal, and trouble-free multiservice networks. The new version of the training also includes QoS for modern wireless networks and software-defined networks.
This training earns you 40 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Gain the skills to identify, describe, and correctly implement the appropriate QoS mechanisms that are required to create an effective administrative policy providing QoS
Get the knowledge for designs and usage rules for advanced QoS features
Earn 40 CE credits toward recertificationWho Should Enroll
Pre- and post-sales technical engineers responsible for designing, implementing, or troubleshooting networks
Network architects responsible for designing multiservice networks to carry voice, video, and data traffic in enterprise or service provider environmentsCourse Objectives
Explain the need for QoS, describe the fundamentals of QoS policy, and identify and describe the different models that are used for ensuring QoS in a network
Explain the use of MQC and AutoQoS to implement QoS on the network and describe some of the mechanisms used to monitor QoS implementations
Given a converged network and a policy defining QoS on the network and describe some of the mechanisms used to monitor QoS implementations
Use Cisco QoS queuing mechanisms to manage network congestion
Use Cisco QoS congestion avoidance mechanisms to reduce the effects of congestion on the network
Describe how link efficiency mechanisms can be used collectively to improve bandwidth efficiency and reduce delay
Describe the need for wireless QoS in WLANs due to the expansion of high-bandwidth data applications and time-sensitive multimedia applications in vertical and enterprise environments, and the need for a unified approach to support multi-vendor time-sensitive applications and accelerate the adoption rate of QoS
Describe the need for QoS in modern Software-Defined Networks (SDN) for ensuring reliable performance of crucial applications and services
Describe the steps and best practices for optimally deploying QoS and understand the network elements involved in an enterprise end-to-end QoS deployment, as well as the importance of QoS interaction between the enterprise and service provider networksCourse Prerequisites
Before taking this offering, you should have:
Cisco Certified Networking Associate v2.0 certificationCourse Outline
Section 1: Introduction to QoS
Section 2: Implement and Monitor QoS
Section 3: Classification
Section 4: Marking
Section 5: Congestion Management
Section 6: Congestion Avoidance
Section 7: Traffic Policing and Shaping
Section 8: Link Efficiency Mechanisms
Section 9: Introducing QoS for Modern Wireless Networks
Section 10: Introducing QoS for Software-Defined Networks
Section 11: Deploying End-to-End QoSLab Outline
Case Study 1-1: QoS Mechanisms
Lab 2-1: IP SLA Setup and QoS Baseline Measurement
Lab 2-2: Configuring QoS with Cisco AutoQoS
Case Study 3-1: Classification and Marking
Lab 3-2: Classification and Marking Using MQC
Lab 3-3: Using NBAR for Classification
Lab 3-4: Configuring QoS Preclassify
Lab 3-5: Campus Classification and Marking Using MQC
Lab 4-1: Configuring Fair Queuing
Lab 4-2: Configuring LLQ-CBWFQ
Lab 4-3: Configuring Campus-Based Queuing Mechanisms
Case Study 5-1: WRED Traffic Profiles
Lab 5-2: Configuring DSCP-Based WRED
Lab 5-3: Configuring WTD Thresholds
Lab 6-1: Configuring Class-Based Policing
Lab 6-2: Configuring Class-Based Shaping
Lab 7-1: Configuring Class-Based Header Compression
Lab 7-2: Configuring LFI - SDWFND — Cisco SDWAN Fundamentals
- Длительность: 2 дня (16 часов)
 - Код курса: SDWFND
 - Стоимость
 - Очный формат: 498 000 ₸
 - Онлайн формат: 398 000 ₸
 
Описание курса
Course Description
The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.
You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.How You'll Benefit
This class will help you learn to use Cisco SD-WAN to:
Establish transport-independent WAN for lower cost and higher diversity
Meet SLAs for business-critical and real-time applications
Provide end-to-end segmentation for protecting critical enterprise compute resources
Extend seamlessly into the public cloud
Optimize the user experience for Software-as-a-Service (SaaS) applicationsWho Should Enroll
Enterprise network system installers
System integrators
System administrators
Network administrators
Solutions designersCourse Objectives
After taking this course, you should be able to:
Identify the various network elements of the Cisco SD-WAN solution.
Deploy WAN Edge routers.
Create templates to aid in the deployment and operation of the Cisco SD-WAN network.
Configure and verify Cisco SD-WAN overlay routing.
Create simple policies to control traffic flow through the Cisco SD-WAN fabric.Course Prerequisites
Before taking this course, you should have the following knowledge and skills:
Strong understanding of enterprise WAN design
Strong understanding of routing protocol operation, including interior and exterior routing protocol operation
Familiarity with Transport Layer Security (TLS) and IP Security (IPsec)
These recommended Cisco learning offerings may help students meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Cisco SD-WAN Solution Components
Cisco SD-WAN Network Deployment
Cisco SD-WAN Configuration Management
Cisco SD-WAN Overlay Routing
Cisco SD-WAN PoliciesLab Outline
Manage and Monitor Cisco SD-WAN Components
Deploy and Verify Cisco SD-WAN Edge Routers
Deploy Cisco SD-WAN Edge Configuration
Implement Cisco SD-WAN Overlay Routing
Deploy Cisco SD-WAN Policies - ENSDWI — Implementing Cisco SD-WAN Solutions v2.0
- Длительность: 5 дней (40 часов)
 - Код курса: ENSDWI
 - Стоимость
 - Очный формат: 697 000 ₸
 - Онлайн формат: 677 000 ₸
 
Описание курса
Course Description
The Implementing Cisco SD-WAN Solutions (ENSDWI) training helps you design, deploy, configure, and manage the Cisco Software-Defined WAN (SD-WAN) solution in a large-scale network, including how to migrate from legacy WAN to Cisco SD-WAN. You will learn best practices for configuring routing protocols in the data center and the branch, and how to implement advanced control, data, and application-aware policies. This training also covers Cisco SD-WAN deployment and migration options, placement of controllers, how to deploy WAN Edge devices, multicast and quality of service (QoS), how to configure Direct Internet Access (DIA) breakout, and how to deploy a Multi-Region Cisco SD-WAN fabric. You will also learn about the various Application Quality of Experience (AppQoE) traffic optimization capabilities. Finally, the training looks at the different Cisco SD-WAN security options available.
How You'll Benefit
This training will teach you to use Cisco SD-WAN to:
Establish a transport-independent WAN for lower cost and higher flexibility
Meet Service Level Agreements (SLAs) for business-critical and real-time applications
Provide secure end-to-end segmentation for protecting critical enterprise compute resources
Extend seamlessly into the public cloud
Optimize the user experience for Software-as-a-Service (SaaS) applicationsWho Should Enroll
Individuals seeking the Cisco CCNP Enterprise certification or the Cisco Certified Specialist—Enterprise SD-WAN Implementation
Pre- and post-sales network engineers involved in the installation, support, and troubleshooting of a Cisco SD-WAN overlay networkCourse Objectives
Describe the Cisco SD-WAN solution and how modes of operation differ in traditional WAN versus Cisco SD-WAN
Describe options for Cisco SD-WAN cloud and on-premises deployment
Explain how to deploy WAN Edge devices
Compare the Zero-Touch Provisioning (ZTP) and traditional Plug-n-Play (PnP) processes and examine technical specifics for on-premises deployment
Describe configuration groups and feature profiles for configuration management
Describe device and feature configuration templates
Describe options for providing scalability, high availability, and redundancy
Explain how dynamic routing protocols are deployed in Cisco SD-WAN environment, on the service side and transport side
Describe Cisco SD-WAN policy concepts, which includes how policies are defined, attached, distributed, and applied
Define and implement advanced control policies, such as policies for custom topologies and service insertion
Describe the Multi-Region Cisco SD-WAN fabric feature
Define and implement advanced data policies, such as policies for traffic engineering and QoS
Describe the Application Quality of Experience (AppQoE) capabilities available in Cisco SD-WAN
Define and implement an application-aware routing (AAR) policy
Implement Direct Internet Access (DIA) and Cisco SD-WAN Cloud OnRamp options
Describe Cisco SD-WAN security components and integration
Describe how to design pure and hybrid Cisco SD-WAN solutions, as well as how to perform a migration to Cisco SD-WAN
Describe the different tools and options available for managing a Cisco SD-WAN fabric
Describe the different options available for monitoring the Cisco SD-WAN fabric
Describe Cisco SD-WAN support for multicastCourse Prerequisites
Before taking this offering, you should have:
Knowledge of Software-Defined Networking (SDN) concepts as applied to large scale live network deployments
Strong understanding of enterprise WAN design
Strong understanding of routing protocol operation, including both interior and exterior routing protocol operation
Familiarity with Transport Layer Security (TLS) and IP Security (IPsec)Course Outline
Section 1: Examining the Cisco SD-WAN Architecture
Section 2: Examining Cisco SD-WAN Deployment Options
Section 3: Deploying WAN Edge Devices
Section 4: Managing Device Configuration
Section 5: Exploring Redundancy, High Availability, and Scalability
Section 6: Enabling Service-Side and Transport-Side Routing
Section 7: Understanding Cisco SD-WAN Policy Configuration Basics
Section 8: Defining Advanced Control Policies
Section 9: Defining Advanced Data Policies
Section 10: Implementing Application Quality of Experience
Section 11: Implementing AAR
Section 12: Examining DIA and Cisco Cloud OnRamp
Section 13: Exploring Cisco SD-WAN Security
Section 14: Designing and Migrating to Cisco SD-WAN
Section 15: Performing Cisco SD-WAN Network Management and Troubleshooting
Section 16: Examining Cisco SD-WAN Multicast SupportLab Outline
Discovery 1: Deploy Cisco SD-WAN Controllers
Discovery 2: Deploy Cisco SD-WAN Devices Using Configuration Groups
Discovery 3: Configure Cisco SD-WAN Controller Affinity
Discovery 4: Implement Service-Side Routing Protocols
Discovery 5: Implement TLOC Extensions
Discovery 6: Implement Control Policies
Discovery 7: Implement Data Policies
Discovery 8: Implement Application-Aware Routing
Discovery 9: Implement Branch and Regional Internet Breakouts
Discovery 10: Configure Application Firewall
Discovery 11: Migrate Branch Sites
Discovery 12: Perform Cisco SD-WAN Software Upgrade - DNAAS — Leveraging Cisco Intent-Based Networking DNA Assurance
- Длительность: 2 дня (16 часов)
 - Код курса: DNAAS
 - Стоимость
 - Очный формат: 523 000 ₸
 - Онлайн формат: 498 000 ₸
 
Описание курса
Course Overview
The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco® Digital Network Architecture (Cisco DNA™) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer.
This course will help you:
Monitor, identify, and respond to changing network and wireless conditions
Automate manual operations to reduce the costs associated with human errors, resulting in more uptime and improved security
Save time by using a single dashboard to manage and automate your networkWho should attend
This course is designed for network and software engineers who hold the following job roles:
Network administrators
Network operatorsPrerequisites
Before taking this course, you should have the following knowledge and skills: I
Internet web browser usability knowledge
Working knowledge of TCP/IP networking
Familiarity with network management concepts such as Simple Network Management Protocol (SNMP), Syslog, and NetFlow
The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Objectives
After taking this course, you should be able to:
Explain the benefits of using Cisco DNA Center in a traditional, enterprise network
Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts
Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance
Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends
Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause
Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applicationsCourse Outline:
Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS)
Introducing Cisco DNA Center Assurance
Monitoring Health and Performance with Cisco DNA Center Assurance
Troubleshooting Issues, Observing Insights and Trends
Troubleshooting Wireless Issues with Cisco DNA Center Assurance ToolsLab Topology
Prepare Cisco DNA Center for Assurance
Monitor Overall Health and the Health of Network Devices
Monitor the Health of Clients and Applications
Troubleshoot Network, Client, and Application Issues
Observer Assurance AI Network Analytics
Analyze Wireless Allocation, Capabilities, and Threats
Monitor Wireless Networks with Advanced Assurance Tools - ENTEIT — Implementing and Troubleshooting Networks Using Cisco ThousandEyes
- Длительность: 3 дня (24 часа)
 - Код курса: ENTEIT
 - Стоимость
 - Очный формат: 842 000 ₸
 - Онлайн формат: 747 000 ₸
 
Описание курса
Course Description
The Implementing and Troubleshooting Networks Using Cisco ThousandEyes (ENTEIT) training is designed to introduce you to and get you familiar with Cisco ThousandEyes. The focus of this training is implementation and configuration of the Cisco ThousandEyes solution. This training provides hands-on experience with installing and configuring Cisco ThousandEyes agents with different test types. This solution is also used to perform root cause analysis when troubleshooting.
This training also earns you 24 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Describe and define Cisco ThousandEyes
Integrate, implement, and deploy Cisco ThousandEyes solutions
Configure Cisco ThousandEyes agents
Perform root cause analysis when troubleshooting
Customize dashboard and reports
Monitor solutions
Administer the system
Earn 24 CE credits toward recertificationWho Should Enroll
Network Administrators
Network Engineers
Network Managers
System EngineersCourse Objectives
Introduce Cisco ThousandEyes
Describe different Enterprise Agent deployment options, requirements, and procedures for agent deployment
Describe different ThousandEyes test types
Compare ThousandEyes web layer tests
Describe, deploy, and configure an Endpoint Agent
Describe how to perform system administration
Utilize ThousandEyes when performing the root cause analysis
Describe Internet Insights
Explain alerts and dashboards configuration
Explain monitoring solutionsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic understanding of network fundamentals
Basic understanding of Internet Control Message Protocol (ICMP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), HTTP, SSL, and DNS protocol
These skills can be found in the following Cisco Learning Offering:Course Outline
Introducing Cisco ThousandEyes
Enterprise Agents Deployment
BGP, Network, DNS, and Voice Tests Configuration
Web Layer Tests Configuration
Endpoint Agent
System Administration
Network Troubleshooting with Cisco ThousandEyes
Internet Insights
Alerts and Dashboards Configuration
Monitoring SolutionsLab Outline
Schedule a Test
Deploy Enterprise Agent
Configure Network, DNS, and Voice Tests
Configure Web Server Tests
Configure Transaction Tests
Deploy and Configure an Endpoint Agent
Configure Account Administration
Utilize Device Layers
Examine Internet Insights
Configure Alerts
Build a Dashboard and Report - IBNTRN — Transforming to a Cisco Intent-Based Network
- Длительность: 5 дней (40 часов)
 - Код курса: IBNTRN
 - Стоимость
 - Очный формат: 1 317 500 ₸
 - Онлайн формат: 1 233 000 ₸
 
Описание курса
Course Overview
The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended.
How you’ll benefitThis course will help you:
Configure an open, software-driven approach that makes the network simpler, more agile, and responsive to business needs
Leverage the functionality of Cisco DNA Center to streamline operations, reduce costs, detect and contain threats, and continuously align the network to business needsWho should attend
Channel partners and resellers
Network administrators
Network engineers
Sales engineers
System engineers
Technical architects
Technical support personnelPrerequisites
To fully benefit from this course, you should have the following knowledge:
Understanding of network routing and switching principles equivalent to a CCNP® Enterprise level
Experience with Cisco Unified Wireless Network technologies
Experience with Cisco ISE, 802.1x, and Cisco TrustSec
Understanding of segmentation technologies such as VLANs and Virtual Routing and Forwarding (VRF)
Basic understanding of overlay technologies such as Virtual Extensible LAN (VXLAN)
Basic understanding of Locator ID Separation Protocol (LISP).
Recommended Cisco courses that may help you meet these prerequisites:
Understanding Cisco Wireless Foundations (WLFNDU)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
Configuring Cisco ISE Essentials for SD-Access (ISESDA)Course Objectives
After taking this course, you should be able to:
Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components.
Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance.
Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access.
Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding.
Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network.
Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access.
Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes.
Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network.
Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless.
Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution
Describe the use cases and migration scenarios for migrating users from traditional campus to SDCourse Outline:
Transforming to a Cisco Intent-Based Network (IBNTRN)
Introducing Cisco DNA Architecture
Cisco DNA Center Design
Cisco DNA Center Inventory
Cisco DNA Center Automation
Explore Cisco DNA Center and Automating Network Changes
Introducing Cisco Software-Defined Access
Deploying Cisco Software-Defined Access
Deploy Wired Fabric Networks with Cisco DNA Center
Cisco SD-Access for Wireless
Cisco SD-Access Extension for IoT
Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
Migrating to Cisco SD-Access
Cisco SD-Access Multicast
Integrating Cisco DNA Center
Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications
Understanding Programmable Network Infrastructure
Operating and Managing Cisco DNA Infrastructure
Test Drive Cisco DNA Center APIsLab Topology
Explore Cisco DNA Center and Automate Network Changes
Deploy Wired Fabric Networks with Cisco DNA Center
Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications - MCAST — Implementing Cisco Multicast
- Длительность: 5 дней (40 часов)
 - Код курса: MCAST
 - Стоимость
 - Очный формат: 744 500 ₸
 - Онлайн формат: 722 500 ₸
 
Описание курса
Course Description
The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco® routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully.
How You'll Benefit
This course will help you:
Gain a solid understanding of the fundamentals of IP multicasting
Understand the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco routers
Prepare to deploy IP multicast within a provider or customer networkWho Should Enroll
Network professionals, including systems engineers
Channel Partners
CustomersCourse Objectives
After taking this course, you should be able to:
Describe IP multicast services
Identify IP multicast issues on a data link layer
Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol
Describe Rendezvous Point (RP) distribution solutions
Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions
Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment
Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment
Describe solutions to mitigate security issues in the IP multicast network
Describe the process of monitoring and maintaining multicast high-availability operations
Design multicast-related application and network solutions in customer and service provider networks
Upon completion of this course, you will be able to:
Introduce IP multicast services, to evaluate the functional model of IP multicasting and the technologies present in IP multicasting, acknowledge IP multicast benefits and associated caveats, and determine various types of multicast applications in order to understand the IP multicast conceptual model and its implementation prerequisites
Identify IP multicast issues on a data link layer, explain the methods of mapping network layer multicast addresses to data link layer addresses, and list the mechanisms for constraining multicast streams in a LAN environment
Introduce Protocol Independent Multicast sparse mode (PIM-SM) as the most current scalable IP multicast routing protocol to learn the principles of protocol operation and details, become familiar with the determinism built into sparse mode multicast protocols, and configure and deploy PIM-SM in complex IP multicast network deploymentsCourse Prerequisites
It is recommended, but not required, that students have the following knowledge and skills:
Work experience and configuration skills for Cisco routers and LAN switches
CCNA Routing and Switching Certification
Attended the Implementing Cisco IP Routing (ROUTE) Training CourseCourse Outline
Module 1: IP Multicast Concepts and Technologies
Module 2: Multicast on the LAN
Module 3: PIM Sparse Mode
Module 4: Rendezvous Point Engineering
Module 5: PIM Sparse Mode Protocol Extensions
Module 6: Multiprotocol Extensions for BGP
Module 7: Interdomain IP Multicast
Module 8: IP Multicast Security
Module 9: Multicast Optimization and High-Availability Features
Module 10: Applications of MulticastLab Outline
Layer 2 and Layer 3 Multicast
PIM-SM Protocol Basics
PIM-SM Protocol Mechanics and Timers
PIM Sparse-Dense Mode and Manual RP Configuration
Configuring Dynamic RP Information Distribution
Bidirectional PIM
Source-Specific Multicast
Anycast RP, External MP-BGP, and MSDP Peering - SDWSCS — Implementing Cisco SD-WAN Security and Cloud Solutions
- Длительность: 3 дня (24 часа)
 - Код курса: SDWSCS
 - Стоимость
 - Очный формат: 457 000 ₸
 - Онлайн формат: 444 000 ₸
 
Описание курса
Course Description
The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) training teaches you advanced knowledge and skills related to Cisco software-defined wide area network (SD-WAN) security and cloud services. Through a series of labs and lectures, you will learn about on-box security services, including application-aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and Transport Layer Security (TLS) or Secure Socket Layer (SSL) decryption. You will also learn about cloud integration with multiple cloud service providers across multiple use cases.
Additionally, the labs will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows.
This training also earns you 24 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Gain introductory knowledge of the security and cloud services available in Cisco SD-WAN
Expand your knowledge of integrated security services, such as the application aware firewall and intrusion prevention and cloud and collocated security services in on-premises and private or public cloud environments
Understand drivers, benefits, available features, and architecture of Cisco SD-WAN integrated and distributed security and cloud networking services
Gain leading-edge skills for high-demand responsibilities focused on security and cloud services
Earn 24 CE credits towards recertificationWho Should Enroll
Network Engineers
Network Security Engineers
Network Architects
Sales/Presales EngineersCourse Objectives
Describe Cisco SD-WAN security functions and deployment options
Understand how to deploy on-premises threat prevention
Describe content filtering options
Implement secure Direct Internet Access (DIA)
Explain and implement service chaining
Explore Secure Access Service Edge (SASE) and identify use cases
Describe Cisco Umbrella SIG and deployment options
Implement Cisco Umbrella SIG and DNS policies
Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365)
Discover how to use Cisco ThousandEyes to monitor cloud services
Configure Cisco ThousandEyes to monitor Microsoft 365 applications
Examine how to protect and optimize access to the software as a service (SaaS) application with Cisco SD-WAN Cloud OnRamp
Discover and deploy Cloud OnRamp for multi-cloud, including interconnect and collocation use cases
Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalyticsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic understanding of enterprise routing
Basic understanding of WAN networking
Basic understanding of Cisco SD-WAN
Basic understanding of public cloud services
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing Cisco SD-WAN Solutions (ENSDWI)
Cisco SD-WAN Operation and Deployment (SDWFND)Course Outline
Introducing Cisco SD-WAN Security
Deploying On-Premises Threat Prevention
Examining Content Filtering
Exploring Cisco SD-WAN Dedicated Security Options
Examining Cisco SASE
Exploring Cisco Umbrella SIG
Securing Cloud Applications with Cisco Umbrella SIG
Exploring Cisco SD-WAN ThousandEyes
Optimizing SaaS Applications
Connecting Cisco SD-WAN to Public Cloud
Examining Cloud Interconnect Solutions
Exploring Cisco Cloud OnRamp for Colocation
Monitoring Cisco SD-WAN Cloud and Security SolutionsLab Outline
Configure Threat Prevention
Implement Web Security
Deploy DIA Security with Unified Security Policy
Deploy Service Chaining
Configure Cisco Umbrella DNS Policies
Deploy Cisco Umbrella Secure Internet Gateway
Implement CASB Security
Microsoft 365 SaaS Testing by Using Cisco ThousandEyes
Configure Cisco OnRamp for SaaS
Deploy Cisco SD-WAN Multicloud Gateways
Cisco vAnalytics Overview - CCECE — Implementing Cisco Contact Center Enterprise Chat & Email
- Длительность: 4 дня (32 часа)
 - Код курса: CCECE
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 1 059 000 ₸
 
Описание курса
Course Description
The Implementing Cisco Contact Center Enterprise Chat and Email (CCECE) v1.0 course teaches you how to deploy Cisco® Enterprise Chat and Email (ECE) into an existing Enterprise Contact Center environment. You will learn the steps required to prepare and configure both Cisco Packaged Contact Center Enterprise (PCCE) and ECE environments for integration, as well as gain experience with the operation and administration tasks required for initial ECE deployment. Additionally, you will experience ongoing system administration tasks such as enabling Single Sign-On (SSO), importing objects, preparing queues and workflows, using the scripting tool, generating reports, and enabling system logs for troubleshooting. Finally, you will also learn how to implement features that enhance ECE operations for Agents.
How You'll Benefit
This course will help you:
Configure, integrate, and deploy Cisco Enterprise Chat and Email into existing Enterprise Contact Center environments
Grow your understanding of Cisco ECE administration and featuresWho Should Enroll
Deployment engineers
Course Objectives
After taking this course, you should be able to:
Describe the ECE solution as deployed with Cisco Contact Center Enterprise (CCE)
Define the components of ECE that make up the available deployment models available for enterprise solutions
Utilize the Classic ECE interface to differentiate between partitions
Utilize the Classic ECE interface to differentiate between processes and instances
Configure the PCCE requirements necessary to integrate ECE
Configure the requirements necessary to integrate ECE with the Single Pane of Glass used with PCCE
Configure the requirements necessary to integrate ECE with email services
Add the ECE Agent gadget to the Cisco Finesse Desktop layout
Describe the installation requirements for a high-availability deployment of ECE
Describe a basic email and chat call flow through the ECE/PCCE environment
Understand the general operational requirements for adding CCE Agent, skill, and scripting objects and importing them into CCE
Navigate the administrative tabs in both the Business Partition and Department view of the Single Pane of Glass
Add and import objects into the ECE
Describe the configurations options found in the Email and Chat Queue
Describe the configuration and verification of chat functionality in a CCE ECE environment
Configure and verify ECE settings
Configure an entry point for a chat queue and introduce template sets
Customize the chat experience
Define and verify the configuration requirements to deploy callback and delayed callback
Describe the benefits of implementing Agent Single Sign-on in the ECE/CCE environment
Configure the requirements necessary to implement Agent Single Sign-on in the ECE/CCE environmentCourse Prerequisites
Before taking this course, student should have:
Strong knowledge of computer networking components: Windows A/D, SQL
Strong understanding of IP networks
Advanced experience administering Cisco Packaged Contact Center Enterprise
Experience deploying Cisco Packaged Contact Center EnterpriseCourse Outline
Deploying Cisco Enterprise Chat and Email
ECE General administration
Cisco ECE Email administration
Cisco ECE Chat administration
Cisco Enterprise Chat and Email features
Lab outline
Navigate CCE discovery architecture and components
Navigate ECE and CCE discovery architecture and components
Navigate ECE Email and Cisco Finesse integration
Add and Import CCE Resources into ECE
Personalize the Email Trail
Build a Department Workflow
Build CCE Script for Email
Agent Verification of Email
Configure and Verify Chat Operation
Customize Chat
Explore Reporting for ECE
Support Single Sign On (SSO) for ECE
Troubleshoot ECELab Outline
Navigate CCE discovery architecture and components
Navigate ECE and CCE discovery architecture and components
Navigate ECE Email and Cisco Finesse integration
Add and Import CCE Resources into ECE
Personalize the Email Trail
Build a Department Workflow
Build CCE Script for Email
Agent Verification of Email
Configure and Verify Chat Operation
Customize Chat
Explore Reporting for ECE
Support Single Sign On (SSO) for ECE
Troubleshoot ECE - ENNA — Designing and Implementing Enterprise Network Assurance
- Длительность: 4 дня (32 часа)
 - Код курса: ENNA
 - Стоимость
 - Очный формат: 967 500 ₸
 - Онлайн формат: 878 000 ₸
 
Описание курса
Course Description
The Designing and Implementing Enterprise Network Assurance (ENNA) training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training collectively encompasses a broad spectrum of network assurance and monitoring aspects. You will overview different Cisco assurance products, Cisco ThousandEyes, and Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day operations that ensure continuous, seamless network assurance.
This training prepares you for the 300-445 ENNA v1.0 exam. If passed, you earn the Enterprise Network Assurance Specialist certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification. This training also earns you 32 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Position different assurance products from Cisco portfolio
Install, configure, and manage Cisco ThousandEyes solution
Utilize Cisco ThousandEyes to perform network troubleshooting
Configure and leverage Meraki Insight and available dashboard tools to manage network assurance in Meraki environments
Prepare for the 300-445 ENNA v1.0 exam
Earn 32 CE credits toward recertificationWho Should Enroll
Network Administrators
System Engineers
Network Analysts
NOC Operators
IT ProfessionalsWhat to Expect in the Exam
Designing and Implementing Enterprise Network Assurance (300-445 ENNA) v1.0 is a 90-minute exam associated with the Enterprise Network Assurance Specialist certification and satisfies the concentration exam requirement for the CCNP Enterprise certification.
The multiple-choice format tests your knowledge of network assurance design and implementation, including:
Platforms and architecture
Data collection and implementation
Data analysis
Insights and alertsCourse Objectives
Describe enterprise network assurance
Describe how to monitor health and performance with Cisco Catalyst Center Assurance
Introduce Cisco AppDynamics, Cisco Catalyst SD-WAN Assurance, and Cisco ThousandEyes
Describe different Enterprise Agent deployment options, requirements, and procedures for agent deployment
Describe different ThousandEyes test types
Compare ThousandEyes web layer tests
Describe, deploy, and configure an Endpoint Agent
Describe how to perform system administration
Utilize ThousandEyes when performing the root cause analysis
Describe Internet Insights
Explain alerts and dashboards configuration
Explain monitoring solutions
Describe Cisco Meraki Network Assurance
Showcase Cisco Meraki InsightsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic understanding of network fundamentals
Basic understanding of Internet Control Message Protocol (ICMP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), Hypertext Transfer Protocol Secure (HTTPS), Secure Sockets Layer (SSL), and Domain Name System (DNS) protocol
Basic familiarity with Cisco Catalyst SD-WAN, Cisco Catalyst Center, and Cisco Meraki
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Enterprise Network Assurance Overview
Introduction to Cisco Catalyst Center Assurance
Introduction to Splunk AppDynamics
Introduction to Cisco Catalyst SD-WAN Assurance
Introduction to Cisco ThousandEyes
Enterprise Agents Deployment
BGP, Network, DNS, and Voice Tests Configuration
Web Layer Tests Configuration
Endpoint Agent
System Administration
Network Troubleshooting with Cisco ThousandEyes
Internet Insights
Alerts and Dashboards Configuration
Monitoring Solutions
Cisco Meraki Network Assurance
Cisco Meraki InsightLab Outline
Troubleshoot the Health of Network Devices
Explore Cisco Catalyst SD-WAN Analytics
Schedule a Test
Deploy Enterprise Agent
Configure Network, DNS, and Voice Tests
Configure Web Server Tests
Configure Transaction Tests
Deploy and Configure an Endpoint Agent
Configure Account Administration
Utilize Device Layers
Examine Internet Insights
Configure Alerts
Build a Dashboard
Implementing Network Assurance with Cisco Meraki
Examine Cisco Meraki Insight - ECMS — Engineering Cisco Meraki Solutions
- Длительность: 4 дня (32 часов)
 - Код курса: ECMS
 - Стоимость
 - Очный формат: 840 000 ₸
 - Онлайн формат: 750 500 ₸
 
Описание курса
Course Description
The Engineering Cisco Meraki Solutions training helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This training combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. This training helps prepare you for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.
This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Gain a comprehensive understanding of the Cisco Meraki platform
Develop expertise in designing, implementing, and securing Cisco Meraki networks
Operate and manage networks using Cisco Meraki’s cloud-based tools and features
Apply advanced monitoring and troubleshooting techniques
Prepare for the ECMS 500-220 exam
Earn 24 CE credits towards recertificationWho Should Enroll
This training is designed for anyone seeking the Cisco Meraki Solution Specialist certification. The training provides foundational knowledge and skills to engineer Cisco Meraki solutions, including cloud management, design, implementation, monitoring, troubleshooting, and the comprehensive features of the Cisco Meraki product suite.
The job roles best suited to the material in this training are:
Consulting Systems Engineers
Deployment Engineers
Network Administrators
Network Engineers
Network Managers
Site Reliability Engineers
Systems Engineers
Technical Solutions Architects
Wireless Design Engineers
Wireless Engineers
Sales Engineers
Account ManagersWhat to Expect in the Exam
Cisco Meraki Solutions Specialist (ECMS 500-220) is a 90-minute exam associated with the Cisco Meraki Solutions Specialist certification.
The exam tests your knowledge and skills to engineer Meraki solutions, including:
Cloud management
Design
Implementing
Monitoring
TroubleshootingCourse Objectives
Describe Cisco Meraki cloud architecture, administration, and licensing
Describe the hardware and features of Cisco Meraki product families
Describe best practices for troubleshooting and when to contact Cisco Meraki support
Plan new Cisco Meraki architectures and expand existing deployments
Design the network for scalable management and high availability
Describe how to automate and scale Cisco Meraki deployments with dashboard tools
Use dynamic routing protocols to expand networks and improve wide-area network (WAN) performance
Describe proper quality of service (QoS), policy, and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
Describe virtual private network (VPN) and WAN topologies and how to integrate them
Secure, expand, and shape the network
Implement switched network concepts and practices, and configure guest networks
Implement wireless configuration practices and concepts
Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
Describe physical security concepts and practices
Gain network insight by monitoring applications
Describe how to prepare monitoring, logging, and alerting services
Set up reporting and auditing capabilities in the Cisco Meraki dashboard
Monitor and troubleshoot issues using Cisco Meraki toolsCourse Prerequisites
Before taking this offering, you should have earned a Cisco Certified Networking Associate (CCNA) certification or be familiar with:
General Networking
Be actively engaged in the design, deployment, scaling, configuration, and management of enterprise networks, IPsec, and associated VPN technologies
Be experienced with hierarchical network segmentation (access, distribution, and core layer) design and best practices
Strong fundamental knowledge of internet protocol (IP) addressing and subnetting schemas necessary to build local area networks (LANs)
A foundational understanding of network authentication, authorization, and accounting services
Strong fundamental knowledge of dynamic routing protocols with focus and emphasis on open shortest path first (OSPF) and border gateway protocol (BGP)
A foundational understanding of wired and wireless QoS mechanisms, packet queue operations, and practical implementations
A foundational understanding of threat modeling concepts and methodologies and the ability to apply them to identify, analyze, and respond to cybersecurity threats
A foundational understanding of network security controls and protocols, network management best practices, and data security
Intermediate fundamental knowledge of radio frequency (RF) concepts, terminology, design principles, and practical implementations as they apply to wireless networking and current 802.11 wireless standards
A foundational understanding of wireless security best practices centered on access control (802.1x) and spectrum security through wireless intrusion detection system (WIDS) and prevention system (WIPS)
A foundational understanding of standard logging and monitoring protocols with a focus and emphasis on simple network management protocol (SNMP), syslog, and webhooks, and related implementation components or tools
Be familiar with and have basic knowledge of Application Programming Interface (APIs) and related languages and formats, such as representational state transfer (REST) and JavaScript Object Notation (JSON)
The following recommended Cisco offerings may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Introducing the Cloud and the Cisco Meraki Dashboard
Introducing Cisco Meraki Products and Administration
Introducing Cisco Meraki Troubleshooting
Planning New Cisco Meraki Architectures and Expanding Existing Deployment
Designing for Scalable Management and High Availability
Automating and Scaling Cisco Meraki Deployments
Designing Routing on the Cisco Meraki Platform
Introducing QoS and Traffic Shaping Design
Building VPN and WAN Topologies
Securing, Expanding, and Shaping the Network
Introducing Switched Network Concepts and Practices
Implementing Wireless Configuration Practices and Concepts
Introducing Endpoint Management Concepts and Practices
Introducing Physical Security Concepts and Practices
Gaining Network Insight by Monitoring Applications
Preparing, Monitoring, Logging, and Alerting Services
Setting Up Reporting and Auditing Capabilities in the Cisco Meraki Dashboard
Gaining Visibility and Resolving Issues Using Cisco Meraki ToolsLab Outline
Configure the Cisco Meraki Dashboard
Enable Advanced Features and Optimize Networking
Troubleshoot the Network Using the Cisco Meraki Dashboard
Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
Configure Routing on the Cisco Meraki Platform
Configure QoS, Traffic Shaping, and Load Balancing
Configure Network Security
Configure Access Policies and Wireless Guest Access
Configure SSIDs, RF Profiles, and Air Marshal
Implement Endpoint Management
Deploy and Configure Physical Security Devices
Enable Alerts and Configure Monitoring and Reporting
Troubleshoot a Cisco Meraki Network - ENAUI — Implementing Automation for Cisco Enterprise Solutions
- Длительность: 3 дня (24 часа)
 - Код курса: ENAUI
 - Стоимость
 - Очный формат: 851 500 ₸
 - Онлайн формат: 835 500 ₸
 
Описание курса
Course Description
The Implementing Automation for Cisco Enterprise Solutions (ENAUI) training teaches you how to implement Cisco Enterprise automated solutions, including programming concepts, orchestration, telemetry, and automation tools.
This course highlights the tools and the benefits of leveraging programmability and automation in the Cisco-powered Enterprise Campus and WAN. You will also examine platforms including IOS XE software for device-centric automation, Cisco DNA Center for the intent-based enterprise network, Cisco Software-Defined WAN, and Cisco Meraki. Their current ecosystem of APIs, software development toolkits, and relevant workflows are studied in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG.
How You'll Benefit
This course will help you:
Gain high-demand skills using modern programming languages, APIs, and systems such as Python, Ansible, and Git to automate, streamline, and enhance business operations.
Acquire the skills and knowledge to customize tools, methods, and processes that improve network performance and agility
Earn 24 CE credits toward recertification
Prepare for the 300-435 ENAUTO examWho Should Enroll
This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:
Account manager
Consulting systems engineer
Network administrator
Network engineer
Network manager
Sales engineer
Systems engineer
Technical solutions architect
Wireless design engineer
Wireless engineerWhat to Expect in the Exam
What to expect in the exam
The 300-435 ENAUTO exam certifies your knowledge and skills in implementing Enterprise automated solutions, including programming concepts, Python programming, APIs, controllers, and automation tools.
After you pass 300-435 ENAUTO, you earn the Cisco Certified DevNet Specialist - Enterprise Automation and Programmability certification, and you satisfy the concentration exam requirement for these professional-level certifications:
CCNP Enterprise
Cisco Certified DevNet ProfessionalCourse Objectives
After completing the course, you should be able to:
Get familiar with different API styles (REST, RPC) and synchronous and asynchronous API requests
Learn how to use Postman software development tool in order to test the API calls
Learn how to automate repetitive tasks using Ansible automation engine
Explore a Python programming language, Python libraries and Python virtual environments and learn how can they be used for automation of network configuration tasks
Get introduced to GIT version control system and its common operations
Learn how to leverage the various models and APIs of the Cisco IOS XE platform to perform day-zero operations, improve troubleshooting methodologies with custom tools, augment the CLI using scripts, and integrate various workflows using Ansible and Python
Learn about the paradigm shift of model-driven telemetry and the building blocks of a working solution
Learn how to leverage the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center™
Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman
Understand Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure
Learn how to leverage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible, and PostmanCourse Prerequisites
Before taking this course, you should have the following knowledge and skills:
Basic programming language concepts
Basic understanding of virtualization
Ability to use Linux and CLI tools, such as Secure Shell (SSH) and bash
CCNP level core networking knowledge
Foundational understanding of Cisco DNA, Meraki, and Cisco SD-WAN
The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Introducing Automation for Cisco Solutions (CSAU)
Implementing and Administering Cisco Solutions (CCNA®)
Implementing Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Network Programmability Foundation
Automating APIs and Protocols
Managing Configuration with Python and Ansible
Implementing On-Box Programmability and Automation with Cisco IOS XE Software
Implementing Model-Driven Telemetry
Day 0 Provisioning with Cisco IOS-XE Software
Implementing Automation in Enterprise Networks
Building Cisco DNA Center Automation with Python
Automating Operations using Cisco DNA Center
Introducing Cisco SD-WAN Programmability
Building Cisco SD-WAN Automation with Python
Building Cisco SD-WAN Automation with Ansible
Automating Cisco Meraki
Implementing Meraki Integration APIsLab Outline
Automate Networks with Netmiko
Use Postman for REST API Consumption
Use Ansible to Configure and Verify Device Configuration
Implement On-Box Programmability and Automation with Cisco IOS XE Software
Use Python on Cisco IOS XE Software
Implement Streaming Telemetry with Cisco IOS XE
Explore Cisco DNA Center APIs
Build Python Scripts to Interact with Cisco DNA Center Intent APIs
Build Python Scripts with Cisco DNA Center Assurance APIs
Troubleshoot End-to-End Connectivity and Health-Check the Network via the Cisco DNA Center API
Perform Administrative Tasks Using the Cisco SD-WAN API
Build, Manage, and Operate Cisco SD-WAN Programmatically
Consume SD-WAN APIs Using the Uniform Resource Identifier (URI) Module
Manage Policies with Ansible
Build Reports Using Ansible-Cisco SD_WAN Role
Implement Cisco Meraki API Automation
Explore Cisco Meraki Integration APIs
Explore Cisco Meraki Webhook Alerts 
Antcolony — Кибербезопасность
- ANT0000 — Основы кибербезопасности
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0000
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы кибербезопасности: направления и сегменты деятельности этой технологической отрасли, классы и типы её продуктов, технологии и методики их использования. Материал курса построен на принципе, согласно которому кибербезопасность – это, прежде всего, процесс, поэтому большое внимание уделяется тому, как
именно выстроить процессы кибербезопасности корпоративного уровня в рамках её единой архитектуры.Аудитория курса:
Люди, начинающие знакомиться с кибербезопасностью, а также люди, желающие систематизировать свои знания в этой области.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Контроль доступа и его типы.
Механизмы контроля доступа.
Принципы построения архитектуры кибербезопасности.Модуль 2 – Моделирование угроз и оценка рисков кибербезопасности.
Методики моделирования угроз.
Методики оценки и управления рисками.
Построение процессов и архитектуры кибербезопасности на основе модели угроз.
Работа с персональными данными и приватность информации.Модуль 3 – Безопасность сетей TCP/IP.
Функциональная классификация механизмов защиты TCP/IP сетей.
Контроль доступа к локальной сети. Защита от ARP и DHCP атак.
Контроль доступа к локальной сети. 802.1x.
Репутационная аналитика. IP, DNS и URL фильтрация.
Фильтрация сетевого трафика. Firewall и IPS.
Защита от DoS и DDoS атак.
Защита Wi-Fi сетей.Модуль 4 – Криптография и VPN.
Принципы шифрования данных.
Симметричные шифры.
Асимметричные шифры.
PKI.
Принципы обеспечения целостности данных.
Алгоритмы создания MAC.
Принципы построения защищенных каналов связи.
Принципы работы VPN.
Классификация и архитектуры VPN.Модуль 5 – Безопасность операционных систем.
Принципы обеспечения защиты информации внутри ОС.
Модели безопасности ОС.
Безопасность ОС Windows.
Безопасность ОС Linux.
Безопасность macOS.
Безопасность мобильных ОС.Модуль 6 – Безопасность приложений.
Безопасность Web-приложений.
Безопасность электронной почты.
Безопасность IP-телефонии.
Безопасность облачной инфраструктуры Microsoft365.
Безопасность платформ виртуализации.Модуль 7 – Безопасность индустриальных объектов.
Объекты и системы индустриальной инфраструктуры.
Компоненты обеспечения кибербезопасности индустриальных объектов.
Архитектура кибербезопасности индустриальных объектов.Модуль 8 – Операционная кибербезопасность.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Threat Intelligence.
Анализ уязвимостей.
Reverse Engineering вредоносного п/о.
Проведение Pentest’а.
Цифровая криминалистика.Модуль 9 – Проектирование и управление кибербезопасностью.
Принципы управления кибербезопасностью.
Построение процессов управления кибербезопасностью.
Политики кибербезопасности.
Оценка и метрики работы процессов кибербезопасности.
Построение корпоративного SoC’а. - ANT-S101 — Кибербезопасность для специалистов по продажам: от технологий к бизнес-ценности
- Длительность: 3 дня (24 часа)
 - Код курса: ANT-S101
 - Стоимость
 - Очный формат: 293 000 ₸
 - Онлайн формат: 235 000 ₸
 
