Направления
Направление
Antcolony — Кибербезопасность
- ANT-CISO — Модернизация программы кибербезопасности
- Длительность: 3 дня (24 часа)
- Код курса: ANT-CISO
- Стоимость
- Очный формат: 590 000 ₸
- Онлайн формат: 571 500 ₸
Описание курса
Описание курса:
Интенсив для действующих руководителей ИБ и архитекторов, которым нужно не просто понять принципы, а выстроить работающую программу кибербезопасности и защитить её перед бизнесом. Три дня — три уровня: стратегия → архитектура → внедрение. Логика курса построена на Security Adoption Framework, CISO Workshop и Cybersecurity Reference Architecture. Без привязки к конкретным продуктам.
Аудитория курса:
CISO, руководители ИБ, архитекторы безопасности, SOC/IR, GRC, IT-архитекторы, DevSecOps, руководители цифровой трансформации.
Предварительные требования к аудитории:
Опыт в кибербезопасности, понимание управления рисками и архитектуры IT-систем.
Содержание курса:
Модуль 1 – Стратегия и модель программы ИБ.
Роль CISO и структура программы безопасности.
Принципы Zero Trust.
Ключевые дисциплины: управление доступом, Security Operations, защита данных и активов, DevSecOps.
Модель зрелости, метрики эффективности и связь ИБ с бизнес-рискамиМодуль 2 – Целевая архитектура безопасности.
End-to-end модель защиты.
Identity-centric подход и архитектура SOC.
Posture Management, сегментация и контроль доверия.
Защита облачных и гибридных сред.
Архитектурные паттерныМодуль 3 – Внедрение и операционная модель.
Принципы модернизации программы ИБ.
Формирование roadmap и governance-модели.
Управление рисками и исключениями.
Метрики прогресса.
Баланс prevention / detection / response - ANT-CISO-AI — Безопасность AI в организациях
- Длительность: 3 дня (24 часа)
- Код курса: ANT-CISO-AI
- Стоимость
- Очный формат: 590 000 ₸
- Онлайн формат: 571 500 ₸
Описание курса
Описание курса:
Материал данного курса дает руководителям службы безопасности и специалистам единый “операционный” взгляд на безопасность и управление рисками AI/GenAI в корпоративной среде: от политики и модели управления до контроля данных, поставщиков, инцидентов и метрик. Основной фокус делается на безопасном использование AI в бизнес-процессах, подключении внешних AI-сервисов, управлении рисками LLM-приложений и AI-агентов, контроле утечек, а также подготовки к аудитам.
Аудитория курса:
Руководители и владельцы AI-направления, CISO/заместители, руководители SOC/IR, AppSec, CloudSec, Data Security, GRC/Compliance.
Предварительные требования к аудитории:
Необходимо базовое понимание кибербезопасности и управления рисками, желательно иметь представление о том, что такое LLM и GenIA.
Содержание курса:
Модуль 1 – AI как новая поверхность атаки и новая зона ответственности.
Почему AI меняет модель угроз и модель ответственности (AI-as-a-Service, Copilot-эффект, AI-агенты).
Роли и “линии защиты” (1st/2nd/3rd line) для AI.
Классы AI-сценариев в компании.
Обзор рисков GenAI по NIST.Модуль 2 – Вневендорные инициативы, практики и стандарты в области безопасности AI.
NIST AI RMF.
ISO/IEC 42001.
ISO/IEC 23894.
Cloud Security Alliance AI Controls Matrix.
OWASP Top 10 for LLM Apps.
MITRE ATLAS.
ИнициативыМодуль 3 – Модель угроз для AI: что реально атакуют и чем это заканчивается.
Базовая терминология (что важно для безопасности): модели, промпты, контекст, RAG, инструменты, агенты, плагины, память агента.
Практическое threat modeling для AI без “глубокой ML-разработки”: активы; границы доверия; каналы ввода/вывода; злоупотребления.
Классы атак и инцидентов.Модуль 4 – Данные, приватность и “AI DLP”: главный операционный риск.
Классификация данных и “AI-границы” (что можно/нельзя отправлять в публичные LLM).
Политики: разрешенные инструменты, запреты, исключения, safe prompts, правила хранения/логирования.
Защита от утечек в AI.
Модель “minimum necessary context” и управление доступом к корпоративным знаниям.
Встраивание в ISMS и контрольные меры из ISO/IEC 27001/27002.Модуль 5 – Контроли безопасности для AI в эксплуатации: практики без привязки к вендору.
“Security by design” для внедрения GenAI в процессы (без разработки моделей.
Контроль поставщиков и цепочки поставок.
Практика построения набора контролей по CSA AI Controls Matrixи “мэппинг” на корпоративные контроли.Модуль 6 – Мониторинг, инциденты и аудит: как SOC/IR живет в мире AI.
Какие “сигналы” важны для AI-инцидентов.
Playbooks для SOC/IR.
Метрики и контроль эффективности: coverage по use-cases, доля “approved tools”, инциденты/почти-инциденты, time-to-contain.
Подготовка к аудитам: артефакты, политики, реестр use-cases, оценка рисков по NIST AI RMF и требования AIMS по ISO/IEC 42001.Модуль 7 – Рекомендации по ролям: “что делать завтра” каждому участнику
Совет директоров / C-level: риск-аппетит, KPI, ответственность, инвестиции в контроли.
CISO / Head of Security: AI security program, контрольная база, исключения, приоритизация use-cases.
GRC/Compliance/Privacy: политика, реестр AI, оценки рисков, поставщики, evidence.
AI Program Owner / Product Owner: governance, жизненный цикл, требования безопасности к use-case, acceptance criteria.
IT/Cloud/Architecture: интеграции, SSO, сегментация, прокси-шлюзы, observability.
SOC/IR: playbooks, детектирование, обучение аналитиков.
Procurement/Vendor Mgmt: security addendum, вопросы провайдерам, контроль субподрядчиков. - ANT-CISSP — Подготовка к экзамену на сертификацию CISSP
- Длительность: 3 дня (24 часа)
- Код курса: ANT-CISSP
- Стоимость
- Очный формат: 620 000 ₸
- Онлайн формат: 600 500 ₸
Описание курса
Описание курса:
Материал данного курса построен в соответствии с содержанием программы сертификации CISSP консорциума (ISC)2 и позволяет слушателям изучить базовые знания в области проектирования, внедрения и оценки системы кибербезопасности компании с т.з. этой сертификации, также подготовиться к сдаче соответствующего экзамена. Курс читается сертифицированными специалистами CISSP.
Аудитория курса:
Руководители служб кибербезопасности компаний, менеджеры проектов кибербезопасности, сотрудники департаментов кибербезопасности компаний, отвечающие за проектированием подсистем безопасности.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, общими представлениями о работе операционных систем, а также базовыми знаниями о кибербезопасности.
Содержание курса:
Модуль 1 – Структура сертификации CISSP.
Консорциум (ISC)2 и сертификация CISSP.
Роли, для которых предназначена сертификация.
Домены (области знаний), которые охватывает сертификация.
Предварительные требования и процесс получения сертификации.Модуль 2 – Домены и материал CISSP.
Домен 1: Управление рисками.
Домен 2: Безопасность активов.
Домен 3: Инжиниринг систем безопасности.
Домен 4: Безопасность сетей TCP/IP.
Домен 5: Контроль доступа.
Домен 6: Оценка и тестирование систем безопасности.
Домен 7: Операционные задачи и процессы безопасности.
Домен 8: Безопасная разработка п/о.Модуль 3 – Поддержание статуса CISSP.
Подготовка и сдача экзамена.
Требования к поддержанию статуса CISSP.
Релевантные международные стандарты. - ANT-CCSP — Подготовка к экзамену на сертификацию CCSP
- Длительность: 3 дня (24 часа)
- Код курса: ANT-CCSP
- Стоимость
- Очный формат: 436 000 ₸
- Онлайн формат: 418 000 ₸
Описание курса
Описание курса:
Материал данного курса построен в соответствии с содержанием программы сертификации CCSP консорциума (ISC)2 и позволяет слушателям изучить базовые знания в области проектирования, внедрения и оценки системы кибербезопасности облачной инфраструктуры компании с т.з. этой сертификации, также подготовиться к сдаче соответствующего экзамена. Курс читается сертифицированными специалистами CСSP.
Аудитория курса:
Руководители служб кибербезопасности компаний, менеджеры проектов кибербезопасности, сотрудники департаментов кибербезопасности компаний, отвечающие за проектированием подсистем безопасности.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, общими представлениями о работе операционных систем, а также базовыми знаниями о кибербезопасности.
Содержание курса:
Модуль 1 – Структура сертификации CСSP.
Консорциум (ISC)2 и сертификация CСSP.
Роли, для которых предназначена сертификация.
Домены (области знаний), которые охватывает сертификация.
Предварительные требования и процесс получения сертификации.Модуль 2 – Домены и материал ССSP.
Домен 1: Концепция, архитектуры и проектирование облака.
Домен 2: Безопасность данных в облаке.
Домен 3: Облачные платформы и защита инфраструктуры облака.
Домен 4: Безопасность облачных приложений.
Домен 5: Операционная задачи кибербезопасности в облаке.
Домен 6: Управление рисками и требования регуляторов.Модуль 3 – Поддержание статуса CСSP.
Подготовка и сдача экзамена.
Требования к поддержанию статуса CСSP.
Релевантные международные стандарты. - ANT-CISA — Подготовка к экзамену на сертификацию CISA
- Длительность: 3 дня (24 часа)
- Код курса: ANT-CISA
- Стоимость
- Очный формат: 620 000 ₸
- Онлайн формат: 600 500 ₸
Описание курса
Описание курса:
Материал данного курса построен в соответствии с содержанием программы сертификации для IT-аудиторов CISA, поддерживаемой организацией ISACA и позволяет слушателям изучить логику, цели и механизмы проведения аудита IT-систем с т.з. этой сертификации, а также подготовиться к сдаче соответствующего экзамена. Курс читается сертифицированными специалистами CISA.
Аудитория курса:
Руководители служб кибербезопасности компаний, аудиторы IT-систем.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, общими представлениями о работе операционных систем, а также базовыми знаниями о кибербезопасности.
Содержание курса:
Модуль 1 – Структура сертификации CISA.
Организация ISACA и сертификация CISA.
Роли, для которых предназначена сертификация.
Стандарты ISACA в области проведения аудита.
Домены (области знаний), которые охватывает сертификация.
Предварительные требования и процесс получения сертификации.Модуль 2 – Домены и материал CISA.
Домен 1: Процесс аудита информационных систем.
Домен 2: Стратегическое и тактическое управление IT.
Домен 3: Приобретение, разработка и внедрение информационных систем.
Домен 4: Эксплуатация информационных систем и устойчивость бизнеса.
Домен 5: Защита информационных активов.Модуль 3 – Поддержание статуса CISA и проведение аудитов.
Подготовка и сдача экзамена.
Требования к поддержанию статуса CISA.
Стандарты и этика проведения аудита. - ANT-CSSP — Подготовка к экзамену на сертификацию CSSP
- ANT-ISO27 — Информационная безопасность по стандартам ISO
- Длительность: 5 дней (40 часов)
- Код курса: ANT-ISO27
- Стоимость
- Очный формат: 694 500 ₸
- Онлайн формат: 676 500 ₸
Описание курса
Описание курса:
Материал данного курса позволяет слушателям изучить подходы и рекомендации к обеспечению информационной безопасности компании по стандартам ISO.
Аудитория курса:
Руководители служб кибербезопасности компаний, менеджеры проектов по информационной безопасности.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, общими представлениями о работе операционных систем, а также базовыми знаниями о информационной безопасности.
Содержание курса:
Модуль 1 – Структура стандартов ISO серии 27000.
Стандартизация в области информационной и кибербезопасности.
Стандарты ISO серии 27000.
Связь с другими международными стандартами.Модуль 2 – Система управления информационной безопасностью.
Задачи и процессы в области управления информационной безопасности.
Стандарт ISO 27001 как основа построения СУИБ.
Стандарты ISO 27002 и 27005 как инструменты построения системы ИБ.
Связь со стандартами Cobit, CRISC, NIST.
Задачи и ответственность руководителя системы ИБ (CISO).
Измеримость результатов работы системы ИБ компании. Стандарт ISO 27004.Модуль 3 – Управление рисками информационной безопасности.
Управление рисками как инструмент оценки экономической эффективности системы информационной безопасности компании.
Стандарт ISO 27005 как основа построения процессов управления рисками ИБ.
Инструменты и методики управления рисками ИБ.
Совместимость с международными системами управления ИБ: ISO, Cobit, NIST.Модуль 4 – Внедрение системы информационной безопасности.
Типы и механизмы контроля доступа для построения системы ИБ компании.
Стандарт ISO 27002 как репозиторий механизмов контроля доступа.
Логика и методики выбора механизмов контроля доступа.
Связь с рекомендациями CIS по выбору механизмов контроля доступа.Модуль 5 – Управление инцидентами информационной безопасности.
Операционные задачи ИБ и Центр Операционной Безопасности (SoC).
Стандарт ISO 270035 для регламентации процессов и методов управления инцидентами ИБ.
Связь с отраслевыми практиками в области обработки инцидентов ИБ.Модуль 6 – Обеспечение безопасности облаков.
Обеспечение безопасности облачных инфраструктур и сервисов.
Стандарты ISO 27017 и 27018 как руководство по обеспечению безопасности облачных сервисов.
Существующие reference архитектуры построения безопасного гибридного облака.Модуль 7 – Проблема приватности.
Концепция приватности и её развитие.
Персональные данные и приватность.
Стандарт ISO 27701 как руководство по построению программы безопасности персональных данных.Модуль 8 – Обеспечение непрерывности бизнеса.
Принципы обеспечения непрерывности бизнеса.
Отказоустойчивость и высокая доступность бизнес-процессов.
Стандарт ISO 22301 как основа построения системы управления непрерывностью бизнеса.Модуль 9 – Сертификации по стандартам ISO серии 27000.
Сертификации организации на соответствие стандартам ISO.
Процесс прохождения аудита на соответствие стандартам ISO.
Сертификации специалиста: lead implementer и lead
Процесс получения сертификации специалиста. - ANT-C101 — Измеримая кибербезопасность для лидеров бизнеса
- Длительность: 3 дня (24 часа)
- Код курса: ANT-C101
- Стоимость
- Очный формат: 590 000 ₸
- Онлайн формат: 571 500 ₸
Описание курса
Описание курса:
Практический курс для руководителей, которые принимают решения по кибербезопасности — и хотят делать это на основе данных, а не интуиции. Без технического погружения: только управленческая логика, измеримые риски и конкретные инструменты для защиты бизнеса. Курс проходит в виде интерактивных сессий, разбора реальных кейсов, работы с шаблонами: карта критичности, сценарии рисков, KPI/KR.
Аудитория курса:
CEO, COO, CFO, руководители ИТ и цифровой трансформации, владельцы продуктов, члены комитетов по рискам и аудиту.
Предварительные требования к аудитории:
Предварительные требования отсутствуют.
Содержание курса:
Модуль 1 – Риск и контекст.
Как говорить о кибербезопасности на языке бизнеса.
Модель ущерба: деньги, простой, репутация, цепочки поставок.
Сценарии «если — то».
Практикум: карта критичности ключевых процессов и активовМодуль 2 – Архитектура защиты.
Принципы Defense-in-Depth, Zero Trust и least privilege — без технических деталей, на уровне управленческих смыслов.
Управление доступом и идентичностью как бизнес-контроль.
Практикум: «архитектура на одном листе»Модуль 3 – Измеримость и инвестиции
Управленческий дашборд и метрики.
Как приоритизировать инициативы и обосновывать бюджет.
Роль руководства в кризисной ситуации. - ANT-CEO-AI — Безопасность AI в организациях для руководителей
- Длительность: 1 день (8 часов)
- Код курса: ANT-CEO-AI
- Стоимость
- Очный формат: 355 500 ₸
- Онлайн формат: 336 500 ₸
Описание курса
Описание курса:
Материал данного курса дает руководителям и специалистам единый “операционный” взгляд на безопасность и управление рисками AI/GenAI в корпоративной среде: от политики и модели управления до контроля данных, поставщиков, инцидентов и метрик. Основной фокус делается на безопасном использование AI в бизнес-процессах, подключении внешних AI-сервисов, управлении рисками LLM-приложений и AI-агентов, контроле утечек, а также подготовки к аудитам.
Аудитория курса:
Руководители и владельцы AI-направления.
Предварительные требования к аудитории:
Необходимо владеть базовой терминологией бизнеса.
Содержание курса:
Модуль 1 – AI как новая поверхность атаки и новая зона ответственности.
Почему AI меняет модель угроз и модель ответственности (AI-as-a-Service, Copilot-эффект, AI-агенты).
Роли и “линии защиты” (1st/2nd/3rd line) для AI.
Классы AI-сценариев в компанииМодуль 2 – Данные, приватность и “AI DLP”: главный операционный риск.
Классификация данных и “AI-границы” (что можно/нельзя отправлять в публичные LLM).
Политики: разрешенные инструменты, запреты, исключения, safe prompts, правила хранения/логирования.
Защита от утечек в AI.Модуль 3 – Рекомендации по ролям: “что делать завтра” каждому участнику.
Совет директоров / C-level: риск-аппетит, KPI, ответственность, инвестиции в контроли.
CISO / Head of Security: AI security program, контрольная база, исключения, приоритизация use-cases.
GRC/Compliance/Privacy: политика, реестр AI, оценки рисков, поставщики, evidence.
Procurement/Vendor Mgmt: security addendum, вопросы провайдерам, контроль субподрядчиков. - ANT0000 — Основы кибербезопасности
- Длительность: 5 дней (40 часов)
- Код курса: ANT0000
- Стоимость
- Очный формат: 661 500 ₸
- Онлайн формат: 638 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы кибербезопасности: направления и сегменты деятельности этой технологической отрасли, классы и типы её продуктов, технологии и методики их использования. Материал курса построен на принципе, согласно которому кибербезопасность – это, прежде всего, процесс, поэтому большое внимание уделяется тому, как
именно выстроить процессы кибербезопасности корпоративного уровня в рамках её единой архитектуры.Аудитория курса:
Люди, начинающие знакомиться с кибербезопасностью, а также люди, желающие систематизировать свои знания в этой области.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Контроль доступа и его типы.
Механизмы контроля доступа.
Принципы построения архитектуры кибербезопасности.Модуль 2 – Моделирование угроз и оценка рисков кибербезопасности.
Методики моделирования угроз.
Методики оценки и управления рисками.
Построение процессов и архитектуры кибербезопасности на основе модели угроз.
Работа с персональными данными и приватность информации.Модуль 3 – Безопасность сетей TCP/IP.
Функциональная классификация механизмов защиты TCP/IP сетей.
Контроль доступа к локальной сети. Защита от ARP и DHCP атак.
Контроль доступа к локальной сети. 802.1x.
Репутационная аналитика. IP, DNS и URL фильтрация.
Фильтрация сетевого трафика. Firewall и IPS.
Защита от DoS и DDoS атак.
Защита Wi-Fi сетей.Модуль 4 – Криптография и VPN.
Принципы шифрования данных.
Симметричные шифры.
Асимметричные шифры.
PKI.
Принципы обеспечения целостности данных.
Алгоритмы создания MAC.
Принципы построения защищенных каналов связи.
Принципы работы VPN.
Классификация и архитектуры VPN.Модуль 5 – Безопасность операционных систем.
Принципы обеспечения защиты информации внутри ОС.
Модели безопасности ОС.
Безопасность ОС Windows.
Безопасность ОС Linux.
Безопасность macOS.
Безопасность мобильных ОС.Модуль 6 – Безопасность приложений.
Безопасность Web-приложений.
Безопасность электронной почты.
Безопасность IP-телефонии.
Безопасность облачной инфраструктуры Microsoft365.
Безопасность платформ виртуализации.Модуль 7 – Безопасность индустриальных объектов.
Объекты и системы индустриальной инфраструктуры.
Компоненты обеспечения кибербезопасности индустриальных объектов.
Архитектура кибербезопасности индустриальных объектов.Модуль 8 – Операционная кибербезопасность.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Threat Intelligence.
Анализ уязвимостей.
Reverse Engineering вредоносного п/о.
Проведение Pentest’а.
Цифровая криминалистика.Модуль 9 – Проектирование и управление кибербезопасностью.
Принципы управления кибербезопасностью.
Построение процессов управления кибербезопасностью.
Политики кибербезопасности.
Оценка и метрики работы процессов кибербезопасности.
Построение корпоративного SoC’а. - ANT-S101 — Кибербезопасность для специалистов по продажам: от технологий к бизнес-ценности
- Длительность: 3 дня (24 часа)
- Код курса: ANT-S101
- Стоимость
- Очный формат: 313 500 ₸
- Онлайн формат: 289 500 ₸
Описание курса
Описание курса:
Данный курс разработан для специалистов по продажам и менеджеров по работе с клиентами, работающих в сфере информационной безопасности (ИБ). В условиях растущих киберугроз способность говорить с клиентом на одном языке, понимать его бизнес-задачи и pain points, а также грамотно доносить ценность решений становится ключевым конкурентным преимуществом.
Данный курс предоставляет всеобъемлющее, нейтральное к вендорам понимание фундаментальных принципов кибербезопасности. Слушатели научатся анализировать потребности различных стейкхолдеров в организации заказчика (от CEO до технических специалистов), понимать архитектуру современных систем защиты и формулировать выгоды предлагаемых решений в контексте бизнес-целей и управления рисками. Программа сочетает теоретические основы с практическими кейсами, что позволяет немедленно применять полученные знания в работе с клиентами. Для максимального усвоения материала в курсе используется комбинация эффективных методик:
Интерактивные лекции с опорой на реальные примеры из индустрии.
Групповые дискуссии и анализ бизнес-кейсов.Аудитория курса:
Специалисты по продажам решений и услуг в области ИБ.
Менеджеры по работе с клиентами из ИТ- и ИБ-компаний.
Бизнес-разработчики (Business Development Managers).
Пре-сейлз-инженеры, желающие углубить понимание бизнес-аспектов ИБ.Содержание курса:
День 1: Ландшафт киберугроз. Говорим на языке бизнеса.
Модуль 1: Введение в кибербезопасность: почему это стратегическая бизнес-функция, а не просто ИТ-задача.
Модуль 2: Бизнес-контекст ИБ: риски, соответствие (GDPR, 152-ФЗ, PCI DSS) и стоимость инцидентов.
Модуль 3: Понимание аудитории: роли и интересы основных стейкхолдеров (CEO, CFO, CTO, CISO).
Модуль 4: Современный ландшафт киберугроз: атаки на людей (фишинг, социальная инженерия), атаки на приложения и данные.День 2: Архитектура защиты. От концепций к средствам защиты.
Модуль 5: Принципы построения безопасной архитектуры: «Оборонительная глубина» (Defense-in-Depth) и «Нулевое доверие» (Zero Trust).
Модуль 6: Защита периметра и сети: Фаерволы нового поколения (NGFW), IPS/IDS, VPN.
Модуль 7: Защита конечных точек и данных: EDR/XDR, антивирусные решения, шифрование и DLP-системы.
Модуль 8: Идентификация и доступ: IAM, MFA, принцип наименьших привилегий.День 3: Операции и стратегия. Продажа ценности и комплексных решений.
Модуль 9: Центры управления безопасностью (SOC): процессы мониторинга, обнаружения и реагирования на инциденты (SIEM, SOAR).
Модуль 10: Управление уязвимостями и политиками безопасности.
Модуль 11: Стратегический подход: Обсуждение ИБ-стратегии с CISO и руководством. Жизненный цикл продажи комплексного решения.
Модуль 12: Практикум: Разбор кейса. От идентификации потребностей клиента до презентации ценностного предложения, ЖЦ ИБ решения. - ANT0001 — Практическая криптография
- Длительность: 10 дней (80 часов)
- Код курса: ANT0001
- Стоимость
- Очный формат: 1 444 000 ₸
- Онлайн формат: 1 383 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить теорию и практику использования криптографии в современных реалиях кибербезопасности.
Аудитория курса:
Люди, начинающие знакомиться с кибербезопасностью и криптографией, а также люди, желающие систематизировать свои знания в этой области.
Предварительные требования к аудитории:
Необходимо обладать знаниями общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Дополнительные критерии защищенности информации.
Контроль доступа и его типы.
Механизмы контроля доступа.
Архитектура корпоративной кибербезопасности.Модуль 2 – Моделирование угроз и оценка рисков кибербезопасности.
Методики моделирования угроз.
Методики оценки и управления рисками.
Построение процессов и архитектуры кибербезопасности на основе модели угроз.Модуль 3 – Основы криптографии.
Криптографические преобразования.
Принципы Кирхгофа при построении криптосистем.
Симметричная криптография.
Режимы работы симметричных шифров.
Асимметричная криптография.
Теоретическая и практическая криптография.
Криптографические примитивы.Модуль 4 – Хэш-функции.
Принципы работы и свойства хэш-функций.
Алгоритмы и стандарты хэш-функций.
Использование хэш-функций.Модуль 5 – Контроль целостности данных.
Использование хэш-функций для контроля целостности данных.
Коды проверки аутентичности/целостности сообщений (MAC).
Использование механизма MAC.
Алгоритмы шифрования со встроенной проверкой целостности.Модуль 6 – Обмен криптографическими ключами.
Принципы обмена и согласования ключей.
Алгоритмы Diffie-Hellman, Elliptic Curve Diffie-Hellman.
Алгоритм Ephemeral Diffie-Hellman.
Протоколы обмена ключами на основе алгоритмов DH, ECDH, DHE.
Серверы управления ключами (KMS).Модуль 7 – Асимметричная криптография.
Принципы работы ассиметричной криптографии.
Работа с ключами шифрования ассиметричной криптографии.
Инфраструктура PKI и стандарты PKCS.
Гибридные криптосистемы.Модуль 8 – Цифровые подписи и алгоритмы Zero-Knowledge Proofs.
Принципы и алгоритмы создания цифровой подписи.
Применение цифровых подписей.
Алгоритмы Zero-Knowledge Proofs и их практическое использование.Модуль 9 – Генераторы случайных чисел.
Случайные числа в криптографии.
Генераторы псевдослучайных чисел.
Генерация ключей шифрования и материала для их создания.Модуль 10 – Шифрование при передаче данных.
Передача данных и VPN.
Протоколы TLS.
Стек протоколов IPsec.
Протокол шифрования MACsec.
Шифрование данных в сетях Wi-Fi.
Шифрование данных IP-телефонии.
Алгоритмы Identity-Based Encryption.
Шифрование электронной почты. GPG, PGP и S/MIME.
Шифрование мгновенных сообщений.
Протокол Noise.Модуль 11 – Шифрование при хранении данных.
Жесткие диски со встроенной функцией шифрования.
Шифрование данных в ОС.
Шифрование данных средствами платформ виртуализации.Модуль 12 – Криптография в алгоритмах аутентификации.
Хранение паролей и параметров учетных записей.
Принципы делегирования и распределенная аутентификация.
Цифровые токены и защищенные смарт-карты.
Использование ZKP для аутентификации.
Криптографические примитивы систем SSO.Модуль 13 – Аппаратные криптографические модули.
Криптографические примитивы CPU.
Криптографические токены.
Проблемы доверия в информационных системах.
Hardware Security Modules.
Trusted Platform Modules.Модуль 14 – Современные направления развития криптографии.
Концепция Next-Generation Cryptography.
Light-Weight Cryptography.
Гомоморфное шифрование.
Криптографические примитивы Zero-Knowledge Proofs.
Асимметричная криптография без цифровых сертификатов.
Blockchain и смарт-контракты.
Квантовая криптография.Модуль 15– Методы криптоанализа и взлома шифров.
Дифференциальный криптоанализ.
Модель оракула и атаки на протоколы защиты данных.
Атаки по сторонним каналам. - ANT0002 — Основы небезопасности
- Длительность: 3 дня (24 часа)
- Код курса: ANT0002
- Стоимость
- Очный формат: 476 000 ₸
- Онлайн формат: 453 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям увидеть на примерах, что такое кибератаки и как они «работают» без погружения в тонкие технические нюансы поиска уязвимостей и написания эксплойтов. Эти знания помогут понять как лучше защищаться от угроз в киберпространстве.
Аудитория курса:
Люди, начинающие знакомиться с кибербезопасностью, а также инженеры, желающие систематизировать свои знания в этой области.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 – Как «работает» кибератака.
Пример атаки через web-приложение.
Пример атаки через сетевое оборудование.
Пример атаки на Wi-Fi.
Пример атаки через промышленный контроллер.
Пример компрометации учетной записи.
Пример заражения вредоносным п/о мобильного телефонаМодуль 2 – Уязвимости и угрозы.
Что такое уязвимость?
Классификация уязвимостей.
Когда уязвимость становится угрозой?
Что такое attack surface?
Модель угроз.Модуль 3 – Insider Threat.
Человеческий фактор в ходе проведения атаки.
Пример организации утечки данных.
Пример компрометации учетной записи администратора.
Злоумышленник внутри компании. - ANT-N101 — Сети TCP/IP
- Длительность: 5 дней (40 часов)
- Код курса: ANT-N101
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу современных сетей передачи данных, работающих на основе стека протоколов TCP/IP.
Аудитория курса:
Люди, начинающие знакомиться с технологиями передачи данных в современных реалиях.
Предварительные требования к аудитории:
Желательно иметь общее представление о т.н. электрической связи.
Содержание курса:
Модуль 1 – Построение локальной сети (LAN).
Архитектура локальной сети.
Стандарты Ethernet.
Коммутация.
CAM-таблицы и MAC-адреса.
Физическая избыточность в локальных сетях.
Протоколы STP, RSTP, MSTP.
Агрегирование интерфейсов. EtherChannel.
Виртуальные локальные сети (VLAN’ы).
Функции PoE на коммутаторах.Модуль 2 – Объединение локальных сетей. Маршрутизация.
Принципы маршрутизации.
Балансировка нагрузки ECMP.
Статическая и динамическая маршрутизация.
Протоколы OSPF и BGP.
Перераспределение и фильтрация маршрутной информации.
Интегрированные коммутация и маршрутизация.Модуль 3 – Передача данных приложений через сеть.
Функции мультиплексирования приложений.
Требования приложений к сети.
Механизмы QoS.
Стек протоколов TCP/IP.Модуль 4 – Подключение локальной сети к сервис-провайдеру.
Ограничения пространства IPv4 адресов.
Трансляция сетевых адресов (NAT).
Функции NAT helper и Application Layer Gateway.
FireWall’ы и Proxy-сервисы.
IPv6 адреса.
Концепция и технологии SD-WAN.Модуль 5 – Виртуальные частные сети.
Принципы работы VPN.
Классификация и архитектуры VPN.
Туннелирование GRE и IP-in-IP.
Стек протоколов IPsec.Модуль 6 – Программно-определяемые сети.
Классическая архитектура ЦоД’ов.
Виртуализация и развитие архитектуры ЦоД’ов.
Архитектура Spine-Leaf. VXLAN.Модуль 7 – Аппаратные компоненты сетевого оборудования.
Архитектура коммутаторов и маршрутизаторов.
Классификация алгоритмов и механизмов пересылки (forwarding’а) трафика.
Реализация системы очередей на сетевом оборудовании.Модуль 8 – Работа сетевого стека на конечных устройствах.
Стек протоколов TCP/IP на конечных устройствах.
Strong/Weak Host модели работы конечных устройств.
Методы оптимизации работы стека TCP/IP.
Виртуальные интерфейсы и коммутаторы на конечных устройствах - ANT-N103 — Углубленное изучение коммутации и маршрутизации
Описание курса
- ANT0011 — Фильтрация трафика
- Длительность: 5 дней (40 часов)
- Код курса: ANT0011
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии, конкретные механизмы и методы их применения для предотвращения, обнаружения и реагирования на угрозы кибербезопасности путем фильтрации сетевого трафика.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, инфраструктуры корпоративных приложений, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Задачи фильтрации трафика.
Сегментация сети.
Модель угроз для корпоративной инфраструктуры.
Классификация механизмов фильтрации трафика.
Концепция Unified Threat Management (UTM).Модуль 2 – Репутационная фильтрация.
Threat Intelligence.
Репутационная фильтрация IP-адресов.
Репутационная фильтрация DNS-запросов.
Репутационная фильтрация URL-путей.Модуль 3 – Firewall. Предотвращение атак.
Технологические подходы к реализации механизма Firewall.
Концепция Next-Generation Firewall (NGFW).
Фильтрация трафика Firewall’ом на основании информации о пользователях (Identity-based Firewall) и приложениях (Application-aware Firewall).Модуль 4 – IPS. Обнаружение и реагирование на атаки.
Реализация механизмов IPS.
Создание и обновление правил фильтрации IPS.
Концепция Next-Generation IPS (NGIPS).Модуль 5 – Anti-Virus. Обнаружение вредоносного п/о.
Применение сетевого Anti-Virus’а для фильтрации трафика.
Углубленная Anti-Virus’ная фильтрация. Sandbox.Модуль 6 – Обработка инцидентов кибербезопасности при фильтрации трафика.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование и управление фильтрацией трафика.
Проектирование механизмов фильтрации трафика в рамках
- ANT0012 — Безопасность сетевой инфраструктуры
- Длительность: 5 дней (40 часов)
- Код курса: ANT0012
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии, конкретные механизмы и методы их применения для обеспечения кибербезопасности сетевой инфраструктуры с точки зрения концепции Zero-Trust, используемого при построении архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура Zero-Trust.
Модель угроз для сетевой инфраструктуры.
Принцип Zero-Trust в архитектуре кибербезопасности.
Компоненты архитектуры Zero-Trust.
Развертывание архитектуры Zero-Trust.Модуль 2 – Сегментация сети.
Принципы сегментации сети.
Безопасность управления компонентами сетевой инфраструктуры.
Сервисы с публичным доступом в сетевой инфраструктуре.
Компоненты платёжной инфраструктуры.
Компоненты индустриальной инфраструктуры.
Периметр сетевой инфраструктуры.Модуль 3 – Контроль доступа к сети.
Контроль конечного оборудования и его состояния.
Контроль пользователей.
Гостевой доступ.
Сервисы BYOD.
Управление доступом мобильных устройств. MDMМодуль 4 – Контроль трафика в сетевой инфраструктуре.
Контроль обмена маршрутной и сервисной информацией.
Механизмы Anti-Spoofing.
Фильтрация трафика на сетевом оборудовании.
Отслеживание статистики сетевого трафика. Анализ данных Netflow.Модуль 5 – Распределенная сетевая инфраструктура.
Безопасное объединение удаленных площадок корпоративной инфраструктуры.
Безопасная интеграция локальной корпоративной инфраструктуры с облачными сервисами.Модуль 6 – Обработка инцидентов кибербезопасности в сетевой инфраструктуре.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование и управление механизмами безопасности сетевой инфраструктуры.
Проектирование механизмов безопасности сетевой инфраструктуры в рамках архитектуры корпоративной кибербезопасности.
Развертывание механизмов безопасности сетевой инфраструктуры. - ANT0013 — Защита от DoS и DDoS атак
- Длительность: 3 дня (24 часа)
- Код курса: ANT0013
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии, конкретные механизмы и методы их применения для защиты корпоративной инфраструктуры от DoS и DDoS атак.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, инфраструктуры корпоративных приложений, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – DoS и DDoS атаки.
DoS и DDoS атаки в модели угроз.
Классификация DoS атак.
Классификация DDoS атак.
Моделирование DoS и DDoS атак.Модуль 2 – Борьба с DoS и DDoS атаками.
Предотвращение DoS и DDoS атак.
Обнаружение DoS и DDoS атак.
Реакция на DoS и DDoS атаки.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 3 – BotNet’ы.
Принципы работы BotNet’ов.
Предотвращение заражения BotNet’ами.
Обнаружение активности BotNet’а.
Реакция на атаки BotNet’а.Модуль 4 – Специализированные решения Anti-DDoS.
Anti-DDoS решения от Fortinet®.
Anti-DDoS решения от Radware®.
Облачные Anti-DDoS решения.Модуль 5 – Проектирование и управление фильтрацией трафика.
Проектирование механизмов защиты от DoS и DDoS атак в рамках архитектуры корпоративной кибербезопасности.
Развертывание механизмов защиты от DoS и DDoS атак. - ANT0101 — VPN
- Длительность: 5 дней (40 часов)
- Код курса: ANT0101
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу различных технологий, механизмов и методов построения Виртуальных Частных Сетей (VPN), а также научиться встраивать сети VPN в архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Принципы работы и классификация VPN.
Принципы работы VPN.
Архитектуры VPN.
Технологические подходы к построению VPN.
Функциональная классификация VPN.Модуль 2 – Технологии VPN. PPTP и L2TPv2.
Принципы работы технологий группы VPDN.
PPTP
L2TPv2
Особенности применения технологий VPDN.Модуль 3 – Технологии Pseudowires. L2TPv3.
Принципы работы технологий группы Pseudowires.
L2TPv3.
Особенности применения технологий Pseudowires.Модуль 4 – Туннели GRE и IP-in-IP.
Принципы работы IP-туннелей.
GRE.
IP-in-IP.
Особенности применения технологий GRE / IP-in-IP.Модуль 5 – IPsec VPN.
Принципы организации защищенного канала связи.
Стек протоколов IPsec.
Управление ключами шифрования и проверки целостности. ISAKMP.
Протоколы IKEv1 и IKEv2.
Методы аутентификации участников IPsec VPN соединения.
Протоколы шифрования данных. ESP и AH.
Программные и аппаратные компоненты для создания IPsec VPN соединений.
Особенности организации IPsec VPN соединений.Модуль 6 – SSL/TLS VPN.
Принципы работы пользовательских SSL/TLS VPN туннелей.
Работа с SSL/TLS туннелями на конечном оборудовании пользователей.
Работа с SSL/TLS туннелями на сетевом оборудовании.
Протоколы управления ключами шифрования и проверки целостности.
Интеграция с инфраструктурой PKI.
Особенности организации инфраструктуры SSL/TLS VPN.Модуль 7 – MPLS VPN.
Принципы работы технологии MPLS.
Принципы организации MPLS VPN.
MPLS L2 VPN.
MPLS L3 VPN.
Обеспечения безопасности в сетях MPLS VPN.
Особенности организации инфраструктуры MPLS VPN.Модуль 8 – Специализированные решения VPN.
Организация сетей VPN с помощью решений Cisco Systems®.
Организация сетей VPN с помощью решений Juniper Networks®.
Организация сетей VPN с помощью решений FortiNet®.
Организация сетей VPN с помощью решений Palo-Alto Networks®.
Организация сетей VPN с помощью решений Checkpoint®.
Организация сетей VPN с помощью решений VMware NSX-T®.Модуль 9 – Построение сети VPN для трафика Multicast.
Проблемы шифрования трафика Multicast.
Принципы организации VPN для передачи трафика Multicast.
IPsec GDOI-группы.
Протокол gIKEv2.
Специализированные решения для организации Multicast VPN. - ANT0102 — Безопасность сетей Wi-Fi
- Длительность: 3 дня (24 часа)
- Код курса: ANT0102
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу различных технологий, механизмов и методов построения защищенных сетей Wi-Fi.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101 , а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Принципы обеспечения безопасности сетей Wi-Fi.
Модель угроз для сети Wi-Fi.
Классификация механизмов cетей Wi-Fi.
Стандарты безопасности сетей Wi-Fi 802.11i.Модуль 2 – Аутентификация и управление ключами в сетях Wi-Fi.
Контроль доступа в беспроводной среде передачи. Функции AKM.
Применение стандарта 802.1x. Персональная и корпоративная аутентификация.
RSN и создание ключей шифрование для беспроводного канала связи.
Особенности реализации аутентификации в WPA/WPA2/WPA3.Модуль 3 – Шифрование беспроводного канала связи сети Wi-Fi.
Алгоритмы и протоколы шифрования в сетях Wi-Fi.
Особенности реализации шифрования в WPA/WPA2/WPA3.Модуль 4 – Безопасный роуминг.