Описание курса
Описание курса:
Данный курс разработан для специалистов по продажам и менеджеров по работе с клиентами, работающих в сфере информационной безопасности (ИБ). В условиях растущих киберугроз способность говорить с клиентом на одном языке, понимать его бизнес-задачи и pain points, а также грамотно доносить ценность решений становится ключевым конкурентным преимуществом.
Данный курс предоставляет всеобъемлющее, нейтральное к вендорам понимание фундаментальных принципов кибербезопасности. Слушатели научатся анализировать потребности различных стейкхолдеров в организации заказчика (от CEO до технических специалистов), понимать архитектуру современных систем защиты и формулировать выгоды предлагаемых решений в контексте бизнес-целей и управления рисками. Программа сочетает теоретические основы с практическими кейсами, что позволяет немедленно применять полученные знания в работе с клиентами. Для максимального усвоения материала в курсе используется комбинация эффективных методик:
Интерактивные лекции с опорой на реальные примеры из индустрии.
Групповые дискуссии и анализ бизнес-кейсов.Аудитория курса:
Специалисты по продажам решений и услуг в области ИБ.
Менеджеры по работе с клиентами из ИТ- и ИБ-компаний.
Бизнес-разработчики (Business Development Managers).
Пре-сейлз-инженеры, желающие углубить понимание бизнес-аспектов ИБ.Содержание курса:
День 1: Ландшафт киберугроз. Говорим на языке бизнеса.
Модуль 1: Введение в кибербезопасность: почему это стратегическая бизнес-функция, а не просто ИТ-задача.
Модуль 2: Бизнес-контекст ИБ: риски, соответствие (GDPR, 152-ФЗ, PCI DSS) и стоимость инцидентов.
Модуль 3: Понимание аудитории: роли и интересы основных стейкхолдеров (CEO, CFO, CTO, CISO).
Модуль 4: Современный ландшафт киберугроз: атаки на людей (фишинг, социальная инженерия), атаки на приложения и данные.День 2: Архитектура защиты. От концепций к средствам защиты.
Модуль 5: Принципы построения безопасной архитектуры: «Оборонительная глубина» (Defense-in-Depth) и «Нулевое доверие» (Zero Trust).
Модуль 6: Защита периметра и сети: Фаерволы нового поколения (NGFW), IPS/IDS, VPN.
Модуль 7: Защита конечных точек и данных: EDR/XDR, антивирусные решения, шифрование и DLP-системы.
Модуль 8: Идентификация и доступ: IAM, MFA, принцип наименьших привилегий.День 3: Операции и стратегия. Продажа ценности и комплексных решений.
Модуль 9: Центры управления безопасностью (SOC): процессы мониторинга, обнаружения и реагирования на инциденты (SIEM, SOAR).
Модуль 10: Управление уязвимостями и политиками безопасности.
Модуль 11: Стратегический подход: Обсуждение ИБ-стратегии с CISO и руководством. Жизненный цикл продажи комплексного решения.
Модуль 12: Практикум: Разбор кейса. От идентификации потребностей клиента до презентации ценностного предложения, ЖЦ ИБ решения. - ANT0001 — Практическая криптография
- Длительность: 10 дней (80 часов)
 - Код курса: ANT0001
 - Стоимость
 - Очный формат: 1 378 000 ₸
 - Онлайн формат: 1 356 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить теорию и практику использования криптографии в современных реалиях кибербезопасности.
Аудитория курса:
Люди, начинающие знакомиться с кибербезопасностью и криптографией, а также люди, желающие систематизировать свои знания в этой области.
Предварительные требования к аудитории:
Необходимо обладать знаниями общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Дополнительные критерии защищенности информации.
Контроль доступа и его типы.
Механизмы контроля доступа.
Архитектура корпоративной кибербезопасности.Модуль 2 – Моделирование угроз и оценка рисков кибербезопасности.
Методики моделирования угроз.
Методики оценки и управления рисками.
Построение процессов и архитектуры кибербезопасности на основе модели угроз.Модуль 3 – Основы криптографии.
Криптографические преобразования.
Принципы Кирхгофа при построении криптосистем.
Симметричная криптография.
Режимы работы симметричных шифров.
Асимметричная криптография.
Теоретическая и практическая криптография.
Криптографические примитивы.Модуль 4 – Хэш-функции.
Принципы работы и свойства хэш-функций.
Алгоритмы и стандарты хэш-функций.
Использование хэш-функций.Модуль 5 – Контроль целостности данных.
Использование хэш-функций для контроля целостности данных.
Коды проверки аутентичности/целостности сообщений (MAC).
Использование механизма MAC.
Алгоритмы шифрования со встроенной проверкой целостности.Модуль 6 – Обмен криптографическими ключами.
Принципы обмена и согласования ключей.
Алгоритмы Diffie-Hellman, Elliptic Curve Diffie-Hellman.
Алгоритм Ephemeral Diffie-Hellman.
Протоколы обмена ключами на основе алгоритмов DH, ECDH, DHE.
Серверы управления ключами (KMS).Модуль 7 – Асимметричная криптография.
Принципы работы ассиметричной криптографии.
Работа с ключами шифрования ассиметричной криптографии.
Инфраструктура PKI и стандарты PKCS.
Гибридные криптосистемы.Модуль 8 – Цифровые подписи и алгоритмы Zero-Knowledge Proofs.
Принципы и алгоритмы создания цифровой подписи.
Применение цифровых подписей.
Алгоритмы Zero-Knowledge Proofs и их практическое использование.Модуль 9 – Генераторы случайных чисел.
Случайные числа в криптографии.
Генераторы псевдослучайных чисел.
Генерация ключей шифрования и материала для их создания.Модуль 10 – Шифрование при передаче данных.
Передача данных и VPN.
Протоколы TLS.
Стек протоколов IPsec.
Протокол шифрования MACsec.
Шифрование данных в сетях Wi-Fi.
Шифрование данных IP-телефонии.
Алгоритмы Identity-Based Encryption.
Шифрование электронной почты. GPG, PGP и S/MIME.
Шифрование мгновенных сообщений.
Протокол Noise.Модуль 11 – Шифрование при хранении данных.
Жесткие диски со встроенной функцией шифрования.
Шифрование данных в ОС.
Шифрование данных средствами платформ виртуализации.Модуль 12 – Криптография в алгоритмах аутентификации.
Хранение паролей и параметров учетных записей.
Принципы делегирования и распределенная аутентификация.
Цифровые токены и защищенные смарт-карты.
Использование ZKP для аутентификации.
Криптографические примитивы систем SSO.Модуль 13 – Аппаратные криптографические модули.
Криптографические примитивы CPU.
Криптографические токены.
Проблемы доверия в информационных системах.
Hardware Security Modules.
Trusted Platform Modules.Модуль 14 – Современные направления развития криптографии.
Концепция Next-Generation Cryptography.
Light-Weight Cryptography.
Гомоморфное шифрование.
Криптографические примитивы Zero-Knowledge Proofs.
Асимметричная криптография без цифровых сертификатов.
Blockchain и смарт-контракты.
Квантовая криптография.Модуль 15– Методы криптоанализа и взлома шифров.
Дифференциальный криптоанализ.
Модель оракула и атаки на протоколы защиты данных.
Атаки по сторонним каналам. - ANT0002 — Основы небезопасности
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0002
 - Стоимость
 - Очный формат: 452 000 ₸
 - Онлайн формат: 431 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям увидеть на примерах, что такое кибератаки и как они «работают» без погружения в тонкие технические нюансы поиска уязвимостей и написания эксплойтов. Эти знания помогут понять как лучше защищаться от угроз в киберпространстве.
Аудитория курса:
Люди, начинающие знакомиться с кибербезопасностью, а также инженеры, желающие систематизировать свои знания в этой области.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 – Как «работает» кибератака.
Пример атаки через web-приложение.
Пример атаки через сетевое оборудование.
Пример атаки на Wi-Fi.
Пример атаки через промышленный контроллер.
Пример компрометации учетной записи.
Пример заражения вредоносным п/о мобильного телефонаМодуль 2 – Уязвимости и угрозы.
Что такое уязвимость?
Классификация уязвимостей.
Когда уязвимость становится угрозой?
Что такое attack surface?
Модель угроз.Модуль 3 – Insider Threat.
Человеческий фактор в ходе проведения атаки.
Пример организации утечки данных.
Пример компрометации учетной записи администратора.
Злоумышленник внутри компании. - ANT-N101 — Сети TCP/IP
- Длительность: 5 дней (40 часов)
 - Код курса: ANT-N101
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу современных сетей передачи данных, работающих на основе стека протоколов TCP/IP.
Аудитория курса:
Люди, начинающие знакомиться с технологиями передачи данных в современных реалиях.
Предварительные требования к аудитории:
Желательно иметь общее представление о т.н. электрической связи.
Содержание курса:
Модуль 1 – Построение локальной сети (LAN).
Архитектура локальной сети.
Стандарты Ethernet.
Коммутация.
CAM-таблицы и MAC-адреса.
Физическая избыточность в локальных сетях.
Протоколы STP, RSTP, MSTP.
Агрегирование интерфейсов. EtherChannel.
Виртуальные локальные сети (VLAN’ы).
Функции PoE на коммутаторах.Модуль 2 – Объединение локальных сетей. Маршрутизация.
Принципы маршрутизации.
Балансировка нагрузки ECMP.
Статическая и динамическая маршрутизация.
Протоколы OSPF и BGP.
Перераспределение и фильтрация маршрутной информации.
Интегрированные коммутация и маршрутизация.Модуль 3 – Передача данных приложений через сеть.
Функции мультиплексирования приложений.
Требования приложений к сети.
Механизмы QoS.
Стек протоколов TCP/IP.Модуль 4 – Подключение локальной сети к сервис-провайдеру.
Ограничения пространства IPv4 адресов.
Трансляция сетевых адресов (NAT).
Функции NAT helper и Application Layer Gateway.
FireWall’ы и Proxy-сервисы.
IPv6 адреса.
Концепция и технологии SD-WAN.Модуль 5 – Виртуальные частные сети.
Принципы работы VPN.
Классификация и архитектуры VPN.
Туннелирование GRE и IP-in-IP.
Стек протоколов IPsec.Модуль 6 – Программно-определяемые сети.
Классическая архитектура ЦоД’ов.
Виртуализация и развитие архитектуры ЦоД’ов.
Архитектура Spine-Leaf. VXLAN.Модуль 7 – Аппаратные компоненты сетевого оборудования.
Архитектура коммутаторов и маршрутизаторов.
Классификация алгоритмов и механизмов пересылки (forwarding’а) трафика.
Реализация системы очередей на сетевом оборудовании.Модуль 8 – Работа сетевого стека на конечных устройствах.
Стек протоколов TCP/IP на конечных устройствах.
Strong/Weak Host модели работы конечных устройств.
Методы оптимизации работы стека TCP/IP.
Виртуальные интерфейсы и коммутаторы на конечных устройствах - ANT0011 — Фильтрация трафика
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0011
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии, конкретные механизмы и методы их применения для предотвращения, обнаружения и реагирования на угрозы кибербезопасности путем фильтрации сетевого трафика.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, инфраструктуры корпоративных приложений, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Задачи фильтрации трафика.
Сегментация сети.
Модель угроз для корпоративной инфраструктуры.
Классификация механизмов фильтрации трафика.
Концепция Unified Threat Management (UTM).Модуль 2 – Репутационная фильтрация.
Threat Intelligence.
Репутационная фильтрация IP-адресов.
Репутационная фильтрация DNS-запросов.
Репутационная фильтрация URL-путей.Модуль 3 – Firewall. Предотвращение атак.
Технологические подходы к реализации механизма Firewall.
Концепция Next-Generation Firewall (NGFW).
Фильтрация трафика Firewall’ом на основании информации о пользователях (Identity-based Firewall) и приложениях (Application-aware Firewall).Модуль 4 – IPS. Обнаружение и реагирование на атаки.
Реализация механизмов IPS.
Создание и обновление правил фильтрации IPS.
Концепция Next-Generation IPS (NGIPS).Модуль 5 – Anti-Virus. Обнаружение вредоносного п/о.
Применение сетевого Anti-Virus’а для фильтрации трафика.
Углубленная Anti-Virus’ная фильтрация. Sandbox.Модуль 6 – Обработка инцидентов кибербезопасности при фильтрации трафика.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование и управление фильтрацией трафика.
Проектирование механизмов фильтрации трафика в рамках
 - ANT0012 — Безопасность сетевой инфраструктуры
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0012
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии, конкретные механизмы и методы их применения для обеспечения кибербезопасности сетевой инфраструктуры с точки зрения концепции Zero-Trust, используемого при построении архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура Zero-Trust.
Модель угроз для сетевой инфраструктуры.
Принцип Zero-Trust в архитектуре кибербезопасности.
Компоненты архитектуры Zero-Trust.
Развертывание архитектуры Zero-Trust.Модуль 2 – Сегментация сети.
Принципы сегментации сети.
Безопасность управления компонентами сетевой инфраструктуры.
Сервисы с публичным доступом в сетевой инфраструктуре.
Компоненты платёжной инфраструктуры.
Компоненты индустриальной инфраструктуры.
Периметр сетевой инфраструктуры.Модуль 3 – Контроль доступа к сети.
Контроль конечного оборудования и его состояния.
Контроль пользователей.
Гостевой доступ.
Сервисы BYOD.
Управление доступом мобильных устройств. MDMМодуль 4 – Контроль трафика в сетевой инфраструктуре.
Контроль обмена маршрутной и сервисной информацией.
Механизмы Anti-Spoofing.
Фильтрация трафика на сетевом оборудовании.
Отслеживание статистики сетевого трафика. Анализ данных Netflow.Модуль 5 – Распределенная сетевая инфраструктура.
Безопасное объединение удаленных площадок корпоративной инфраструктуры.
Безопасная интеграция локальной корпоративной инфраструктуры с облачными сервисами.Модуль 6 – Обработка инцидентов кибербезопасности в сетевой инфраструктуре.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование и управление механизмами безопасности сетевой инфраструктуры.
Проектирование механизмов безопасности сетевой инфраструктуры в рамках архитектуры корпоративной кибербезопасности.
Развертывание механизмов безопасности сетевой инфраструктуры. - ANT0013 — Защита от DoS и DDoS атак
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0013
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии, конкретные механизмы и методы их применения для защиты корпоративной инфраструктуры от DoS и DDoS атак.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, инфраструктуры корпоративных приложений, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – DoS и DDoS атаки.
DoS и DDoS атаки в модели угроз.
Классификация DoS атак.
Классификация DDoS атак.
Моделирование DoS и DDoS атак.Модуль 2 – Борьба с DoS и DDoS атаками.
Предотвращение DoS и DDoS атак.
Обнаружение DoS и DDoS атак.
Реакция на DoS и DDoS атаки.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 3 – BotNet’ы.
Принципы работы BotNet’ов.
Предотвращение заражения BotNet’ами.
Обнаружение активности BotNet’а.
Реакция на атаки BotNet’а.Модуль 4 – Специализированные решения Anti-DDoS.
Anti-DDoS решения от Fortinet®.
Anti-DDoS решения от Radware®.
Облачные Anti-DDoS решения.Модуль 5 – Проектирование и управление фильтрацией трафика.
Проектирование механизмов защиты от DoS и DDoS атак в рамках архитектуры корпоративной кибербезопасности.
Развертывание механизмов защиты от DoS и DDoS атак. - ANT0101 — VPN
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0101
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу различных технологий, механизмов и методов построения Виртуальных Частных Сетей (VPN), а также научиться встраивать сети VPN в архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Принципы работы и классификация VPN.
Принципы работы VPN.
Архитектуры VPN.
Технологические подходы к построению VPN.
Функциональная классификация VPN.Модуль 2 – Технологии VPN. PPTP и L2TPv2.
Принципы работы технологий группы VPDN.
PPTP
L2TPv2
Особенности применения технологий VPDN.Модуль 3 – Технологии Pseudowires. L2TPv3.
Принципы работы технологий группы Pseudowires.
L2TPv3.
Особенности применения технологий Pseudowires.Модуль 4 – Туннели GRE и IP-in-IP.
Принципы работы IP-туннелей.
GRE.
IP-in-IP.
Особенности применения технологий GRE / IP-in-IP.Модуль 5 – IPsec VPN.
Принципы организации защищенного канала связи.
Стек протоколов IPsec.
Управление ключами шифрования и проверки целостности. ISAKMP.
Протоколы IKEv1 и IKEv2.
Методы аутентификации участников IPsec VPN соединения.
Протоколы шифрования данных. ESP и AH.
Программные и аппаратные компоненты для создания IPsec VPN соединений.
Особенности организации IPsec VPN соединений.Модуль 6 – SSL/TLS VPN.
Принципы работы пользовательских SSL/TLS VPN туннелей.
Работа с SSL/TLS туннелями на конечном оборудовании пользователей.
Работа с SSL/TLS туннелями на сетевом оборудовании.
Протоколы управления ключами шифрования и проверки целостности.
Интеграция с инфраструктурой PKI.
Особенности организации инфраструктуры SSL/TLS VPN.Модуль 7 – MPLS VPN.
Принципы работы технологии MPLS.
Принципы организации MPLS VPN.
MPLS L2 VPN.
MPLS L3 VPN.
Обеспечения безопасности в сетях MPLS VPN.
Особенности организации инфраструктуры MPLS VPN.Модуль 8 – Специализированные решения VPN.
Организация сетей VPN с помощью решений Cisco Systems®.
Организация сетей VPN с помощью решений Juniper Networks®.
Организация сетей VPN с помощью решений FortiNet®.
Организация сетей VPN с помощью решений Palo-Alto Networks®.
Организация сетей VPN с помощью решений Checkpoint®.
Организация сетей VPN с помощью решений VMware NSX-T®.Модуль 9 – Построение сети VPN для трафика Multicast.
Проблемы шифрования трафика Multicast.
Принципы организации VPN для передачи трафика Multicast.
IPsec GDOI-группы.
Протокол gIKEv2.
Специализированные решения для организации Multicast VPN. - ANT0102 — Безопасность сетей Wi-Fi
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0102
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу различных технологий, механизмов и методов построения защищенных сетей Wi-Fi.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Принципы обеспечения безопасности сетей Wi-Fi.
Модель угроз для сети Wi-Fi.
Классификация механизмов cетей Wi-Fi.
Стандарты безопасности сетей Wi-Fi 802.11i.Модуль 2 – Аутентификация и управление ключами в сетях Wi-Fi.
Контроль доступа в беспроводной среде передачи. Функции AKM.
Применение стандарта 802.1x. Персональная и корпоративная аутентификация.
RSN и создание ключей шифрование для беспроводного канала связи.
Особенности реализации аутентификации в WPA/WPA2/WPA3.Модуль 3 – Шифрование беспроводного канала связи сети Wi-Fi.
Алгоритмы и протоколы шифрования в сетях Wi-Fi.
Особенности реализации шифрования в WPA/WPA2/WPA3.Модуль 4 – Безопасный роуминг.
Принципы безопасного роуминга.
Opportunistic Key Caching (OKC).
Fast Transition (FT) – 802.11r.
802.11k.
Особенности применения механизмов безопасного роуминга.Модуль 5 – Обеспечение безопасности инфраструктуры сети Wi-Fi.
Безопасность сети Wi-Fi на физическом уровне.
Механизмы Anti-Spoofing.
Фильтрация трафика в сети Wi-Fi.
Функции Wireless IPS (wIPS).Модуль 6 – Обработка инцидентов кибербезопасности в сети Wi-Fi.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование и управление механизмами безопасности сети Wi-Fi.
Проектирование механизмов безопасности сети Wi-Fi в рамках архитектуры корпоративной кибербезопасности.
Развертывание механизмов безопасности сети Wi-Fi. - ANT0103 — Контроль доступа 802.1x
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0103
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу механизмов контроля доступа, соответствующих стандарту IEEE 802.1x, а также научиться проектировать и разворачивать соответствующую инфраструктуру для внедрение данных механизмов контроля доступа.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура 802.1x.
Модель угроз для сетевой инфраструктуры.
Принцип Zero-Trust в архитектуре кибербезопасности.
Компоненты архитектуры Zero-Trust.
Стандарт 802.1x для контроля доступа к сети.
Компоненты 802.1x.Модуль 2 – Аутентификация и авторизация 802.1x.
Протокол и методы аутентификации Extensible Authentication Protocol (EAP).
Протокол и сервер RADIUS.
Расширения VSA для протокола RADIUS.
Расширение CoA для протокола RADIUS.
Аутентификация конечного оборудования и пользователей.Модуль 3 – Организация контроля доступа к сети.
Контроль конечного оборудования и его состояния.
Сервисы Posturing и Compliance.
Контроль пользователей.
Гостевой доступ.
Сервисы BYOD.Модуль 4 – Служебные аккаунты.
Контроль за действиями служебных аккаунтов.
Протокол и сервер TACACS+.Модуль 5 – Обработка инцидентов кибербезопасности в сетевой инфраструктуре с контролем доступа 802.1x.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Проектирование и управление механизмами безопасности сетевой инфраструктуры с контролем доступа 802.1x.
Проектирование инфраструктуры 802.1x в рамках архитектуры корпоративной кибербезопасности.
Развертывание инфраструктуры 802.1x. - ANT1001 — Sandbox&Honeypot
- Длительность: 3 дня (24 часа)
 - Код курса: ANT1001
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии и механизмы работы Sandbox’ов и Honeypot’ов. Материал курса охватывает не только технические, но и методологические вопросы использования Sandbox’ов и Honeypot’ов: их встраивание в общую архитектуру и процессы корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной инфраструктуры, инженеры, проектирующие архитектуру кибербезопасности, инженеры, занимающиеся обработкой инцидентов кибербезопасности, а также аналитики, работающие с данными Threat Intelligence.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания в области фильтрации трафика и обеспечения безопасности сетевой инфраструктуры на уровне курсов ANT0011 и ANT0012, а также знания в области обработки инцидентов кибербезопасности на уровне курса ANT0401.
Содержание курса:
Модуль 1 – Архитектура корпоративной кибербезопасности.
Модель угроз корпоративной кибербезопасности.
Проектирование механизмов кибербезопасности в рамках общей архитектуры корпоративной кибербезопасности.
Атаки типа 0-day и направленные атаки (ATP).
Мониторинг и реагирования на события и инциденты кибербезопасности.Модуль 2 – Sandbox.
Автоматизированный анализ вредоносного п/о.
Принципы работы и классификация Sandbox’ов.
Проектирование Sandbox’а в рамках архитектуры корпоративной безопасности.
Развертывание Sandbox’а в рамках архитектуры корпоративной кибербезопасности.
Анализ и использование информации, полученной Sandbox’ом.
Операционные параметры, метрики и поддержание работы Sandbox’ов.Модуль 3 – Honeypot.
Назначение Honeypot’ов.
Принципы работы и классификация Honeypot’ов.
Проектирование Honeypot’а в рамках архитектуры корпоративной безопасности.
Развертывание Honeypot’а в рамках архитектуры корпоративной кибербезопасности.
Анализ и использование информации, полученной Honeypot’ом.
Операционные параметры, метрики и поддержание работы Honeypot’ов.Модуль 4 – Интеграция Sandbox’а и Honeypot’а в процессы корпоративной кибербезопасности.
Реагирование на инциденты кибербезопасности с учетом данных Sandbox’а и Honeypot’а.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.
Модель Diamond и информация TTP[Tactics, Technics, Procedures].
Формирование и обмен данными Threat Intelligence. - ANT1002 — Технологии и механизмы работы инфраструктуры открытых ключей (PКI)
- Длительность: 5 дней (40 часов)
 - Код курса: ANT1002
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии и механизмы работы Инфраструктуры Открытых Ключей – Public Key Infrastructure. Материал курс освещает не только теоретические, но и практические вопросы развертывания PKI: проектирования в рамках архитектуры корпоративной безопасности, управления криптографическими ключами и
цифровыми сертификатами, мониторинга и обеспечения безопасности самой инфраструктуры PKI.Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной инфраструктуры, инженеры, проектирующие архитектуру корпоративной кибербезопасности, инженеры, занимающиеся криптографическими средствами защиты информации.
Предварительные требования к аудитории:
Необходимы знания криптографии на уровне курса ANT0001, а также знания в области общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – PKI в корпоративной инфраструктуре.
Проблемы аутентификации и защита идентификационной информации.
Модель угроз корпоративной инфраструктуры.
Приложения и протоколы, использующие PKI.
Криптографические компоненты PKI.
Chain of trust.
Проектирование PKI в рамках архитектуры корпоративной кибербезопасности.Модуль 2 – Архитектура и стандарты PKI.
PKCS#.
Центры сертификации (CA) и их иерархия.
Центр регистрации (RA).
Вспомогательные архитектурные компоненты PKI.
Аппаратные компоненты PKI.
Клиентская часть PKI.Модуль 3 – Цифровые сертификаты и протоколы PKI.
Форматы цифровых сертификатов.
Цикл жизни цифрового сертификата.
Проверка цифрового сертификата.
CRL и OCSP.
Специальные цифровые сертификаты. Уровни доверия.
Управление ключами PKI.Модуль 4 – Microsoft PKI.
Особенности построения Microsoft PKI.
Криптопровайдеры.
Хранилища цифровых сертификатов Microsoft.
Шаблоны цифровых сертификатов.
Сервис Auto-Enrollment.
Сервисы CES/CEP.
Развертывание Microsoft PKI.Модуль 5 – Обеспечение безопасности PKI.
Модель угроз PKI.
Мониторинг событий и инцидентов кибербезопасности PKI.
Реагирование на события и инциденты кибербезопасности PKI.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах. - ANT-OW101 — Архитектура и работа ОС Windows
- Длительность: 5 дней (40 часов)
 - Код курса: ANT-OW101
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, механизмы и алгоритмы работы
ОС Windows. Также материал курса раскрывает нюансы работы сервисов и приложений на ОС
Windows.Аудитория курса:
Люди, желающие познакомиться с механизмами работы ОС Windows.
Предварительные требования к аудитории:
Необходимы общие знания о работе компьютера.Содержание курса:
Модуль 1 – Низкоуровневые детали работы компьютера.
Архитектуры процессоров x86.
Выполнение процессорных инструкций.
Компиляторы.
Ассемблер в ОС Windows.Модуль 2 – Ядро ОС. Kernel.
Компоненты и архитектура ядра.
Переключение между процессами.
Механизмы работы планировщика процессов.
Структура процессов.Модуль 3 – Пользовательское окружение.
Разделения доступа к аппаратным компонентам.
Взаимодействие пользовательской подсистемы с ядром.
API.Модуль 4 – Работа с данными.
Файловая система.
Межпроцессное взаимодействие.
Стек TCP/IP.Модуль 5 – Работа с процессами.
Процесс загрузки ОС.
Управление процессами.
Работа с программными пакетами. - ANT-OL101 — Архитектура и работа ОС Linux
- Длительность: 5 дней (40 часов)
 - Код курса: ANT-OL101
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, механизмы и алгоритмы работы
ОС Linux. Также материал курса раскрывает нюансы работы сервисов и приложений на ОС Linux.Аудитория курса:
Люди, желающие познакомиться с механизмами работы ОС Linux.
Предварительные требования к аудитории:
Необходимы общие знания о работе компьютера.Содержание курса:
Модуль 1 – Низкоуровневые детали работы компьютера.
Архитектуры процессоров x86.
Выполнение процессорных инструкций.
Компиляторы.
Ассемблер в ОС Linux.Модуль 2 – Ядро ОС. Kernel.
Компоненты и архитектура ядра.
Переключение между процессами.
Механизмы работы планировщика процессов.
Структура процессов.Модуль 3 – Пользовательское окружение.
Разделения доступа к аппаратным компонентам.
Взаимодействие пользовательской подсистемы с ядром.
API.Модуль 4 – Работа с данными.
Файловая система.
Межпроцессное взаимодействие.
Стек TCP/IP.Модуль 5 – Работа с процессами.
Процесс загрузки ОС.
Управление процессами через systemctl.
Работа с программными пакетами. - ANT0021 — Безопасность ОС Windows
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0021
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и алгоритмы обеспечения безопасности данных, сервисов и приложений на ОС Windows. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности сервисов и приложений на ОС Windows в рамках архитектуры корпоративной
кибербезопасностиАудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.
Модель угроз безопасности ОС.Модуль 2 – Контроль доступа в ОС Windows.
Облачные сервисы Microsoft 365.
Microsoft Entra.
Механизмы контроля доступа в ОС Windows.
Механизмы Claim-based Identity.
Механизмы U-prove.
Многофакторная аутентификация. FIDO2.
Использование Microsoft Defender для защиты Identity.
Механизмы и протоколы контроля доступа в доменной инфраструктуре.
Интеграция ОС Windows с внешними системами контроля доступа.Модуль 3 – Безопасность данных в ОС Windows
Контроль целостности данных. Механизм MIC.
Контроль потоков данных и обнаружение утечет данных.
Контроль внешних периферийных устройств с помощью Microsoft Defender.
Защита данных Office 365.
Шифрование данных.
Bitlocker.Модуль 4 – Безопасность сетевой подсистемы в ОС Windows.
Фильтрация трафика.
Сетевые ограничения для сервисов и приложений ОС.
Фильтрация трафика с помощью Host-based IPS.
Работа с подключениями VPN в ОС.Модуль 5 – Контроль сервисов и приложений в ОС Windows.
Ограничения процессов в ОС.
Использование Antivirus’ов.
Безопасная загрузка ОС.
Контроль мобильных устройств. Microsoft Intune.
Контроль облачных сервисов и приложений в Microsoft Azure.Модуль 6 – Обработка инцидентов кибербезопасности ОС Windows.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование сервисов и приложений на ОС Windows в рамках архитектуры корпоративной кибербезопасности.
Сервисы и приложения на ОС Windows в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности, связанные с ОС Windows.
Обеспечение отказоустойчивости и высокой доступности сервисов и приложений на ОС Windows. - ANT0022 — Безопасность ОС Linux
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0022
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и алгоритмы обеспечения безопасности данных, сервисов и приложений на ОС Linux. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности сервисов и приложений на ОС Linux в рамках архитектуры корпоративной
кибербезопасностиАудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.
Модель угроз безопасности ОС.Модуль 2 – Контроль доступа в ОС Linux.
Механизмы контроля доступа в ОС Linux.
Реализация контроля доступа типа DAC в ОС Linux.
Реализация контроля доступа типа MAC в ОС Linux.
SELinux.
AppArmor.
Seccomp.
Работа с модулями PAM.
Интеграция ОС Linux с внешними системами контроля доступа.Модуль 3 – Безопасность данных в ОС Linux
Контроль целостности данных.
AIDE.
Контроль поток данных и обнаружение утечет данных.
Контроль внешних периферийных устройств.
USBguard.
Шифрование данных.
LUKS.Модуль 4 – Безопасность сетевой подсистемы в ОС Linux.
Фильтрация трафика.
Iptables и Firewalld.
Nftables.
TCPwrappers.
Сетевые ограничения для сервисов и приложений ОС.
Фильтрация трафика с помощью Host-based IPS.
Snort и Suricata.
Работа с подключениями VPN в ОС.Модуль 5 – Контроль сервисов и приложений в ОС Linux.
Ограничения процессов в ОС.
Использование контейнеров для работы с процессами и приложениями.
Использование Antivirus’ов.
Безопасная загрузка ОС.Модуль 6 – Обработка инцидентов кибербезопасности ОС Linux.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование сервисов и приложений на ОС Linux в рамках архитектуры корпоративной кибербезопасности.
Сервисы и приложения на ОС Linux в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности, связанные с ОС Linux.
Обеспечение отказоустойчивости и высокой доступности сервисов и приложений на ОС Linux. - ANT0023 — Безопасность платформ виртуализации
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0023
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и алгоритмы обеспечения безопасности платформ виртуализации и контейнеризации. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности платформ виртуализации в рамках архитектуры корпоративной
кибербезопасностиАудитория курса:
Инженеры, обеспечивающие кибербезопасность платформ виртуализации, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура и компоненты виртуализации.
Принципы виртуализации.
Гипервизоры.
Виртуальные машины.
Компоненты управления платформами виртуализации.
Хранение данных виртуализации.
Виртуальные сети.
Сервисы виртуализации.
Контейнеры.Модуль 2 – Безопасность ОС гипервизоров.
Фильтрация трафика гипервизоров.
Безопасность сервисов гипервизоров.
Контроль доступа ОС гипервизоров.
Безопасность данных в гипервизорах.
Обеспечение безопасности управляющих компонентов платформ виртуализации.Модуль 3 – Безопасность инфраструктуры хранения данных.
Контроль доступа к данным на СХД.
Контроль доступа к данным средствами SAN-сети.
Управление протоколами доступа к данным на гипервизорах.Модуль 4 – Безопасность сетевой инфраструктуры виртуализации.
Сегментация сетевого трафика платформ виртуализации.
Сегментация трафика виртуальных машин и контейнеров.
Микросегментация трафика виртуальных машин.
Фильтрация трафика платформ виртуализации и виртуальных машин.Модуль 5 – Безопасность контейнеризации.
Контроль доступа в контейнерах.
Изоляция контейнеров.
Контроль приложений и данных внутри контейнеров.
Подготовка образа контейнера с учетом политик безопасности.
Безопасность сетевой подсистемы контейнеров.Модуль 6 – Обработка инцидентов кибербезопасности, связанных с платформами виртуализации.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование платформ виртуализации в рамках архитектуры корпоративной кибербезопасности.
Платформы виртуализации в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности платформ виртуализации.
Обеспечение отказоустойчивости и высокой доступности платформ виртуализации. - ANT0201 — Контроль доступа ОС в коммерческих организациях
- Длительность: 5 дней(40 часов)
 - Код курса: ANT0201
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, модели и механизмы контроля доступа в операционных системах, используемых в коммерческих организациях, для построения архитектуры корпоративной кибербезопасности с учётом специфики работы подобных организаций.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, также знания механизмов безопасности ОС на уровне курсов ANT0021 и ANT0022.
Содержание курса:Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.
Специфика процессов работы с данными в коммерческих организациях.Модуль 2 – AppArmor.
Принципы работы и основные компоненты.
Установка и настройка.
Создание и использование профилей и правил контроля доступа.Модуль 3 – Мониторинг работы AppArmor.
Генерация log’ов и информации аудита.
Инструменты поиска и устранения неисправностей.
Анализ результатов работы политик AppArmor.Модуль 4 – Практическое использование AppArmor.
Контроль аутентификации и авторизации пользователей.
Контроль доступа к данным и работы с процессами.
Контроль работы с сетевой подсистемой.
Интеграция AppArmor со сторонними сервисами и приложениями.
Интеграция AppArmor с базами данных.
Интеграция AppArmor с платформами виртуализации.Модуль 5 – SELinux
Принципы работы и основные компоненты.
Установка и настройка.
Присвоение меток файлам и процессам ОС.
Создание и использование политик.
Построение многоуровневой системы контроля доступа.Модуль 6 – Мониторинг работы SELinux.
Генерация log’ов и информации аудита.
Инструменты поиска и устранения неисправностей
Анализ результатов работы политик SELinux.Модуль 7 – Практическое использование SELinux.
Контроль аутентификации и авторизации пользователей.
Контроль доступа к данным и работы с процессами.
Контроль работы с сетевой подсистемой.
Интеграция SELinux со сторонними сервисами и приложениями.
Интеграция SELinux с базами данных.
Интеграция SELinux с платформами виртуализации.Модуль 8 – Дополнительные механизмы принудительного контроля доступа.
GrSecurity
Firejail
Microsoft WIM.
RSBAC.
Trusted Solaris MAC.
TrustedBSD.
Smack.Модуль 9 – Механизмы контроля доступа ОС в рамках архитектуры корпоративной кибербезопасности коммерческих организаций.
Классификация данных в коммерческой организации.
Учёт операционных систем, сервисов и приложений.
Модели угроз коммерческой организации.
Политики и метрики кибербезопасности. - ANT0202 — Управление учетными записями
- Длительность: 5 дней(40 часов)
 - Код курса: ANT0202
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы управления учетными записями в архитектуре корпоративной кибербезопасности, а также конкретные методы и механизмы контроля доступа: аутентификации, авторизации и аккаунтинга учетных записей. В курсе специально рассматриваются распределенные системы контроля доступа, т.н. системы SSO: SAML, OAuth, OpenID Connect.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, также знания механизмов безопасности ОС на уровне курсов ANT0021 и ANT0022.
Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.Модуль 2 – Учетные записи в ОС.
Сущность и атрибуты учетной записи.
Цикл жизни учетной записи.
Безопасное хранение учетных записей.
Аутентификация пользователя.
Авторизация пользователя и процессов.
Создание и контроль сессий.
Аккаунтинг. Мониторинг действий учетных записей.Модуль 3 – Распределенные системы аутентификации.
Принцип делегирования.
Аутентификация в сетях TCP/IP. 802.1x, RADIUS и TACACS+.
Аутентификация в мобильных сетях. Diameter.
Аутентификация в доменах Microsoft Windows. NTLM.
Аутентификация с помощью протокола Kerberos.
API для использования сервисов безопасности. GSSAPI.
Согласование параметров GSSAPI через SPNEGO.
Аутентификация с помощью PKI.Модуль 4 – Системы Single Sign-On.
Сценарии использования систем SSO.
Проблемы авторизации вызовов API в современных приложениях.
Аутентификация SAML.
Универсальная идентификация OpenID и OpenID Connect.Модуль 5 – Авторизация.
Принцип наименьших привилегий учетной записи.
Проблема конфликта интересов и принцип разделения полномочий.
Классические механизмы авторизации. ACL и Capabilities.
Механизмы и модели Role-Based Access Control.
Механизмы и модели Attribute-based Access Control.
Авторизация OAuth.Модуль 6 – Многофакторная аутентификация.
Концепция многофакторной аутентификации.
Механизмы многофакторной аутентификации.
Интеграция многофакторной аутентификации с системами SSO.Модуль 7 – Инциденты кибербезопасности, связанные с учетными записями.
Использование механизмов Threat Intelligence для обнаружения утечек данных учетных записей.
Реагирование на события и инциденты кибербезопасности.Модуль 8 – Работа с учетными записями рамках архитектуры корпоративной кибербезопасности.
Проектирование и построение цикла жизни учетных записей.
Проектирование и создание системы привилегий и прав учетных записей.
Проектирование и интеграция систем аутентификации, авторизации и аккаунтинга с корпоративными приложениями. - ANT0031 — Безопасность DNS
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0031
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу протоколов и механизмов обеспечения кибербезопасности инфраструктуры DNS. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности DNS в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративных приложений и сервисов, а также кибербезопасность корпоративной инфраструктуры DNS, инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Протокол DNS.
Архитектура и компоненты DNS.
Сообщения DNS.
Регистрация доменных имён.
Распространение регистрационной информации и протокол whois.
Провайдеры сервисов DNS.
Расширения DNS.Модуль 2 – Модель угроз DNS.
Ошибки развертывания и настройки DNS.
Атаки spoofing.
Атаки cache poisoning.
DoS и DDoS атаки на DNS инфраструктуру.
Утечки данных DNS.
Построение модели угроз DNS.Модуль 3 – Механизмы безопасности DNS.
Контроль регистрационной информации DNS.
Фильтрация трафика DNS.
DNS Firewall и механизмы RPZ.
Passive DNS и Threat Intelligence.Модуль 4 – Криптографические методы защиты DNS.
DNSSEC
TSIG.Модуль 5 – Обработка инцидентов кибербезопасности, связанных с DNS.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Проектирование DNS в рамках архитектуры корпоративной кибербезопасности.
DNS в рамках архитектуры корпоративной безопасности.
Политики и метрики безопасности DNS. - ANT0032 — Безопасность электронной почты
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0032
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу протоколов и механизмов обеспечения кибербезопасности корпоративной электронной почты. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности электронной почты в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративных приложений и сервисов, а также кибербезопасность корпоративной электронной почты, инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Основы работы электронной почты.
SMTP и маршрутизация электронной почты.
Формат писем электронной почты.
Протоколы IMAP и POP.
Вспомогательные компоненты инфраструктуры электронной почты.Модуль 2 – Принципы обеспечения безопасности электронной почты.
Модель угроз электронной почты.
Законодательные меры защиты электронной почты.
Организационные меры защиты электронной почты.
Технические меры защиты электронной почты.
Поведенческие модели пользователей в комплексе мер защиты электронной почты.Модуль 3 – Механизмы Anti-Spam, Anti-Spoofing, Anti-Phishing.
Spam и его классификация.
Anti-Spoofing как средство защиты от Spam’а.
SPF/SIDF, DKIM, DMARC.
ARC.
Обеспечение доставки и «чистоты» репутации электронной почты.
Методы обнаружения Spam’а и фильтрация электронной почты.
Репутационная фильтрация электронной почты.
Защита от Phishing’а.Модуль 4 – Шифрование электронной почты.
Шифрование почтовых вложений. S/MIME.
Шифрование почтовых сообщений. PGP и GPG.
Шифрование протоколов SMTP, IMAP, POP.
Применение шифрования электронной почты и требования регуляторов.Модуль 5 – Обработка инцидентов кибербезопасности, связанных с электронной почтой.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Проектирование электронной почты в рамках архитектуры корпоративной кибербезопасности.
Электронная почта в рамках архитектуры корпоративной безопасности.
Механизмы безопасности клиентской и серверной частей электронной почты.
Требования регуляторов. - ANT0033 — Безопасность IP-телефонии
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0033
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу протоколов и механизмов обеспечения кибербезопасности корпоративной IP-телефонии. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности решений IP-телефонии в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также кибербезопасность корпоративной IP-телефонии, инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Основы работы IP-телефонии.
ТФоП и IP-телефония.
Компоненты IP-телефонии.
Протоколы сигнализации вызовов.
Протоколы передачи медиа
данных.Модуль 2 – Безопасность IP-телефонии в корпоративной сети.
Модель угроз сетевой инфраструктуры.
Модель угроз IP-телефонии.
Контроль вызовов.
Фильтрация трафика IP-телефонии.
Session Border Controller.Модуль 3 – Механизмы защиты сигнализации вызовов.
Механизмы защиты SIP.
Использование TLS и DTLS.
Использование IPsec.
S/MIME.Модуль 4 – Механизмы защиты медиа данных.
SRTP.
SRTCP.Модуль 5 – Управление ключами шифрования.
MIKEY.
SRTP Security Descriptions.
ZRTP.Модуль 6 – Специализированные решения IP-телефонии.
IP-телефония Asterisk
IP-телефония Cisco.
IP-телефония Avaya.
Skype for BusinessМодуль 7 – Обработка инцидентов кибербезопасности в IP-телефонии.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 8 – Проектирование IP-телефонии в рамках архитектуры корпоративной кибербезопасности.
Политики безопасности IP-телефонии.
Требования регуляторов.
IP-телефония в рамках архитектуры корпоративной безопасности. - ANT0301 — Безопасность Web-приложений
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0301
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы и конкретные механизмы защиты Web-приложений. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности Web-приложений в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также кибербезопасность корпоративных Web-приложений, инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура и компоненты Web-приложений.
HTML и HTTP.
XML.
Web-серверы.
Web-клиенты.
«Активный» контент.
Архитектура Progressive Web App.Модуль 2 – Модель угроз Web-приложений.
Угрозы серверной части Web-приложений.
Угрозы клиентской части Web-приложений.
Построение модели угроз Web-приложения.Модуль 3 – Механизмы защиты серверной части Web-приложений.
Защита от DoS и DDoS атак.
Аутентификация и авторизация.
SSO. OpenID и OAuth.
Проблемы obfuscation.
Защита от атак криптоанализа.
Защита Web-framework’ов.Модуль 5 – Настройки безопасности Web-серверов.
Apache.
NGINX.
IIS.
jBoss.
Wildfly.
TOMCAT.Модуль 6 – Web Application Firewall.
Концепция WAF.
Установка и конфигурация WAF Modsecurity.
Интеграция WAF Modsecurity и IPS.
Настройка правил фильтрации WAF Modsecurity.
Использование репутационного анализа.
Обнаружение аномалий.
Оптимизация работы WAF Modsecurity.Модуль 7 – Обработка инцидентов кибербезопасности в Web-приложении.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 8 – Проектирование Web-приложений в рамках архитектуры корпоративной кибербезопасности.
Политики безопасности Web-приложений.
Метрики безопасности Web-приложений.
Web-приложения в рамках архитектуры корпоративной безопасности. - ANT0302 — Безопасность баз данных
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0302
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу механизмов обеспечения кибербезопасности баз данных. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности баз дынных рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративных приложений и сервисов, а также кибербезопасность корпоративных баз данных, инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Принципы работы баз данных.
Архитектура и компоненты базы данных.
Реляционная модель и процедуры нормализации.
SQL.
Проблемы целостности данных в базе.Модуль 2 – Обеспечение безопасности базы данных.
Модель угроз базы данных.
Безопасность инфраструктуры для базы данных.
Управление учетными записями и ролями.
Обеспечение безопасности при использовании базы данных приложениями.
Безопасность при взаимодействии баз данных друг с другом.
Защита от вредоносного п/о для баз данных.Модуль 3 – Контроль доступа к базе данных.
Управление учетными записями.
Использование ролей при работе с базой данных.
Column-level security.
Row-level security.Модуль 4 – Шифрование базы данных.
Методы шифрования данных в базе.
Хранение паролей и обеспечение их безопасности в базе данных.Модуль 5 – Работа с транзакциями.
Формирование и контроль целостности транзакций.
Применение транзакций при использовании базы данных приложениями.Модуль 6 – Обработка инцидентов кибербезопасности, связанных с базами данных.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование баз данных в рамках архитектуры корпоративной кибербезопасности.
Базы данных в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности баз данных.
Требования регуляторов.
Обеспечение отказоустойчивости и высокой доступности баз данных. - ANT3004 — DevSecOps
- Длительность: 5 дней (40 часов)
 - Код курса: ANT3004
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы организации и построения процессов DevSecOps для обеспечения кибербезопасности при разработке корпоративных приложений и сервисов.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность при разработке корпоративных приложений и сервисов.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Процессы и компоненты DevOps.
Принципы DevOps.
Компоненты DevOps.
Инструменты DevOps.
Процессы DevOps.
Организационные аспекты DevOps.Модуль 2 – Проблемы безопасности DevOps.
Модель угроз DevOps.
Программы AppSec для контроля безопасности при разработке п/о.
Проблема оценки эффективности мер и решений кибербезопасности.
Базовые показатели эффективности.
Улучшение и оптимизация показателей эффективности.Модуль 3 – Безопасность компонентов Continuous Delivery.
Методика Software Composition Analysis.
Методика Static Analysis Security Testing.
Методика Dynamic Analysis Security Testing.
Контроль зависимостей кода.
Контроль и использование компонентов сборки, компиляции и запуска кода.Модуль 4 – Безопасность компонентов Continuous Integration.
Использование pre-commit hook’ов.
Анализ кода и предотвращение утечек данных через исходный код.Модуль 5 – Компоненты Continuous Monitoring.
Измерение базовых показателей эффективности кибербезопасности и результатов их улучшения.
Измерение времени жизни угроз.
Измерение снижения объёма угроз.
Измерение скорости появления угроз.
Измерение времени между появлением угроз.
Измерение скорости утери контроля над угрозами.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Безопасность инфраструктуры DevOps.
Безопасность инфраструктуры виртуализации.
Безопасность инфраструктуры контейнеризации.
Безопасность при взаимодействии с «облаком».
Безопасность инструментов DevOps.
Обеспечение безопасного взаимодействия с API. - ANT0041 — Мониторинг событий и инцидентов кибербезопасности
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0041
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты мониторинга событий и инцидентов кибербезопасности. Материал курса охватывает также вопросы организации процессов мониторинга событий и инцидентов кибербезопасности и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие мониторингом и обработкой событий и инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями общей кибербезопасности на уровне курса ANT0000. Кроме того, необходимо обладать знаниями о работе сетей TCP/IP на уровне курса ANT-N101, а также знаниями об операционных системах на уровне курсов ANT-OW101 и ANT-OL101.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология мониторинга событий и инцидентов.
События и инциденты кибербезопасности.
Процессы мониторинга.
Инструменты и инфраструктура мониторинга.
Операционные метрики для мониторинга.Модуль 3 – Мониторинг сетевой инфраструктуры.
Log’и и информация о сетевой активности.
Сбор и анализ сетевого трафика.
Статистические данные сетевой активности.
Централизованные и распределенные системы сетевого мониторинга.
Развертывание и поддержка системы сетевого мониторинга.Модуль 4 – Мониторинг конечных устройств.
Политики мониторинга и log’и Windows.
Подсистема аудита Windows.
Развертывание и поддержка мониторинга Windows.
Настройки мониторинга и log’и Linux.
Подсистема аудита Linux.
Развертывание и поддержка мониторинга Linux.Модуль 5 – Мониторинг приложений.
Использование флагов и маяков в IT-инфраструктуре для мониторинга.
Мониторинг SMTP.
Мониторинг Web-приложений.
Мониторинг баз данных.
Мониторинг облачных приложений.Модуль 6 – Мониторинг событий и инцидентов в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Интеграция систем мониторинга.
Дифференция событий и инцидентов кибербезопасности.
Подтверждение инцидентов кибербезопасности.
Обработка инцидентов кибербезопасности.
Цифровая криминалистика. - ANT0401 — Обработка инцидентов кибербезопасности
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0401
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты обработки инцидентов кибербезопасности. Материал курса охватывает также вопросы организации процессов обработки инцидентов кибербезопасности и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями о мониторинге событий и инцидентов кибербезопасности на уровне курса ANT0041.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология обработки инцидентов кибербезопасности.
Процесс обработки инцидентов.
Инструменты и инфраструктура для обработки инцидентов.
Штатное расписание …
Мониторинг событий и инцидентов.
Цифровая криминалистика в рамках обработки инцидентов.Модуль 3 – Реагирование на инциденты кибербезопасности.
Начальная реакция на инцидент.
Подтверждение инцидента.
Определение масштаба инцидента.
Разработка и применение немедленных мер по сдерживанию инцидента.
Разработка мер расширенного мониторинга инфраструктуры.
Разработка мер ликвидации вредоносной активности.
Разработка хронологии ликвидации вредоносной активности.
Специфика реакции на инциденты, связанные с базами данных.Модуль 4 – Расширенный мониторинг инфраструктуры.
Расширенный мониторинг сети.
Расширенный мониторинг конечных устройств.
Расширенный мониторинг сервисов и приложений.
Отслеживание инцидента с помощью индикаторов компрометации.
Использование флагов и маяков в IT-инфраструктуре для мониторинга.Модуль 5 – Цифровая криминалистика.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Артефакты файловых и операционных систем.
Артефакты оперативной памяти.
Восстановление хронологии событий по артефактам кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.
Diamond модель и TTP[Tactics, Technics, Procedures] информация.Модуль 6 – Ликвидация вредоносной активности.
Использование индикаторов компрометации для обнаружения вредоносной активности.
Ликвидация вредоносной активности в сети.
Ликвидация вредоносной активности на конечных устройствах.
Ликвидация вредоносной активности сервисов и приложений.
Документирование процесса и результатов ликвидации вредоносной активности.Модуль 7 – Обработка инцидентов в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Рекомендации по стратегической модернизации процессов и архитектуры корпоративной кибербезопасности на основе данных об инцидентах.
Встраивание процессов обработки инцидентов в процессы корпоративной кибербезопасности. - ANT0402 — Цифровая криминалистика в ОС и приложениях
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0402
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты проведения криминалистических исследований цифровых данных операционных систем и приложений. Материал курса охватывает также вопросы организации процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов ANT-OW101 и OL101, а также знаниями о процессах обработки инцидентов кибербезопасности на уровне курса ANT0401.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Принципы обработки удаленных и «дефектных» данных.
Восстановление цепи событий по артефактам кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Поиск и анализ артефактов в файловых системах.
Архитектура файловых систем.
Файловые системы FAT, NTFS, Ext*, UFS, ReFS, APFS.
Анализ метаданных файловых систем.
Загрузчики ОС.
Жесткие диски и их логические разделы.
Создание точной копии жесткого диска.
Анализ «пустого» пространства жесткого диска.
SleuthKit и Autopsy.
Encase.Модуль 4 – Поиск и анализ артефактов в ОС Windows.
Анализ реестра Windows.
Файлы подкачки и гибернации.
История ОС и приложений.
Анализ log’ов ОС.
Восстановление хронологии кибератаки.Модуль 5 – Поиск и анализ артефактов в ОС Linux.
Анализ процессов и используемых ими файлов.
Файлы подкачки.
История ОС и приложений.
Анализ log’ов ОС.
Восстановление хронологии кибератаки.Модуль 6 – Поиск и анализ артефактов в macOS.
Анализ процессов и используемых ими файлов.
Файлы подкачки.
История ОС и приложений.
Анализ log’ов ОС.
Восстановление хронологии кибератаки.Модуль 7 – Поиск и анализ артефактов в приложениях.
Анализ активности электронной почты.
Анализ web-активности.Модуль 8 – Введение в анализ оперативной памяти и быстро изменяющейся информации.
Методы получения информации из оперативной памяти.
Методы получения информации из регистров и кэша процессора.
Основные методы анализа dump’ов оперативной памяти.Модуль 9 – Цифровая криминалистика в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Организация процессов цифровой криминалистики.
Встраивание процессов цифровой криминалистики в процессы корпоративной кибербезопасности. - ANT0403 — Цифровая криминалистика в сетях TCP/IP
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0403
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты
проведения криминалистических исследований цифровых данных о сетевой активности
корпоративных систем и приложений. Материал курса охватывает также вопросы организации
процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной
кибербезопасности.Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры,
занимающиеся цифровой криминалистикой.Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов
ANT-OW101 и OL101, а также знаниями о процессах обработки инцидентов кибербезопасности на
уровне курса ANT0401.Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Принципы обработки удаленных и «дефектных» данных.
Восстановление хронологии кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Сбор сетевого трафика.
Принципы сбора сетевого трафика в корпоративной инфраструктуре.
«Зеркалирование» сетевого трафика.
Хранение собранного сетевого трафика.Модуль 4 – Анализ сетевого трафика с помощью Wireshark’а.
Архитектура и возможности Wireshark’а.
Препроцессоры.
Фильтры.
Компоненты Mate.
Обнаружение и анализ сетевых атак и вредоносной сетевой активности
dump’ах трафика. - ANT0404 — Pentest сетевой инфраструктуры
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0404
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты проведения тестирования на возможность проникновение – pentest’а – в сетевую инфраструктуру и подключенные к ней сервисы и приложения. В данном курсе пентест рассматривается как один из процессов, необходимых для построения архитектуры корпоративной кибербезопасности, поэтому в нём также поднимаются методологические вопросы организации пентеста, а также использования данных, полученных в результате его проведения.
Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания о работе сетей TCP/IP на уровне курса ANT-N101. Рекомендуется иметь знания о моделировании угроз на уровне курса ANT0052
Содержание курса:
Модуль 1 – Принципы организации пентеста.
Цели и задачи проведения пентеста.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения пентеста.
Обработка результатов проведения пентеста.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Организация кибератак типа DoS/DDoS.
Организация DDoS-кибератаки на сеть.
Организация DoS-кибератаки на сетевые сервисы.
Организация DoS-кибератаки на приложения.Модуль 4 – Организация кибератак на сетевые сервисы.
Перехват трафика.
Получение доступа к Wi-Fi сети.
Методы обхода систем сетевой кибербезопасности.
Организация кибератак на протоколы маршрутизации.
Организация кибератак на протокол DNS.
Организация кибератак на протокол DHCP.
Организация кибератак на сервисы аутентификации.
Организация кибератак на сервисы удаленного управления ОС.Модуль 5 – Организация кибератак через электронную почту.
Подготовка вредоносных вложений.
Базовые принципы социальной инженерии.
Кибератаки на протоколы электронной почты.
Получение доступа к ОС пользователей через вредоносные вложения.Модуль 6 – Развитие кибератаки с базовым доступом к ОС.
Извлечение данных и учетных записей.
Эскалация привилегий учетной записи.
Распространение контроля над другими системами в ходе кибератаки.
Удаление следов кибератаки.Модуль 7 – Подготовка отчета о проведении пентеста.
Модель угроз и результаты проведения пентеста.
Управление рисками на основе данных, выявленных пентестом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. - ANT0405 — Pentest Web-приложений
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0405
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты проведения тестирования на возможность проникновение – pentest’а – в Web-приложения. В данном курсе пентест рассматривается как один из процессов, необходимых для построения архитектуры корпоративной кибербезопасности, поэтому в нём также поднимаются методологические вопросы организации пентеста, а также использования данных, полученных в результате его проведения.
Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания о работе сетей TCP/IP на уровне курса ANT-N101. Рекомендуется иметь знания о моделировании угроз на уровне курса ANT0052
Содержание курса:
Модуль 1 – Принципы организации пентеста.
Цели и задачи проведения пентеста.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения пентеста.
Обработка результатов проведения пентеста.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Архитектура и компоненты Web-приложений.
HTML и HTTP.
Кодировки данных.
Web-серверы.
Web-клиенты.
Расширения browser’ов.
«Активный» контент.
Архитектура Progressive Web App.
Атаки на web-приложения. OWASP top 10.Модуль 4 – Перехват Web-трафика.
Организация перехвата web-трафика.
Proxy-сервисы.
Анализ Web-трафика и извлечение данных.Модуль 5 – Атаки на серверную часть Web-приложения.
Организация DoS-атак на Web-приложения.
Эксплуатация ошибок в правилах авторизации и работы с файлами.
Эксплуатация логических ошибок работы Web-приложений.
Эксплуатация ошибок в настройках и уязвимостей CMS.
Организация вредоносного внедрения в ОС Web-приложения.
Перехват HTTP-сессий и данных cookie.
Обход шифрования HTTPS/TLS.
Получение доступа к учетным записям Web-приложений.
Эксплуатация Web-приложений через SQL-инъекции.
Организация атак на базы данных web-приложений.
Организация кибератак типа SSRF.Модуль 6 – Атаки на клиентскую часть Web-приложения.
Организация кибератак типа XSS.
Организация кибератак типа XXE.
Организация кибератак типа CSRF.
Организация атак типа Clickjacking.Модуль 7 – Развитие кибератаки через Web-приложение.
Извлечение данных.
Эскалация привилегий учетной записи.
Распространение контроля над другими системами в ходе кибератаки.
Удаление следов кибератаки.Модуль 8 – Подготовка отчета о проведении пентеста.
Модель угроз и результаты проведения пентеста.
Управление рисками на основе данных, выявленных пентестом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. - ANT4001 — Цифровая криминалистика оперативной памяти
- Длительность: 5 дней (40 часов)
 - Код курса: ANT4001
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты проведения криминалистических исследований цифровых данных в оперативной памяти. Материал курса охватывает также вопросы организации процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов ANT-OW101 и OL101, знаниями о процессах обработки инцидентов кибербезопасности на уровне курса ANT0401, а также знаниями в области цифровой криминалистики на уровне курсов ANT0402 и ANT0403.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Методика обработки инцидентов кибербезопасности.
Восстановление цепи событий по артефактам кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Принципы анализа оперативной памяти и быстро изменяющейся информации.
Методы получения информации из оперативной памяти.
Методы получения информации из регистров и кэша процессора.
Основные методы анализа dump’ов оперативной памяти.Модуль 4 – Анализ оперативной памяти Windows.
Объекты и пулы ресурсов.
Процессы и их компоненты.
Поиск вредоносного п/о и его артефактов.
Анализ данных реестра.
Log’и и события.
Артефакты сетевой подсистемы.
Сервисы Windows.
Данные ядра и поиск rootkit’ов.
Анализ данных подсистемы GUI.
Артефакты пользовательских действий и приложений.
Артефакты вспомогательных системных процессов.
Восстановление хронологии кибератаки.Модуль 5 – Анализ оперативной памяти Linux.
Процессы и их компоненты.
Поиск вредоносного п/о и его артефактов.
Log’и и события.
Артефакты сетевой подсистемы.
Данные ядра и поиск rootkit’ов.
Артефакты пользовательских действий и приложений.
Артефакты вспомогательных системных процессов.
Восстановление хронологии кибератаки.Модуль 6 – Анализ оперативной памяти macOS.
Процессы и их компоненты.
Поиск вредоносного п/о и его артефактов.
Log’и и события.
Артефакты сетевой подсистемы.
Данные ядра и поиск rootkit’ов.
Артефакты пользовательских действий и приложений.
Артефакты вспомогательных системных процессов.
Восстановление хронологии кибератаки.Модуль 7 – Цифровая криминалистика в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Организация процессов цифровой криминалистики.
Встраивание процессов цифровой криминалистики в процессы корпоративной кибербезопасности. - ANT4002 — Цифровая криминалистика баз данных
- Длительность: 5 дней (40 часов)
 - Код курса: ANT4002
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты проведения криминалистических исследований баз данных. Материал курса охватывает также вопросы организации процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов ANT-OW101 и OL101, знаниями о процессах обработки инцидентов кибербезопасности на уровне курса ANT0401, а также знаниями в области цифровой криминалистики на уровне курсов ANT0402 и ANT0403.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Специфика реакции на инциденты, связанные с базами данных.
Методика обработки инцидентов кибербезопасности.
Инструменты цифровой криминалистики.
Восстановление хронологии кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Принципы работы баз данных SQL.
Базы данных и системы управления базами данных SQL.
SQL-запросы.
Транзакции и принцип ACID.
Реляционная целостность данных.Модуль 4 – Криминалистика SQL Server’а.
Архитектура SQL Server’а.
Форматы данных и файлов.
Управление памятью.
Параметры безопасности.
Методы получения данных.
Методология криминалистических исследований SQL Server’а.
Получение и анализ артефактов кибератак.
Поиск и анализ Rootkit’ов.Модуль 5 – Криминалистика Oracle DBA.
Архитектура Oracle DBA.
Форматы данных и файлов.
Управление памятью.
Параметры безопасности.
Методы получения данных.
Методология криминалистических исследований Oracle DBA.
Получение и анализ артефактов кибератак.
Поиск и анализ Rootkit’ов.Модуль 6 – Криминалистика SQLite.
Архитектура SQLite.
Применение базы данных SQLite.
Форматы данных и файлов.
Восстановление записей SQLite.
Использование журналов.
Write-ahead log’и.
Расширения SQLite.Модуль 7 – Цифровая криминалистика в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Организация процессов цифровой криминалистики.
Встраивание процессов цифровой криминалистики в процессы корпоративной кибербезопасности. - ANT4003 — Методы обхода систем кибербезопасности
- Длительность: 5 дней (40 часов)
 - Код курса: ANT4003
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты
обхода средств и систем кибербезопасности во время проведения тестирования на проникновение
– pentest’а – в сетевую инфраструктуру и подключенные к ней сервисы и приложения.Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры,
проектирующие архитектуру корпоративной кибербезопасности.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, знания о работе сетей
TCP/IP на уровне курса ANT-N101, а также знания о проведении пентестов на уровне курса
ANT0404. Рекомендуется иметь знания о моделировании угроз на уровне курса ANT0052Содержание курса:
Модуль 1 – Принципы организации Pentest’а.
Цели и задачи проведения Pentest’а.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения Pentest’а.
Обработка результатов проведения pentest’а.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Анализ данных DNS для организации кибератак.
Анализ данных SMB для организации кибератак.
Анализ данных SMTP для организации кибератак.
Анализ данных SNMP для организации кибератак.
Анализ уязвимостей сервисов для организации кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Использование уязвимостей типа Buffer Overflow.
Условия существования уязвимостей Buffer Overflow.
Принципы использования уязвимостей Buffer Overflow.
Уязвимости Buffer Overflow в ОС Windows.
Уязвимости Buffer Overflow в ОС Linux.Модуль 4 – Использование инъекций в процессы ОС.
Условия осуществления инъекций в процессы ОС.
Принципы осуществления инъекций в процессы ОС.
Инъекции DLL.
Инъекции Reflective DLL.
Использование техники Process Hollowing.Модуль 5 – Методы обхода систем антивирусной защиты.
Принципы обхода систем антивирусной защиты.
Использование кодировок и шифрования.
Искажение характеристик поведения.
Использование инструментов PowerShell и VBA.
Использование API в ОС Windows.
Работа с AMSI.Модуль 6 – Методы обхода систем фильтрации приложений и данных.
Принципы обхода систем контроля приложений.
Использование NTFS ADS.
Использование специализированных DLL.
Обход средств AppLocker.
Использование SSH туннелей для сокрытия кибератак.
Использование DNS туннелей для сокрытия кибератак.Модуль 7 – Методы обхода систем Web-фильтрации.
Использование ошибок работы парсеров Web-контента.
Использование методик обфускации.
Использование HTTP туннелей для сокрытия кибератак.Модуль 8 – Подготовка отчета о проведении Pentest’а.
Модель угроз и результаты проведения pentest’а.
Управление рисками на основе данных, выявленных pentest’ом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. - ANT4004 — Threat Intelligence
- Длительность: 3 дня (24 часа)
 - Код курса: ANT4004
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы и механизмы получения,
обработки и использования информации о киберугрозах, кибератах и их последствиях – т.н.
информации Threat Intelligence. Также материал курса подробно раскрывает тему Threat
Intelligence не просто с позиции получения нужной информации, но с позиции процессов и их
использования для обеспечения корпоративной кибербезопасности. Кроме того в материале курса
описывается проектирование и интеграция Threat Intelligence в архитектуру корпоративной
кибербезопасности.Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной инфраструктуры, инженеры,
проектирующие архитектуру кибербезопасности, инженеры, занимающиеся обработкой
инцидентов кибербезопасности, а также аналитики, работающие с данными Threat Intelligence.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, знания в области
фильтрации трафика на уровне курса ANT0011, знания в области моделирования угроз и
управления рисками кибербезопасности на уровне курсов ANT0052 и ANT0501, соответственно.Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Контроль доступа и его типы.
Механизмы контроля доступа.
Принципы построения архитектуры кибербезопасности.Модуль 2 – Задачи фильтрации трафика.
Модель угроз кибербезопасности.
Классификация механизмов фильтрации трафика.
Концепция Unified Threat Management (UTM).Модуль 3 – Обнаружение и обработка инцидентов
кибербезопасности.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.Модуль 4 – Архитектура Threat Intelligence.
Threat Intelligence в архитектуре корпоративной кибербезопасности.
Процессы Threat Intelligence.
Компоненты Threat Intelligence.
Модель Cyber Kill Chain.
Модель Diamond.
Источники информации Threat Intelligence.
Методы обработки информации Threat Intelligence.
Threat Intelligence для обнаружения кибератак.
Threat Intelligence для обнаружения инцидентов кибербезопасности.
Threat Intelligence для обнаружения утечек данных.
Threat Intelligence для управления рисками.Модуль 5 – Threat Intelligence для обнаружения кибератак.
Модель Pyramid of Pain.
Репутационная фильтрация трафика.
Сигнатуры и аномалии для обнаружения кибератак.
Обнаружение вредоносного п/о и индикаторов заражения.
Индикаторы компрометации (IoC) и их использование.
Методы корреляции информации Threat Intelligence.Модуль 6 – Threat Intelligence в архитектуре корпоративной
кибербезопасности.
Архитектура корпоративной кибербезопасности.
Построение процессов Threat Intelligence в Центре Операционной
Безопасности (SoC). - ANT0051 — Политики и контроль кибербезопасности
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0051
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
В данном курсе рассматриваются принципы, методы и инструменты создания и управления политиками кибербезопасности в архитектуре корпоративной кибербезопасности. Также в курсе рассматривается подход внедрения и работы механизмов контроля кибербезопасности.
Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, сотрудники, принимающие проектные управленческие решения, а также инженеры, отвечающие за внедрение решений кибербезопасности в корпоративной инфраструктуре.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Контроль доступа и его типы.
Механизмы контроля доступа.
Принципы построения архитектуры кибербезопасности.Модуль 2 – Моделирование угроз и оценка рисков кибербезопасности.
Моделирования угроз.
Оценки и управления рисками.
Построение процессов и архитектуры кибербезопасности.Модуль 3 – Политики кибербезопасности.
Каталог политик кибербезопасности
Политики в области стратегического управления.
Политики в области операционного управления.
Политики в области приватности и персональных данных.
Политики в области корпоративных данных.
Политики в области управления ролями и правами доступа.
Политики в области безопасности сетей TCP/IP.
Политики в области операционных процессов кибербезопасности.
Политики в области работы с персоналом.
Политики в области защиты промышленной инфраструктуры.Модуль 4 – Принцип и механизмы контроля в кибербезопасности.
Принцип контроля в кибербезопасности.
Механизмы контроля в кибербезопасности.
Оценка результатов внедрения механизмов контроля в архитектуре корпоративной кибербезопасности. - ANT0052 — Моделирование угроз кибербезопасности
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0052
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
В данном курсе рассматриваются методы моделирования угроз кибербезопасности на основе
методики STRIDE. Кроме того, на курсе рассматриваются вопросы построения архитектуры
корпоративной кибербезопасности на основании моделировании угроз кибербезопасности.Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, сотрудники, принимающие
проектные управленческие решения, а также инженеры, отвечающие за внедрение решений
кибербезопасности в корпоративной инфраструктуре.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Создание модели угроз.
Принципы создания модели угроз.
Методики выявления угроз для корпоративной инфраструктуры.
Создание модели угроз с помощью методики STRIDE.
Использование деревьев атак и библиотеки атак.Модуль 2 – Модель угроз и оценка рисков кибербезопасности.
Методики оценки рисков для модели угроз.
Метод вероятностного моделирования Монте Карло.Модуль 3 – Построение процесса управления угрозами.
Стратегии и методики работы с рисками.
Стратегии и методики работы с угрозами.Модуль 4 – Моделирование угроз в архитектуре корпоративной
кибербезопасности.
Архитектура корпоративной кибербезопасности.
Выбор технических решений на основе модели угроз.
Выбор метрик для мониторинга корпоративной кибербезопасности.
Методы модернизации модели угроз. - ANT0501 — Метрики кибербезопасности
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0501
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты мониторинга корпоративной кибербезопасности с помощью метрик. Рассматриваемые метрики включают в себя: набор кумулятивных метрик, статистические метрики угроз кибербезопасности. Также материал курса охватывает вопросы встраивания процессов мониторинга на основе метрик в архитектуру корпоративной кибербезопасности.
Аудитория курса:
Сотрудники компаний, принимающие проектные управленческие решения, а также инженеры, занимающие мониторингом и обработкой событий и инцидентов кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Контроль доступа и его типы.
Механизмы контроля доступа.
Принципы построения архитектуры кибербезопасности.Модуль 2 – Кумулятивные метрики кибербезопасности.
Определение ключевых метрик для мониторинга.
Метрики периметра безопасности.
Метрики безопасности сетевой инфраструктуры.
Метрики контроля доступа.
Метрики безопасности сервисов и приложений.
Метрики доступности и надежности корпоративной инфраструктуры.
Оценка эффективности метрик.Модуль 3 – Статистические метрики угроз кибербезопасности.
Проблема оценки эффективности мер и решений кибербезопасности.
Базовые показатели эффективности.
Улучшение и оптимизация показателей эффективности.
Измерение базовых показателей и результатов их улучшения.
Измерение времени жизни угроз.
Измерение снижения объёма угроз.
Измерение скорости появления угроз.
Измерение времени между появлением угроз.
Измерение скорости утери контроля над угрозами. - ANT0502 — Управление рисками кибербезопасности
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0502
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
В материалах курса рассматриваются методы управления рисками, конкретнее – оценки рисков, основанные на построении численных вероятностных моделей, в частности моделей по методу Монте Карло. Ряд предложенных на семинаре методов оценки рисков представляют собой вероятностные методы Байеса, применяемые в условиях частичной неопределенности. Для всех
рассматриваемых методов приводятся методики корректировки, с учетом субъективных данных. Кроме того, на курсе разбираются методы оценки рисков в условиях «полной неопределённости». Основная цель семинара – показать возможность использования измеримых и математически достоверных численных методов управления рисками в контексте кибербезопасности.Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, а также сотрудники, принимающие проектные управленческие решения.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания о моделировании угроз кибербезопасности на уровне курса ANT0052.
Содержание курса:
Модуль 1 – Информация для задач оценки рисков.
Моделирование угроз кибербезопасности.
Неопределенность и измерения.
Теория вероятностей для ситуаций неопределенности.
Методы математической статистики.Модуль 2 – Моделирование вероятностных событий.
Метод моделирования Монте Карло.
Корректировка субъективных данных.
Измеримость результатов моделирования.
Кривые вероятностных потерь и их анализ.Модуль 3 – Информация для задач вероятностного моделирования.
Субъективные данные и их объективная оценка.
Декомпозиция входных данных.
Расширение модели Монте Карло условными вероятностями. Байесовские методы.
Специальные вероятностные модели.
Подбор релевантных распределений вероятности.
Измеримость и достоверность вероятностных моделей для оценки рисков кибербезопасности.Модуль 4 – Принятие решений на основе оценки рисков.
Кривые вероятностных потерь.
Стратегии и методики работы с рисками.Модуль 5 – Построение процесса управления рисками.
Методы принятия решений на основе оценки рисков.
Совместимость с международными системами управления ИБ: ISO, Cobit, NIST.Модуль 6 – Альтернативная система управления рисками. FAIR.
Концепция FAIR.
Измерения и анализ данных.
Методики расчета рисков.
Типовые сценарии.
Внедрение управления рисками по методике FAIR.Модуль 7 – Управление рисками в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Выбор технических решений на основе решений о работе с рисками.
Выбор метрик для мониторинга корпоративной кибербезопасности.
Методы модернизации вероятностной модели оценки рисков. - ANT5001 — Архитектура корпоративной кибербезопасности
- Длительность: 3 дня (24 часа)
 - Код курса: ANT5001
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курсаВ данном курсе рассматриваются принципы, методы и инструменты построения архитектуры корпоративной кибербезопасности, которая включает систему управления информационной безопасностью, а также комплекс операционных и технических процессов кибербезопасности. Материл курса построен так, чтобы слушатели научились формировать из этих составляющих непротиворечивую и измеримую архитектуру, которая позволит определять и решать стратегические и тактические задачи кибербезопасности предприятия.Аудитория курса
Сотрудники компаний, отвечающие за проектирование и построение процессов кибербезопасности и информационной безопасности компании, руководители службы безопасности.
Предварительные требования
Рекомендуется обладать знаниями общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 - Принципы обеспечения кибербезопасности.
Конфиденциальность, целостность, доступность.
Контроль доступа.
Компоненты архитектуры кибербезопасности.
Использование паттернов безопасности при построении архитектуры.Модуль 2 - Система управления информационной безопасностью.
Задачи и процессы в области управления информационной безопасности.
Стандарт ISO 27001 как основа построения СУИБ.
Стандарты Cobit, CRISC, NIST как инструменты построения системы ИБ.
Задачи и ответственность руководителя системы ИБ.
Сертификации CISM и CISSP для руководителей системы ИБ.Модуль 3 - Центр операционной безопасности (SOC).
Задачи и процессы корпоративного SoC’а.
Принципы и стандарты организации и проведения аудита ИБ.
Принципы и стандарты организации и проведения пентестов.Модуль 4 - Технические решения кибербезопасности.
Технические решения корпоративного сегмента.
Технические решения промышленного сегмента.
Стандарт CIS для учета применения технических решений кибербезопасности.
Технические решения и подходы по обеспечению сохранности данных.Модуль 5 - Работа с требованиями регуляторов.
Требования в области работы с персональными данными и проблема приватности.
Требования в области работы с медицинскими данными.
Требования в области работы с финансовыми данными.
Требования в области безопасности промышленных объектов.
Режим работы с коммерческой тайной. - ANT5002 — Построение Центра операционной Безопасности (SoC’а)
- Длительность: 5 дней (40 часов)
 - Код курса: ANT5002
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
В данном курсе рассматриваются принципы, методы и инструменты построения Центра
операционной Безопасности – SoC’а. Вопросы построения SoC’а необходимо рассматриваются в
контексте целей и задач работы SoC’а в рамках архитектуры корпоративной кибербезопасности.Аудитория курса:
Сотрудники компаний, отвечающие за проектирование и построение Центра операционной
Безопасности – SoC’а.Предварительные требования к аудитории:
Необходимы: знания общей кибербезопасности на уровне курса ANT0000, знания о
моделировании угроз, управлении рисками, метриками и политиками кибербезопасности на
уровне курсов ANT0051, ANT0052, ANT0501 и ANT0502.Содержание курса:
Модуль 1 – Архитектура и компоненты SoC’а.
Корпоративные процессы кибербезопасности.
Цели и задачи работы SoC’а.
Программно-аппаратные компоненты и персонал.
SoC в архитектуре корпоративной кибербезопасности.
Контроль безопасности процессов финансовой деятельности.
Исследовательские задачи SoC’а.Модуль 2 – Моделирование угроз и оценка рисков
кибербезопасности.
Моделирования угроз.
Оценки и управления рисками.Модуль 3 – Политики и метрики кибербезопасности.
Управление каталогом политик кибербезопасности.
Управление и оценка эффективности метрик кибербезопасности.Модуль 4 – Работа с уязвимостями и обновлениями.
Контроль уязвимостей.
Процессы тестирования и применения патчей и обновлений.Модуль 5 – Обработка инцидентов кибербезопасности.
Мониторинг событий и инцидентов.
Процесс обработки инцидентов.
Инструменты и инфраструктура для обработки инцидентов.
Автоматизация обработки инцидентов средствами SOAR.Модуль 6 – Цифровая криминалистика.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 7 – Анализ вредоносного п/о.
Управление каталогом вредоносного п/о.
Методы и инструменты reverse engineering’а.
Формирование сигнатур и индикаторов компрометации.Модуль 8 – Threat Intelligence.
Процессы Threat Intelligence.
Компоненты Threat Intelligence.
Источники информации Threat Intelligence.
Методы обработки информации Threat Intelligence.
Создание и использование платформы MLOPS.Модуль 9 – Культура корпоративной безопасности.
Проблемы человеческого фактора в кибербезопасности.
Создание культуры корпоративной безопасности.
Инструменты создания культуры корпоративной безопасности
Программа обучения персонала компании.
Построение процесса киберучений.Модуль 10 – Требования регуляторов.
Сопровождение внедрения требований регуляторов.
Контроль соответствия требованиям регуляторов. - ANT5003 — Проектирование систем физической безопасности
- Длительность: 5 дней (40 часов)
 - Код курса: ANT5003
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить вопросы проектирования и нюансов внедрения систем объектовой физической безопасности, включая нормативные требования регуляторов РК.
Аудитория курса
Инженеры, отвечающие за проектирование и внедрение систем объектовой физической безопасности.
Предварительные требования
Необходимо обладать знаниями о работе систем аналоговой и цифровой связи, знаниями о работе сетей TCP/IP.
Содержание курса:
Модуль 1 - Введение проектирование комплекса систем безопасности.
Основные понятия.
Классификация систем безопасности.
Необходимость оборудования объектов системами безопасности.
Объектовая безопасность.
Автоматическая противопожарная защита.Модуль 2 - Система автоматической пожарной сигнализации.
Пожарные извещатели.
Размещение извещателей.
Адресная и безадресная системы автоматической пожарной сигнализации.Модуль 3 - Система оповещения и управления эвакуацией.
Выбор типа оповещения.
Расчет звукового давления оповещателей.
Размещение световых, звуковых и речевых оповещателей на объекте.Модуль 4 - Система автоматического пожаротушения.
Определение необходимости установки системы автоматического пожаротушения.
Выбор системы автоматического пожаротушения и огнетушащего вещества.
Алгоритм запуска системы автоматического пожаротушения.Модуль 5 - Взаимодействие систем автоматической противопожарной защит.
Взаимодействие систем автоматической пожарной сигнализации, оповещения и управления эвакуацией, автоматического пожаротушения.
Передача необходимых сигналов в смежные системы.Модуль 6 - Система охранной сигнализации.
Классификация объектов защиты.
Размещение охранных извещателей.
Рубежи охраны.
Тревожная сигнализация.
Передача тревожных сигналов на пульт охраны.Модуль 7 - Система контроля и управления доступом.
Разграничение прав доступа.
Зоны доступа.
Точки доступа.
Идентификация персонала.
Автоматические и централизованные системы.
Формирование отчетов.Модуль 8 - Система охранного видеонаблюдения.
Контролируемые участки объекта.
Размещение видеокамер.
Выбор системы видеонаблюдения.Модуль 9 - Взаимодействие систем объектовой безопасности.
Техническая укрепленность объекта.
Взаимодействие систем охранной сигнализации, контроля и управления доступом, охранного видеонаблюдения.
Технические средства безопасности объекта.
Вспомогательные системы.Модуль 10 - Выбор и размещение оборудования для специальных условий
Выбор оборудование для установки на улице и во взрывоопасных зонах.
Строительная климатология.
Параметры оборудование во взрывозащищенном исполнении.
Особенности размещения оборудования.
Оптоволоконные линии связи. - ANT0061 — Персональные данные и проблема приватности
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0061
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
В материалах данного курса рассматриваются вопросы работы с персональными данными, а также проблемы приватности. Кроме того, на курсе рассматриваются вопросы построения архитектуры корпоративной кибербезопасности с учётом проблем соблюдения приватности и соответствия требованиям регуляторов в части работы с персональными данными.
Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, сотрудники, принимающие проектные управленческие решения, а также специалисты, отвечающие за обработку персональных данных и взаимодействие с регуляторами по этим вопросам.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Приватность.
Концепция приватности и её развитие.
Проблемы приватность в киберпространстве.
Приватность в контексте протоколов сети Интернет.
Моделирование и оценка угроз приватности.Модуль 2 – Моделирование угроз приватности.
Методики моделирования угроз приватности.
Создание модели угроз приватности по методике LINDDUN.
Оценка рисков приватности.Модуль 3 – Работа с персональными данными.
Персональные данные и приватность.
Стандарты и требования регуляторов.
Методы учета и анализа процессов и компонентов работы с персональными данными.
Деперсонификация данных.
Аудит процессов и компонентов работы с персональными данными.Модуль 4 – Моделирование угроз приватности в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Технические решения защиты приватности и персональных данных.
Организационные решения защиты приватности и персональных данных. - ANT0601 — Защита от утечек данных
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0601
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить методы и механизмы защиты от утечек
данных в архитектуре корпоративной кибербезопасности, в том числе с помощью систем Data Loss
Prevention. Проблемы утечки данных на курсе рассматриваются, в контексте проблем
корпоративного мошенничества и «инсайдерских» угроз.Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной инфраструктуры, инженеры,
проектирующие архитектуру кибербезопасности, инженеры, занимающиеся обработкой
инцидентов кибербезопасности, а также аналитики, работающие с данными Threat Intelligence.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Проблема утечки данных.
Корпоративное мошенничество.
Промышленный шпионаж.
«Инсайдерские» угрозы.
Утечка данных.
Моделирование угроз утечки данных.
Оценка рисков утечки данных.Модуль 2 – Методы и механизмы защиты от утечек данных.
Методы защиты от корпоративного мошенничества.
Методы защиты от «инсайдерских» угроз.
Предотвращение утечек данных.
Обнаружение и реагирование на утечки данных.
Threat Intelligence для обнаружения утечек данных.
Системы Data Loss Prevention (DLP).Модуль 3 – DLP в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Интеграция DLP c компонентами Threat Intelligence.
Обработка инцидентов утечки данных.
Построение системы внутреннего корпоративного контроля. - ANT0602 — Сохранность данных
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0602
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, подходы, и технологии
обеспечения сохранности данных: архивирование, резервное копирование и обеспечение
катастрофоустойчивости. Также на курсе рассматриваются вопросы проектирования этих
процессов.Аудитория курса:
Сотрудники компаний, отвечающие за задачи резервного копирования данных и обеспечивающих
их сохранность.
Предварительные требования к аудитории:
Необходимы знания в области работы операционных систем и систем хранения данных.Содержание курса:
Модуль 1 – Корпоративные данные.
Приложения и данные в собственной инфраструктуре.
Приложения и данные в «облаке».
Модель угроз и риски при хранении данных.Модуль 2 – Обеспечение сохранности данных.
Отказоустойчивость и доступность.
Резервное копирование.
Disaster Recovery.
Архивирование.
Планирование и проектирование механизмов обеспечения сохранности
данных.Модуль 3 – Внедрение механизмов резервного копирования.
Резервное копирование данных в собственной инфраструктуре. Bareos.
Резервное копирование данных в «облаке». Corso. - ANT-ICS101 — Функционирование промышленных объектов
- Длительность: 3 дня (24 часа)
 - Код курса: ANT-ICS101
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить основы функционирования систем промышленной автоматизации – АСУ ТП – на объектах промышленной инфраструктуры. На курсе разбираются ключевые элементы, механизмы и протоколы работы АСУ ТП, а также вопросы построения архитектуры системы промышленной автоматизации.
Аудитория курса
Люди, желающие познакомиться с функционированием механизмов промышленной автоматизации.
Предварительные требования
Желательно обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 - Компоненты АСУ ТП.
Промышленные объекты и системы управления процессами.
Распределенные системы управления.
SCADA.
Программируемые логические контроллеры.
Программируемые электронные компоненты.
Интерфейсы контроля и визуализации.
Секторы применения и архитектуры АСУ ТП.Модуль 2 - Взаимодействие компонентов АСУ ТП.
Физические каналы взаимодействия.
Типы физической передачи данных и организации протоколов обмена данными в АСУ ТП.
RS-232.
RS-485.
Токовая петля.
Принципы построения протоколов обмена данными в АСУ ТП.
Промышленные протоколы обмена данными в АСУ ТП.
Modbus/Modbus Plus/DNP3/DH485/HART/CAN/DeviceNet/ProfiBus/ProfiNet.
Особенности работы промышленных протоколов поверх стека TCP/IP.
Особенности построения отказоустойчивых и избыточных топологий компонентов АСУ ТП.
Поиск и устранение неисправностей промышленных протоколов.Модуль 3 - Программное обеспечение АСУ ТП.
Особенности kernel’а и ОС, используемых для PLC и IED.
Языки программирования компонентов АСУ ТП.
Ladder Diagram.
Function Block Diagram.
Sequential Function Chart.
Instruction List.
Structured Text. - ANT0071 — Мониторинг кибербезопасности на промышленных объектах
- Длительность: 3 дня (24 часа)
 - Код курса: ANT0071
 - Стоимость
 - Очный формат: 520 000 ₸
 - Онлайн формат: 498 500 ₸
 