Принципы безопасного роуминга.
Opportunistic Key Caching (OKC).
Fast Transition (FT) – 802.11r.
802.11k.
Особенности применения механизмов безопасного роуминга.Модуль 5 – Обеспечение безопасности инфраструктуры сети Wi-Fi.
Безопасность сети Wi-Fi на физическом уровне.
Механизмы Anti-Spoofing.
Фильтрация трафика в сети Wi-Fi.
Функции Wireless IPS (wIPS).Модуль 6 – Обработка инцидентов кибербезопасности в сети Wi-Fi.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование и управление механизмами безопасности сети Wi-Fi.
Проектирование механизмов безопасности сети Wi-Fi в рамках архитектуры корпоративной кибербезопасности.
Развертывание механизмов безопасности сети Wi-Fi. - ANT0103 — Контроль доступа 802.1x
- Длительность: 3 дня (24 часа)
- Код курса: ANT0103
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу механизмов контроля доступа, соответствующих стандарту IEEE 802.1x, а также научиться проектировать и разворачивать соответствующую инфраструктуру для внедрение данных механизмов контроля доступа.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура 802.1x.
Модель угроз для сетевой инфраструктуры.
Принцип Zero-Trust в архитектуре кибербезопасности.
Компоненты архитектуры Zero-Trust.
Стандарт 802.1x для контроля доступа к сети.
Компоненты 802.1x.Модуль 2 – Аутентификация и авторизация 802.1x.
Протокол и методы аутентификации Extensible Authentication Protocol (EAP).
Протокол и сервер RADIUS.
Расширения VSA для протокола RADIUS.
Расширение CoA для протокола RADIUS.
Аутентификация конечного оборудования и пользователей.Модуль 3 – Организация контроля доступа к сети.
Контроль конечного оборудования и его состояния.
Сервисы Posturing и Compliance.
Контроль пользователей.
Гостевой доступ.
Сервисы BYOD.Модуль 4 – Служебные аккаунты.
Контроль за действиями служебных аккаунтов.
Протокол и сервер TACACS+.Модуль 5 – Обработка инцидентов кибербезопасности в сетевой инфраструктуре с контролем доступа 802.1x.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Проектирование и управление механизмами безопасности сетевой инфраструктуры с контролем доступа 802.1x.
Проектирование инфраструктуры 802.1x в рамках архитектуры корпоративной кибербезопасности.
Развертывание инфраструктуры 802.1x. - ANT0104 — Защита сетей IPv6
- Длительность: 5 дней (40 часов)
- Код курса: ANT0104
- Стоимость
- Очный формат: 687 000 ₸
- Онлайн формат: 668 500 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить проблемы обеспечения безопасности сетей TCP/IP, построенных и использующих IPv6. На курсе разбираются не только проблемы, но и методы обеспечения безопасности таких сетей, как архитектурные, так и на уровне конкретных механизмов и устройств.
Аудитория курса
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Как устроено обучение
Онлайн-курс
Онлайн-курс предполагает групповые занятия с инструктором через систему видеоконференцсвязи, кроме того, домашние задания и экзамен. Слушателям предоставляются учебные пособия и дополнительные материалы
Для корпоративных клиентов
Обучение для корпоративных клиентов включает в себя онлайн-курсы и курсы самообучения, а также дополнительные сервисы, необходимые корпоративным клиентам: организация планов обучения для подразделений клиента, проведение оценки эффективности обучения и т.д.
Программа курса
Модуль 1. Аттаск surface сетей IPv6.
Основы IPv6. Архитектура и адресация.
Уязвимости протокола IPv6: заголовки-расширения.
Уязвимости вспомогательных протоколов IPv6: ICMPv6 и NDP.
Уязвимости DHCPv6 и Router-Advertisement.
Уязвимости архитектуры Dual-Stack.
Проблемы приватности параметров IPv6.
Атаки на IPv6 в локальной сети.
Атаки типа сканирования на IPv6.
Атаки на протоколы маршрутизации IPv6 трафика.
DoS и DDoS атаки на сети IPv6.
Построение модели угроз для сети IPv6.Модуль 2. Безопасность IPv6 в локальных сетях.
Безопасность механизмов Neighbor Discovery. CGA и SeND.
Средства обнаружения и предотвращения атак на ICMPv6.
RFC 7113. RA-guard.
Защита от DoS атак на DHCPv6.
DHCPv6 snooping и ND inspection.
Микросегментация для сетей, использующих IPv6.
Защита от атак типа spoofing. IPv6 SAVI.
Расширения для обеспечения приватности параметров IPv6.
Фильтрация трафика IPv6 между сегментами. ACL и uRPF.
Фильтрация трафика IPv6 на периметре сети. Firewall и IPS.Модуль 3. Безопасность протоколов маршрутизации IPv6.
Механизмы обеспечения безопасности FHRP IPv6.
Атаки на протокол BGP.
Механизмы обеспечения безопасности MP-BGP сессий.
Контроль за передачей маршрутной информации.
Использование механизмов RPKI.
Атаки на протокол OSPFv3.
Механизмы обеспечения безопасности OSPFv3.Модуль 4. Безопасность устройств, работающих с IPv6.
Организация сетевого стека с IPv6 на конечных устройствах.
Обработка ICMPv6 на конечных устройствах.
Neighbor cache на конечных устройствах.
Работа Dual-Stack на конечных устройствах.
Маршрутизация IPv6 на конечных устройствах.
Особенности работы конечных устройств с несколькими адресами IPv6.
Логика hardening’а стека TCP/IP с IPv6 на конечных устройствах.
Специальные сервисы IPv6 на конечных устройствах.
Логика hardening’а сетевых устройств, работающих с IPv6.Модуль 5. Проблемы безопасности архитектуры сетей IPv6.
Атаки, эксплуатирующие особенноcти архитектуры Dual-Stack.
Уязвимости использования NAT46 и NAT64.
Уязвимости использования туннелей для миграции на IPv6.
Механизмы и подходы защиты архитектуры Dual-Stack.
Механизмы и подходы защиты устройств Dual-Stack.Модуль 6. IPv6 в архитектуре безопасности компании.
Мониторинг состояния сети IPv6.
Особенности криминалистики сетей TCP/IP с IPv6.
Анализ трафика IPv6 с помощью IPS.
Обнаружение аномалий в трафике IPv6 с помощью Netflow.
Паттерны безопасности IPv6.
IPv6 в облачных и контейнерных средах.
IPv6 в сетях операторов связи.
IPv6 для IoT платформ. - ANT1001 — Sandbox&Honeypot
- Длительность: 3 дня (24 часа)
- Код курса: ANT1001
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии и механизмы работы Sandbox’ов и Honeypot’ов. Материал курса охватывает не только технические, но и методологические вопросы использования Sandbox’ов и Honeypot’ов: их встраивание в общую архитектуру и процессы корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной инфраструктуры, инженеры, проектирующие архитектуру кибербезопасности, инженеры, занимающиеся обработкой инцидентов кибербезопасности, а также аналитики, работающие с данными Threat Intelligence.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания в области фильтрации трафика и обеспечения безопасности сетевой инфраструктуры на уровне курсов ANT0011 и ANT0012, а также знания в области обработки инцидентов кибербезопасности на уровне курса ANT0401.
Содержание курса:
Модуль 1 – Архитектура корпоративной кибербезопасности.
Модель угроз корпоративной кибербезопасности.
Проектирование механизмов кибербезопасности в рамках общей архитектуры корпоративной кибербезопасности.
Атаки типа 0-day и направленные атаки (ATP).
Мониторинг и реагирования на события и инциденты кибербезопасности.Модуль 2 – Sandbox.
Автоматизированный анализ вредоносного п/о.
Принципы работы и классификация Sandbox’ов.
Проектирование Sandbox’а в рамках архитектуры корпоративной безопасности.
Развертывание Sandbox’а в рамках архитектуры корпоративной кибербезопасности.
Анализ и использование информации, полученной Sandbox’ом.
Операционные параметры, метрики и поддержание работы Sandbox’ов.Модуль 3 – Honeypot.
Назначение Honeypot’ов.
Принципы работы и классификация Honeypot’ов.
Проектирование Honeypot’а в рамках архитектуры корпоративной безопасности.
Развертывание Honeypot’а в рамках архитектуры корпоративной кибербезопасности.
Анализ и использование информации, полученной Honeypot’ом.
Операционные параметры, метрики и поддержание работы Honeypot’ов.Модуль 4 – Интеграция Sandbox’а и Honeypot’а в процессы корпоративной кибербезопасности.
Реагирование на инциденты кибербезопасности с учетом данных Sandbox’а и Honeypot’а.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.
Модель Diamond и информация TTP[Tactics, Technics, Procedures].
Формирование и обмен данными Threat Intelligence. - ANT1002 — Технологии и механизмы работы инфраструктуры открытых ключей (PКI)
- Длительность: 5 дней (40 часов)
- Код курса: ANT1002
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить технологии и механизмы работы Инфраструктуры Открытых Ключей – Public Key Infrastructure. Материал курс освещает не только теоретические, но и практические вопросы развертывания PKI: проектирования в рамках архитектуры корпоративной безопасности, управления криптографическими ключами и
цифровыми сертификатами, мониторинга и обеспечения безопасности самой инфраструктуры PKI.Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной инфраструктуры, инженеры, проектирующие архитектуру корпоративной кибербезопасности, инженеры, занимающиеся криптографическими средствами защиты информации.
Предварительные требования к аудитории:
Необходимы знания криптографии на уровне курса ANT0001, а также знания в области общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – PKI в корпоративной инфраструктуре.
Проблемы аутентификации и защита идентификационной информации.
Модель угроз корпоративной инфраструктуры.
Приложения и протоколы, использующие PKI.
Криптографические компоненты PKI.
Chain of trust.
Проектирование PKI в рамках архитектуры корпоративной кибербезопасности.Модуль 2 – Архитектура и стандарты PKI.
PKCS#.
Центры сертификации (CA) и их иерархия.
Центр регистрации (RA).
Вспомогательные архитектурные компоненты PKI.
Аппаратные компоненты PKI.
Клиентская часть PKI.Модуль 3 – Цифровые сертификаты и протоколы PKI.
Форматы цифровых сертификатов.
Цикл жизни цифрового сертификата.
Проверка цифрового сертификата.
CRL и OCSP.
Специальные цифровые сертификаты. Уровни доверия.
Управление ключами PKI.Модуль 4 – Microsoft PKI.
Особенности построения Microsoft PKI.
Криптопровайдеры.
Хранилища цифровых сертификатов Microsoft.
Шаблоны цифровых сертификатов.
Сервис Auto-Enrollment.
Сервисы CES/CEP.
Развертывание Microsoft PKI.Модуль 5 – Обеспечение безопасности PKI.
Модель угроз PKI.
Мониторинг событий и инцидентов кибербезопасности PKI.
Реагирование на события и инциденты кибербезопасности PKI.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах. - ANT-OW101 — Архитектура и работа ОС Windows
- Длительность: 5 дней (40 часов)
- Код курса: ANT-OW101
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, механизмы и алгоритмы работы
ОС Windows. Также материал курса раскрывает нюансы работы сервисов и приложений на ОС
Windows.Аудитория курса:
Люди, желающие познакомиться с механизмами работы ОС Windows.
Предварительные требования к аудитории:
Необходимы общие знания о работе компьютера.Содержание курса:
Модуль 1 – Низкоуровневые детали работы компьютера.
Архитектуры процессоров x86.
Выполнение процессорных инструкций.
Компиляторы.
Ассемблер в ОС Windows.Модуль 2 – Ядро ОС. Kernel.
Компоненты и архитектура ядра.
Переключение между процессами.
Механизмы работы планировщика процессов.
Структура процессов.Модуль 3 – Пользовательское окружение.
Разделения доступа к аппаратным компонентам.
Взаимодействие пользовательской подсистемы с ядром.
API.Модуль 4 – Работа с данными.
Файловая система.
Межпроцессное взаимодействие.
Стек TCP/IP.Модуль 5 – Работа с процессами.
Процесс загрузки ОС.
Управление процессами.
Работа с программными пакетами. - ANT-OL101 — Архитектура и работа ОС Linux
- Длительность: 5 дней (40 часов)
- Код курса: ANT-OL101
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, механизмы и алгоритмы работы
ОС Linux. Также материал курса раскрывает нюансы работы сервисов и приложений на ОС Linux.Аудитория курса:
Люди, желающие познакомиться с механизмами работы ОС Linux.
Предварительные требования к аудитории:
Необходимы общие знания о работе компьютера.Содержание курса:
Модуль 1 – Низкоуровневые детали работы компьютера.
Архитектуры процессоров x86.
Выполнение процессорных инструкций.
Компиляторы.
Ассемблер в ОС Linux.Модуль 2 – Ядро ОС. Kernel.
Компоненты и архитектура ядра.
Переключение между процессами.
Механизмы работы планировщика процессов.
Структура процессов.Модуль 3 – Пользовательское окружение.
Разделения доступа к аппаратным компонентам.
Взаимодействие пользовательской подсистемы с ядром.
API.Модуль 4 – Работа с данными.
Файловая система.
Межпроцессное взаимодействие.
Стек TCP/IP.Модуль 5 – Работа с процессами.
Процесс загрузки ОС.
Управление процессами через systemctl.
Работа с программными пакетами. - ANT-OA101 — Архитектура и работа ОС Android
Описание курса
- ANT-Oi101 — Архитектура и работа iOS
Описание курса
- ANT0021 — Безопасность ОС Windows
- Длительность: 5 дней (40 часов)
- Код курса: ANT0021
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и алгоритмы обеспечения безопасности данных, сервисов и приложений на ОС Windows. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности сервисов и приложений на ОС Windows в рамках архитектуры корпоративной
кибербезопасностиАудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.
Модель угроз безопасности ОС.Модуль 2 – Контроль доступа в ОС Windows.
Облачные сервисы Microsoft 365.
Microsoft Entra.
Механизмы контроля доступа в ОС Windows.
Механизмы Claim-based Identity.
Механизмы U-prove.
Многофакторная аутентификация. FIDO2.
Использование Microsoft Defender для защиты Identity.
Механизмы и протоколы контроля доступа в доменной инфраструктуре.
Интеграция ОС Windows с внешними системами контроля доступа.Модуль 3 – Безопасность данных в ОС Windows
Контроль целостности данных. Механизм MIC.
Контроль потоков данных и обнаружение утечет данных.
Контроль внешних периферийных устройств с помощью Microsoft Defender.
Защита данных Office 365.
Шифрование данных.
Bitlocker.Модуль 4 – Безопасность сетевой подсистемы в ОС Windows.
Фильтрация трафика.
Сетевые ограничения для сервисов и приложений ОС.
Фильтрация трафика с помощью Host-based IPS.
Работа с подключениями VPN в ОС.Модуль 5 – Контроль сервисов и приложений в ОС Windows.
Ограничения процессов в ОС.
Использование Antivirus’ов.
Безопасная загрузка ОС.
Контроль мобильных устройств. Microsoft Intune.
Контроль облачных сервисов и приложений в Microsoft Azure.Модуль 6 – Обработка инцидентов кибербезопасности ОС Windows.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование сервисов и приложений на ОС Windows в рамках архитектуры корпоративной кибербезопасности.
Сервисы и приложения на ОС Windows в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности, связанные с ОС Windows.
Обеспечение отказоустойчивости и высокой доступности сервисов и приложений на ОС Windows. - ANT0022 — Безопасность ОС Linux
- Длительность: 5 дней (40 часов)
- Код курса: ANT0022
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и алгоритмы обеспечения безопасности данных, сервисов и приложений на ОС Linux. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности сервисов и приложений на ОС Linux в рамках архитектуры корпоративной
кибербезопасностиАудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.
Модель угроз безопасности ОС.Модуль 2 – Контроль доступа в ОС Linux.
Механизмы контроля доступа в ОС Linux.
Реализация контроля доступа типа DAC в ОС Linux.
Реализация контроля доступа типа MAC в ОС Linux.
SELinux.
AppArmor.
Seccomp.
Работа с модулями PAM.
Интеграция ОС Linux с внешними системами контроля доступа.Модуль 3 – Безопасность данных в ОС Linux
Контроль целостности данных.
AIDE.
Контроль поток данных и обнаружение утечет данных.
Контроль внешних периферийных устройств.
USBguard.
Шифрование данных.
LUKS.Модуль 4 – Безопасность сетевой подсистемы в ОС Linux.
Фильтрация трафика.
Iptables и Firewalld.
Nftables.
TCPwrappers.
Сетевые ограничения для сервисов и приложений ОС.
Фильтрация трафика с помощью Host-based IPS.
Snort и Suricata.
Работа с подключениями VPN в ОС.Модуль 5 – Контроль сервисов и приложений в ОС Linux.
Ограничения процессов в ОС.
Использование контейнеров для работы с процессами и приложениями.
Использование Antivirus’ов.
Безопасная загрузка ОС.Модуль 6 – Обработка инцидентов кибербезопасности ОС Linux.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование сервисов и приложений на ОС Linux в рамках архитектуры корпоративной кибербезопасности.
Сервисы и приложения на ОС Linux в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности, связанные с ОС Linux.
Обеспечение отказоустойчивости и высокой доступности сервисов и приложений на ОС Linux. - ANT0023 — Безопасность платформ виртуализации
- Длительность: 5 дней (40 часов)
- Код курса: ANT0023
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и алгоритмы обеспечения безопасности платформ виртуализации и контейнеризации. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности платформ виртуализации в рамках архитектуры корпоративной
кибербезопасностиАудитория курса:
Инженеры, обеспечивающие кибербезопасность платформ виртуализации, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура и компоненты виртуализации.
Принципы виртуализации.
Гипервизоры.
Виртуальные машины.
Компоненты управления платформами виртуализации.
Хранение данных виртуализации.
Виртуальные сети.
Сервисы виртуализации.
Контейнеры.Модуль 2 – Безопасность ОС гипервизоров.
Фильтрация трафика гипервизоров.
Безопасность сервисов гипервизоров.
Контроль доступа ОС гипервизоров.
Безопасность данных в гипервизорах.
Обеспечение безопасности управляющих компонентов платформ виртуализации.Модуль 3 – Безопасность инфраструктуры хранения данных.
Контроль доступа к данным на СХД.
Контроль доступа к данным средствами SAN-сети.
Управление протоколами доступа к данным на гипервизорах.Модуль 4 – Безопасность сетевой инфраструктуры виртуализации.
Сегментация сетевого трафика платформ виртуализации.
Сегментация трафика виртуальных машин и контейнеров.
Микросегментация трафика виртуальных машин.
Фильтрация трафика платформ виртуализации и виртуальных машин.Модуль 5 – Безопасность контейнеризации.
Контроль доступа в контейнерах.
Изоляция контейнеров.
Контроль приложений и данных внутри контейнеров.
Подготовка образа контейнера с учетом политик безопасности.
Безопасность сетевой подсистемы контейнеров.Модуль 6 – Обработка инцидентов кибербезопасности, связанных с платформами виртуализации.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование платформ виртуализации в рамках архитектуры корпоративной кибербезопасности.
Платформы виртуализации в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности платформ виртуализации.
Обеспечение отказоустойчивости и высокой доступности платформ виртуализации. - ANT0201 — Контроль доступа ОС в коммерческих организациях
- Длительность: 5 дней(40 часов)
- Код курса: ANT0201
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, модели и механизмы контроля доступа в операционных системах, используемых в коммерческих организациях, для построения архитектуры корпоративной кибербезопасности с учётом специфики работы подобных организаций.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, также знания механизмов безопасности ОС на уровне курсов ANT0021 и ANT0022.
Содержание курса:Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.
Специфика процессов работы с данными в коммерческих организациях.Модуль 2 – AppArmor.
Принципы работы и основные компоненты.
Установка и настройка.
Создание и использование профилей и правил контроля доступа.Модуль 3 – Мониторинг работы AppArmor.
Генерация log’ов и информации аудита.
Инструменты поиска и устранения неисправностей.
Анализ результатов работы политик AppArmor.Модуль 4 – Практическое использование AppArmor.
Контроль аутентификации и авторизации пользователей.
Контроль доступа к данным и работы с процессами.
Контроль работы с сетевой подсистемой.
Интеграция AppArmor со сторонними сервисами и приложениями.
Интеграция AppArmor с базами данных.
Интеграция AppArmor с платформами виртуализации.Модуль 5 – SELinux
Принципы работы и основные компоненты.
Установка и настройка.
Присвоение меток файлам и процессам ОС.
Создание и использование политик.
Построение многоуровневой системы контроля доступа.Модуль 6 – Мониторинг работы SELinux.
Генерация log’ов и информации аудита.
Инструменты поиска и устранения неисправностей
Анализ результатов работы политик SELinux.Модуль 7 – Практическое использование SELinux.
Контроль аутентификации и авторизации пользователей.
Контроль доступа к данным и работы с процессами.
Контроль работы с сетевой подсистемой.
Интеграция SELinux со сторонними сервисами и приложениями.
Интеграция SELinux с базами данных.
Интеграция SELinux с платформами виртуализации.Модуль 8 – Дополнительные механизмы принудительного контроля доступа.
GrSecurity
Firejail
Microsoft WIM.
RSBAC.
Trusted Solaris MAC.
TrustedBSD.
Smack.Модуль 9 – Механизмы контроля доступа ОС в рамках архитектуры корпоративной кибербезопасности коммерческих организаций.
Классификация данных в коммерческой организации.
Учёт операционных систем, сервисов и приложений.
Модели угроз коммерческой организации.
Политики и метрики кибербезопасности. - ANT0202 — Управление учетными записями
- Длительность: 5 дней(40 часов)
- Код курса: ANT0202
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы управления учетными записями в архитектуре корпоративной кибербезопасности, а также конкретные методы и механизмы контроля доступа: аутентификации, авторизации и аккаунтинга учетных записей. В курсе специально рассматриваются распределенные системы контроля доступа, т.н. системы SSO: SAML, OAuth, OpenID Connect.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность операционных систем, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, также знания механизмов безопасности ОС на уровне курсов ANT0021 и ANT0022.
Содержание курса:
Модуль 1 – Модели безопасности ОС.
Архитектура ОС.
Контроль доступа MAC и DAC.
Модели безопасности, учитывающие конфиденциальность данных.
Модели безопасности, учитывающие целостность данных.
Интеграция контроля доступа с ОС.
Аппаратные компоненты в модели безопасности ОС.Модуль 2 – Учетные записи в ОС.
Сущность и атрибуты учетной записи.
Цикл жизни учетной записи.
Безопасное хранение учетных записей.
Аутентификация пользователя.
Авторизация пользователя и процессов.
Создание и контроль сессий.
Аккаунтинг. Мониторинг действий учетных записей.Модуль 3 – Распределенные системы аутентификации.
Принцип делегирования.
Аутентификация в сетях TCP/IP. 802.1x, RADIUS и TACACS+.
Аутентификация в мобильных сетях. Diameter.
Аутентификация в доменах Microsoft Windows. NTLM.
Аутентификация с помощью протокола Kerberos.
API для использования сервисов безопасности. GSSAPI.
Согласование параметров GSSAPI через SPNEGO.
Аутентификация с помощью PKI.Модуль 4 – Системы Single Sign-On.
Сценарии использования систем SSO.
Проблемы авторизации вызовов API в современных приложениях.
Аутентификация SAML.
Универсальная идентификация OpenID и OpenID Connect.Модуль 5 – Авторизация.
Принцип наименьших привилегий учетной записи.
Проблема конфликта интересов и принцип разделения полномочий.
Классические механизмы авторизации. ACL и Capabilities.
Механизмы и модели Role-Based Access Control.
Механизмы и модели Attribute-based Access Control.
Авторизация OAuth.Модуль 6 – Многофакторная аутентификация.
Концепция многофакторной аутентификации.
Механизмы многофакторной аутентификации.
Интеграция многофакторной аутентификации с системами SSO.Модуль 7 – Инциденты кибербезопасности, связанные с учетными записями.
Использование механизмов Threat Intelligence для обнаружения утечек данных учетных записей.
Реагирование на события и инциденты кибербезопасности.Модуль 8 – Работа с учетными записями рамках архитектуры корпоративной кибербезопасности.
Проектирование и построение цикла жизни учетных записей.
Проектирование и создание системы привилегий и прав учетных записей.
Проектирование и интеграция систем аутентификации, авторизации и аккаунтинга с корпоративными приложениями. - ANT0203 — Безопасность аппаратных компонентов
Описание курса
- ANT2001 — Модели безопасности ОС
Описание курса
- ANT2002 — Безопасность ОС Android
Описание курса
- ANT2003 — Безопасность iOS
Описание курса
- ANT2004 — Управление корпоративными мобильными устройствами
Описание курса
- ANT0031 — Безопасность DNS
- Длительность: 3 дня (24 часа)
- Код курса: ANT0031
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу протоколов и механизмов обеспечения кибербезопасности инфраструктуры DNS. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности DNS в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративных приложений и сервисов, а также кибербезопасность корпоративной инфраструктуры DNS, инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Протокол DNS.
Архитектура и компоненты DNS.
Сообщения DNS.
Регистрация доменных имён.
Распространение регистрационной информации и протокол whois.
Провайдеры сервисов DNS.
Расширения DNS.Модуль 2 – Модель угроз DNS.
Ошибки развертывания и настройки DNS.
Атаки spoofing.
Атаки cache poisoning.
DoS и DDoS атаки на DNS инфраструктуру.
Утечки данных DNS.
Построение модели угроз DNS.Модуль 3 – Механизмы безопасности DNS.
Контроль регистрационной информации DNS.
Фильтрация трафика DNS.
DNS Firewall и механизмы RPZ.
Passive DNS и Threat Intelligence.Модуль 4 – Криптографические методы защиты DNS.
DNSSEC
TSIG.Модуль 5 – Обработка инцидентов кибербезопасности, связанных с DNS.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Проектирование DNS в рамках архитектуры корпоративной кибербезопасности.
DNS в рамках архитектуры корпоративной безопасности.
Политики и метрики безопасности DNS. - ANT0032 — Безопасность электронной почты
- Длительность: 3 дня (24 часа)
- Код курса: ANT0032
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу протоколов и механизмов обеспечения кибербезопасности корпоративной электронной почты. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности электронной почты в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративных приложений и сервисов, а также кибербезопасность корпоративной электронной почты, инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Основы работы электронной почты.
SMTP и маршрутизация электронной почты.
Формат писем электронной почты.
Протоколы IMAP и POP.
Вспомогательные компоненты инфраструктуры электронной почты.Модуль 2 – Принципы обеспечения безопасности электронной почты.
Модель угроз электронной почты.
Законодательные меры защиты электронной почты.
Организационные меры защиты электронной почты.
Технические меры защиты электронной почты.
Поведенческие модели пользователей в комплексе мер защиты электронной почты.Модуль 3 – Механизмы Anti-Spam, Anti-Spoofing, Anti-Phishing.
Spam и его классификация.
Anti-Spoofing как средство защиты от Spam’а.
SPF/SIDF, DKIM, DMARC.
ARC.
Обеспечение доставки и «чистоты» репутации электронной почты.
Методы обнаружения Spam’а и фильтрация электронной почты.
Репутационная фильтрация электронной почты.
Защита от Phishing’а.Модуль 4 – Шифрование электронной почты.
Шифрование почтовых вложений. S/MIME.
Шифрование почтовых сообщений. PGP и GPG.
Шифрование протоколов SMTP, IMAP, POP.
Применение шифрования электронной почты и требования регуляторов.Модуль 5 – Обработка инцидентов кибербезопасности, связанных с электронной почтой.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Проектирование электронной почты в рамках архитектуры корпоративной кибербезопасности.
Электронная почта в рамках архитектуры корпоративной безопасности.
Механизмы безопасности клиентской и серверной частей электронной почты.
Требования регуляторов. - ANT0033 — Безопасность IP-телефонии
- Длительность: 5 дней (40 часов)
- Код курса: ANT0033
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу протоколов и механизмов обеспечения кибербезопасности корпоративной IP-телефонии. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности решений IP-телефонии в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также кибербезопасность корпоративной IP-телефонии, инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Основы работы IP-телефонии.
ТФоП и IP-телефония.
Компоненты IP-телефонии.
Протоколы сигнализации вызовов.
Протоколы передачи медиа
данных.Модуль 2 – Безопасность IP-телефонии в корпоративной сети.
Модель угроз сетевой инфраструктуры.
Модель угроз IP-телефонии.
Контроль вызовов.
Фильтрация трафика IP-телефонии.
Session Border Controller.Модуль 3 – Механизмы защиты сигнализации вызовов.
Механизмы защиты SIP.
Использование TLS и DTLS.
Использование IPsec.
S/MIME.Модуль 4 – Механизмы защиты медиа данных.
SRTP.
SRTCP.Модуль 5 – Управление ключами шифрования.
MIKEY.
SRTP Security Descriptions.
ZRTP.Модуль 6 – Специализированные решения IP-телефонии.
IP-телефония Asterisk
IP-телефония Cisco.
IP-телефония Avaya.
Skype for BusinessМодуль 7 – Обработка инцидентов кибербезопасности в IP-телефонии.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 8 – Проектирование IP-телефонии в рамках архитектуры корпоративной кибербезопасности.
Политики безопасности IP-телефонии.
Требования регуляторов.
IP-телефония в рамках архитектуры корпоративной безопасности. - ANT0301 — Безопасность Web-приложений
- Длительность: 5 дней (40 часов)
- Код курса: ANT0301
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы и конкретные механизмы защиты Web-приложений. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности Web-приложений в рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной сетевой инфраструктуры, а также кибербезопасность корпоративных Web-приложений, инженеры, проектирующие корпоративную архитектуру кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Архитектура и компоненты Web-приложений.
HTML и HTTP.
XML.
Web-серверы.
Web-клиенты.
«Активный» контент.
Архитектура Progressive Web App.Модуль 2 – Модель угроз Web-приложений.
Угрозы серверной части Web-приложений.
Угрозы клиентской части Web-приложений.
Построение модели угроз Web-приложения.Модуль 3 – Механизмы защиты серверной части Web-приложений.
Защита от DoS и DDoS атак.
Аутентификация и авторизация.
SSO. OpenID и OAuth.
Проблемы obfuscation.
Защита от атак криптоанализа.
Защита Web-framework’ов.Модуль 5 – Настройки безопасности Web-серверов.
Apache.
NGINX.
IIS.
jBoss.
Wildfly.
TOMCAT.Модуль 6 – Web Application Firewall.
Концепция WAF.
Установка и конфигурация WAF Modsecurity.
Интеграция WAF Modsecurity и IPS.
Настройка правил фильтрации WAF Modsecurity.
Использование репутационного анализа.
Обнаружение аномалий.
Оптимизация работы WAF Modsecurity.Модуль 7 – Обработка инцидентов кибербезопасности в Web-приложении.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 8 – Проектирование Web-приложений в рамках архитектуры корпоративной кибербезопасности.
Политики безопасности Web-приложений.
Метрики безопасности Web-приложений.
Web-приложения в рамках архитектуры корпоративной безопасности. - ANT0302 — Безопасность баз данных
- Длительность: 3 дня (24 часа)
- Код курса: ANT0302
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить работу механизмов обеспечения кибербезопасности баз данных. Также материал курса раскрывает методологические аспекты проектирования, внедрения и обеспечения работоспособности баз дынных рамках архитектуры корпоративной кибербезопасности.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративных приложений и сервисов, а также кибербезопасность корпоративных баз данных, инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Принципы работы баз данных.
Архитектура и компоненты базы данных.
Реляционная модель и процедуры нормализации.
SQL.
Проблемы целостности данных в базе.Модуль 2 – Обеспечение безопасности базы данных.
Модель угроз базы данных.
Безопасность инфраструктуры для базы данных.
Управление учетными записями и ролями.
Обеспечение безопасности при использовании базы данных приложениями.
Безопасность при взаимодействии баз данных друг с другом.
Защита от вредоносного п/о для баз данных.Модуль 3 – Контроль доступа к базе данных.
Управление учетными записями.
Использование ролей при работе с базой данных.
Column-level security.
Row-level security.Модуль 4 – Шифрование базы данных.
Методы шифрования данных в базе.
Хранение паролей и обеспечение их безопасности в базе данных.Модуль 5 – Работа с транзакциями.
Формирование и контроль целостности транзакций.
Применение транзакций при использовании базы данных приложениями.Модуль 6 – Обработка инцидентов кибербезопасности, связанных с базами данных.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 7 – Проектирование баз данных в рамках архитектуры корпоративной кибербезопасности.
Базы данных в рамках архитектуры корпоративной кибербезопасности.
Политики и метрики безопасности баз данных.
Требования регуляторов.
Обеспечение отказоустойчивости и высокой доступности баз данных. - ANT0303 — Безопасность SAP
- ANT3001 — Разработка безопасного П/О
- Длительность: 5 дней (40 часов)
- Код курса: ANT3001
- Стоимость
- Очный формат: 648 500 ₸
- Онлайн формат: 632 000 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить принципы, подходы и методы обеспечения безопасности программного обеспечения во время и после процесса разработки. Также на курсе рассматриваются вопросы интеграции практики DevSecOps для построения сквозного процесса разработки безопасного программного обеспечения.
Аудитория курса
Инженеры, обеспечивающие кибербезопасность при разработке корпоративных приложений и сервисов .
Предварительные требования
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Как устроено обучение
Онлайн-курс
Онлайн-курс предполагает групповые занятия с инструктором через систему видеоконференцсвязи, кроме того, домашние задания и экзамен. Слушателям предоставляются учебные пособия и дополнительные материалы
Для корпоративных клиентов
Обучение для корпоративных клиентов включает в себя онлайн-курсы и курсы самообучения, а также дополнительные сервисы, необходимые корпоративным клиентам: организация планов обучения для подразделений клиента, проведение оценки эффективности обучения и т.д.
Программа курса
Модуль 1. Моделирование угроз п/о.
Методики моделирования угроз.
Методики оценки и управления рисками.
Создание модели угроз п/о.
Оценка и управление рисками при разработке п/о.Модуль 2. Принципы обеспечения безопасности п/о.
Универсальная модель контроля доступа.
Типы контроля доступа.
Аудит и прослеживаемость выполнения функций.
Мониторинг работы.
Приватность и конфиденциальность.
Многоуровневая безопасность.
Анонимизация.
Аутентификация.
Целостность и аутентичность.Модуль 3. Выбор технологического стека.
Выбор языка программирования.
Выбор платформы распределенных объектов и взаимодействий.
Выбор ОС.
Выбор технологий аутентификации.
Выбор криптографических библиотек.
Выбор стратегии реализации принципа Defense-in-Depth.Модуль 4. Использование открытого исходного кода.
Принцип «Security by obscurity».
Преимущества открытого исходного кода.
Инциденты, связанные с открытым исходным кодом.
Недостатки использования открытого исходного кода.Модуль 5. Принципы разработки безопасного п/о.
Обеспечение безопасности самого слабого элемента.
Defense in Depth.
Обеспечение безопасности при отработке исключений и ошибок.
Использование наименьших привилегий.
Разделение п/о на составные части.
Использование простых функций и компонентов п/о.
Соблюдение приватности при обработке данных.
Сокрытие «секретов».
Обеспечение доверия при взаимодействии функций и компонентов п/о.
Использование возможностей комьюнити разработчиков.
Практики и методы DevSecOps.Модуль 6. Аудит разрабатываемого п/о.
Анализ архитектуры п/о.
Статический анализ кода.
Динамический анализ кода.
Проведение Code Review.Модуль 7. Источники уязвимостей и причины их появления.
Buffer overflow.
Race.
Ошибки в конфигурации контроля доступа.
Проблемы генерации случайных чисел.
Ошибки использования криптографических библиотек.Модуль 8. Доверие и валидация входных данных.
Источники входных данных п/о.
Принципы и механизмы валидации входных данных.
Синтаксическая и семантическая валидация данных.
Сохранение доверия при взаимодействии компонентов п/о.
Организация security-enhanced API.Модуль 9. Функция аутентификации по паролям.
Хранение паролей и учетных записей.
Добавление учетных записей.
Обеспечение выполнения требований к паролям.
Одноразовые пароли.Модуль 10. Обеспечение защиты п/о при использовании клиентами.
Схемы защиты право обладания п/о.
Лицензионные файлы и проверка лицензии.
Механизмы защиты от фальсификации.
Обфускация кода. - ANT3002 — Защита П/О
Описание курса
- ANT3003 — Тестирование защищенности П/О
Описание курса
- ANT3004 — DevSecOps
- Длительность: 5 дней (40 часов)
- Код курса: ANT3004
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы организации и построения процессов DevSecOps для обеспечения кибербезопасности при разработке корпоративных приложений и сервисов.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность при разработке корпоративных приложений и сервисов.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Процессы и компоненты DevOps.
Принципы DevOps.
Компоненты DevOps.
Инструменты DevOps.
Процессы DevOps.
Организационные аспекты DevOps.Модуль 2 – Проблемы безопасности DevOps.
Модель угроз DevOps.
Программы AppSec для контроля безопасности при разработке п/о.
Проблема оценки эффективности мер и решений кибербезопасности.
Базовые показатели эффективности.
Улучшение и оптимизация показателей эффективности.Модуль 3 – Безопасность компонентов Continuous Delivery.
Методика Software Composition Analysis.
Методика Static Analysis Security Testing.
Методика Dynamic Analysis Security Testing.
Контроль зависимостей кода.
Контроль и использование компонентов сборки, компиляции и запуска кода.Модуль 4 – Безопасность компонентов Continuous Integration.
Использование pre-commit hook’ов.
Анализ кода и предотвращение утечек данных через исходный код.Модуль 5 – Компоненты Continuous Monitoring.
Измерение базовых показателей эффективности кибербезопасности и результатов их улучшения.
Измерение времени жизни угроз.
Измерение снижения объёма угроз.
Измерение скорости появления угроз.
Измерение времени между появлением угроз.
Измерение скорости утери контроля над угрозами.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о новых событиях и инцидентах.Модуль 6 – Безопасность инфраструктуры DevOps.
Безопасность инфраструктуры виртуализации.
Безопасность инфраструктуры контейнеризации.
Безопасность при взаимодействии с «облаком».
Безопасность инструментов DevOps.
Обеспечение безопасного взаимодействия с API. - ANT3005 — MLSecOps
- Длительность: 5 дней (40 часов)
- Код курса: ANT3005
- Стоимость
- Очный формат: 648 500 ₸
- Онлайн формат: 632 000 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить теорию и практику современных угроз, атак, методов защиты и аудита систем искусственного интеллекта и машинного обучения. Слушатели научатся моделировать угрозы, реализовывать и обнаруживать атаки (adversarial, poisoning, supply chain, privacy leakage), а также применять инструменты для построения защищённых ML-pipeline’ов, мониторинга и аудита моделей машинного обучения. Внимание уделяется лабораторным работам на OSS-фреймворках.
Аудитория курса
Специалисты в области кибербезопасности, желающие освоить специфику защиты ML/ИИ систем, а также разработчики и архитекторы ИИ-решений, разрабатывающие ML-pipeline'ы с учетом требований безопасности.
Предварительные требования
Необходимо обладать знаниями Python и практическим опытом работы с ML/AI-фреймворками (scikit-learn, PyTorch, TensorFlow, Jupyter).
Как устроено обучение
Онлайн-курс
Онлайн-курс предполагает групповые занятия с инструктором через систему видеоконференцсвязи, кроме того, домашние задания и экзамен. Слушателям предоставляются учебные пособия и дополнительные материалы
Для корпоративных клиентов
Обучение для корпоративных клиенов включает в себя онлайн-курсы и курсы самообучения, а также дополнительные сервисы,необходимые корпоративным клиентам: организация планов обучения для подразделений клиента, проведение оценки эффективности обучения и т.д.
Программа курса
Модуль 1. Введения в безопасность ИИ.
Риски и специфика AI-систем: отличия от классических ИС.
Классификация угроз (adversarial ML, data poisoning, model stealing, privacy leaks и др.).