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить процессы, техники и инструменты мониторинга событий и инцидентов кибербезопасности на промышленных объектах. Материал курса охватывает также вопросы организации процессов мониторинга событий и инцидентов кибербезопасности и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса
Инженеры, обеспечивающие кибербезопасность объектов промышленной инфраструктуры, а также инженеры, проектирующие архитектуру кибербезопасности объектов промышленной инфраструктуры. Инженеры, занимающиеся мониторингом и обработкой событий и инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания принципов построения и функционирования промышленных объектов.
Содержание курса:
Модуль 1 - Объект промышленной инфраструктуры.
Промышленные процессы и управление ими.
АСУ ТП.
Компоненты АСУ ТП: DCS, SCADA, HMI.
Программируемые контроллеры – PLC – промышленных процессов.
Телеметрия.
Протоколы обмена данных на промышленном объекте.
Типовые архитектура промышленных объектов для различных отраслей.Модуль 2 - Модель угроз промышленного объекта.
Угрозы кибербезопасности промышленных объектов.
Угрозы безопасности жизнедеятельности.
Определение угроз кибербезопасности c помощью методики PHA.
Определение угрозы кибербезопасности с помощью методики STRIDE.
Построение модели угроз кибербезопасности промышленного объекта.
Управление рисками кибербезопасности для промышленного объекта.Модуль 3 - Мониторинг сетевой инфраструктуры.
Log’и и информация о сетевой активности.
Сбор и анализ сетевого трафика.
Информация о сессиях.
Статистические данные сетевой активности.
Централизованные и распределенные системы сетевого мониторинга.
Развертывание и поддержка системы сетевого мониторинга.Модуль 4 - Мониторинг конечных устройств.
Политики мониторинга и log’и PLC и RTU.
Политики мониторинга и log’и HMI.
Подсистема аудита Windows CE.
Развертывание и поддержка мониторинга Windows.
Настройки мониторинга и log’и QNX и VxWorks.
Подсистема аудита Linux.
Развертывание и поддержка мониторинга Linux.Модуль 5 - Мониторинг приложений.
Использование флагов и маяков в промышленной инфраструктуре для мониторинга.
Мониторинг SCADA.
Мониторинг баз данных Historian.Модуль 6 - Мониторинг событий и инцидент в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Интеграция систем мониторинга.
SIEM-системы.
Дифференция событий и инцидентов кибербезопасности.
Подтверждение инцидентов кибербезопасности.
Обработка инцидентов кибербезопасности.
Цифровая криминалистика. - ANT0701 — Кибербезопасность промышленных объектов
- Длительность: 5 дней (40 часов)
 - Код курса: ANT0701
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить архитектуру, принципы, методы и
механизмы обеспечения кибербезопасности объектов промышленной инфраструктуры. В курсе
также рассматриваются международные стандарты и регламенты в области кибербезопасности
объектов промышленной инфраструктуры, и содержаться уточнения по требованиям локальных
регуляторов.Аудитория курса:
Инженеры, обеспечивающие кибербезопасность объектов промышленной инфраструктуры, а
также инженеры, проектирующие архитектуру кибербезопасности объектов промышленной
инфраструктуры.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания
принципов построения и функционирования промышленных объектов.Содержание курса:
Модуль 1 – Объекты промышленной инфраструктуры.
Промышленные процессы и управление ими.
АСУ ТП.
Компоненты АСУ ТП: DCS, SCADA, HMI.
o Программируемые контроллеры – PLC – промышленных процессов.
Телеметрия.
Протоколы обмена данных на промышленном объекте.
Типовые архитектура промышленных объектов для различных отраслей.Модуль 2 – Модель угроз промышленного объекта.
Угрозы кибербезопасности промышленных объектов.
Угрозы безопасности жизнедеятельности.
Определение угроз кибербезопасности c помощью методики PHA.
Определение угрозы кибербезопасности с помощью методики STRIDE.
Построение модели угроз кибербезопасности промышленного объекта.
Управление рисками кибербезопасности для промышленного объекта.Модуль 3 – Регламенты и стандарты кибербезопасности
промышленных объектов.
Модель Purdue.
Стандарт ISA/IEC 62443.
Применение стандарта ISA/IEC 62443.
Стандарты ISO 27000 и их совместимость со стандартами ISA/IEC62443.
Требования и регламенты локальных регуляторов.Модуль 4 – Кибербезопасность сетей промышленного объекта.
Принципы сегментации сетей на промышленных объектах.
Обеспечение взаимодействия корпоративной и промышленной сетей.
Проблемы безопасности промышленных протоколов обмена данными.
Возможности по фильтрации трафика.Модуль 5 – Кибербезопасность контроллеров и управляющих
компонентов.
Основные типы PLC и других управляющих устройств.
Проблемы безопасности PLC.
Компоненты SCADA и их проблемы безопасности.
Проблемы безопасности баз данных промышленного назначения.Модуль 6 – Кибербезопасность конечных устройств.
Безопасность конечных устройств и приложений на ОС Windows.
Безопасность конечных устройств и приложений на ОС Linux.
Безопасность аппаратной части конечных устройств.Модуль 7 – Обработка инцидентов кибербезопасности на
промышленных объектах.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о
новых событиях и инцидентах.Модуль 8 – Проектирование и управление кибербезопасностью на
промышленном объекте.
Интеграция процессов и задач кибербезопасности промышленного объекта
в корпоративный SoC.
Физическая безопасность промышленного объекта.
Проектирование ролевой модели и правил контроля доступа.
Аудит кибербезопасности и пентест промышленного объекта.
Создание каталога метрик кибербезопасности промышленного объекта.Модуль 9 – Кибербезопасность промышленного IoT.
Архитектура промышленного IoT.
Модель угроз и управление рисками промышленного IoT.
Регламенты и стандарты кибербезопасности для промышленного IoT.
Методы и механизмы кибербезопасности промышленного IoT.
Операционная кибербезопасность промышленного IoT.
Управление кибербезопасностью промышленного IoT. - ANT7001 — Пентест промышленных объектов
- Длительность: 5 дней (40 часов)
 - Код курса: ANT7001
 - Стоимость
 - Очный формат: 771 500 ₸
 - Онлайн формат: 749 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты
проведения тестирования на возможность проникновение – pentest’а – на объект промышленной
инфраструктуры. В данном курсе пентест рассматривается как один из процессов, необходимых
для построения кибербезопасности промышленного объекта, поэтому в нём также поднимаются
методологические вопросы организации пентеста, а также использования данных, полученных в
результате его проведения.Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры,
проектирующие архитектуру корпоративной кибербезопасности и архитектуру кибербезопасности
объектов промышленной инфраструктуры.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, знания о работе сетей
TCP/IP на уровне курса ANT-N101, а также знания о принципах, методах и механизмах
кибербезопасности объектов промышленной инфраструктуры на уровне курса ANT0701.
Рекомендуется обладать знаниями о моделировании угроз на уровне курса ANT0052Содержание курса:
Модуль 1 – Принципы организации пентеста.
Цели и задачи проведения пентеста.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения пентеста.
Обработка результатов проведения пентеста.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Организация кибератак на сетевые компоненты.
Перехват трафика.
Получение доступа к беспроводным каналам связи.
Методы обхода систем сетевой кибербезопасности.
Организация кибератак на протоколы IP-сетей.
Организация кибератак на сервисы удаленного управления ОС.
Организация кибератак на протоколы промышленных сетей.
Организация кибератак на PLC.
Организация кибератак на системы SCADA.Модуль 4 – Организация кибератак через электронную почту.
Подготовка вредоносных вложений.
Базовые принципы социальной инженерии.
Кибератаки на протоколы электронной почты.
Получение доступа к ОС пользователей через вредоносные вложения.
Контроль за элементами промышленного объекта через вредоносные
вложения.Модуль 5 – Развитие кибератаки с базовым доступом к ОС.
Извлечение данных и учетных записей.
Эскалация привилегий учетной записи.
Распространение контроля над другими системами в ходе кибератаки.
Удаление следов кибератаки.
Нарушение работы элементов HMI.Модуль 6 – Подготовка отчета о проведении пентеста.
Модель угроз и результаты проведения пентеста.
Управление рисками на основе данных, выявленных пентестом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. 
Python
- PYT01 — Программирование на языке Python, базовый курс
- Длительность: 5 дней (40 часов)
 - Код курса: PYT01
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
Python – это высокоуровневый язык программирования, который активно набирает популярность в последнее время. Данный язык часто рассматривается как первый язык для освоения, так как он достаточно прост в изучении, но, не смотря на простоту, возможности языка позволяют решать широкий спектр задач. Данный курс разрабатывался для быстрого введения в основы языка. После прохождения курса слушатель будет иметь общее представление о современных концепциях программирования и сможет самостоятельно разрабатывать простые программы. Курс основан на актуальной версии языка.
Аудитория курса:
Курс будет полезен всем желающим начать осваивать язык программирования Python (как с опытом работы с другими языками, так и без него) для применения в дальнейшем в различных направлениях.
Язык Python используют : Разработчики ПО, WEB программисты, сетевые инженеры.Содержание курса:
1. Язык Python и типы данных
Обзор языка Python
Среды разработки ПО
Интерпретатор и выполнение программ
Типы и структуры данных
Динамическая типизация
Ввод и вывод данных
Лабораторная работа
Работа с типами данных2. Условия, циклы, словари
Структура программы
Условная инструкция
Циклы
Итерации и генераторы
Коллекции (кортежи, множества, словари)
Лабораторная работа
Работа со структурами
Лабораторная работа
Написание первых программ3. Функциональное программирование
Структура и создание функций
Виды аргументов функций
Модули
Знакомство и работа с полезными модулями
Рубежная контрольная работа по Введению в Python
Лабораторная работа
Словари. Проект.
Лабораторная работа
Создание функций и работа с модулями4. Обработка исключений и дополнительные возможности Python
Основы исключений
Особенности использования исключений
Объекты исключений
Использование исключений
Лабораторная работа
Функции и коллекции. Часть 2
Лабораторная работа
Обработка исключений5. Объектно-ориентированное программирование
ООП и функциональное программирование
Общая концепция ООП
Парадигмы ООП
Классы
Создание классов
Дополнительные возможности классов
Лабораторная работа
Работа с ООП. Классы
Лабораторная работа
Парсинг строковых данных - PYT02 — Программирование на Python, продвинутый курс
- Длительность: 5 дней (40 часов)
 - Код курса: PYT02
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
Курс подойдет всем, кто уже пробовал писать скрипты и несложные сервисы на языке Python, автоматизировать рабочие задачи. Предполагается, что участник данного курса, как минимум, отлично разбирается в материале базового уровня, а также хочет сильно углубить свои знания в объектно-ориентированном программировании на Python, лучше писать код, проектировать системы и делать другие сложные вещи.
Аудитория курса:
Всем, заинтересованным в углублении знаний в python, подробном рассмотрении ООП, различных аспектов проектирования сервисов и знакомству с асинхронным программированием.
Предварительные требования:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Содержание курса:
1. ООП в Python
Повторим основы Объектно-ориентированного программирования, посмотрим особенности реализации в Python, попрактикуемся в написании собственных классов. В дополнение рассмотрим темы, необходимые каждому python-разработчику, такие как статические методы, абстрактные классы и метаклассы.
Основы ООП. Создание и методы классов
Принципы ООП. Декораторы, метод super()
Композиция, перегрузка операторов
Дандер методы, статические методы
Абстрактные классы, модуль АВС
Метаклассы2. Разберем и напишем собственные классы для генераторов, итераторов, исключений и менеджера контекста.
Генераторы
Итераторы
Исключения
Менеджеры контекста
Стек и очередь3. Познакомимся с такими темами как мультипроцессинг и асинхронность, без которых сейчас не обходится ни один сервис.
Разберемся в различиях, применении, терминологии и библиотеках multiprocessing и asyncio.
Мультипроцессинг
Асинхронное программирование4. Рассмотрение основных дизайн-паттернов и практика их использования.
 - PYT03 — Программирование на Python для сетевых инженеров, базовый курс
- Длительность: 5 дней (40 часов)
 - Код курса: PYT03
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
В данном курсе рассматриваются как общие аспекты работы языка программирования Python, так и применение его возможностей в сценариях обслуживания работы сетевого оборудования в сетях передачи данных. В курсе изучаются общие положения программирования и использование специализированных инструментов и библиотек для взаимодействия с сетевыми устройствами.
Аудитория курса:
Сетевые инженеры и сетевые администраторы, которые хотят дополнить свои знания сетей передачи данных использованием инструментов программирования.
Предварительные требования:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC)
Знания принципов работы сетей пакетной передачи данных в объеме сертификации CCNA (или аналогичных) и более. Рекомендуется знакомство с оборудованием одного из крупных производителей сетевого оборудования (Cisco Systems, Juniper Networks и т.д.)Содержание курса:
1. Python. Типы данных
Основные факты о языке программирования Python 3 (тип, устройство, сферы применения). Преимущества использования Python в сетях передачи данных.
Примеры синтаксиса языка. Документация PEP.
Стандартные типы данных (переменные, списки, кортежи, словари, сеты, файлы) с примерами использования и основными операциями над ними (преобразования типов, генерирование и т. д.).
Типы данных (и библиотеки), используемые в работе с сетевым оборудованием (ipAddress, XML, JSON, YAML) с примерами использования и основными операциями над ними (преобразования типов, генерирование и т. д.).
Лабораторная работа 1.
Работа с типами данных (стандартными и дополнительными).2. Операторы, функции и библиотеки
Условный оператор if/elif/else.
Операторы циклов while и for. Работа с циклами (break, continue).
Понятие функций. Рассмотрение синтаксиса, локальные и нелокальные переменные. Операторы return и yield. Отличие и примеры использования функций и генераторов.
Регулярные выражения и использование библиотеки re.
Модули и библиотеки. Назначение, использование, правила оформления.
Лабораторная работа 2.
Работа с условными операторами и циклами.
Лабораторная работа 3.
Работа с функциями и генераторами.3. Исключения и Netmiko
Обработка исключений. Операторы try/except/else/finally, оператор raise. Назначение и примеры использования.
Библиотеки взаимодействия с сетевыми устройствами посредством CLI. Библиотека Netmico.
Лабораторная работа 4.
Использование библиотек Netmiko для взаимодействия с сетевыми устройствами.4. NETCONF, REST API
Протокол NETCONF и библиотека ncclient. Применение, основные понятия, принципы работы с библиотекой. Поддержка производителями.
Формат REST API и библиотека request. Применение, основные понятия, принципы работы с библиотекой. Поддержка производителями. Cisco NX-API – примеры, особенности.5. Объектно-ориентированное программирование
Общая концепция ООП.
Парадигмы ООП.
Классы.
Создание классов.
Дополнительные возможности классов.
Лабораторная работа 5.
Работа с ООП. Классы. - PYT04 — Python для сетевых инженеров, дополнительные темы
- Длительность: 5 дней (40 часов)
 - Код курса: PYT04
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
В данном курсе рассматриваются расширенные темы использования языка программирования Python для обслуживания сетевого оборудования и автоматизации различных задач сетевого администратора. Изучаются принципы работы с инструментами парсинга и генерации конфигурационных файлов, инструменты анализа конфигурации, а также установка и настройка средств автоматизации управления сетевыми устройствами
Аудитория курса:
Сетевым инженерам и сетевым администраторам, которые хотят дополнить свои знания сетей передачи данных использованием инструментов программирования.
Предварительные требования:
Знания принципов работы сетей пакетной передачи данных в объеме сертификации CCNA (или аналогичных) и более.
Рекомендуется знакомство с оборудованием одного из крупных производителей сетевого оборудования (Cisco Systems, Juniper Networks и т.д.).
Также рекомендуется прохождение курса Программирование на Python для сетевых инженеров. Базовый курс (PYTHON_NET) или эквивалентный объем знаний.Содержание курса:
1. Установка сред написания программ и скриптов, установка тестовых сетевых сред
Работа с Jupyter Lab
Установка Docker
Установка и настройка ContainerLab
Лабораторная работа.
Подготовка среды для упражнений2. Парсинг конфигурационных файлов и выводов команд устройств
Основы парсинга текстовых документов в Python
Библиотека TextFSM
Библиотека TTP
Соединение операций библиотеки Netmiko и парсинга выводов команд
Лабораторная работа 1.
Парсинг выводов команд сетевого оборудования3. Библиотека Batfish
Назначение инструмента Batfish
Установка контейнера Batfish
Подготовка к использованию Batfish в Python
Возможности Batfish по анализу файлов конфигурации
Лабораторная работа 2.
Установка Batfish и работа с конфигурационными файлами устройств4. Библиотека Jinja2 для создания конфигурационных файлов
Подготовка к использованию Jinja2
Синтаксис шаблонов Jinja2
Лабораторная работа 3.
Создание конфигурационных файлов с помощью Jinja25. Nornir (подготовка и инициализация)
Установка и подготовка
Построение инвентарных данных
Основы синтаксиса
Лабораторная работа 4.
Установка и подготовка фреймворка Nornir6. Nornir (использование)
Конфигурационные опции и подготовка результатов
Задания и обработка инвентарных данных
Пользовательские задания
Обработка неполадок и ошибок заданий
Лабораторная работа 5.
Использование Nornir для настройки и обслуживания сетевого оборудования7. Готовые библиотеки и фреймворки от производителей оборудования
Рассмотрение работы библиотек различных сетевых производителей (Cisco, Juniper и т.д.)
Лабораторная работа 6.
Использование фреймворков и библиотек от производителей оборудования8. Использование инструментов CI/CD для работы с сетевым оборудованием
Установка и настройка Jenkins
Построение pipeline в Jenkins для выполнения серий заданий на сетевых устройствах
Лабораторная работа 7.
Использование Jenkins для работы с сетевым оборудованием - PYT05 — Настройка сетевого оборудования с использованием Ansible
- Длительность: 5 дней (40 часов)
 - Код курса: PYT05
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
На данном курсе участники познакомятся с системой управления конфигурациями Ansible для работы с настройкой сетевого оборудования различных производителей. В курсе рассматриваются аспекты подготовки инфраструктуры под использование Ansible и осуществление конфигурационных и мониторинговых работ над оборудованием с помощью встроенных и дополнительных инструментов Ansible. Участники курса получат навыки эксплуатации Ansible с использованием рекомендованных практик, а также информацию о поиске и устранении неполадок в работе системы управления конфигураций.
Аудитория курса:
Курс будет интересен сетевым администраторам, сетевым архитекторам и специалистам технической поддержки.
Предварительные требования:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Содержание курса:
1. Основы Ansible и установка.
Архитектура и назначение Ansible
Устройство инвентарных данных Ansible
Установка и предварительная настройка
Установка и настройка Ansible AWX
Основы построения Ansible Playbook
Переменные и модули
Отправка команд командной строки2. Построение комплексных плейбуков
Управление учетными записями
Сбор фактов о сетевых устройствах
Tag, limit и check
Условия
Петли (циклы)
Шаблонизация конфигурации3. Масштабирование работы с инфраструктурой
Специализированные модули для конфигурации
Import и Include
Роли
Парсинг выводов сетевых устройств
Динамическая инвентаризация
Управление процессом выполнения4. Расширенные возможности Ansible
Jinja2 lookup плагин
Фильтры
Плагины
Устранение неполадок работы Ansible
Ansible Vault5. Интеграция и расширенные темы
Интеграция со сторонними системами инвентаризации
Интеграция со сторонними системами конфигурирования
Создание пользовательских модулейУпражнения
Установка и настройка Ansible и Ansible AWX
Инвентаризация и базовая отправка команд на группы устройств
Использование условий и циклов
Создание и использование шаблонов конфигурации
Роли и импорты
Использование плагинов и фильтров
Использование Ansible Vault
Устранение неполадок
Интеграция с NetBox и NAPALM - PYT06 — Автоматизация задач на основе Python
- Длительность: 5 дней (40 часов)
 - Код курса: PYT06
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
Курс подойдет всем, кто уже умеет писать несложные скрипты для рабочих задач и хочет научиться автоматизировать и другие процессы. На курсе вы научитесь с помощью python-скриптов открывать и обрабатывать различные виды файлов, обрабатывать табличные данные, используя подходящие решения и фреймворки python, научитесь автоматически генерировать документы и отчеты из обрабатываемых данных, познакомитесь с клиент-серверной архитектурой и создадите собственный телеграм-бот, а так же узнаете о большом количестве полезных библиотек, способных упростить вам работу.
Аудитория курса:
Всем специалистам, заинтересованным во внедрении Python в свою работу и автоматизации рутинных задач и бизнес-процессов.
Предварительные требования к аудитории:
Знание языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Для проверки уровня предварительных знаний можно пройти тестирование.Содержание курса:
1. Работа с файлами txt, xml, yaml, json, csv.
Чтение, запись, обработка.
Методы обработки словарей
Практика: обработка данных из файлов, анализ табличных данных2. Библиотеки для анализа данных pandas и numpy.
Визуализация данных с помощью matplotlib/seaborn.
Обработка и анализ больших данных.3. Автоматизация работы с файлами word и excel.
Библиотеки openpyxl и docxtpl.
Регулярные выражения.
Практика: генерирование отчетов по шаблону по данным из базы, проверка данных4. Работа с HTTP в Python.
Модуль requests.
Работа с API.
Практика: Развертывание telegram бота.Модуль 5. Обзор полезных библиотек и фреймворков Python для автоматизации
 - PYT07 — Применение Python для обработки данных
- Длительность: 5 дней (40 часов)
 - Код курса: PYT07
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
Данный курс рассматривает основные возможности языка Python и вспомогательных библиотек для работы с большими объемами структурированных и неструктурированных данных с использованием локальных ресурсов и облачных сред. Изучаются основы машинного обучения как способа работы с неструктурированными данными на основе библиотеки Tensorflow. Также рассматриваются распространённые инструменты визуализации данных.
Аудитория курса:
Инженеры по работе с данными, а также разработчики ПО, желающие изучить основы машинной обработки данных
Предварительные требования к аудитории:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Содержание курса:
1. Python для работы с данными.
Обработка данных с помощью Python
Введение в Jupyter Lab
Собственные структуры данных Python
Библиотека NumPy (цель и возможности)
Библиотека MatPlotLib (цель и возможности)
Лабораторная работа 1.
Работа с типами данных2. Оценка данных, введение в машинное обучение
Библиотека Pandas, понятие датафреймов и операции над ними
Введение в машинное обучение
Терминология
Виды и возможности
Обучение моделей
Градиентный спуск
Hyperparameters, Losses, Learning Rate
Generalization
Сеты данных
Лабораторная работа 2.
Работа с датафреймами
Лабораторная работа 3.
Изучение зависимостей в машинном обучении3. Tensorflow и Feature Engineering
Введение в Tensorflow и Keras
Возможности и способы использования
Готовые модели
Инструменты для создания собственных моделей
Feature Selection and Engineering
Лабораторная работа 4. Использование Tensorflow
Лабораторная работа 5.
Feature Engineering4. Глубокое обучение и среды для обучения моделей
Глубокое обучение
Применение и возможности
Ресурсы для обучения моделей
Облачные ресурсы для обучения моделей
Лабораторная работа 6.
Глубокое обучение
Лабораторная работа 7.
Обучение моделей в подготовленной среде5. Визуализация данных.
Библиотеки Python для визуализации
Облачные среды для визуализации данных
Статистическая оценка данных
Лабораторная работа 8. Визуализация и статистическая оценка данных - PYT08 — Python для web разработки, фреймворк flask
- Длительность: 5 дней (40 часов)
 - Код курса: PYT08
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
Flask — самый простой фреймворк для создания веб-приложений на языке программирования Python. Он подходит как для генерации страниц сайта или сервиса, так и для создания API мобильных приложений. Данную технологию можно интегрировать в люблю сферу, в том числе для создания личных и рабочих проектов. В ходе обучения рассматривается комплекс тем, начиная с того, что такое HTTP и как работает Интернет, заканчивая особенностями создания своего полноценного сервиса и развертывания его на сервере.
Предварительные требования к аудитории:
Знание языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Для проверки уровня предварительных знаний можно пройти тестирование.Содержание курса:
Модуль 1.
Фреймворк Flask и основы WEB
Как работает Интернет
Создание веб приложения на фреймворке Flask;
Маршрутизация
Рендеринг HTML
Язык шаблонов JinjaМодуль 2.
Создание URL адресов для сайта;
Обработка GET и POST запросов;
Связь backend и frontend;
Обработка запросов клиента на сервере
Получение данных запроса на сервереМодуль 3.
Реляционные базы данных. Введение
Основы SQL, ORM
Запросы к базе данных. Вывод информации из базы данных на страницах сайта;
Подключение базы данных в Flask
Библиотека SQLAlchemyМодуль 4.
Добавление, изменение, удаление данных;
Модели, отношения между моделями, миграции;
Защита сайта от атак
Итоговый проект - PYT09 — Python фреймворк Django
- Длительность: 5 дней (40 часов)
 - Код курса: PYT09
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
Django – бесплатный и свободный фреймворк для веб-приложений, написанный на Python. Изучение фреймворка значительно сложнее аналогичного Flask, однако предоставляет разработчикам больший функционал для создания сервисов. Преимуществами Django являются скорость, безопасность и масштабируемость. За курс вы получите базовые знания фреймворка, научитесь применять их на практике и спроектируете своё первое веб-приложение.
Предварительные требования:
Знание языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Для проверки уровня предварительных знаний можно пройти тестирование.Содержание курса:
Модуль 1.
Фреймворк Django – основные понятия
Установка Django и создание первого проекта
Приложения в проекте (Applications)
URL. Параметры в URL-запросах
Шаблоны (Templates)
Формы (Forms). Получение данных с формыМодуль 2.
Разработка архитектуры базы данных
Реляционные базы данных
Типы и свойства полей базы данных
Разработка архитектуры базы данных – отношения между моделями в DjangoМодуль 3.
Введение в Django ORM
Выполнение запросов к базе данных
Создание и редактирование записей в базе данных
Введение в Git и GithubМодуль 4.
CRUD приложения
Рендеринг шаблонов
Язык шаблонов. Шаблонные фильтры
Итоговый проект - PYT10 — Использование Python для работы с базами данных
- Длительность: 5 дней (40 часов)
 - Код курса: PYT10
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 663 500 ₸
 
Описание курса
Описание курса:
Курс предназначен для тех, кто уже знаком с основами языка программирования Python и хочет расширить свои навыки, используя их для работы с базами данных. В течение курса вы узнаете, как подключаться к базам данных, выполнять запросы, изменять данные и многое другое, используя мощные библиотеки Python, такие как SQLAlchemy и psycopg2.
Аудитория курса:
Курс предназначен для программистов и разработчиков, которые хотят использовать Python для работы с базами данных. Участники должны иметь базовые знания языка программирования Python и понимание основных понятий баз данных.
Предварительные требования к аудитории:
Базовые знания языка программирования Python.
Понимание основных понятий баз данных.Содержание курса:
Модуль 1
Введение в работу с базами данных в Python.
Установка и настройка необходимых инструментов.
Подключение к базе данных.
Лабораторная работа 1: Настройка окружения и подключение к базе данных.Модуль 2
Основные операции с базами данных в Python.
Выполнение запросов.
Изменение данных.
Лабораторная работа 2: Выполнение запросов и изменение данных в базе данных.Модуль 3
Работа с ORM (Object-Relational Mapping).
Использование SQLAlchemy.
Лабораторная работа 3: Использование SQLAlchemy для работы с базой данных.Модуль 4
Работа с PostgreSQL базами данных.
Использование библиотеки psycopg2.
Лабораторная работа 4: Работа с PostgreSQL базами данных в Python.Модуль 5
Оптимизация работы с базами данных.
Масштабирование баз данных.
Лабораторная работа 5: Оптимизация работы с базами данных в Python. 
Предприятие 4.0
- DGE-00 — Digital и Agile трансформация организаций — практический подход
- Длительность: 5 дней (40 часов)
 - Код курса: DGE-00
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 668 500 ₸
 
Описание курса
Описание курса:
Любые изменения на предприятии связаны с высокими рисками, большинство компаний в традиционных и высокотехнологичных отраслях оказываются в положении заложников требований рынка и вынуждены идти на потери чтобы начать динамичные изменения. Agile и Digital трансформации являются всего лишь инструментами в руках лидеров для достижения своих бизнес-целей. Критический подход к трансформации позволит разобраться с вызовами, стоящими перед лидерами изменений и командами и спланировать следующие шаги, соответствующие их целям и задачам.
Аудитория курса:
Консультантов
Менеджеров и участников трансформации на предприятии
Руководителей заинтересованных в проведении изменений на предприятииПо окончании курса слушатели смогут:
Изучите последнее понимание отраслью целей и задач трансформационных инициатив
Сильные и слабые стороны известных фреймворков
Разберетесь зачем и когда нужно начинать трансформации
Изучите опыт мировых консалтинговых агентств в планировании и проведении трансформацииСодержание курса:
Модуль 1 — Трансформация и ее разновидности
Индустрия 4.0 — состояние на 2022 год
Современные Цифровые бизнес-модели
Типы трансформационных инициатив и их особенности
Создание культуры инноваций
Управление изменениями на предприятиях
Операционный менеджмент и непрерывные улучшения
Бизнес-архитектура и архитектура предприятия
Лидерство и ответственностьМодуль 2 — Модели управления рисками
Разработка стратегии изменений
Разработка метрик для оценки результатов изменений
Применение стандартных моделей для расчета рисков
Анализ и управление рисками при реализации стратегии, управлении портфелями и программами
Особенности моделирования рисков при Agile и Digital трансформацииМодуль 3 — Как планировать и запускать agile трансформации
Оценка необходимости внедрения Agile культуры
Разработка дорожной карты и видения предприятия после трансформации
Комплексный анализ готовности предпрития к изменениями
Создание плана по изменению культуры предприятия с учетом рисков
Инкрементальное управление изменениями,мониторинг, адаптация и корректировка
Контроль достижения измеримых показателей трансформации
Переход предприятия в новую операционную реальность, поддержка непрерывности улучшений и измененийМодуль 4 — Как планировать и запускать Digital трансформации
Современное понимание цифровой трансформации
Анализ актуальных потребностей, проблем и возможностей предприятия
Формулирование Видения, Задач и целей трансформации
Разработка дорожных карт
Синтезирование новой операционной модели
Анализ рисков бизнеса и готовности предприятия к изменениям
Выбор фреймворков трансформации и разработка пошаговых планов изменений - DGE-01 — Гибкое управление цифровыми продуктами и продуктовыми командами
- Длительность: 5 дней (40 часов)
 - Код курса: DGE-01
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 668 500 ₸
 
Описание курса
Описание курса:
Гибкое управление исходит из осознания и принятия ценностей и принципов Agile, и ставит своей целью создание выдающихся продуктов и решений. Ключевая роль в прокладывании новаторского пути к конечному решению лежит на Product Manager. Доскональное изучение реальных проблем пользователей, создание культуры инноваций и безопасной среды для достижения успеха это лишь часть области интересов Product Manager.
Аудитория курса:
Начинающих продуктовых менеджеров;
Проектных менеджеров и бизнес-аналитиков;
Всех специалистов связанных с разработкой цифровых продуктов,желающих получить уверенные знания и навыки в области Product Management.По окончании курса слушатели смогут:
Сможете приступить к разработке нового продукта, используя изученные методы и техники;
Окажете влияние на культуру компании,поддерживая инновации и постоянные улучшения;
Начнете выстраивать эффективные коммуникации с технической командой.Содержание курса:
Модуль 1 — Основы Продуктовой Стратегии
Дисциплина управления продуктами
Лидерство и продуктовая культура
Подходы к управлению стратегией для цифровых продуктов
Постановка достижимых целей для продукта (OKR)
Ключевые метрики
Изучение потребностей пользователей (JTBD, CJM)Модуль 2 — Исследование гипотез и поиск возможностей
Формулирование гипотез и постановка целей
Достижение соответствия продукта / рынка
Тестирование гипотез и аналитика данных (A/B testing, Growth Hacking)
Разработка требований к продукту (USM, User Stories, User Jobs)
Создание продуктовой дорожной карты
Приоритезация требований и задач
Проектирование MVPМодуль 3 — Проектирование продукта и разработка
Экономика продукта (Unit Economics, P&L)
Проектирование пользовательского опыта
Agile разработка продукта
Жизненный цикл продукта
Управление рисками
Эффективное взаимодействие с командами разработкиМодуль 4 — Подготовка к запуску продукта, масштабирование и оптимизация
Управление продвижением продукта
Разработка бизнес-моделей
Управление бюджетами в Agile, финансовые оценки и ROI
Практика постоянных улучшений
Успешная презентация продуктаМодуль 5 — Лидерство и развитие продуктовых команд
Как развивать культуру инноваций
Лидерство и принятие решений на основе данные
Как масштабировать команды
Как измерять работу команды и развивать персональную ответственность - DGE-02 — Современный бизнес-анализ и его применение в Agile
- Длительность: 5 дней (40 часов)
 - Код курса: DGE-02
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 668 500 ₸
 
Описание курса
Описание курса:
Дисциплина бизнес-анализа неотъемлемо присутствует во всех современных организациях, но не всегда явно представлена бизнес-аналитиками. Задачи бизнес-аналитика также меняются под внешними вызовами и зависят от происходящих трансформаций на предприятиях. Что собой представляет бизнес-анализ как дисциплина, какие перспективы есть для ее применения и развития, как спланировать развитие аналитика в Agile мире и понять какое value создает роль, практикующая бизнес-анализ, все это будет рассмотрено на предлагаемом курсе.
Аудитория курса:
Начинающих и практикующих бизнес-аналитиков
Руководителей команд бизнес-анализа и проектных менеджеровПосле прохождения тренинга:
Вы получите полное представление о дисциплине бизнес-анализа в соответствии с IIBA BABOK 3.0 и Agile Extension v2
Сможете решать задачи и проблемы бизнеса с применением продуктовых подходов и инструментов
Научитесь анализировать создаваемую ценность бизнес-анализа и презентовать свою работу
Сформируете целостную картину компетенций и задач бизнес-анализа в Agile мире
Изучите ключевые и практические аспекты дисциплин Data Analytics и CybersecurityСодержание курса:
Модуль 1 State-of-the-art дисциплины бизнес-анализа
Какие пути развития и обучения есть у бизнес-аналитиков
Руководство бизнес-анализом и планирование развития вашей практики
Переосмысление задач центров компетенций
Как разработать модели компетенций
Как спланировать и рассчитать ROI на обучение аналитиков
Новая операционная модель бизнес-анализа
Разбор BABOK 3.0 – Как бизнес-аналитик помогает управлять портфелем, программой, проектом и продуктом
Критический путь БА, области компетенций и техники по BABOK 3.0Модуль 2 Бизнес-анализ в Agile среде и Product Ownership Analysis
Управление коммуникациями
Анализ процессов
Продуктовый менеджмент
Управление требованиями
Исследования потребностей заказчикаМодуль 3 Стратегический бизнес-анализ и Strategy to Execution Framework
Практическое применение инструментов и практик:
Program Strategy
Sponsorship and Governance Framework
Stakeholder Strategy
Execution Roadmaps
Business Case
Sourcing Strategy
User Journeys
Transition Strategy
Change & Adoption StrategyМодуль 4 Перспективные роли бизнес-анализа в цифровых организациях Business Data Analytics:
Как бизнес-аналитик помогает принимать решения для бизнеса с помощью данных?
Какие задачи стоят перед бизнес-анализом при работе с данными?
Как развивать Data Management в вашей организации ?Модуль 5 Перспективные роли бизнес-анализа в цифровых организациях Cybersecurity Analysis:
Бизнес-анализ и кибербезопасность
Архитектура кибербезопасности
Проектирование процессов кибербезопасности
Подходы к построению корпоративного SoC’а - NAUTO-00 — Автоматизация управления сетями TCP/IP
- Длительность: 5 дней (40 часов)
 - Код курса: NAUTO-00
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 668 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, технологии и механизмы автоматизации корпоративных сетей TCP/IP. Материал курса охватывает не только технические вопросы автоматизации, но и её методологию: вопросы подготовки и организации процессов автоматизации корпоративных сетей.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей теории программирования.
Содержание курса:
Модуль 1 – Проект автоматизации корпоративной сети TCP/IP.
Управление IT-проектами.
Потребности в автоматизации корпоративной сети.
Готовность процессов к автоматизации.
Адаптация стандартов и рекомендаций.
Бизнес требования.
Функциональные требования.
Создание прототипа автоматизированной корпоративной сети TCP/IP.Модуль 2 – Модель данных для разработки п/о.
Работа с данными при разработке п/о.
Создание модели данных.
Модификация и адаптация модели данных.Модуль 3 – Программное управление сетевыми устройствами.
Возможности программного управления сетевыми устройствами.
Классификация API.
Работа с REST-based API.
Работа с RPC-based API.Модуль 4 – Построение процесса разработки п/о.
Фазы процессов разработки п/о.
Методология Agile.
Методология Waterfall.
Ведение документации при разработке п/о.Модуль 5 – Особенности платформы Linux для разработки п/о.
Архитектура ОС Linux.
Особенности управления процессами в ОС Linux.
Особенности работы компиляторов в ОС.
Особенности работы Linker’ов и Loader’ов.
Работа с высокоуровневыми языками программирования.Модуль 6 – Инструменты разработки п/о.
Среды разработки.
Виртуализация и контейнеры.
Контроль версий при разработке п/о.
Автоматизированное тестирование п/о.
Автоматизированное развертывание п/о.
Методология и компоненты DevOps.Модуль 7 – Использование готовых платформ автоматизации.
Ansible.
SaltStack. - NAUTO-01 — Основы Python для сетевых инженеров
- Длительность: 5 дней (40 часов)
 - Код курса: NAUTO-01
 - Стоимость
 - Очный формат: 656 000 ₸
 - Онлайн формат: 642 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы программирования на языке Python для использования в сценариях автоматизации сетей TCP/IP. Курс охватывает не только инструменты языка Python, но и методологию написания стабильного программного кода и применение Python в контексте типовых задач сетевого инженера.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания основ
автоматизации на уровне курса NAUTO-00.Содержание курса:
Модуль 1 – Язык программирования Python.
Основные понятия языка программирования Python.
Подготовка окружения и среды написания программного кода.
Основы синтаксиса и типы данных.Модуль 2 – Основные инструменты языка Python.
Операторы.
Функции.
Библиотеки и модули.
Передача аргументов при запуске программ.Модуль 3 – ООП и обработка исключений.
Основы объектно-ориентированного программирования в Python.
Обработка исключений.
Логирование исполнения программ.Модуль 4 – Взаимодействие с сетевым оборудованием.
Обработка текстовых данных c помощью TTP и TextFSM.
Генерирование тестовых данных с помощью Jinja2.
Использование библиотеки Netmiko.Модуль 5 – Параллельное выполнение программного кода.
Многопоточное и мультипроцессорное выполнение.
Асинхронное выполнение.Модуль 6 – Поддержка качества программного кода.
Lint.
Unittest.
Методы оптимизации и обработки ошибок. - NAUTO-02 — Автоматизация управления сетями TCP/IP с помощью Python
- Длительность: 5 дней (40 часов)
 - Код курса: NAUTO-02
 - Стоимость
 - Очный формат: 656 000 ₸
 - Онлайн формат: 642 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, технологии и механизмы автоматизации корпоративных сетей TCP/IP с инструментов, созданных на языке программирования Python.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания основ автоматизации на уровне курса NAUTO-00, а также знания общей теории программирования.
Содержание курса:
Модуль 1 – Основы языка программирования Python.
Принципы языка программирования Python.
Типы данных.
Операции и операторы.
Функции, библиотеки и модули.
Объектно-ориентированное программирование на Python.
Исключения и документация.
Параллельное и асинхронное программирование на Python.
Дизайн-паттерны.
Использование API сетевого оборудования.Модуль 2 – Автоматическая проверка кода Python.
Качество кода Python.
Formatter’ы и linter’ы.
Проверка типов данных.
Методы исполнения кода Python.
Обнаружение и исправление ошибок кода Python.
Оптимизация кода Python.
Инструменты автоматической проверки кода Python.Модуль 3 – Управление сетевыми устройствами с помощью Nornir.
Компоненты Nornir’а.
Подготовка инфраструктуры для работы с Nornir’ом.
Конфигурация.
Конфигурация в YAML.
Статическое inventory.
Динамическое inventory Netbox.
Учетные записи.
Работа с задачами (task’ами).
Обработка результатов работы.
Обработка исключений.
Функции.
Плагин Netmiko.
Плагин NAPALM.
Плагин Utils.
Плагин Scrapli.
Плагин Jinja2.
Обработчики (processors).Модуль 4 – Тестирование сети с помощью Pytest.
Принципы работы Pytest.
Подготовка инфраструктуры для работы с Pytest’ом.
Работа с Fixtures.
Параметризация Pytest.
Интеграция c Nornir и NAPALM.
Интеграция с Batfish.
Интеграция c Suzieq.
Интеграция с CI/CD.Модуль 5 – Управление конфигурацией сетевых устройств с помощью Scrapli.
Принципы работы Scrapli.
Подготовка инфраструктуры для работы со Scrapli.
Передача данных Scrapli и AsyncIO.
TTP parsing.
Genie parsing.
TextFSM parsing.
Расширение Scrapli NETCONF.
Расширение Scrapli Cfg.
Расширение Scrapli Nornir.Модуль 6 – Управление конфигурацией сетевых устройств с помощью Netmiko.
Принципы работы Scrapli.
Подготовка инфраструктуры для работы с Netmiko.
Работа с конфигурацией сетевых устройств средствами Netmiko.
TTP parsing.
Genie parsing.
TextFSM parsing.
Оптимизация работы Netmiko.Модуль 7 – Мониторинг сети с помощью Suzieq.
Принципы работы и компоненты Suzieq.
Подготовка инфраструктуры для работы с Suzieq.
Анализ сетевой статистики
Построение и анализ хронологии сетевых событий.
Автоматизация Suzieq через библиотеки Python и REST
API.Модуль 8 – Анализ сети с помощью Batfish.
Принципы работы и компоненты Batfish.
Подготовка инфраструктуры для работы с Batfish.
Анализ конфигурации сетевых устройств.
Анализ информации Control Plane’а.
Анализ маршрутной информации и информации LSDB.
Анализ информации из таблиц пересылки (Forwarding Plane) сетевых
устройств.
Анализ ACL. - NAUTO-03 — Модели данных YANG для автоматизации управления сетями TCP/IP
- Длительность: 4 дня (32 часа)
 - Код курса: NAUTO-03
 - Стоимость
 - Очный формат: 601 500 ₸
 - Онлайн формат: 578 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, технологии и механизмы создания и использования моделей данных YANG для автоматизации управления корпоративными сетями TCP/IP.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания основ автоматизации на уровне курса NAUTO-00.
Содержание курса:
Модуль 1 – Проект автоматизации корпоративной сети TCP/IP.
Управление IT-проектами.
Потребности в автоматизации корпоративной сети.
Готовность процессов к автоматизации.
Адаптация стандартов и рекомендаций.
Бизнес требования.
Функциональные требования.
Создание прототипа автоматизированной корпоративной сети TCP/IP.Модуль 2 – Модель данных для разработки п/о.
Работа с данными при разработке п/о.
Создание модели данных.
Модификация и адаптация модели данных.
Кодировка данных.
Протоколы, использующие модели данных.Модуль 3 – Модель данных и язык описания YANG.
Описание и категоризация данных.
Описание событий и оповещений.
Конфигурационные и операционные данные.
Расширения модели данных.
Модули YANG.
Тестирование и валидация модели данных.
Инструменты Python для работы с YANG.Модуль 4 – NETCONF и YANG.
Принципы работы NETCONF.
Механизм работы PRC.
Формат и типы сообщений.
Сценарии использования NETCONF.
Шаблоны управления устройствами YANG.
Управление устройствами.
Управление сервисами.
Сетевые транзакции.Модуль 5 – RESTCONF.
Принципы работы RESTCONF.
Сравнение RESTCONF и NETCONF.
Сценарии использования RESTCONF.Модуль 6 – Телеметрия.
Принципы сбора телеметрии.
Компоненты сбора телеметрии.
Транспортировка данных телеметрии.
Телеметрия в протоколах NETCONF и RESTCONF - NAUTO-04 — Использование framework’а VPP для разработки сетевых приложений
- Длительность: 3 дня (24 часа)
 - Код курса: NAUTO-04
 - Стоимость
 - Очный формат: 537 000 ₸
 - Онлайн формат: 514 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы программного управления аппаратными компонентами обработки сетевого трафика с использованием framework’а Vector Packet Processing.
Аудитория курса:
Инженеры, управляющие оборудованием корпоративной сети TCP/IP, а также специалисты, отвечающие за автоматизацию работы оборудования.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания основ автоматизации на уровне курса NAUTO-00, а также знания общей теории программирования.
Содержание курса:
Модуль 1 – Состояние индустрии сетей TCP/IP.
Классический дизайн сети.
Виртуализация.
Топологии Clos’а и технологии DC Overlay.
Облачные технологии и построение платформы распределенных сервисов.
Процессоры и специализированные аппаратные сетевые компоненты.Модуль 2 – Виртуализация сетевых сервисов и компонентов.
Концепция Software-Defined Networking.
Концепция Network Function Virtualization.
Виртуальные коммутаторы.
Сетевые карты с программным управлением. SmartNIC.Модуль 3 – Архитектура DPDK.
Методы обработки пакетов аппаратными сетевыми компонентами.
Обработка пакетов в User-Space’е.
DPDK и NFV.
DPDK и виртуальные коммутаторы.
DPDK и сети SAN.Модуль 4 – Vector Packet Processing.
Архитектура и компоненты VPP.
Граф обработки пакетов.
Интеграция со стеком TCP/IP в ОС.
DPDK API.
Сценарии применения VPP.
Сценарии интеграции.
Оптимизация производительности. - NAUTO-05 — Управление и автоматизация сетей TCP/IP с NetBox
- Длительность: 5 дней (40 часов)
 - Код курса: NAUTO-05
 - Стоимость
 - Очный формат: 682 500 ₸
 - Онлайн формат: 668 500 ₸
 
Описание курса
О курсе:
Данный 5-дневный курс направлен на предоставление слушателям всестороннего понимания принципов, инструментов и методов работы с Netbox в своих организациях.
Аудитория курса:
Данная программа обучения предназначена для сетевых администраторов, системных администраторов и ИТ-специалистов, которые хотят получить всестороннее понимание NetBox, от базовых концепций до продвинутых тем. Участникам рекомендуется иметь базовое понимание сетевых концепций и знакомство с управлением ИТ-инфраструктурой.
Предварительные требования к аудитории:
Базовые знания сетевых концепций (адресация IP, подсети, VLAN и т. д.)
Знакомство с компонентами ИТ-инфраструктуры (маршрутизаторы, коммутаторы, серверы и т. д.)
Понимание баз данных и веб-приложений
Опыт управления сетевой инфраструктурой будет полезным, но не обязательнымСодержание курса:
Модуль 1: Введение в Netbox и управление инфраструктурой
Введение в Netbox: обзор, преимущества и области применения
Установка и настройка: требования, варианты установки и основы конфигурации
Пользовательский интерфейс Netbox: навигация, ключевые функции и управление учетными записями
Управление инвентарными данными: создание и управление устройствами, стойками и производителями
IP Address Management (IPAM): основы адресации IP и управления подсетями в Netbox
Лабораторная работа 1: Настройка Netbox и начальная конфигурацияМодуль 2. Управление устройствами и подключениями
Device Management: добавление и настройка устройств, типов устройств и пользовательских полей
Rack Management: моделирование стоек, панелей соединения и управление взаимосвязями
Подключение устройств: Понимание управления кабелями, интерфейсами и подключением устройств
Circuit Management: Настройка и отслеживание сетевых подключений
Лабораторная работа 2: Управление устройствами и подключениямиМодуль 3: Документирование и визуализация инфраструктуры
Site Management: управление физическими местоположениями, зданиями и комнатами в Netbox
Визуализация: создание карт топологий, диаграмм связей и настраиваемых макетов
Документирование: конфигурация, управление изменениями и генерация отчетов
Labels, tags и tenancy: использование меток, тегов и функций тенантов для организации и фильтрации
Лабораторная работа 3: Документирование и визуализация инфраструктурыМодуль 4: Управление IP-адресами и интеграция
Управление IP-адресами: IP-адресация, управление подсетями и интеграция с DHCP
Интеграция с DNS: настройка интеграции с DNS, управление записями DNS и синхронизация DNS
REST API: понимание и использование RESTful API Netbox для автоматизации
Лабораторная работа 4. Управление IP-адресами и интеграцияМодуль 5: Продвинутые темы в Netbox и автоматизация
Настойка: создание пользовательских полей, шаблонов и сценариев
Роли и разрешения: управление пользовательскими ролями, разрешениями и контролем доступа в Netbox
Плагины и расширения: изучение доступных плагинов и расширение функциональности Netbox
Вопросы безопасности: реализация мер безопасности и обеспечение безопасности развертывания Netbox
Автоматическое заполнение инвентаря: использование инструментов и техник автоматизации для автоматического заполнения инвентаря Netbox
Лабораторная работа 5. Продвинутые темы и автоматизация - SA-01 — Управление данными для современных предприятий
- Длительность: 5 дней (40 часов)
 - Код курса: SA-01
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 695 500 ₸
 
Описание курса
Описание курса:
Успешное развитие культуры управления данными является ключевой задачей в дальнейшем “выживании” предприятий. Принятие любых стратегических или тактических решений без связи с реальными данными приведет к потерям и утрате возможней для бизнеса. Учитывая опыт ведущих консалтинговых компаний и лидеров индустрии, мы рассмотрим как спланировать и внедрить программу Data Governance, увидеть недостающие звенья в вашей организации для высвобождения всего потенциала данных, а также рассмотрим технические аспекты управления данными.
Аудитория курса:
Для руководителей CDO, CIO
Специалистов в Data Management
Проектных менеджеров, Бизнес-аналитиков
КонсультантовПо окончании курса слушатели смогут:
Знания в области управления данными
Умения анализировать, выявлять и обосновывать необходимость внедрения подходов Data Governance
Навыки планирования проектов по внедрению программ Data GovernanceСодержание курса:
Модуль 1 — Введение в дисциплину управления данными (DAMA 2.0)
Концепция управления данными и ее ключевые аспекты
Фреймворки управления данными
Data Governance и Data Management
Архитектура Данных, моделирование данных, организация хранения данных
Безопасность данных
Интеграция данных
Управление корпоративным контентом
Meta, Master и Reference data management
Качество данных (Data Quality)
Big Data и Data Science
Data Management Organization и Organizational Change ManagementМодуль 2 — Бизнес-кейс для Data Governance
Постановка целей
Описание компонентов
Синтезирование Бизнес-кейсаМодуль 3 — Планирование внедрения Data Governance
Разработка программы и подготовка команды изменений
Выявление границ изменений на предприятиии
Оценка готовности к изменениям
Создание видения,миссии и плана
Выявление бизнес-потребностей и проблем
Формулирование ценности для бизнеса, ожидаемой от Data Governance
Ревью созданных бизнес-кейсов
Формулирование сценариев использования, демонстрирующих создаваемую ценность
Разработка операционной модели, архитектуры и процессов управления
Разработка дорожной карты и плана внедренияМодуль 4 — Операционализация и изменения
Развертывание изменений в соответствии с roll-out планом
Управление ожиданиями заинтересованных лиц и коммуникациями
Измерение промежуточных результатов, метрик и достижения OKR
Мониторинг рисков, устранение блоков и поддержка перехода к новой операционной модели - SA-02 — Системный анализ цифровых решений
- Длительность: 5 дней (40 часов)
 - Код курса: SA-02
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 695 500 ₸
 
Описание курса
Описание курса:
Системный анализ на протяжении многих лет является одной из самых важных дисциплин, позволяющих создавать продуманные технические решения для цифровых продуктов и сервисов. С развитием технологий и подходов инструментарий системного аналитика увеличился и требования к его компетенции возросли.
Аудитория курса:
Бизнес и Системных Аналитиков
Разработчиков
Архитекторов решенийПосле прохождения тренинга:
Рабоать с требованиями в Agile командах
Проектировать сервисы и программные интерфейсы
Разрабатывать пользовательские интерфейсы
Создавать технические спецификации готовые к реализации
Сопровождать команду разработки при реализации требованийПрограмма курса:
Модуль 1 — Системный анализ в IT
Какую ценность создает системный аналитик и как помогает IT командам создавать эффективные решения
Ключевые компетенции системного аналитика
Роль и задачи системного аналитика на этапах жизненного цикла программного решенияМодуль 2 — Основы системной архитектуры информационных систем
Монолитные и распределенные архитектуры (Service-Based Architecture, Space-Based Architecture, EDA, микросервисы)
Архитектурные паттерны и антипаттерныМодуль 3 — Введение в методологии разработки ПО
Работа в Agile проектах , особенности фреймворков (Scrum, Kanban)
Domain-Driven DesignМодуль 4 — Управление требованиями
Управление требованиями по BABOK 3.0
Инструменты и техники бизнес-анализа на службе системного аналитика
Выявление, анализ и формализация требований к системе и подсистемМодуль 5 — Создание спецификаций требований и артефактов системного анализа
Использование подходов IDEF, UML, ARIS
Практическое применение BPM для системного анализа процессов
Описание технической документаций и поддержка команд разработки
Взаимодействие с разными участниками проекта, построение эффективных коммуникаций в Agile командахМодуль 6 — Анализ данных, описание моделей данных, работа с базами данных
Логические и физические модели данных
Интеграция данных
Основы проектирования баз данных, практическая работа с базами данных, написание запросов и анализ данныхМодуль 7 — Проектирование пользовательских интерфейсов
UX дизайн и его элементы, используемые при системном анализе
Использование инструмента Figma, создание wireframesМодуль 8 — Проектирование программных интерфейсов
Подходы к проектированию API
Протокол HTTP и архитектура REST
RESTful и RMM
Работа со swagger и postman 
Cloud
- HGK07 — NCTA Cloud Architecture
- Длительность: 3 дня (24 часа)
 - Код курса: HGK07
 - Стоимость
 - Очный формат: 658 000 ₸
 - Онлайн формат: 637 000 ₸
 
Описание курса
О курсе:
Чтобы быть облачным архитектором и мастером облачных вычислений, вы должны применять методы и стратегии для разработки безопасных, масштабируемых, экономичных облачных решений и уметь убеждать руководителей следовать вашим рекомендациям. В этом курсе вы разовьете важные навыки в обнаружении информации, необходимой для успешного планирования облачных проектов, определения требований и документирования информации и рекомендаций. Кроме того, вы будете применять эти концепции для оценки поставщиков облачных услуг и разработки безопасных высокодоступных и масштабируемых решений. Вы оставите этот курс способным сравнивать, оценивать и рекомендовать поставщиков облачных услуг, разрабатывать безопасные и масштабируемые облачные решения, а также проводить убедительные презентации на основе данных, в которых ваши рекомендации будут одобрены, а ваши облачные проекты получат зеленый свет.
Курс будет полезен:
Этот курс предназначен для системных администраторов, которые хотят планировать, разрабатывать и внедрять облачные сервисы для своих организаций. Это включает в себя способность понимать особенности, возможности и компоненты облачных решений, предлагаемые поставщиками облачных услуг, на глубоком уровне, чтобы разрабатывать облачные и гибридные решения для развертывания приложений и сценариев инфраструктуры. Облачные архитекторы должны также оценить и спланировать соответствующие компоненты вычислений, сети, базы данных и безопасности, чтобы создать решение, отвечающее потребностям их организации. Кроме того, они должны защищать, отслеживать и оптимизировать эти решения.
Предварительные требования:
Для успешного прохождения этого курса вы должны иметь опыт базового развертывания, настройки и использования клиента и сервера. Вы также должны быть знакомы с оценкой, внедрением, доступом и администрированием облачных сервисов, включая «Программное обеспечение как услуга» (SaaS), «Платформа как услуга» (PaaS) и «Инфраструктура как услуга» (IaaS). У вас также должен быть опыт развертывания приложений и управления ими в облачных средах.
Цели обучения:
В этом курсе вы:
Оцените варианты облачных решений.
Подготовитесь к миграции в облако.
Определите технические требования.
Оцените компоненты облачной службы.
Выберите компоненты инфраструктуры AWS.
Определите требования к базе данных.
Выберите облачные функции и компоненты Rackspace.
Выберите функции и компоненты Microsoft Azure.
Определите требования к лицензированию и SLA.
Создадите масштабируемые облачные решения.
Обеспечите непрерывность бизнеса и аварийное восстановление.
Защитите данные в облаке.
Безопасный доступ к облачным сервисам.
Представите свой план миграции в облако.Содержание курса:
1. Оценка вариантов облачного решения
Обзор технологий и ролей облачных вычислений
Определение типа моделей облачного сервиса
Определение типа реализации облака2. Подготовка к миграции в облако
Управление рисками миграции в облако
Сбор облачной команды
Информация о проекте Document Cloud3. Определение технических требований
Определение требований к операционной системе
Определение требований к приложению4.Оценка компонентов облачных сервисов
Оценка возможностей облачных вычислений
Оценка компонентов облачных вычислений
Оценка облачных хранилищ и компонентов доставки
Оценка программного обеспечения виртуализации
Оценка компонентов платформы управления облаком5. Выбор компонентов инфраструктуры AWS
Выбор требований центра обработки данных
Выбор вычислительных компонентов AWS
Выбор сетевых компонентов AWS
Выбор компонентов AWS Storage и Content Delivery
Выбор решения для управления и мониторинга AWS
Оценка возможности AWS PaaS6. Определение требований к базе данных
Определение требований к базе данных
Выбор сервиса баз данных AWS7. Выбор функций и компонентов Rackspase Cloud
Выбор Rackspace Cloud Compute и сетевых компонентов
Выбор компонентов Rackspace Cloud Database
Выбор Rackspace Cloud Storage
Мониторинг решений Rackspace с помощью облачной аналитики8.Выбор функций и компонентов Microsoft Azure
Выбор вычислительных и сетевых служб Azure.
Выбор службы баз данных Azure.
Выбор службы хранилища Azure.
Выбор службы приложений Azure.
Выбор решения для мониторинга Azure9.Определение требований к лицензированию и SLA
Определение лицензионных требований для облачных решений
Выбор SLA10. Проектирование масштабируемых облачных решений
Оценка параметров масштабирования
Управление вычислительными ресурсами
Управление использованием памяти для облачных решений
Управление хранилищем для облачных решений
Управление сетевыми компонентами11. Обеспечение непрерывности бизнеса и аварийного восстановления
Защита данных в облаке
Обеспечение непрерывности бизнеса
План аварийного восстановления12. Защита данных в облаке
Использование шифрования для защиты данных
Безопасная передача данных
Безопасные данные в состоянии покоя13. Обеспечение доступа к облачным сервисам
Оценка требований к безопасности периметра
Определение требования к аутентификации
Определение процессы событий безопасности14. Представление вашего плана миграции в облако
Применение основ презентации
Создание презентации по миграции в облако
Проведение презентации по миграции в облако 
IBM
- BQ104G — IBM QRadar SIEM Foundations
- Длительность: 3 дня (24 часа)
 - Код курса: BQ104G
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 735 000 ₸
 