Типовые злоумышленники, мотивация и сценарии атак.
Модели угроз для ML/AI pipeline.
Краткий разбор инцидентов (case studies).
Требования регуляторов (NIST, ISO/IEC 27001, 27017, IEEE) для AI.Модуль 2. Adversarial атаки. Тестирование и защита моделей.
Adversarial: теория, методы генерации (FGSM, PGD, Carlini-Wagner и др.).
Категории атак (white-box/black-box, targeted/untargeted).
Атакуемые объекты: классификация, сегментация, OCR, звук, NLP.
Механизмы защиты: adversarial training, input preprocessing, усиленные архитектуры.
Методы оценки устойчивости моделей (robustness metrics).Модуль 3. Dana Poisoning. Атаки Supply Chain.
Data poisoning: типы атак (label flipping, backdoor, clean-label).
Механизмы атаки и стадии внедрения.
Опасности цепочек поставки: подмена моделей, репозиториев, библиотек.
Примеры атак через PyPI, Huggingface.
Механизмы защиты: отслеживание контента, верификация исходников, “песочницы”.
Актуальные стандарты и best practices (MLSecOps, DevSecOps).Модуль 4. Угрозы приватности, инференс и защита данных.
Утечки через обученные модели: membership inference, model inversion.
Риски: reconstruction attacks, extraction attacks.
Меры защиты: differential privacy, federated learning, homomorphic encryption.
Обнаружение атак: практические методы фиксации утечек.
Требования рещуляторов: GDPR, перспективы ЕАЭС/РФ, NIST AI RMF.Модуль 5. Комплексная защита и аудит моделей в продуктиве.
Комплексная архитектура безопасности ML/AI-систем.
Построение безопасного pipeline’а (CI/CD, MLOps, Model Registry, Monitoring).
Аудит качества защиты и мониторинг моделей.
Реагирование на инциденты для AI/ML.
Примеры корпоративной архитектуры безопасности (Google TFX, Kubeflow, Microsoft).
Краткий разбор сценариев аудитов. - ANT0041 — Мониторинг событий и инцидентов кибербезопасности
- Длительность: 5 дней (40 часов)
- Код курса: ANT0041
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты мониторинга событий и инцидентов кибербезопасности. Материал курса охватывает также вопросы организации процессов мониторинга событий и инцидентов кибербезопасности и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие мониторингом и обработкой событий и инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями общей кибербезопасности на уровне курса ANT0000. Кроме того, необходимо обладать знаниями о работе сетей TCP/IP на уровне курса ANT-N101, а также знаниями об операционных системах на уровне курсов ANT-OW101 и ANT-OL101.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология мониторинга событий и инцидентов.
События и инциденты кибербезопасности.
Процессы мониторинга.
Инструменты и инфраструктура мониторинга.
Операционные метрики для мониторинга.Модуль 3 – Мониторинг сетевой инфраструктуры.
Log’и и информация о сетевой активности.
Сбор и анализ сетевого трафика.
Статистические данные сетевой активности.
Централизованные и распределенные системы сетевого мониторинга.
Развертывание и поддержка системы сетевого мониторинга.Модуль 4 – Мониторинг конечных устройств.
Политики мониторинга и log’и Windows.
Подсистема аудита Windows.
Развертывание и поддержка мониторинга Windows.
Настройки мониторинга и log’и Linux.
Подсистема аудита Linux.
Развертывание и поддержка мониторинга Linux.Модуль 5 – Мониторинг приложений.
Использование флагов и маяков в IT-инфраструктуре для мониторинга.
Мониторинг SMTP.
Мониторинг Web-приложений.
Мониторинг баз данных.
Мониторинг облачных приложений.Модуль 6 – Мониторинг событий и инцидентов в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Интеграция систем мониторинга.
Дифференция событий и инцидентов кибербезопасности.
Подтверждение инцидентов кибербезопасности.
Обработка инцидентов кибербезопасности.
Цифровая криминалистика. - ANT0042 — OSINT
Описание курса
- ANT0043 — Аудит информационной безопасности
Описание курса
- ANT0401 — Обработка инцидентов кибербезопасности
- Длительность: 5 дней (40 часов)
- Код курса: ANT0401
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты обработки инцидентов кибербезопасности. Материал курса охватывает также вопросы организации процессов обработки инцидентов кибербезопасности и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями о мониторинге событий и инцидентов кибербезопасности на уровне курса ANT0041.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология обработки инцидентов кибербезопасности.
Процесс обработки инцидентов.
Инструменты и инфраструктура для обработки инцидентов.
Штатное расписание …
Мониторинг событий и инцидентов.
Цифровая криминалистика в рамках обработки инцидентов.Модуль 3 – Реагирование на инциденты кибербезопасности.
Начальная реакция на инцидент.
Подтверждение инцидента.
Определение масштаба инцидента.
Разработка и применение немедленных мер по сдерживанию инцидента.
Разработка мер расширенного мониторинга инфраструктуры.
Разработка мер ликвидации вредоносной активности.
Разработка хронологии ликвидации вредоносной активности.
Специфика реакции на инциденты, связанные с базами данных.Модуль 4 – Расширенный мониторинг инфраструктуры.
Расширенный мониторинг сети.
Расширенный мониторинг конечных устройств.
Расширенный мониторинг сервисов и приложений.
Отслеживание инцидента с помощью индикаторов компрометации.
Использование флагов и маяков в IT-инфраструктуре для мониторинга.Модуль 5 – Цифровая криминалистика.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Артефакты файловых и операционных систем.
Артефакты оперативной памяти.
Восстановление хронологии событий по артефактам кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.
Diamond модель и TTP[Tactics, Technics, Procedures] информация.Модуль 6 – Ликвидация вредоносной активности.
Использование индикаторов компрометации для обнаружения вредоносной активности.
Ликвидация вредоносной активности в сети.
Ликвидация вредоносной активности на конечных устройствах.
Ликвидация вредоносной активности сервисов и приложений.
Документирование процесса и результатов ликвидации вредоносной активности.Модуль 7 – Обработка инцидентов в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Рекомендации по стратегической модернизации процессов и архитектуры корпоративной кибербезопасности на основе данных об инцидентах.
Встраивание процессов обработки инцидентов в процессы корпоративной кибербезопасности. - ANT0402 — Цифровая криминалистика в ОС и приложениях
- Длительность: 5 дней (40 часов)
- Код курса: ANT0402
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты проведения криминалистических исследований цифровых данных операционных систем и приложений. Материал курса охватывает также вопросы организации процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов ANT-OW101 и ANT-OL101, а также знаниями о процессах обработки инцидентов кибербезопасности на уровне курса ANT0401.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Принципы обработки удаленных и «дефектных» данных.
Восстановление цепи событий по артефактам кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Поиск и анализ артефактов в файловых системах.
Архитектура файловых систем.
Файловые системы FAT, NTFS, Ext*, UFS, ReFS, APFS.
Анализ метаданных файловых систем.
Загрузчики ОС.
Жесткие диски и их логические разделы.
Создание точной копии жесткого диска.
Анализ «пустого» пространства жесткого диска.
SleuthKit и Autopsy.
Encase.Модуль 4 – Поиск и анализ артефактов в ОС Windows.
Анализ реестра Windows.
Файлы подкачки и гибернации.
История ОС и приложений.
Анализ log’ов ОС.
Восстановление хронологии кибератаки.Модуль 5 – Поиск и анализ артефактов в ОС Linux.
Анализ процессов и используемых ими файлов.
Файлы подкачки.
История ОС и приложений.
Анализ log’ов ОС.
Восстановление хронологии кибератаки.Модуль 6 – Поиск и анализ артефактов в macOS.
Анализ процессов и используемых ими файлов.
Файлы подкачки.
История ОС и приложений.
Анализ log’ов ОС.
Восстановление хронологии кибератаки.Модуль 7 – Поиск и анализ артефактов в приложениях.
Анализ активности электронной почты.
Анализ web-активности.Модуль 8 – Введение в анализ оперативной памяти и быстро изменяющейся информации.
Методы получения информации из оперативной памяти.
Методы получения информации из регистров и кэша процессора.
Основные методы анализа dump’ов оперативной памяти.Модуль 9 – Цифровая криминалистика в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Организация процессов цифровой криминалистики.
Встраивание процессов цифровой криминалистики в процессы корпоративной кибербезопасности. - ANT0403 — Цифровая криминалистика в сетях TCP/IP
- Длительность: 5 дней (40 часов)
- Код курса: ANT0403
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты
проведения криминалистических исследований цифровых данных о сетевой активности
корпоративных систем и приложений. Материал курса охватывает также вопросы организации
процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной
кибербезопасности.Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры,
занимающиеся цифровой криминалистикой.Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов
ANT-OW101 и ANT-OL101, а также знаниями о процессах обработки инцидентов кибербезопасности на
уровне курса ANT0401.Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Принципы обработки удаленных и «дефектных» данных.
Восстановление хронологии кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Сбор сетевого трафика.
Принципы сбора сетевого трафика в корпоративной инфраструктуре.
«Зеркалирование» сетевого трафика.
Хранение собранного сетевого трафика.Модуль 4 – Анализ сетевого трафика с помощью Wireshark’а.
Архитектура и возможности Wireshark’а.
Препроцессоры.
Фильтры.
Компоненты Mate.
Обнаружение и анализ сетевых атак и вредоносной сетевой активности
dump’ах трафика. - ANT0404 — Pentest сетевой инфраструктуры
- Длительность: 5 дней (40 часов)
- Код курса: ANT0404
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты проведения тестирования на возможность проникновение – pentest’а – в сетевую инфраструктуру и подключенные к ней сервисы и приложения. В данном курсе пентест рассматривается как один из процессов, необходимых для построения архитектуры корпоративной кибербезопасности, поэтому в нём также поднимаются методологические вопросы организации пентеста, а также использования данных, полученных в результате его проведения.
Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания о работе сетей TCP/IP на уровне курса ANT-N101. Рекомендуется иметь знания о моделировании угроз на уровне курса ANT0052
Содержание курса:
Модуль 1 – Принципы организации пентеста.
Цели и задачи проведения пентеста.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения пентеста.
Обработка результатов проведения пентеста.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Организация кибератак типа DoS/DDoS.
Организация DDoS-кибератаки на сеть.
Организация DoS-кибератаки на сетевые сервисы.
Организация DoS-кибератаки на приложения.Модуль 4 – Организация кибератак на сетевые сервисы.
Перехват трафика.
Получение доступа к Wi-Fi сети.
Методы обхода систем сетевой кибербезопасности.
Организация кибератак на протоколы маршрутизации.
Организация кибератак на протокол DNS.
Организация кибератак на протокол DHCP.
Организация кибератак на сервисы аутентификации.
Организация кибератак на сервисы удаленного управления ОС.Модуль 5 – Организация кибератак через электронную почту.
Подготовка вредоносных вложений.
Базовые принципы социальной инженерии.
Кибератаки на протоколы электронной почты.
Получение доступа к ОС пользователей через вредоносные вложения.Модуль 6 – Развитие кибератаки с базовым доступом к ОС.
Извлечение данных и учетных записей.
Эскалация привилегий учетной записи.
Распространение контроля над другими системами в ходе кибератаки.
Удаление следов кибератаки.Модуль 7 – Подготовка отчета о проведении пентеста.
Модель угроз и результаты проведения пентеста.
Управление рисками на основе данных, выявленных пентестом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. - ANT0405 — Pentest Web-приложений
- Длительность: 5 дней (40 часов)
- Код курса: ANT0405
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты проведения тестирования на возможность проникновение – pentest’а – в Web-приложения. В данном курсе пентест рассматривается как один из процессов, необходимых для построения архитектуры корпоративной кибербезопасности, поэтому в нём также поднимаются методологические вопросы организации пентеста, а также использования данных, полученных в результате его проведения.
Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры, проектирующие архитектуру корпоративной кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания о работе сетей TCP/IP на уровне курса ANT-N101. Рекомендуется иметь знания о моделировании угроз на уровне курса ANT0052
Содержание курса:
Модуль 1 – Принципы организации пентеста.
Цели и задачи проведения пентеста.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения пентеста.
Обработка результатов проведения пентеста.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Архитектура и компоненты Web-приложений.
HTML и HTTP.
Кодировки данных.
Web-серверы.
Web-клиенты.
Расширения browser’ов.
«Активный» контент.
Архитектура Progressive Web App.
Атаки на web-приложения. OWASP top 10.Модуль 4 – Перехват Web-трафика.
Организация перехвата web-трафика.
Proxy-сервисы.
Анализ Web-трафика и извлечение данных.Модуль 5 – Атаки на серверную часть Web-приложения.
Организация DoS-атак на Web-приложения.
Эксплуатация ошибок в правилах авторизации и работы с файлами.
Эксплуатация логических ошибок работы Web-приложений.
Эксплуатация ошибок в настройках и уязвимостей CMS.
Организация вредоносного внедрения в ОС Web-приложения.
Перехват HTTP-сессий и данных cookie.
Обход шифрования HTTPS/TLS.
Получение доступа к учетным записям Web-приложений.
Эксплуатация Web-приложений через SQL-инъекции.
Организация атак на базы данных web-приложений.
Организация кибератак типа SSRF.Модуль 6 – Атаки на клиентскую часть Web-приложения.
Организация кибератак типа XSS.
Организация кибератак типа XXE.
Организация кибератак типа CSRF.
Организация атак типа Clickjacking.Модуль 7 – Развитие кибератаки через Web-приложение.
Извлечение данных.
Эскалация привилегий учетной записи.
Распространение контроля над другими системами в ходе кибератаки.
Удаление следов кибератаки.Модуль 8 – Подготовка отчета о проведении пентеста.
Модель угроз и результаты проведения пентеста.
Управление рисками на основе данных, выявленных пентестом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. - ANT4001 — Цифровая криминалистика оперативной памяти
- Длительность: 5 дней (40 часов)
- Код курса: ANT4001
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты проведения криминалистических исследований цифровых данных в оперативной памяти. Материал курса охватывает также вопросы организации процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов ANT-OW101 и OL101, знаниями о процессах обработки инцидентов кибербезопасности на уровне курса ANT0401, а также знаниями в области цифровой криминалистики на уровне курсов ANT0402 и ANT0403.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Методика обработки инцидентов кибербезопасности.
Восстановление цепи событий по артефактам кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Принципы анализа оперативной памяти и быстро изменяющейся информации.
Методы получения информации из оперативной памяти.
Методы получения информации из регистров и кэша процессора.
Основные методы анализа dump’ов оперативной памяти.Модуль 4 – Анализ оперативной памяти Windows.
Объекты и пулы ресурсов.
Процессы и их компоненты.
Поиск вредоносного п/о и его артефактов.
Анализ данных реестра.
Log’и и события.
Артефакты сетевой подсистемы.
Сервисы Windows.
Данные ядра и поиск rootkit’ов.
Анализ данных подсистемы GUI.
Артефакты пользовательских действий и приложений.
Артефакты вспомогательных системных процессов.
Восстановление хронологии кибератаки.Модуль 5 – Анализ оперативной памяти Linux.
Процессы и их компоненты.
Поиск вредоносного п/о и его артефактов.
Log’и и события.
Артефакты сетевой подсистемы.
Данные ядра и поиск rootkit’ов.
Артефакты пользовательских действий и приложений.
Артефакты вспомогательных системных процессов.
Восстановление хронологии кибератаки.Модуль 6 – Анализ оперативной памяти macOS.
Процессы и их компоненты.
Поиск вредоносного п/о и его артефактов.
Log’и и события.
Артефакты сетевой подсистемы.
Данные ядра и поиск rootkit’ов.
Артефакты пользовательских действий и приложений.
Артефакты вспомогательных системных процессов.
Восстановление хронологии кибератаки.Модуль 7 – Цифровая криминалистика в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Организация процессов цифровой криминалистики.
Встраивание процессов цифровой криминалистики в процессы корпоративной кибербезопасности. - ANT4002 — Цифровая криминалистика баз данных
- Длительность: 5 дней (40 часов)
- Код курса: ANT4002
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты проведения криминалистических исследований баз данных. Материал курса охватывает также вопросы организации процессов цифровой криминалистики и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса:
Инженеры, занимающие обработкой инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования к аудитории:
Необходимо обладать знаниями об архитектуре и работе операционных систем на уровне курсов ANT-OW101 и OL101, знаниями о процессах обработки инцидентов кибербезопасности на уровне курса ANT0401, а также знаниями в области цифровой криминалистики на уровне курсов ANT0402 и ANT0403.
Содержание курса:
Модуль 1 – Цикл жизни кибератак.
Классификация кибератак.
Этапа проведения кибератаки.
Артефакты кибератак и их взаимосвязь.Модуль 2 – Методология цифровой криминалистики.
Процесс проведения криминалистических исследований.
Специфика реакции на инциденты, связанные с базами данных.
Методика обработки инцидентов кибербезопасности.
Инструменты цифровой криминалистики.
Восстановление хронологии кибератаки.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 3 – Принципы работы баз данных SQL.
Базы данных и системы управления базами данных SQL.
SQL-запросы.
Транзакции и принцип ACID.
Реляционная целостность данных.Модуль 4 – Криминалистика SQL Server’а.
Архитектура SQL Server’а.
Форматы данных и файлов.
Управление памятью.
Параметры безопасности.
Методы получения данных.
Методология криминалистических исследований SQL Server’а.
Получение и анализ артефактов кибератак.
Поиск и анализ Rootkit’ов.Модуль 5 – Криминалистика Oracle DBA.
Архитектура Oracle DBA.
Форматы данных и файлов.
Управление памятью.
Параметры безопасности.
Методы получения данных.
Методология криминалистических исследований Oracle DBA.
Получение и анализ артефактов кибератак.
Поиск и анализ Rootkit’ов.Модуль 6 – Криминалистика SQLite.
Архитектура SQLite.
Применение базы данных SQLite.
Форматы данных и файлов.
Восстановление записей SQLite.
Использование журналов.
Write-ahead log’и.
Расширения SQLite.Модуль 7 – Цифровая криминалистика в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Организация процессов цифровой криминалистики.
Встраивание процессов цифровой криминалистики в процессы корпоративной кибербезопасности. - ANT4003 — Методы обхода систем кибербезопасности
- Длительность: 5 дней (40 часов)
- Код курса: ANT4003
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты
обхода средств и систем кибербезопасности во время проведения тестирования на проникновение
– pentest’а – в сетевую инфраструктуру и подключенные к ней сервисы и приложения.Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры,
проектирующие архитектуру корпоративной кибербезопасности.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, знания о работе сетей
TCP/IP на уровне курса ANT-N101, а также знания о проведении пентестов на уровне курса
ANT0404. Рекомендуется иметь знания о моделировании угроз на уровне курса ANT0052Содержание курса:
Модуль 1 – Принципы организации Pentest’а.
Цели и задачи проведения Pentest’а.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения Pentest’а.
Обработка результатов проведения pentest’а.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Анализ данных DNS для организации кибератак.
Анализ данных SMB для организации кибератак.
Анализ данных SMTP для организации кибератак.
Анализ данных SNMP для организации кибератак.
Анализ уязвимостей сервисов для организации кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Использование уязвимостей типа Buffer Overflow.
Условия существования уязвимостей Buffer Overflow.
Принципы использования уязвимостей Buffer Overflow.
Уязвимости Buffer Overflow в ОС Windows.
Уязвимости Buffer Overflow в ОС Linux.Модуль 4 – Использование инъекций в процессы ОС.
Условия осуществления инъекций в процессы ОС.
Принципы осуществления инъекций в процессы ОС.
Инъекции DLL.
Инъекции Reflective DLL.
Использование техники Process Hollowing.Модуль 5 – Методы обхода систем антивирусной защиты.
Принципы обхода систем антивирусной защиты.
Использование кодировок и шифрования.
Искажение характеристик поведения.
Использование инструментов PowerShell и VBA.
Использование API в ОС Windows.
Работа с AMSI.Модуль 6 – Методы обхода систем фильтрации приложений и данных.
Принципы обхода систем контроля приложений.
Использование NTFS ADS.
Использование специализированных DLL.
Обход средств AppLocker.
Использование SSH туннелей для сокрытия кибератак.
Использование DNS туннелей для сокрытия кибератак.Модуль 7 – Методы обхода систем Web-фильтрации.
Использование ошибок работы парсеров Web-контента.
Использование методик обфускации.
Использование HTTP туннелей для сокрытия кибератак.Модуль 8 – Подготовка отчета о проведении Pentest’а.
Модель угроз и результаты проведения pentest’а.
Управление рисками на основе данных, выявленных pentest’ом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. - ANT4005 — Методы Data Science в кибербезопасности
- Длительность: 3 дня (24 часа)
- Код курса: ANT4005
- Стоимость
- Очный формат: 652 000 ₸
- Онлайн формат: 623 000 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям научиться применять методы т.н. Data Science для решения различных задач кибербезопасности. Методы, изучаемые на курсе, исследуются с помощью специальных инструментов, таких как RStuio и Jpyther, их применение демонстрируется с помощью отраслевых продуктов и инструментов.
Аудитория курса
Аналитики кибербезопасности, специалисты, задействованные в работе центров операционной безопасности.
Предварительные требования
Необходимы знания общей кибербезопасности на уровне курса ANT0000, рекомендованы знания основ программирования и высшей математики.
Как устроено обучение
Онлайн-курс
Онлайн-курс предполагает групповые занятия с инструктором через систему видеоконференцсвязи, кроме того, домашние задания и экзамен. Слушателям предоставляются учебные пособия и дополнительные материалы
Для корпоративных клиентов
Обучение для корпоративных клиентов включает в себя онлайн-курсы и курсы самообучения, а также дополнительные сервисы, необходимые корпоративным клиентам: организация планов обучения для подразделений клиента, проведение оценки эффективности обучения и т.д.
Программа курса
Модуль 1. Математическая статистика в кибербезопасности.
Теория вероятностей и математическая статистика.
Моделирование угроз с помощью теории вероятностей.
Оценка рисков кибербезопасности с помощью математической статистики.
Метрики кибербезопасности, основанные на статистических данных.
Анализ инцидентов кибербезопасности на основе статистических данных.
Механизмы фильтрации трафика, основанные на статистических «движках».
Обнаружение аномалий на основе статистических оценок.Модуль 2. Подготовка и извлечение данных кибербезопасности.
Препроцессоры и подготовка данных для поиска.
Примеры препроцессоров IPS и систем защиты от DoS/DDoS.
Логика и языки регулярных выражений.
Поиск данных с помощью регулярных выражений.
Поиск и фильтрация log’ов с помощью регулярных выражений.
Механизмы корреляции событий кибербезопасности.
Формирование массивов данных кибербезопасности.Модуль 3. Фильтрация массивов данных.
Создание конвейера обработки массивов данных.
Построение платформы обработки данных на примере Opensearch.
Языки структурированных запросов.
Kusto Query Language и Kibana Query Language.
Фильтрация массива данных для обнаружения аномалий.
Фильтрация массива данных для обнаружения утечек данных.Модуль 4. Методы машинного обучения в кибербезопасности.
Логика работы алгоритмов машинного обучения.
Обнаружение аномалий на основе алгоритмов машинного обучения.
Механизмы фильтрации трафика, основанные на алгоритмах машинного обучения.
Алгоритмы AI для поддержки службы кибербезопасности компании. - ANT4006 — Автоматизация задач и процессов кибербезопасности
Описание курса
- ANT0051 — Политики и контроль кибербезопасности
- Длительность: 3 дня (24 часа)
- Код курса: ANT0051
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
В данном курсе рассматриваются принципы, методы и инструменты создания и управления политиками кибербезопасности в архитектуре корпоративной кибербезопасности. Также в курсе рассматривается подход внедрения и работы механизмов контроля кибербезопасности.
Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, сотрудники, принимающие проектные управленческие решения, а также инженеры, отвечающие за внедрение решений кибербезопасности в корпоративной инфраструктуре.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Контроль доступа и его типы.
Механизмы контроля доступа.
Принципы построения архитектуры кибербезопасности.Модуль 2 – Моделирование угроз и оценка рисков кибербезопасности.
Моделирования угроз.
Оценки и управления рисками.
Построение процессов и архитектуры кибербезопасности.Модуль 3 – Политики кибербезопасности.
Каталог политик кибербезопасности
Политики в области стратегического управления.
Политики в области операционного управления.
Политики в области приватности и персональных данных.
Политики в области корпоративных данных.
Политики в области управления ролями и правами доступа.
Политики в области безопасности сетей TCP/IP.
Политики в области операционных процессов кибербезопасности.
Политики в области работы с персоналом.
Политики в области защиты промышленной инфраструктуры.Модуль 4 – Принцип и механизмы контроля в кибербезопасности.
Принцип контроля в кибербезопасности.
Механизмы контроля в кибербезопасности.
Оценка результатов внедрения механизмов контроля в архитектуре корпоративной кибербезопасности. - ANT0052 — Моделирование угроз кибербезопасности
- Длительность: 3 дня (24 часа)
- Код курса: ANT0052
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
В данном курсе рассматриваются методы моделирования угроз кибербезопасности на основе
методики STRIDE. Кроме того, на курсе рассматриваются вопросы построения архитектуры
корпоративной кибербезопасности на основании моделировании угроз кибербезопасности.Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, сотрудники, принимающие
проектные управленческие решения, а также инженеры, отвечающие за внедрение решений
кибербезопасности в корпоративной инфраструктуре.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Создание модели угроз.
Принципы создания модели угроз.
Методики выявления угроз для корпоративной инфраструктуры.
Создание модели угроз с помощью методики STRIDE.
Использование деревьев атак и библиотеки атак.Модуль 2 – Модель угроз и оценка рисков кибербезопасности.
Методики оценки рисков для модели угроз.
Метод вероятностного моделирования Монте Карло.Модуль 3 – Построение процесса управления угрозами.
Стратегии и методики работы с рисками.
Стратегии и методики работы с угрозами.Модуль 4 – Моделирование угроз в архитектуре корпоративной
кибербезопасности.
Архитектура корпоративной кибербезопасности.
Выбор технических решений на основе модели угроз.
Выбор метрик для мониторинга корпоративной кибербезопасности.
Методы модернизации модели угроз. - ANT0501 — Метрики кибербезопасности
- Длительность: 3 дня (24 часа)
- Код курса: ANT0501
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить процессы, техники и инструменты мониторинга корпоративной кибербезопасности с помощью метрик. Рассматриваемые метрики включают в себя: набор кумулятивных метрик, статистические метрики угроз кибербезопасности. Также материал курса охватывает вопросы встраивания процессов мониторинга на основе метрик в архитектуру корпоративной кибербезопасности.
Аудитория курса:
Сотрудники компаний, принимающие проектные управленческие решения, а также инженеры, занимающие мониторингом и обработкой событий и инцидентов кибербезопасности.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Критерии защищенности информации.
Конфиденциальность, целостность, доступность.
Контроль доступа и его типы.
Механизмы контроля доступа.
Принципы построения архитектуры кибербезопасности.Модуль 2 – Кумулятивные метрики кибербезопасности.
Определение ключевых метрик для мониторинга.
Метрики периметра безопасности.
Метрики безопасности сетевой инфраструктуры.
Метрики контроля доступа.
Метрики безопасности сервисов и приложений.
Метрики доступности и надежности корпоративной инфраструктуры.
Оценка эффективности метрик.Модуль 3 – Статистические метрики угроз кибербезопасности.
Проблема оценки эффективности мер и решений кибербезопасности.
Базовые показатели эффективности.
Улучшение и оптимизация показателей эффективности.
Измерение базовых показателей и результатов их улучшения.
Измерение времени жизни угроз.
Измерение снижения объёма угроз.
Измерение скорости появления угроз.
Измерение времени между появлением угроз.
Измерение скорости утери контроля над угрозами. - ANT0502 — Управление рисками кибербезопасности
- Длительность: 5 дней (40 часов)
- Код курса: ANT0502
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
В материалах курса рассматриваются методы управления рисками, конкретнее – оценки рисков, основанные на построении численных вероятностных моделей, в частности моделей по методу Монте Карло. Ряд предложенных на семинаре методов оценки рисков представляют собой вероятностные методы Байеса, применяемые в условиях частичной неопределенности. Для всех
рассматриваемых методов приводятся методики корректировки, с учетом субъективных данных. Кроме того, на курсе разбираются методы оценки рисков в условиях «полной неопределённости». Основная цель семинара – показать возможность использования измеримых и математически достоверных численных методов управления рисками в контексте кибербезопасности.Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, а также сотрудники, принимающие проектные управленческие решения.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания о моделировании угроз кибербезопасности на уровне курса ANT0052.
Содержание курса:
Модуль 1 – Информация для задач оценки рисков.
Моделирование угроз кибербезопасности.
Неопределенность и измерения.
Теория вероятностей для ситуаций неопределенности.
Методы математической статистики.Модуль 2 – Моделирование вероятностных событий.
Метод моделирования Монте Карло.
Корректировка субъективных данных.
Измеримость результатов моделирования.
Кривые вероятностных потерь и их анализ.Модуль 3 – Информация для задач вероятностного моделирования.
Субъективные данные и их объективная оценка.
Декомпозиция входных данных.
Расширение модели Монте Карло условными вероятностями. Байесовские методы.
Специальные вероятностные модели.
Подбор релевантных распределений вероятности.
Измеримость и достоверность вероятностных моделей для оценки рисков кибербезопасности.Модуль 4 – Принятие решений на основе оценки рисков.
Кривые вероятностных потерь.
Стратегии и методики работы с рисками.Модуль 5 – Построение процесса управления рисками.
Методы принятия решений на основе оценки рисков.
Совместимость с международными системами управления ИБ: ISO, Cobit, NIST.Модуль 6 – Альтернативная система управления рисками. FAIR.
Концепция FAIR.
Измерения и анализ данных.
Методики расчета рисков.
Типовые сценарии.
Внедрение управления рисками по методике FAIR.Модуль 7 – Управление рисками в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Выбор технических решений на основе решений о работе с рисками.
Выбор метрик для мониторинга корпоративной кибербезопасности.
Методы модернизации вероятностной модели оценки рисков. - ANT5001 — Архитектура корпоративной кибербезопасности
- Длительность: 5 дней (40 часов)
- Код курса: ANT5001
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса
В данном курсе рассматриваются принципы, методы и инструменты построения архитектуры корпоративной кибербезопасности, которая включает систему управления информационной безопасностью, а также комплекс операционных и технических процессов кибербезопасности. Материл курса построен так, чтобы слушатели научились формировать из этих составляющих непротиворечивую и измеримую архитектуру, которая позволит определять и решать стратегические и тактические задачи кибербезопасности предприятия.
Аудитория курса:
Сотрудники компаний, отвечающие за проектирование и построение процессов кибербезопасности и информационной безопасности компании, руководители службы безопасности.
Предварительные требования к аудитории:
Рекомендуется обладать знаниями общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Принципы обеспечения кибербезопасности.
Конфиденциальность, целостность, доступность.
Контроль доступа.
Компоненты архитектуры кибербезопасности.
Использование паттернов безопасности при построении архитектуры.Модуль 2 – Система управления информационной безопасностью.
Задачи и процессы в области управления информационной безопасности.
Стандарт ISO 27001 как основа построения СУИБ.
Стандарты Cobit, CRISC, NIST как инструменты построения системы ИБ.
Задачи и ответственность руководителя системы ИБ(CISO).
Сертификации CISM и CISSP для руководителей системы ИБ.Модуль 3 – Центр операционной безопасности (SoC).
Задачи и процессы корпоративного SoC’а.
Принципы и стандарты организации и проведения аудита ИБ.
Принципы и стандарты организации и проведения пентестов.Модуль 4 – Технические решения кибербезопасности.
Технические решения корпоративного сегмента.
Технические решения промышленного сегмента.
Стандарт CIS для учета применения технических решений кибербезопасности.
Технические решения и подходы по обеспечению сохранности данных.Модуль 5 – Архитектура безопасности гибридного облака.
Обеспечение безопасности платформ виртуализации и контейнеризации.
Построение защищенного взаимодействия между компонентами гибридного облака.
Обеспечение сохранности данных в гибридной облачной инфраструктуре.
Существующие reference архитектуры построения безопасного гибридного облака.Модуль 6 – Интеграция решений ИИ в корпоративную систему кибербезопасности.
Применение машинного обучения для идентификации аномалий.
Использование ИИ для автоматической классификации инцидентов безопасности.
Взаимодействие ИИ-движка с традиционными средствами защиты (SIEM, IDS/IPS).
Использование AI Control Matrix Cloud Security Alliance для контроля обеспечения безопасности систем ИИ.Модуль 7 – Работа с требованиями регуляторов.
Требования в области работы с персональными данными и проблема приватности.
Требования в области работы с медицинскими данными.
Требования в области работы с финансовыми данными.
Требования в области безопасности промышленных объектов.
Режим работы с коммерческой тайной. - ANT5002 — Построение Центра операционной Безопасности (SoC’а)
- Длительность: 5 дней (40 часов)
- Код курса: ANT5002
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
В данном курсе рассматриваются принципы, методы и инструменты построения Центра
операционной Безопасности – SoC’а. Вопросы построения SoC’а необходимо рассматриваются в
контексте целей и задач работы SoC’а в рамках архитектуры корпоративной кибербезопасности.Аудитория курса:
Сотрудники компаний, отвечающие за проектирование и построение Центра операционной
Безопасности – SoC’а.Предварительные требования к аудитории:
Необходимы: знания общей кибербезопасности на уровне курса ANT0000, знания о
моделировании угроз, управлении рисками, метриками и политиками кибербезопасности на
уровне курсов ANT0051, ANT0052, ANT0501 и ANT0502.Содержание курса:
Модуль 1 – Архитектура и компоненты SoC’а.
Корпоративные процессы кибербезопасности.
Цели и задачи работы SoC’а.
Программно-аппаратные компоненты и персонал.
SoC в архитектуре корпоративной кибербезопасности.
Контроль безопасности процессов финансовой деятельности.
Исследовательские задачи SoC’а.Модуль 2 – Моделирование угроз и оценка рисков
кибербезопасности.
Моделирования угроз.
Оценки и управления рисками.Модуль 3 – Политики и метрики кибербезопасности.
Управление каталогом политик кибербезопасности.
Управление и оценка эффективности метрик кибербезопасности.Модуль 4 – Работа с уязвимостями и обновлениями.
Контроль уязвимостей.
Процессы тестирования и применения патчей и обновлений.Модуль 5 – Обработка инцидентов кибербезопасности.
Мониторинг событий и инцидентов.
Процесс обработки инцидентов.
Инструменты и инфраструктура для обработки инцидентов.
Автоматизация обработки инцидентов средствами SOAR.Модуль 6 – Цифровая криминалистика.
Процесс проведения криминалистических исследований.
Инструменты цифровой криминалистики.
Формирование и анализ индикаторов компрометации в цифровых системах.Модуль 7 – Анализ вредоносного п/о.
Управление каталогом вредоносного п/о.
Методы и инструменты reverse engineering’а.
Формирование сигнатур и индикаторов компрометации.Модуль 8 – Threat Intelligence.
Процессы Threat Intelligence.
Компоненты Threat Intelligence.
Источники информации Threat Intelligence.
Методы обработки информации Threat Intelligence.
Создание и использование платформы MLOPS.Модуль 9 – Культура корпоративной безопасности.
Проблемы человеческого фактора в кибербезопасности.
Создание культуры корпоративной безопасности.
Инструменты создания культуры корпоративной безопасности
Программа обучения персонала компании.
Построение процесса киберучений.Модуль 10 – Требования регуляторов.
Сопровождение внедрения требований регуляторов.
Контроль соответствия требованиям регуляторов. - ANT5003 — Проектирование систем физической безопасности
- Длительность: 5 дней (40 часов)
- Код курса: ANT5003
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить вопросы проектирования и нюансов внедрения систем объектовой физической безопасности, включая нормативные требования регуляторов РК.
Аудитория курса
Инженеры, отвечающие за проектирование и внедрение систем объектовой физической безопасности.
Предварительные требования
Необходимо обладать знаниями о работе систем аналоговой и цифровой связи, знаниями о работе сетей TCP/IP.
Содержание курса:
Модуль 1 - Введение проектирование комплекса систем безопасности.
Основные понятия.
Классификация систем безопасности.
Необходимость оборудования объектов системами безопасности.
Объектовая безопасность.
Автоматическая противопожарная защита.Модуль 2 - Система автоматической пожарной сигнализации.
Пожарные извещатели.
Размещение извещателей.
Адресная и безадресная системы автоматической пожарной сигнализации.Модуль 3 - Система оповещения и управления эвакуацией.
Выбор типа оповещения.
Расчет звукового давления оповещателей.
Размещение световых, звуковых и речевых оповещателей на объекте.Модуль 4 - Система автоматического пожаротушения.
Определение необходимости установки системы автоматического пожаротушения.
Выбор системы автоматического пожаротушения и огнетушащего вещества.
Алгоритм запуска системы автоматического пожаротушения.Модуль 5 - Взаимодействие систем автоматической противопожарной защит.
Взаимодействие систем автоматической пожарной сигнализации, оповещения и управления эвакуацией, автоматического пожаротушения.
Передача необходимых сигналов в смежные системы.Модуль 6 - Система охранной сигнализации.
Классификация объектов защиты.
Размещение охранных извещателей.
Рубежи охраны.
Тревожная сигнализация.
Передача тревожных сигналов на пульт охраны.Модуль 7 - Система контроля и управления доступом.
Разграничение прав доступа.
Зоны доступа.
Точки доступа.
Идентификация персонала.
Автоматические и централизованные системы.
Формирование отчетов.Модуль 8 - Система охранного видеонаблюдения.
Контролируемые участки объекта.
Размещение видеокамер.
Выбор системы видеонаблюдения.Модуль 9 - Взаимодействие систем объектовой безопасности.
Техническая укрепленность объекта.
Взаимодействие систем охранной сигнализации, контроля и управления доступом, охранного видеонаблюдения.
Технические средства безопасности объекта.
Вспомогательные системы.Модуль 10 - Выбор и размещение оборудования для специальных условий
Выбор оборудование для установки на улице и во взрывоопасных зонах.
Строительная климатология.
Параметры оборудование во взрывозащищенном исполнении.
Особенности размещения оборудования.
Оптоволоконные линии связи. - ANT0061 — Персональные данные и проблема приватности
- Длительность: 3 дня (24 часа)
- Код курса: ANT0061
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
В материалах данного курса рассматриваются вопросы работы с персональными данными, а также проблемы приватности. Кроме того, на курсе рассматриваются вопросы построения архитектуры корпоративной кибербезопасности с учётом проблем соблюдения приватности и соответствия требованиям регуляторов в части работы с персональными данными.
Аудитория курса:
Сотрудники компаний, отвечающие за задачи управления рисками, сотрудники, принимающие проектные управленческие решения, а также специалисты, отвечающие за обработку персональных данных и взаимодействие с регуляторами по этим вопросам.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Приватность.
Концепция приватности и её развитие.
Проблемы приватность в киберпространстве.
Приватность в контексте протоколов сети Интернет.
Моделирование и оценка угроз приватности.Модуль 2 – Моделирование угроз приватности.
Методики моделирования угроз приватности.
Создание модели угроз приватности по методике LINDDUN.
Оценка рисков приватности.Модуль 3 – Работа с персональными данными.
Персональные данные и приватность.
Стандарты и требования регуляторов.
Методы учета и анализа процессов и компонентов работы с персональными данными.
Деперсонификация данных.
Аудит процессов и компонентов работы с персональными данными.Модуль 4 – Моделирование угроз приватности в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Технические решения защиты приватности и персональных данных.
Организационные решения защиты приватности и персональных данных. - ANT0062 — Защита медицинских данных
Описание курса
- ANT0601 — Защита от утечек данных
- Длительность: 5 дней (40 часов)
- Код курса: ANT0601
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить методы и механизмы защиты от утечек
данных в архитектуре корпоративной кибербезопасности, в том числе с помощью систем Data Loss
Prevention. Проблемы утечки данных на курсе рассматриваются, в контексте проблем
корпоративного мошенничества и «инсайдерских» угроз.Аудитория курса:
Инженеры, обеспечивающие кибербезопасность корпоративной инфраструктуры, инженеры,
проектирующие архитектуру кибербезопасности, инженеры, занимающиеся обработкой
инцидентов кибербезопасности, а также аналитики, работающие с данными Threat Intelligence.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Содержание курса:
Модуль 1 – Проблема утечки данных.