Описание курса
Course Description:
IBM QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, asset profiles, and vulnerabilities. QRadar SIEM classifies suspected attacks and policy violations as offenses.
In this 3-day instructor-led course, you learn how to perform the following tasks:
Describe how QRadar SIEM collects data to detect suspicious activities
Describe the QRadar SIEM component architecture and data flows
Navigate the user interface
Investigate suspected attacks and policy breaches
Search, filter, group, and analyze security data
Investigate the vulnerabilities and services of assets
Use network hierarchies
Locate custom rules and inspect actions and responses of rules
Analyze offenses created by QRadar SIEM
Use index management
Navigate and customize the QRadar SIEM dashboard
Use QRadar SIEM to create customized reports
Use charts and filters
Use AQL for advanced searches
Analyze a real world scenarioExtensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:
Using the QRadar SIEM user interface
Investigating an Offense triggered by events
Investigating the events of an offense
Investigating an offense that is triggered by flows
Using rules
Using the Network Hierarchy
Index and Aggregated Data Management
Using the QRadar SIEM dashboard
Creating QRadar SIEM reports
Using AQL for advanced searches
Analyze a real-world large-scale attackThe lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
Objectives:
After completing this course, you should be able to perform the following tasks:
Describe how QRadar SIEM collects data to detect suspicious activities
Describe the QRadar SIEM component architecture and data flows
Navigate the user interface
Investigate suspected attacks and policy violations
Search, filter, group, and analyze security data
Investigate events and flows
Investigate asset profiles
Describe the purpose of the network hierarchy
Determine how rules test incoming data and create offenses
Use index and aggregated data management
Navigate and customize dashboards and dashboard items
Create customized reports
Use filters
Use AQL for advanced searches
Analyze a real world scenarioAudience:
This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.
Prerequisites:
Before taking this course, make sure that you have the following skills:
IT infrastructure
IT security fundamentals
Linux
Windows
TCP/IP networking
SyslogTopics:
Unit 1: Introduction to IBM QRadar
Unit 2: IBM QRadar SIEM component architecture and data flows
Unit 3: Using the QRadar SIEM User Interface
Unit 4: Investigating an Offense Triggered by Events
Unit 5: Investigating the Events of an Offense
Unit 6: Using Asset Profiles to Investigate Offenses
Unit 7: Investigating an Offense Triggered by Flows
Unit 8: Using Rules
Unit 9: Using the Network Hierarchy
Unit 10: Index and Aggregated Data Management
Unit 11: Using the QRadar SIEM Dashboard
Unit 12: Creating Reports
Unit 13: Using Filters
Unit 14: Using the Ariel Query Language (AQL) for Advanced Searches
Unit 15: Analyzing a Real-World Large-Scale Attack
Appendix A: A real-world scenario introduction to IBM QRadar SIEM
Appendix B: IBM QRadar architecture - BQ204G — IBM Security QRadar SIEM Advanced Topicsons
- Длительность: 2 дня (16 часов)
 - Код курса: BQ204G
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 623 000 ₸
 
Описание курса
Course Description:
IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it. Attacks and policy violations leave their footprints in log events and network flows of your IT systems. To connect the dots, QRadar SIEM correlates these scattered events and flows into offenses that alert you to suspicious activities. Using the skills taught in this course, you will be able to configure processing of uncommon events, work with reference data, and develop custom rules, custom actions, and custom anomoly detection rules.
The lab environment for this course uses the IBM QRadar SIEM 7.3 platform.
Objectives:
Create custom log sources to utilize events from uncommon sources
Create, maintain, and use reference data collections
Develop and manage custom rules to detect unusual activity in your network
Develop and manage custom action scripts to for automated rule reponse
Develop and manage anomoly detection rules to detect when unusual network traffic patterns occurAudience:
Security administrators
Security technical architects
Offense managers
Professional services using QRadar SIEM
QRadar SIEM administratorsPrerequisites:
IT infrastructure
IT security fundamentals
Linux
Microsoft Windows
TCP/IP networking
Log files and events
Network flowsYou should also have completed the IBM Security QRadar SIEM Foundations course.
Topics:
Module 1: Creating log source types
Module 2: Leveraging reference data collections
Module 3: Developing custom rules
Module 4: Creating Custom Action Scripts
Module 5: Developing Anomaly Detection Rules
 - BQ405GUA — QRadar SOAR: Foundations
- Длительность: 2 дня (16 часов)
 - Код курса: BQ405GUA
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 512 000 ₸
 
Описание курса
Course Description:
In this course, you learn about the IBM Security® QRadar® SOAR architecture, and how to position the product in your company’s security architecture design. You gain hands-on experience with the SOAR interface, by investigating and managing cases and users with the SOAR Breach Response module, playbooks, and email integration.
Objectives
In this course, you learn about the following topics:
QRadar SOAR architectural patterns
Install the product, and configure license and access
Review the SOAR Console
Manage cases
Utilize the concept of artifacts
Utilize case management capabilities
Integrate email system for users and case management
Focus on the Breach Response module
Gain hands-on experience with the SOAR platform
Design playbooks
Integrate IBM and third-party solutions with SOARAudience
Security operations center (SOC) Administrator
SOC Analyst
Security Analyst
Incident Responder
Managed Service Security Provider (MSSP)Topics
Getting started
Describe architectural patterns
Install the product and configure license and access
Review the SOAR Console
Manage cases and use Breach Response add-on
Utilize the concept of artifactsCase management and email integration
Utilize case management capabilities
Integrate email system for users and case management
Focus on the Breach Response modulePlaybooks and integrations
Gain hands-on experience with the SOAR platform
Design playbooks
Integrate IBM and third-party solutions with SOAR - 0G53BUA — IBM SPSS Statistics Essentials (V26)
- Длительность: 2 дня (16 часов)
 - Код курса: 0G53BUA
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 530 500 ₸
 
Описание курса
Course overview
This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables.
Course objectives
Introduction to IBM SPSS Statistics
Reading data and defining metadata
Selecting cases for analyses
Transforming variables
Using functions to transform variables
Setting the unit of analysis
Merging data files
Summarizing individual variables
Describing the relationship between variables
Creating presentation-ready tables with Custom Tables
Customizing pivot tables
Working with syntaxControlling the IBM SPSS Statistics environment
Audience
New users of IBM SPSS Statistics
Users who want to refresh their knowledge about IBM SPSS Statistics
Anyone who is considering purchasing IBM SPSS StatisticsPrerequisites
Knowledge of your business requirements
Course topics
1. Introduction to IBM SPSS Statistics
Review basic concepts in IBM SPSS Statistics
Identify the steps in the research process
Review basic analyses
Use Help2. Reading data and defining metadata
Overview of data sources
Read from text files
Read data from Microsoft Excel
Read data from databases
Define variable properties3. Selecting cases for analyses
Select cases for analyses
Run analyses for groups
Apply report authoring styles4. Transforming variables
Compute variables
Recode values of categorical and scale variables
Create a numeric variable from a string variable5. Using functions to transform variables
Use statistical functions
Use logical functions
Use missing value functions
Use conversion functions
Use system variables
Use the Date and Time Wizard6. Setting the unit of analysis
Remove duplicate cases
Create aggregate datasets
Restructure datasets7. Merging data files
Add cases from one dataset to another
Add variables from one dataset to another
Enrich a dataset with aggregated information8. Summarizing individual variables
Define levels of measurement
Summarizing categorical variables
Summarizing scale variables9. Describing the relationship between variables
Choose the appropriate procedure
Summarize the relationship between categorical variables
Summarize the relationship between a scale and a categorical variable10. Creating presentation-ready tables with Custom Tables
Identify table layouts
Create tables for variables with shared categories
Create tables for multiple response questions11. Customizing pivot tables
Perform Automated Output Modification
Customize pivot tables
Use table templates
Export pivot tables to other applications12. Working with syntax
Use syntax to automate analyses
Create, edit, and run syntax
Shortcuts in the Syntax Editor13. Controlling the IBM SPSS Statistics environment
Set options for output
Set options for variables display
Set options for default working foldersa - 0G51AUA — Statistical Analysis Using IBM SPSS Statistics (V25)
- Длительность: 2 дня (16 часов)
 - Код курса: 0G51A
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 530 500 ₸
 
Описание курса
Course overivew
This course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, as well as how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships. Students will gain an understanding of when and why to use these various techniques as well as how to apply them with confidence, interpret their output, and graphically display the results.
Course objectives
Introduction to statistical analysis
Examine individual variables
Test hypotheses about individual variables
Test the relationship between categorical variables
Test on the difference between two group means
Test on differences between more than two group means
Test the relationship between scale variables
Predict a scale variable: Regression
Introduction to Bayesian statistics
Overview of multivariate proceduresAudience
Anyone who has worked with IBM SPSS Statistics and wants to become better versed in the basic statistical capabilities of IBM SPSS Statistics Base.
Anyone who wants to refresh their knowledge and statistical experience.Prerequisites
Familiarity with basic concepts in statistics, such as measurement levels, mean, and standard deviation.
Familiarity with the windows in IBM SPSS Statistics either by experience with IBM SPSS Statistics (version 18 or later) or completion of the IBM SPSS Statistics Essentials (V25) course.Course topics
1. Introduction to statistical analysis
Identify the steps in the research process
Principles of statistical analysisExamine individual variables
Identify measurement levels
Chart individual variables
Summarize individual variables
Examine the normal distribution
Examine standardized scoresTest hypotheses about individual variables
Identify population parameters and sample statistics
Examine the distribution of the sample mean
Determine the sample size
Test a hypothesis on the population mean
Construct a confidence interval for the population mean
Tests on a single variable: One-Sample T Test, Paired-Samples T Test, and Binomial TestTest the relationship between categorical variables
Chart the relationship between two categorical variables
Describe the relationship: Compare percentages in Crosstabs
Test the relationship: The Chi-Square test in Crosstabs
Assumptions of the Chi-Square test
Pairwise compare column proportions
Measure the strength of the associationTest on the difference between two group means
Compare the Independent-Samples T Test to the Paired-Samples T Test
Chart the relationship between the group variable and scale variable
Describe the relationship: Compare group means
Test on the difference between two group means: Independent-Samples T Test
Assumptions of the Independent-Samples T TestTest on differences between more than two group means
Describe the relationship: Compare group means
Test the hypothesis of equal group means: One-Way ANOVA
Assumptions of One-Way ANOVA
Identify differences between group means: Post-hoc testsTest the relationship between scale variables
Chart the relationship between two scale variables
Describe the relationship: Correlation
Test on the correlation
Assumptions for testing on the correlation
Treatment of missing valuesPredict a scale variable: Regression
What is linear regression?
Explain unstandardized and standardized coefficients
Assess the fit of the model: R Square
Examine residuals
Include 0-1 independent variables
Include categorical independent variablesIntroduction to Bayesian statistics
Bayesian statistics versus classical test theory
Explain the Bayesian approach
Evaluate a null hypothesis: Bayes Factor
Bayesian procedures in IBM SPSS Statistics2. Overview of multivariate procedures
Overview of supervised models
Overview of models to create natural groupings 
MikroTik
Wireshark
- WS01 — Анализ сетевого трафика в Wireshark
- Длительность: 3 дня (24 часа)
 - Код курса: WS01
 - Стоимость
 - Очный формат: 611 500 ₸
 - Онлайн формат: 588 500 ₸
 
Описание курса
Описание курса:
Данный курс содержит материал, необходимый для того, чтобы научить специалистов, работающих с сетями TCP/IP, решать проблемы с производительностью сети при помощи п/о Wireshark. В ходе курса станет понятно, как измерять задержки при передаче IP-пакетов в сети, как измерять скорость передачи данных в пределах конкретного TCP-соединения, и многое другое. Кроме того, в курсе рассматриваются вопросы анализа сетевого трафика для обнаружения вредоносных вложений, spam’а и прочих киберугроз. П/о Wireshark широко известно среди специалистов в области сетей, но его функции и их применимость выходят далеко за рамки простого отображения dump’а траифика.
Для кого предназначен:
Курс будет интересен специалистам в области сетевых технологий, людям, занимающимся поиском и устранением проблем с корпоративными сервисами и приложениями, а также аналитикам кибербезопасности.
Программа курса:
1. Работа в Wireshark
Необходимость анализа сетевого трафика.
Установка Wireshark’а и дополнительных компонентов.
Базовая настойка.
Создание dump’ов трафика на сетевых интерфейсах.
Графический интерфейс.2. Базовый анализ трафика.
Фильтрация.
Извлечение файлов.
Измерение задержек.
Создание диаграмм работы протоколов.
Статистика протоколов и приложений.
Восстановление голосовых данных.
Автостатистика «Expert Information».3. Мета-анализ (MATE).
Цель применения MATE.
Компоненты MATE.
Настройка и примеры работы с MATE.4. Анализ DNS-трафика.
Работа протокола DNS.
Разбор DNS-трафика.
Анализ аномалий DNS-трафика.
Анализ DNS-трафика на наличие киберугроз.5. Анализ IPv4-трафика.
Работа протокола IPv4.
Разбор IPv4-трафика.
Анализ аномалий IPv4-трафика.
Анализ IPv4-трафика на наличие киберугроз.6. Анализ ICMP-трафика.
Работа протокола ICMP.
Разбор ICMP-трафика.
Анализ аномалий ICMP-трафика.
Анализ ICMP-трафика на наличие киберугроз.7. Анализ TCP-трафика.
Работа протокола TCP.
Алгоритм Карна.
Разбор TCP-трафика.
Анализ аномалий TCP-трафика.
Измерения производительности канала с помощью TCP-трафика.
Анализ проблем приложений с помощью TCP-трафика.
Анализ TCP-трафика на наличие киберугроз.8. Анализ UDP-трафика.
Работа протокола UDP.
Разбор UDP-трафика.
Анализ аномалий UDP-трафика.
Анализ UDP-трафика на наличие киберугроз.9. Анализ HTTP-трафика.
Работа протокола HTTP.
Разбор HTTP-трафика.
Анализ аномалий HTP-трафика.
Реконструкция данных HTTP.
Дешифрование данных HTTPS.
Анализ ICMP-трафика на наличие киберугроз.10. Анализ FTP-трафика.
Работа протокола FTP.
Разбор FTP-трафика.
Анализ аномалий FTP-трафика.
Реконструкция данных FTP.
Анализ FTP-трафика на наличие киберугроз.11. Анализ трафика электронной почты.
Работа протоколов SMTP, IMAP, POP3.
Разбор трафика электронной почты.
Анализ аномалий в трафике электронной почты и обнаружение spam’а.
Реконструкция данных электронной почты.
Анализ кибератак через электронную почту.12. Анализ трафика канального уровня.
Протоколы DHCP и ARP.
Анализ трафика DHCP и ARP.
Анализ аномалий.
Анализ кибератак на канальном уровне.13. Анализ трафика Wi-Fi сетей.
Особенности работы Wi-Fi сетей на канальном уровне.
Анализ ёмкости и утилизации [радио]канала.
Анализ аномалий трафика Wi-Fi сети.
Анализ кибератак в Wi-Fi сети. - WS02 — Анализ пакетов инструментами анализатора Wireshark
- Длительность: 5 дней (40 часов)
 - Код курса: WS02
 - Стоимость
 - Очный формат: 719 000 ₸
 - Онлайн формат: 701 000 ₸
 
Описание курса
Цель курса:
Цель данного пятидневного курса заключается в обеспечении инженеров технической поддержки различных уровней знаниями и навыками необходимыми для выполнения ежедневных задач по поиску и устранению неисправностей в сетях пакетной передачи данных инструментами анализатора Wireshark. Курс состоит из 9 теоретических глав, сопровождаемых практическими заданиями для закрепления материала.
Программа курса:
1. Обзор Wireshark
Краткий обзор функций
Версии и их отличие2. Пользовательский интерфейс и навигация
Конфигурация внешнего вида
Фильтры отображения
Фильтры захвата
Управление файлами3. Дополнительные параметры конфигурации
Согласование имён
Правила раскраски
Пересборка протоколов
Некоторые особенности работы Wireshark4. Инструменты командной строки
tshark
dumpcap
editcap
и др.5. Таблицы и графики
Конечные станции, сессии, протоколы
Графики ввода/вывода
Графики потоков и экспертная информация6. Метрики производительности
Проблемы прикладного уровня
Пропускная способность
Время отклика
Издержки7. Подход к диагностике
Методология диагностики
Основы захвата
Технологии захвата
Стратегия захвата
Советы по захвату трафика8. Анализ распространенных протоколов:
Ethernet
ARP
IP
ICMP
TCP
UDP
SCTP
RTP
TLS 1.1/1.2/1.39. LUA-скрипты и диссекторы
Варианты применения LUA-скриптов
Пример создание диссектора собственного протокола при помощи LUA - ANT-N102 — Анализ пакетов с помощью Wireshark’а
- Длительность: 5 дня (40 часов)
 - Код курса: ANT-N102
 - Стоимость
 - Очный формат: 719 000 ₸
 - Онлайн формат: 701 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить возможности и приемы по анализу сетевого трафика с помощью п/о Wireshark.
Аудитория курса:
Инженеры, занимающиеся сетями передачи данных.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101.
Содержание курса:
Модуль 1 – Анализ сетевого трафика и Wireshark.
Стек TCP/IP. Инкапсуляция сетевого трафика.
Сбор трафика в сети. Архитектура и подходы.
Протоколы SPAN, RSPAN, ERSPAN.
Поведение сетевых карт при сборе трафика.
Wireshark как инструмент анализа сетевого трафика.Модуль 2 – Интерфейс и основные настройки.
Запуск и первичная настройка.
Элементы интерфейса.
Отображение собранного трафика.
Отображение TCP-соединений и UDP-потоков трафика.
Простые фильтры.
«Экспертное меню».
Настройка пре-процессоров.Модуль 3 – Дополнительные возможности Wireshark’а.
Комплексные фильтры.
Использование GeoIP.
Автоматическое определение DNS-имен.
Колоризация трафика и отдельных соединений.
«Сборка» данных прикладных протоколов.
Использование параметров сетевых карт.Модуль 4 – Анализ статистики сетевого трафика.
Вывод статистики в Wireshark’е.
Статистика пропускной способности.
Статистика Round-Trip Time.
Статистика протоколов.
Статистика конечных устройств.
Визуализация потоков данных.Модуль 5 – Анализ производительности сети.
Зависимость задержки от пропускной способности канала. Формула Литтла.
Классификация стеков ТСР.
Алгоритмы и дополнительные функции TCP.
Примеры анализа и определения задержек в сети.
Примеры расчета пропускной способности сети.Модуль 6 – Поиск и устранение неисправностей в сети.
Основные индикаторы неисправностей в сети.
Обнаружение неисправностей в сети с помощью анализа трафика.
Примеры поиска и устранения неисправностей в сети.Модуль 7 – Анализ сетевых протоколов.
Анализ протоколов семейства Ethernet.
Анализ беспроводных сетей Wi-Fi.
Анализ ARP.
Анализ ICMP
Анализ DHCP.
Анализ DNS.
Анализ FTP.
Анализ HTTP.
Дешифрование HTTPS.
Анализ почтовых протоколов. SMTP, IMAP, POP3.
Анализ SMB и NetBIOS.
Анализ протоколов IP-телефонии. RTP, RTCP, SIP.
Воспроизведение захваченных голосовых данных.Модуль 8 – Использование Wireshark’а при обработке инцидентов кибербезопасности.
Отслеживание инцидентов кибербезопасности.
Реагирование на инциденты кибербезопасности.
Использование Wireshark’а для анализа трафика, релевантного инциденту.
Примеры анализа сетевых атак с помощью Wireshark’а.
Примеры анализа поведения вредоносного п/о с помощью Wireshark’а.
Примеры использования Wireshark’а как инструмента Threat Intelligence. 
Маркетинг
- MA01 — PROКАЧАЙ МАРКЕТИНГ КУРС ПО ОСНОВАМ МАРКЕТИНГА
- Длительность: 2 дня (16 часов)
 - Код курса: MA01
 - Стоимость
 - Очный формат: 200 000 ₸
 - Онлайн формат: По запросу
 
Описание курса
Для кого курс:
Для специалистов по маркетингу (любого уровня)
Для владельцев малого и среднего бизнеса
Для специалистов по продажам
Для тех, кто планирует структурировать свои знания в маркетинге
Для тех кто планирует сменить квалификацию или получить новую профессиюЦель курса:
Анализ
Научим анализировать продажи, долю рынка и потребности клиента. Вы определите размер и частоту покупок, проведете SWOT-анализ и исследуете имиджевые индикаторы бренда.
Разработка
В процессе занятий вы будете выполнять практические задания — определять целевую аудиторию и выстраивать позиционирование бренда.
Внедрение
Из полученных результатов вы составите и внедрите в работу маркетинг-план. Начнете отслеживать ключевые маркетинговые показатели, проводить корректировку маркетинг-тактики.
Структурировать свои знания в маркетинге.
Научиться проводить анализ рынка и целевой аудитории.
Изучить маркетинговые инструменты.
На основе полученных данных выстроить пошаговый маркетинг-план, который можно внедрять в работу или презентовать руководству.Программа курса:
Маркетинг: потребности и желания.
Маркетинговые исследования.
Колесо эмоций Роберта Плутчика.
Цикл запуска продукта.
Позиционирование бренда.
Как определить целевую аудиторию, если данных нет?
Проведение SWOT-анализа на основе данных бренда.
Разбор и составление Сustomer Journey Map (карта путешествия клиента.)
Дерево принятия решения потребителем.
Каналы коммуникации.
Потребительская воронка.
Практическая работа. Маркетинговый План. 
DevOps
- DO-00 — Основы DevOps подхода
- Длительность: 5 дней (40 часов)
 - Код курса: DO-00
 - Стоимость
 - Очный формат: 761 000 ₸
 - Онлайн формат: 738 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы подхода DevOps и его основные инструменты. Будут изучены контейнеризация и использование Docker для развертывания и администрирования приложениями, Kubernetes для создания и управления кластерами контейнеров, Ansible для автоматизации и Terraform для администрирования инфраструктуры.
Аудитория курса:
Системные администраторы, разработчики, инженеры, которые заинтересованы в совершенствовании своих знаний в качестве разработчика и изучении методов DevOps.
Предварительные требования к аудитории:
Необходимы общие знания об операционных системах Linux и Windows, навыки работы с командной строкой и терминалом, предпочтительно иметь практику работы с виртуальными машинами. Также необходимо понимать методологию DevOps.
Содержание курса:
Модуль 1 – Docker.
Введение в Docker и его роль в DevOps
Установка Docker и его компонентов
Работа с Docker-контейнерами
Запуск приложений в Docker-контейнерах
Создание и управление Docker-контейнерами
Работа с Docker-образами
Использование Dockerfile для создания образовЛабораторная работа 1. Установка и настройка Docker
Лабораторная работа 2. Работа с контейнерами и образами
Модуль 2 – Kubernetes.
Введение в Kubernetes и его роль в оркестрации контейнеров
Установка Kubernetes и его компонентов
Понятие подов, служб и воспроизводимых контейнеров
Развертывание Kubernetes-кластера
Управление подами и службами в Kubernetes
Масштабирование и обновление приложений в KubernetesЛабораторная работа 3. Установка и настройка Kubernetes
Лабораторная работа 4. Запуск и масштабирование приложений в Kubernetes
Модуль 3 – Ansible.
Введение в Ansible и его роль в автоматизации конфигурации и развертывания
Установка и настройка Ansible
Создание и управление инвентаризацией и плейбуками Ansible
Написание простых плейбуков Ansible
Автоматизация развертывания приложений с помощью AnsibleЛабораторная работа 5. Установка и настройка Ansible
Лабораторная работа 6. Разработка плейбуков и ролей
Модуль 4 – Terraform.
Введение в Terraform и его роль в инфраструктурном кодировании
Установка и настройка Terraform
Создание, изменение и удаление инфраструктуры через Terraform
Создание и управление инфраструктурой с помощью Terraform
Использование переменных и модулей в TerraformЛабораторная работа 7. Установка и настройка Terraform
Лабораторная работа 8. Работа с манифестами Terraform
Модуль 5 – GitLab
Введение в системы контроля версий.
Обзор GitLab
Варианты установки Gitlab
Настройка GitLab
Работа с репозиториями
Интеграция GitLabЛабораторная работа 9. Работа с GitLab
Модуль 6 – CI/CD
Введение в CI/CD
Понятие и виды пайплайнов
Настройка пайплайнов в GitLab
Настройка пайплайнов в JenkinsЛабораторная работа 10. Разработка пайплайнов в GitLab
Лабораторная работа 11. Разработка пайплайнов в Jenkins
 - DO-01 — Проектирование и создание DevOps pipeline’ов
- Длительность: 5 дней (40 часов)
 - Код курса: DO-01
 - Стоимость
 - Очный формат: 761 000 ₸
 - Онлайн формат: 738 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям освоить принципы, методологию и инструменты DevOps, как, например, технология CI/CD и Ansible. Предусмотренные в курсе практические работы помогут закрепить освоенные инструменты и методики, а также успешно применять DevOps в своей работе.
Аудитория курса:
Системные администраторы, разработчики, инженеры DevOps, специалисты, которые заинтересованы в совершенствовании своих знаний в качестве разработчика и изучении методов DevOps.
Предварительные требования к аудитории:
Необходимы понимать принципы и применение Kubernetes и Docker, иметь навыки работы с командной строкой Linux и с системами контроля версий. Предпочтительно быть знакомым с написанием сценариев (Bash, Python).
Содержание курса:
Модуль 1 – Введение в DevOps.
Понимание принципов и преимуществ DevOps
Непрерывная интеграция (CI) и непрерывная доставка (CD)
Введение в инструменты DevOps и их роль в жизненном цикле разработки программного обеспечения
Лабораторная работа 1. Настройка конвейера CI/CDМодуль 2 – Инструменты и инфраструктура DevOps как код (IaC).
Управление конфигурацией с помощью Ansible
Инфраструктура как код (IaC) с помощью Terraform
Оркестрирование и автоматизация с помощью Ansible
Основы Ansible playbooks и roles
Лабораторная работа 2. Автоматизация подготовки инфраструктуры с помощью Ansible и TerraformМодуль 3 – CI/CD с использованием Jenkins.
Введение в Jenkins и его важность в процессе CI/CD
Настройка пайплайнов Jenkins
Интеграция систем контроля версий (например, Git) с Jenkins
Создание, тестирование и развертывание приложений с использованием Jenkins
Лабораторная работа 3. Создание конвейера Jenkins для примера приложенияМодуль 4 – Мониторинг и журналирование в DevOps
Мониторинг инфраструктуры и приложений DevOps
Введение в инструменты мониторинга Prometheus и Grafana
Управление журналами и их анализ с помощью Elasticsearch и Kibana.
Метрики в реальном времени и ведение журналов с централизованными иформационными панелями
Лабораторная работа 4. Настройка мониторинга и ведения журналов для примера приложенияМодуль 5 – Расширенные концепции DevOps
Оркестрирование контейнеров с помощью Kubernetes
Развертывание приложений в кластерах Kubernetes
Балансировка нагрузки и обнаружение сервисов с помощью Kubernetes
Внедрение синего/зеленого и канареечного развертываний
Лабораторная работа 5. Развертывание контейнерного приложения в кластере Kubernetes с использованием конвейера CI/CD - DO-02 — DevOps-мониторинг
- Длительность: 5 дней (40 часов)
 - Код курса: DO-02
 - Стоимость
 - Очный формат: 761 000 ₸
 - Онлайн формат: 738 000 ₸
 
Описание курса
Общая информация о курсе
Цель курса: Повышение компетенций сотрудников в области системного и прикладного мониторинга DevOps-инфраструктуры
Целевая аудитория: DevOps-инженеры, системные администраторы, SRE-специалистыПредварительные требования:
Базовые знания Linux/Unix
Опыт работы с Docker и Kubernetes
Понимание концепций CI/CDДень 1: Основы DevOps-мониторинга и Observability
Теоретическая часть
Введение в DevOps-мониторинг
Концепция Observability
Основы наблюдаемости: Metrics, Logs, Traces
Различия между мониторингом и наблюдаемостью
Принципы построения наблюдаемых систем
Метрики, логи и трассировки: когда что использоватьАрхитектура мониторинга
Компоненты системы мониторинга
Сбор данных (Collectors, Exporters, Agents)
Хранение и обработка (Time Series DB, Log Aggregation)
Визуализация (Dashboards, Alerting)
Уведомления и эскалацияПрактическая часть
Лабораторная работа 1: Настройка базовой инфраструктуры
Установка и конфигурация Prometheus
Развертывание Prometheus в Docker
Базовая конфигурация prometheus.yml
Проверка работы веб-интерфейса
Изучение метрик по умолчаниюЛабораторная работа 2: Первые метрики
Сбор базовых метрик системы
Установка Node Exporter
Настройка сбора системных метрик
Создание простых запросов PromQL
Анализ полученных данныхДень 2: Prometheus - архитектура и метрики
Теоретическая часть
Архитектура Prometheus
Компоненты и принципы работы
Pull и Push модели
Service Discovery
Retention и хранение данных
Высокая доступность и федерацияPromQL и метрики
Язык запросов Prometheus
Типы метрик (Counter, Gauge, Histogram, Summary)
Основы PromQL синтаксиса
Функции и операторы
Агрегация и группировка данныхПрактическая часть
Лабораторная работа 3: PromQL в действии
Практическое изучение PromQL
Создание базовых запросов
Использование функций rate(), increase()
Агрегация метрик по лейблам
Создание сложных запросов для мониторингаЛабораторная работа 4: Exporters и Service Discovery
Настройка различных exporters
MySQL Exporter для мониторинга БД
Nginx Exporter для веб-серверов
Настройка Service Discovery в Kubernetes
Автоматическое обнаружение сервисовДень 3: Grafana - визуализация и дашборды
Теоретическая часть
Архитектура Grafana
Возможности и компоненты
Источники данных (Data Sources)
Панели и визуализации
Организация и структура дашбордов
Пользователи и ролиСоздание эффективных дашбордов
Принципы дизайна дашбордов
Целевая аудитория и цели
Выбор подходящих визуализаций
Организация информации
Лучшие практики UX/UIПрактическая часть
Лабораторная работа 5: Первый дашборд
Создание базового дашборда
Подключение Prometheus как источника данных
Создание панелей для системных метрик
Настройка временных диапазонов
Добавление аннотацийЛабораторная работа 6: Продвинутые дашборды
Создание комплексного дашборда
Дашборд для мониторинга приложения
Использование переменных и шаблонов
Создание drill-down навигации
Настройка автообновленияДень 4: Alerting и интеграция с Kubernetes
Теоретическая часть
Система алертинга
Alertmanager и правила алертинга
Создание правил в Prometheus
Конфигурация Alertmanager
Группировка и подавление алертов
Интеграция с системами уведомленийМониторинг Kubernetes
Специфика мониторинга K8s
kube-state-metrics и cAdvisor
Мониторинг подов, сервисов, деплойментов
Метрики ресурсов и производительности
Логирование в KubernetesПрактическая часть
Лабораторная работа 7: Настройка алертинга
Создание системы уведомлений
Настройка правил алертинга в Prometheus
Конфигурация Alertmanager
Интеграция с Slack/Email
Тестирование системы алертингаЛабораторная работа 8: Мониторинг Kubernetes
Развертывание мониторинга в K8s
Установка Prometheus Operator
Настройка ServiceMonitor для приложений
Создание дашбордов для Kubernetes
Мониторинг ресурсов кластераДень 5: Интеграция с CI/CD
Теоретическая часть
Мониторинг CI/CD пайплайнов
Интеграция с GitLab CI/CD
Метрики сборки и деплоймента
Мониторинг производительности пайплайнов
Отслеживание качества кода
Интеграция с системами тестированияЛогирование и трассировка
ELK Stack и Jaeger
Централизованное логирование
Структурированные логи
Распределенная трассировка
Корреляция метрик, логов и трейсовПрактическая часть
Лабораторная работа 9: Интеграция с GitLab
Мониторинг CI/CD процессов
Настройка метрик для GitLab Runner
Мониторинг времени выполнения пайплайнов
Создание алертов на сбои сборки
Дашборд для DevOps команды 
Asterisk
- AST01 — IP телефония Asterisk
- Длительность: 5 дней (40 часов)
 - Код курса: AST01
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 603 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить технологии построения VoIP связи на базе IP АТС Asterisk.Аудитория курса:
Специалисты, занимающиеся IP-телефонией.Предварительные требования к аудитории:
Знание работы сетевых протоколов и технологий в рамках стека TCP/IP.Длительность курса:
5 дней.Содержание курса:
Модуль 1 – Основы IP-телефонии.
Механизм передачи голоса по IP-сети.
Аналогово-цифровое преобразование и голосовые кодеки.Модуль 2 – Протоколы IP-телефонии.
Протоколы сигнализации — H.323, SIP.
Протоколы передачи media — SDP, RTP.
Подключение VoIP сети к ТФоП.Модуль 3 – Архитектура Asterisk.
Архитектура Asterisk.
Загружаемые модули.Модуль 4 – Установка Asterisk.
Установка Asterisk. Особенности выбора платформы, ОС.
Окружение и зависимости.Модуль 5 – Настройка Asterisk. Регистрация софтфонов и IP-телефонов
Конфигурационные файлы Asterisk
Определение SIP-устройств в Asterisk
Регистрация и настройка софтфонов и IP-телефоновМодуль 6 – Dialplan.
Настройка номерного плана.
Настройка VoIP-шлюзов.
Настройка SIP-trunk’ов.Модуль 7 – IVR. Голосовой почта. Конференции.
Настройка IVR.
Настройка голосовой почтой.
Настройка конференций.Модуль 8 – Настройка телефонных сервисов VoIP.
Настройка Call Forward
Настройка Call Pickup
Настройка Call Transfer
Настройка Call Recording
Настройка MOH.Модуль 9 – GUI и управление IP-АТС Asterisk.
Asterisk GUI. Установка и настройка.
Панели оператора
A2billing
Готовые «решения» на базе Asterisk: Elastix, VICIDial, Trixbox, Askozia.Модуль 10 – Отказоустойчивость и производительность.
Принципы обеспечения отказоустойчивости VoIP компонентов.
Настройка HA кластера Asterisk.
Использование механизмов QoS в VoIP сети.Модуль 11 – Поиск и устранение неисправностей VoIP.
Диагностика неисправностей.
Анализ сообщений сигнализации (SIP).
Методика устранение неисправностей. - AST02 — Углубленное администрирование IP-телефонии на базе Asterisk
- Длительность: 5 дней (40 часов)
 - Код курса: AST02
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: 695 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям получить углубленные знания по администрирования IP-АТС Asterisk и построению комплексных решений IP-телефонии на ее основе. Также будут изучаться особенности подключения локальной IP-телефонии к сетям операторов связи: использование интерфейсов FXO, FXS, PRI, использование SIP-транков. Кроме того, рассматриваются вопросы безопасности и управления доступом, в том числе трансляции адресов и фильтрации трафика, а также шифрование голосового трафика.Аудитория курса:
Специалисты, занимающиеся IP-телефонией.Предварительные требования к аудитории:
Необходимо иметь опыт системного администрирования, а также знания в области сетей TCP/IP и представления о работе IP-телефонии. Желательно знать материала курса ANT_AS101.Длительность курса:
5 дней.Содержание курса:
Модуль 1 – Архитектура VoIP сетей.
IP-телефония и VoIP.
Открытые стандарты в области реализации IP-телефонии.
Решения IP-телефонии с открытым исходным кодом.Модуль 2 – Сигнализации в телефонии.
Сценарии SIP-сигнализации.
Сценарии подключения VoIP к ТФоП (PSTN).
Сценарии создание распределенной международной VoIP сети.Модуль 3 – IP-АТС Asterisk.
Архитектура.
Программные и аппаратные компоненты
Конфигурационные файлы и модули
Аудио/Видео кодеки.
Драйвера DAHDI.
Создание и управление Extension’ами
Создание базового Dial Plan’а.Модуль 4 – Коммутация вызовов и Dial Plan.
Контексты.
Extension’ы.
Приоритезация.
Приложения.
Переменные.
Построение Dial Plan’а.
Использование pattern’ов.Модуль 5 – Trunk’и.
Подключение к сервис-провайдеру телефонии.
Подключение через PSTN транки.
Создание VoIP SIP-транков
Особенности работы c NAT в VoIP-сетях.Модуль 6 – Сервисные функции IP-АТС.
Parking, Paging.
Конференцсвязь.
IVR.
Системы очередей вызовов.
ACD.Модуль 7 – Схема нумерации.
IPTSP.
DNS и SIP-URI.
ENUM и E.164.Модуль 8 – Мониторинг Asterisk
Интеграция системы с базой данных.
Call Detail Records.
Channel Event Logging.
SNMP.
Использование OpenNMS для мониторинга Asterisk.
Отладка SIP-сообщений.
Отладка низкоуровневых компонентов системы.Модуль 9 – Безопасность VoIP.
Модель угроз VoIP.
Аутентификация абонентов.
Шифрование сигнализации.
Шифрование медиа.
Защита от DoS и DDoS атак.Модуль 10 – Session Border Controller
Назначение и функции SBC.
Фильтрация сигнальной информации (SIP-proxy).
Функции трансляции адресов.
Принудительное шифрование сигнализации и медиа.
Установка и настройка LibreSBC. 
LoRaWAN, Wi-Fi
- LRW-101 — Построение сетей LoRaWAN
- Длительность: 3 дня (24 часа)
 - Код курса: LRW-101
 - Стоимость
 - Очный формат: 1 661 500 ₸
 - Онлайн формат: 1 640 000 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, технологии и протоколы построения сетей LoRaWAN.
Аудитория курса:
Инженеры промышленных объектов, занимающиеся построение сетей LoRaWAN и беспроводными технологиями
Предварительные требования к аудитории:
Необходимо обладать знаниями о радиосвязи.Длительность курса:
4 дня.
Содержание курса:
Модуль 1 – Передача сигналов по стандарту LoRa.
Принципы передачи радиосигналов.
Цифровая модуляция.
Широкополосные сигналы.
Модуляция, используемая в
Скорость передачи данных в LoRa и LoRaWAN.
Энергетические характеристики приемо-передатчиков LoRa.Модуль 2 – Протокол LoRaWAN.
Архитектура сетей.
Конечное оборудование.
Каналы и активация конечного оборудования.
Типы фреймов и MAC-уровень.
Шлюзы LoRaWAN и сервер управления.
Архитектура микроконтроллеровМодуль 3 – Построение сервисной модели LoRaWAN.
Архитектура IoT платформы.
Работа с данными через протокол HTTTP.
Работа с данными через протокол MQTT.
Настройка и использование сервера управления ChirpStack.
Запуск приложений в IoT платформе.Модуль 4 – Решение специальных задач в сетях LoRaWAN.
Синхронизация времени.
Передача данных в режиме multicast.
Фрагментирование данных.
Роуминг.
Использование Join-сервера.
FUOTA. - ANT-WiFi101 — Основы технологий Wi-Fi
- Длительность: 5 дней (40 часов)
 - Код курса: ANT-WiFi101
 - Стоимость
 - Очный формат: 798 000 ₸
 - Онлайн формат: 775 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы технологий беспроводной передачи данных семейства стандартов 802.11, также известных как Wi-Fi. На курсе рассматриваются вопросы построения радио части этих сетей беспроводной передачи данных, а также вопросы логической организации и управления этими сетями.
Аудитория курса:
Инженеры, начинающиеся заниматься сетями беспроводной передачи данных.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 – Wireless LAN.
Семейство стандартов 802.11
Wi-Fi alliance
Компоненты WLAN
PoE и организация электропитания точек доступаМодуль 2 – Радиочастота и радиоспектр.
Характеристики электромагнитных волн.
Радиочастотный спектр.
Распространение радиосигнала и уравнение Фрииса.
Модуляция радиосигнала и её виды.Модуль 3 – Расчет параметров радиосигнала.
Единицы измерения радиосигнала, дБ и дБм, RSSI.
Мощность шума и мощность сигнала, SNR.Модуль 4 – Антенны.
Виды и типы антенн.
Поляризация, усиление, направленность сигнала.
Антенны точек доступа и антенны клиентских устройств.
Коннекторы для подключения антенн.
MIMO.Модуль 5 – Физический уровень 802.11. PHY.
Диапазоны частот 802.11.
Модуляция и кодирование. MCS.
Технологии формирования радиопотока.
DFS и TPCМодуль 6 – Сетевые устройства Wi-Fi.
Точки доступа.
Wireless bridge’ы.
Контроллеры точек доступа.
Клиентские устройства.
Радиочастотные параметры беспроводных устройств.Модуль 7 – Логический уровень 802.11.
Типы фреймов.
4-way handshake.
Выбор конечным устройством точки доступа.
Обмен EAP.Модуль 8 – Доступ к среде передачи.
DCF.
Обнаружение несущей и интервал между фреймами.
QoS и WMM.
RTS/CTS.
Управление мощность сигнала.Модуль 9 – Архитектура WLAN.
Функции контроллера точек доступа.
Коммутация трафика точками доступа.
Роуминг.
Режимы работы WLAN.Модуль 10 – Дополнительные функции WLAN.
BYOD и MDM.
Hotspot
RRM 
OpenStack
- CL110 — Администрирование OpenStack часть 1
- Длительность: 5 дней (40 часов)
 - Код курса: CL110
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 684 500 ₸
 
Описание курса
Описание курса:
Материал данного курса научит слушателей работать с OpenStack и управлять ресурсами облака для защиты и развертывания современных масштабируемых облачных приложений, сетей и хранилищ.
Аудитория курса:
Администраторы хранилищ и операторы облака, а также специалисты, ответственные за обслуживание приложений в частных или гибридных облаках OpenStack.
Предварительные требования к аудитории:
Опыт администрирования операционных систем.
Программа курса:
Модуль 1 – Введение в OpenStack.
Введение в OpenStack
Компоненты
Терминология
Базовая архитектураМодуль 2 – OpenStack Identity.
Identity Service
Компоненты Keystone
Projects
Groups и Users
Roles
QuotasМодуль 3 – Облачные вычисления.
Облачные вычисления
Виртуальные машины
Контейнеры
OpenStack Kolla
OpenStack MagnumМодуль 4 – Образы и шаблоны виртуальных машин.
Образы (images)
Параметры инстансов (flavor)Модуль 5 – Сетевые подключения в OpenStack.
Сети и подсети
Маршрутизаторы
Floating IP
Security Group
Key PairsМодуль 6 – Хранение данных в OpenStack.
Хранение данных в Openstack
Типы дисков
Volume
Snapshot
Shelve
Swift
S3 MiddlewareМодуль 7 – Дополнительные темы 1.
Cloud-init
Телеметрия
Stacks
Auto Scaling
Network QoS
Инфраструктура
CephМодуль 8 – Дополнительные темы 2.
Работа с образами
Интеграция мониторинга
S3 middleware - CL210 — Администрирование OpenStack часть 2
- Длительность: 5 дней (40 часов)
 - Код курса: CL210
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 684 500 ₸
 
Описание курса
Описание курса:
Материал данного курса научит слушателей настройке, управлению и обслуживанию OpenStack, а также работе с основными компонентами и сервисами, используемыми в частных и гибридных облаках.
Аудитория курса:
Администраторы и операторы облака, а также специалисты, ответственные за поддержку частных и гибридных облаков.
Предварительные требования к аудитории:
Опыт администрирования гибридных облачных сред, а также знание материал курса Администрирование OpenStack часть 1.
Программа курса:
Модуль 1 – Day-0, Day-1 и Day-2 операции в облачных инфраструктурах.
Day-0 операции
Day-1 операции
Day-2 операцииМодуль 2 – Работа с образами виртуальных машин.
Форматы образов
diskimage-builderМодуль 3 – Хранение данных в облаке.
Хранилища в OpenStack
Ceph
Базовые неполадки Ceph
Установка с использованием cephadmМодуль 4 – Сети OpenStack.
Концепция SDN
Виды инкапсуляции
OpenStack Neutron
Сети в OpenStack
Modular Layer 2 plug-inМодуль 5 – Масштабирование ресурсов в облаке.
OpenStack Ironic
OpenStack Instance Migration
OpenStack Heat
OpenStack AutoScalingМодуль 6 – Хранение данных и резервное копирование.
Способы хранения данных
Резервирование хранения в Ceph
Erasure Code в Ceph
RBD Mirroing в Ceph
Резервное копирование в OpenStack
Сравнение Snapshot и BackupМодуль 7 – Устранение неполадок.
Управление состоянием хостов
Устранение сетевых неполадок OpenStack - CL260 — Система хранения данных Ceph
- Длительность: 5 дней (40 часов)
 - Код курса: CL260
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 684 500 ₸
 
Описание курса
Описание курса:
Данный курс по Ceph охватывает все аспекты работы с этим мощным и гибким решением для распределенного хранения данных. Курс включает как теоретические лекции, подробно раскрывающие архитектуру, компоненты и функциональные возможности Ceph, так и практические лабораторные работы, направленные на глубокое понимание и освоение навыков настройки, управления и масштабирования кластеров Ceph.
Аудитория курса:
Курс предназначен для:
Системных администраторов и DevOps инженеров, которые хотят освоить Ceph для управления распределенными системами хранения.
Архитекторов IT-инфраструктуры, заинтересованных в проектировании решений с использованием Ceph.
Разработчиков, которым необходимо глубокое понимание работы с хранилищами данных для интеграции в свои приложения.
IT-менеджеров и специалистов по безопасности, заинтересованных в управлении большим объемом данных и обеспечении их сохранности.Предварительные требования к аудитории:
Для успешного прохождения курса участники должны обладать следующими знаниями и навыками:
Базовые знания сетевых технологий и архитектуры.
Опыт работы с системами Linux/Unix, уверенное использование командной строки.
Знание основ работы с хранилищами данных и файловыми системами.
Желательно, но не обязательно, опыт работы с оркестраторами контейнеров (например, Kubernetes) и виртуализации (например, OpenStack).Программа курса:
Модуль 1: Введение в Ceph
История и эволюция Ceph
Основные концепции и архитектура Ceph
Компоненты Ceph (OSD, Mon, MDS, RGW)
Преимущества и случаи использования CephМодуль 2: Основные операции и инструменты управления
Основные команды Ceph
Управление OSD, мониторами
Полезные утилиты и их использованиеМодуль 3: RADOS и хранение объектов
Модель хранения объектов в Ceph
Использование Librados API
Объектное хранилище и структуры данныхМодуль 4: CephFS — файловая система Ceph
Архитектура CephFS
Использование CephFS и сценарии использования
Клиенты CephFS и конфигурацияМодуль 5: RBD — Блочное хранилище
Архитектура RBD (RADOS Block Device)
Использование RBD с виртуальными машинами
Снапшоты и клонированиеМодуль 6: Безопасность и производительность
Настройка ACL и аутентификации
Инструменты мониторинга производительности
Параметры и оптимизация CephМодуль 7: Администрирование и масштабирование кластера
Практики резервного копирования и восстановления
Планирование и управление масштабированием
Топологии сети и распределение данныхМодуль 8: Практические сценарии использования
Интеграция с Kubernetes и Docker
Целевые задачи в DevOps и CI/CD процессах
Use Case: Ceph для больших данных и анализаМодуль 9: Репликация и удалённое восстановление
Конфигурация и использование DR (Disaster Recovery)
Репликация пулов и объектов
Использование Ceph в географически распределенных инфраструктурахМодуль 10: Новые возможности и развитие Ceph
Новые и предстоящие функции Ceph
Обзор последнего релиза и дорожной карты Ceph
Сообщество и участие в развитии Ceph - CL310 — Устранение неполадок OpenStack
- Длительность: 5 дней (40 часов)
 - Код курса: CL310
 - Стоимость
 - Очный формат: 708 500 ₸
 - Онлайн формат: 684 500 ₸
 
Описание курса
Описание курса:
Материал данного курса позволит слушателям познакомиться с наиболее распространёнными проблемами в системах OpenStack и научиться эффективно решать их с помощью инструментов мониторинга, анализа логов и других методов.
Аудитория курса:
Инженеры, отвечающие за управление облачной инфраструктурой OpenStack.
Предварительные требования к аудитории:
Опыт работы с OpenStack
Знание архитектуры OpenStack и его основных компонентов
Опыт администрирования Linux-систем
Основы работы с сетями и концепциями виртуализацииСодержание курса:
Модуль 1 – Основы поиска и устранения неисправностей.
Введение в методы и практики устранения неполадок
Общие подходы и полезные инструменты
Логирование в OpenStack: настройка и обработка логовЛабораторная работа 1: Настройка логирования и реализация аналитики лог-файлов
Углублённый анализ логов для выявления проблем
Разбор частых проблем и ошибок, связанных с аутентификацией и авторизациейЛабораторная работа 2: Устранение ошибок аутентификации и авторизации
Модуль 2 – Неполадки сетевой инфраструктуры.
Устранение неполадок в сетях OpenStack
Анализ сетевой архитектуры Neutron
Диагностика проблем сети на уровнях L2 и L3Лабораторная работа 3: Диагностика и устранение неполадок в Neutron
Проблемы с маршрутизацией и сетевой безопасностью
Лабораторная работа 4: Решение проблем маршрутизации и безопасности в сети
Модуль 3 – Неполадки сервисов хранения данных.
Устранение неполадок в Cinder и Ceph
Общие проблемы с блоками хранения и хранилищами объектов
Методы диагностики и решения проблем производительностиЛабораторная работа 5: Отладка и устранение неполадок в Cinder и Ceph
Отказоустойчивость и восстановление данных
Лабораторная работа 6: Диагностика и решение проблем восстановления данных
Модуль 4 – Инстансы и образы инстансов.
Устранение неполадок в Nova и Glance
Проблемы запуска инстансов и взаимодействия с образами
Логирование и диагностика ошибокЛабораторная работа 7: Диагностика и устранение проблем в сервисах Nova и Glance
Управление и решение проблем ресурсов
Оптимизация и перенастройка инстансовЛабораторная работа 8: Решение проблем оптимизации и менеджмента ресурсов
Модуль 5 – Комплексная диагностика.
Интеграция и межсервисные связи
Устранение неполадок взаимодействия между различными сервисами OpenStack
Кейсы и примеры комплексных проблем
Работа с метриками и мониторингом производительностиЛабораторная работа 9: Решение интегрированных проблем в OpenStack
 