Корпоративное мошенничество.
Промышленный шпионаж.
«Инсайдерские» угрозы.
Утечка данных.
Моделирование угроз утечки данных.
Оценка рисков утечки данных.Модуль 2 – Методы и механизмы защиты от утечек данных.
Методы защиты от корпоративного мошенничества.
Методы защиты от «инсайдерских» угроз.
Предотвращение утечек данных.
Обнаружение и реагирование на утечки данных.
Threat Intelligence для обнаружения утечек данных.
Системы Data Loss Prevention (DLP).Модуль 3 – DLP в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Интеграция DLP c компонентами Threat Intelligence.
Обработка инцидентов утечки данных.
Построение системы внутреннего корпоративного контроля. - ANT0602 — Сохранность данных
- Длительность: 3 дня (24 часа)
- Код курса: ANT0602
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, подходы, и технологии
обеспечения сохранности данных: архивирование, резервное копирование и обеспечение
катастрофоустойчивости. Также на курсе рассматриваются вопросы проектирования этих
процессов.Аудитория курса:
Сотрудники компаний, отвечающие за задачи резервного копирования данных и обеспечивающих
их сохранность.
Предварительные требования к аудитории:
Необходимы знания в области работы операционных систем и систем хранения данных.Содержание курса:
Модуль 1 – Корпоративные данные.
Приложения и данные в собственной инфраструктуре.
Приложения и данные в «облаке».
Модель угроз и риски при хранении данных.Модуль 2 – Обеспечение сохранности данных.
Отказоустойчивость и доступность.
Резервное копирование.
Disaster Recovery.
Архивирование.
Планирование и проектирование механизмов обеспечения сохранности
данных.Модуль 3 – Внедрение механизмов резервного копирования.
Резервное копирование данных в собственной инфраструктуре. Bareos.
Резервное копирование данных в «облаке». Corso. - ANT6001 — Защита авторского права средствами кибербезопасности
Описание курса
- ANT6002 — Защита данных в платёжных системах
- Длительность: 3 дня (24 часа)
- Код курса: ANT6002
- Стоимость
- Очный формат: 652 000 ₸
- Онлайн формат: 623 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить методы и механизмы защиты данных, используемых в современных платежных системах, таких как VISA и Mastercard. Также в рамках данного курса рассматриваются проблемы борьбы с мошенническими операциями с помощью систем anti-fraud.
Аудитория курса:
Инженеры, обеспечивающие кибербезопасность инфраструктуры платежных систем.
Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, желательны знания на уровне материалов курсов ANT0601, ANT5001.
Программа курса
Модуль 1 – Архитектуры платежных систем.
Платежные системы VISA, Mastercard,
Логика «жизни» платежных операций и банковских транзакций.
Архитектура и компоненты платежной системы.Модуль 2 – Модель угроз платежных систем.
«Классические» кибератаки.
«Инсайдерские» угрозы и промышленный шпионаж.
Утечки данных.
Создание модели угроз платежной системы.
Оценка рисков реализации угроз платежной системы.Модуль 3 – Методы защиты платежных систем.
Стандарт EMV как основа защиты банковских карт.
Стандарт PCI DSS как основа обеспечения безопасности платежных систем.
Методы защиты от «инсайдерских» угроз.
Предотвращение утечек данных и системы Data Loss Prevention.Модуль 4 – Защита от мошеннических операций.
Классификация схем мошенничества в платежных системах.
Системы anti-Fraud и их логика обнаружения мошеннических операций.
Архитектура anti-fraud систем на примере Tazama и Jube.
Тенденции интеграции ML/AI в системы anti-fraud. - ANT-ICS101 — Функционирование промышленных объектов
- Длительность: 3 дня (24 часа)
- Код курса: ANT-ICS101
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить основы функционирования систем промышленной автоматизации – АСУ ТП – на объектах промышленной инфраструктуры. На курсе разбираются ключевые элементы, механизмы и протоколы работы АСУ ТП, а также вопросы построения архитектуры системы промышленной автоматизации.
Аудитория курса
Люди, желающие познакомиться с функционированием механизмов промышленной автоматизации.
Предварительные требования
Желательно обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 - Компоненты АСУ ТП.
Промышленные объекты и системы управления процессами.
Распределенные системы управления.
SCADA.
Программируемые логические контроллеры.
Программируемые электронные компоненты.
Интерфейсы контроля и визуализации.
Секторы применения и архитектуры АСУ ТП.Модуль 2 - Взаимодействие компонентов АСУ ТП.
Физические каналы взаимодействия.
Типы физической передачи данных и организации протоколов обмена данными в АСУ ТП.
RS-232.
RS-485.
Токовая петля.
Принципы построения протоколов обмена данными в АСУ ТП.
Промышленные протоколы обмена данными в АСУ ТП.
Modbus/Modbus Plus/DNP3/DH485/HART/CAN/DeviceNet/ProfiBus/ProfiNet.
Особенности работы промышленных протоколов поверх стека TCP/IP.
Особенности построения отказоустойчивых и избыточных топологий компонентов АСУ ТП.
Поиск и устранение неисправностей промышленных протоколов.Модуль 3 - Программное обеспечение АСУ ТП.
Особенности kernel’а и ОС, используемых для PLC и IED.
Языки программирования компонентов АСУ ТП.
Ladder Diagram.
Function Block Diagram.
Sequential Function Chart.
Instruction List.
Structured Text. - ANT0071 — Мониторинг кибербезопасности на промышленных объектах
- Длительность: 3 дня (24 часа)
- Код курса: ANT0071
- Стоимость
- Очный формат: 520 000 ₸
- Онлайн формат: 498 500 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить процессы, техники и инструменты мониторинга событий и инцидентов кибербезопасности на промышленных объектах. Материал курса охватывает также вопросы организации процессов мониторинга событий и инцидентов кибербезопасности и их встраивания в общую архитектуру корпоративной кибербезопасности.
Аудитория курса
Инженеры, обеспечивающие кибербезопасность объектов промышленной инфраструктуры, а также инженеры, проектирующие архитектуру кибербезопасности объектов промышленной инфраструктуры. Инженеры, занимающиеся мониторингом и обработкой событий и инцидентов кибербезопасности, а также инженеры, занимающиеся цифровой криминалистикой.
Предварительные требования
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания принципов построения и функционирования промышленных объектов.
Содержание курса:
Модуль 1 - Объект промышленной инфраструктуры.
Промышленные процессы и управление ими.
АСУ ТП.
Компоненты АСУ ТП: DCS, SCADA, HMI.
Программируемые контроллеры – PLC – промышленных процессов.
Телеметрия.
Протоколы обмена данных на промышленном объекте.
Типовые архитектура промышленных объектов для различных отраслей.Модуль 2 - Модель угроз промышленного объекта.
Угрозы кибербезопасности промышленных объектов.
Угрозы безопасности жизнедеятельности.
Определение угроз кибербезопасности c помощью методики PHA.
Определение угрозы кибербезопасности с помощью методики STRIDE.
Построение модели угроз кибербезопасности промышленного объекта.
Управление рисками кибербезопасности для промышленного объекта.Модуль 3 - Мониторинг сетевой инфраструктуры.
Log’и и информация о сетевой активности.
Сбор и анализ сетевого трафика.
Информация о сессиях.
Статистические данные сетевой активности.
Централизованные и распределенные системы сетевого мониторинга.
Развертывание и поддержка системы сетевого мониторинга.Модуль 4 - Мониторинг конечных устройств.
Политики мониторинга и log’и PLC и RTU.
Политики мониторинга и log’и HMI.
Подсистема аудита Windows CE.
Развертывание и поддержка мониторинга Windows.
Настройки мониторинга и log’и QNX и VxWorks.
Подсистема аудита Linux.
Развертывание и поддержка мониторинга Linux.Модуль 5 - Мониторинг приложений.
Использование флагов и маяков в промышленной инфраструктуре для мониторинга.
Мониторинг SCADA.
Мониторинг баз данных Historian.Модуль 6 - Мониторинг событий и инцидент в архитектуре корпоративной кибербезопасности.
Архитектура корпоративной кибербезопасности.
Интеграция систем мониторинга.
SIEM-системы.
Дифференция событий и инцидентов кибербезопасности.
Подтверждение инцидентов кибербезопасности.
Обработка инцидентов кибербезопасности.
Цифровая криминалистика. - ANT0701 — Кибербезопасность промышленных объектов
- Длительность: 5 дней (40 часов)
- Код курса: ANT0701
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить архитектуру, принципы, методы и
механизмы обеспечения кибербезопасности объектов промышленной инфраструктуры. В курсе
также рассматриваются международные стандарты и регламенты в области кибербезопасности
объектов промышленной инфраструктуры, и содержаться уточнения по требованиям локальных
регуляторов.Аудитория курса:
Инженеры, обеспечивающие кибербезопасность объектов промышленной инфраструктуры, а
также инженеры, проектирующие архитектуру кибербезопасности объектов промышленной
инфраструктуры.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, а также знания
принципов построения и функционирования промышленных объектов.Содержание курса:
Модуль 1 – Объекты промышленной инфраструктуры.
Промышленные процессы и управление ими.
АСУ ТП.
Компоненты АСУ ТП: DCS, SCADA, HMI.
o Программируемые контроллеры – PLC – промышленных процессов.
Телеметрия.
Протоколы обмена данных на промышленном объекте.
Типовые архитектура промышленных объектов для различных отраслей.Модуль 2 – Модель угроз промышленного объекта.
Угрозы кибербезопасности промышленных объектов.
Угрозы безопасности жизнедеятельности.
Определение угроз кибербезопасности c помощью методики PHA.
Определение угрозы кибербезопасности с помощью методики STRIDE.
Построение модели угроз кибербезопасности промышленного объекта.
Управление рисками кибербезопасности для промышленного объекта.Модуль 3 – Регламенты и стандарты кибербезопасности промышленных объектов.
Модель Purdue.
Стандарт ISA/IEC 62443.
Применение стандарта ISA/IEC 62443.
Стандарты ISO 27000 и их совместимость со стандартами ISA/IEC62443.
Требования и регламенты локальных регуляторов.Модуль 4 – Кибербезопасность сетей промышленного объекта.
Принципы сегментации сетей на промышленных объектах.
Обеспечение взаимодействия корпоративной и промышленной сетей.
Проблемы безопасности промышленных протоколов обмена данными.
Возможности по фильтрации трафика.Модуль 5 – Кибербезопасность контроллеров и управляющих компонентов.
Основные типы PLC и других управляющих устройств.
Проблемы безопасности PLC.
Компоненты SCADA и их проблемы безопасности.
Проблемы безопасности баз данных промышленного назначения.Модуль 6 – Кибербезопасность конечных устройств.
Безопасность конечных устройств и приложений на ОС Windows.
Безопасность конечных устройств и приложений на ОС Linux.
Безопасность аппаратной части конечных устройств.Модуль 7 – Обработка инцидентов кибербезопасности на промышленных объектах.
Мониторинг событий и инцидентов кибербезопасности.
Реагирование на события и инциденты кибербезопасности.
Модернизация модели угроз и расчетов рисков на основании данных о
новых событиях и инцидентах.Модуль 8 – Проектирование и управление кибербезопасностью на промышленном объекте.
Интеграция процессов и задач кибербезопасности промышленного объекта
в корпоративный SoC.
Физическая безопасность промышленного объекта.
Проектирование ролевой модели и правил контроля доступа.
Аудит кибербезопасности и пентест промышленного объекта.
Создание каталога метрик кибербезопасности промышленного объекта.Модуль 9 – Кибербезопасность промышленного IoT.
Архитектура промышленного IoT.
Модель угроз и управление рисками промышленного IoT.
Регламенты и стандарты кибербезопасности для промышленного IoT.
Методы и механизмы кибербезопасности промышленного IoT.
Операционная кибербезопасность промышленного IoT.
Управление кибербезопасностью промышленного IoT. - ANT7001 — Пентест промышленных объектов
- Длительность: 5 дней (40 часов)
- Код курса: ANT7001
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, механизмы и инструменты
проведения тестирования на возможность проникновение – pentest’а – на объект промышленной
инфраструктуры. В данном курсе пентест рассматривается как один из процессов, необходимых
для построения кибербезопасности промышленного объекта, поэтому в нём также поднимаются
методологические вопросы организации пентеста, а также использования данных, полученных в
результате его проведения.Аудитория курса:
Инженеры, занимающиеся проведением тестирований на проникновения, а также инженеры,
проектирующие архитектуру корпоративной кибербезопасности и архитектуру кибербезопасности
объектов промышленной инфраструктуры.Предварительные требования к аудитории:
Необходимы знания общей кибербезопасности на уровне курса ANT0000, знания о работе сетей
TCP/IP на уровне курса ANT-N101, а также знания о принципах, методах и механизмах
кибербезопасности объектов промышленной инфраструктуры на уровне курса ANT0701.
Рекомендуется обладать знаниями о моделировании угроз на уровне курса ANT0052Содержание курса:
Модуль 1 – Принципы организации пентеста.
Цели и задачи проведения пентеста.
Pentest в рамках архитектуры корпоративной безопасности.
Цикл жизни кибератак.
Модели кибератак.
Инструменты для проведения пентеста.
Обработка результатов проведения пентеста.Модуль 2 – Подготовка к проведению кибератаки.
Использование информации из открытых источников. OSINT.
Сканирование целей и выявление уязвимых мест для кибератак.
Подбор нужных инструментов и методов проведения кибератаки.Модуль 3 – Организация кибератак на сетевые компоненты.
Перехват трафика.
Получение доступа к беспроводным каналам связи.
Методы обхода систем сетевой кибербезопасности.
Организация кибератак на протоколы IP-сетей.
Организация кибератак на сервисы удаленного управления ОС.
Организация кибератак на протоколы промышленных сетей.
Организация кибератак на PLC.
Организация кибератак на системы SCADA.Модуль 4 – Организация кибератак через электронную почту.
Подготовка вредоносных вложений.
Базовые принципы социальной инженерии.
Кибератаки на протоколы электронной почты.
Получение доступа к ОС пользователей через вредоносные вложения.
Контроль за элементами промышленного объекта через вредоносные
вложения.Модуль 5 – Развитие кибератаки с базовым доступом к ОС.
Извлечение данных и учетных записей.
Эскалация привилегий учетной записи.
Распространение контроля над другими системами в ходе кибератаки.
Удаление следов кибератаки.
Нарушение работы элементов HMI.Модуль 6 – Подготовка отчета о проведении пентеста.
Модель угроз и результаты проведения пентеста.
Управление рисками на основе данных, выявленных пентестом.
Модернизация корпоративной программы учета уязвимостей.
Модернизация стратегических метрик кибербезопасности. - ANT0801 — Системы UEBA
Описание курса
- ANT8001 — Кибервиктимология
- Длительность: 3 дня (24 часа)
- Код курса: ANT8001
- Стоимость
- Очный формат: 547 000 ₸
- Онлайн формат: 525 000 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить аспекты т.н. социальной инженерии с точки зрения её использования злоумышленниками против сотрудников компании. Основу курса составляют материалы, основанные на психологических исследованиях, а также на методиках организационного управления сотрудниками
Аудитория курса
Специалисты службы безопасности, отвечающие за работу с сотрудниками компании, специалисты службы HR.
Предварительные требования
Необходимы знания общей кибербезопасности на уровне курса ANT0000.
Как устроено обучение
Онлайн-курс
Онлайн-курс предполагает групповые занятия с инструктором через систему видеоконференцсвязи, кроме того, домашние задания и экзамен. Слушателям предоставляются учебные пособия и дополнительные материалы
Для корпоративных клиентов
Обучение для корпоративных клиентов включает в себя онлайн-курсы и курсы самообучения, а также дополнительные сервисы, необходимые корпоративным клиентам: организация планов обучения для подразделений клиента, проведение оценки эффективности обучения и т.д.
Программа курса
Модуль 1. Архитектура кибербезопасности и человеческий фактор.
Кибербезопасность в корпоративной среде.
Паттерн многоуровневой системы кибербезопасности.
«Самое слабое звено» в системе кибербезопасности.
Модель поведения человека в корпоративной среде.
Цели и методы социальной инженерии.Модуль 2. Моделирование угроз и модель нарушителя.
Модель угроз для компании.
Принципы создания модели угроз.
Методики выявления угроз для ресурсов компании.
Учет человеческого фактора в модели угроз.
Модель нарушителя.
Профилирование нарушителей. Diamond Model.Модуль 3. Модель внутреннего нарушителя. Insider Threat.
Разница между нарушителем и злоумышленником.
Промышленный шпионаж.
Утечки данных.
Мошенничество.
Создание модели внутренних угроз компании.Модуль 4. Психологические модели личности и профессиональная деформация.
Общие психологические особенности поведения человека.
Модели классификации личностей.
Особенности поведения и взаимодействия с разными типами личностей.
Профессиональная деформация и её причины.
Влияние профессиональной деформации на личность.
Особенности поведения и взаимодействия с людьми с профессиональной деформацией.Модуль 5. Модели и методы влияния на человека.
Эксплуатация общих психологических уязвимостей поведения человека.
Модель оказания влияния на человека.
Методы манипуляции.
Методы провокации.Модуль 6. Методы предотвращения влияния на человека.
Психологическая подготовка сотрудников.
Взаимодействие людей внутри компании.
Роль и функции HR в обеспечении защиты сотрудников.
Обучение Cybersecurity Awareness и создание культуры кибербезопасности в компании.Модуль 7. Культура кибербезопасности.
Условия существования культуры кибербезопасности.
Обучение сотрудников компании. Cybersecurity Awareness.
Построение культуры кибербезопасности компании. - ANT8002 — Киберкриминология
Описание курса
- ANT0091 — Защита от вредоносного п/о
- Длительность: 5 дней (40 часов)
- Код курса: ANT0091
- Стоимость
- Очный формат: 556 000 ₸
- Онлайн формат: 539 500 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить ситуацию с активностью вредоносного п/о и рисками заражения им корпоративным устройств и операционных систем. На курсе разбираются возможные действия и инструменты по предотвращению заражения, обнаружению, и блокированию действий вредоносного п/о в корпоративной инфраструктуре. Также на курсе разбираются возможные методы и инструменты очистки зараженных систем от вредоносного п/о.
Аудитория курса
Инженеры отделов кибербезопасности и специалисты Центров Операционной Безопасности, в чьи задачи входит обеспечение защиты компании от заражения вредоносным п/о.
Предварительные требования
Необходимо обладать знаниями на уровне материалов курсов ANT-N101, ANT0000. Рекомендуется обладать знаниями на уровне материалов курсов ANT-OL101 и ANT-OW101.
Как устроено обучение
Онлайн-курс
Онлайн-курс предполагает групповые занятия с инструктором через систему видеоконференцсвязи, кроме того, домашние задания и экзамен. Слушателям предоставляются учебные пособия и дополнительные материалы
Для корпоративных клиентов
Обучение для корпоративных клиентов включает в себя онлайн-курсы и курсы самообучения, а также дополнительные сервисы, необходимые корпоративным клиентам: организация планов обучения для подразделений клиента, проведение оценки эффективности обучения и т.д.
Программа курса
Модуль 1. Вредоносное п/о.
Классификация вредоносного п/о.
Вирусы и методы их распространения.
Черви, автономное распространение вредоносного п/о.
Вредоносные действия п/о. Траяны и keylogger’ы, шифровальщики.
Сокрытие вредоносной активности. Rootkit’ы.
Обход механизмов контроля доступа. Backdoor’ы.
Botnet’ы и удаленное управление зараженными устройствами.
Заражение вредоносным п/о браузеров.
«Нежелательное» п/о. Spyware.
Методы обнаружения вредоносного п/о.
Реагирование на инциденты заражения вредоносным п/о.Модуль 2. Защита от вирусов.
Классификация и цикл жизни вирусов.
Контроль за каналами распространения вирусов.
Индикаторы заражения систем вирусами. Правила YARA.
Поиск зараженных систем и файлов.
Обнаружение факта заражение вирусом средствами HIDS.
Очистка файлов от вирусов.
Использование антивирусного п/о.
Использование автоматизированных sandbox’ов.Модуль 3. Защита от червей.
Классификация и цикл жизни червей.
Контроль за каналами распространения червей.
Предотвращение заражения червями. «Управление» уязвимостями.
Предотвращение попыток распространения червей средствами IPS.
Обнаружение активности червей средствами анализа трафика.
Обнаружение активности червей средствами Honeypot.Модуль 4. Защита от траянов, Keylogger'ов шифровальщиков.
Последствия заражения вредоносным п/о и его действия.
Обнаружение и блокирование активности траянов.
Обнаружение и блокирование активности keylogger’ов.
Очистка ОС системы от зараженных файлов.
Устранение последствий заражения шифровальщиками.Модуль 5. Защита от Rootkit'ов.
Классификация rootkit’ов.
Методы контроля доступа для предотвращения заражения rootkit’ами.
Обнаружение заражения rootkit’ами средствами HIDS.
Очистка и восстановление ОС, зараженной rootkit’ами.Модуль 6. Специальные темы.
Обнаружение и блокирование активности botnet’ов.
Защита web-браузеров от вредоносного п/о.
Проблема backdoor’ов.Модуль 7. Защита от вредоносного п/о в архитектуре корпоративной кибербезопасности.
Подготовка конечных устройств с учетом мер защита от вредоносного п/о.
Подготовка инфраструктуры для защиты от вредоносного п/о.
Подготовка playbook’ов обработки инцидентов заражения вредоносным п/о.
Обработка инцидентов заражения вредоносным п/о.
Основы анализа и reverse engineering’а вредоносного п/о. - ANT0901 — Уязвимости п/о
Описание курса
- ANT0902 — Shellcode’ы
Описание курса
- ANT0903 — Exploit kit’ы
Описание курса
- ANT9001 — Анализ и reverse engineering вредоносного п/о
- Длительность: 5 дней (40 часов)
- Код курса: ANT9001
- Стоимость
- Очный формат: 771 500 ₸
- Онлайн формат: 753 000 ₸
Описание курса
Описание курса
Материал данного курса позволит слушателям изучить специфическую предметную область деятельности аналитиков вредоносного п/о – его reverse engineering, то есть восстановление логики работы и исходных компонентов из зараженных файлов, или из бинарных файлов самого «вредоноса»
Аудитория курса
Инженеры отделов кибербезопасности и специалисты Центров Операционной Безопасности, в чьи задачи входит обеспечение защиты компании от заражения вредоносным п/о.
Предварительные требования
Необходимо обладать знаниями на уровне материалов курсов ANT-N101, ANT0000, ANT0091, ANT-OL101 и ANT-OW101.
Как устроено обучение
Онлайн-курс
Онлайн-курс предполагает групповые занятия с инструктором через систему видеоконференцсвязи, кроме того, домашние задания и экзамен. Слушателям предоставляются учебные пособия и дополнительные материалы
Для корпоративных клиентов
Обучение для корпоративных клиенов включает в себя онлайн-курсы и курсы самообучения, а также дополнительные сервисы,необходимые корпоративным клиентам: организация планов обучения для подразделений клиента, проведение оценки эффективности обучения и т.д.
Программа курса
Модуль 1. Методы анализа вредоносного п/о
Классификация вредоносного п/о.
Статический анализ вредоносного п/о.
Анализ поведения вредоносного п/о.
Статический анализ кода вредоносного п/о.
Динамический анализ кода вредоносного п/о.Модуль 2. Основы reverse engineering'a вредоносного п/о
Анализ операционных структур и зависимостей исполняемого кода.
Дизассемблирование кода.
Декомпиляция кода.
Восстановление логики работы программных функций.
Восстановление логики flow control.
Восстановление логики взаимодействия с API.
Особенности reverse engineering’а кода x64 и ARM.Модуль 3. Reverse engineering "защищающегося" вредоносного кода.
Функции packer’ов и dropper’ов вредоносного кода.
Reverse engineering вредоносного кода, использующего packer’ы.
Reverse engineering вредоносного кода, использующего обфускацию.
Reverse engineering вредоносного кода, использующего техники API hooking’а.
Логика анализа оперативной памяти, используемой вредоносным кодом.
Методы reverse engineering’а вредоносного кода, скрывающего свои действия.Модуль 4. Reverse engineering офисных файлов и скриптов.
Анализ файлов PDF.
Анализ файлов Microsoft Office.
Анализ файлов RTF.
Reverse engineering активного содержимого «офисных» файлов.
Деобфускация вредоносных скриптов. - ANT9002 — Exploit’ы ОС Windows
Описание курса
- ANT9003 — Exploit’ы ОС Linux
Описание курса
Huawei
- HDCF — HCIA-Data Center Facility
- Длительность: 4 дня (32 часа)
- Код курса: HDCF
- Стоимость
- Очный формат: 696 500 ₸
- Онлайн формат: 643 500 ₸
Описание курса
Описание:
Курс HCIA-Data Center Facility (версия 2.0) представляет собой базовую программу обучения по управлению критически важной инженерной инфраструктурой центров обработки данных (ЦОД). Он охватывает эксплуатацию, обслуживание и принципы работы ключевых систем жизнеобеспечения дата-центра.
Цель обучения:
Безопасность (EHS): Изучение стандартов охраны труда и техники безопасности при работе на объектах ЦОД.
Энергоснабжение: Понимание работы систем распределения электроэнергии, ИБП (UPS) и аккумуляторных батарей.
Терморегуляция: Изучение систем охлаждения, включая прецизионные кондиционеры и управление воздушными потоками.
Мониторинг: Настройка систем управления инфраструктурой и использование протоколов связи (SNMP, Modbus).
Вспомогательные системы: Обзор систем пожаротушения, кабельных систем и конструктива стоек.Целевая аудитория:
Инженеры по эксплуатации и обслуживанию (O&M): Специалисты, обеспечивающие повседневную работу систем питания и охлаждения.
Инженеры по внедрению: Технический персонал, занимающийся установкой и пусконаладкой модульных дата-центров (серий Huawei FusionModule).
Проектировщики инфраструктуры: Специалисты, которым необходимы базовые знания стандартов и архитектуры современных ЦОД.Программа курса:
Основы EHS (Экология, здоровье и безопасность)
Правила безопасности: Введение в стандарты EHS, квалификация персонала и использование средств индивидуальной защиты (СИЗ).
Предотвращение аварий: Анализ причин несчастных случаев на объектах и методы их избегания при проведении строительных и монтажных работ.Инфраструктура и стандарты ЦОД
Развитие отрасли: История и тренды развития дата-центров, ключевые показатели энергоэффективности (например, PUE).
Архитектура: Классификация ЦОД (Tier I–IV) и обзор панорамы решений Huawei для различных масштабов бизнеса.Системы электроснабжения и бесперебойного питания
Распределение питания: Основы низковольтного оборудования, концепции заземления и конфигурация систем распределения (LVD).
ИБП (UPS): Принципы работы, топологии ИБП Huawei, схемы резервирования и типичные сценарии применения.
Аккумуляторы: Технологии свинцово-кислотных и литий-ионных батарей, их структура, характеристики и обслуживание.Системы охлаждения и кондиционирования
Принципы охлаждения: Термодинамические циклы, классификация систем и типы оборудования для обработки воздуха.
Прецизионные кондиционеры: Детальное изучение систем с воздушным и водяным охлаждением, а также технологий непрямого испарительного охлаждения.Мониторинг и управление (DCIM)
Интерфейсы и протоколы: Основы передачи данных, использование протоколов SNMP, Modbus и специфических телекоммуникационных стандартов.
Функционал NetEco: Интегрированное управление питанием, охлаждением, видеонаблюдением и контролем доступа через единую платформу мониторинга.Вспомогательные подсистемы
Безопасность и конструкт: Системы пожаротушения, приточно-вытяжная вентиляция, шкафные решения (стойки) и кабельные системы.
Герметизация коридоров: Изучение изоляции «горячих» и «холодных» коридоров для оптимизации воздушных потоков. - HCIAST — HCIA-Storage V5.0
- Длительность: 5 дней (40 часов)
- Код курса: HCIAST
- Стоимость
- Очный формат: 969 000 ₸
- Онлайн формат: 952 000 ₸
Описание курса
Objectives
After completing the training, you will be able to:
1. Understand definitions of information and data.
2. Understand development trends of data storage products.
3. Understand functions and components of controller enclosures and disk enclosures.
4. Understand concepts of scale-up and scale-out, as well as related cables and interface modules.
5. Understand working principles of RAID 2.0+.
6. Understand dynamic RAID and RAID-TP.
7. Understand common protocols used in storage systems.
8. Understand working principles and characteristics of different protocols.
9. Understand storage network architecture evolution.
10. Understand storage networking technology evolution.
11. Be familiar with the features and positioning of storage products.
12. Understand DeviceManager, CLI, and UltraPath storage system management tools.
13. Understand service characteristics, implementation principles, and application scenarios of resource tuning technologies.
14. Understand service characteristics, implementation principles, and application scenarios of data protection technologies.
15. Be familiar with common storage system O&M management tools and typical O&M processes.Target Audience
1. Personnel who want to become storage engineers
2. Personnel who want to obtain HCIA-Storage V5.0 certificationPrerequisites
Basic knowledge of IT technologies and networks
Training Content
1. Storage Technology Trends
Storage Technology Trends2. Basic Storage Technologies
Intelligent Data Storage System
RAID Technologies
Common Storage Protocols
Storage Network Architecture3. Huawei Intelligent Storage Products and Features
Huawei Intelligent Storage Products
Storage System Operation Management
Storage Resource Tuning Technologies and Applications
Storage Data Protection Technologies and Applications4. Storage System O&M Management
Storage System O&M Management - HCIPST — HCIP-Storage V5.5
- Длительность: 5 дней (40 часов)
- Код курса: HCIPST
- Стоимость
- Очный формат: 1 064 000 ₸
- Онлайн формат: 1 048 500 ₸
Описание курса
HCIP-Storage V5.5
Objectives
On completion of this program, the participants will be able to:
Know about Product overview
Know Software and hardware architecture
Understand Key technologies
Understand Value-added features
Know Typical application scenarios
Understand the installation process of storage products
Understand the service configuration process of storage products
Understand concepts related to storage performance
Have general knowledge of storage performance evaluation methods
Understand the methods of locating storage system performance problems
Have a good command of storage system performance tuning methods
Have a good command of storage system performance tests and tool usage
Understand how to use storage O&M management tools
Understand routine storage management operations
Understand the basics of storage system troubleshooting
Understand the procedures for troubleshooting a storage system
Understand different ways to troubleshoot a storage system
Understand how to replace partsTarget Audience
Those who want to be storage engineer
Those who want to achieve HCIP-Storage certification
Administrator of storage arrayPrerequisites
Understand basic network knowledge
Understand computer components
Understand the basic knowledge of the Windows and Linux operating systems
Have a good command of HCIA-StorageTraining Content
Storage Technologies and Applications
Flash Storage Technologies and Applications
Product overview
Software and hardware architecture
Key technologies
Value-added features
Typical application scenariosData Protection Technologies and Applications
OceanProtect backup storage
OceanStor BCManager
Typical application scenariosScale-Out Storage Technologies and Applications
Concepts and development trends of scale-out storage
Software and hardware architectures of OceanStor Pacific products
Key technologies of OceanStor Pacific products
Key features of OceanStor Pacific products
Application scenarios of OceanStor Pacific productsStorage Product Deployment
Flash Storage Product Deployment
Flash Storage Product Installation
Flash Storage Service ConfigurationScale-Out Storage Product Deployment
Hardware Installation Process
Network Planning
Software Installation Process
Service ConfigurationStorage System Performance Tuning
Storage Performance Overview
Storage Performance Evaluation
Storage Performance Problems
Storage Performance Tuning
Storage Performance TestStorage System O&M and Troubleshooting
Storage System O&M Management
Storage System O&M Management Tools
Routine ManagementStorage System Troubleshooting
Basics of Troubleshooting
Troubleshooting Procedure
Collecting Information and Reporting a Fault
Replacing Parts
Case Analysis - DORADO — Администрирование Dorado v.6
- Длительность: 5 дней (40 часов)
- Код курса: DORADO
- Стоимость
- Очный формат: 1 064 000 ₸
- Онлайн формат: 1 048 500 ₸
Описание курса
Кому следует посетить
Системным администраторам систем хранения данных
Предварительные требования
Базовые знания в области систем хранения данных
Цели курса
После прохождения данного курса слушатели будут уметь:
Понимать позиционирование Dorado V6, особенности аппаратного обеспечения и программного обеспечения
Производить первичную настройку Dorado V6
Понимать расширенные функции системы
Настраивать расширенные функции
Понимать задачи ежедневного обслуживания и управления
Знать методологию поиска и устранения неполадокПрограмма курса
Введение в Dorado V6
Позиционирование продукта, спецификации
Обзор аппаратного обеспечения
Обзор программного обеспеченияБазовая настройка Dorado V6
Процесс первичной конфигурации
Процесс базовой настройки сервисовРасширенные функции Dorado V6
Механизмы защиты данных в Dorado V6
Технические принципы и приложения HyperSnap
Технические принципы и приложения HyperMetro
Технические принципы и приложения HyperClone
Технические принципы и приложения HyperReplicationПроизводительность Dorado V6, оптимизация ресурсов
Технические принципы и приложения SmartTier technical
Технические принципы и приложения SmartDeduplication&Compression
Технические принципы и приложения SmartVirtualization
Технические принципы и приложения SmartQuotaЗадачи обслуживания Dorado V6, процесс поиска и устранения неполадок
Управление и обслуживание Dorado V6
Ежедневное обслуживание
УправлениеПоиск и устранение неполадок Dorado V6
Методы и инструменты для поиска неисправностей
Распространенные сценарии проблем - ANT-HS000 — Устранение неполадок СХД Huawei OceanStor
- Длительность: 3 дня (24 часа)
- Код курса: ANT-HS000
- Стоимость
- Очный формат: 788 500 ₸
- Онлайн формат: 772 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы и инструменты диагностики и устранения неисправностей СХД Huawei OceanStor, а также подходы к оптимизации их использования.
Аудитория курса:
Cпециалисты, имеющих опыт работы с системами хранения данных и желающих углубить свои навыки по диагностике и решению комплексных проблем функционирования и производительности СХД OceanStor.
Предварительные требования к аудитории:
Базовые знания концепций хранения данных и опыт работы с системами Huawei OceanStor
Длительность курса:
3 дня.
Содержание курса:
Модуль 1 – Обзор архитектуры и компонентов Huawei OceanStor.
Архитектура системы хранения
Структурные компоненты: контроллеры, дисковые полки, сетевые коммутаторы.
Взаимодействие компонентов.
Логическая и физическая архитектура
Управляющие контроллеры.
Диски и блоки хранения данных.
Программное обеспечение и его компоненты
Лабораторная работа 1. Первичная настройка и подготовка СХД OceanStorМодуль 2 – Инструменты диагностики и мониторинга
Возможности инструментов SmartKit
Журналирование событий и снятие метрик
Лабораторная работа 2. Использование SmartKit для обследования устройства и настройка мониторинга СХД OceanStorМодуль 3 – Диагностика и устранение неполадок файлового доступа
Настройки и мониторинг NFS
Настройки и мониторинг CIFS
Устранение неполадок работы протоколов файлового доступа
Лабораторная работа 3. Устранение неполадок протоколов CIFS и NFSМодуль 4 – Диагностика и устранение неполадок блочного доступа
Настройки и мониторинг iSCSI
Настройки и мониторинг FC
Настройки и мониторинг NVMe
Лабораторная работа 4. Устранение неполадок протоколов блочного доступаМодуль 5 – Мониторинг и оптимизация производительности
Мониторинг производительности
Настройки и инструменты управления производительностью
Лабораторная работа 5. Устранение неполадок производительностиМодуль 6 – Неполадки аппаратных компонентов
Неполадки контроллеров
Неполадки дисковой подсистемы
Неполадки сетевых подключений и сетевых адаптеров
Восстановление после сбоев и резервирование конфигурации
Лабораторная работа 6. Диагностика проблем аппаратного обеспечения - HCIASE — HCIA-Security
- Длительность: 5 дней (40 часов)
- Код курса: HCIASE
- Стоимость
- Очный формат: 1 117 500 ₸
- Онлайн формат: 1 104 500 ₸
Описание курса
Objectives:
On completion of this program, the participants will be able to:
Describe the definition and characteristics of network security
Describe the development history and trend of network security
Understand the data definition and transmission process
Describe the working principles of the TCP/IP protocol stack
Describe the working principles of common protocols
Describe common security threats to enterprise networks
Describe how to cope with common network security threats
Describe firewall security zones
Describe the stateful inspection and session mechanisms of the firewall
Describe the technical background of NAT
Know the classification and working principles of NAT
Know the application scenarios of different types of NAT
Understand the hot standby fundamentals
Master the basic hot standby configurations
Describe user authentication technologies
Describe the different types of intrusion prevention
Describe the fundamentals of intrusion prevention
Deploy network antivirus policies
Development of encryption and decryption technologies
Processes of various encryption and decryption methods
Principles of encryption and decryption algorithms
Describe data communication security technologies
Describe the PKI certificate system architecture
Describe the PKI working mechanism
Application scenarios of encryption technologies
Configuration methods for different VPN technologiesTarget Audience:
Cyber security junior engineer who hopes to have information security capabilities.