Zerocoder
- ZERO-DIGSTART — Цифровой старт
- Длительность: 2 месяца
 - Код курса: ZERO-DIGSTART
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Быстрый старт в IT с Digital Start за 2 месяца!
Для кого курс
Курс «Digital Start: быстрый старт в IT» идеален для новичков без опыта в IT, студентов, предпринимателей и всех, кто хочет освоить востребованные цифровые навыки. Никаких знаний программирования не требуется — только желание войти в IT и зарабатывать от 650 000 руб./мес. через no-code и нейросети!
Чему научитесь
Создавать сайты на Tilda и Webflow без кода.
Разрабатывать чат-боты для Telegram и WhatsApp.
Генерировать контент с помощью ChatGPT и MidJourney.
Автоматизировать процессы с Zapier и Airtable.
Упаковывать портфолио и находить клиентов.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 2+ проекта для портфолио (сайт, чат-бот или автоматизация) и решите 50+ практических задач. Уникальность: сочетание no-code и ИИ для быстрого старта в IT с нуля. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес. Курс гарантирует окупаемость через базу заказов Zerocoder.
Программа курса
Модуль 1. Знакомство с нейросетью - помощником и компьютером
Вводный урок. Как будет проходить обучение
Знакомимся с помощником - нейросетью
Базовые настройки компьютера
Как делать скриншоты и запись экранаРезультат модуля:
Настроим компьютер и смартфон для комфортной работы.
Освоим основные инструменты работы с файлами, скриншотами и записями экрана.
Научимся пользоваться основными функциями Windows/Mac и Android/iOS.Модуль 2. Кибербезопасность
Работа в браузере
Поиск информации
Кибербезопасность
Воркшоп по кибербезопасностиРезультат модуля:
Поймём, как работают интернет-браузеры, как искать информацию эффективно.
Освоим основы кибербезопасности: защита от мошенников, настройка паролей, работа с антивирусами.
Узнаем, как проверять безопасность сайтов и избегать фишинговых атак.Модуль 3. Современные цифровые инструменты
Файлы и папки. Введение в облачные сервисы
Основные операции с файлами. Совместный доступ
Формат файла. Конвертация, сжатие и архивация файлов
Текстовые файлы. Пишем тексты с нейросетью
Электронные таблицы
Создание презентаций
Нейросети для создания изображений
Создание опросов и анкет
Воркшоп Создание документов и презентаций с нейросетямиРезультат модуля:
Научимся работать с облачными сервисами (Google Диск, Яндекс.Диск, Dropbox).
Освоим базовые операции с файлами (создание, конвертация, совместный доступ).
Научимся создавать и редактировать текстовые документы, таблицы и презентации.Модуль 4. Общение и социальные сети
Электронная почта
Мессенджер Telegram
Видеозвонки и онлайн-встречи
Социальные сети: Одноклассники
Социальные сети: ВКонтакте
Воркшоп Основы цифрового этикетаРезультат модуля:
Настроим электронную почту и смогут писать письма.
Освоим работу в мессенджерах (Telegram).
Научимся проводить видеозвонки через Zoom, Skype, Google Meet.
Разберёмся с социальными сетями (ВКонтакте, Одноклассники), научимся вести профиль и взаимодействовать с контентом.Модуль 5. Нейросеть как помощник для решения любых задач
Нейросеть помогает экономить
Управление временем
Убираем языковые барьеры с помощью нейросетей
Улучшаем память, мышление и настроение с нейросетью
Нейросеть как помощник по питанию, ЗОЖ и спорту
Нейросети для детского (и не только) досуга, развития и обучения
Креативные видео с помощью нейросетейРезультат модуля:
Узнаем, как работают нейросети и где их можно применять.
Освоим генерацию текстов с помощью ChatGPT и аналогов.
Научимся создавать изображения с помощью ИИ.
Разберёмся, как использовать нейросети для планирования, ведения заметок и перевода текстов.Модуль 6. Основы заработка в интернете
Как устроена работа на фрилансе
Биржи для онлайн-заработка
Как зарабатывать удаленно с помощью нейросетей
Копирайтинг с НейрокотомРезультат модуля:
Разберёмся в основах удаленной работы и фриланса.
Познакомимся с популярными платформами для работы онлайн (биржи фриланса, маркетплейсы).
Узнаем, как использовать нейросети для заработка (копирайтинг, дизайн, автоматизация задач).Бонусный модуль. Создание чат-ботов с нейросетями на языке программирования Python
Регистрирация в ChatGPTБонусный урок: Создание безопасного интернет-подключения
Введение в Python-разработку с помощью chatGPT
Разработка Telegram-бота
Модификация Telegram-ботаРезультат модуля:
Изучим основы Python-программирования и работы с кодом в ChatGPT.
Создадим своего первого Telegram-бота с использованием нейросетей.Преподаватели
Курс ведут эксперты Zerocoder с 10+ годами опыта в no-code и ИИ, включая специалистов, работавших с МТС, ПИК и X5 Retail. Команда основала крупнейшее сообщество зерокодеров в СНГ, обучившее 5500+ студентов.
Как проходит обучение
Формат: короткие видеоуроки, Q&A-вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами.
Что получите
Сертификат специалиста no-code.
Портфолио с 2+ проектами.
Навыки для фриланса или стартапа.
Доступ к заказам и закрытой Telegram-группе.Призыв к действию
Войди в IT без кода уже сегодня! Запишись на курс «Digital Start: быстрый старт в IT» и создай свой первый проект через неделю. Места ограничены — начни сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке . Бонусы: доступ к PROXYAPI.RU, шаблоны проектов, гайд по фрилансу.
 - ZERO-NEUROPREP — Нейросети для жизни
- Длительность: 1 месяц
 - Код курса: ZERO-NEUROPREP
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой нейросети за 1 месяц: курс-конструктор для жизни!
Для кого курс
Курс «Нейросети для жизни. Курс-конструктор» идеален для новичков, студентов, педагогов, дизайнеров и всех, кто хочет решать личные и рабочие задачи с помощью ИИ. Никаких навыков программирования не требуется — только желание упростить учебу, хобби или карьеру с нейросетями!
Чему научитесь
Генерировать тексты с ChatGPT и YandexGPT для учебы или работы.
Создавать изображения в MidJourney и Kandinsky для дизайна.
Производить видео и музыку с Runway и Suno для творчества.
Автоматизировать рутинные задачи с помощью ИИ-промптов.
Разрабатывать персонализированный AI-проект для портфолио.Почему этот курс
Курс длится 1 месяц и проходит онлайн на платформе Zerocoder. Вы выбираете только нужные модули, создаете 1+ проект (например, визуальный контент или чат-бот) и получаете триал-доступ к PROXYAPI.RU с ChatGPT-4. Уникальность: гибкий формат-конструктор и фокус на практическое применение ИИ в жизни.невной жизни. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Модуль 1. Нейросети для жизни и повседневных задач
Отдых, развлечения: подбираем занятия и хобби на основе своих интересов и настроения
Путешествия: планируем маршруты и используем ChatGPT в качестве гида и помощника
Соцсети: за несколько минут пишем посты, сценарии для видео и целые статьи для блога!
Перевод и редактура: используем нейросети для перевода любых текстов и исправления ошибок
Питание: составляем меню с учетом КБЖУ, любимых продуктов или ограничений и быстро находим нужные рецепты и даже создаем новые
Спорт: подбираем подходящий вид спорта и составляем индивидуальную программу тренировок
Отношения: используем ChatGPT в качестве психолога-консультанта для знакомств и улучшения отношений с близкими
Саморазвитие: определяем свои сильные, слабые стороны, навыки, изучаем свои эмоции и развиваем эмоциональный интеллект
Продуктивность: повышаем свою эффективность с помощью планирования и постановки целей в ChatGPTРезультат: Научимся решать личные задачи в 5-10 раз быстрее и эффективнее и сделаем жизнь интереснее и насыщеннее с помощью искусственного интеллекта!
1 месяц доступа к нейроклубу за 33 тенге !Модуль 2. Креативные изображения с помощью нейросетей
Соцсети: создаем креативные изображения и аватары
Ретушь фотографий: редактируем на профессиональном уровне личные фотографии в несколько кликов
Хобби и творчество: создаем логотипы, визуализируем свои творческие идеи и даже создаем личный мерч
Подарки: радуем близких оригинальными коллажами, открытками, книгами
Игры: создаем карты, мозаики и другие персонализированные развлечения
Интерьер: визуализируем свои идеи для оформления интерьера, быстро и бесплатно рисуем картины
Предоставляем готовый аккаунт Midjourney на время обучения!Результат: Выделяемся в соцсетях, выводим творчество на новый уровень и быстро визуализируем любые свои идеи!
1 месяц доступа к нейроклубу за 33 тенге!Модуль 3. Создание видео, музыки и анимации с использованием ИИ
Видеоролики: создаем креативные видео для соцсетей, улучшаем качество
Озвучка: делаем транскрибацию, перевод и озвучку на любом языке
Музыка: создаем мелодию для отдыха, трек или делаем ремикс существующего
Мультфильмы: создаем и анимируем персонажей, делаем озвучкуРезультат: Еще больше выделяемся в соцсетях и создаем аудио- и видеопроекты профессионального уровня
1 месяц доступа к нейроклубу за 33 тенге!Преподаватели
Курс ведет команда Zerocoder, включая эксперта по ИИ с 10+ годами опыта, автора YouTube-канала Web Neuro Design Way (11K+ подписчиков). Преподаватели работали с GetCourse, Тиной Канделаки и обучили 5500+ студентов.
Как проходит обучение
Формат: короткие видеоуроки, вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится идеями.
Что получите
Сертификат по работе с нейросетями.
Портфолио с 1+ AI-проектом.
Навыки для учебы, работы или творчества.
Доступ к закрытой Telegram-группе.Призыв к действию
Упростите жизнь с ИИ уже сегодня! Запишитесь на курс «Нейросети для жизни. Курс-конструктор» и создайте свой AI-проект через неделю. Места ограничены — начните сейчас!
Стоимость и бонусы
Узнайте стоимость и рассрочку на курс по ссылке . Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к Telegram-комьюнити.
 - ZERO-NEUROBEZGRROS — Нейросети без границ с российскими инструментами
- Длительность: 2 месяца
 - Код курса: ZERO-NEUROBEZGRROS
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой российские нейросети за 2 месяца и решай задачи с ИИ!
Для кого курс
Курс «Российские нейросети» идеален для новичков без опыта в IT, предпринимателей, маркетологов и специалистов, желающих использовать отечественные ИИ для бизнеса, творчества и автоматизации. Никаких технических знаний не требуется — только желание работать с YandexGPT, GigaChat и другими российскими нейросетями!
Чему научитесь
Писать промпты для YandexGPT и GigaChat для точных результатов.
Генерировать тексты, изображения и анализировать данные с ИИ.
Настраивать локальные нейросети на своем ПК для безопасности.
Интегрировать российские ИИ в бизнес-процессы через API.
Создавать AI-проекты для портфолио и монетизации.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 2+ проекта, включая нейроассистента или генератор контента, и получите триал-доступ к PROXYAPI.RU. Уникальность: фокус на российских ИИ, обеспечивающих безопасность данных и независимость от западных решений. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Модуль 1: Введение в мир нейросетей: Зачем они нужны и как с ними работать?
Что вас ждет:
Этот модуль познакомит с принципами работы нейросетей и их возможностями:
Что могут нейросети?
Как писать эффективные запросы для достижения нужных результатов?
Как выбирать и применять отечественные ИИ в ЛЮБОЙ СФЕРЕ вашей жизни?Результаты модуля. Студенты смогут:
Познакомиться с 15+ нейросетями и узнают, как и для чего их можно использовать.
Изучить возможности и ограничения нейросетей, включая особенности российских технологий.
Выбирать оптимальные нейросети для решения разных задач.
Анализировать и определять задачи, которые можно делегировать нейросетям.
Формулировать запросы так, чтобы получать точный и релевантный результат.
Объяснять устройство ИИ и его применение в любой профессиональной сфере.
Выбрать один из 8 кейсов и начать выполнение своего итогового мини-проекта (зависит от личных целей и бэкграунда студента)Модуль2: Составление текстов с помощью ИИ: От креативных идей до технических описаний
Что вас ждет:
как создавать тексты для любых целей
как адаптировать контент под разные аудитории
как редактировать и оптимизировать его для достижения лучших результатов с минимальными усилиямиРезультаты модуля. Студенты смогут:
Делегировать ИИ создание: контент-планов, постов, описаний товаров, сказок для детей, рецептов и многое другое
Использовать нейросети для индивидуализации и адаптации контента: перевода документов, персонализации материалов под разные аудитории.
Генерировать креативные идеи, названия, слоганы, а также создавать аналитические отчёты, резюме и презентации за считанные минуты.Модуль 3: Инструменты для работы с файлами: Как нейросети могут улучшить вашу эффективность
Что вас ждет:
Вы научитесь работать с таблицами, презентациями (и не только) быстрее и эффективнее.
Узнаете, как извлекать, структурировать и преобразовывать данные, автоматизировать обработку файлов и адаптировать решения под ваши личные задачи.Результаты модуля. Студенты смогут:
Автоматизировать и упростить создание отчетов, графиков учебных материалов, резюме, стратегий продвижения и многое другое
Работать с файлами в 2 раза быстрее: извлекать важную информацию из популярных инструментов (Excel, PDF, Word, Power Point и тд)., структурировать данные, анализировать их и формулировать выводы.
Эффективно обрабатывать документы: освоят создание и преобразование файлов, шаблонов, отчётов и презентаций.
Подготовить файлы для своего проекта в нужной стилистике с учётом своих задач и ЦАМодуль 4: Нейросети для создания изображений: От вдохновения до финального шедевра
Что вас ждет:
Этот модуль научит вас создавать изображения в несколько кликов.
Вы освоите инструменты и научитесь генерировать визуальные решения для любых задач — от профессиональных до личных.Результаты модуля. Студенты смогут:
Сгенерировать ПОЧТИ ЛЮБОЙ визуальный контент за минуты:
посты, материалы для соцсетей, рекламы и обр. проектов
работать над логотипами, упаковками, брендбуками, иллюстрациями и фотоколлажами и т.д.
Обрабатывать изображения: улучшать качество, удалять лишние элементы
Подготовить иллюстрации для своего проекта и не только!Модуль 5: Создания видео с использованием ИИ
Что вас ждет:
Вы научитесь создавать видео — от мультфильмов до реалистичных сцен — с минимальными усилиями, а также редактировать контент и ускорить процесс производства.Результаты модуля. Студенты смогут:
Создавать различный видео-контент: генерировать короткие видео для соцсетей, рекламы или личных проектов с анимациями, закадровым голосом и визуальными эффектами.
Редактировать и улучшать медиа: выполнять монтаж, цветокоррекцию, шумоподавление, автоматическую генерацию титров, субтитров и аудиодорожек.
Разрабатывать сценарии и персонализированные проекты: создавать сценарии для видео, подкастов, аудиокниг, видео-поздравлений и тд.
Подготовить видео-контент для своего проекта и не только!Модуль 6: Сайты и чат - боты с помощью ИИ: от идеи до реализации
Что вас ждет:
Вы научитесь с нуля при помощи российских решений генерировать идеи, разрабатывать структуру, наполнять контентом и создавать простых чат-ботов и сайты.
Результаты модуля. Студенты смогут:
Понять основы создания сайтов при помощи ИИ: генерацию идей, прототипов, текстов, визуала под различные задачи
Рассмотрим пример настройки и наполнения чат-ботов и возможности интеграции с нейросетями
Подготовить 1 чат-бот и 1 сайт в зависимости от своего проектаМодуль 7: Автоматизация процессов: Базовые инструменты и их использование в жизни и бизнесе
Что вас ждет:
В этом модуле вы разберётесь, какие задачи в вашей сфере можно делегировать нейросетям, как оценить целесообразность автоматизации и какие риски важно предусмотреть.
Вы научитесь проектировать базовую логику автоматизации — без кода, но с пониманием входов, выходов и точек интеграции. Рассмотрите реальные кейсы и научитесь формулировать понятные технические задания для автоматизации собственных задач.Результаты модуля. Студенты смогут:
Определять, какие задачи в работе подходят для автоматизации с помощью ИИ и чем она может быть полезна;
Понимать риски автоматизации и выбирать подходящие инструменты с учётом инфраструктурных ограничений;
Формулировать цели и ожидаемые эффекты автоматизации — с привязкой к бизнесу или профессиональной задаче;
Проектировать базовую логику автоматизации: от входных данных и действий системы до выходов и точек интеграции;
Подготовить описание задачи на автоматизацию, которое будет понятно техническому специалисту и пригодно для внедрения в практику.Бонусный модуль: Как выбрать нейросети для бизнеса - инфраструктура, платформы и скоринг
Что вас ждет:
Вы научитесь осознанно подходить к выбору нейросетевых решений под конкретные задачи бизнеса.
Разберётесь в различиях между облачными и локальными платформами, познакомитесь с возможностями российских и зарубежных LLM-моделей, а также научитесь использовать метрики, бенчмарки и скоринг для принятия обоснованных решений.Результаты модуля. Студенты смогут:
Отличать облачные и on-premise решения, понимать их плюсы и минусы в зависимости от задач и контекста;
Выбирать подходящую AI-инфраструктуру для запуска нейросетей в бизнесе;
Называть и анализировать ведущие российские и международные AI-платформы, сравнивать их по ключевым критериям;
Применять скоринг и метрики для выбора ИИ-сервиса: по точности, скорости, стоимости, безопасности и другим параметрам;
Обосновывать выбор конкретного AI-решения на основе пилотирования и анализа реальных сценариев.
ПреподавателиКурс ведет СЕО Zerocoder, евангелист нейросетей, обучивший 3000+ человек, от студентов до топ-менеджеров. Его опыт: МГУ, MBA Kingston, 42 Silicon Valley, работа с МТС и ПИК. Команда — эксперты no-code и ИИ, создавшие крупнейший университет зерокодинга в СНГ.
Как проходит обучение
Формат: короткие видеоуроки, вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится кейсами.
Что получите
Сертификат специалиста по российским нейросетям.
Портфолио с 2+ AI-проектами.
Навыки для фриланса или автоматизации бизнеса.
Доступ к заказам и карьерной поддержке.Призыв к действию
Работай с российскими ИИ уже сегодня! Запишись на курс «Российские нейросети» и создай свой AI-проект через неделю. Места ограничены — начни сейчас!‽
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, гайд по промптам, доступ к закрытой Telegram-группе.
 - ZERO-VIBEMARK — Вайб-маркетинг
- Длительность: 4 месяца
 - Код курса: ZERO-VIBEMARK
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой вайб-маркетинг за 2 месяца: автоматизируй маркетинг с ИИ!
Для кого курс
Курс «Вайб-маркетинг» идеален для маркетологов, предпринимателей и новичков, желающих делегировать до 90% маркетинговых задач нейросетям. Никаких навыков программирования или ИИ не требуется — только желание создавать мощные кампании и увеличивать доход в 10 раз!
Чему научитесь
Писать точные промпты для ChatGPT, DeepSeek и других нейросетей.
Генерировать тексты, изображения и видео с MidJourney, Firefly, Runway.
Создавать озвучку с ElevenLabs для рекламы и контента.
Автоматизировать маркетинговые воронки с помощью ИИ.
Запускать кампании с минимальными затратами времени.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 3+ маркетинговых проекта для портфолио, включая тексты, визуалы и видео. Уникальность: освоите продвинутый промптинг для управления ИИ и получите триал-доступ к PROXYAPI.RU с ChatGPT-4. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Модуль 1. Введение в AI и мышление вайб-маркетолога
В этом модуле ты:
Поймёшь, как работать в маркетинге без большой команды, используя нейросети как помощников.
Научишься делегировать рутину ИИ и выстраивать процессы так, чтобы самому фокусироваться только на главном.
Освоишь новый способ мышления: не как исполнитель, а как режиссёр, который управляет процессами.
Разберёшься, как правильно общаться с нейросетями (промптинг), чтобы получать чёткие и качественные результаты.
Заложишь базу для автоматизации своей работы: быстрее, проще, креативнее.
Этот модуль — твоя точка перезагрузки. Он поможет смотреть на маркетинг по-новому и сразу применять ИИ на практике.Модуль 2. Генерация маркетингового контента
В этом модуле ты:
Научишься создавать тексты, изображения, видео и озвучку с помощью разных нейросетей — ChatGPT, Midjourney, Firefly, Runway, ElevenLabs и других.
Освоишь продвинутый промптинг — это не просто «написать запрос», а грамотно управлять нейросетью. Ты научишься:
Писать точные, понятные и многослойные промпты для разных задач (копирайтинг, визуал, сценарии и т. д.)
Учитывать особенности каждой модели: что работает в ChatGPT, может не сработать в DeepSeek — и ты будешь это знать.
Управлять результатом: задавать стиль, формат, тональность, длину, структуру — чтобы получать именно тот результат, который нужен, а не случайный ответ.
Создавать универсальные шаблоны промптов, которые легко масштабируются и помогают автоматизировать контент-процессы.
Поймёшь, как использовать ИИ не только для генерации, но и для анализа данных:
Собирать и интерпретировать отзывы, боли и желания аудитории
Анализировать тональность, паттерны поведения, и использовать это в контенте
Научишься превращать данные в работающий контент, который попадает в аудиторию и усиливает маркетинговые кампании.Проекты:
УТП и 3 баннера: генерация текста + визуала под один продукт
Создание серии объявлений по AIDA/PAS для соц. сетей и лендинга
Контент-план на 14 дней: тексты, образы, структура публикаций, экспорт в таблицу
Email-воронка: 5−7 писем с персонализацией под сегменты
Видеоролик: от сценария до озвучки и визуала
Бренд-гайд: логотип, палитра, шрифт, tone of voice — собранные в PDF
Презентация запуска: структура, слайды, оформление
Библиотека отзывов и мини-кейсов: генерация, структурирование, оформление
SEO-статья: генерация текста по 5 ключам + 3 иллюстрации + экспорт в HTML
Анализ контента и статистики: что сработало — и как это масштабировать
Комплексный контент-набор под запуск: от УТП до финального PDF-пакаМодуль 3. Программирование и автоматизация в Cursor
В этом модуле ты:
Научишься объяснять задачу нейросети так, чтобы она писала код за тебя — без страха и лишней теории.
Поймёшь, как автоматизировать рутинные процессы: генерацию контента, сбор данных, публикации.
Разберёшься в базовых инструментах, которые тебе понадобятся дальше: установка среды, работа с Cursor, понимание как запускаются скрипты и подключаются нейросети (API).
Главное — это не про «учиться кодить», а про то, как использовать ИИ для создания нужных тебе автоматизаций, даже если ты раньше с кодом не работал.Проекты:
Автогенератор постов из таблицы
Парсер отзывов конкурентов
Работа с API и данными: от запроса до контента
Атоматическая генерация + скоринг 100+ объявленийМодуль 4. Аналитика и визуализация для маркетолога с помощью Cursor и нейросетей
В этом модуле ты:
Научишься не собирать аналитику вручную, а давать задачу ИИ — и получать готовые графики, отчёты и презентации.
Поймёшь, как собирать и визуализировать данные: вовлечённость, охваты, трафик, фидбек.
Освоишь инструменты, которые превращают «сырые цифры» в понятные инсайты, которые можно сразу использовать.
Сделаешь маркетинг прозрачным и доказательным — не просто «кажется, сработало», а видно, что реально даёт результат.
Ты больше не будешь тратить часы на отчёты. Ты будешь анализировать, принимать решения и усиливать результат, пока ИИ делает за тебя всю рутину.Проекты:
Визуализация вовлечённости, трафика, активности
PDF-отчёты по отзывам и Reels
Сравнение конкурентов с таблицами и фреймами
Автоматическая презентация по итогам запускаМодуль 5. Разработка инструментария для маркетолога (Cursor)
В этом модуле ты:
На практике соберёшь собственных ИИ-ассистентов, которые будут делать за тебя рутинные задачи: от генерации контента до анализа конкурентов.
Научишься превращать свои знания и промпты в рабочие инструменты, которые можно использовать в проектах или показать в портфолио.
Будешь собирать реальные решения под задачи бизнеса или клиента — не теорию, а готовые продукты.
Поймёшь, как соединить ИИ, автоматизацию и аналитику в единую систему, которая работает без постоянного контроля.Проекты:
Генерация 100+ рекламных креативов с оценкой по модели Монте-Карло (скоринг)
Воронка анонсов: концепция, структура, автопубликация + персонализация
Автоматический генератор лид-магнитов: текст + PDF + иллюстрации + рассылка
Email-ассистент: генерация цепочек, адаптация под сегмент, автоматическая отправка, анализ открываемости
SMM-ассистент: автоматическая генерация постов + визуалы + публикация + анализ статистики
Ассистент по отзывам: сбор отзывов, анализ, генерация и публикация автоматических ответов,
Ассистент-презентатор: структура + слайды + описания (презентации для вебинаров и других мероприятий)
Бот-коммерческих предложений: генерация офферов по шаблону
Конкурентный AI-анализ: парсинг + отчёт + генерация контента на основе анализа (объявления, рекламные посты)
Кампания под сайт: генерация SEO, email и визуалов по содержимому сайта. Автоматическая генерация лендинга.
Транскрибация Reels-конкурентов и генерация аналогичных сценариев по структуре (транскрибация, анализ, создание сценариев, генерация готового рилса или материалов к нему)Модуль 6. Финальный проект
В этом модуле ты:
Не просто учишься, а создаёшь свой реальный AI-инструмент — полностью рабочий и полезный.
Собираешь MVP (минимально рабочую версию) ассистента или системы под свою задачу: для себя, бизнеса или клиента.
Оформляешь всё как презентацию с логикой, примерами и результатами, которую можно показать заказчику, работодателю или инвестору.Преподаватели
Курс ведет эксперт по чат-ботам и маркетингу, директор Bot Marketing, работавшая с Siemens, Сбербанк и Тинькофф. Она руководила YouTube-каналами с 500 000+ подписчиков и основала два бизнеса. Команда Zerocoder — лидеры в обучении ИИ, обучившие 5500+ студентов.
Как проходит обучение
Формат: короткие видеоуроки (до 5 мин), вебинары, задания с пошаговыми инструкциями. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится кейсами.
Что получите
Сертификат специалиста по вайб-маркетингу.
Портфолио с 3+ маркетинговыми проектами.
Навыки для фриланса или роста бизнеса.
Доступ к заказам и закрытой Telegram-группе.Призыв к действию
Автоматизируй маркетинг с ИИ уже сегодня! Запишись на курс «Вайб-маркетинг» и запусти кампанию через неделю. Места ограничены — начни сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к закрытой Telegram-группе.
 - ZERO-NEUROPRINPRAKT — Нейросети: от принципов к практике
- Длительность: 3 месяца
 - Код курса: ZERO-NEUROPRINPRAKT
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой нейросети за 3 месяца: от принципов к практике!
Для кого курс
Курс «Нейросети: от принципов к практике» идеален для новичков без опыта в IT, предпринимателей, маркетологов и дизайнеров, желающих использовать ИИ для бизнеса и творчества. Никаких технических знаний не требуется — только желание решать задачи в 10 раз быстрее с помощью нейросетей!
Чему научитесь
Работать с текстовыми нейросетями (ChatGPT, YandexGPT) для автоматизации.
Генерировать изображения в MidJourney, Leonardo AI и Flux.
Создавать видео и музыку с Runway Gen-3, Kling и Suno.
Интегрировать ИИ в бизнес-процессы через API.
Разрабатывать финальный AI-проект для портфолио.Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 3+ проекта, включая генератор контента или нейроассистента, и получите триал-доступ к PROXYAPI.RU с ChatGPT-4. Уникальность: акцент на практических кейсах для бизнеса и творчества. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Модуль 1. Введение в искусственный интеллект
Вводный урок
Искусственный интеллект в работе и в жизни
Разбираемся в интерфейсах нейросетей: как быстро стартовать и работать эффективно
Как писать эффективные запросы, чтобы все работало, как надоМодуль 2. Работа с текстом и файлами. ChatGPT
Пишем тексты с ChatGPT
Работа с файлами в ChatGPT (Новый)
Создание презентаций. ChatGPT. Gamma (Новый)
Воркшоп ChatGPT (Новый)Модуль 3. Изображения в работе и в повседневной жизни
Обзор инструментов для создания изображений
Создание стильных изображений с AI для визуала, соцсетей и маркетинга
Регистрация и первые изображения в Midjourney
Воркшоп по изображениям
Приглашение в НейроклубМодуль 4. Создание и запуск простейшего телеграм бота-ассистента: от ТЗ до интеграции с ИИ
Чат-боты - обзор. Составляем ТЗ на чат-бота AI-ассистента.
Бот-администратор с нуля: от схемы до готового прототипа
Мозг для бота: получение доступов до API искусственного интеллекта
Апгрейд бота: добавляем ИИ и запускаем в делоМодуль 5. Нейросети для решения рабочих задач
Транскрибация, перевод и озвучка видео и аудио
Нейросети для создания креативных видео
Создаем сайт с помощью ИИФинальный проект (Пишем книгу или решаем рабочий кейс с ИИ)
Онлайн-выпускной. Обновления ChatGPT
Бонусный модуль
DeepSeek R1: Прорыв в мире китайских нейросетей
Правовые нормы в сфере нейросетей
Монетизация навыков работы с нейросетями
Использование нейросетей для работы с таблицами
Использование ИИ в маркетинге и продажах
Создаем резюме с помощью ИИ
Безопасность данных при работе с нейросетями
Как нейросети меняют блогинг
Нейросети в блогинге, SEO и продажах
ChatGPT как помощник для IT-специалистаПреподаватели
Курс ведет эксперт Zerocoder с 10+ годами опыта в веб- и нейродизайне, автор YouTube-канала Web Neuro Design Way (11K+ подписчиков). Он обучил сотни студентов и работал с GetCourse, Павлом Раковым и Тиной Канделаки. Команда — лидеры no-code и ИИ в СНГ.
Как проходит обучение
Формат: видеоуроки, вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится заказами.
Что получите
Сертификат специалиста по нейросетям.
Портфолио с 3+ AI-проектами.
Навыки для фриланса или бизнеса.
Доступ к заказам и карьерной поддержке.Призыв к действию
Начни работать с ИИ уже сегодня! Запишись на курс «Нейросети: от принципов к практике» и создай свой AI-проект через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к закрытой Telegram-группе.
 - ZERO-DIRECT — Directual
- Длительность: 2 месяца
 - Код курса: ZERO-DIRECT
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Стань PRO-разработчиком на Directual за 2 месяца без кода!
Для кого курс
Курс «Directual: от нуля до PRO» идеален для новичков без опыта программирования, предпринимателей, желающих автоматизировать бизнес, и зерокодеров, стремящихся освоить мощную low-code платформу. Никаких технических знаний не требуется — только желание создавать масштабируемые веб-приложения и зарабатывать от 975 000 тг./мес.!
Чему научитесь
Создавать веб-приложения на Directual с бэкендом и фронтендом.
Настраивать базы данных, API и сложную бизнес-логику.
Автоматизировать процессы (каталоги, документооборот, заказы).
Интегрировать Telegram-боты и платежные системы.
Запускать проекты и находить клиентов на фрилансе.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите маркетплейс или каталог для портфолио, решите 50+ практических задач и получите доступ к заказам через Zerocoder. Directual — российская low-code платформа, используемая МТС и ПИК, позволяет строить сложные приложения в 5 раз быстрее. Доступ к урокам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 21 502 тг./мес.
Программа курса
Введение в Directual: Обзор платформы, настройка структуры данных.
Бэкенд и API: Сценарии, авторизация, интеграции.
Фронтенд: Конструктор страниц, карточки, формы.
Автоматизация: Telegram-боты, обработка заказов.
Практика: Создание маркетплейса, поиск клиентов.Преподаватели
Курс ведут эксперты Zerocoder, включая разработчиков с 5+ годами опыта на Directual, автоматизировавших процессы для МТС, ПИК и X5 Retail. Команда — часть крупнейшего сообщества зерокодеров в СНГ, обучившего 5500+ студентов.
Как проходит обучение
Формат: короткие видеоуроки (1–5 мин), текстовые материалы, Q&A-вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится заказами.
Что получите
Сертификат Directual Proficiency.
Портфолио с маркетплейсом или каталогом.
Навыки для фриланса или автоматизации бизнеса.
Доступ к заказам и поддержка по трудоустройству.Призыв к действию
Создай мощное веб-приложение без кода! Запишись на курс «Directual: от нуля до PRO» и запусти проект через неделю. Места ограничены — начни сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: доступ к Directual на время обучения, гайд по фрилансу, закрытая Telegram-группа.
Программа
Модуль Beginner
Directual
Что нас ждёт?
Структура данных
Сценарии
Запуск сценария и дебаг
API
Конструктор фронта
Конструктор фронта: карточки
Конструктор фронта: табы и формы
Конструктор фронта: действия на карточках
Авторизация
Приятные мелочи в типах данных
Чат-бот в TelegramМодуль Basic
Что нас ждёт? + ресурсы системы
Версионирование
JS: математика, массивы, даты
Контекстные и глобальные переменные
Кубики поиска и запуска сценария
Конструктор фронта: профиль и персонализация
Подключаем чат-бота
Telegram-бот: клавиатура + шаблонизатор
Конструктор фронта: связанные карточки
Почтовые уведомления
Отчеты
Авторизация и APIМодуль Pro
PRO Front и API
Интеграция с Directual
HTTP интеграция
Хранение данных "многие-ко-многим"
Особенности транзакционной обработки
Работа с документами
Telegram: pro mode
JS SDK модуль
Порция лайфхаков
Интеграция с платежной системой - ZERO-FLUTTFLOW — FlutterFlow
- Длительность: 2 месяца
 - Код курса: ZERO-FLUTTFLOW
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Создавай мобильные приложения на FlutterFlow за 2 месяца!
Для кого курс
Курс «FlutterFlow: создание мобильных приложений» идеален для новичков без опыта программирования, предпринимателей, дизайнеров и зерокодеров, желающих создавать нативные приложения для iOS и Android. Никаких навыков кодирования не требуется — только желание освоить low-code разработку и зарабатывать от 975 000 тг./мес.!
Чему научитесь
Создавать кастомизированные приложения на FlutterFlow с анимацией.
Настраивать базы данных и Firebase для бэкенда.
Интегрировать API, платежные системы и ИИ-функции.
Публиковать приложения в App Store и Google Play.
Монетизировать навыки через фриланс или собственные проекты.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 2+ приложения для портфолио, включая социальную сеть или магазин. FlutterFlow ускоряет разработку в 10 раз благодаря drag-and-drop интерфейсу и коду на Flutter от Google. Доступ к материалам — на 9 месяцев, поддержка менторов — 24/7 в Telegram. Уникальность: бизнес-модуль для поиска заказов и сертификат от WeLoveFlutterFlow. Рассрочка от 17 602 тг./мес.
Программа курса
Модуль 1. FlutterFlow Basic
Вводный урок. Как проходит обучение
Основы No-code и знакомство с FlutterFlow
Предпроектная подготовка
Подготовки проекта к разработке во FlutterFlow
Обзор основных виджетов
Верстка экрана Онбординг
Авторизация. Верстка экрана авторизации
Авторизация. Верстка экрана подтверждения кода
Авторизация. Верстка страницы сбора данных пользователя
Авторизация. Настраиваем проверку введенных пользователем данных
Авторизация. Верстка формы редактирования данных пользователя
Авторизация. Настраиваем удаление и выход из аккаунта, дорабатываем сценарий авторизации
Верстка экрана Профиль
Верстка экрана Истории
Верстка Главного экрана
Фильтры и поиск в приложении. Кастомная функция
Верстка экрана Избранное
Верстка экрана Корзина
Работа с API: поиск адресов
Создание админ панели на JetAdminМодуль 2. FlutterFlow Pro
Настраиваем анимацию во FlutterFlow
Бонусный урок: регистрация в ChatGPT
Фреймворк Flutter и кастомные функции (Custom functions)
Знакомство с кастомными виджетами (Custom Widgets)
Знакомство с кастомными действиями (Custom Actions)
Проектирование базы данных
Бонусный урок: Cloud Functions
API и взаимодействие с ИИ
Подключение платёжных систем
Подготовка приложения к публикации
Публикация приложения
Финальная работаПреподаватели
Курс ведут эксперты Zerocoder, включая full-stack разработчиков (Flutter, Python) с 5+ годами опыта и 10+ low-code проектами. Преподаватели — выпускники МГУ и участники WeLoveFlutterFlow, создавшие сложные приложения для международных студий.
Как проходит обучение
Формат: видеоуроки, Q&A-вебинары, задания с проверкой. Учитесь в своем темпе через Getcourse на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами.
Что получите
Сертификат FlutterFlow Proficiency от WeLoveFlutterFlow.
Портфолио из 2+ приложений.
Навыки для фриланса или стартапа.
Доступ к заказам и закрытой Telegram-группе.Призыв к действию
Создай свое приложение без кода уже сегодня! Запишись на Курс «FlutterFlow: создание мобильных приложений» и запусти проект через неделю. Места ограничены — начни сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: шаблоны приложений, гайд по фрилансу и доступ к ИИ-инструментам.
 - ZERO-ZEROCODBUB — Зерокодер на Bubble
- Длительность: 2 месяца
 - Код курса: ZERO-ZEROCODBUB
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Создавай веб-приложения на Bubble за 2 месяца без кода!
Для кого курс
Курс «Зерокодер на Bubble» идеален для новичков без опыта программирования, предпринимателей, желающих запустить стартап, и фрилансеров, стремящихся к доходу от 975 000 тг./мес. Никаких технических знаний не требуется — только желание создавать маркетплейсы, SaaS или социальные сети за дни!
Чему научитесь
Разрабатывать веб-приложения на Bubble (аналоги Авито или Яндекс.Маркета).
Создавать адаптивные интерфейсы с помощью drag-and-drop.
Настраивать базы данных, workflow и API-интеграции.
Интегрировать платежные системы (Stripe, PayPal).
Публиковать проекты и привлекать клиентов.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите маркетплейс для портфолио, решите 100+ практических задач и освоите Bubble — no-code платформу, ускоряющую разработку в 10 раз. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Уникальность: помощь в трудоустройстве и доступ к заказам через Zerocoder. Рассрочка от 19 500 тг./мес.
Программа курса
Модуль 1. Figma
Дизайн веб-сайта. Знакомство с Figma
Собираем дизайн-макет маркетплейса. Экран регистрации
Собираем дизайн-макет маркетплейса. Главная страница
Собираем дизайн-макет маркетплейса. Боковое меню, Избранное, Чат с поддержкой
Собираем дизайн-макет маркетплейса. ФиналМодуль 2. Знакомство и освоение возможностей конструктора Bubble
Введение в Bubble. Обзор платформы
Создание калькулятора. Математика Bubble
Анализ приложения и User Flow
Построение баз данныхМодуль 3. Верстка и работа с массивами данных маркетплейса
Вёрстка главной страницы маркетплейса
Создание входной группы приложения. Сборка приложения
Вёрстка личного кабинета. Боковое меню и личный кабинет
Вёрстка личного кабинета. Кнопки Изменить данные и Сохранить. Чек-боксы уведомлений
Разделение прав доступа внутри приложения
Плагины, API-интеграция, создание плагина из шаблонов (ChatGPT)
Верстка главной страницы. Рекламные баннеры, Каталог, страницы Продукты и Справки
Верстка страниц Избранное и Корзина. Фильтрация на главной странице и поиск товаров
Каталог и навигация в нём. Страница Мои Заказы. Аналитика и передача приложения заказчику
АдаптивностМодуль 4. Разработка мессенджера на Bubble
Разработка мессенджера. Основная страница. Список чатов. Окно чата
Разработка мессенджера. Настройка диалогового окна
Разработка мессенджера. Идентификатор онлайн, набора сообщения и последнего посещенияПреподаватели
Курс ведет команда экспертов Zerocoder, включая Алину, Bubble-разработчика с 5+ годами опыта и 50+ проектами (SaaS, маркетплейсы). Преподаватели — практики, создавшие крупнейшее сообщество зерокодеров в СНГ, обучившее 5500+ студентов.
Как проходит обучение
Формат: видеоуроки, Q&A-вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами и кейсами.
Что получите
Сертификат Bubble Proficiency.
Портфолио с маркетплейсом.
Навыки для фриланса или стартапа.
Доступ к базе заказов и карьерной поддержке.Призыв к действию
Создай свое веб-приложение без кода! Запишись на курс «Зерокодер на Bubble» и начни проект через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке . Бонусы: шаблоны Bubble, гайд по фрилансу и доступ к закрытой Telegram-группе.
 - ZERO-ZEROCODSHOP — Зерокодер Shopify
- Длительность: 2 месяца
 - Код курса: ZERO-ZEROCODSHOP
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Создавай интернет-магазины на Shopify за 2 месяца без кода!
Для кого курс
Курс «Зерокодер Shopify» идеален для новичков без опыта в IT, предпринимателей, желающих запустить свой магазин, и фрилансеров, стремящихся зарабатывать на создании e-commerce проектов. Никаких навыков программирования не требуется — только желание освоить Shopify и выйти на доход от 650 000 тг./мес.!
Чему научитесь
Создавать и настраивать интернет-магазины на Shopify за 1–2 дня.
Адаптировать темы и контент для высокой конверсии.
Управлять товарами, заказами, доставкой и оплатой.
Использовать плагины и ИИ для расширения функционала.
Продвигать магазины через SEO и маркетинг.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 2+ магазина для портфолио, решите 80+ практических задач и получите помощь в трудоустройстве через базу заказов Zerocoder. Shopify — лидер e-commerce с 4 млн+ магазинов, обеспечивающий на 15% выше конверсию. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса:
ВВОДНЫЙ МОДУЛЬ
Вводный урок
МОДУЛЬ 1. Введение в ShopifyУрок 1. Введение в Shopify
Урок 2. Основы работы с Shopify
Урок 3. Контент-менеджментМОДУЛЬ 2. Дизайн, управление и Развитие магазина
Урок 4. Выбор и настройка темы
Урок 5. Создание и оформление контента
Урок 6. Плагины и приложения. Маркетинг и продвижение
Урок 7. Управление и аналитика. Автоматизация задач
Урок 8. Shopify и ИИМОДУЛЬ 3. Создание интернет-магазина
Урок 9. Создание интернет-магазина. Настройка темы. Импорт товаров
Урок 10. Создание интернет-магазина. Главная страница. Секции с товарами. Баннер. Подвал
Урок 11. Создание интернет-магазина. Страница продукта и каталога
Урок 12. Создание интернет-магазина. Страницы О нас, Вакансии, Политика, Найти магазин. Плагины и доступные ресурсыПреподаватели
Курс ведут эксперты Zerocoder с 10+ годами опыта в e-commerce и no-code, создавшие магазины для клиентов из СНГ и зарубежья. Команда — часть крупнейшего сообщества зерокодеров в СНГ, обучившего 5500+ студентов.
Как проходит обучение
Формат: видеоуроки, вебинары, задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами и кейсами.
Что получите
Сертификат Shopify-разработчика.
Портфолио из 2+ магазинов.
Навыки для фриланса или запуска бизнеса.
Доступ к заказам и карьерной поддержке.Призыв к действию
Запусти свой магазин на Shopify уже сегодня! Запишись на курс «Зерокодер Shopify» и создай первый проект через неделю. Места ограничены — начни сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку по ссылке на курс . Бонусы: шаблоны магазинов, гайд по фрилансу и доступ к закрытой Telegram-группе.
 - ZERO-CHINNEURO — Китайские нейросети
- Длительность: 2 месяца
 - Код курса: ZERO-CHINNEURO
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой китайские нейросети за 2 месяца: от новичка до профи!
Для кого курс
Курс «Китайские нейросети» идеален для новичков без опыта в IT, предпринимателей, маркетологов и дизайнеров, желающих использовать передовые китайские ИИ для бизнеса и творчества. Никаких технических знаний не требуется — только желание работать с мощными нейросетями, такими как Kimi, Doubao и DeepSeek!
Чему научитесь
Писать эффективные промпты для Kimi, Doubao и DeepSeek.
Генерировать тексты, изображения и аналитику с помощью китайских ИИ.
Настраивать локальные нейросети для безопасной работы.
Интегрировать ИИ в бизнес-процессы через API.
Создавать AI-проекты для портфолио и монетизации.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 2+ проекта, таких как нейроассистент или генератор контента, и получите триал-доступ к PROXYAPI.RU. Уникальность: фокус на китайских нейросетях, лидирующих по скорости и качеству обработки данных. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Модуль 1. Введение: Как AI меняет креативную индустрию?
Цель:
Понять современные тренды и погрузиться в уникальные азиатские AI-платформы, которые уже формируют будущее креатива.Теория:
AI в Азии: стратегии крупных холдингов (Tencent, Alibaba, ByteDance) и их экосистемы.
Топ-кейсы монетизации AI: как компании зарабатывают миллионы на генеративном контенте.
Взгляд на азиатские платформы:Hailuo AI, Qwen, Doubao и др.Практика:
Регистрация и тестирование Deepseek, Qwen, Doubao, KREA, Hailuo AI: учимся находить и использовать фишки каждой платформы.
Сравнительный анализ: на реальном кейсе выберите оптимальную AI-платформу для конкретной задачи (маркетинг, дизайн, видео).
Анализ 3 успешных бизнес-кейсов: как AI повышает продажи и создаёт новые продукты.Модуль 2. AI-Копирайтинг, сценарии, сторителлинг
Цель:
Освоить генерацию продающих текстов, SEO-оптимизированного контента и сторителлинга, который вовлекает аудиторию и повышает продажи.Теория:
AI-контент для бизнеса: Deepseek, Qwen, Doubao. Секреты создания востребованных текстов за считанные минуты.
Сильный копирайтинг и SEO: алгоритмы анализа ключевых слов, LSI-технологии и тонкая настройка для разных платформ (Instagram, TikTok, YouTube, блог).
Создание AI-бренда:как сформировать tone of voice, слоганы и ценности при поддержке нейросетей.Практика:
AI-продающий пост + SEO-оптимизация: готовый контент для соцсетей/блогов.
AI-сценарий для TikTok/YouTube Shorts: от идеи до финальной структуры ролика.
AI-бренд: нейросети для быстрой генерации логотипа, миссии и фирменного стиля.Дополнительно:
Блок "AI-фриланс": как зарегистрироваться на разных платформах и получать заказы на фрилансе.
Геймификация: Лучший AI-пост от студента будет опубликован в официальных сообществах университета, что даст дополнительный PR и потенциальных клиентов.Модуль 3. AI-Дизайн и визуальный контент
Цель:
Освоить генерацию высококачественного визуального контента: от бренд-стиля до NFT-проектов и коммерческих иллюстраций.Теория:
AI-арт в KREA, 6pen.pro, Artguru: как нейросети создают уникальные визуалы для рекламы и брендов.
NFT и блокчейн: современные тренды и способы получения прибыли на AI-дизайне.
AI-дизайн для брендов:упаковка, этикетки, визуальная айдентика.Практика:
Создание NFT-арта.
Разработка логотипа и AI-брендинга: визуальное ядро бренда с помощью нейросети.
Генерация AI-иллюстрации для реального маркетингового кейса: получите «портфолио-ready» работу.Дополнительно:
AI-рынок услуг: гайд по тому, как выставлять и продавать свои AI-дизайны и брендинговые проекты клиентам по всему миру.
Геймификация:участники соревнуются в создании лучшего AI-дизайна для вымышленного клиента – победитель получает приз и рекомендации.Модуль 4. AI-Видео и анимация
Цель:
Научиться быстро создавать анимированные ролики и TikTok-контент с помощью AI, а также грамотно их монетизировать и продвигать.Теория:
Как нейросети генерируют видео? Обзор Hailuo AI, DeepBrain.
AI-анимация для рекламы, YouTube, TikTok и корпоративного маркетинга.
Монетизация:платные площадки, партнёрки, рекламные интеграции на стоках.Практика:
Создание AI-анимированного видео (1 минута): сценарий + монтаж + эффект «вау».
Разработка TikTok-рекламы с использованием AI-анимации: короткий ролик, способный привлечь потенциальных клиентов.
Публикация в соцсетях и анализ первых результатов (просмотры, лайки, CTR).Дополнительно:
Гайд по продвижению в TikTok:лайфхаки алгоритмов, работа с хештегами и трендами, коллаборации с блогерами.Модуль 5. AI-музыка, звук и голосЦель:Создавать музыку, саунд-дизайн и озвучку для видео, рекламы, игр и собственных проектов.Теория:
Обзор топ-AI-сервисов для музыки и звука: Boomy, AIVA, Amper Music, Murf AI, Kits AI.
AI-озвучка: синтез речи для видео, подкастов и рекламы.
Монетизация AI-музыки: загрузка треков на SoundCloud, Spotify, TikTok, работа со стоками и лейблами.Практика:
Создание AI-музыкального трека в выбранном стиле (электронная музыка, джаз, рок, саундтрек).
Генерация AI-озвучки для рекламного ролика или обучающего видео.Модуль 6. Визуализация и персонализация контента с AIЦель:Использовать нейросети для создания персонализированного контента и автоматизированных визуализаций для маркетинга, продаж и бизнес-процессов.
Что входит в модуль?
Визуализация данных:
Автоматическое создание графиков, отчетов, дашбордов.
Разбор успешных AI-кейсов в бизнесе.AI-презентации и отчеты:
Создание автоматизированных AI-презентаций.
Корпоративные презентации и email-рассылки, персонализированные под аудиторию.
AI-сайты и лендинги:
Генерация сайтов и лендингов.Практика:
Создание AI-дизайна презентации.
Разработка AI-сайта или лендинга с персонализированным контентом.Финальный проект: Разработка коммерческого AI-продуктаВыбираете направление:
AI-дизайн-студия: логотипы, NFT, UI/UX.
AI-короткометражка или YouTube-канал с регулярным AI-контентом.
AI-подкаст или музыкальный проект.
AI-стратегия для брендов или SMM-компания.Практика:
Разработка полноценного AI-продукта/услуги (концепция + MVP).
Публикация в портфолио, привлечение первых клиентов и/или подписчиков.
Создание коммерческого предложения и проработка маркетингового плана (как продавать, каналы привлечения, стратегия продвижения).Итог:
Готовый AI-продукт или услуга с реальными перспективами заработка.
AI-портфолио, отражающее все ключевые навыки (тексты, дизайн, видео, музыка).
Гайд по монетизации и сотрудничеству с партнёрами/платформами.
Реальные кейсы успешных выпускников, которые уже используют AI для роста дохода.Преподаватели
Курс ведет команда Zerocoder, включая СЕО университета, евангелиста ИИ с опытом в МГУ, MBA Kingston и 42 Silicon Valley. Эксперты обучили 3000+ студентов и работали с МТС, ПИК и крупными брендами.
Как проходит обучение
Формат: короткие видеоуроки, вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится кейсами и заказами.
Что получите
Сертификат специалиста по китайским нейросетям.
Портфолио с 2+ AI-проектами.
Навыки для фриланса или автоматизации бизнеса.
Доступ к заказам и закрытой Telegram-группе.Призыв к действию
Начни работать с китайскими ИИ уже сегодня! Запишись на курс «Китайские нейросети» и создай свой AI-проект через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к Telegram-комьюнити.
 - ZERO-AIINVEST — AI для инвестиций
- Длительность: 2 месяца
 - Код курса: ZERO-SVOYAISTUD
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой AI для инвестиций за 2 месяца: принимай решения с умом!
Для кого курс
Курс «AI для инвестиций» создан для новичков без опыта в IT, частных инвесторов, трейдеров и аналитиков, желающих анализировать рынки быстрее и точнее. Никаких навыков программирования не требуется — только желание использовать нейросети для повышения доходности и минимизации рисков!
Чему научитесь
Анализировать акции, криптовалюты и стартапы с помощью ChatGPT и DeepSeek.
Создавать персонального AI-ассистента для инвестиционных задач.
Применять методы DCF, мультипликаторы и свечной анализ с ИИ.
Автоматизировать обработку отчетов, новостей и данных.
Строить портфолио проектов для демонстрации навыков.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите AI-ассистента и выполните 5+ кейсов на реальных данных (акции, крипта). Уникальность: сочетание классических инвестиционных подходов с ИИ ускоряет анализ в 10 раз. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес. Zerocoder помогает с выходом на фриланс или инвестиционные проекты.
Программа курса
Модуль 1. Введение в инвестиционную аналитику с нейросетями
Поймём, какие задачи в инвестициях можно отдать нейросетям
Соберём базовый ИИ-инструментарий для быстрого анализа рынков
Настроим удобную рабочую среду — пространство для работы с промптами, отчетами и другой информацией
Научимся формулировать запросы (промпты) и получать выжимки из сотен страниц
Вместе с ИИ сформируем инвестиционную стратегиюМодуль 2. Фундаментальный анализ: метрики и нейросети
Разберём ключевые показатели компаний: P/E, P/S, EBITDA, маржинальность и др.
Научимся «скармливать» ИИ отчёты и получать аналитику (баланс, прибыль/убытки и др.)
Научимся оценивать бизнес: вместе с ИИ построим DCF-модель и посмотрим, как работают другие методы оценки стоимости компании
Сделаем ИИ-ассистента для фундаментального анализа в ChatGPT
Проведем фундаментальный анализ криптовалютМодуль 3. Углубленный анализ новостного фона
Научимся собирать и выделять главное в новостях и проверять их достоверность
Сформируем систему мета-анализа: как агрегировать выводы из десятков источников
Попрактикуемся на реальных кейсах компаний и отраслей, а также криптовалют в анализе отчетности и новостей
Получим навык формулирования гипотез и принятия информированных решений за 15 минутМодуль 4. Технический анализ и краткосрочные стратегии
Изучим, откуда брать данные для технического анализа и как передавать их ИИ для обработки
Погрузимся с ИИ в индикаторы (RSI, MACD), свечные паттерны и объёмы, научимся “читать” графики
Узнаем, как нейросеть может формировать и улучшать торговые стратегии и гипотезы, подсвечивать сигналы
Создадим отчет на основе технического анализа с Manus AIПреподаватели
Курс ведет команда Zerocoder, включая СЕО, эксперта по ИИ с опытом в МГУ, MBA Kingston и 42 Silicon Valley. Они работали с МТС, ПИК и обучили 3000+ студентов, делясь реальными кейсами по инвестициям.
Как проходит обучение
Формат: короткие видеоуроки, Q&A-вебинары, задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится кейсами.
Что получите
Сертификат специалиста по ИИ в инвестициях.
AI-ассистент для анализа рынков.
Навыки для инвестиций или фриланса.
Доступ к Telegram-комьюнити.Призыв к действию
Стань умнее рынка с ИИ! Запишись на курс «AI для инвестиций» и начни анализировать активы через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к закрытой Telegram-группе.
 - ZERO-NEURODENGI — Нейроденьги 2.0
- Длительность: 2 месяца
 - Код курса: ZERO-NEURODENGI
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Зарабатывай с нейросетями на курсе «Нейроденьги 2.0» за 2 месяца!
Для кого курс
Курс «Нейроденьги 2.0» идеален для новичков без опыта в IT, фрилансеров, маркетологов и предпринимателей, желающих зарабатывать с помощью нейросетей. Никаких технических навыков не требуется — только желание освоить ИИ и увеличить доход в найме, фрилансе или бизнесе!
Чему научитесь
Создавать контент (тексты, изображения, видео) с ChatGPT и MidJourney.
Автоматизировать бизнес-процессы с помощью ИИ и Zapier.
Разрабатывать чат-боты для Telegram и WhatsApp.
Настраивать рекламные кампании с использованием нейросетей.
Монетизировать навыки, зарабатывая от 100 000 руб./мес.Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 2+ проекта для портфолио, включая чат-бота или генератор контента, и получите триал-доступ к PROXYAPI.RU. Уникальность: фокус на монетизации ИИ через реальные кейсы, от маркетинга до фриланса. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Вводный модуль - "Твой старт с нейросетями"
Вводный урок. Как эффективно учиться.
Особенности нейросетей и составления запросов.
Разберёшься, как нейросети решают задачи бизнеса и помогают находить клиентов.
Обзор инструментов для ускорения и повышения качества работы.
Рассмотришь нужные инструменты и составишь план работы над своим проектом.
Результат: Освоишь основы работы с нейросетями и выберешь стратегию для своего заработка.Тексты, общение и продвижение - "Нейроконтент, который продает"
Выбор стратегии: как применить ИИ в своём деле.
Определишь, как нейросети впишутся в твой проект или карьеру.
Тексты с ИИ, которые привлекают клиентов.
Узнаешь, как создавать вовлекающий контент для соцсетей и маркетинга.
Общение с клиентами: продающие переписки и скрипты с помощью нейросетей.
Освоишь нейросети для работы с отзывами, запросами и переговорами.
Результат: Научишься создавать тексты для соцсетей, общения с клиентами и продвижения своих услуг.Изображение для работы и продвижения - "Визуал, который привлекает"
Создание стильных изображений с ИИ для визуала, соцсетей и маркетинга.
Узнаешь, как быстро делать качественные визуалы для соцсетей и маркетинга.
Оформление стиля бренда и продукта с нейросетями.
Разработаешь уникальный стиль для своих проектов.
Готовые шаблоны для быстрого контента (возможно, Воркшоп).
Создашь набор визуалов, которые помогут привлекать клиентов.
Результат: Создашь стильные и продающие картинки для соцсетей, рекламы и оформления проектов.Видео для соцсетей, продвижения и работы - "Видео, которое цепляет"
Генерация видео: быстрый контент.
Рассмотришь сервисы ИИ для создания роликов.
Реклама и сторис: видео, которые привлекают.
Узнаешь, как создавать промо-видео и анимации.
Сценарии и быстрый монтаж.
Рассмотришь инструменты и ускоришь создание контента.
Результат: Научишься быстро делать профессиональные ролики для продвижения и привлечения клиентов.Организация рабочего пространства и упаковка бренда - "Твой бренд и система работы"
Как создать сильную экспертную упаковку. Создание сайта-визитки.
Разберёшься, как презентовать себя или свой продукт.
Система работы: структура задач и взаимодействия с клиентами.
Выстроишь структуру задач и взаимодействия с клиентами.
Презентация итогового проекта.
Подготовишь материалы для выхода на рынок.
Результат: Упакуешь свои услуги, оптимизируешь процессы и сделаешь свой бренд привлекательным.Каналы продвижения и поиск клиентов - "Где найти клиентов и зарабатывать больше"
Эффективные каналы продвижения: что работает сегодня.
Выберешь площадки для привлечения клиентов.
Как продавать без продаж: привлекаем клиентов без бюджета.
Узнаешь о стратегиях привлечения без вложений.
Запуск системы продвижения с нейросетями.
Создашь свою работающую стратегию поиска клиентов.
Результат: Освоишь лучшие каналы поиска клиентов и выстроишь систему привлечения заказовБонусный модуль - "Как превратить клиентов в сообщество"
Как выстроить лояльность аудитории.
Узнаешь, как удерживать клиентов и мотивировать их на повторные покупки.
Контент, который создаёт вовлечение.
Разберёшься, как делать посты и материалы, которые формируют сообщество.
Автоматизация общения и комьюнити.
Рассмотришь ИИ-инструменты для поддержки связи с клиентами.
Результат: Научишься поддерживать интерес аудитории, удерживать клиентов и строить лояльное комьюнити.Преподаватели
Курс ведет команда Zerocoder, включая экспертов по ИИ и no-code с 10+ годами опыта, работавших с МТС, ПИК и X5 Retail. Они обучили 5500+ студентов и основали крупнейшее сообщество зерокодеров в СНГ.
Как проходит обучение
Формат: короткие видеоуроки, вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами и кейсами.
Что получите
Сертификат специалиста по нейросетям.
Портфолио с 2+ проектами.
Навыки для фриланса или бизнеса.
Доступ к заказам и закрытой Telegram-группе.Призыв к действию
Начни зарабатывать с ИИ уже сегодня! Запишись на курс «Нейроденьги 2.0» и запусти свой первый проект через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, гайд «6+ способов заработка с ИИ», доступ к Telegram-комьюнити.
 - ZERO-ALGOTRADEAI — Алготрейдинг с AI
- Длительность: 2 месяца
 - Код курса: ZERO-ALGOTRADEAI
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой алготрейдинг с ИИ за 2 месяца: торгуй умнее!
Для кого курс
Курс «Алготрейдинг с ИИ» идеален для новичков без опыта программирования, трейдеров и инвесторов, желающих автоматизировать торговлю на финансовых рынках. Никаких технических навыков не требуется — только желание использовать ИИ для создания прибыльных торговых ботов!
Чему научитесь
Создавать торговых ботов с помощью ИИ без навыков кодирования.
Анализировать рынки (акции, криптовалюты) с ChatGPT и DeepSeek.
Настраивать автоматизированные стратегии с использованием API.
Тестировать и оптимизировать ботов для максимальной прибыли.
Интегрировать ИИ с торговыми платформами (Binance, Bybit).Почему этот курс
Курс длится 2 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 2+ торговых бота для портфолио, протестируете их на реальных данных и получите триал-доступ к PROXYAPI.RU. Уникальность: сочетание no-code подходов и ИИ позволяет автоматизировать торговлю в 10 раз быстрее. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Основная программа
Модуль 1. Vibe-Coding и автономные агенты
Что такое vibe-coding и как работать в AI-средах. Обзор AI сред разработки
Установка и первый запуск Cursor. Базовый интерфейс. Работа с терминалом и окружением.
Основы работы с API на примере telegram-ботов
Работа со сторонними сервисами, API, испоьзование нейростей в проектах, введение в работу с файлами
Подключение нейросетей (LLM) в проекты через API на примере библиотеки OpenAI (ProxyAPI)
Регистрация и подключение API GigaChat и Yandex Cloud
Работа с файлами, pdf, csv, xlsx и другими
Самоходные ИИ-помощники и управление без кода
Работа с таблицам через API, спользование таблиц в виде базы данных
Использование MCP серверов в Cursor
Что такое автономные агент, и как это работает. Пример с базовым парсингом сайта
Работа сервиса локально и удаленно. Финальный проект
Разворачивае локальных LLM моделей через ollama, использование локальных моделей в проектах
Собственный VPS (виртуальный сервер), деплой python скрипта на сервер
Финальный проект (автономный агент)Модуль 2. Торговые работы AI
Установка и настройка: TSLab, Visual Studio, нейросети, Obsidian. (базовое знакомство).
Основы алготрейдинга: Что такое алгоритм и торговый робот? Типы ордеров. Бэктест, форвард-тест. Риск-менеджмент.
Знакомство с TSLab: Интерфейс, данные (исторические/реальные), понятие "Стратегии" и "Роботов". Запуск демо-стратегии.
Блоки TSLab: Источники данных (свечи, индикаторы), Логические блоки (условия), Исполнительные блоки (ордера), Потоки данных. Сборка простейшей стратегии "Купить и держать".
Стратегия двух SMA: Теория индикаторов SMA. Построение блоков для расчета SMA, условия входа (пересечение), выхода (фикс прибыли/стоп-лосс). Создание визуального робота SMA Cross.
Бэктест и Оптимизация: Настройка параметров (периоды SMA, TP/SL), запуск бэктеста, анализ отчета (PnL, просадка). Оптимизация параметров. Тест и оптимизация SMA-робота.
Когда не хватает блоков: Анализ ограничений визуального SMA-робота (фильтрация сигналов, сложные условия). Введение в C# в TSLab. Примеры запросов. Запрос простых функций на C# (фильтр волатильности).
Создание кастомного блока с нейросетью: Анализ примера стандартного индикатора TSLab. Интеграция кода в TSLab. Добавление RSI-фильтра в SMA-робота.
Структура скрипта TSLab на C# (using, класс, методы ). Основы синтаксиса C# (переменные, циклы, условия - фокус на TSLab контексте).
Анализ готового робота: Разбор примера простого C# робота из TSLab. Роль нейросеть: "Объясни логику этого кода", "Как изменить условие входа?".
Генерация робота "с нуля". Анализ и доработка сгенерированного кода. Запуск и тест нейро-робота.
Синтез: Визуальные блоки + C# блоки + нейросеть: Создание гибридной стратегии. Использование визуальных блоков для основной логики, кастомных C# блоков (через нейросеть) для сложных расчетов/фильтров.
Работа с данными и отладка: Получение данных из разных источников в коде. Логирование, отладка сгенерированного кода. Как промтить нейросеть для исправления ошибок. Добавление логов и отладка нейро-робота.Результат: торговый бот, реализующий вашу стратегию, подключённый к бирже и торгующий автоматически.
Преподаватели
Курс ведет команда Zerocoder, включая экспертов по ИИ и no-code с 10+ годами опыта, работавших с МТС и ПИК. Они обучили 5500+ студентов и делятся реальными кейсами алготрейдинга.
Как проходит обучение
Формат: короткие видеоуроки, Q&A-вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится кейсами.
Что получите
Сертификат специалиста по алготрейдингу с ИИ.
Портфолио с 2+ торговыми ботами.
Навыки для автоматизированной торговли или фриланса.
Доступ к закрытой Telegram-группе.Призыв к действию
Автоматизируй торговлю с ИИ уже сегодня! Запишись на курс «Алготрейдинг с ИИ» и запусти своего бота через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку (от 22 425 тг./мес.) на курс по ссылке . Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к Telegram-комьюнити.
 - ZERO-NEUROPREP — Нейросети для преподавателя
- Длительность: 2,5 месяцев
 - Код курса: ZERO-NEUROPREP
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой нейросети для преподавателей за 2,5 месяца: экономь 30% времени!
Для кого курс
Курс «Нейросети для преподавателя» создан для учителей, репетиторов, методистов и студентов, желающих упростить образовательные задачи с помощью ИИ. Никаких навыков программирования не требуется — только желание автоматизировать планирование, проверку работ и создание материалов!
Чему научитесь
Создавать учебные планы и материалы с ChatGPT и YandexGPT.
Генерировать тесты и задания с помощью ИИ за минуты.
Использовать MidJourney для создания образовательных визуалов.
Автоматизировать проверку работ и анализ прогресса студентов.
Разрабатывать AI-проект для оптимизации преподавания.Почему этот курс
Курс длится 2,5 месяца и проходит онлайн на платформе Zerocoder. Вы освоите 15+ ИИ-инструментов, сэкономите до 30% рабочего времени и создадите проект для оптимизации уроков. Уникальность: фокус на практическом применении ИИ в образовании. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Модуль 1. Навыки преподавателя, который работает с нейросетью
Что будет в модуле: (3 урока - 12 ак.ч)
Как сегодня используют нейросети в образовании
Какие задачи уже можно на них смело «переложить»
Как сформулировать правильный запрос — и получить нужный результат
С чего начать, если раньше не работали с такими инструментами
Вы сможете быстро разобраться, какие задачи в вашей практике уже можно автоматизировать — и почувствуете первый эффект буквально в тот же день.Что получите на выходе:
Подборку готовых заданий, адаптированных под уровень и возраст учеников
Личную «карту задач для нейросетей» — под свою загрузку
Чек-лист делегирования: что из рутины уже можно передать нейросетиМодуль 2. Нейросеть-планировщик : от КТП до расписания
Что будет в модуле: (4 урока - 16 ак.ч)
Быстрая подготовка поурочных и тематических планов
Составление расписания и структуры курса с опорой на ФГОС, СПО, вуз
Адаптация плана под разные уровни и подходы (модули, интенсив, смешанное)
Настройка треков под сильных и слабых учеников
Вы сможете сэкономить до 70 % времени на подготовке — больше не нужно начинать каждый план «с нуля» или тратить вечера на сверку с ФГОС. Всё будет под рукой.Что получите на выходе:
Готовый план (КТП и поурочный) под свой предмет/группу
Расписание занятий с учётом уровней учеников
Шаблоны запросов под разные форматы обученияМодуль 3. Интерактивное занятие: материалы, которые вовлекают
Что будет в модуле: (3 урока - 12 ак.ч)
Быстрая генерация карточек, заданий, раздаток
Создание презентаций — от текста до интерактива
Преобразование PDF и Word в интерактивные форматы
Материалы под офлайн- и онлайн-занятия (обучающая платформа, доски, печать)
Больше не нужно искать презентации на сайтах, писать карточки вручную или покупать дорогие однотипные наглядные материалы. Всё сможете подготовить за 15–20 минут — и это будет уникально.Что получите на выходе:
Набор готовых материалов (презентация + карточки + задания)
Интерактивная подборка для загрузки в обучающую платформу или распечатки
Личная мини-библиотека шаблонов под свой предметМодуль 4. Нейросеть-помощник в проверке и анализе работ
Что будет в модуле: (3 урока - 12 ак.ч).
Проверка тестов, сочинений, заданий с развёрнутыми ответами
Гибкая шкала оценивания и обратная связь ученику
Анализ типичных ошибок, выделение пробелов
Отчеты, таблицы, визуализация успеваемости
Больше не будете тратить часы на проверки. Нейросеть поможет быстро и объективно проверить, подсветить ошибки и выдать обратную связь — вы только проверяете финал.Что получите на выходе:
Настроенную систему оценивания с критериями под себя
Визуальный отчёт об успеваемости (например, тепловая карта)
Готовые комментарии с рекомендациями ученикамМодуль 5. Персонализация и мотивация с помощью нейросетей
Что будет в модуле: (3 урока - 12 ак.ч)
Задания с уровнями сложности: от сильного до слабого ученика
Индивидуальные треки (ЕГЭ, олимпиада, коррекция)
Игровая механика: рейтинги, баллы, бейджи, квесты
Элементы сторителлинга, наглядности, вовлекающие форматы
Вы сможете поддерживать мотивацию на любом уровне — от первоклашки до олимпиадника. Даже если раньше не знали, с чего начать геймификацию — теперь всё будет пошагово.Что получите на выходе:
Персональный план обучения для разных категорий учеников
Интерактивную систему геймификации (набор заданий, баллы, визуализация)
Подборку сторителлинговых решений под свою тему/предметМодуль 6. Как внедрить нейросети в работу преподавателя - системно
Что будет в модуле: (3 урока - 12 ак.ч)
Построение полного занятия: от идеи до сценария
Работа с портфолио педагога: как собрать свои нейросетевые решения
Сценарии кружков, открытых занятий, мероприятий с нейросетями и система продвижения (набора учеников)
Как внедрять нейросети бережно — не перегружая ни себя, ни учеников
Вы поймёте, как работать с нейросетями не разово, а на постоянной основе — чтобы не теряться, не выгорать и точно понимать, где эти инструменты помогают, а где не стоит.Что получите на выходе:
Готовый сценарий урока или мероприятия с использованием нейросетей
Структуру портфолио с примерами решений под твою дисциплину
Чек-лист внедрения нейросетей в учебный процессVIP-модуль. Наука на автопилоте: Нейросети для академической работы
Что будет в модуле:
Поиск источников и составление литобзора с помощью нейросетей
Черновик статьи (до 1500 слов) — на базе собранной информации
Оформление ссылок (ГОСТ и APA), экспорт в .tex, .md, .docx
Проверка на оригинальность ≤ 15 % и чек-лист подачи в журнал
Если нужно написать статью, оформить по требованиям ВАК или Scopus, не тратить месяцы на подбор литературы — этот модуль поможет справиться в разы быстрее и аккуратнее.Что получите на выходе:
AI-литобзор и карта источников по своей теме
Черновик научной статьи
Автоматически оформленную библиографию
Отчёт об оригинальности и пакет для подачи в журналПреподаватели
Курс ведет команда Zerocoder, включая экспертов по ИИ и no-code с 10+ годами опыта, работавших с МТС, ПИК и образовательными платформами. Они обучили 5500+ студентов и основали крупнейшее сообщество зерокодеров в СНГ.
Как проходит обучение
Формат: короткие видеоуроки, Q&A-вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится кейсами.
Что получите
Сертификат специалиста по ИИ в образовании.
Портфолио с AI-проектом для преподавания.
Навыки для автоматизации образовательных задач.
Доступ к закрытой Telegram-группе.Призыв к действию
Упростите преподавание с ИИ уже сегодня! Запишитесь на курс «Нейросети для преподавателя» и начните автоматизировать уроки через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку (от 22 425 тг./мес.) на курс по ссылке . Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к Telegram-комьюнити.
 - ZERO-VIBECODAGENT — Vibe-coding и автономные агенты
- Длительность: 4 недели
 - Код курса: ZERO-VIBECODAGENT
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой вайб-кодинг за 4 недели: создавай IT-продукты с ИИ!
Для кого курс
Курс «Вайб-кодинг» идеален для новичков без опыта программирования, фрилансеров и предпринимателей, желающих быстро создавать AI-ассистентов, ботов и мини-сервисы. Никаких технических знаний не требуется — только желание освоить ИИ-разработку и зарабатывать от 650 000 тг./мес.!
Чему научитесь
Создавать Telegram-боты и AI-ассистентов с помощью Cursor и ИИ.
Работать с API для интеграции нейросетей в проекты.
Писать и тестировать код в AI-средах без ручного программирования.
Автоматизировать задачи с ChatGPT, GigaChat и Yandex Cloud.
Упаковывать проекты для портфолио и фриланса.Почему этот курс
Курс длится 4 недели и проходит онлайн на платформе Zerocoder. Вы создадите 12 проектов, включая Telegram-бот и AI-сервис, с использованием ИИ-инструментов, ускоряющих разработку в 10 раз. Уникальность: вайб-кодинг — это новый подход, где ИИ пишет код за вас. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Урок 1. Что такое vibe-coding и как работать в AI-средах. Обзор AI сред разработки
Результат: ты поймёшь, зачем нужен vibe-coding, и научишься выбирать подходящую AI-среду. С нуля разберёшься, как запускать и тестировать код в этих средахУрок 2. Установка и первый запуск Cursor. Базовый интерфейс. Работа с терминалом и окружением
Результат: ты установишь Cursor. Сможешь быстро находить нужные функции и писать простой скрипт.Урок 3. Основы работы с API на примере telegram-ботов
Результат: создашь свой первый бот и подключишься к Telegram API. Поймёшь, как получать сообщения и отправлять ответ.Урок 4. Подключение нейросетей (LLM) в проект через API на примере библиотеки OpenAi (ProxyAPI)
Результат: добавишь искусственный интеллект в проект и получишь ответы модели в коде. Освоишь базовый запрос, работу с ключами и обработку результатов.Урок 5. Регистрация и подключение API GigaChat Yandex Cloud
Результат: настроишь два дополнительных ИИ-сервиса и сравнишь их с OpenAI. Сможешь легко переключать модели в своем боте.Урок 6. Работа с файлами, pdf, csv, xlsx и другими
Результат: на практике разберешь чтение, фильтрацию и анализ данных. Сформируешь простую отчетность в пару строк кода.Урок 7. Работа с таблицам через API, пользование таблиц в виде базы данных
Результат: подключишь таблицу к проекту и будешь читать и записывать строки онлайн. Узнаешь, как вести учёт пользователей в реальном времени.Урок 8. Использование MCP серверов Cursor
Результат: развернёшь серверную часть прямо в среде и создашь бот-модератор. Научишься держать процесс в фоне и логировать события.Урок 9. Что такое автономные агент, и как это работает. Пример с базовым парсингом сайта
Результат: соберёшь цепочку действий для парсинга сайта и генерации SEO-ядра. Поймёшь, как агент сам управляет задачами без вашего участия.Урок 10. Разворачивание LLM моделей через ollama, использование локальных моделей в проектах
Результат: установишь модель на свой компьютер и вызовешь её из скрипта. Получишь опыт офлайн-работы без сторонних API.Урок 11. Собственный VPS (виртуальный сервер), деплой python скрипта на сервер
Результат: настроишь свой сервер, загрузишь файл и запустишь проект круглосуточно. Узнаешь, как автоматизировать обновления и следить за логами.Урок 12. Финальный проект
Результат: создашь своего собственного агента!Бонусный модуль. Дополнительные инструменты вайб-кодера
Урок 1. Система контроля версий
Урок 2. Контейнеризация
Что вы узнаете?
1. Что такое система контроля версий. Установка git. Регистрация в GitHub. Изучение работы с системой git — работа с репозиторием.
2. Что такое контейнер. Использование готовых решений. Работа с Docker и развертывание контейнера на сервере.Преподаватели
Курс ведут эксперты Zerocoder с 10+ годами опыта в no-code и ИИ, создавшие проекты для МТС и ПИК. Команда — основатели крупнейшего сообщества зерокодеров в СНГ, обучившие 5500+ студентов.
Как проходит обучение
Формат: короткие видеоуроки, Q&A-вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится заказами.
Что получите
Сертификат специалиста по вайб-кодингу.
Портфолио с 12 проектами.
Навыки для фриланса или стартапа.
Доступ к заказам и Telegram-комьюнити.Призыв к действию
Создай свой первый AI-продукт без кода! Запишись на курс «Вайб-кодинг»и начни разработку через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке . Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к закрытой Telegram-группе.
 - ZERO-SVOYAISTUD — Своя AI-студия
- Длительность: 3 месяца
 - Код курса: ZERO-SVOYAISTUD
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Запусти свою AI-студию с менторством за 3 месяца!
Для кого курс
Курс «Зерокодер: менторство для создания AI-студии» идеален для новичков без опыта в IT, фрилансеров и предпринимателей, мечтающих о собственной студии по разработке AI-решений. Никаких навыков программирования не требуется — только желание создать бизнес с no-code и ИИ, зарабатывая от 975 000 руб./мес.!
Чему научитесь
Создавать AI-продукты (боты, ассистенты) на Bubble, Adalo, ChatGPT.
Использовать MidJourney, DeepSeek для генерации контента.
Настраивать API и автоматизации для бизнес-процессов.
Разрабатывать бизнес-план студии с гарантией окупаемости.
Привлекать клиентов на международные платформы (Upwork).Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 3+ AI-проекта для портфолио (бот, сайт, автоматизация) под руководством личного ментора. Уникальность: персональный план запуска студии с гарантией окупаемости по договору и доступ к заказам через Zerocoder. Доступ к материалам — пожизненный, поддержка — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Теоретические модули
Модуль 1: Предобучение
Изучение основ работы нейросетей
Основы python-разработки
Знакомство с ноукод инструментами, знания которых необходимы при открытии своей студииМодуль 2: Промпт-инжиринг
Работа с OpenAI API и другими нейросетевыми API для интеграции ИИ в продукты
Создание готовых ИИ-решений для бизнеса с использованием Python и no-code инструментов
Использование современных нейросетей (GPT, Claude, Gemini, YandexGPT, GigaChat, DALL·E и др.)
Работа с базами данных и векторными хранилищами (FAISS, Chroma и др.)
Применение LangChain и построение мультиагентных систем
Дообучение моделей и их разворачивание локально или в облаке
Внедрение ИИ в бизнес-процессы и продвижение себя как специалистаМодуль 3: Создание своей студии
Presale: логика построения проекта: от первого контакта с заказчиком и брифинга клиента до составления технического задания, оценки возможностей кандидата и оценки проекта.
Sale: как эффективно презентовать коммерческое предложение, завершить продажу, а также оформить и подписать необходимые документы
Разработка проектов: от создания карты пути клиента (CJM) до тестирования и устранения багов.
Открытие своей студии: Аудит разных бизнес-процессов и продуктов на предмет применимости ИИ
Масштабирование деятельности: продвижение личного бренда, unit-экономика, управление несколькими проектами, подбор команды и оформление бизнеса.
Бонус: Как зарабатывать на проектах студии от 1 млн. рублейПреподаватели
Курс ведет команда Zerocoder, включая СЕО Кирилла Пшинника, эксперта no-code и ИИ с опытом в МГУ, MBA Kingston и 42 Silicon Valley. Они работали с МТС, ПИК и обучили 5500+ студентов, создав крупнейшее сообщество зерокодеров в СНГ.
Как проходит обучение
Формат: видеоуроки, еженедельные созвоны с ментором, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится заказами.
Что получите
Сертификат AI и no-code предпринимателя.
Портфолио с 3+ проектами.
План запуска AI-студии.
Доступ к заказам и Telegram-комьюнити.Призыв к действию
Запусти свою AI-студию уже сегодня! Запишись на курс «Зерокодер: менторство для создания AI-студии»и начни зарабатывать через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, гайд по фрилансу, доступ к Telegram-группе.
 - ZERO-SVOYAZEROSTUD — Своя зерокод-студия
- Длительность: 3 месяца
 - Код курса: ZERO-SVOYAZEROSTUD
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Запусти люксовую no-code студию с премиум-менторством за 3 месяца!
Для кого курс
Курс «Зерокодер: премиум-менторство для создания люксовой студии» идеален для предпринимателей, фрилансеров и новичков, мечтающих о собственной IT-студии без навыков программирования. Никакого опыта в IT не требуется — только желание создать прибыльный бизнес с помощью no-code и ИИ под руководством экспертов!
Чему научитесь
Создавать сайты, приложения и боты на Bubble, Tilda, Adalo.
Использовать ИИ (ChatGPT, MidJourney) для автоматизации и контента.
Разрабатывать бизнес-план для студии с гарантией окупаемости.
Привлекать клиентов на российском и международном рынках.
Упаковывать проекты для портфолио и масштабирования бизнеса.Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 3+ проекта (сайт, приложение, автоматизация) и разработаете план запуска студии с персональным ментором. Уникальность: гарантия окупаемости по договору и доступ к заказам через Zerocoder. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Теоретические модули
Блок 1. Знакомство с инструментами Зерокодинга.
Онбординг
Tilda.Bubble.Webflow
Glide.Adalo
Bot Mother.Puzzlebot
Airtable.Directual
Zapier.Make.n8nБлок 2. Presale
Логика построения проекта
Первый контакт с заказчиком
Брифинг клиента
Техническое задание для зерокодера
Зерокодеры и их сообщества
Оценка возможностей кандидата-зерокодера
Оценка и осмечивание проектаМодуль 3. Sale
Презентация коммерческого предложения и продажа
Оформление и подписание документовБлок 4. Разработка
CJM
Инструменты и правила ведения проекта
Разработка дизайн-макета
Планирование проекта
Тестирование и устранение баговБлок 5. Завершение проекта
Завершение работы с клиентом. Передача проекта заказчику
Блок 6. Масштабирование деятельности
Личный бренд. Как себя продвигать
Unit-экономика и построение воронки заказов
Менеджмент нескольких проектов одновременно
Роли в команде и как подбирать людей
Налоги и оформление себя и своего бизнесаБлок 7. Создание собственной студии no-code разработки
Почему no-code агенства становятся все более популярными.
Примеры успешных проектов
Маркетинговая упаковка
Стратегия продвижения
Управление финансами и командойПреподаватели
Курс ведет команда Zerocoder, включая СЕО Кирилла Пшинника, эксперта no-code и ИИ с опытом в МГУ, MBA Kingston и 42 Silicon Valley. Они работали с МТС, ПИК и обучили 5500+ студентов, создав крупнейшее сообщество зерокодеров в СНГ.
Как проходит обучение
Формат: видеоуроки, еженедельные созвоны с ментором, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами.
Что получите
Сертификат no-code и AI-предпринимателя.
Портфолио с 3+ проектами.
Готовый план запуска студии.
Доступ к заказам и Telegram-комьюнити.Призыв к действию
Запусти свою люксовую студию уже сегодня! Запишись на курс "Своя зерокод-студия" и начни зарабатывать через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке . Бонусы: триал PROXYAPI.RU, гайд по международному фрилансу, доступ к Telegram-группе.
 - ZERO-VISCONAI — Визуальный контент с AI
- Длительность: 1 месяц
 - Код курса: ZERO-VISCONAI
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Создавай трендовый AI-контент за 1 месяц с нейросетями!
Для кого курс
Курс «Нейросети для визуального контента» идеален для новичков без опыта в дизайне, маркетологов, блогеров и предпринимателей, желающих создавать эффектные изображения и видео без студии или камеры. Никаких навыков не требуется — только желание освоить ИИ и выделиться в digital-пространстве!
Чему научитесь
Генерировать изображения в MidJourney, Leonardo AI и Kandinsky.
Создавать динамичные видео с Runway Gen-3 и Kling.
Использовать Flux для уникальных визуальных эффектов.
Применять промпты для точного воплощения идей.
Упаковывать контент для соцсетей, рекламы или портфолио.Почему этот курс
Курс длится 1 месяц и проходит онлайн на платформе Zerocoder. Вы создадите 3+ визуальных проекта, таких как рекламные баннеры или видеоролики, и получите триал-доступ к PROXYAPI.RU. Уникальность: обучение созданию трендового контента с нуля без затрат на оборудование. Доступ к материалам — 6 месяцев, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Модуль 1. Введение в создание визуального нейроконтента
Что такое нейросети и как с ними «разговаривать»: введение в промптинг
Будущее уже здесь: тренды и рынок AI-визуала
Виды визуального контента и как выбрать подходящий AI-инструмент
Результат: ты познакомишься с основами генеративного ИИ, принципами работы нейросетей и ключевыми трендами в AI-визуале. Научишься понимать, как «разговаривать» с нейросетями через промптинг и как выбирать подходящие инструменты для решения задач.Модуль 2. AI-художник: современное цифровое искусство
Как создавать изображения с помощью нейросетей: искусство промптинга
Будущее уже здесь: тренды и рынок AI-визуала
AI для брендинга: логотипы, упаковка, фирменный стиль
Визуал для блогов и соцсетей: обложки, посты, аватары и нейрофотосессии
Улучшаем изображения с AI: ретушь, стилизация, замена фона и восстановление фото
Генерация 3D-объектов и интеграция в креативы
AI-челлендж
Результат: ты глубоко погрузишься в создание изображений, AI-дизайн, работу с графикой и созданием визуального контента под разные задачи: брендинг, соцсети, блогинг, 3D и стилизация.Модуль 3. AI-видеомейкер: от shorts до трейлера
Как работает AI-видео: обзор инструментов и возможностей
Знакомство с CapCut. Монтаж с помощью нейросетей
AI как соавтор: Сценарий, сторителлинг и работа с субтитрами
Анимация статичных изображений и генерация видео с нуля
Короткие видео, которые цепляют: Shorts, talking-head, анимированные аватары
Обработка видеоконтента: цвет, эффекты, хромакей, апскейл
Музыка и звук с AI: генерация, озвучка, улучшение качества, монтаж аудио
Продвинутый монтаж: делаем музыкальный клип
Бонус: Основы монтажа в DaVinci Resolve
AI-челлендж
Результат: научишься создавать динамичный видеоконтент с помощью нейросетей: от коротких роликов для TikTok и Reels до трейлеров, мультфильмов и даже полноценного сторителлинга. Без камеры, без актёров, без монтажеров — только ты, идея и мощь искусственного интеллекта.Модуль 4. Монетизация
Как собрать портфолио
Где искать заказы: востребованные направления и ниши
Платформы, биржи и Telegram-чаты для старта
Упаковка услуг: как продавать себя и свои навыки
Продвижение без бюджета: личный бренд, соцсети и нетворкинг
Бонус: Основы монтажа в DaVinci Resolve
Результат: выходим в рынок: узнаешь как собрать портфолио, найти клиентов, упаковать и продвинуть свои услуги с минимальными вложениями.Преподаватели
Курс ведет команда Zerocoder, включая эксперта по нейродизайну с 10+ годами опыта, автора YouTube-канала Web Neuro Design Way (11K+ подписчиков). Они работали с GetCourse, Тиной Канделаки и обучили 5500+ студентов.
Как проходит обучение
Формат: короткие видеоуроки, вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится идеями и заказами.
Что получите
Сертификат специалиста по AI-контенту.
Портфолио с 3+ визуальными проектами.
Навыки для фриланса, маркетинга или блогинга.
Доступ к закрытой Telegram-группе.Призыв к действию
Создай трендовый контент с ИИ уже сегодня! Запишись на курс «Нейросети для визуального контента» и начни генерировать визуалы через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке . Бонусы: триал PROXYAPI.RU, подборка промптов, доступ к Telegram-комьюнити.
 - ZERO-ITSTARTBEZGR — IT-стартап без границ
- Длительность: 3 месяца
 - Код курса: ZERO-ITSTARTBEZGR
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Запусти IT-карьеру с премиум-менторством за 3 месяца!
Для кого курс
Курс «Премиум-менторство в IT: Зерокодинг и AI» создан для новичков без опыта в IT, фрилансеров и предпринимателей, мечтающих быстро освоить no-code и нейросети для создания IT-продуктов. Никаких навыков программирования не требуется — только желание зарабатывать от 975 000 руб./мес. под руководством личного ментора!
Чему научитесь
Разрабатывать сайты и приложения на Bubble, Tilda, FlutterFlow.
Создавать чат-боты и автоматизации с помощью Zapier и AI.
Генерировать контент с ChatGPT, MidJourney и YandexGPT.
Настраивать API и интеграции для бизнес-процессов.
Выходить на международный рынок с портфолио и заказами.Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder с персональным менторством. Вы создадите 3+ проекта (сайт, приложение, бот) и получите план выхода на доход с гарантией окупаемости по договору. Уникальность: индивидуальная работа с экспертами и доступ к заказам через Zerocoder. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Введение в No-Code и ИИ: Основы Bubble, Tilda, ChatGPT.
Разработка продуктов: Создание сайтов, приложений, ботов.
Автоматизация: Интеграции с Zapier, API, CRM.
Контент и маркетинг: Генерация визуалов и текстов с ИИ.
Карьера: Упаковка портфолио, поиск клиентов, фриланс.Преподаватели
Курс ведет команда Zerocoder, включая СЕО Кирилла Пшинника, евангелиста no-code и ИИ с опытом в МГУ, MBA Kingston и 42 Silicon Valley. Эксперты работали с МТС, ПИК и обучили 5500+ студентов.
Как проходит обучение
Формат: видеоуроки, персональные созвоны с ментором, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится заказами.
Что получите
Сертификат no-code и AI-разработчика.
Портфолио с 3+ проектами.
Навыки для фриланса или стартапа.
Доступ к международным заказам и Telegram-комьюнити.Призыв к действию
Запусти IT-карьеру с ментором уже сегодня! Запишись на курс «Премиум-менторство в IT: Зерокодинг и AI» и начни зарабатывать через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке . Бонусы: триал PROXYAPI.RU, гайд по фрилансу, доступ к Telegram-группе.
 - ZERO-ITKARBEZGR — IT-карьера без границ
- Длительность: 3 месяца
 - Код курса: ZERO-ITKARBEZGR
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
IT-карьера без границ: стань профессионалом за 3 месяца!
Для кого курс
Курс «IT-карьера без границ» создан для новичков без опыта в IT, фрилансеров и предпринимателей, мечтающих о быстрой карьере в IT. Никаких навыков программирования не требуется — только желание освоить no-code и нейросети с персональной поддержкой менторов и зарабатывать от 975 000 тг./мес.!
Чему научитесь
Создавать сайты, приложения и чат-боты на Tilda, Bubble, Adalo.
Работать с нейросетями (ChatGPT, MidJourney) для автоматизации задач.
Настраивать интеграции с API, CRM и платежными системами.
Упаковывать портфолио для выхода на международный рынок.
Находить клиентов и брать заказы на фрилансе.Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 3+ проекта (сайт, бот, автоматизация) с VIP-менторством, ускоряющим обучение в 5 раз. Уникальность: индивидуальная поддержка экспертов и доступ к международным заказам через Zerocoder. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Введение в No-Code: Основы Tilda, Bubble, Adalo, настройка проектов.
Нейросети: Работа с ChatGPT, MidJourney для контента и задач.
Интеграции: Подключение API, CRM, Zapier, платежных систем.
Практика: Создание сайтов, ботов, автоматизация процессов.
Карьера: Упаковка портфолио, выход на международные платформы.Преподаватели
Курс ведет команда Zerocoder, включая СЕО, евангелиста no-code с опытом в МГУ, MBA Kingston и 42 Silicon Valley. Эксперты работали с МТС, ПИК и обучили 5500+ студентов, создав крупнейшее сообщество зерокодеров в СНГ.
Как проходит обучение
Формат: видеоуроки, персональные созвоны с менторами, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, сообщество делится заказами.
Что получите
Сертификат no-code разработчика.
Портфолио с 3+ проектами.
Навыки для фриланса или стартапа.
Доступ к международным заказам и Telegram-комьюнити.Призыв к действию
Начни IT-карьеру без границ! Запишись на курс «IT-карьера без границ» и создай первый проект через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке. Бонусы: триал PROXYAPI.RU, гайд по фрилансу, доступ к Telegram-группе.
 - ZERO-DEVCHATAI — Разработчик чат-ботов под ключ: от простого бота до AI-ассистента
Описание курса
Стань разработчиком чат-ботов за 3 месяца без кода!
Для кого курс
Курс «Разработчик чат-ботов» идеален для новичков без опыта в IT, предпринимателей, маркетологов и фрилансеров, желающих создавать чат-боты для бизнеса. Никаких навыков программирования не требуется — только желание зарабатывать от 650 000 тг./мес. на востребованных решениях!
Чему научитесь
Создавать чат-боты на no-code платформах (Chatfuel, ManyChat, Botpress).
Настраивать ботов для Telegram, WhatsApp и сайтов.
Интегрировать чат-боты с CRM, аналитикой и платежными системами.
Автоматизировать клиентские воронки и поддержку.
Продавать услуги и находить заказы на фрилансе.Этот курс - уникальный! И вот почему:
Обучение полного цикла: от простых ботов до ИИ-ассистентов!Курс охватывает все этапы разработки — от базовых чат-ботов на Salebot до сложных AI-решений. Выпускники смогут брать заказы любой сложности и предлагать решения "под ключ".Маркетинговая логика и результативные автоворонки!Мы обучаем не только техническим навыкам, но и созданию стратегий, сценариев и автоворонок, чтобы боты приносили бизнесу результат.Самые востребованные технологии и платформы!Студенты освоят Salebot, Python, ChatGPT и автоматизацию задач с помощью ИИ для выполнения проектов любой сложности.Реальный заработок возможен уже на 2-м месяце!После 2-го модуля студенты смогут выходить на рынок, брать заказы и постепенно переходить к более сложным и дорогим проектам.Внедряем ИИ так, как никто больше не умеет!Мы обучили 8000+ студентов и ведущие компании. Выпускники курса создают решения, которые быстрее и лучше 90% рынка!Программа курса
Введение в чат-боты: Обзор платформ (Chatfuel, ManyChat), основы автоматизации.
Создание ботов: Настройка диалогов, сценариев и триггеров.
Интеграции: Подключение CRM, Zapier и аналитики.
Оптимизация: Повышение конверсии через боты, A/B-тестирование.
Карьера: Упаковка портфолио, поиск клиентов на фрилансе.Преподаватели
Курс ведут эксперты Zerocoder с 10+ годами опыта в no-code и маркетинге, создавшие боты для e-commerce, образования и HoReCa. Команда — часть крупнейшего сообщества зерокодеров в СНГ, обучившего 5500+ студентов.
Как проходит обучение
Формат: видеоуроки, вебинары, задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами и кейсами.
Что получите
Сертификат разработчика чат-ботов.
Портфолио из 3+ готовых ботов.
Навыки для фриланса или автоматизации бизнеса.
Доступ к базе заказов и карьерной поддержке.Призыв к действию
Создавайте чат-боты для бизнеса уже сегодня! Запишитесь на курс «Разработчик чат-ботов под ключ: от простого бота до AI-ассистента» и запустите своего первого бота через неделю. Места ограничены — начните сейчас!
Стоимость и бонусы
Узнайте стоимость и рассрочку на курс по ссылке. Бонусы: шаблоны чат-ботов, гайд по фрилансу и доступ к закрытой Telegram-группе.
 - ZERO-WEBDES — Веб — дизайнер
Описание курса
Стань веб-дизайнером за 3 месяца и создавай сайты без кода!
Для кого курс
Курс «Веб-дизайнер с нуля» идеален для новичков без опыта, фрилансеров, маркетологов и предпринимателей, желающих создавать современные сайты. Никаких навыков дизайна или программирования не требуется — только желание освоить востребованную профессию и зарабатывать от 650 000 руб./мес.!
Чему научитесь
Создавать стильные сайты на Tilda и Webflow за 1–2 дня.
Проектировать интерфейсы в Figma с учетом UX/UI.
Использовать нейросети (MidJourney, Leonardo AI) для дизайна.
Оптимизировать сайты для SEO и высокой конверсии.
Находить клиентов и строить портфолио для фриланса.Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 3+ проекта для портфолио, решите 100+ практических задач и получите обратную связь от экспертов. Уникальность: использование ИИ для ускорения дизайна и помощь в трудоустройстве через базу заказов Zerocoder. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Рассрочка от 22 425 тг./мес.
Программа курса
Основы веб-дизайна: Знакомство с Tilda, Webflow, основы UX/UI.
Работа в Figma: Создание макетов, прототипов, адаптивного дизайна.
Нейродизайн: Использование MidJourney и Leonardo AI для графики.
SEO и конверсия: Оптимизация сайтов для поисковиков и продаж.
Карьера: Упаковка портфолио, поиск заказов на фрилансе.Преподаватели
Курс ведет Александр, совладелец студии Colisium Digital, с 5+ годами опыта в веб-разработке на Webflow и 100+ коммерческими проектами для клиентов из Канады, Англии и Эстонии. Команда Zerocoder — эксперты no-code и ИИ, обучившие 5500+ студентов.
Как проходит обучение
Формат: видеоуроки, вебинары, задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами и опытом.
Что получите
Сертификат веб-дизайнера.
Портфолио из 3+ сайтов.
Навыки для фриланса или работы в студиях.
Доступ к базе заказов и карьерной поддержке.Призыв к действию
Создавайте сайты мечты без кода! Запишитесь на курс «Веб-дизайнер с нуля» и начните свой первый проект через неделю. Места ограничены — начните сейчас!
Стоимость и бонусы
Узнайте стоимость и рассрочку (от 22 425 тг./мес.) на курс по ссылке . Бонусы: шаблоны сайтов, гайд по фрилансу и доступ к закрытой Telegram-группе.
В зависимости от своих задач студент может добавить к основной программе дополнительные модули и собрать свой идеальный курс как конструктор!
WordPress (4 недели)
Модуль оптимально подойдет тем, кто хочет быстро выйти на огромный рынок дорогих заказов, увеличить кол-во потенциальных заказов или планирует работать с зарубежными заказчиками.
Освоим платформу WordPress с нуля
Научимся создавать интернет-магазин с использованием WooCommerce
Настроим адаптивную верстку для корректного отображения на разных устройствах
Оптимизируем сайт для пользователей и поисковых систем с помощью SEO и улучшения UX/UI
Реализуем платёжные системы и настроим безопасность сайта
Финально подготовим и запустим интернет-магазин, готовый к работе с клиентамиWordPress — платформа, на которой работает 30% всех сайтов в мире, а на ее плагине WooCommerce функционирует 41% всех интернет-магазинов. Она крайне востребована во всем мире, а заказы на разработку интернет-магазина на WordPress в среднем оцениваются в 975 000 тг. в Казахстане и в 5 000 $ - за рубежом.
Webflow (4 недели)
Модуль оптимально подойдет тем, кто хочет предлагать своим клиентам сайты высочайшего уровня и за счет этого повышать свой чек, а также увеличить кол-во потенциальных заказов как в Казахстане, так и за рубежом.
Освоим платформу Webflow с нуля
Научимся создавать адаптивные лендинги с учётом всех современных стандартов
Настроим адаптивную верстку для корректного отображения на разных устройствах
Добавим анимации и интерактивные элементы для улучшения пользовательского опыта
Интегрируем аналитические инструменты и настроим SEO для повышения видимости сайта
Финально подготовим и опубликуем готовый лендинг и пополним свое портфолиоWebflow — одна из самых мощных платформ для создания сайтов, которая позволяет создавать сайты высочайшего уровня со сложной анимацией и другими фишками без необходимости писать код. Платформа крайне быстро набирает популярность в России и в мире, а заказы на разработку в среднем оцениваются в 100 000 руб. в России и в 5 000 $ - за рубежом. При этом корпоративные сайты, которые часто заказывают именно на Webflow, могут стоить в разы дороже.
Навыки дорогого веб-дизайнера (4 недели)
Узнаем, как продавать услуги веб-дизайна на высокие чеки
Построим стратегию позиционирования себя как эксперта на рынке
Научимся привлекать клиентов с высокими бюджетами и вести переговоры с крупными проектами
Изучим специфику работы с международными клиентами и выход на зарубежные рынки
Освоим продвинутые способы использования ИИ для анализа конкурентов, персонализации пользовательского опыта и автоматизации процессов
Финализируем стратегии, которые позволят повысить эффективность работы и увеличить доход, работая с высокобюджетными проектами - ZERO-PROMPTING — Промпт-инжиниринг
- Длительность: 3 месяца
 - Код курса: ZERO-PROMPTING
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Освой промпт-инжиниринг за 3 месяца и создавай ИИ-решения!
Для кого курс
Курс «Промпт-инжиниринг с ИИ» идеален для новичков без опыта в IT, предпринимателей, маркетологов и фрилансеров, желающих внедрять искусственный интеллект в бизнес или карьеру. Никаких технических знаний не требуется — достаточно желания освоить востребованную профессию и работать с нейросетями!
Чему научитесь
Создавать нейроассистентов с помощью ChatGPT и OpenAI.
Писать эффективные промпты для точных ответов ИИ.
Интегрировать ИИ в бизнес-процессы через API.
Разрабатывать генераторы контента и поисковые системы.
Монетизировать навыки на фрилансе от 975 000 тг./мес.Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder. Вы создадите 3+ проекта для портфолио, включая AI-ассистента и генератор контента. ChatGPT ускоряет обучение, помогая оптимизировать промпты. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Уникальность: реальные кейсы и помощь в трудоустройстве через базу заказов Zerocoder. Рассрочка от 32 435 тг./мес.
Программа курса
Модуль 1: Основы промпт - инжиниринга
Модуль знакомит с профессией промпт-инженера, его ролью и основными навыками. Студенты узнают, как промптинг может помочь в автоматизации бизнес-задач, а также освоят основы взаимодействия с ИИ для получения нужных результатов.Основные темы:
Введение в профессию промпт-инженера.
Применение промптинга для бизнес-автоматизации.
Основы взаимодействия с ИИ и продвинутый промптинг.Образовательные результаты:
Понимание роли и задач промпт-инженера.
Навыки использования ИИ для автоматизации процессов.
Умение формулировать эффективные запросы к ИИ.Модуль 2: Разработка ИИ - ассистентов: GPTs, OpenAI, Playground
В этом модуле студенты узнают, как создавать нейроассистентов и использовать возможности платформ OpenAI и Playground. Также будут рассмотрены принципы работы с GPTs и их интеграция с Actions.Основные темы:
Создание и настройка нейроассистентов (GPTs).
Использование GPTs Store и Actions.
Знакомство с платформой OpenAI и инструментом Playground.Образовательные результаты:
Навыки создания нейроассистентов.
Понимание работы платформы OpenAI.
Умение интегрировать GPTs с бизнес-процессами.Модуль 3: Модели нейронных сетей и принципы работы LLM. Введение в API
В модуле рассматриваются базовые принципы работы больших языковых моделей (LLM) и нейросетей. Студенты изучат основы работы с API для интеграции моделей в проекты.Основные темы:
Введение в API для работы с нейросетями.
Принципы работы LLM и популярных нейросетевых моделей.
Обзор моделей, таких как Claude 3, Gemini, LLaMa, YandexGPT, GigaChat и другие.Образовательные результаты:
Знание принципов работы LLM и нейронных сетей.
Умение использовать API для интеграции ИИ в проекты.
Знакомство с различными нейросетевыми моделями.Модуль 4: Кейсы
Основные темы:
Кастдев, определение ЛПР: Google Sheets + ChatGPT.
Интернет-магазин с ИИ-консультантом.
ИИ-ассистент. Прескоринг кандидатов на вакансииОбразовательные результаты:
Умение работать с GitHub для хранения и управления проектами.
Навыки разработки и внедрения ИИ-консультантов.
Опыт создания скриптов для бизнес-автоматизации.Модуль 5: Работа с базами данных
Этот модуль охватывает основы анализа данных и работу с базами данных. Студенты научатся создавать базы знаний для ИИ и использовать нейросети для анализа данных.Основные темы:
Основы науки о данных и анализ данных с нейросетями.
Создание базы знаний для ИИ-ассистентов.Образовательные результаты:
Базовые навыки анализа данных.
Понимание основ работы с базами данных для ИИ.
Понимание, какой должна быть база данных компании, чтобы результат работы нейросети был качественным
Навыки создания базы знаний для ассистентов.Модуль 6: Основы работы с LangChain и разработка автономных агентов
Модуль направлен на освоение LangChain и создание мультиагентных систем.Основные темы:
Введение в LangСhain, обзор ключевых возможностей и принципов работы. Изучение основ создания интеллектуальных систем на основе LangСhainю
Взаимодействие LangChain с языковыми моделями.
Использование векторных баз.Образовательные результаты:
Понимание принципов мультиагентных систем.
Умение использовать LangChain для автоматизации бизнес-процессов.
Навыки работы с векторными базами.Модуль 7: Кейсы
Основные темы:
Транскрибация звонков в отделе продаж и контроль их качества.
SMM-эксперт с ИИ.
Генератор постов для блога в Telegram.
Разработка бота для озвучки.Образовательные результаты:
Навыки работы с транскрибацией и анализом звонков.
Умение разрабатывать SMM-решения с ИИ.Модуль 8: Дообучение нейросетей
Модуль посвящен тонкой настройке моделей и дообучению нейросетей. Студенты узнают, как эффективно использовать существующие модели для бизнес-процессов.Основные темы:
Основы fine-tuning LLM.Использование эмбеддинга и файнтюнинга для автоматизации процессов.Образовательные результаты:
Понимание основ дообучения нейросетей. Сможете настроить процесс адаптации предварительно обученной модели под специфические задачи с помощью небольшого количества целевых данных для более точных результатов на выходе
Навыки дообучения моделей для применения в бизнесе.
Умение использовать эмбеддинг для автоматизации задач.Модуль 9: Оптимизация затрат на ИИ. Стратегии развертывания ИИ - моделей
Модуль рассматривает оптимизацию ресурсов при работе с ИИ и выбор моделей для различных задач. Студенты научатся развертывать модели локально и в облачных средах.Основные темы:
Мульти-модельные ИИ-системы для оптимизации ресурсов.
Локальное и облачное развертывание моделей.
Оптимизация количества токенов: как преодолеть ограничения на их количество для максимизации производительности при минимальных затратах.ОбразовательныеРезультаты:
Знание подходов к оптимизации затрат на ИИ.
Навыки локального и облачного развертывания моделей.
Понимание применения мульти-модельных решений.Модуль 10: Кейсы
Модуль демонстрирует применение ИИ на практике, включая создание генераторов логотипов и поисковиков, а также разработку комплексных AI-систем.Основные темы:
Сервис для генерации логотипов с Yandex-ART API.
Создание поисковых систем с FAISS.
Разработка AI-системы.Образовательные результаты:
Навыки создания генераторов контента.
Умение разрабатывать поисковые системы на базе ИИ.
Опыт в проектировании и разработке AI-систем.Бизнес - МодулиМонетизация
Этот модуль направлен на развитие навыков, необходимых для успешного продвижения себя как специалиста и монетизации компетенций в сфере промпт-инжиниринга.Основные темы:
Обзор рынка промпт-инжиниринга и работа с высокобюджетными проектами.
Формирование конкурентного резюме: как выделить ключевые навыки промпт-инженера.
Создание профессионального портфолио на GitHub.
Методы оценки стоимости и продажа ИИ-продуктов, консультаций и проектов.
Создание профиля на фриланс-платформах для успешного продвижения услуг.
Поиск заказов на фриланс-биржах и стратегия взаимодействия с заказчиками.Образовательные результаты:
Умение анализировать рынок и находить высокобюджетные проекты в области промпт-инжиниринга.
Навыки создания профессионального резюме и портфолио, подчёркивающих ключевые компетенции.
Знание стратегий оценки стоимости и продажи ИИ-продуктов и услуг.
Опыт создания профиля и позиционирования себя на фриланс-платформах.
Навыки поиска и привлечения клиентов на фриланс-биржах.
Понимание тактик успешного продвижения себя как эксперта в области промпт-инжиниринга для достижения стабильного дохода.Внедрение ИИ в бизнес. Как зарабатывать на проектах от 1 млн
Этот модуль направлен на освоение стратегий и тактик успешного внедрения ИИ-решений в бизнес-процессы и продуктов.Основные темы:
Аудит бизнес-процессов для внедрения ИИ.
Планирование на основе потребностей заказчика.
Управление проектами и оценка рисков.
Юридические особенности работы с российскими и зарубежными клиентами.
Организация команды, обучение сотрудников и внутренняя коммуникация.
Продажа консалтинговых услуг на рынке с высоким бюджетом.Образовательные результаты:
Умение проводить аудит бизнес-процессов и выявлять потребности для ИИ-проектов.
Навыки эффективного планирования проектов и управления рисками.
Знание юридических аспектов работы с клиентами из разных стран.
Способность организовать работу команды и обеспечивать поддержку ИИ-систем.
Понимание стратегий продажи высокобюджетных консалтинговых услуг в ИИ.Преподаватели:
Курс ведет Никита Шорин, основатель агентства aibot.direct, спикер AI Summit и корпоративный консультант для ГазпромНефть. Его команда — эксперты Zerocoder с 10+ годами опыта в ИИ и no-code, обучившие 5500+ студентов.
Как проходит обучение
Формат: видеоуроки, вебинары, задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами и кейсами.
Что получите
Сертификат промпт-инженера.
Портфолио из 3+ ИИ-проектов.
Навыки для фриланса или внедрения ИИ в бизнес.
Доступ к заказам и карьерной поддержке.Призыв к действию
Стань экспертом по ИИ уже сегодня! Запишитесь на курс «Промпт-инжиниринг с ИИ» и создайте своего AI-ассистента через неделю. Места ограничены — начните сейчас!
Стоимость и бонусы
Узнайте стоимость и рассрочку на курс по ссылке . Бонусы: гайд по фрилансу, подборка промптов для ChatGPT и доступ к закрытой Telegram-группе.
 - ZERO-1CDEV — 1С-Разработчик
- Длительность: 6 месяцев
 - Код курса: ZERO-1CDEV
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Стань разработчиком 1С за 6 месяцев и зарабатывай от 150 000 руб.!
Для кого курс
Курс «Разработчик 1С с нуля» идеален для новичков без опыта программирования, специалистов, желающих сменить профессию, и фрилансеров, стремящихся к высоким доходам в IT. Никаких начальных знаний не требуется — только желание освоить востребованную профессию и работать с платформой 1С!
Чему научитесь
Разрабатывать и настраивать конфигурации в 1С:Предприятие.
Автоматизировать бизнес-процессы компаний на 1С.
Писать код на встроенном языке 1С и оптимизировать запросы.
Интегрировать 1С с внешними системами (CRM, сайты).
Создавать отчеты и дорабатывать функционал под задачи бизнеса.Почему этот курс
Курс длится 6 месяцев и проходит онлайн на платформе Zerocoder. Вы создадите 5+ проектов для портфолио, решите 100+ практических задач и получите поддержку по трудоустройству в течение 3 месяцев после обучения. Уникальность: акцент на реальных кейсах и монетизации навыков. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Рассрочка от 32 435 тг./мес.
Программы курса
Модуль 1 - Введение в профессию
Вы узнаете, какую роль 1С-разработчик играет в компании или на фрилансе, разберетесь в границах профессии и познакомитесь с системой грейдов.
Поймете, как строить карьеру в 1С и какие навыки помогут вам в этом пути.Модуль 2 - Знакомство с 1С
Получите базовые знания о платформе 1С, структуре программного обеспечения и возможностях автоматизации.
Установите 1С на свой компьютер и создадите свою первую базу данных с документами, справочниками и отчетами.Модуль 3 - Основы программирования на языке 1С
Освоите базовые конструкции языка 1С, научитесь работать с типами данных и логическими структурами, такими как переменные, циклы и условные операторы.
Получите фундаментальные навыки для написания алгоритмов и решения типовых задач программирования.Модуль 4 - Работа с объектами в 1С
Разберетесь, что такое объекты в 1С (справочники, документы, РС, РН, РБ, ПВХ, ПВР, константы).
Научитесь создавать и настраивать объекты на клиентской стороне, а также освоите основы их программирования.Модуль 5 - Работа с языком запросов в 1С. Основы и структура базы данных
Сможете создавать и выполнять запросы к базе данных 1С, освоите выборку, фильтрацию, группировку и сортировку данных.
Поймете, как работать с временными и вложенными запросами, соединять таблицы, а также оптимизировать запросы для повышения производительности.Модуль 6 - Оперативный учет. контроль остатков и учет по партиям.
Научитесь использовать методики контроля остатков. Разберетесь, что такое транзакции и блокировка объектов.
Модуль 7 - Макеты, обработки и отчеты (СКД)
Вы научитесь создавать печатные формы (макеты), отчеты и обработки с использованием СКД (системы компоновки данных).
Модуль 8 - Сопровождение и доработка типовых конфигураций 1С
Освоите навык доработки типовых конфигураций 1С, включая разработку нового функционала, адаптацию и изменение стандартных конфигураций под требования заказчика.
В рамках изучения конфигурации изучите понятия предметной области (управленческий учет). Научитесь использовать типовые механизмы БСП (библиотека стандартных подсистем) для любой конфигурации.Модуль 9 - Интеграция 1С с внешними сервисами и программами
Создадите интеграцию 1С со сторонним сервисом, сравните различные технологии для интеграции.
Познакомитесь с примерами интеграции нейросети с 1С для задач, которые возможно эффективно решить благодаря искусственному интеллекту.Модуль 10 - Обмен данных между программами 1С (КД)
Научитесь работать с отдельной конфигурацией КД 3.0 (конвертация данных) и узнаете, как настраивать стандартный обмен - РИБ (распределенную информационную базу).
Модуль 11 - Бизнес-процессы компании и их автоматизация
Будете разбираться в бизнес-процессах компаний, говорить с бизнесом на одном языке и предлагать грамотные решения автоматизации. Сможете оценивать трудоемкость задач по разработке.
Научитесь использовать нейросети для поиска идей и решений по автоматизации бизнес-процессов и улучшения коммуникации с заказчиками.Модуль 12 - Дополнительные навыки: от JUNIOR до MIDDLE
Разберетесь в принципах работы нетиповых конфигураций, а также работы с хранилищем при командной разработке. Узнаете, что такое сбор и формализация требований и как писать техническую документацию.
Модуль 13 - Дипломная работа
Создадите комплексный проект для конкретного бизнес-кейса, демонстрирующий все освоенные навыки, и защитите его, получив обратную связь от преподавателей и одногруппников.
Модуль 14 - Подготовка к сертификации в 1С
Познакомитесь с основными требованиями сертификации 1С:Профессионал, попрактикуетесь в решении задач и разборе типичных вопросов. Получите рекомендации по подготовке и пройдете пробный экзамен, максимально приближенный к реальному сертификационному тесту.
Модуль 15 - Карьера. Постоянное трудоустройство в штат компании
Создадите конкурентоспособное резюме и портфолио, подготовите самопрезентацию. Вас ждет симуляция собеседований с преподавателем и разбор тестовых заданий.
Трекинг откликов на вакансии поможет систематизировать процесс поиска работы, анализировать результаты и получать своевременную поддержку от кураторов, что ускоряет трудоустройство и улучшает стратегию откликов.Модуль 16 - Карьера. Работа с заказчиками на фрилансе
Освоите навыки поиска заказов на фрилансе, научитесь оценивать проекты, составлять предложения, договариваться об условиях сотрудничества. Поймете, как правильно вести учет доходов и соблюдать налоговые требования для успешной работы на фрилансе.
Преподаватели
Курс ведут эксперты Zerocoder с 10+ годами опыта в разработке на 1С, включая специалистов, внедрявших 1С в крупных компаниях (Сбербанк, Альфа-Банк). Они делятся практическими кейсами и секретами профессии. Команда — часть крупнейшего сообщества зерокодеров в СНГ, обучившего 5500+ студентов.
Как проходит обучение
Формат: видеоуроки, живые вебинары, задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы отвечают в Telegram, а сообщество делится заказами и опытом.
Что получите
Сертификат разработчика 1С.
Портфолио из 5+ проектов.
Навыки для работы в компаниях или фриланса.
Доступ к базе заказов и карьерной поддержке.Призыв к действию
Начни карьеру в IT с 1С уже сегодня! Запишись на курс «Разработчик 1С с нуля» и создай свой первый проект через неделю. Места ограничены — действуй сейчас!
Стоимость и бонусы
Узнай стоимость и рассрочку на курс по ссылке . Бонусы: гайд по фрилансу, шаблоны конфигураций 1С и доступ к закрытой Telegram-группе.
 - ZERO-DEV MOBAPP — Разработчик мобильных приложений
- Длительность: 3 месяца
 - Код курса: ZERO-DEV MOBAPP
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Стань разработчиком мобильных приложений за 3 месяца без кода!
Для кого курс
Курс «Разработчик мобильных приложений» идеален для новичков без опыта программирования, предпринимателей, дизайнеров и фрилансеров, мечтающих создавать приложения для iOS и Android. Никаких технических знаний не требуется — только желание запускать проекты за дни, а не месяцы!
Чему научитесь
Создавать мобильные приложения на Adalo и Glide за 1–2 дня.
Разрабатывать интерфейсы, календари, push-уведомления и админки.
Публиковать приложения в App Store и Google Play.
Интегрировать платежные системы и социальные функции.
Находить заказы и зарабатывать от 975 000 тг./мес.Почему этот курс
Курс длится 3 месяца и проходит онлайн на платформе Zerocoder. Вы создадите минимум 3 проекта для портфолио, решите 140+ практических задач и получите обратную связь от экспертов. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Уникальность: помощь в трудоустройстве и доступ к заказам университета Zerocoder. Рассрочка от 30 160 тг./мес.
Программа курса
Модуль 1: UX/UI
Научитесь распознавать и проектировать компоненты интерфейса мобильных приложений, создавать удобную информационную архитектуру, использовать и находить графику, изучите визуальные стили и создадите несколько дизайн-концептов в Figma.Модуль 2: FlutterFlow Basic
Создадите приложение по доставке еды.Модуль 3: FlutterFlow Pro
Освоите продвинутые техники разработки на FlutterFlow и создадите более сложное приложение по доставке еды.Модуль 4: Flutter
Создадите одно из мобильных приложений: приложение для общения, интернет-магазин, приложение для управления бюджетом, приложение для медитации, музыкальный плеер, онлайн-платформа для обучения.Модуль 5: Развитие карьеры Мобильного разработчика на Flutter
В модуле будет обзор рынка труда, работа над резюме, разработка портфолио, симулятор собеседований, отклики на вакансии.
Вы комплексно подготовитесь к выходу на рынок труда как в найме, так и на фрилансе с сильным портфолио и пониманием ключевых аспектов поиска заказов в сфере мобильной разработке.Преподаватели
Курс ведет Сергей Горелов, владелец веб-студии, создавший приложение для фитнес-клуба на Adalo за 2 недели без кода. Его проекты включают онбординг, календари и push-уведомления. Команда экспертов Zerocoder — профессионалы IT с 10+ годами опыта, основавшие крупнейшее сообщество зерокодеров в СНГ.
Как проходит обучение
Формат: видеоуроки, вебинары, задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы помогают в Telegram, а сообщество делится заказами и опытом.
Что получите:
Сертификат No-Code разработчика.
Портфолио из 3+ приложений.
Навыки для фриланса или стартапа.
Доступ к заказам и поддержка по трудоустройству.Призыв к действию
Создавайте приложения без кода уже сегодня! Запишитесь на курс на курс "Разработчик мобильных приложений" и выпустите свое первое приложение через неделю. Места ограничены — начните сейчас!
Стоимость и бонусы
Узнайте стоимость и рассрочку (от 30 160 тг./мес.) на курс по ссылке . Бонусы: гайд по фрилансу, шаблоны приложений и доступ к закрытой Telegram-группе.
Как мы обеспечиваем возможность заработка уже через 2 месяца
1 месяц обучения:
Изучаем основы UX/UI-дизайна
Знакомимся с рынком фриланса
Оформляем портфолио и резюме
Делаем первые отклики на вакансии2-3 месяц обучения:
Осваиваем базовый уровень FlutterFlow
Улучшаем резюме и портфолио
Формируем свой карьерный маршрут3-4 месяц обучения:
Осваиваем профессиональный уровень FlutterFlow
Изучаем рынок найма
Учимся писать сопроводительные письма
Обновляем портфолио и резюме для найма4-5 месяц обучения:
Изучаем Flutter
Активно откликаемся на вакансии
Проходим симуляторы и пробные интервью
Корректируем карьерную стратегию на основе опытаСоздадите приложение по доставке еды. - ZERO-DATANALYT — Аналитик данных с нуля
- Длительность: 6 месяцев
 - Код курса: ZERO-DATANALYT
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Стань аналитиком данных за 6 месяцев с ChatGPT!
Для кого курс
Курс «Аналитик данных с нуля с помощью ChatGPT» идеален для новичков без опыта в IT, фрилансеров, маркетологов и всех, кто хочет освоить востребованную профессию. Никаких начальных знаний не требуется — только желание анализировать данные и строить карьеру в IT!
Чему научитесь
Анализировать большие данные с помощью ChatGPT за неделю.
Работать с Excel, SQL, Python и BI-инструментами (Data Lens).
Создавать информативные дашборды и визуализации.
Писать сложные SQL-запросы для бизнес-задач.
Упаковывать резюме и портфолио для трудоустройства.Почему этот курс
Курс длится 6 месяцев и проходит онлайн на платформе Zerocoder. Вы создадите 14 проектов для портфолио, освоите инструменты аналитики и получите поддержку по трудоустройству в течение 3 месяцев после обучения. ChatGPT ускоряет учебу в 10 раз, помогая решать задачи и создавать промпты. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram.
Программа курса
Модуль 1 - Введения в анализ данных
Аналитик данных: специализации и основные задачи
Обзор основных инструментов аналитика: Excel, SQL, Python, BI инструмент
Работа с нейросетью. Создание промптовРезультат модуля:
Узнаете основные задачи аналитика данных в разных специализациях
Поймете назначения основных инструментов аналитика данных
Научитесь создавать качественные промпты для аналитических задач в ChatGPTМодуль 2 - Excel c ChatGPT
Импорт и очистка данных
Анализ данных с использованием формул и функций
Создание сводных таблиц для агрегирования данных
Функция ВПР в задачах аналитика
Визуализация данных с помощью графиков и диаграмм
Прогнозирование и анализ трендовРезультат модуля:
Научитесь работать с небольшим и средним объемом данных
Узнаете основы и научитесь делать сложные аналитические расчеты с использованием формул и функций Excel
Научитесь делать точный поиск и сопоставление данных между таблицами с помощью ВПР
Научитесь визуализировать данные: создавать информативные графики и диаграммы, которые помогут в анализе трендов и прогнозированииКейсы в портфолио:
Решение бизнес-задачи с применением функции ВПР
Анализа трендов и прогнозирование продажМодуль 3 - SQL с ChatGPT
Основы SQL и выборка данных
Сложные запросы и объединение таблиц
Работа с подзапросами
Использование оконных функций
Оптимизация запросов и индексыРезультат модуля:
Узнаете фундаментальные принципы SQL
Научитесь делать сложные SQL-запросы для объединения таблиц, а также эффективно использовать подзапросы для решения комплексных аналитических задач
Освоите продвинутый анализ данных, включая расчеты по различным сегментам данных и выполнение агрегаций на основе специфических условий
Освоите методы оптимизации SQL-запросов и ускорения обработки запросов, повышая производительность работы с большими объемами данныхКейсы в портфолио:
Сегментация клиентской базы для оптимизации маркетинговых кампаний
Определение оптимального уровня запасов на складеМодуль 4 - Python для анализа данных с ChatGPT
Основы Python для анализа данных
Использование библиотеки Pandas для обработки данных
Визуализация данных с помощью Matplotlib и Seaborn
Анализ временных рядов
Основы работы с NumPy
Продвинутые операции с NumPy
Библиотека Scipy для анализа данных
Основы машинного обучения с использованием scikit-learn
Автоматизация аналитических отчетов
Интеграция Python с базами данных
Основы работы с Git и GitHub
Работа с ветками в Git и слияние изменений
Командный проект: использование GitHub для совместной работыРезультат модуля:
Узнаете основы программирования на Python, его структуру и синтаксис, а также как использовать Python для анализа данных
Научитесь делать обработку и анализ больших объемов данных, визуализировать аналитические выводы, анализировать временные ряды и проводить продвинутые вычисления.
Освоите основы машинного обучения, включая подготовку данных, обучение моделей и оценку их эффективности, а также научитесь автоматизировать создание аналитических отчетов
Сможете интегрировать Python с различными базами данных для извлечения, обработки и анализа данных, а также использовать Git и GitHub для контроля версий, совместной работы над проектами и демонстрации своих проектов в портфолио.Кейсы в портфолио:
Анализ данных о продажах с использованием Pandas
Прогнозирование продаж на основе исторических данных
Классификация клиентов по вероятности оттокаМодуль 5 - Развитие продукта и работа с материками с ChatGPT
Введение в метрики продукта
Анализ воронки продаж
Расчет юнит-экономики
Основы работы с Google Analytics
Основы работы с Яндекс.Метрикой
Работа с пользовательскими событиями и когортный анализ
Мониторинг и анализ пользовательских отзывов
Разработка кейса для портфолиоРезультат модуля:
Поймете какие метрики важны для различных типов продуктов и как их правильно измерять и интерпретировать
Освоите настройку и использование Google Analytics и Яндекс.Метрики для сбора данных о поведении пользователей
Научитесь проводить когортный анализ, анализ воронки продаж, оценку юнит-экономики и использовать результаты анализа для принятия обоснованных решений по развитию продуктаКейсы в портфолио:
Когортный анализ и разработка стратегии удержания пользователей
Оценка и оптимизация юнит-экономики продуктаМодуль 6 - Проведение А/В-тестов с ChatGPT
Введение в A/B-тестирование
Планирование A/B-теста
Анализ результатов A/B-теста
Увеличение чувствительности A/B-тестов
Применение A/B-тестирования в различных сферах
Продвинутые инструменты и методы A/B-тестированияРезультат модуля:
Научитесь определять в каких случаях необходимо проводить A/B-тесты
Научитесь разрабатывать план A/B-теста
Сможете анализировать и интерпретировать результаты тестов, определять статистическую и практическую значимость изменений
Узнаете методы увеличения чувствительности тестов, минимизации шума и вариабельности данных для более точных результатовКейсы в портфолио:
Оптимизация конверсии на веб-сайте через A/B-тестирование
Тестирование новой функциональности в мобильном приложенииМодуль 7 - Разработка отчетов и дашбордов в Data Lens с ChatGPT
Введение в Data Lens
Работа с данными в Data Lens
Основы создания дашбордов
Продвинутые техники визуализации
Анализ эффективности дашбордов и оптимизацияРезультат модуля:
Научитесь подключать и обрабатывать данные из разных источников для создания информативных дашбордов
Сможете выбирать подходящие типы визуализаций для различных аналитических задач и эффективно использовать их для создания понятных и интерактивных отчетов
Овладеете методами планирования структуры дашбордов в соответствии с бизнес-целями и потребностями пользователей
Освоите методы анализа и оптимизации отчетовКейсы в портфолио:
Обзорный дашборд для малого бизнеса
Дашборд для мониторинга KPI отдела маркетингаМодуль - Развитие карьеры аналитика данных
Этот модуль встроен в программу на протяжении всего периода обучения и дает возможность оказывать полный цикл поддержки по трудоустройству.
Введение в карьеру аналитика данных
Разбор рынка труда для аналитика данных
Подготовка резюме и профиля на профессиональных платформах
Разработка портфолио проектов
Составление сопроводительных писем к вакансиям
Практика: отклики и сопроводительные письма
Подготовка к техническим собеседованиям
Практика: прохождение собеседованийРезультат модуля:
Узнаете основные площадки размещения вакансий
Оформите резюме и портфолио работ с курса
Разместите свои профили на основных площадках кандидатов
Подготовитесь к техническому собеседованию
Получите обратную связь на пройденные собеседования
Пройдете симулятор группового собеседования на курсеФинальный проект
Анализ эффективности новых механик рекламной кампании через проведение A/B-теста, презентация результатов на дашборде
Преподаватели
Курс ведут эксперты Zerocoder с 15+ годами опыта в IT и аналитике, включая СЕО университета, выпускника МГУ и 42 Silicon Valley. Они обучили 5500+ студентов и создали крупнейший no-code университет в СНГ.
Как проходит обучение
Формат: видеоуроки, вебинары, задания с проверкой. Учитесь в своем темпе через личный кабинет на zerocoder.ru. Кураторы отвечают в чате, а сообщество делится кейсами и заказами.
Что получите
Сертификат аналитика данных.
Портфолио из 14 проектов.
Навыки для работы в IT или фриланса.
Поддержка по трудоустройству и доступ к заказам.Призыв к действию
Начните карьеру аналитика данных уже сегодня! Запишитесь на курс на "Аналитик данных с нуля с помощью ChatGPT" и анализируйте данные через неделю. Места ограничены — действуйте сейчас!
Стоимость и бонусы
Узнайте стоимость на курс по ссылке. Бонусы: подборка промптов для ChatGPT, гайд по фрилансу и доступ к боту с ChatGPT-4o mini.
 - ZERO-PYTHPROG — Программист на Python с нуля
- Длительность: 6 месяцев
 - Код курса: ZERO-PYTHPROG
 - Стоимость
 - Очный формат: По запросу
 - Онлайн формат: По запросу
 