Prerequisites:
Basic knowledge of TCP/IP
Basic knowledge of Routing and SwitchingTraining Content:
1. Security information and security overview
Network Security Concepts and Specifications
Network Security Definition
Future Network Security Trends
Information Security Standards and Specifications
Network Basics
Network Reference Model
Common Network Devices
Common Network Security Threats and Threat Prevention
Overview of Enterprise Network Security Threats
Communication Network Security Requirements and Solutions
Zone Border Security Threats and Threat Prevention
Computing Environment Security Threats and Threat Prevention
Security Requirements and Solutions of the Management Center2. Network Security Basis
Firewall Security Policies
Firewall Basic Principles
Application Scenarios of Firewalls in Cyber Security Solutions
Firewall NAT Technologies
Overview of NAT
Source NAT
Destination NAT
Bidirectional NAT
NAT ALG and NAT Server
Firewall Hot Standby Technologies
Hot Standby Fundamentals
Hot Standby Basic Networking and Configuration
Firewall User Management Technologies
AAA Principles
Firewall User Authentication and Application
Firewall IPS
Intrusion Overview
Intrusion Prevention
Antivirus3. Application of Encryption and Decryption
Fundamentals of Encryption and Decryption Technologies
Encryption/Decryption Technology Development
Encryption/Decryption Technology Fundamentals
Common Encryption/Decryption Algorithms
Hash Algorithms
PKI Certificate System
Data Communication Security Technologies
PKI System Structure
PKI Working Mechanism
Encryption Technology Applications
Application of Cryptography
VPN Overview
VPN Configuration - HCIPS — HCIP-Security
- Длительность: 10 дней (80 часов)
- Код курса: HCIPS
- Стоимость
- Очный формат: 1 795 000 ₸
- Онлайн формат: 1 788 000 ₸
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe the principles of firewall high reliability technologies
Understand the high reliability networking mode of the firewall
Describe the application scenarios of firewall high reliability technologies
Describe the application scenarios of bandwidth management
Describe the fundamentals of bandwidth management
Describe the application scenarios of quota control policies
Describe the fundamentals of quota control policies
Master the configurations of firewall traffic management
Describe the application scenarios of virtual systems
Describe the basic concepts of virtual systems
Master how to configure virtual systems
Describe basic concepts of intelligent uplink selection
Describe the application scenarios of intelligent uplink selection
Master the configuration procedure of intelligent uplink selection
Understand the basic principles of IPsec VPN
Understand the typical application scenarios of IPsec VPN
Master the highly reliable IPsec VPN configuration method
Master IPsec VPN troubleshooting method
Understand application scenarios of SSL VPN
Master the main functions and principles of SSL VPN
Understand the SSL VPN networking
Master the configuration of SSL VPN
Describe the principles of common single-packet attacks
Describe the principles of common DDoS attacks
Describe the principles of defending against single-packet attacks
Describe the principles of defending against DDoS attacks
Describe the anti-DDoS solution and related defense principles
Describe the cyber kill chain
Describe the harm of vulnerabilities
Master vulnerability defense measures
Describe the technical background of the content security filtering technologies
Describe basic principles of content security filtering technologies
Master the configuration of content security filtering technologies
Describe the basic concepts of cyber security emergency response
Describe the handling process of cyber security emergency response
Understand technologies related to cyber security emergency response
Describe the basic concepts of NAC
Describe the working principles of user identity authentication
Describe common access authentication modes and their working principles
Configure user access authentication
Apply various network security technologies
Design the network security solution
Deploy the network security solution
Be familiar with network security O&MTarget Audience
Those who hope to become a network security professional
Cyber Security engineersPrerequisites
HCIA certification or the similar knowledge
Training Content
1 Secure communication network
Overview of Cyber Security Certification
Capability Models for Cyber Security Engineers
Cyber Security Certification
Firewall High Reliability Technologies
Overview of Firewall High Reliability Technologies
Firewall Hot Standby
Firewall Link High Reliability
Hot Standby Version Upgrade and Troubleshooting
Firewall Traffic Management
Firewall Bandwidth Management
Firewall Quota Control Policies
Example for Configuring Traffic Management
Firewall Virtual System
Virtual System Overview
Basic Concepts of Virtual Systems
Communication Between Virtual Systems
Virtual System Configuration
Firewall Intelligent Uplink Selection
Overview of Intelligent Uplink Selection
Principles of Intelligent Uplink Selection
Configuration of Intelligent Uplink Selection
IPsec VPN Technology and Application
Basic Principles of IPsec VPN
Application Scenarios of IPsec VPN
High Reliability of IPsec VPN
Troubleshooting of IPsec VPN
SSL VPN Technology and Application
Overview of SSL VPN
Service Functions of SSL VPN
Examples for Configuring the SSL VPN
SSL VPN Troubleshooting2 Security zone border
Cyber Attacks and Defense
Firewall Attack Defense Technologies
Single-Packet Attack Defense
DDoS Mitigation
Anti-DDoS
Vulnerability Defense and Penetration Testing
Vulnerability
Vulnerability Defense
Penetration Testing
Content Security Filtering Technologies
Overview of Content Security Filtering Technologies
Principles of Content Security Filtering Technologies
Examples for Configuring Content Security Filtering Technologies3 Security management center
Emergency Response
Emergency Response Overview
Emergency Response Process
Emergency Response Technologies and Cases
Network Access Control
Overview of NAC
User Identity Authentication
Access Authentication
NAC Configuration
Comprehensive Cases of Enterprise Network Security
Overview of Enterprise Network Security Requirements
Enterprise Network Security Solution Design and Deployment
Enterprise Network Security Troubleshooting - HCIAW — HCIA-WLAN V3.0
- Длительность: 5 дней (40 часов)
- Код курса: HCIAW
- Стоимость
- Очный формат: 1 033 000 ₸
- Онлайн формат: 1 017 500 ₸
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe the basic concepts and development history of WLAN.
Compare WLAN and Wi-Fi.
Describe typical application scenarios of WLAN technologies.
Illustrate the challenges and development trend of WLAN.
Describe basic concepts of wireless communication.
Distinguish 802.11 protocols and describe Wi-Fi generations.
Describe the highlights of Wi-Fi 6.
Describe key WLAN technologies.
Describe basic concepts in WLAN.
Describe WLAN networking modes.
Differentiate WLAN forwarding models.
Evaluate Huawei’s typical WLAN networking solutions.
Describe the origin and implementation of CAPWAP.
Understand the CAPWAP tunnel establishment process.
Describe how an AP joins an AC and how STAs go online.
Master the working mechanism of STA roaming.
Explain the WLAN development process.
Classify Huawei WLAN products.
Describe features of Huawei WLAN products.
Identify power supply modes of APs.
Describe development of the VRP.
Use VRP basic operation commands.
Learn the methods of upgrading ACs and APs.
Distinguish characteristics of Fit and Fat APs.
Perform service configuration of Fat APs.
Describe WLAN security threats.
Describe WLAN security defense mechanisms.
List common WLAN access authentication modes.
Understand the WLAN service configuration procedure.
Configure basic WLAN services.
Summarize common WLAN faults.
Describe the WLAN troubleshooting process.
Know common troubleshooting methods.
Describe the definition, functions, and classification of antennas.
Understand the fundamentals and key performance indicators of antennas.
Distinguish parameters of different antennas.
Describe the WLAN network planning and delivery process.
Describe WLAN network requirement collection and site survey.
Describe the capacity, frequency, and coverage planning of the WLAN network.
Describe the WLAN network channel planning, AP deployment design, power supply and cabling design, and AP installation mode design.
Describe WLAN project acceptance methods.Target Audience
Personnel who want to become WLAN assistant engineers
Those who wish to obtain the HCIA-WLAN certificate
People who want to learn WLAN technologyPrerequisites
Be familiar with the PC operating system.
Basic computer knowledge
HCIA-DataCom certification or equivalent technical levelTraining Content
WLAN Technology Basics
WLAN Overview
Enterprise WLAN Overview
Challenges Faced by Enterprise WLAN
Next-Generation Enterprise WLAN SolutionWLAN Basics
Basic Concepts of Wireless Communication
Introduction to 802.11 Standards
Key WLAN TechnologiesWLAN Fundamentals
CAPWAP Tunnel
Key 802.11 Frames
STA Going-Online Process
WLAN RoamingWi-Fi 6 Technologies and Products
Wi-Fi 6 Technologies
Huawei WLAN Product Family
Features of Huawei WLAN Products
AP Power SupplyWLAN Networking Models
Basic Concepts in WLAN
WLAN Networking Architectures
Typical WLAN Networking SolutionsWLAN Security and Configuration
Huawei VRP and Device Upgrade
Huawei VRP Overview
Command Line Basics
WLAN Device Upgrade
Fat AP ConfigurationWLAN Security
WLAN Security Threats and Defense
WLAN Access Security
WLAN Data Security
WLAN Network Access Control
WLAN Security ConfigurationWLAN Service Configuration
WLAN Service Configuration Procedure
WLAN Configuration ApplicationWLAN Troubleshooting
WLAN Troubleshooting Basics
Overview of WLAN Troubleshooting
Troubleshooting APs’ Failures to Go Online
Troubleshooting STAs’ Failures to Go Online
Troubleshooting AP Signal Issues
Troubleshooting Slow Internet Access of STAsWLAN Project Deployment
WLAN Antenna Technology
Antenna Overview
Concepts Related to Antennas
Antenna Selection
Traditional Indoor Distribution SystemOverview of Common WLAN Deployment
Introduction to WLAN Planning and Design
WLAN Planning and Design Details
WLAN Project Acceptance
WLAN Planning Cases - HCIPW — HCIP-WLAN V2.0
- Длительность: 10 дней (80 часов)
- Код курса: HCIPW
- Стоимость
- Очный формат: 1 747 000 ₸
- Онлайн формат: 1 725 000 ₸
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe WLAN networking modes.
Configure WLAN services.
Describe the WLAN networking application scenarios.
Describe common WLAN reliability networking modes.
Know how to configure WLAN reliability solutions.
Understand the architecture and main functions of iMaster NCE-Campus.
Understand the cloud-based WAC management network architecture.
Understand how to configure cloud-based WAC management.
Understand the cloud-based AP management network architecture.
Understand how to configure cloud-based AP management.
Describe the basic process for WLAN access.
Understand the implementation of the STA blacklist and whitelist.
Describe common user access security policies.
Understand how to configure different security policies.
Describe common access control technologies.
Understand how to configure different access control technologies.
Understand basic concepts of roaming.
Understand the data forwarding path of a STA after roaming.
Understand common roaming optimization technologies.
Understand the implementation principles of smart roaming.
Describe the main factors that affect air interface performance.
Describe common RRM technologies, including radio calibration, band steering, load balancing, and user CAC.
Understand the factors that affect WLAN coverage.
Understand the concepts of and relationship between power and signal strength.
Understand the factors that affect WLAN capacity.
Master skills of using the WLAN Planner.
Use the WLAN Planner for indoor 3D simulation.
Use the network planning functions of the CloudCampus APP.
Understand the WLAN planning process.
Understand requirements collection and site survey in WLAN planning.
Understand device selection, coverage analysis, and capacity design in WLAN planning.
Understand the channel planning, power supply cabling design, and AP installation mode design in WLAN planning.
Describe common WLAN service types in enterprise office scenarios.
Describe WLAN planning methods in enterprise office scenarios.
Describe WLAN deployment solutions in enterprise office scenarios.
Describe common service types and challenges in education scenarios.
Describe WLAN planning methods in education scenarios.
Describe WLAN deployment solutions in education scenarios.
Describe common service types and challenges in hotel scenarios.
Describe WLAN planning methods in hotel scenarios.
Understand WLAN deployment solutions in hotel scenarios.
Describe common WLAN service types in healthcare scenarios.
Describe WLAN planning methods in healthcare scenarios.
Understand WLAN deployment solutions in healthcare scenarios.
Understand common service types and challenges in the shopping mall and supermarket scenarios.
Understand the WLAN planning process in shopping mall and supermarket scenarios.
Understand WLAN construction standards and deployment solutions in shopping mall and supermarket scenarios.
Describe common service types and challenges in shop floor and warehouse scenarios.
Describe WLAN planning methods in shop floor and warehouse scenarios.
Understand WLAN deployment solutions in shop floor and warehouse scenarios.
Understand common service types and challenges in outdoor coverage scenarios.
Master WLAN planning methods for outdoor coverage scenarios.
Master WLAN deployment solutions for outdoor coverage scenarios.
Describe common services, characteristics, and challenges in outdoor backhaul scenarios.
Understand AP and antenna selection policies in outdoor backhaul scenarios.
Understand how to calculate the mesh link bandwidth in outdoor backhaul scenarios.
Describe the WLAN planning process in outdoor backhaul scenarios.
Master WLAN deployment solutions for outdoor backhaul scenarios.
Describe common service types and challenges in high-density scenarios.
Describe the WLAN planning process in high-density scenarios.
Understand WLAN deployment solutions in high-density scenarios.
Describe the WLAN optimization process.
Describe the contents of WLAN optimization.
Understand how to use WLAN optimization tools.
Describe the traditional WLAN O&M solution.
Describe the CampusInsight intelligent O&M solution.
Describe CampusInsight functions and features.
Understand how to locate common WLAN problems or faults.
Describe the troubleshooting process.
Understand WLAN troubleshooting methods.Target Audience
Those who hope to become senior WLAN engineers
Those who hope to become WLAN planning and optimization experts
Those who hope to obtain an HCIP-WLAN certificatePrerequisites
HCIA-WLAN certificate or similar knowledge
Training Content
WLAN Network Features
WLAN Networking Architectures
WLAN Networking Overview
WLAN Networking Architectures
WLAN Networking Application ScenariosWLAN Reliability Technology
WLAN Reliability Technology Overview
VRRP HSB
Dual-Link HSB
Dual-Link Cold Backup
N+1 BackupWLAN Cloud Management Solution
Introduction to iMaster NCE-Campus
Cloud-based WAC Management
Cloud-based AP ManagementUser Access and Authentication
User Access Security
STA Blacklist and Whitelist
Security Policy
Access ControlWLAN Roaming
WLAN Roaming Overview
Process of Traffic Forwarding During Roaming
Roaming Optimization Technologies
Smart RoamingWLAN Radio Resource Management
Air Interface Performance
Radio Calibration
STA Steering
Band Steering
AP-based Load Balancing
User CACWLAN Network Planning
WLAN Planning Basics
WLAN Planning Overview
WLAN Coverage Design
WLAN Capacity DesignWLAN Planning Tools
WLAN Planner
CloudCampus APPWLAN Planning Process
WLAN Planning Overview
WLAN Planning Process
WLAN Planning CaseWLAN Planning for Enterprise Office Scenarios
Introduction to Enterprise Office Scenarios
WLAN Planning Process in Enterprise Office Scenarios
WLAN Planning Solutions in Enterprise Office ScenariosWLAN Planning for Education Scenarios
Introduction to Education Scenarios
WLAN Planning Process in Education Scenarios
WLAN Planning Solutions in Education ScenariosWLAN Planning for Hotel Scenarios
Introduction to Hotel Scenarios
WLAN Planning Process in Hotel Scenarios
WLAN Planning Solutions in Hotel ScenariosWLAN Planning for Healthcare Scenarios
Introduction to Healthcare Scenarios
WLAN Planning Process in Healthcare Scenarios
WLAN Planning Solutions for Healthcare ScenariosWLAN Planning for Retail Scenarios
Introduction to Shopping Mall and Supermarket Scenarios
WLAN Planning Process in Shopping Mall and Supermarket Scenarios
WLAN Planning Solutions for Shopping Mall and Supermarket ScenariosWLAN Planning for Shop Floor and Warehouse Scenarios
Introduction to Shop Floor and Warehouse Scenarios
WLAN Planning Process in Shop Floor and Warehouse Scenarios
WLAN Planning Solutions in Shop Floor and Warehouse ScenariosWLAN Planning for Outdoor Coverage Scenarios
Introduction to Outdoor Coverage Scenarios
WLAN Planning Process in Outdoor Coverage Scenarios
WLAN Planning Solutions for Outdoor Coverage ScenariosWLAN Planning for Outdoor Backhaul Scenarios
Introduction to Outdoor Backhaul Scenarios
WLAN Planning Process in Outdoor Backhaul Scenarios
WLAN Planning Solutions in Outdoor Backhaul ScenariosWLAN Planning for High-Density Scenarios
Introduction to High-Density Scenarios
WLAN Planning Process in High-Density Scenarios
WLAN Planning Solutions for High-Density Scenarios
WLAN network optimization and troubleshootingWLAN Optimization Solution
Overview of WLAN Optimization
WLAN Optimization Tools
WLAN Optimization Solutions
WLAN Optimization CasesWLAN O&M
Overview of Network O&M
Traditional WLAN O&M
CampusInsight Intelligent O&MWLAN Troubleshooting
Overview of WLAN Troubleshooting
Reliability Faults
Cloud Management Faults
Wireless Bridge Faults
Radio Resource Management Faults
Roaming Faults - HCIEW — HCIE-WLAN
- Длительность: 10 дней (80 часов)
- Код курса: HCIEW
- Стоимость
- Очный формат: 1 905 000 ₸
- Онлайн формат: 1 891 500 ₸
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe Huawei WLAN technical architecture
Describe Huawei HCIE-WLAN Certification architecture
Master WLAN networking technologies
Master WLAN roaming technologies
Master WLAN radio resource management
Master WLAN multicast technologies and mDNS principles
Master WLAN security and defense
Implement WLAN admission control
Describe Huawei WLAN and IoT convergence solution
Describe the principles and solutions of the wireless positioning technology
Master how to construct an IPv6 WLAN
Describe the CloudCampus solution
Master the design and deployment of CloudCampus large-scale campus networks
Master the design and deployment of CloudCampus small- and medium-sized campus networks
Master WLAN troubleshooting methods
Describe CampusInsight intelligent O&M
Master WLAN optimization design and implementation
Describe the WLAN project lifecycleTarget Audience
Technical personnel who want to obtain HCIE-WLAN knowledge
Prerequisites
You are advised to pass the HCIP-WLAN certification or pass the HCIE-WLAN written exam. It is recommended to have at least five years of ICT experience, have experience in designing, planning, implementing, and O&M of medium- and large-sized WLAN networks
Training Content
1. Build a Reliable WLAN Network Huawei WLAN Certification Overview
Introduction to Huawei WLAN Career Certification
Introduction to WLAN Reliability
Improving Wireless User Experience
Building a Secure, Trustworthy WLAN Campus Network
Building an Open, Converged WLAN Campus Network
WLAN O&M and Optimization
WLAN Network Planning and Deployment WLAN Networking Technology
WLAN Networking Architecture
Principles and Configurations of Navi AC
Principles and Configurations of Leader AP
Principles and Configurations of Mesh
Principles and Configurations of GRE and IPSec VPN WLAN Reliability
WLAN Reliability Overview
HSB Technologies
Dual-Link Cold Backup
N+1 Backup
CAPWAP Link Failover WLAN Roaming
WLAN Roaming Overview
WLAN Roaming Technologies
WLAN Roaming Optimization
Typical Roaming Scenarios of Huawei WLAN Solution
WLAN Roaming Fault Rectification2. Improve Wireless User Experience WLAN Radio Resource Management
WLAN Radio Calibration
WLAN Load Balancing
WLAN Anti-Interference
WLAN QoS
VIP User Experience Guarantee WLAN Multicast and mDNS
IP Multicast Fundamentals
WLAN Multicast Network Optimization
mDNS and mDNS Gateway3. Constructing a Secure and Trusted WLAN Network WLAN Security and Defense
Overview of WLAN Security Threats and Security Solutions
WLAN Management Plane Security
WLAN Control Plane Security
WLAN Forwarding Plane Security
WLAN Network Security Configuration Example WLAN Network Admission Control (NAC)
Overview of NAC
Commonly Used NAC Methods and Their Working Mechanism
Huawei NAC Solution
Typical NAC Configuration4. Constructing an Open and Converged WLAN Network WLAN and IoT Convergence
Overview and Development Trends of IoT Networks
Overview of Short-Range Wireless IoT Technologies
Huawei’s CloudCampus IoT Solutions WLAN Wireless Positioning Technologies
Overview of Wireless Positioning
Implementation of Wireless Positioning Technologies
Huawei’s Wireless Positioning Solutions Constructing an IPv6 WLAN
IPv6 Overview
IPv6-based WLAN Networking and Applications
IPv6-based WLAN Access Control
IPv6-based WLAN Security
WLAN Evolution to IPv65. Constructing a New WLAN Network Huawei CloudCampus Solution
CloudCampus Overview
Ultra-Broadband Connectivity
Simplified Network
Multi-Purpose Network
Access Authentication
Intelligent Policy
Intelligent O&M CloudCampus Solution for Large and Medium-Sized Campus Networks
VXLAN-based Virtualized Campus Network and Solution
Underlay Design
Fabric Design
Overlay Design
Admission Control and Free Mobility Design
WLAN Design
O&M Design CloudCampus Solution for Small and Medium-Sized Campus Networks
Service Requirements and Challenges Facing Small and Medium-Sized Campus Networks
Introduction to Huawei CloudCampus Solution
Huawei CloudCampus Solution Design for Small and Medium-Sized Campus Networks
Typical Industry Application Scenarios CloudCampus Solution Deployment for Large Campus Networks
Basic Concepts
Deployment Planning and Process
Deployment Guide CloudCampus Solution Deployment for Small and Medium-Sized Campus
Deployment Process Overview
Deployment Design
Software and Hardware Installation
Deployment
Service Deployment
O&M Management
Acceptance Test6. WLAN Network O&M and Troubleshooting WLAN Troubleshooting
WLAN Troubleshooting Roadmap
Auxiliary Methods for Troubleshooting WLAN Faults
WLAN Fault Cases Intelligent O&M
CampusInsight Overview
CampusInsight Functions and Demonstration7. WLAN Network Planning and Optimization Enterprise WLAN Optimization Design
Introduction to Enterprise WLAN Optimization
Enterprise WLAN Evaluation
Enterprise WLAN Optimization Solution Design
Solution Implementation and Acceptance Large WLAN Networking Practice
WLAN Project Lifecycle
WLAN Project Deliverables
WLAN Project Cases - HCIAT — HCIA-Transmission Training V2.5
- Длительность: 5 дней (40 часов)
- Код курса: HCIAT
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 1 542 000 ₸
Описание курса
Course Objectives
On completion of this program, the participants will be able to:
Describe transmission network concepts.
Understand main transmission network technologies.
Understand Huawei transmission network solutions.
Understand the application scenarios of SDH networks.
Describe the SDH frame structure and the functions of each component.
Be familiar with the procedure for multiplexing SDH signals.
Describe the major overhead bytes and alarms of the SDH frame structure.
Describe the pointers and functions of the SDH frame structure.
Understand the composition of the logical functional modules of SDH devices.
Understand the PCM technology and its solutions.
Describe the positioning and application scenarios of Huawei OptiXtrans E9600/E6600 series and OptiXtrans DC908.
Understand the appearance and cabinets of Huawei OptiXtrans E9600/E6600 series and OptiXtrans DC908.
List the boards and functions of Huawei OptiXtrans E9600/E6600 series and OptiXtrans DC908.
Understand the basic knowledge of NCE-T, such as product positioning, architecture, and deployment solutions.
Describe the functions of NCE-T, such as network management and optical service provisioning.
Describe the classification and basic concepts of Ethernet.
Describe the working mechanisms of VLAN and Layer 2 switches.
Explain the concatenation and encapsulation technologies of Ethernet.
Describe the application scenarios of Ethernet services.
Distinguish Ethernet service types.
Describe Ethernet features.
Understand the basic concepts, principles, transmission modes, and basic composition of WDM.
Know the WDM transmission media.
Have a good command of WDM technical principles and key technologies.
List NG WDM site types.
Describe the signal flows of different types of NG WDM sites.
Describe the application scenarios of NG WDM sites.
List the basic elements of NG WDM networking.
Understand positions and functions of different overheads at each OTN layer.
Understand basic functions of OTN electrical-layer overheads.
Understand how OTN electrical-layer alarms are generated and learn how to use electrical-layer overheads to analyze and locate faults.
Understand the basic concepts of transmission network protection.
Understand device-level protection of the transmission network.
Distinguish linear protection from ring protection supported by SDH products.
Understand optical-layer protection supported by NG WDM products.
Understand electrical-layer protection supported by NG WDM products.
Understand PCM protection.
Complete Equipment Commissioning
Perform TDM Service Configuration
Perform Ethernet Service Configuration
Perform PCM Service Configuration
Perform OTN Electrical-Layer Service Configuration
Perform OptiXtrans DC908 Service Configuration
Perform NG WDM Optical-Layer Protection ConfigurationPrerequisites
Having a general knowledge of telecommunications
Target Audience
Personnel who are going to take HCIA-Transmission exam
Personnel who expect to learn about basic optical transmission principles and Huawei SDH equipment operationTraining Content
Transmission Network Overview
Basic Concepts of Transmission Networks
Transmission Network Technologies
Huawei Transmission Network SolutionsSDH Principles
SDH Overview
SDH Frame Structure and Multiplexing Procedure
Overheads and Pointers
Logical Functional Modules
Application of SDH Trail Layers and Overheads
PCM TechnologyTransmission Network Products
Product Overview
Cabinets and Subracks
Boards
Introduction to NCE-T
System Architecture of NCE-T
Basic Functions of NCE-T
Key Features of NCE-TIntroduction to Ethernet Principles and Services
Ethernet Principles
Ethernet ServicesWDM Principles
System Overview
WDM Transmission Media
Key Technologies of WDMNG WDM Equipment Networking and Applications
Network Layers and System Architecture
Site Types
Basic Networking Elements
OTN Protocol
OTN Overview
OTN Interface Structures and Multiplexing/Mapping Principles
OTN Frame Structure
Frame Structure and Meaning of OTN Electrical-Layer Overheads
Evolution to Liquid OTNTransmission Network Protection Principles
Basics
Device-Level Protection
Network-Level ProtectionHCIA-Transmission Lab Guide
Equipment Commissioning
TDM Service Configuration
Ethernet Service Configuration
PCM Service Configuration
OTN Electrical-Layer Service Configuration
OptiXtrans DC908 Service Configuration
NG WDM Optical-Layer Protection Configuration - HCIAD — HCIA Datacom
- Длительность: 10 дней (80 часов)
- Код курса: HCIAD
- Стоимость
- Очный формат: 1 190 000 ₸
- Онлайн формат: 1 173 500 ₸
Описание курса
Objectives
After completing the training, you will be able to:
Understand the definition of data communication and the capability model of data communication engineers.
Understand the network reference model and the entire data communication process.
Be familiar with the VRP system and be able to perform basic operations.
Understand IPv4 address protocol and related concepts
Understand the forwarding principles of Layer 3 devices such as routers and Layer 3 switches.
Understand the concept of routing and use static route or OSPF to build a Layer 3 network.
Understand basic Ethernet concepts and describe the functions and working principles of Layer 2 switching devices.
Be familiar with common Ethernet protocols, such as VLAN, Spanning Tree Protocol , link aggregation and stacking.
Configure ACLs and AAA to provide basic security solutions for the network.
Be familiar with the NAT protocol and master the NAT configuration in different scenarios.
Master the configuration of common services on enterprise networks, such as DHCP, FTP and Telnet.
Understand basic WLAN concepts and complete basic configurations of small or medium-sized WLAN networks.
Understand basic WAN concepts and WAN solutions such as MPLS and SR.
Have general knowledge of basic concepts of enterprise network management.
Be familiar with traditional network management and SDN-based network management solutions.
Have a good command of IPv6 protocols and be able to build small-scale IPv6 networks.
Have a good command of the campus network construction process.
Be able to independently construct small-sized campus networks.
Understand the basic concepts of SDN and programming automation and master the basics of Python.Target Audience
Who wants to become Data Communication Engineers
Who wants to obtain the HCIA-Datacom Certification
Prerequisites
Be familiar with PC operations.
Basic understanding of IT technologies and network knowledgeTraining Content
1. Data Communication and Network Basics
1.1 Data Communication Network Basics
Basic Concepts of Data Communication
Data Transfer Process
Network Devices and Basic Functions
Network Type and Topology Type
Network Engineering
Network Engineers1.2 Network Reference Model
What is Data and Data Transfer
Common Standard Protocols
Layered Model Concept
Application Layer and Related Protocols
Transport Layer and Related Protocols
Network Layer and Related Protocols
Data link Layer and Related Protocols
Physical Layer and Related Protocols
Data Transfer, Encapsulation and Decapsulation1.3 Huawei VRP Basics
Common Network Devices
VRP Basics
CLI Command Views
Basic Commands and Function Keys of the CLI2. Constructing an Interconnected IP Network
2.1 Network Layer Protocol and IP Addressing
Network Layer Protocol
Concept, Classification, and Special IP Addresses of IPv4
IP Network and IP Subnet Calculation
IP Network Address Planning2.2 IP Routing Basics
Basic Working Principles of Routers
Routing Table Concepts
Routing and Forwarding Features
Static Route Configuration2.3 OSPF Basics
Basic Features of OSPF
OSPF Application Scenarios
Working Principle of OSPF
Basic OSPF configurations3. Constructing an Ethernet Switching Network
3.1 Ethernet Switching Basics
Basic Concepts of Ethernet
Concept of MAC Address
Working Process and Principles of Layer 2 Switches
Composition and Formation of a MAC Address Table3.2 VLAN Principles and Configuration
Background of VLAN
Basic Concepts and Principles of VLAN
VLAN Data Communication Process on a Layer 2 Network
Basic VLAN Configuration3.3 Spanning Tree Protocol
Background of STP
Basic Concepts and Working Principles of STP
Basic Concepts of RSTP and Improvements Compared with STP
Basic STP Configuration
Other Layer 2 Loop Elimination Technologies3.4 Ethernet Link Aggregation and Switch Stacking
Basic Concepts of Link Aggregation
Working Principles of Manual Link Aggregation
Working Principles and Features of Link Aggregation in LACP Mode
Basic Concepts of iStack and CSS3.5 Implements Communication Between VLANs.
Working Principles of Sub-interfaces
Working Mechanism of Layer 3 Switches
Sub-interface Configuration
VLANIF Configuration4. Network Security and Network Access Basics
4.1 ACL Principles and Configuration
Basic Principles and Functions of ACLs
Basic Structure and Matching Order of ACL Rules
Usage of Wildcard mask
Basic ACL Configuration4.2 AAA Principles and Configuration
Basic Principles and Application Scenarios of AAA
Basic Configuration of the Local AAA4.3 NAT Basics
Background of NAT
NAT Classification and Technical Principles
NAT Configuration in Different Scenarios5. Network Services and Applications
5.1 Network Services and Applications
Principles of TFTP, FTP, DHCP, and HTTP
Configuration of FTP and DHCP6. WLAN Basics
6.1 WLAN Overview
Basic Concepts of WLAN and History of 802.11 Protocol suite
WLAN devices
WLAN Networking Mode
WLAN Working Process
Basic WLAN Configuration7. WAN Basics
7.1 WAN Technology Basics
Basic WAN Concepts
Common WAN Technologies
Working Principles of PPP and PPPoE
Configuring PPP and PPPoE
Basic Concepts of MPLS/SR8. Network Management and O&M
8.1 Network Management and O&M
Basic Concepts of the NMS and O&M
Common NMS and O&M Methods and Tools
Working Principle of SNMP
SDN-based NMS and O&M Solution9. IPv6 Basics
9.1 IPv6 Basics
Comparison Between IPv6 and IPv4
Basic Concepts of IPv6
Format and Principle of the IPv6 Packet Header
IPv6 Address Format and Address Type
IPv6 Address Configuration Method and Procedure
Static and Dynamic IPv6 Address Configuration
IPv6 Static Route Configuration10. SDN and Automation Basics
10.1 SDN and NFV Basics
Basic SDN Concepts
Huawei SDN Products and Solutions
Basic NFV Concepts
Huawei NFV Products and Solutions10.2 Network Programming and Automation
Traditional Network O&M Status Analysis
Implementation of Network Automation
Programming Language
Python Coding Specifications
Implement Basic Automatic O&M Using Python telnetlib.11. Typical Campus Network Architectures and Practices
11.1 Typical Networking Architecture and Cases
Campus Network Architecture
Campus Network Lifecycle
Campus Network Construction Cases
Campus Network Construction Practice - HCIPD-CORE — Datacom Core Technology
- Длительность: 10 дней (80 часов)
- Код курса: HCIPD-CORE
- Стоимость
- Очный формат: 1 269 500 ₸
- Онлайн формат: 1 252 000 ₸
Описание курса
Objectives:
After completing the HCIP-Datacom-Core Technology training, you will be able to:
Understand the entire process of forwarding data packets by network devices.
Understand the working principles and configurations of OSPF, IS-IS, and BGP.
Deploy route control and traffic path control.
Understand the working principles of RSTP/MSTP.
Understand the working principles of stacking technology.
Understand the working principle of multicast and set up a multicast network.
Configure ICMPv6, NDP, and IPv6 addresses.
Master Huawei firewall technologies.
Configure basic security features for network devices.
Master the basic configurations for network reliability.
Describe common network management protocols.
Understand Huawei enterprise datacom solutions.Prerequisites
Be familiar with common operations of Huawei network devices. Have the knowledge and skills described in the HCIA-Datacom and HCIP-Datacom-Core Technology course.
Training Content
1. IP Routing Basics
Introduction to Network Devices: Hardware modules of modular switches, Three planes of network devices, Packet processing on network devices.
IP Routing Basics: RIB and FIB, Route import scenario.2. OSPF Core Knowledge
OSPF Basics: Introduction to dynamic routing protocols, Basic OSPF concepts, Process of establishing an OSPF neighbor relationship, Basic OSPF configuration
OSPF Route Calculation: Intra-area route calculation, Inter-area route calculation, External route calculation
OSPF Special Area and Other Features: Stub area and totally stub area, NSSA area and totally NSSA area, Inter-area route summarization and external route summarization, OSPF Features3. IS-IS Core Knowledge
IS-IS Principles and Configuration: Basic concepts of IS-IS, IS-IS working principle, Basic IS-IS configuration
4. BGP Core Knowledge
BGP Basics: BGP overview, Basic concepts of BGP, Basic BGP configuration
BGP Path Attributes and RRs
BGP route selection
BGP EVPN Basics: MP-BGP, EVPN overview, Common EVPN routes, Typical EVPN application scenarios5. Routing and Traffic Control
Routing Policy and Route Control: Route matching tool, Routing policy tool, Route control cases
Traffic Filtering and Forwarding Path Control: Policy-based routing, MQC, Traffic filtering6. Switching Core Knowledge
RSTP Principles and Configuration: RSTP overview, Improvements of RSTP over STP, RSTP working process, Basic RSTP configurations
MSTP Principles and Configuration: MSTP overview, Basic concepts of MSTP, Working principles of MSTP, Basic MSTP configuration
Stack and CSS: Overview of Stack and CSS technologies, Stacking principles, CSS principles, Basic configuration7. Multicast Basics
IP Multicast Basics: Basic concepts of IP multicast, Multicast data forwarding principle
IGMP Principles and Configuration: IGMP working principle, Introduction to the IGMP feature
PIM Principles and Configuration: PIM basics, PIM-DM, PM-SM8. IPv6 Core Knowledge
IPv6 Overview: IPv6 overview, Introduction to IPv6 addresses
ICMPv6 and NDP: ICMPv6 overview, NDP overview, Router discovery, Duplicate address detection, Redirection
IPv6 address configuration: IPv6 address configuration mode, Stateless IPv6 address autoconfiguration, DHCPv6, Implementation of IPv6 address autoconfiguration9. Network Security Basics
Huawei Firewall Technology: Firewall overview, Basic concepts of firewalls, Basic firewall configuration
Network Device Security Features: Security hardening policies for common devices, Network device security hardening deployment example
VPN Technology Overview: VPN technology overview, Common VPN technologies
Basic Concepts and Applications of VRF10. Network Reliability
BFD Principles and Configuration: BFD Overview, BFD working principle, BFD application scenarios, Basic BFD configurations
VRRP Principles and Configuration:VRRP overview, VRRP working principles, Typical VRRP application, Basic VRRP configuration11. Network Service and Management
DHCP Principles and Configuration: DHCP background, DHCP working principle and configuration, DHCP Relay working principle and configuration
Introduction to Network Management Protocols: Development of network management, Functional features of network management, Network management protocols, Application scenarios of network management12. Large-scale WLAN Architecture
Large-Scale WLAN Networking and Deployment: Overview of large-scale WLAN networking, VLAN pool, DHCP technology, Roaming technology, High reliability technology, Network Admission Control technology
13. Network Solution
Enterprise Datacom Solution Overview: Campus, Data center , SDN-WAN, SD-WAN
- HCIPD-ARST — Datacom Advanced Routing & Switching Technology
- Длительность: 5 дней (40 часов)
- Код курса: HCIPD-ARST
- Стоимость
- Очный формат: 878 000 ₸
- Онлайн формат: 864 000 ₸
Описание курса
Objectives:
After completing the HCIP-HCIP-Datacom-Advanced Routing & Switching Technology Training Content, you will be able to:
Describe OSPF and IS-IS fast convergence technologies.
Configure OSPF and IS-IS equal-cost routes.
Describe the application scenarios of OSPF forwarding addresses.
Using regular expressions in AS_Path filter and community filter configurations.
Configure BGP ORF and peer group functions.
Analyze the differences between OSPFv3 and OSPFv2.
Describe the IPv6 extensions of IS-IS.
Describe the IPv6 extensions of BGP.
Describe the working principle of VLAN aggregation.
Describe the application scenarios of MUX VLAN.
Describe the QinQ implementation mode.
Describe the types and configurations of port isolation.
Describe the technical principles of port security.
Implements MAC address flapping detection.
Expound the switch traffic suppression and storm control functions.
Describe the application scenarios of DHCP snooping.
Describe the working principle of IP Source Guard.
Describe the working principle of MPLS.
Describe the basic concepts and working mechanism of LDP.
Describe the basic concepts of MPLS VPN.
Describe route transmission and label distribution of MPLS VPN.
Describe the MPLS VPN data forwarding process.
MPLS VPN Deployment (Intranet Solution).
MPLS VPN Deployment (Hub&Spoke Solution).
Describe the extended functions and features of OSPF for MPLS VPN.
Describe routine maintenance items.
Describe the functions and features of Information Center.
Using Common Maintenance Tools.
Describe troubleshooting methods.
Analyze the fault that the neighbor relationship of the routing protocol cannot be established.
Write the troubleshooting guide.
Describe the operation procedure and specifications of the migration.
Describe common migration scenarios.Target Audience
Who want to become senior Data Communication engineers. Who wants to obtain the HCIP-Datacom-Advanced Routing & Switching Technology Certification.
Prerequisites
Be familiar with common operations of Huawei network devices. Have the knowledge and skills described in the HCIA-Datacom and HCIP-Datacom-Core Technology course.
Training Content
1. Advanced IGP Features
Advanced IGP Features: OSPF fast convergence, OSPF Route Control, Other OSPF Features, Advanced IS-IS Features
2. Advanced BGP Features
Advanced BGP Features: BGP route control, Introduction to BGP Features, Networking of BGP RRs
3. IPv6 Routing
IPv6 Routing: IPv6 static route, OSPFv3 Principles and Configuration, IS-IS (IPv6) Principles and Configuration, BGP4+ Principles and Configuration
4. Advanced Ethernet Technologies
Advanced VLAN Technology: Super-VLAN, MUX-VLAN, QinQ
Ethernet Switching Security: Port Isolation , MAC Table Security, Port security , MAC Address Flapping Prevention and Detection , MACsec , Switch traffic control , DHCP Snooping , IP Source Guard5. MPLS Technology
MPLS Principles and Configuration: MPLS Overview, MPLS Forwarding, Static LSP
MPLS LDP Principles and Configuration: Basic Concepts of LDP, Working Principle of LDP, Basic LDP Configurations
MPLS VPN Principles and Configuration: MPLS VPN Overview, MPLS VPN route exchange, MPLS VPN packet forwarding, MPLS VPN Configuration and Implementation
MPLS VPN Deployment and Application: MPLS VPN Application and Networking Overview, Typical Application Scenarios and Deployment of MPLS VPN, OSPF VPN expansion - SD-WAN — HCIP-Datacom-SD-WAN Planning and Deployment
- Длительность: 5 дней (40 часов)
- Код курса: SD-WAN
- Стоимость
- Очный формат: 1 274 500 ₸
- Онлайн формат: 1 259 000 ₸
Описание курса
Course Objectives
On completion of this program, the participants will be able to:
Describe basic concepts of SD-WAN deployment planning.
Describe the management boundary of SD-WAN multi-tenant.
Describe SD-WAN deployment modes and application scenarios.
Describe the overall process of implementing application experience.
Describe the function of link quality detection.
Describe HQoS application scenarios.
Describes the basic principles and application scenarios of the service security function in the SD-WAN solution.
Describes various visualized monitoring functions provided by iMaster NCE-WAN.
Describes various fault diagnosis methods provided by iMaster NCE-WAN.
Describe the basic concepts of tunnels.
Describe the basic working principles of GRE.
Describe the basic security mechanism of GRE.
Describe the basic application scenarios of GRE.
Describe the basic concepts of IPsec.
Describe the basic working principles of IPsec.
Describe the basic application scenarios of IPsec.
Describe the basic concepts of MP-BGP.
Describe the origin of EVPN.
Describe common EVPN route types.
Describe the background of QoS.
Describe the working principle of the QoS DiffServ model.
Describe the application scenarios of different QoS functions.
Describe basic QoS configurations.
Describe common technologies and principles of link detection.
Describe common technologies and principles of link backup.
Describe the basic working principles and application scenarios of the SAC.
Describe the basic working principles and application scenarios of SPR.
Describe the functions and features supported by AR routers.
Describe the WLAN service features of AR routers.
Describe the security service features of AR routers.
Describe the disadvantages of the SNMP protocol.
Describe how NETCONF flexibly controls devices.
Describe the advantages of Telemetry collection of device status and performance.
Describe the northbound RESTful interface of the NMS/controller.
Describe the common network faults
Describe typical services in the financial industry.
Describe the informatization development trend of the financial industry
Describe the network architecture of the financial industry
Describe the SD-WAN design roadmap for the financial industry
Describe the challenges of WAN interconnection in the cloud environment.
Explain the basic concepts of SDN.
Explain the basic concepts of SD-WAN.
Describe the Huawei SD-WAN solution.
Describe the traditional WAN interconnection solution.