Описание курса
Стань Python-программистом за 6 месяцев с ChatGPT!
Для кого курс
Курс «Программист на Python с нуля с помощью ChatGPT» идеален для новичков без опыта в IT, фрилансеров, желающих увеличить доход, и тех, кто пробовал изучать программирование, но столкнулся с трудностями. Никаких начальных знаний не требуется — достаточно желания освоить востребованную профессию
Чему научитесь
Писать код на Python с помощью ChatGPT за минуты.
Создавать чат-боты, сайты на Flask и анализировать данные.
Работать с базами данных и SQL-запросами.
Использовать Git и GitHub для командной разработки.
Упаковывать резюме и портфолио для выхода на рынок.Почему этот курс
Курс длится 6 месяцев и проходит онлайн на платформе Zerocoder. Вы получите 100+ часов практики, создадите 5+ проектов для портфолио и научитесь зарабатывать от 975 000 тг./мес. ChatGPT ускоряет обучение в 10 раз, помогая писать код и решать задачи. Доступ к материалам — пожизненный, поддержка менторов — 24/7 в Telegram. Первый платеж — только после обучения или трудоустройства
Программа курса
Программа постоянно трансформируется, актуализируется и дополняетсяМодуль 1-Подготовка: Основы программирования на Python и эффективной работы с ChatGPT
Тема 1 - Введение в Python и ИИ
Знакомство с Python и установка среды разработки
Регистрация в ChatGPT и настройка под себяТема 2 - Основы Python
Основы синтаксиса. Переменные и типы данных
Коллекции и циклы for (списки, кортежи, словари, множества)
Условные операторы и цикл while
Функции и аргументы функций (def)
Обработка исключений (try-except)
Работа с модулями random и math. Создание собственных модулей и пакетов. Чтение и запись информации файлов
Изучение работы с модулем TkinterТема 3 - Основы Git - система управления версиями
Введение в Git
Работа с Git
Ветки в Git и слияние изменений
Ошибки при слиянии веток
Распределенная работа с Git
Расширенные возможности GitТема 4 - ООП в Python (объектно-ориентированное программирование)
Введение в ООП. Что такое классы и объекты классов? (методы классов, атрибуты методов)
Наследование и инкапсуляция
Композиция и полиморфизм
Принципы SOLID
Изучение работы с библиотекой PygameМодуль 2-Практика: Разработка на Python с помощью ChatGPT
Тема 5 - Работа с базами данных и SQL
Введение в базы данных и SQL
Операторы условий в SQL. Сортировка и фильтрация данных.
Группировка данных и агрегатные функции.Тема 6 - Операционная система Linux
Введение в виртуализацию и VirtualBox:
Создание виртуальных машин:
Основы Linux и терминала:
Основные команды Linux:
Управление процессами:
Удалённое управление и безопасность:
Практическое применение:Тема 7 - Парсинг
Протокол HTTP. Отправка GET и POST запросов.
Использование библиотеки requests.
Основы парсинга. Знакомство с HTML и CSS.
Работа с модулем BeautifulSoup
Работа с XML и JSON. Извлечение данных из структурированных форматов
Взаимодействие с динамическим контентом.
Использование Selenium
Разработка парсера для выбранного веб-сайта и обработка различных типов данных на сайтеТема 8 - Анализ данных
Введение в библиотеки Numpy и Pandas
Загрузка данных. Обработка пропущенных значений и дубликатов.
Преобразование данных и работа с типами.
Визуализация данных. Использование библиотеки Matplotlib.
Создание диаграмм и графиковТема 9 - Веб-разработка с использованием Flask
Введение в веб-разработку. Основы HTML и CSS
Работа с фреймворком Bootstrap
Знакомство с фреймворком Flask для веб-разработки.
Работа с шаблонизатором и HTML шаблоны
Взаимодействия с формами на сайте
Аутентификация и авторизация
Работа с API
Разработка проекта и развертывания веб-сайта на хостингеТема 10 - Веб-разработка с использованием Django
Введение в Django и создание проекта
Маршрутизация, отображения и шаблоны
Создание приложения
Формы и развертывание проекта
Работа с моделями
Кейс: создание проекта на DjangoТема 11 - Разработка чат-ботов в Telegram
Знакомство с библиотекой aiogram. Основы работы с API Telegram
Обработка входящих сообщений от пользователей и отправка текста и мультимедийных файлов
Интеграция баз данных
Реализация меню и кнопок.
Работа с интерфейсом
Работа с внешними API
Разработка чат-ботаТема 12 - Автоматические тесты
Введение в автоматическое тестирование и написание модульных тестов с unittest
Переход на pytest и улучшение тестов
Мокирование и тестирование API
Кейс: тестирование проектаТема 13 - Основы алгоритмов и структур данных
Введение в алгоритмы и структуры данных
Стеки и очереди. Деревья и графы
Алгоритмы сортировки
Анализ сложности алгоритмов
Кейс: создание проекта через алгоритмыИТОГОВЫЙ ПРОЕКТ: Сайт с доставкой цветов + Telegram бот
Модуль 3-Монетизаця/Трудоустройство: Зарабатываем первые деньги на Python-разработкеТрек ФРИЛАНС
Тема 1. Обзор рынка заказов
Какие заказы встречаются чаще, какие реже. Обзор платформ для фрилансеров. Как найти подходящий заказ.Тема 2. Создание портфолио и профиля
Как создать портфолио, которое будут смотреть? Создание портфолио и профилей на разных платформах.Тема 3. Как выделиться для заказчика?
Заказчик - кто он и как к нему подойти, как выделиться при первом контакте?Тема 4. Переговоры с заказчиком
Как вести коммуникацию? Как договариваться о правках, ценах и прочему.Тема 5. Продвижение
Как брать больше заказов? Какие инструменты для продвижения существуют?Трек КАРЬЕРА
Тема 1. Обзор рынка вакансий
Какое состояние сейчас? Какие вакансии открыты? Обзор платформ для поиска. Как их понимать и как выделять основные боли работодателя.Тема 2. Создание резюме
Как создать резюме, которое будут читать? Инструменты по созданию резюме.Тема 3. Как выделиться для работодателя?
Работодатель - какие основные боли у него есть, как написать сопроводительное письмо? Как изучить компанию?Тема 4. Собеседование
Важные софт скиллы разработчика. Как на собеседовании до технической части повысить свои шансы на прохождение?Тема 5. Техническое собеседование
Как подготовиться? Любимые вопросы hr сотрудников. Что делать, если не знаешь ответ?ФИНАЛЬНЫЙ ЭТАП — СТАЖИРОВКА
Преподаватели
Курс ведут эксперты Zerocoder с 15+ годами опыта в IT и маркетинге, включая СЕО университета Zerocoder, выпускника МГУ и 42 Silicon Valley. Они создали крупнейший no-code университет в СНГ и обучили 3000+ студентов работе с нейросетями.
Как проходит обучение
Формат: видеоуроки, живые вебинары, практические задания с проверкой. Учитесь в удобное время через личный кабинет на zerocoder.ru. Кураторы помогают в чате, а сообщество делится заказами и опытом.
Что получите
Сертификат Python-разработчика.
Портфолио из 5+ проектов (боты, сайты, аналитика).
Навыки для фриланса или работы в IT-компаниях.
Доступ к базе заказов и карьерной поддержке.Призыв к действию
Стань программистом будущего уже сегодня! Запишитесь на курс "Программист на Python с нуля и начните кодить с ChatGPT". Места ограничены — действуйте сейчас!
Стоимость и бонусы
Узнайте стоимость и гибкие тарифы на курс по ссылке. Дополнительная скидка 5% по промокоду “HGK”. Бонусы: гайд «Как зарабатывать на фрилансе», подборка промптов для ChatGPT и доступ к боту с ChatGPT-4o mini.
 
NetApp
- ONTAP9ADM — Администрирование кластеров ONTAP 9.5
- Длительность: 3 дня (24 часа)
 - Код курса: ONTAP9ADM
 - Стоимость
 - Очный формат: 991 000 ₸
 - Онлайн формат: 974 500 ₸
 
Описание курса
Кому следует посетить
Курс рекомендован сетевым инженерам, партнерам производителя, системным инженерам и клиентам производителя.
Сертификации
Этот курс является частью следующих программ сертификаций:
NetApp Certified Storage Installation Engineer (NCSIE), ONTAP
NetApp Certified Data Administrator, ONTAPЦели курса
По завершении этого курса вы сможете:
Описать, как ONTAP вписывается в стратегию Облако и Data Fabric компании NetApp.
Определить платформы, поддерживаемые ONTAP.
Определить компоненты кластера ONTAP .
Создать кластер.
Управлять администраторами ONTAP.
Настраивать и управлять ресурсами хранения.
Настраивать и управлять сетевыми ресурсами.
Описать роль виртуальной машины хранения данных (SVM) в архитектуре хранения данных от NetApp.
Создавать и настраивать SVM.
Создавать и управлять FlexVols.
Реализовывать функции повышения эффективности хранения.
Создавать сервера протоколов в рамках SVM.
Обновлять и восстанавливать патчи и релизы ONTAP.
Описать уровни, на которых ONTAP защищает данные.Follow On Courses
ONTAP Data Protection Administration (DATAPROT9)
ONTAP SAN Implementation (SANIMP)
ONTAP SMB Administration (CIFSAD)
ONTAP NFS Administration (NFSAD)Содержание курса
3-дневный курс, направленный на получение навыков администрирования кластера ONTAP 9.9. В рамках курса изучаются аспекты администрирования, обслуживания и поддержания работы кластера. В работе с кластером используются как интерфейс командной строки, так и графический интерфейс OnCommand System Manager.
 
Записаться на курс
Контакты
LinkedIn
Email
Web