Describe technologies used in WANs.
Describe the three application scenarios of SD-WAN.Target Audience
Those who wants to be datacom SD-WAN senior engineers
Those who wants to achieve the HCIP-Datacom-SD-WAN Planning and Deployment CertificationPrerequisites
Suggest to acquire HCIP-Datacom-Core Technology abilities
Training Content
SD-WAN Solution Deployment and Design
Huawei SD-WAN Solution Technical Overview
Architecture and Components of Huawei SD-WAN Solution
Huawei iMaster NCE-WAN Controller
Huawei SD-WAN Solution Principles
Introduction to Huawei SD-WAN CPESD-WAN Deployment
SD-WAN Deployment Overview
SD-WAN Tenant Management
SD-WAN Zero Touch ProvisioningSD-WAN Networking Principles and Planning
Basic Concepts of SD-WAN Networking
SD-WAN Networking Principles
SD-WAN Networking DesignSD-WAN Application Experience
Application Experience Solution Overview
Application identification and intelligent traffic steering
HQoS
WAN optimizationSD-WAN Security
SD-WAN Security Overview
System security
Service securitySD-WAN Intelligent O&M
Intelligent O&M Overview
monitoring
maintenanceKey Technologies for WAN Interconnection
GRE Technology
Basic Principles of GRE
GRE Security Mechanism
GRE Application Scenario
GRE ConfigurationIPsec VPN Technology
Basic Concepts of IPsec
Basic Principles of IPsec
IPsec Application Scenarios
IPsec ConfigurationBGP EVPN Basics
MP-BGP
EVPNBasic Principles of QoS
QoS Technology Overview
QoS traffic classification and marking
Traffic Rate Limiting
Congestion avoidance technology
Congestion Management Technology
Introduction to HQoSHA technology
Link reliability
Network reliability
Service reliabilityIntroduction to the Multi-Service Gateway
AR Functions and Features
AR WLAN Service Features
AR Security Service FeaturesManagement and O&M
Introduction to Zero Touch Provisioning
Introduction to Network Maintenance
Network O&MSD-WAN Design Practice (Financial Scenario)
Background of the Finance Industry
Overall SD-WAN Design for the Finance Industry
SD-WAN Design Cases in the Finance IndustryWAN Interconnection Overview
Enterprise WAN Interconnection Status
Challenges to Enterprise WAN Interconnection
Birth of SD-WAN
Introduction to Huawei SD-WAN SolutionWAN Interconnection Technologies and Typical Scenarios
Traditional enterprise WAN interconnection solution
Enterprise WAN Interconnection Technology Application
SD-WAN Application Scenarios - NE40E — Маршрутизаторы Huawei
- Длительность: 4 дня (32 часа)
- Код курса: NE40E
- Стоимость
- Очный формат: 1 002 000 ₸
- Онлайн формат: 989 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям познакомиться с архитектурой, принципами настройки и эксплуатации маршрутизаторов Huawei NE40E. В рамках курса рассматривается настройка основных функций маршрутизаторов с точки зрения задач сервис-провайдера.
Аудитория курса:
Специалисты, занимающиеся пуско-наладкой, а также эксплуатацией маршрутизаторов Huawei NE40E.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP.
Содержание курса:
Модуль 1 – Платформа маршрутизации Huawei NE40E.
Модельный ряд маршрутизаторов серии NE.
Шасси NE40E.
Линейные карты NE40E и возможности чипсета Solar.Модуль 2 – Позиционирование платформы NE40E.
Архитектура WAN3.0.
Программное управление и SDN.
Data-Center Interconnect.
Mobile backhaul.Модуль 3 – Настройка маршрутизаторов NE40E.
Принципы работы с cli NE40E.
Работа с файлами конфигурации.
Настройка системных параметров.
Настройка удаленного доступа.
Настройка механизмов контроля доступа.
Настройка функций log’ирования.
Настройка интерфейсов и IP-адресов.
Настройка статической маршрутизации.Модуль 4 – Функции маршрутизации NE40E для решения задач сервис-провайдера
Настройка динамической маршрутизации OSPF.
Настройка динамической маршрутизации IS-IS.
Настройка динамической маршрутизации BGP.
Настройка туннелей IPsec VPN.
Настройка туннелей GRE.Модуль 5 – Функции MPLS VPN на платформе NE40E.
Настройка MPLS L3 VPN.
Настройка MPLS L2 VPN.
Настройка Inter-AS MPLS VPN.Модуль 6 – Функции Segment-Routing на платформе NE40E.
Настройка MPLS SR.
Настройка IPv6 SR.Модуль 7 – Сервисные функции на платформе NE40E.
Настройка функции O&M.
Настройка BFD.
Настройка QoS.
Настройка NAT.
Настройка Multicast’а.
Настройка агрегирования каналов. LAG/MC-LAG.Модуль 8 – Обслуживание маршрутизаторов NE40E.
Обновление программного обеспечения.
Поиск и устранение неисправностей. - HCIED — HCIE Datacom
- Длительность: 10 дней (80 часов)
- Код курса: HCIED
- Стоимость
- Очный формат: 1 904 000 ₸
- Онлайн формат: 1 887 500 ₸
Описание курса
Objectives:
On completion of this program, the participants will be able to:
Describe OSPF and IS-IS fast convergence technologies.
Configure OSPF and IS-IS equal-cost routes.
Describe OSPF and IS-IS default routes advertisement.
Describe the application scenarios of OSPF and IS-IS multi-process.
Describe the GR and NSR principles of OSPF and IS-IS.
Describe the application scenarios of OSPF forwarding addresses.
Describe the working principles of IS-IS LSP fragment extension.
Use AS_Path Filter and Community Filter to implement BGP route control.
Apply the ORF function and peer group function of BGP.
Understand basic configuration for implementing BGP security.
Describe the concept and usage of the 4-byte AS number.
Describe the networking of BGP RRs.
Clarify the types and configurations of port isolation.
Clarify the technical principles of port security.
Detect MAC address flapping.
Clarify switch traffic suppression and storm control functions.
Describe application scenarios of DHCP snooping.
Clarify how IP Source Guard works.
Describe the working scenarios of dual-system hot backup.
Describe the basic concepts and terms of MPLS.
Describe the working principles of MPLS.
Configure static LSPs.
Describe the MPLS forwarding process.
Describe the basic concepts and working mechanism of LDP.
Describe the MPLS label distribution control mode, advertisement mode, and retention mode.
Understand Basic LDP configuration.
Describe the MPLS VPN model.
Describe the basic concepts of MPLS VPN.
Describe MPLS VPN routing and label distribution.
Describe the MPLS VPN data forwarding process.
Perform basic MPLS VPN configurations.
Describe the principles of the three cross-domain solutions.
Understand basic configuration of three cross-domain solutions.
Describe the application scenarios of the three cross-domain solutions.
Describe the development histories of EVPN.
Describe how EVPN solves VPLS problems.
Describe the common routing types and working principles of EVPN.
Describe the principles of inter-AS EVPN.
Describe typical application scenarios of EVPN.
Configure IPv6 static routes.
Analyze the differences between OSPFv3 and OSPFv2.
Understand basic OSPFv3 configuration.
Describes IS-IS extensions to IPv6.
Understand basic IS-IS (IPv6) configuration.Training Content
1. Advanced Routing and Switching Technology
Advanced IGP Features
Advanced BGP Features
Network Security Technologies
MPLS Fundamentals and Configuration
MPLS LDP Fundamentals and Configuration
MPLS VPN Fundamentals and Configuration
MPLS VPN Deployment and Application
Inter-AS MPLS L3VPN
EVPN Fundamentals and Configuration
IPv6 Routing
IPv6 Transition Technologies
QoS Fundamentals
Network O&M
Network Troubleshooting
Network Migration2. Campus Network Planning and Deployment
Enterprise Network Introduction
Enterprise Campus Network Overview
VXLAN and Campus Network Virtualization
Network Admission Control
Free Mobility
Large- and Medium-Sized Virtualized Campus Network Design
Virtualized Campus Network Deployment Guide
Small- and Medium-Sized Cloud-Managed Campus Network Design
CampusInsight Intelligent O&M3. WAN Interconnection Network Planning and Deployment
WAN Interconnection Solution and Technologies Overview
Key Technologies of WAN Interconnection
SD-WAN Solution Planning and Design4. Bearer WAN Planning and Deployment
Enterprise Bearer WAN Solution
Enterprise Bearer WAN Architecture and Key Technologies
Segment Routing
SRv6 Fundamentals and Configuration
Enterprise Bearer WAN Design
IPE Key Technologies and Evolution Trends5. Network Automation
Network Automation Overview
SSH Fundamentals and Practice
NETCONF YANG Fundamentals and Practice
Telemetry Fundamentals and Practice
OPS Fundamentals and Practice
RESTful Fundamentals and Practice
iMaster NCE-Campus Open APIs Introduction
iMaster NCE Service Openness And Programmability
Cisco
- DCFNDU — Understanding Cisco Data Center Foundations
- Длительность: 5 дней (40 часов)
- Код курса: DCFNDU
- Стоимость
- Очный формат: 1 580 000 ₸
- Онлайн формат: 1 569 000 ₸
Описание курса
Course Description
The Understanding Cisco Data Center Foundations (DCFNDU) training helps you prepare for entry-level data center roles. In this training, you will learn the foundational knowledge and skills you need to configure Cisco® data center technologies, including networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS).
This training does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several Cisco Certified Network Professional (CCNP) and other professional-level data center trainings and exams. This training also earns you 25 Continuing Education (CE) credits toward recertification
How You'll Benefit
This training will help you:
Prepare for entry-level job roles in the high-demand area of data center environments
Prepare for trainings that support the CCNP Data Center certification exams
Gain knowledge and hands-on skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Earn 25 CE credits toward recertificationWho Should Enroll
Data Center Designers
Data Administrators
Data Center Engineers
Systems Engineers
Technical Solutions Architects
Network Architects
Cisco Integrators and Partners
Server Administrators
Network Managers
Storage Administrators
Program Managers
Project ManagersCourse Objectives
Describe the foundations of data center networking
Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools
Describe Layer 3 first-hop redundancy
Describe Ethernet port channels and vPCs
Introduce switch virtualization
Introduce machine virtualization
Describe network virtualization
Compare storage connectivity options in the data center
Describe Fibre Channel communication between the initiator server and the target storage
Describe Fibre Channel zone types and their uses
Describe NPV and NPIV
Describe data center Ethernet enhancements that provide a lossless fabric
Describe FCoE
Describe data center server connectivity
Describe Cisco UCS Manager
Describe the purpose and advantages of APIs
Describe Cisco ACI
Describe Nexus Dashboard
Describe the basic concepts of cloud computingCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Good foundation of networking protocols
Basic knowledge of computer virtualization
Basic computer literacy
Basic knowledge of computer operating systems
Basic internet usage skillsIn addition, CCNA-level knowledge is recommended as a prerequisite for success in this certification:
Implementing and Administering Cisco Solutions (CCNA)Course Outline
Describing the Data Center Network Architectures
Describing the Cisco Nexus Family and Cisco NX-OS Software
Describing Layer 3 First-Hop Redundancy
Describing Port Channels and vPCs
Describing Switch Virtualization
Describing Machine Virtualization
Describing Network Virtualization
Introducing Basic Data Center Storage Concepts
Describing the Cisco MDS Family
Describing Fibre Channel Communication Between the Initiator Server and the Target Storage
Describing Fibre Channel Zone Types and Their Uses
Describing Cisco NPV Mode and NPIV
Describing FCoE
Describing Cisco UCS and UCS-X Components
Describing Cisco UCS Manager and Cisco Intersight
Automating the Data Center
Describing Cisco Nexus Dashboard
Describing Cisco ACI
Describing Cloud ComputingLab Outline
Explore the Cisco NX-OS CLI
Explore Topology Discovery
Configure HSRP
Configure vPCs
Configure VRF
Explore CoPP and Spanning Tree on Cisco Nexus Switches
Install VMware ESXi and vCenter
Configure VSANs
Validate FLOGI and FCNS
Configure Zoning
Review Unified Ports on a Cisco Nexus Switch and Implement FCoE
Explore the Cisco UCS Server Environment
Configure a Cisco UCS Service Profile
Configure Cisco NX-OS with APIs
Explore the Cisco UCS Manager XML API Management Information Tree
Explore Cisco ACI - DCAIE — AI Solutions on Cisco Infrastructure Essentials
- Длительность: 4 дня (32 часа)
- Код курса: DCAIE
- Стоимость
- Очный формат: 1 331 000 ₸
- Онлайн формат: 1 308 000 ₸
Описание курса
Course Description
The AI Solutions on Cisco Infrastructure Essentials (DCAIE) training covers the essentials of deploying, migrating, and operating AI solutions on Cisco data center infrastructure. You'll be introduced to key AI workloads and elements, as well as foundational architecture, design, and security practices critical to successful delivery and maintenance of AI solutions on Cisco infrastructure.
This training also earns 34 Continuing Education (CE) credits toward recertification.
This training will help you:
Gain the knowledge you need to deploy, migrate, and operate AI solutions on Cisco data center infrastructure
Qualify for professional-level job data center roles
Earn 34 CE credits toward recertificationWho Should Enroll
Network Designers
Network Administrators
Storage Administrators
Network Engineers
Systems Engineers
Data Center Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators/Partners
Field Engineers
Server Administrators
Network Managers
Program Managers
Project ManagersCourse Objectives
Describe key concepts in artificial intelligence, focusing on traditional AI, machine learning, and deep learning techniques and their applications
Describe generative AI, its challenges, and future trends, while examining the nuances between traditional and modern AI methodologies
Explain how AI enhances network management and security through intelligent automation, predictive analytics, and anomaly detection
Describe the key concepts, architecture, and basic management principles of AI-ML clusters, as well as describe the process of acquiring, fine-tuning, optimizing and using pre-trained ML models
Use the capabilities of Jupyter Lab and Generative AI to automate network operations, write Python code, and leverage AI models for enhanced productivity
Describe the essential components and considerations for setting up robust AI infrastructure
Evaluate and implement effective workload placement strategies and ensure interoperability within AI systems
Explore compliance standards, policies, and governance frameworks relevant to AI systems
Describe sustainable AI infrastructure practices, focusing on environmental and economic sustainability
Guide AI infrastructure decisions to optimize efficiency and cost
Describe key network challenges from the perspective of AI/ML application requirements
Describe the role of optical and copper technologies in enabling AI/ML data center workloads
Describe network connectivity models and network designs
Describe important Layer 2 and Layer 3 protocols for AI and fog computing for Distributed AI processing
Migrate AI workloads to dedicated AI network
Explain the mechanisms and operations of RDMA and RoCE protocols
Understand the architecture and features of high-performance Ethernet fabrics
Explain the network mechanisms and QoS tools needed for building high-performance, lossless RoCE networks
Describe ECN and PFC mechanisms, introduce Cisco Nexus Dashboard Insights for congestion monitoring, explore how different stages of AI/ML applications impact data center infrastructure, and vice versa
Introduce the basic steps, challenges, and techniques regarding the data preparation process
Use Cisco Nexus Dashboard Insights for monitoring AI/ML traffic flows
Describe the importance of AI-specific hardware in reducing training times and supporting the advanced processing requirements of AI tasks
Understand the computer hardware required to run AI/ML solutions
Understand existing AI/ML solutions
Describe virtual infrastructure options and their considerations when deploying
Explain data storage strategies, storage protocols, and software-defined storage
Use NDFC to configure a fabric optimized for AI/ML workloads
Use locally hosted GPT models with RAG for network engineering tasksCourse Prerequisites
There are no prerequisites for this training. This is an essentials training that progresses from beginner to intermediate content. Familiarity with Cisco data center networking and computing solutions is a plus but not a requirement. However, the knowledge and skills you are recommended to have before attending this training are:
Cisco UCS compute architecture and operations
Cisco Nexus switch portfolio and features
Data Center core technologiesThese skills can be found in the following Cisco Learning Offerings:
Introducing Cisco Unified Computing Systems (DCIUCS)
Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX)
Implementing Cisco Data Center Core Technologies (DCCOR)Course Outline
Fundamentals of AI
Generative AI
AI Use Cases
AI-ML Clusters and Models
AI Toolset Mastery - Jupyter Notebook
AI Infrastructure
AI Workload Placements and Interoperability
AI Policies
AI Sustainability
AI Infrastructure Design
Key Network Challenges and Requirements for AI Workloads
AI Transport
Connectivity Models
AI Network
Architecture Migration to AI/ML Network
Application-Level Protocols
High Throughput Converged Fabrics
Building Lossless Fabrics
Congestive Visibility
Data Preparation for AI
AI/ML Workload Data Performance
AI-Enabling Hardware
Compute Resources
Compute Resource Solutions
Virtual Resources
Storage Resources
Setting Up AI Cluster
Deploy and Use Open Source GPT Models for RAGLab Outline
AI Toolset—Jupyter Notebook
AI/ML Workload Data Performance
Setting Up AI Cluster
Deploy and Use Open Source GPT Models for RAG - SDSI — Designing Cisco Security Infrastructure
- Длительность: 5 дней (40 часов)
- Код курса: SDSI
- Стоимость
- Очный формат: 1 370 500 ₸
- Онлайн формат: 1 351 500 ₸
Описание курса
Course Description
The Designing Cisco Security Infrastructure (SDSI) training teaches you about security architecture design, including secure infrastructure, applications, risk, events, requirements, artificial intelligence (AI), automation, and DevSecOps.
This training prepares you for the 300-745 SDSI v1.0 exam. If passed, you earn the Cisco Certified Specialist – Designing Cisco Security Infrastructure certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification. This training also earns you 41 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain hands-on experience of security architecture design
Qualify for professional and expert-level security job roles
Prepare for the 300-745 SDSI v1.0 exam
Earn 41 CE credits toward recertificationWho Should Enroll
Cisco and Partner’s Systems Engineers
Customer Network & Infrastructure Engineers
Customer Security/NOC EngineersWhat to Expect in the Exam
Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 is a 90-minute exam associated with the Cisco Certified Specialist - Designing Cisco Security Infrastructure certification and satisfies the core exam requirement for the CCNP Security certification.
This exam tests your knowledge of security architecture design, including:
Secure infrastructure
Applications
Risk
Events
Requirements
Artificial intelligence and Automation
DevSecOpsCourse Objectives
Identify and explain the fundamental concepts of security architecture and how they support the design, building, and maintenance of a secure infrastructure
Identify the layers of security infrastructure, core security technologies, and infrastructure concepts
Explain how security designs principles contribute to secure infrastructure
Identify and discuss security design and management frameworks that can be used for infrastructure security design
Explain the importance of and methods for enforcement of regulatory compliance in security design
Identify tools that enable detection and response to infrastructure security incidents
Explain various strategies that can be implemented to modify traditional security architectures to meet the technical requirements of modern enterprise networks
Implement secure network access methods, such as 802.1X, MAC Authentication Bypass (MAB), and web-based authentication
Describe security technologies that can be applied to enterprise Wide Area Network (WAN) connections
Compare methods to secure network management and control plane traffic
Compare the differences between traditional firewalls and next-gen firewalls (NGFWs) and identify the advanced features that NGFWs provide
Explain how web application firewalls (WAFs) secure web applications from threats
Describe the key features and best practices for deploying intrusion detection system (IDS) and intrusion prevention system (IPS) as part of the enterprise infrastructure security design
Explain how endpoints and services in cloud-native or microservice environments can be protected with host-based or distributed firewalls
Discuss security technologies that address application data and data that is in transit
Identify several security solutions for cloud-native applications, microservices, and containers
Explain how technology advancements allow for improvements in today’s infrastructure security
Identify tools that enable detection and response to infrastructure security incidents
Describe frameworks and controls to access and mitigate security risks for infrastructure
Explain how to make security adjustments following a security incident
Identify DevSecOps integrations that improve security management and response
Discuss how to ensure that automated services are secure
Discuss how AI can aid in threat detection and responseCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Cisco CCNP Security or equivalent knowledge
Familiarity with Microsoft Windows Operating Systems
Familiarity with the Cisco Security portfolioThese skills can be found in the following Cisco Learning Offerings:
Implementing and Operating Cisco Security Core Technologies (SCOR)
Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)
Implementing and Configuring Cisco Identity Services Engine (SISE)
Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPA)
Implementing Automation for Cisco Security Solutions (SAUI)
Implementing Secure Solutions with Virtual Private Networks (SVPN)
Introducing Automation for Cisco Solutions (CSAU)
Securing Email with Cisco Email Security Appliance (SESA)
Securing the Web with Cisco Web Security Appliance (SWSA)Course Outline
Definition and Purpose of Security Architecture
Components of Security Infrastructure
Security Design Principles
Security and Design Frameworks
Compliance and Regulatory Requirements
Security Approaches to Protect Against Threats
Modify the Security Architecture to Meet Technical Requirements
Network Access Security
VPN and Tunneling Solutions
Secure Infrastructure Management and Control Planes
Nextgen Firewalls
Web Application Firewall (WAF)
IPS/IDS Deployment
Host-Based Firewalls and Distributed Firewalls
Security Solutions Based on Application and Flow Data
Security for Cloud-Native Applications, Microservices, and Containers
Emerging Technologies in Application Security
SOC Tools for Incident Handling and Response
Modify Design to Mitigate Risk
Incident-Driven Security Adjustments
DevSecOps Integration
Secure Automated Workflows and Pipelines
AI’s Role in Securing Infrastructure - BGP — Configuring BGP on Cisco Routers V4.0
- Длительность: 5 дней (40 часов)
- Код курса: BGP
- Стоимость
- Очный формат: 763 000 ₸
- Онлайн формат: 740 500 ₸
Описание курса
Course Description
The Configuring BGP on Cisco Routers training teaches the underlying foundations of the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS). It prepares students to design and implement efficient, optimal, and trouble-free BGP networks covering:
The theory of BGP and configuration of BGP on Cisco IOS routers
Detailed troubleshooting information and hands-on exercises that provide students with the skills needed to configure and troubleshoot BGP networks in customer environments
BGP network design issues and usage rules for various BGP featuresWho Should Enroll
Network administrators
Network engineers
Network managers
Systems engineers (who would like to implement BGP)Course Objectives
Upon completion of this course, you will be able to:
Describe how to configure, monitor, and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains
Describe how to use BGP policy controls to influence the BGP route selection process in a network scenario in which you must support connections to multiple ISPs
Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections.
Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented
Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems.
Enable route reflection as possible solution to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems.
Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP networkCourse Prerequisites
The knowledge and skills that a learner must have before attending this course are as follows:
Intermediate to advanced knowledge of Cisco IOS Software configuration
Configuring and troubleshooting RIP, EIGRP, OSPF and IS-IS
Skills and knowledge equivalent to those learned in:
Implementing and Administering Cisco Solutions (CCNA)
Implementing Cisco Advanced Routing and Services (ENARSI)
Implementing and Operating Cisco Service Provider Core Technologies (SPCOR)Course Outline
Module 1: BGP Overview
Module 2: BGP Transit Autonomous Systems
Module 3: Route Selection Using Policy Controls
Module 4: Route Selection Using Attributes
Module 5: Customer to Provider Connectivity with BGP
Module 6: Scaling Service Provider Networks
Module 7: Optimizing BGP ScalabilityLab Outline
Discovery 1: Configure Basic BGP
Discovery 2: Announcing Networks in BGP
Discovery 3: Implement BGP TTL Security Check
Discovery 4: BGP Route Propagation
Discovery 5: IBGP Full Mesh
Discovery 6: BGP Administrative Distance
Discovery 7: Configure Non-Transit Autonomous System
Discovery 8: Filtering Customer Prefixes
Discovery 9: Prefix-Based Outbound Route Filtering
Discovery 10: Configure Route Maps as BGP Filters
Discovery 11: Configure Per-Neighbor Weights
Discovery 12: Configure and Monitor Local Preference
Discovery 13: Configure Local Preference Using Route Maps
Discovery 14: Configure AS Path Prepending
Discovery 15: Configure MED
Discovery 16: Configure Local Preference Using the Communities
Discovery 17: Configure Route Reflector
Discovery 18: Configure BGP Route Limiting
Discovery 19: Configure BGP Peer Groups - MPLS — Implementing Cisco MPLS v3.0
- Длительность: 5 дней (40 часов)
- Код курса: MPLS
- Стоимость
- Очный формат: 826 500 ₸
- Онлайн формат: 807 500 ₸
Описание курса
Course Description
The Implementing Cisco Multiprotocol Label Switching training teaches you the high-performance method for forwarding packets through a network. MPLS enables routers at the edge of a network to apply simple labels to packets. This practice allows the edge devices to switch packets according to labels, with minimal lookup overhead. MPLS integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility of network Layer 3 routing. When used in conjunction with other standard technologies, MPLS gives the ability to support value-added features.
How You'll Benefit
Acquire the skill of implementing MPLS high-performance methods for forwarding packets in a network
Learn to configure routers at the network edge to apply simple labels to packets
Gain the knowledge to enable edge devices, ATM switches, or existing routers to switch packets based on labels within the service provider core
Master the skill of minimizing lookup overhead in the packet-switching process
Gain proficiency in integrating the performance and traffic-management capabilities of data-link Layer 2 using MPLS
Acquire the skill of combining the scalability and flexibility of network Layer 3 routing through MPLS
Learn to leverage MPLS with other standard technologies to implement value-added features for service providers' networksWho Should Enroll
Network administrators
Network engineers
Network managers
Systems engineers (who would like to implement MPLS and MPLS Traffic Engineering)Course Objectives
Upon completion of the course, students will have the knowledge and skills to:
Describe the features of MPLS
Describe how MPLS labels are assigned and distributed
Identify the Cisco IOS tasks and command syntax necessary to implement MPLS on frame-mode Cisco IOS platforms
Describe the MPLS peer-to-peer architecture and explain the routing and packet forwarding model in this architecture
Identify the Cisco IOS command syntax required to successfully configure, monitor, and troubleshoot VPN operations
Identify how the MPLS VPN model can be used to implement managed services and internet access
Describe the various internet access implementations that are available and the benefits and drawbacks of each model
Provide an overview of MPLS Traffic EngineeringCourse Prerequisites
It is recommended, but not required, to have the following skills and knowledge before attending this course:
Intermediate to advanced knowledge of Cisco IOS Software configuration
Configuring and troubleshooting EIGRP, OSPF, IS-IS and BGP
The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
MPLS Features
Label Assignment and Distribution
Frame-Mode MPLS Implementation on Cisco IOS Platforms
MPLS Virtual Private Network Technology
MPLS VPN Implementation
Complex MPLS VPNs
Internet Access and MPLS VPNs
MPLS Traffic Engineering OverviewLab Outline
Verifying CEF Switching
Enabling MPLS
Change IP TTL Propagation
Configure MP-IBGP
Configure the VRF Instances
Configure RIP as a PE-CE Routing Protocol
Configure EIGRP as a PE-CE Routing Protocol
Configure OSPF as a PE-CE Routing Protocol
Configure BGP as a PE-CE Routing Protocol
Configure a Central Services VPN
Configure MPLS Traffic Engineering
Implement the Service Provider's and Customer's IP Addressing and IGP Routing
Implement the Core MPLS Environment in the Service Provider Network
Implement EIGRP Based VPNs
Implement OSPF Based MPLS VPNs
Implement BGP Based MPLS VPNs
Implement MPLS Traffic Engineering - IP6FD — Основы протокола IPv6, дизайн и построение сетей на его основе
- Длительность: 5 дней (40 часов)
- Код курса: IP6FD
- Стоимость
- Очный формат: 915 500 ₸
- Онлайн формат: 891 500 ₸
Описание курса
Course Description
IPv6 Fundamentals, Design, and Deployment (IP6FD) is a five-day training that provides you with the knowledge and skills needed to implement and configure the IP version 6 (IPv6) features of Cisco IOS software. The training also provides an overview of IPv6 technologies; covers IPv6 design and implementation; describes IPv6 operations, addressing, routing, services, and transition; and describes deployment of IPv6 in enterprise networks as well as in service provider networks. The training includes case studies that are useful for deployment scenarios and remote labs.
This training also earns you 40 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Learn how to successfully configure the IP version 6 features of Cisco IOS Software
Gain leading-edge skills for high-demand responsibilities in the enterprise sector
Earn 40 CE credits toward recertificationWho Should Enroll
Network Engineers
Course Objectives
Describe the history of IP version 4 (IPv4) and the rationale for implementing IPv6 to resolve IPv4 addressing and security issues
Explain the benefits of addressing with IPv6 and describe how larger IPv6 address sizes facilitate auto configuration and aggregation
Describe the market drivers that help promote IPv6 as the key technology of the future
Describe the IPv6 addressing architecture, including types of addresses and address representation
Describe changes in the IPv6 header and the purpose of extension headers
Describe and use Cisco IOS software commands to enable IPv6 on Cisco routers
Describe internet control message protocol (ICMP) types and codes and IPv6 neighbor discovery, which is the process in which neighbors discover each other and autoconfigure addresses
Describe the IPv6 configuration process on Cisco IOS software and provide some basic methods for troubleshooting issues that relate to IPv6 configurations
Explain IP mobility in general and describe the IPv6 network mobility model with possible usages
Describe how domain name system (DNS) works in an IPv6 environment
Describe dynamic host configuration protocol (DHCP) version 6 (DHCPv6) for IPv6 operations, including how DHCP operation in IPv6 differs from its operation in IPv4 and how you can implement DHCPv6 prefix delegation to improve the IPv6 numbering process
Describe the fields in the IPv6 header that are used to support quality of service (QoS) and explain how these fields differ from the IPv4 QoS model
Describe Cisco IOS tools, such as Telnet, Trivial File Transfer Protocol (TFTP), Secure Shell Protocol (SSH), and others
Describe open shortest path first (OSPF)v3, the IPv6-capable version of the OSPF routing protocol, including its operations, configuration, and commands
Describe Cisco enhanced interior gateway routing protocol (EIGRP), including its operation, configuration, and commands
Explore multiprotocol border gateway protocol (MP-BGP), including operation, IPv6-related configuration, and commands
Explain the issues when using policy-based routing (PBR) and when disabling the processing of extension headers
Describe the characteristics of first hop redundancy protocol (FHRP) for IPv6, which are used to offer redundant connections on the network layer for upstream connectivity
Describe redistribution of IPv6 routing information, differences among various routing protocols, and changes in the behavior of redistribution compared to IPv4
Describe the IPv6 multicast addresses format, including a real-life multicast example
Describe IPv6 multicast addressing options, media access control (MAC) address mappings, and multicast address scoping
Describe the dual-stacking approach to integrating IPv6 functionality into an existing IPv4-only environment
Describe tunneling mechanisms for IPv4-to-IPv6 transition, or for supporting IPv4 and IPv6 coexistence
Explain the benefits of adopting IPv6 single stack instead of using both IPv4 and IPv6 and the process for converting networks from IPv4 to IPv6
Describe the features of access control lists (ACLs) in an IPv6 environment
Describe how security is implemented in IPv6
Describe security issues in an IPv6 transition environment
Describe security practices for IPv6 deployment
Describe how Cisco IOS Firewall works and how to configure it in Pv6 traffic
Describe the IPv6 networking environments in use today, the process of becoming an IPv6 internet service provider (ISPs), address allocation policies and organizations, and strategies for connecting to the IPv6 internet
Identify an IPv6 multihoming issue and prescribe a potential solution
Describe several IPv6 enterprise deployment strategies
Explain how to deploy IPv6 over a multi-protocol label switching (MPLS) network
Describe IPv6 broadband access services and digital subscriber line (DSL)-based access in particular
Describe how to plan and implement IPv6 in enterprise networks
Describe how plan and implement IPv6 cloud and software-defined deployments
Describe and identify the most common planning and implementation approaches as they pertain to moving to IPv6 in branch networksCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Understanding of networking and routing (on Cisco CCNP level, but no formal certification is required)
Working knowledge of the Microsoft Windows operating system
These skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA)Course Outline
Explaining the Rationale for IPv6
IPv6 Features and Benefits
Market Drivers
IPv6 Addressing Architecture
IPv6 Header Format
Enabling IPv6 on Cisco Routers
Using ICMPv6 and Neighbor Discovery
Troubleshooting IPv6
IPv6 Mobility
DNS in an IPv6 Environment
DHCPv6 Operations
QoS Support in an IPv6 Environment
Cisco IOS XE Software Features
Examining OSPFv3
Examining EIGRP for IPv6
Introducing MP-BGP
Configuring IPv6 Policy-Based Routing
Configuring FHRP for IPv6
Configuring Route Redistribution
Implementing Multicast in an IPv6 Network
Using IPv6 MLD
Implementing Dual-Stack
IPv6 Tunneling Mechanisms
Transition to Single-Stack Deployments
Configuring IPv6 ACLs
Using IPsec, IKE, and VPNs
Security Issues in an IPv6 Transition Environment
IPv6 Security Practices
Configuring Cisco IOS Firewall for IPv6
IPv6 Address Allocation
IPv6 Multihoming Issues
IPv6 Enterprise Deployment Strategies
Support for IPv6 in MPLS
IPv6 Broadband Access Services
Planning and Implementing IPv6 Cloud and Software-Defined Deployments
Planning and Implementing IPv6 in Enterprise Networks
Planning and Implementing IPv6 in Branch NetworksLab Outline
Using Neighbor Discovery
Using Prefix Delegation
Routing with OSPFv3
Routing with EIGRP Routing with BGP and MP-BGP
Multicasting
Implementing Tunnels for IPv6
Configuring Advanced ACLs
Implementing IPsec and IKE
Configuring Cisco IOS Firewall - SPFNDU — Understanding Cisco Service Provider Network Foundations
- Длительность: 5 дней (40 часов)
- Код курса: SPFNDU
- Стоимость
- Очный формат: 826 500 ₸
- Онлайн формат: 807 500 ₸
Описание курса
Course Overview
The Understanding Cisco Service Provider Network Foundations (SPFNDU) v1.0 course is designed to provide you with the foundational knowledge for the suite of Cisco® CCNP® Service Provider courses. The course expands what you learned from the Cisco CCNA® course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. This course also earns you 30 Continuing Education (CE) credits towards recertification.
Who should attend
Network administrator
Network engineer
Network manager
System engineer
Project manager
Network designerCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Knowledge of IPv4 and IPv6 Transmission Control Protocol/Internet Protocol (TCP/IP) networking
Familiarity with a typical service provider environment
Basic knowledge about networking devices and their rolesThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA)Course Objectives
Describe network architectures, devices, and software used by service providers
Describe the various Internet governance organizations, their roles, and tools available for governance information verification
Configure Cisco Internetwork Operating System (Cisco IOS®) and Cisco IOS XE routers
Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks
Describe various access and core technologies used by service providers
Describe various major switching technologies used by service providers
Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN)
Describe various major routing protocols used by service providers
Configure Layer 3 services used by service providers
Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage
Describe usage of various services used and maintained by service providers
Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR softwareLab Topology
Review Lab Environment
Examine Governance Data
Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration
Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices
Perform Initial Cisco IOS XR Configuration
Configure and Verify Connectivity on Cisco IOS XR
Configure Intermediate System to Intermediate System (IS-IS)
Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng)
Configure Basic Border Gateway Protocol (BGP)
Configure MPLS
Configure Internet Protocol Service Level Agreement (IP SLA)
Configure Hot Standby Router Protocol (HSRP) with Object Tracking
Configure Virtual Routing and Forwarding (VRFs)
Configure Network Time Protocol (NTP)
Use Linux Command Line Interface
Configure IOS XR Using a Bash ScriptOutline:
Introducing Service Provider Architectures
Describing Internet Governance Organizations
Configuring the Cisco IOS and Cisco IOS XE Router
Configuring Cisco IOS XR Router
Introducing Access and Core Technologies in the Service Provider Environment
Introducing Routing Technologies in the Service Provider Environment
Describing MPLS
Implementing Layer 3 Services
Introducing Switching Technologies in the Service Provider Environment
Introducing Overlay Technologies
Implementing Service Provider Services
Introducing Programmability on Cisco IOS XR Routers - SPCOR — Implementing and Operating Cisco Service Provider Network Core Technologies
- Длительность: 5 дней (40 часов)
- Код курса: SPCOR
- Стоимость
- Очный формат: 826 500 ₸
- Онлайн формат: 807 500 ₸
Описание курса
Course Description
The Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training expands your knowledge and skills of service provider core networks. You will gain the theoretical and practical knowledge needed to implement and operate service provider networks using technologies such as core architecture, services, networking, automation, quality of service (QoS), security, and network assurance.
This training prepares you for the 350-501 SPCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider and Cisco Certified Internetwork Expert (CCIE) Service Provider certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Configure, verify, troubleshoot, and optimize next-generation, service provider internet protocol (IP) network infrastructures
Deepen your understanding of service provider technologies, including core architecture, services, networking, automation, quality of services, security, and network assurance
Prepare for the 350-501 SPCOR v1.0 exam
Earn 64 CE credits towards recertificationWho Should Enroll
Network Administrators
Network Engineers
Network Managers
System Engineers
Project Managers
Network DesignersWhat to Expect in the Exam
Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) v1.0 is a 120-minute exam associated with the Cisco Certified Specialist – Service Provider Core certification and satisfies the core exam requirement for the CCNP Service Provider and CCIE Service Provider certifications.
This exam tests your knowledge of core service provider network technologies, including:
Core architecture
Services
Networking
Automation
Quality of services
Security
Network assuranceCourse Objectives
Describe the service provider network architectures, concepts, and transport technologies
Describe the Cisco IOS software architectures, main internetwork operating system (IOS) types, and their differences
Implement open shortest path first (OSPF) in the service provider network
Implement integrated intermediate system to intermediate system (IS-IS) in the service provider network
Implement border gateway protocol (BGP) routing in service provider environments
Implement route maps and routing policy language
Describe IPv6 transition mechanisms used in the service provider networks
Implement high availability mechanisms in Cisco IOS XR software
Implement traffic engineering in modern service provider networks for optimal resource utilization
Describe segment routing and segment routing traffic engineering concepts
Describe the virtual private network (VPN) technologies used in the service provider environment
Configure and verify multi-protocol label switching (MPLS) L2VPN in service provider environments
Configure and verify MPLS L3VPN in service provider environments
Implement IP multicast services
Describe the QoS architecture and QoS benefits for service provider networks
Implement QoS in service provider environment
Implement control plane security in Cisco devices
Implement management plane security in Cisco devices
Implement data plane security in Cisco devices
Describe the YANG data modeling language
Implement automation and assurance tools and protocols
Describe the role of Cisco Network Services Orchestrator (NSO) in service provider environments
Implement virtualization technologies in service provider environmentCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Intermediate knowledge of Cisco IOS or IOS XE
Familiarity with Cisco IOS or IOS XE and Cisco IOS XR software configuration
Knowledge of IPv4 and IPv6 transmission control protocol (TCP)/IP networking
Intermediate knowledge of IP routing protocols
Understanding of MPLS technologies
Familiarity with VPN technologiesThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Service Provided Network Foundations (SPFNDU)Course Outline
Describing Service Provider Network Architectures
Describing Cisco IOS Software Architectures
Implementing OSPF for Cisco IOS XR
Implementing IS-IS for Cisco IOS XR
Implementing BGP in Service Provider Network
Implementing Route Maps and RPL
Transitioning to IPv6 for Cisco IOS XR and IOS XE
Implementing High Availability in Networking
Implementing MPLS for Cisco IOS XR
Implementing Cisco MPLS Traffic Engineering
Describing Segment Routing
Describing VPN Services
Configuring L2VPN Services
Configuring L3VPN Services
Implementing Multicast for Cisco IOS XR
Describing QoS Architecture
Implementing QoS for Cisco IOS XR
Implementing Control Plane Security
Implementing Management Plane Security
Implementing Data Plane Security
Introducing Network Programmability
Implementing Automation and Assurance
Introducing Cisco NSO
Implementing Virtualization in Service Provider EnvironmentLab Outline
Deploy Cisco IOS XR and IOS XE Basic Device Configuration
Implement OSPF Routing
Implement Integrated IS-IS Routing
Implement Basic BGP Routing
Filter BGP Prefixes Using RPL
Implement MPLS in the Service Provider Core
Implement Cisco MPLS TE
Implement Segment Routing
Implement EoMPLS
Implement MPLS L3VPN
Implement BGP Security
Implement RTBH Filtering - SPRI — Implementing Cisco Service Provider Advanced Routing Solutions
- Длительность: 5 дней (40 часов)
- Код курса: SPRI
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) training teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks.
This training prepares you for the 300-510 SPRI v1.1 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Advanced Routing Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Service Provider certification. This training also earns you 37 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the high-demand skills to maintain and operate advanced technologies related to Service Provider core networks
Increase your knowledge and skills for implementing Service Provider core advanced technologies through hands-on application and practical instruction
Prepare for the 300-510 SPRI v1.1 exam
Earn 37 CE credits toward recertificationWho Should Enroll
Network Administrators
System Engineers
Project Managers
Network DesignersWhat to Expect in the Exam
Implementing Cisco Service Provider Advanced Routing Solutions (300-510 SPRI) v1.1 is a 90-minute exam associated with the Cisco Certified Specialist – Service Provider certification and satisfies the concentration exam requirement for the CCNP Service Provider certification.
This exam tests your knowledge of implementing service provider advanced routing technologies, including:
Routing protocols
Policy language
MPLS
Segment routingCourse Objectives
Configure multiarea OSPF
Configure OSPF special area types and optimization features
Configure IS-IS multilevel networks and optimization features
Configure BGP to influence outbound and inbound BGP route selection
Implement BGP route reflectors and confederations
Describe the main characteristics of routing protocol tools that are used in service provider environments
Implement the Routing Policy Language
Configure route redistribution
Troubleshoot routing protocols in the service provider network
Describe, implement, and troubleshoot MPLS in service provider network
Describe and implement segment routing technology
Introduce and implement segment routing IPv6
Implement BGP security options
Implement advanced features to improve convergence in BGP networks
Implement Topology Independent Loop-Free Alternate (TI-LFA)
Describe Cisco MPLS traffic engineering
Describe how traffic engineering is used in segment routing networks
Implement and configure advanced SR-TE features
Implement IPv6 tunneling mechanisms
Describe IP multicast concepts and technologies
Implement and verifying the PM-SM protocol
Implement enhanced PIM-SM features
Implement MSDP in the interdomain environment
Implement mechanisms for dynamic RP distributionCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Intermediate to advanced knowledge of Cisco Internetwork Operating System (Cisco IOS) or IOS XE and Cisco IOS XR Software configuration
Knowledge of IPv4 and IPv6 TCP/IP networking
Intermediate knowledge of BGP, OSPF, and ISIS routing protocols
Understanding of MPLS technologies
Understanding of multicast technologies
Familiarity with segment routingThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)Course Outline
Configure OSPF Multiarea Networks
Configure OSPF Special Area Types
Configure OSPF Optimization Features
Configure IS-IS Multilevel Networks
Configure IS-IS Optimization Features
Introducing Routing Protocol Tools
Introducing Routing Policy Language
Influencing Outbound BGP Route Selection
Influencing Inbound BGP Route Selection
Scaling BGP in Service Provider Networks
Implementing Route Redistribution
Troubleshooting Routing Protocols
Improving BGP Convergence and Implementing Advanced Operations
Multiprotocol Label Switching
Cisco MPLS Traffic Engineering
Troubleshooting MPLS
Segment Routing
Implementing Segment Routing
Segment Routing for IPv6
Implementing Segment Routing for IPv6
Segment Routing TI-LFA
Segment Routing Traffic Engineering
Advanced Segment Routing Traffic Engineering Features
Securing BGP
Deploying IPv6 Tunneling Mechanisms
IP Multicast Concepts and Technologies
Implementing PIM-SM Protocol
Implementing PIM-SM Enhancements
Implementing Interdomain IP Multicast
Implementing MPLS
Implementing Distributed Rendezvous Point Solution in Multicast NetworkLab Outline
Implement OSPF Special Area Types (IPv4 and IPv6)
Implement OSPF Route Summarization (IPv4 and IPv6)
Implement Multiarea IS-IS
Implement IS-IS Route Summarization
Implement Outbound BGP Route Selection
Implement Inbound BGP Route Selection
Implement BGP Route Reflectors
Implement Route Redistribution
Troubleshoot Routing Protocols
Configure and Verify IGP Segment Routing
Configure and Verify SRv6
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR-TE Using OSPF
Configure and Verify SR-TE Using IS-IS
Configure and Verify ODN and Flexible Algorithm
Implement BGP Security Options
Implement Tunnels for IPv6
Enable and Optimize PIM-SM
Implement PIM-SM Enhancements
Implement MPLS in the Service Provider Core
Implement Rendezvous Point Distribution - SPVI — Implementing Cisco Service Provider VPN Services
- Длительность: 5 дней (40 часов)
- Код курса: SPVI
- Стоимость
- Очный формат: 794 000 ₸
- Онлайн формат: 774 000 ₸
Описание курса
Course Overview
The Implementing Cisco Service Provider VPN Services (SPVI) v1.0 course prepares you to manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone. You will complete hands-on labs to reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs. The course also covers solutions for deploying MPLS VPN crossing multiple Service Provider domains that improve the use of network bandwidth.
This course prepares you for the 300-515 Implementing Cisco® Service Provider VPN Services (SPVI) exam. By passing this exam, you earn the Cisco Certified Specialist – Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP® Service Provider certification.
What to expect in the exam
The 300-515 SPVI exam certifies your knowledge of implementing service provider VPN services including Layer 2, Layer 3, and IPv6. After you pass 300-515 SPVI, you earn the Cisco Certified Specialist – Service Provider VPN Services Implementation certification, and you satisfy the concentration exam requirement for the CCNP Service Provider certification.
Who should attend
This course is for network professionals who need to learn the techniques to implement, configure, monitor, and support Service Provider VPN solutions based on MPLS backbones.
Network administrators
Network engineers
Network supervisors
Network managers
Network Operations Center (NOC) personnel
Network designers
Network architects
Channel partnersHow You'll Benefit
This course will help you:
Gain valuable skills in reinforcing MPLS VPN fundamental concepts, benefits, and classifications
Learn to configure optional paths for traffic to avoid network congestion
Earn 40 CE credits toward recertification
Prepare to take the 300-515 SPVI examCourse Objectives
After taking this course, you should be able to:
Describe VPN concepts and operation in a Service Provider environment
Implement Layer 3 MPLS VPN operations in a Service Provider environment
Implement Layer 3 Inter-domain MPLS VPN services traversing multiple Service Providers
Implement Layer 3 Multicast MPLS VPN operations in a Service Provider environment
Troubleshoot typical issues in Layer 3 MPLS VPN environments
Implement Layer 2 VPN operations in a Service Provider environment
Troubleshoot Layer 2 VPN issues in a Service Provider network
Implement MPLS VPN solutions for IPv6 environments
Troubleshoot MPLS VPN solutions for IPv6 environmentsCourse Prerequisites
Before taking this course, you should have Service Provider knowledge at the professional level, equivalent to the material in the following Cisco courses:
Building Cisco Service Provider Next-Generation Networks Part 1 (SPNGN1)2
Building Cisco Service Provider Next-Generation Networks Part 2 (SPNGN2)2
Deploying Cisco Service Provider Network Routing (SPROUTE)In the new certification program, foundational material is covered in these courses:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Service Provider Network Foundations (SPFNDU)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)Outline:
Introducing VPN Services
VPN Fundamentals
MPLS VPN Control Plane OperationTroubleshooting MPLS VPN Underlay
Troubleshoot Core Interior Gateway Protocol (IGP)
Troubleshoot Border Gateway Protocol (BGP)Implementing Layer 3 MPLS VPNs
Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs
Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNsImplementing Layer 3 Interdomain MPLS VPNs
Inter-Autonomous System (AS) for Layer 3 MPLS VPNs
Content Security and Control (CSC) for Layer 3 MPLS VPNsImplementing Layer 3 Multicast MPLS VPNs
Multicast VPN (MVPN) Fundamentals
Implement Intranet MVPNTroubleshooting Intra-AS Layer 3 VPNs
Troubleshoot PE-CE Connectivity
Troubleshoot PE-to-Route ReflectorImplementing Layer 2 VPNs
Layer 2 Service Architecture and Carrier Ethernet Services
Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree SolutionsTroubleshooting Layer 2 VPNs
Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions
Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) SolutionsImplementing Layer 3 IPv6 MPLS VPNs
Classical Solutions for Deploying IPv6 over IPv4 Environments
Using 6VPE to Deploy IPv6 Connectivity over MPLS EnvironmentTroubleshooting Layer 3 IPv6 MPLS VPNs
Troubleshooting PE-to-PE ConnectivityLab Outline
Verify the Service Provider Backbone Operation for MPLS VPN
Work with VRF Instances
Troubleshoot the MPLS VPN Backbone
Configure MP-BGP as the PE-CE Routing Protocol
Configure and Verify PE-to-CE Routing Requirements
Enable Shared Services VPN
Deploy Internet Access as a VPN Service
Troubleshoot Layer 3 MPLS VPN End-Customer Connectivity
Implement Different EVPN Solutions
Troubleshoot EVPN VPWS
Implement IPv6 VPN Provider Edge Router (6VPE) - SEGRTE201 — Implementing Segment Routing on Cisco IOS XR
- Длительность: 4 дня (32 часа)
- Код курса: SEGRTE201
- Стоимость
- Очный формат: 880 500 ₸
- Онлайн формат: 790 500 ₸
Описание курса
Course Overview
The Implementing Segment Routing on Cisco IOS XR (SEGRTE201) v2.0 course covers the fundamental concepts of Segment Routing (SR), how to configure and verify segment routing within an Interior Gateway Protocol (IGP), and the interworking of Label Distribution Protocol (LDP) with segment routing. You will learn how to implement Topology-Independent Loop-Free Alternate (TI-LFA) using segment routing, and how to instantiate and verify segment routing traffic engineering policies. You will also learn how to implement segment routing within Border Gateway Protocol (BGP).
How you’ll benefit
This course will help you:
Learn how to configure and verify segment routing within an Interior Gateway Protocol (IGP)
Prepare to implement topology-independent loop-free alternate using segment routing
Learn to implement segment routing within Border Gateway ProtocolWho should attend
Systems engineers
Network engineers
Field engineers
Technical support personnel
Channel partners and resellersPrerequisites
Before taking this course, you should have:
Familiarity with Cisco Internetwork Operating System (IOS®) XR software
Knowledge of general networking conceptsCourse Objectives
After taking this course, you should be able to:
Describe the key concepts of segment routing
Implement and verify IGP segment routing
Migrate an existing Multiprotocol Label Switching (MPLS) LDP-based network to segment routing
Implement and verify TI-LFA segment routing
Instantiate segment routing policies
Instantiate multidomain segment routing policies
Configure and verify BGP prefix segments and SR-based servicesLab Topology
Configuring and Verifying IGP Segment Routing
Migrating from LDP to Segment Routing
Configuring and Verifying TI-LFA Fast Reroute
Configuring and Verifying SR Policies
Configuring and Verifying Multidomain SR-TE
Configuring and Verifying BGP Segment RoutingOutline:
Introduction to Segment Routing
IGP Segment Routing Implementation and Verification
Segment Routing and LDP Interworking
Topology Independent – Loop Free Alternate
Segment Routing Policies – Traffic Engineering (SR-TE)
Multidomain SR Policies
BGP Prefix Segment and Egress Peer Engineering - EPNM — Cisco SP Technologies and Management with EPNM
- Длительность: 5 дней (40 часов)
- Код курса: EPNM
- Стоимость
- Очный формат: 1 636 500 ₸
- Онлайн формат: 1 624 500 ₸
Описание курса
Содержание курса:
Module 1. The Concept of Service Provider Routing
1.1. SP Routing Overview
1.2. Link State IGP Routing
1.3. BGP Introduction
1.4. BGP ScalabilityModule 2. Implementing MPLS L3 VPN
2.1. MPLS Overview
2.2. SP VPN Technology Overview
2.3. The concept of VRFs
2.4. Using MP-BGP between PEs
2.5. CE-PE Routing Using Different Protocols
2.6. Multipoint MPLS L3 VPNModule 3. Implementing MPLS L2 VPN
3.1. Metro Ethernet Introduction
3.2. MPLS L2 Pseudowires
3.3. Virtual Private Lan Service.
3.4. VPLS BGP Auto-Discovery
3.5. MPLS EVPNModule 4. Traffic Engineering
4.1. The Concept of Traffic Engineering
4.2. RSVP Based Traffic Engineering
4.3. Introduction to Segment Routing (SR)
4.4. SR and LDP Interworking
4.5. TI-LFA
4.6. Segment Routing Traffic Engineering (SR-TE)Module 5. Cisco Evolved Packet Network Manager
5.1. Exploring Cisco EPN Manager
5.2. Viewing Devices and Inventory
5.3. Viewing Network Topologies and Circuits
5.4. Using Dashboards
5.5. Managing Alarms and Events
5.6. Generating Reports
5.7. Performing Basic Administration
5.8. Adding Devices
5.9. Backup and Restoring
5.10. Performing System Maintenance
5.11. Software Image Management (SWIM)
5.12. Configuration Management
5.13. Monitoring with Policies
5.14. Provisioning Carrier Ethernet Services
5.15. Provisioning Cisco MPLS Traffic Engineering ServicesLabs
- ASR9KE — Cisco Aggregation Services Router 9000 Series Essentials
- Длительность: 4 дня (32 часа)
- Код курса: ASR9KE
- Стоимость
- Очный формат: 967 500 ₸
- Онлайн формат: 947 500 ₸
Описание курса
Course Overview
The Cisco Aggregation Services Router 9000 Series Essentials v6.1 course introduces you to the features and functions of the Cisco® Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS® XR 64-Bit software packages.
This course will help you:
Understand the essential features and functions of the ASR 9000 Series routers running Cisco IOS XR 64-Bit software
Practice Cisco IOS XR 64-Bit configurations on the ASR 9900 Series router in lab exercises
Configure Cisco ASR 9900 configuration changes and restore older versions of the configuration
Install the Cisco IOS XR 64-Bit Software operating system, Package Information Envelopes (PIEs), and Software Maintenance Updates (SMUs)
Understand data flow through the Cisco ASR 9000 and ASR 9900 Series routerWho should attend
This course is designed for technical professionals who need to know how to deploy Cisco ASR 9000 Series routers in their network environment. The primary audience for this course includes:
System engineers
Technical support personnel
Channel partners, resellersPrerequisites
Before attending this course, you should have the following knowledge and skills:
Basic IOS XR 64-Bit Software configuration commands
Basic knowledge of router installation and some experience with installation tools
Routing protocol configuration experience with BGP, Intermediate System-to-Intermediate System (IS-IS), and Open Shortest Path First (OSPF)
Knowledge of Layer 2 IEEE switching and related protocols
Strong knowledge of MPLS configuration or multicast configuration experience
Experience troubleshooting Cisco routers in a large network environmentCourse Objectives
After taking this course, you should be able to:
List and describe the major features and benefits of a Cisco ASR 9000 Series router
List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system
Understand data flow through the Cisco ASR 9000 Series router
Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration
Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes, and software maintenance updates
Enable multicast routing on a Cisco ASR 9900 Series router
Configure Layer 3 VPN services
Configure Ethernet link bundles
Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN)
Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN
Configure EoMPLS with pseudowire backup
Configure local Ethernet LAN (E-LAN) L2VPN
Describe Virtual Private LAN Service (VPLS) L2VPN
Describe VPLS with Border Gateway Protocol (BGP) autodiscovery
Configure service-based Connectivity Fault Management (CFM)
Configure Layer 2 multicast features
Describe basic QoS implementation
Describe how to configure and verify network Virtualization (nV) on the ASR 9000 seriesCourse Outline:
Cisco Aggregation Services Router 9000 Series Essentials (ASR9KE)
Cisco ASR 9000 Series Hardware
Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals
Cisco IOS XR 64-Bit Software Installation
Cisco IOS XR 64-Bit Software Configuration Basics
Cisco IOS XR 64-Bit Software Routing Protocols
Multicast Routing
Cisco Multiprotocol Label Switching
Cisco IOS XR 64-Bit Segment Routing
Layer 3 VPNs
Cisco ASR 9000 Layer 2 Architecture
Point-to-Point Layer 2 Services
Layer 2 Multicast
Quality of ServiceLab Topology
ASR 9904 Hardware Discovery Lab
Device Discovery and Initial Configuration
Installing Cisco IOS XR 64-Bit Software
Cisco IOS XR 64-Bit Software Operations
Configuring IS-IS Routing
Configuring OSPF Routing
Configuring Internal BGP (iBGP) Routing
IPv4 Multicast Configuration
Configuring Multiprotocol Label Switching
Configuring and Verifying IGP Segment Routing
Configuring Layer 3 Virtual Private Network
Local E-Line Service
EoMPLS Service - NSO201 — NSO Essentials for Programmers and Network Architects v4.0
- Длительность: 4 дня (32 часа)
- Код курса: NSO201
- Стоимость
- Очный формат: 880 000 ₸
- Онлайн формат: 790 000 ₸
Описание курса
Course Overview
The NSO Essentials for Programmers and Network Architects (NSO201) training introduces you to Cisco Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This training provides an overview of NSO as a network automation solution as well as introducing you to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO.
How You’ll Benefit
This course will help you:
Learn to install Cisco Network Services Orchestrator (NSO)
Practice configuring devices with NSO
Practice designing and managing services with YANG models
Gain confidence with NSO configurationWho Should Enroll
This training is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:
Network administrators
Solutions designers
System installers
System integrators
System administratorsPrerequisites
Cisco require students to have the following knowledge and skills:
Basic knowledge of the Cisco Command-Line Interface (CLI) or the CLI of UNIX-like operating systems
Working knowledge of UNIX-based operating systems and basic tasks
Basic knowledge of programming constructs
Basic knowledge of YANG data modeling
Basic knowledge of the NETCONF communication protocol
Knowledge of XML data structures and schemas
Basic management of network components (routers, switches, etc.)
The following Cisco courses can help you gain the necessary backgroundProgramming for Network Engineers (PRNE)
Introducing Automation for Cisco Solutions (CSAU)Course Objectives
Explain the transactional service activation and how it relates to business requirements
Explain how Cisco NSO communicates with network devices
Understand the NETCONF protocol and be able to read and write simple YANG models
Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable
Understand the support for candidate configuration and confirmed commit support
Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices
Explain the YANG service model structure
Design a real-world usable service
Explain the mapping logic of service parameters to device models and consequently to device configurations
Describe the use of different integration options and APIs
Explain how to implement action with use of config-templates in NSO package
Explain the use of Reactive FASTMAP in for manipulating and implementing advanced NFV components
Describe the use of feature components and function packs
Define and explain the ETSI MANO principles and solution
Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures
Describe Cisco NSO 5.3 new features and changes in NSOCourse Outline:
Cisco Network Service Orchestrator (NSO) Essentials for Programmers and Network Architects (v4.0) (NSO201)
Introducing Service Orchestration with Cisco NSO
Exploring Cisco NSO Architecture
Orchestrating Network Solutions
Describing Cisco NSO Operation
Installing Cisco NSO
Exploring the Advantages of NETCONF
Managing Devices Using the Device Manager
Creating YANG Models
Using Services
Implementing Services with Model-to-Model Mapping
Designing Services in Cisco NSO
Managing the Service Lifecycle
Programming with Python in Cisco NSO
Configuring and Troubleshooting System Settings
Discovering Cisco NSO Northbound APIs
Managing Alarms and Reporting
Configuring Cisco NSO for Scalability and Performance
Describing Cisco NSO VNF Manager and Function PacksLab Topology
Install Cisco NSO
Use Device Manager
Create a Device Template
Create a Loopback Template Service
Create a VLAN Template Service
Create an L3VPN Template Service
Migrate a CDM Device
Set Up a Device Using Python Scripts
Create an SVI Python Template Service
Use NSO RESTCONF API with Postman - NSO300 — NSO Advanced for Python Programmers
- Длительность: 5 дней (40 часов)
- Код курса: NSO300
- Стоимость
- Очный формат: 871 000 ₸
- Онлайн формат: 778 000 ₸
Описание курса
Course Overview
The Cisco Network Services Orchestrator (NSO) Advanced for Python Programmers (NSO300) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 course with NSO to include customizing templates with Python programming, Docker deployment, and Nano services. You will learn to create advanced services using the NSO application framework and Python scripting with both new and existing Layer 3 Multiprotocol Label Switching (MPLS) VPN services. You will also learn how to manage and scale these services to reduce operation consumption, and increase both security and available physical space, since Virtualized Network Functions (VNFs) replace physical hardware. You will use Network Functions Virtualization (NFV) orchestration features, and Cisco Elastic Services Controller (ESC) to manage virtualized network functions.
This course will help you:
Tailor a Cisco Network Services Orchestrator solution for your organization
Manage virtualized network functions (VNFs) automated, efficient, and dynamic network functioningWho should attend
System engineers
System integrators
System programmers
System administrators
Network administrators
Solutions designersPrerequisites
Before you take this course, Cisco recommends that you have the knowledge and skills obtainable by attending the Cisco Network Service Orchestrator (NSO) Essentials for Programmers and Network Architects (v4.0) (NSO201) class, plus have knowledge in the following areas:
Basic knowledge of the command line of UNIX-like operating systems
Basic knowledge of Network Configuration Protocol (NETCONF)
Basic knowledge of Yet Another Next Generation (YANG) data modelling
Basic knowledge of Python software developmentCourse Objectives
Describe the NSO application framework
Deploy NSO in Docker
Implement Python- and template-based service
Describe service lifecycle integration
Describe the implementation of Layer 3 MPLS VPN service for a new service deployment
Implement Nano services
Describe the implementation of Layer 3 MPLS VPN service for an existing deployment
Describe managed services
Implement stacked services
Describe how to scale service orchestration
Describe the European Telecommunications Standards Institute Management and Orchestration (ETSI MANO) Framework
Manage VNF Lifecycle with Cisco ESC
Implement NFVCourse Outline:
Discovering the NSO Application Framework
NSO Transaction Model and Mapping Options
NSO Python API OverviewDeploying NSO in Docker Containers
Comparing NSO Deployments
NSO in Docker OverviewDeveloping Python and Template-Based Service
Service Strategy
Service Design—Service ModelIntegrating Service Lifecycle
Service Lifecycle Overview
Integration Options OverviewDeveloping a Layer 3 MPLS VPN Service for New Service Deployment
Service Strategy
Service Design—Service ModelDeveloping Nano Services
Nano Services
Service Design Manual Resource AllocationDeveloping Layer 3 MPLS VPN Service for Existing Deployment
Existing Service Deployment Strategy
Existing Service Deployment DesignIntroducing Managed Services
Managed Services Overview
Resource AllocationImplementing Stacked Services
Stacked Services Strategy
Implementing Resource-Facing ServicesScaling Service Orchestration
Optimization Options
Layered Services Architecture DesignDiscovering the ETSI MANO Framework
Network Functions Virtualization Initiative
ETSI MANOManaging VNF Lifecycle with Cisco ESC
Introduction to Cisco ESC
VNF Lifecycle ManagementOrchestrating NFV
NFV Orchestration (NFVO) Bundle Introduction
VNF DescriptorLab Topology
Create NSO Docker Environments
Create Switch Virtual Interface (SVI) Service Using Premodification Service Callback
Implement Nano Services
Create an L3VPN Service Using Dynamic ID Allocation
Perform an L3VPN Service Upgrade
Implement Stacked Services
Deploy Link State Advertisement (LSA) Service
Integrate Cisco ESC and OpenStack
Deploy NFV for Demilitarized Zone [[OK?]](DMZ) Service
Implement Self-Test Action - NSO303 — Cisco NSO Administration and DevOps
- Длительность: 4 дня (32 часа)
- Код курса: NSO303
- Стоимость
- Очный формат: 702 000 ₸
- Онлайн формат: 604 000 ₸
Описание курса
Course Overview
The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 and NSO Advanced for Python Programmers (NSO300) v4.0 courses by introducing you to the system administration and DevOps focusing on NSO; the robust bridge linking network automation and orchestration tools, examining the development, operation, and administration task functions. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and learn best practices for using DevOps. The examples shown in this course demonstrate real-world scenarios to prepare you for deployment and management of new or existing NSO instances. The course guides you through the setup of a production ready NSO instances using system installation with access control settings, the deployment of NSO in Docker containers, and introduces modern DevOps concepts and tools such as Git and Continuous Delivery/Continuous Deployment (CI/CD). You will learn how to migrate CDM devices, how to build NETCONF NEDs from the NSO CLI, how to handle NSO Alarms, and many more features that benefit you in your journey with Cisco NSO.
How You'll Benefit
This training will help you:
Install, configure, and maintain a Cisco Network Services Orchestrator solution
Apply DevOps best practices for Cisco NSO development, operations, and administrative tasks
Implement Layered Service Architecture (LSA) within a Cisco NSO solution
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level networking roles
Earn 32 CE credits toward recertificationWho Should Enroll
DevOps Engineers
Integration Engineers
Network and Software architects
Network Engineers
Software Engineers
System AdministratorsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic knowledge of the Cisco CLI
Basic knowledge of the CLI of UNIX-like operating systems
Basic knowledge of Yet Another Next Generation (YANG) data modelling
Basic knowledge of Python software developmentThese skills can be found in the following Cisco Learning Offerings:
NSO Essentials for Programmers and Network Architects (NSO201) 4.2
NSO Advanced for Python Programmers (NSO300) 4.0Course Objectives
Describe network and IT convergence
Describe Cisco NSO architecture
Describe Linux
Configure Cisco NSO
Set up access control to Cisco NSO system
Describe Cisco NSO Integration Options
Explain version control systems and basic git concepts
Describe the purpose of continuous integration and continuous delivery
Implement Cisco NSO high availability
Describe scalable system management
Describe software development methodologies
Describe service maintenance
Perform NED upgrades
Use Cisco NSO for managing services and their associated device configurations
Describe Cisco NSO change management
Explain service problem management
Use Cisco NSO for service monitoring and compliance reporting
Describe Cisco NSO inventory management
Describe Cisco NSO use casesCourse Outline:
Introducing Network and IT Convergence
Introducing Cisco NSO Architecture
Introducing Linux
Explaining Cisco NSO Setup
Exploring Access Control
Describing Integration Options
Explaining Version Control System
Describing Continuous Integration and Continuous Delivery
Introducing Scalability and High Availability
Describing Scalable System Management
Describing Software Development Methodologies
Introducing Service Maintenance
Performing Network Element Driver (NED) Upgrades
Introducing Configuration Management
Describing Change Management
Explaining Service Problem Management
Explaining Service Monitoring and Compliance Reporting
Introducing Inventory Management
Describing Cisco NSO Use CasesLab Topology
Perform NSO System Install
Implement Role-Based Access and PAM
Using Cisco NSO APIs
Learn to work with Git
Use NSO in Docker
Configure High Availability
Migrating a Monolithic Service to LSA
Deploying the LSA Services
Use the Network Connectivity Tool (NCT)
Perform Service Backup and Restore
Migrate a CDM Device
Build a NETCONF NED
Replacing a Device
Troubleshoot NSO Alarms and Services
Creating a Compliance Report - OPT201 — Cisco NCS 2000 Deploying 96-Channel Flex Spectrum
- Длительность: 3 дня (24 часа)
- Код курса: OPT201
- Стоимость
- Очный формат: 931 000 ₸
- Онлайн формат: 836 000 ₸
Описание курса
Course Overview
The Cisco NCS2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 course shows you how to plan, configure, and control optical networks using the Cisco® Network Convergence System (NCS) 2000 series Flex Spectrum platform.
The course teaches you how to design Flex Spectrum networks with multi-degree Reconfigurable Optical Add-Drop Multiplexer (ROADM) multi-shelf nodes using the Cisco Transport Planner (CTP) software.
You’ll learn how to:
Install the Cisco NCS 2000 series hardware
Configure an optical network and circuits using the Cisco Transport Controller (CTC) software
Learn which components and configurations take advantage of and/or are required for the Flex Spectrum 96-channel feature
Configure optical networks with multidegree ROADM multishelf nodes
Configure optical networks with colorless, contentionless, omnidirectional, and MPO cross-connect advanced features
Describe and configure the NCS 2000 400-Gbps Xponder line card
How you’ll benefitThis class will help you:
Gain an in-depth understanding of how to install, deploy, and maintain a Cisco Optical Networking Services (ONS) 15454 Multiple Spanning Tree Protocol (MSTP) network
Practice what you learn through hands-on labsWho should attend
This course is designed for technical professionals who need to know how to deploy a Cisco NCS 2000 Series Dense Wavelength-Division Multiplexing (DWDM) network with Flex Spectrum.
The primary audience for this course includes:
Designers
Systems engineers and implementation staff
Network operations center personnel
Technical support personnel who are involved with the deployment, operations, and maintenance of the Cisco NCS 2000 Series
Channel partners and resellersCourse Prerequisites
Before taking this training, it is recommended to take the Cisco Optical Technology Foundations (OPTFND) training first. However, if you have some knowledge of optical fiber networking, single and multimode fibers, and small form-factor pluggables (SFPs), you should already have the necessary skills to complete this training.
Course Objectives
After taking this course, you should be able to:
Describe the hardware and components required and used with the Flex Spectrum feature
Design optical networks in the Cisco Transport Planner software
Install the hardware, including multishelf nodes
Perform node turn-up and create circuits using the Cisco Transport Controller software
Configure optical networks with multidegree ROADM multishelf nodes
Configure optical networks with colorless, contentionless, omnidirectional, and MPO cross-connect advanced features
Describe and configure the NCS 2000 400-Gbps Xponder line card
Add a node to an existing DWDM ring
Describe the NCS 2000 Troubleshooting Guide
Use the features and documentation with Transport Controller to perform maintenance, testing, and basic troubleshootingCourse Outline:
DWDM and Flex Spectrum Foundation
NCS 2000 Chassis and Cards
Design ROADM Networks with CTP
Hardware Installation and Multishelf
Node Turn-Up and Circuit Creation
Advanced Feature Networks and Circuits
Testing, Maintenance, and Basic Troubleshooting
Spectrum Switched Optical NetworkLab Topology
Cisco Transport Controller
Cisco Transport Planner
Adding a Node to Existing DWDM Ring Network
Optical Channel Network Connection (OCHNC) Circuits
Optical Channel Client Connection (OCHCC) Circuits
Colorless Ports and Circuits
Contentionless Circuits
Connection Verification
Performing the Optical Time Domain Reflectometer (OTDR) Test
Maintenance and Performance Monitoring
MSTP Troubleshooting
Configuring the 400XP card - PRNE — Programming for Network Engineers
- Длительность: 4 дня (32 часа)
- Код курса: PRNE
- Стоимость
- Очный формат: 880 000 ₸
- Онлайн формат: 790 000 ₸
Описание курса
Course Overview
The Programming for Network Engineers (PRNE) v2.0 course is designed to equip you with fundamental skills in Python programming. Through a combination of lectures and lab experience in simulated network environments, you will learn to use Python basics to create useful and practical scripts with Netmiko to retrieve data and configure network devices. Upon completion of this course, you should have a basic understanding of Python, including the knowledge to create, apply, and troubleshoot simple network automation scripts.
This course will help you:
Explain the need for network engineers to learn how to program
Explain how programming relates to the journey into network automation and programmability
Create useful and practical scripts to retrieve data and configure network devices
Create, apply, and troubleshoot simple network automation scripts
Gain hands-on experience with Python programmingWho should attend
This course is intended for:
Network administrators
Network engineers with little or no programming or Python experience
Network managers
Systems engineersPrerequisites
Before taking this course, you should have:
Familiarity with Cisco IOS-XE software or other Cisco network device configuration and operation skills
Basic network management knowledge
Cisco CCNA certification or equivalent knowledgeThe following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Administering Cisco Solutions (CCNA)Course Objectives
After taking this course, you should be able to:
Create a Python script
Describe data types commonly used in Python coding
Describe Python strings and their use cases
Describe Python loops, conditionals, operators, and their purposes and use cases
Describe Python classes, methods, functions, namespaces, and scopes
Describe the options for Python data manipulation and storage
Describe Python modules and packages, their uses, and their benefits
Explain how to manipulate user input in Python
Describe error and exception management in Python
Describe Python code debugging methodsCourse Outline:
Introducing Programmability and Python for Network Engineers
Scripting with Python
Examining Python Data Types
Manipulating Strings
Describing Conditionals, Loops, and Operators
Exploring Classes, Methods, Functions, Namespaces, and Scopes
Exploring Data Storage Options
Exploring Python Modules and Packages
Gathering and Validating User Input
Analyzing Exceptions and Error Management
Examining Debugging Methods
Course SummaryLab Topology
Execute Your First Python Program
Use the Python Interactive Shell
Explore Foundation Python Data Types
Explore Complex Python Data Types
Use Standard String Operations
Use Basic Pattern Matching
Reformat MAC Addresses
Use the if-else Construct
Use for Loops
Use while Loops
Create and Use Functions
Create and Use Classes
Use the Python main() Construct
Traverse the File Structure
Read Data in Comma-Separated Values (CSV) Format
Read, Store, and Retrieve Data in XML Format
Read, Store, and Retrieve Date in JavaScript Object Notation (JSON) Format
Read, Store, and Retrieve Data in a Raw or Unstructured Format
Import Modules from the Python Standard Library
Import External Libraries
Create a Python Module
Prompt the User for Input
Use Command-Line Arguments
Manage Exceptions with the try-except Structure
Manage Exceptions with the try-except-finally Structure
Use Assertions
Use Simple Debugging Methods
Use the Python Debugger
Code a Practical Debugging Script - SPMBL100 — Cisco Service Provider 5G Technologies Foundations
- Длительность: 4 дня (32 часа)
- Код курса: SPMBL100
- Стоимость
- Очный формат: 880 500 ₸
- Онлайн формат: 790 500 ₸
Описание курса
Course Overview
The Cisco Service Provider 5G Technologies Foundations (SPMBL100) v1.0 course introduces mobile network components, basic 5G concepts, and features of 5G technology including faster data speeds, higher device capacity, and improved user experience. You will examine the mobile packet core solutions, 5G transport architecture, and Cisco® automation and orchestration tools used in 5G networks. You will also learn about the Cisco 5G Non-standalone (NSA) and the Cisco Ultra Cloud Core 5G standalone (SA) platform solutions, the Cisco 5G converged Software-Defined Networking (SDN) transport architecture, and Cisco edge computing solutions. You will study the Cisco Network Function Virtualization (NFVI) architecture, Cisco Network Services Orchestrator (NSO), and Cisco Elastic Services Controller (ESC). You will learn how 5G is distributed with Telco Data Center (DC) with Cisco Application Centric Infrastructure (Cisco ACI®). And finally, Zero-Touch Provisioning (ZTP), Cisco Crosswork™, and the Cisco 5G security architecture will also be presented.
How you’ll benefit
This course will help you:
Use the higher data speeds of 5G to access data more quickly and accommodate every device with increased capacity
Learn how 5G technology delivers lower latency, higher device capacity, and a more uniform user experienceWho Should Enroll
This course is designed for network and software engineers and hold job roles such as:
Network administrator
Network engineer
Network manager
System engineer
Project manager
Network designerPrerequisites
Before enrolling in this course, you should have knowledge in the following areas:
Knowledge of general networking concepts
Experience working with command-line interface (CLI)-based network devices
Basic understanding of Multiprotocol Label Switching (MPLS)
Familiarity with service provider architecturesThe following Cisco course may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Service Provider Network Foundations (SPFNDU)Course Objectives
After taking this course, you should be able to:
Describe mobile network architecture basics
List enabling technologies for 5G and describe 5G key use cases
Perform basic operations on a Cisco 5G NSA mobile packet core
Describe the Cisco 5G Converged SDN Transport Architecture
Describe Cisco NFVI and perform basic operations using Cisco ESC and Cisco Virtualized Infrastructure Manager (VIM)
Describe Cisco service provider automation and orchestration solutions to deploy and manage 5G network functions
Describe the Cisco Ultra Cloud Core architecture and deploy the Cisco SMI
Explain the 5G ready distributed Telco DC with Cisco ACI solution
Describe the Cisco 5G security architectureCourse Outline:
Mobile Network Fundamentals
5G Key Use Cases
Examining Mobile Network ComponentsEnabling Technologies for 5G
Introduction to 5G NR Characteristics
Cloud Radio Access network (RAN)Cisco 5G NSA Solution
5G NSA Basics
5G NSA StarOS ConfigurationsCisco 5G Converged SDN Transport Architecture
Cisco 5G Transport Ready Devices
Application Awareness and Network Slicing with Segment RoutingCisco NFV Infrastructure, Cisco Virtualized Network Functions (VNFs), Cisco VIM, and Cisco ESC
NFVI and SDN Architecture Overview
Cisco VIM Pod ConfigurationsCisco Service Provider Automation and Orchestration
Telemetry Basics
ZTP FundamentalsCisco Ultra Cloud Core
Cisco Ultra Cloud Core Basics
Kubernetes and Docker Fundamentals5G Ready Distributed DC with Cisco ACI
Cisco ACI in Telco Data Centers
5GC DeploymentMitigating Threats in 5G
Introduction to 5G Cybersecurity Risks
Mitigating 5G Cybersecurity Risks - SPWAE — Operating and Implementing Cisco WAN Automation Engine
- Длительность: 3 дня (24 часа)
- Код курса: SPWAE
- Стоимость
- Очный формат: 673 000 ₸
- Онлайн формат: 578 000 ₸
Описание курса
Course Description
The Operating and Implementing Cisco WAN Automation Engine (SPWAE) v1.0 course teaches you, through a combination of lectures and labs, how to install the Cisco® WAN Automation Engine (WAE), builds your confidence with Cisco WAE configuration and basic troubleshooting, and enables you to practice designing and managing bandwidth and traffic engineering.
Additionally, you’ll learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solutions.
How You'll Benefit
This course will help you:
Learn to install Cisco WAN Automation Engine
Gain confidence with Cisco WAE configuration and basic troubleshooting
Practice designing and managing bandwidth and traffic engineeringWho Should Enroll
This course is designed for:
System installers
System integrators
System administrators
Network administrators
Solutions designersCourse Objectives
After taking this course, you should be able to:
Explain WAE basics, the purpose of WAE, and its capabilities
Understand the Cisco WAE solution implementation
Describe the network module configuration process
Describe WAE Design software tools, demands creation, BGP modeling, and Failure and Simulation analysis
Describe Cisco WAE Design traffic engineering and QoS modeling
Explain how to use API with WAE Design and WAE Server
Describe the function, components, and processes of Cisco WAE LiveCourse Prerequisites
Before taking this course, you should have the following knowledge and skills:
Knowledge of general networking and routing concepts
Basic knowledge of routing protocols: Open Shortest Path First (OSPF), Intermediate System-to-Intermediate System (IS-IS), Border Gateway Protocol (BGP)
Understanding of Cisco Multiprotocol Label Switching Traffic Engineering (MPLS TE) technologies
Understanding of Segment Routing Traffic Engineering (SR-TE) technologies
Basic knowledge of Linux server operation and Linux tools
Basic understanding of network automation and Software-Defined Networking (SDN) conceptsThe following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Implementing Segment Routing on Cisco IOS XR (SEGRTE201)Course Outline
WAE Solution and Architecture Overview
Implementing a Cisco WAE Solution
Network Model Configuration
WAE Design Fundamentals
Cisco WAE Design Traffic Engineering and Optimization
Introducing Cisco WAE API
Cisco WAE Live DeploymentLab Outline
Start with Cisco WAE
Cisco WAE Server Setup and Collector Configuration
Get Started with Cisco WAE Design
Describe Traffic with Demands
Failures and Simulation Analysis
Engineer Traffic Using Metrics and SR-TE
Cisco WAE Design Remote Procedure Call (RPC) API
Configure Cisco WAE Live - NCS540HWE — Implementing the Cisco NCS540 Series Routers
- Длительность: 5 дней (40 часов)
- Код курса: NCS540HWE
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Implementing the Cisco NCS 540 Series Routers (NCS540HWE) training teaches you how to deploy Cisco Network Convergence System (NCS) 540 Series routers in a network environment. You will be introduced to the features and functions of the Cisco NCS 540 series platforms, system architecture, services implementation, quality of service (QoS), system security, model-driven telemetry, and programmability. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Gain hands-on experience deploying Cisco NCS 540 Series routers in a network environment
Qualify for professional network job roles
Earn 40 CE credits towards recertificationWho Should Enroll
System Engineers
Network Engineers
Field Engineers
Technical Support Personnel
Channel partners, resellers System Engineers
Network Engineers
Field Engineers
Technical Support Personnel
Channel Partners
Channel ResellersCourse Objectives
Classify the Cisco NCS 540 platform hardware and understand the variations between large, medium, small, and fronthaul form factors, their features, use cases, and positioning
Describe the hardware architecture of the NCS 540 series and the components necessary for packet queuing and forwarding, understand the life of a packet on ingress and egress traffic
Explain the system architecture for traffic queuing, scheduling, and forwarding to introduce concepts of Cisco IOS XR modular QoS on the NCS 540 platform
Describe the methods and protocols for establishing timing and synchronization on Cisco IOS XR router platforms
Describe the Cisco NCS 540 fronthaul router family and its features and how they can be used to make mobile network architecture simpler
Describe Cisco IOS XR software architecture, its programmable features, and how to install software packages
Explain how to install Cisco IOS XR software packages
Recognize, implement, and manage system security features within Cisco IOS XR software systems, ensuring the protection of network infrastructure and data
Describe the main factors leading to the development and deployment of segment routing, segment types, segment routing global block (SRGB), and configure and verify intermediate system to intermediate system (IS-IS) and open shortest path first (OSPF) segment routing operation
Discuss how topology independent loop-free alternate (TI-LFA) is implemented in Cisco IOS XR software
Demonstrate segment routing traffic engineering (SR-TE) and the traffic engineering components used in segment routing
Implement and configure advanced SR-TE features and SR IPv6
Describe the components and functionality of Layer 3 multiprotocol label switching (MPLS) virtual private networks (VPNs) implementation in Cisco IOS XR software deployments
Implement Layer 2 VPN operations in a service provider environment
Explain how Ethernet VPN (EVPN) gets around the problems that regular Layer 2 VPNs have, what the model for EVPN delivery is, and how to implement and troubleshoot EVPN solutions
Comprehend and implement model-driven telemetry for enhanced network visibility and managementCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Knowledge of core Cisco networking technologies
Understanding of implementing and operating Cisco networking solutions
Recognition of general networking concepts and protocols
Basic knowledge of router installation and some experience with installation tools
Routing protocol configuration experience with border gateway protocol (BGP), IS-IS, and OSPFCourse Outline
Cisco NCS 540 Series Hardware Overview
Cisco NCS 540 System Architecture
Cisco NCS 540 QoS Architecture
Timing and Synchronization
Cisco NCS 540 xHaul Design
Cisco IOS XR Software Fundamentals
Cisco IOS XR Software Installation and Upgrade
Cisco IOS XR Software System Security
Segment Routing Fundamentals
Segment Routing Topology-Independent Loop-Free Alternate
Segment Routing Traffic Engineering
Advanced Segment Routing Traffic Engineering Features
Segment Routing IPv6
Layer 3 MPLS VPN Implementation with Cisco IOS XR Software
Layer 2 VPNs and Ethernet Services Fundamentals
Cisco IOS XR Software EVPN Operation and Implementation
Cisco IOS XR Software Programmability
Model-Driven TelemetryLab Outline
Configure and Verify NTP
Cisco IOS XR Software Installation
Configure and Verify MPP
Configure and Verify uRPF
Configure and Verify Segment Routing
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR TE Using IS-IS
Configure and Verify SR TE Using OSPF
Configure and Verify ODN and Flexible Algorithm
Configure and Verify SRv6
Configure and Verify Layer 3 VPN
Configure and Verify EVPN VPWS
Configure and Verify Devices by Using Model-Driven Programmability
Configure and Verify Model-Driven Telemetry - SPCNI — Designing and Implementing Cisco Service Provider Cloud Network Infrastructure
- Длительность: 5 дней (40 часов)
- Код курса: SPCNI
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Designing and Implementing Cisco Service Provider Cloud Network Infrastructure training teaches you how to design and implement virtualization cloud infrastructures in a service provider network. You will learn about virtualized network function infrastructures and how to use programmability and orchestration to manage virtualization cloud infrastructures. You will also learn about cloud computing and implementation of cloud interconnect and data center interconnect solutions. In addition, you will learn how to monitor and secure virtualization cloud infrastructures and provide optimization and high availability within the infrastructures.
This training prepares you for the 300-540 SPCNI v1.0 exam. If passed, you earn the Cisco Certified Specialist – Service Provider Cloud Network Infrastructure certification and satisfy the concentration exam requirement for the Cisco Certified Networking Professional (CCNP) Service Provider certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Design and implement virtualization cloud infrastructures in a service provider network
Learn about virtualized network function infrastructures
Learn how to use programmability and orchestration to manage virtualization cloud infrastructures
Learn about cloud computing
Learn about cloud interconnect and data center interconnect solutions
Learn how to implement various interconnect solutions
Learn how to monitor and secure virtualization cloud infrastructures and provide optimization and high availability within the infrastructures
Earn 40 CE credits toward recertificationWho Should Enroll
System Engineers
Technical Support Personnel
Channel Partners
ResellersWhat to Expect in the Exam
300-540 SPCNI: Designing and Implementing Cisco Service Provider Cloud Network Infrastructure is a 90-minute exam associated with the Cisco Certified Specialist – Service Provider Cloud Network Infrastructure certification and satisfies the concentration exam requirement for the CCNP Service Provider certification.
The multiple-choice format tests your knowledge of:
Designing and implementing virtualized architecture
Cloud interconnect
High availability
Security
Service assurance
Optimization best practicesCourse Objectives
Get an overview of Cisco Network Function Infrastructure, Cisco Network Infrastructure Manager, Cisco Virtualized Infrastructure Manager (VIM), and Cisco Network Service Orchestrator (NSO) Virtualized Infrastructure Manager
Understand the concept of networking and deployment operation in OpenStack platform
Get an overview the security features available in Cisco Network Functions Virtualization (NFVI) solution
Describe the application hosting architecture on a Cisco IOS XR router
Introduce containers and describe container architecture
Describe Kubernetes concepts, such as Kubernetes objects, and how nodes, pods, and clusters fit into them
Describe cloud computing, cloud deployment models, cloud service models, and Carrier-Neutral Facilities (CNFs)
Implement and configure Multi-Protocol Label Switching (MPLS), Segment Routing (SR), and SRv6
Describe the operation and data flow of the Layer 3 Virtual Private Network (VPN) control plane
Configure Label Distribution Protocol (LDP) and Border Gateway Protocol (BGP) security and optimization options
Describe Interior Gateway Protocol (IGP) control plane security mechanisms
Configure unicast reverse path forwarding, Media Access Control Security (MACsec), and remote-triggered black-hole filtering
Get an overview of high-availability technologies and multi-homing scenarios in the service provider network
Describe the benefits, enablement, implementation, and configuration of Segment Routing Traffic Engineering (SR-TE)
Describe Quality of Service (QoS) options for public cloud connectivity
Discuss high availability mechanisms used in routing (anycast) and services Domain Name System (DNS)
Implement On-Demand Next Hop
Comprehend and implement model-driven telemetry and use Cisco ThousandEyes for enhanced network visibility and management
Describe the basic concepts, history, and purpose of telemetry, including the telemetry push model and telemetry collectors
Discuss the efficiency and ease of use of various encoding methods, including Google Protocol Buffers (GPB), Compact GPB, and Key-value GPB, as well as JavaScript Object Notation (JSON) and transport protocols
Describe gNMI subscription modes, gRPC outputs, performance with different encodings, and key ideas related to gRPC
Describe features, the architecture, and components of Cisco Crosswork Network Controller (CNC)Course Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Routing protocol configuration experience with BGP, Intermediate System-to-Intermediate System (IS-IS), and Open Shortest Path First (OSPF)
Knowledge of Layer 2 IEEE switching and related protocols, including MPLS configuration and troubleshooting of Cisco routers in a large network environmentThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA) 2.0
Understanding Cisco Service Provided Network Foundations (SPFNDU) 1.0
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) 1.1Course Outline
Cisco NFV Infrastructure
Cloud Computing
Service Provider Model-Driven Programmability
Network Orchestration using NSO
Container Orchestration
Cisco Crosswork Network Controller
Cloud Interconnect Solutions
Data Center Interconnect Solutions
Service Provider High Availability
Service Provider Core Optimization
Service Provider Performance Monitoring
Service Provider Control Plane Security
Service Provider Data Plane SecurityLab Outline
Deploy a VNF Using OpenStack
Configure and Verify Devices by Using Model-Driven Programmability
Network Orchestration using NSO
Configure and Verify Application Hosting Within a Docker Container
Configure and Verify Layer 3 VPN
Configure and Verify EVPN VPWS
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR-TE Using IS-IS
Configure and Verify SR-TE Using OSPF
Configure and Verify ODN and Flexible Algorithm
Configure and Verify Model-Driven Telemetry
Implement BGP Security
Implement RTBH Filtering - XRVPNS — Leveraging Cisco IOS XR VPN Services
- Длительность: 3 дня (24 часов)
- Код курса: XRVPNS
- Стоимость
- Очный формат: 750 500 ₸
- Онлайн формат: 655 500 ₸
Описание курса
Course Description
The Leveraging Cisco IOS XR VPN Services (XRVPNS) training teaches you how to implement and troubleshoot Layer 2 and Layer 3 Virtual Private Network services in a service provider network operating on Cisco IOS XR software. Cisco IOS XR is the foundational operating system of most service provider networks and operates Cisco’s service provider portfolio of network devices. You will learn how to implement a label switched network infrastructure for the enablement of VPN services using Multiprotocol Label Switching (MPLS) or Segment Routing (SR). You will also learn how to implement and troubleshoot both IPv4 and IPv6 Layer 3 VPN services and Multicast VPN services using IOS XR. In addition, you will learn how to implement Ethernet VPN (EVPN) services including EVPN Integrated Routing and Bridging (EVPN IRB) and EVPN-SR data center fabric. Finally, you will learn how to implement EVPN advanced features. This training also earns you 24 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn how to implement and troubleshoot Layer 2 and Layer 3 Virtual Private Network services in a service provider network operating on Cisco IOS XR software.
Gain knowledge of protocols, solutions, and designs to acquire professional-level and expert-level networking roles.
Earn 24 CE credits toward recertification.Who Should Enroll
Network Engineers
Systems Engineers
Network Administrators
Network Managers
Network DesignersCourse Objectives
Implement and configure MPLS and describe MPLS label propagation in service provider networks
Describe the main factors leading to the development and deployment of segment routing, describe the various types of segments that are used in segment routing, describe the Segment Routing Global Block (SRGB), and configure and verify Intermediate System to Intermediate System (IS-IS) and Open Shortest Path First (OSPF) segment routing operation
Implement and configure Segment Routing IPv6
Describe the components and functionality of Layer 3 MPLS VPNs implementation in Cisco IOS XR Software deployments
Identify the routing protocol and LDP information necessary for Layer 3 MPLS VPN troubleshooting
Discuss Multicast LDP (MLDP) implementation and troubleshooting method for Layer 3 multicast MPLS VPN
Implement MPLS VPN solutions for IPv6 environments
Describe common issues and fixes for provider edge to provider edge (PE-PE) and provider edge to customer edge (PE-CE) connectivity in an IPv6 MPLS VPN environment
Implement Layer 2 VPN operations in a service provider environment
Explain how EVPN gets around the problems that regular Layer 2 VPNs have, what the model for EVPN delivery is, and how to implement and troubleshoot EVPN solutions
Explain the advantages of EVPN IRB, how it is implemented, and how to troubleshoot problems when building EVPN IRB solutions
Demonstrate how to configure EVPN-SR data center fabric solutions
Explain advanced EVPN features to support network engineers in designing, implementing, and troubleshooting complex EVPN networksCourse Prerequisites
The knowledge and skills you are expected to have before attending this course are:
Familiarity with service provider network operation
Familiarity with Cisco IOS XR software configuration and operation
Ability to implement and troubleshoot routing protocol including OSPF, IS-IS, and Border Gateway Protocol (BGP) in a service provider networkThese skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Service Provider Network Foundations (SPFNDU v 1.0)
Cisco IOS XR Software Essentials (IOSXRE v 1.0)Course Outline
Cisco IOS XR Software MPLS Operation and Implementation
Segment Routing Fundamentals
Segment Routing IPv6
Layer 3 MPLS VPN Implementation with Cisco IOS XR Software
Layer 3 MPLS VPN Troubleshooting
Layer 3 Multicast MPLS VPN Implementation
Layer 3 IPv6 MPLS VPNs Implementation
Layer 3 IPv6 MPLS VPN Troubleshooting
Layer 2 VPNs and Ethernet Services Fundamentals
Cisco IOS XR Software EVPN Operation and Implementation
Cisco IOS XR Software EVPN IRB
EVPN-SR Data Center Fabric
EVPN Advanced FeaturesLab Outline
Configure and Verify MPLS
Configure and Verify Segment Routing
Configure and Verify SRv6
Configure and Verify Layer 3 VPN
Implement 6VPE
Configure and Verify EVPN Virtual Private Wire Service (VPWS) - SP8KE — Cisco 8000 Series Routers Essentials
- Длительность: 5 дней (40 часов)
- Код курса: SP8KE
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Cisco 8000 Series Routers Essentials (SP8KE) v1.0 course introduces you to the features and functions of the Cisco® 8000 Series router platforms. Through a combination of lectures and labs, you will gain an understanding of all major aspects of the platform, including hardware, software, Layer 2 and Layer 3 services, Quality of Service (QoS) features, network virtualization, and programmability.
How You'll Benefit
This class will help you:
Increase your experience with the Cisco 8000 Series system
Describe and implement the Cisco 8000 Series system and its components
Gain hands-on experience with the Cisco 8000 Series system in a lab settingWho Should Enroll
This course is designed for the following roles:
System engineers
Technical support personnel
Channel partners and resellersCourse Objectives
After taking this course, you should be able to:
Describe the various Cisco 8000 Series hardware components
Explain the system architecture of the Cisco 8000 Series systems
Describe the packet flows through the Cisco 8000 Series Router and Command-Line Interface (CLI) commands for verifying packet flows through various Cisco 8000 Series router components
Describe how the QoS features are implemented within the Cisco 8000 Series router, how to examine the Virtual Output Queueing (VOQ) QoS architecture, and describe how to implement modular VOQ, including congestion avoidance, priority flow control, and congestion management
Describe the Software for Open Networking in the Cloud (SONiC) Operating System
Describe Cisco Internetwork Operating System (Cisco IOS®) XR Software architecture
Explain how to install Cisco IOS XR software packages
Describe how to provision network devices by using Zero Touch Provisioning (ZTP)
Implement and configure Multiprotocol Label Switching (MPLS) and describe MPLS label propagation in service provider networks
Describe the main factors leading to the development and deployment of segment routing, describe the various types of segments that are used in segment routing, describe the Segment Routing Global Block (SRGB), and configure and verify IS-IS and OSPF segment routing operation
Describe how to implement and verify Topology Independent Loop-Free Alternate (TI-LFA) in a segment routing environment, the benefits of Segment Routing for Traffic Engineering (SR-TE), and briefly describe the tools required for enabling it
Describe the fundamentals of Ethernet VPN (EVPN), how to configure and verify EVPN Native, and how to configure and verify EVPN Virtual Private Wire Service (VPWS)
Describe the operation and data flow of the Layer 3 VPN control plane, describe different Layer 3 MPLS VPN models, and describe how to configure and verify a basic Layer 3 VPN by using Cisco IOS XR 64-bit software
Implement and configure advanced SR-TE features
Implement and configure Segment Routing over IPv6 (SRv6)
Implement and configure model-driven telemetry
Describe programmable features of Cisco IOS XR software
Describe the application hosting architecture and how to deploy a third-party application on a Cisco IOS XR routerCourse Prerequisites
Before taking this course, you should have:
Basic knowledge of router installation and some experience with installation tools
Routing protocol configuration experience with Border Gateway Protocol (BGP), Intermediate System-to- Intermediate System (IS-IS), and Open Shortest Path First (OSPF)
Knowledge of Layer 2 IEEE switching and related protocols
Strong knowledge of MPLS configuration experience
Experience troubleshooting Cisco routers in a large network environmentCourse Outline
Cisco 8000 Series Hardware Fundamentals
Cisco 8000 System Architectur
Packet Flow Through the Cisco 8000 Series Router
Traffic Management and QoS on Cisco 8000 Routers
SONiC Basics
Cisco IOS XR Software Architecture
Cisco IOS XR Software Installation
Automatic Provisioning
Cisco IOS XR MPLS
Introducing Segment Routing
Segment Routing TI-LFA and Traffic Engineering
EVPN Layer 2 Basics
Layer 3 VPNs
Advanced SR-TE Features
SRv6
Telemetry
Cisco IOS XR Programmability
Application Hosting OverviewLab Outline
Investigate and Monitor Cisco 8000 Series Hardware
Troubleshoot Traffic Through the Cisco 8000 Router
Cisco IOS XR Software Installation
Configure and Verify Zero Touch Provisioning (ZTP)
Configure and Verify Multiprotocol Label Switching
Configure and Verify Segment Routing (SR)
Configure and Verify SR TI-LFA Using IS-IS
Configure and Verify SR TI-LFA Using OSPF
Configure and Verify SR-TE Using IS-IS
Configure and Verify SR-TE Using OSPF
Configure and Verify Basic EVPN
Configure and Verify Layer 3 VPN
Configure and Verify On-Demand Next-Hop (ODN) and Flexible Algorithm
Configure and Verify Segment Routing over IPv6 (SRv6)
Configure and Verify Model-Driven Telemetry
Configure and Verify Devices by Using Model-Driven Programmability
Configure and Verify Application Hosting Within a Docker Container - IOSXRE — Cisco IOS XR Software Essentials
- Длительность: 4 дня (32 часа)
- Код курса: IOSXRE
- Стоимость
- Очный формат: 880 500 ₸
- Онлайн формат: 790 500 ₸
Описание курса
Course Description
The Cisco IOS XR Software Essentials (IOSXRE) training introduces you to the essential features and functions of the Cisco IOS XR Software operating system that powers many Cisco products. Through a combination of lectures and hands-on lab exercises, you will gain an understanding of all major aspects of the operating system including the architecture, installation and upgrade, automatic provisioning, and using the software command-line interface (CLI). You will also learn how to implement essential software services including system security, logging, timing and synchronization, AAA services, and how to use modular QoS. In addition, you will learn how to implement basic routing and forwarding using Multiprotocol Label Switching (MPLS). Finally, you will learn how to implement and use programmability and monitoring features including Simple Network Management Protocol (SNMP), telemetry, process monitoring, and IOS XR programmability. This training also earns you 24 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn how to describe and implement fundamental concepts and configurations on Cisco IOS XR Software.
Gain leading-edge skills for high-demand responsibilities focused on software services.
Earn 24 CE credits toward recertification.Who Should Enroll
Network Engineers
Systems Engineers
Network Administrators
Network Managers
Network DesignersCourse Objectives
Describe Cisco IOS XR Software architecture
Explain how to install Cisco IOS XR Software packages
Describe how to provision network devices by using zero touch provisioning
Describe how to perform initial configurations on a Cisco IOS XR router
Recognize, implement, and manage system security features within Cisco IOS XR Software systems, ensuring the protection of network infrastructure and data
Monitor device performance through CLI and logging services
Describe the methods and protocols for establishing timing and synchronization on Cisco IOS XR router platforms
Describe the operation of Cisco IOS XR AAA Software services, task-based security mechanisms and user security policies
Configure, manage, and troubleshoot Cisco IOS XR Software AAA services in a network environment
Recognize how to implement QoS in various scenarios and environments, including Cisco IOS XR Software and a service provider environment
Define the Cisco IOS XR implementation requirements for deploying common routing protocols and managing the Routing Information Base, Route Policy, forwarding, and load balancing mechanisms
Implement and configure MPLS and describe MPLS label propagation in service provider networks
Configure SNMP in Cisco IOS XR Software environments for optimum performance and efficient management of network resources
Describe the programmable features of Cisco IOS XR Software
Comprehend and implement model-driven telemetry for enhanced network visibility and management
Describe the application hosting architecture and how to deploy a third-party application on a Cisco IOS XR router
Illustrate how to efficiently monitor processes using process monitoring concepts and tools such as employing the monitor processes command to track and manage system activitiesCourse Prerequisites
The knowledge and skills you are expected to have before attending this course are:
Experience working with CLI-based network devices
Knowledge of general routing conceptsThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions 1.0Course Outline
Cisco IOS XR Software Fundamentals
Cisco IOS XR Software Installation and Upgrades
Automatic Provisioning
Cisco IOS XR Software CLI Basics
Cisco IOS XR Software System Security
Cisco IOS XR Software Logging Configuration
Timing and Synchronization
Cisco IOS XR Software AAA Service Fundamentals
Cisco IOS XR Software AAA Service Implementation
Cisco IOS XR Software Modular QoS
Cisco IOS XR Software Routing Protocol Configuration
Cisco IOS XR Software MPLS Operation and Implementation
Network Management with SNMP on Cisco IOS XR Software
Cisco IOS XR Software Programmability
Model-Driven Telemetry
Application Hosting Overview
Cisco IOS XR Software Process MonitoringLab Outline
Cisco IOS XR Software Installation
Configure and Verify ZTP
Initial Configuration of a Cisco IOS XR Router
Configuration Commit and Rollback
Configure and Verify MPP
Configure and Verify uRPF
Configure and Verify Logging
Configure and Verify NTP
Configure and Verify User Security Policies
Cisco IOS XR AAA Configuration
Configure and Verify Modular QoS
Configure and Verify IS-IS
Configure and Verify OSPF
Configure and Verify BGP
Configure and Verify MPLS
Configure and Verify SNMP
Configure and Verify Devices by Using Model-Driven Programmability
Configure and Verify Model-Driven Telemetry
Configure and Verify Application Hosting Within a Docker Container - SPSDNTXP — Implementing Cisco Converged SDN Transport Solution
- Длительность: 4 дня (32 часа)
- Код курса: SPSDNTXP
- Стоимость
- Очный формат: 913 000 ₸
- Онлайн формат: 823 000 ₸
Описание курса
Course Description
The Implementing Converged SDN Transport Solutions (SPSDNTXP) v1.0 course introduces you to Software-Defined Networking (SDN)-ready architecture. This architecture evolves traditional Metro network design into an SDN-enabled programmable network capable of delivering all services (residential, business, 5G mobile backhauling, video, and IoT) on the premise of simplicity, full programmability, and cloud integration with guaranteed service level agreements (SLAs).
You will examine the evolution of service provider design principles such as Unified Multiprotocol Label Switching, Evolved Programmable Networks, and the Cisco® Compass Metro Fabric. Additionally, you’ll explore and configure individual components of the design including segment routing and its supporting features.
How You'll Benefit
This course will help you:
Describe the Converged SDN Transport solution
Describe the basic implementation of SDN component features
Establish a foundation to take a deeper dive into SDN solutionsWho Should Enroll
This course is suited for the following audiences:
Network architects
Network engineers
Network consulting engineers
Customer support engineersCourse Prerequisites
To fully benefit from this course, you should have:
Knowledge of general networking concepts
Experience working with CLI-based network devicesCourse Outline
Converged SDN Transport Fundamentals
Introducing Segment Routing
Segment Routing Topology-Independent Loop-Free Alternative (TI-LFA) and Traffic Engineering (TE)
Multidomain SR-TE
VPN and Services Overview
EVPN Layer 2 Basics
Layer 3 VPNs
Operation Simplification and Automation Foundation
Network Orchestration Using NSO
Network Automation Using Cisco WAELab Outline
Configure and Verify Segment Routing
Configure and Verify SR TI-LFA
Configure and Verify SR-TE
Configure and Verify Multidomain SR-TE
Configure and Verify Basic EVPN
Configure and Verify Layer 3 VPN
Cisco NSO Overview
Cisco WAE Overview - SPAUI — Implementing Automation for Cisco Service Provider Solutions
- Длительность: 3 дня (24 часа)
- Код курса: SPAUI
- Стоимость
- Очный формат: 464 000 ₸
- Онлайн формат: 452 000 ₸
Описание курса
Course Description
The Implementing Automation for Cisco Service Provider Solutions (SPAUI) v1.0 course prepares you to implement and support automation solutions in a Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms. Through a combination of lessons and hands-on labs, you will learn to deploy, configure, monitor, and operate Service Provider network environments using modern data models. These models allow you to represent operational data and new network management protocols in order to administer hundreds or thousands of devices in a single operation, replacing traditional, time-consuming, error prone, device-by-device Command Line Interface (CLI) management. The course also introduces powerful automation solutions that can streamline network operations.
This course covers Yet Another Next Generation (YANG) data models and validation tools, Representational State Transfer Configuration Protocol RESTCONF and Network Configuration Protocol (NETCONF) management protocols, model-driven telemetry with Google Remote Procedure Call (gRPC) and Google Network Management Interface (gNMI), traffic automation with XR Transport Control (XTC), Secure Shell (SSH)-based automation tools like NetMiko and Ansible, orchestration provided by Network Services Orchestration (NSO), Network Function Virtualization (NFV) lifecycle management with Elastic Services Controller (ESC), and network operations automation with WAN Automation Engine (WAE).This course prepares you for the 300-535 Automating and Programming Cisco® Service Provider Solutions (SPAUTO) exam.
Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Service Provider Solutions (SPAUI) because it provides crucial foundational knowledge essential to success. This course also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This course will help you:
Use network programmability to scale and streamline Service Provider network infrastructure
Gain hands-on experience in using modern data models to manage Service Provider network infrastructure
Earn 24 CE credits toward recertification
Prepare for the 300-535 SPAUTO exam.Who Should Enroll
This course is designed for Service Provider networking professionals in job roles such as:
Network administrators
Network architects
Network designers
Network engineers
Network managers
Network Operations Center (NOC) personnel
Network supervisorsWhat to Expect in the Exam
The 300-535 SPAUTO exam certifies your knowledge and skills related to implementing service provider automated solutions, including programming concepts, orchestration, programming OS, and automation tools.
After you pass 300-535 SPAUTO, you earn the Cisco Certified DevNet Specialist - Service Provider Automation and Programmability certification, and you satisfy the concentration exam requirement for these professional-level certifications:
CCNP Service Provider
Cisco Certified DevNet ProfessionalCourse Objectives
After taking this course, you should be able to:
Use NETCONF and RESTCONF programmability protocols on Cisco devices
Describe and use tools to validate YANG data models on Cisco devices
Describe and configure model-driven telemetry on Cisco devices
Describe and configure network traffic automation with Cisco XTC
Describe and use network automation tools that utilize SSH
Automate service provider network configuration with Cisco NSO
Describe how to automate virtualized resources with Cisco ESC
Describe how to automate service provider WAN with Cisco WAECourse Prerequisites
Before taking this course, you should have the following knowledge and skills:
CCNP equivalent level of knowledge for Routing and Switching (R and S)
Cisco Internetworking Operating System (IOS XE) and Cisco IOS XR working experience
SP Operations experience with routing, Multi-Protocol Label Switching (MPLS) and Virtual Private Network (VPN) Solutions
Network Programmability Basics (Network Programming Foundations, APIs and Protocols, Network Model Driven APIs and Protocols, Configuration Management with Ansible, Service Provider Network Automation workflows)The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Introducing Automation for Cisco Solutions (CSAU)
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Implementing Cisco Service Provider Advanced Routing Solutions (SPRI)
Implementing Cisco Service Provider VPN Services (SPVI)Course Outline
Implementing Network Device Programmability Interfaces with NETCONF and RESTCONF
Implement NETCONF Protocol
Implement RESTCONF ProtocolImplementing Model-Driven Programmability with YANG
YANG Data Models
YANG Tools
YANG Development KitImplementing Model-Driven Telemetry
Implementing Model-Driven Telemetry with gRPC
Implementing Model-Driven Telemetry with gNMIAutomating Service Provider Network Traffic with Cisco XTC
Cisco XTC Fundamentals
Configure Cisco XTCAutomating Networks with Tools That Utilize SSH
Implement Device Configurations with Python Netmiko Library
Implement Device Configurations with Ansible PlaybooksOrchestrating Network Services with Cisco NSO
Cisco NSO Fundamentals
Cisco NSO Device Manager
Cisco NSO Services
Implement Device Configurations with PythonAutomating Virtualized Resources with Cisco Elastic Services Controller
Cisco ESC Architecture
Cisco ESC Resource ManagementAutomating the WAN with Cisco WAE
Describe the Cisco WAE ComponentsLab Outline
Explore NETCONF Protocol in Cisco Devices
Configure Cisco IOS XE Devices with RESTCONF
Explore Cisco and OpenConfig YANG Data Models with YANG Tools
Use ncclient and Python to Configure Cisco Devices
Use YANG Development Kit (YDK) to Configure Cisco Devices
Configure Model-Driven Telemetry with gRPC
Configure Model-Driven Telemetry with gNMI
Configure Path Disjointness with Cisco XTC
Use Python Netmiko Library to Configure Cisco Devices
Use Ansible to Configure Cisco Devices
Use Cisco NSO Device Manager
Create a Loopback Service Template
Use Cisco NSO REST API with Postman
Explore and Use Cisco WAE Features - CSAU — Introducing Automation for Cisco Solutions
- Длительность: 3 дня (24 часов)
- Код курса: CSAU
- Стоимость
- Очный формат: 1 022 000 ₸
- Онлайн формат: 928 000 ₸
Описание курса
Course Description
The Introducing Automation for Cisco Solutions (CSAU) training gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with representational state transfer configuration protocol (RESTCONF) and network configuration protocol (NETCONF) protocols. The training also covers data formats and types, including Extensible Markup Language (XML), JavaScript Object Notation (JSON), Yaml Ain’t Markup Language (YAML), and Yet Another Next Generation (YANG), and their value in network automation, along with DevOps tools such as Ansible and Git.
How You'll Benefit
This training will help you:
Gain an overview of the skills you need to become a next-generation engineer
Prepare to accelerate network automation in your organization
Increase collaboration across internal and external teams using version control systems
Earn 16 CE credits toward recertificationWho Should Enroll
Automation Architects
Automation Engineers
Consulting Systems Engineers
DevOps Engineers
Network Administrators
Network Architects
Network Consulting Engineers
Network Design Engineers
Network Engineers
Network Operators
Network Reliability Engineers
Sales Engineers
Site Reliability Engineers
Systems Engineers
Technical Solutions Architects
Application Developers
Collaboration Developers
Collaboration Solutions Architects
IT Directors
Mobile Developers
Network Operations Center (NOC) Managers
Software Architects
Web DevelopersCourse Objectives
Articulate the role network automation and programmability play in the context of end-to-end network management and operations
Define and differentiate between waterfall and agile software development methodologies
Interpret and troubleshoot Python scripts with fundamental programming constructs built for network automation use cases
Describe how DevOps principles, tools, and pipelines can be applied to network operations
Understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker
Understand and construct HTTP-based application programming interface (API) calls to network devices
Articulate the differences among and common use cases for XML, JSON, YAML, and protocol buffer (protobuf)
Construct and interpret Python scripts using the Python requests module to automate devices that have HTTP-based APIs
Understand the role YANG plays in network automation
Understand that several tools exist to simplify working with YANG models
Describe the functionality of RESTCONF and NETCONF and the differences between them
Construct Ansible playbooks to configure network devices and retrieve operational state data from them
Build Jinja2 templates and YAML data structures to generate desired state configurationsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Routing and switching including open shortest path first (OSPF), border gateway protocol (BGP), and basic configuration features such as interfaces, simple network management protocol (SNMP), and static routes
Fundamentals of Python data structures and programming constructs, such as loops, conditionals, and classes, or the equivalent of 3–6 months of experience writing Python scripts
Basic Linux commands for navigating the file system and executing scripts
Knowledge of working with text editorsThe following recommended Cisco offering may help you meet these prerequisites:
Implementing and Administrating Cisco Solutions (CCNA)Course Outline
Examining Network Management and Operations
Exploring Software Development Methodologies
Using Python for Network Automation
Describing NetDevOps: DevOps for Networking
Managing Automation Development Environments
Introducing HTTP Network APIs
Reviewing Data Formats and Data Encoding
Using Python Requests to Automate HTTP-Based APIs
Exploring YANG
Using YANG Tools
Automating Model-Driven APIs with Python
Introducing Ansible for Network Automation
Templating Configurations with Jinja2Lab Outline
Use Network Automation Scripts
Enforce Python Fundamentals on the Interactive Interpreter
Automate Networks with Netmiko
Use the Git Version-Control System and Collaborate on an Internal Project
Build Reproduceable Automation Environments
Use HTTP-Based APIs with Postman
Explore YAML and JSON Data
Consume HTTP-Based APIs with Python Requests
Explore YANG Tools
Explore RESTCONF with Python
Explore NETCONF with Python
Configure Network Devices with Ansible
Collect Network Data with Ansible
Build and Deploy Configurations with Ansible - DEVCOR — Developing Applications Using Cisco Core Platforms and APIs
- Длительность: 5 дней (40 часов)
- Код курса: DEVCOR
- Стоимость
- Очный формат: 1 730 000 ₸
- Онлайн формат: 1 646 000 ₸
Описание курса
Course Description
The Developing Applications Using Cisco Core Platforms and APIs training is designed to help you prepare for the Cisco DevNet Professional certification and professional-level network automation engineer roles. The focus of this training is implementation of network applications using Cisco platforms as a base, from initial software design to diverse system integration, as well as testing and deployment automation. The training provides hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools.
This training prepares you for the 350-901 DEVCOR exam. If passed, you earn the Cisco Certified DevNet Specialist – Core certification and satisfy the core exam requirement for the Cisco Certified DevNet Professional and Cisco Certified DevNet Expert certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Take full advantage of the network and software development practices when implementing applications to fulfill business needs
Design and implement automated workflows for network provisioning
Design and develop applications built on Cisco platforms
Design and implement integration of custom applications with Cisco platforms and devices
Understand challenges in network programmability and system integration
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level DevOps roles
Earn 64 CE credits toward recertificationWho Should Enroll
Sr. Network Automation Engineer
Sr. Software Developer
Sr. System Integration Programmer
Sr. Infrastructure Architect
Sr. Network Designer
Test Development EngineerWhat to Expect in the Exam
350-901: Developing Applications Using Cisco Core Platforms and APIs is a 120-minute exam associated with the Cisco Certified DevNet Specialist – Core certification and satisfies the core exam requirement for the Cisco Certified DevNet Professional and Cisco Certified DevNet Expert certifications.
The exam tests your knowledge of software development and design, including:
Using APIs
Cisco platforms
Application deployment and security
Infrastructure and automationCourse Objectives
Describe the architectural traits and patterns that improve application maintainability and serviceability
Identify steps to design and build a ChatOps application
Implement robust Representational State Transfer (REST) API integrations with network error handling, pagination, and error flow control
Describe the necessary steps for applications and their user and system data
Identify common tasks in automated application release process
Describe best practices for application deployment
Describe methodologies for designing distributed systems
Describe the concepts of infrastructure configuration management and device automation
Utilize Yet Another Next Generation (YANG) data models to describe network configurations and telemetry
Compare various relational and nonrelational database types and how to select the appropriate type based on requirementsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Knowledge of program design and coding with focus on Python
Familiarity with Ethernet, Transmission Control Protocol Internet Protocol (TCP/IP) and internet-related networking
Understand the utilization of APIs
Understanding of software development and design methodologies
Hands-on experience with a programming language (specifically Python)These skills can be found in the following Cisco Learning Offering:
Developing Applications and Automating Workflows using Cisco Platforms 1.0Course Outline
Designing for Maintainability
Designing for Serviceability
Implementing ChatOps Application
Advanced REST API Integration
Securing Application Data
Securing Web and Mobile Applications
Automating Application Release
Deploying Applications
Exploring Distributed Systems
Orchestrating Network and Infrastructure
Modeling Data with YANG
Using Relational and Nonrelational DatabasesLab Outline
Construct Sequence Diagram
Construct Web Sequence Diagram
Use Paginated REST API Endpoint
Use REST API Error Control Flow Techniques
Evaluate Application for Common OWASP Vulnerabilities
Resolve Merge Conflicts with Git
Containerize Application Using Docker
Integrate Application into Existing CI/CD Environment
Diagnose Problems Using Application Logs
Automate and Manage Cisco IOS XE Network Infrastructure with Terraform and GitLab CI/CD Pipelines
Configure Network Parameters Using Ansible
Synchronize Firepower Device Configuration
Utilize RESTCONF for Network Configuration
Query Relational Database
Query Document Store
Query Time Series Database
Query Graph Database - DEVASC — Developing Applications and Automating Workflows Using Cisco Platforms
- Длительность: 5 дней (40 часов)
- Код курса: DEVASC
- Стоимость
- Очный формат: 1 691 000 ₸
- Онлайн формат: 1 606 000 ₸
Описание курса
Course Description
The Developing Applications and Automating Workflows Using Cisco Core Platforms (DEVASC) training helps you prepare for Cisco® DevNet Associate certification and for associate-level network automation engineer roles. You will learn how to implement basic network applications using Cisco platforms as a base, and how to implement automation workflows across network, security, collaboration, and computing infrastructure. The course gives you hands-on experience solving real world problems using Cisco Application Programming Interfaces (APIs) and modern development tools.
This training helps you prepare to take the 200-901 DevNet Associate (DEVASC) exam. By passing this exam, you earn Cisco Certified DevNet Associate certification.
How You'll Benefit
This training will help you:
Take advantage of the network when you implement applications to fulfill business needs
Gain a foundation in the essentials of applications, automation, and Cisco platforms
Earn 48 CE credits toward recertification
Prepare for the 200-901 DEVASC examWho Should Enroll
This training is designed for anyone who performs or seeks to perform a developer role and has one or more years of hands-on experience developing and maintaining applications that are built on top of Cisco platforms.
The training is appropriate for software developers, application developers, and network engineers who want to expand their skill base and validate their skills in programmability, software, and automation. Students preparing for Cisco Certified DevNet Associate certification will also find this material useful.
The job roles best suited to the material in this course are:
Network automation engineer
Software developer
System integration programmerAdditional job roles that might be interested:
Infrastructure architect
Network designerWhat to Expect in the Exam
The 200-901 DEVASC exam certifies your knowledge of software development and design including understanding and using APIs, Cisco platforms and development, application development and security, and infrastructure and automation.
After you pass 200-901 DEVASC, you earn Cisco Certified DevNet Associate certification.Course Objectives
After taking this training, you should be able to:
Describe the importance of APIs and use of version control tools in modern software development
Describe common processes and practices used in software development
Describe options for organizing and constructing modular software
Describe HTTP concepts and how they apply to network-based APIs
Apply Representational State Transfer (REST) concepts to integration with HTTP-based APIs
Describe Cisco platforms and their capabilities
Describe programmability features of different Cisco platforms
Describe basic networking concepts and interpret simple network topology
Describe interaction of applications with the network and tools used for troubleshooting issues
Apply concepts of model-driven programmability to automate common tasks with Python scripts
Identify common application deployment models and components in the development pipeline
Describe common security concerns and types of tests, and utilize containerization for local development
Utilize tools to automate infrastructure through scripting and model-driven programmabilityCourse Prerequisites
There are no formal prerequisites for Cisco Certified DevNet Associate certification, but you should make sure to have a good understanding of the exam topics before taking the exam.
And before taking this training, you should have:
Basic computer literacy
Basic PC operating system navigation skills
Basic Internet usage skills
Hands-on experience with a programming language (specifically Python)Here are Cisco learning resources that can help you prepare:
Python Programming for Network Engineers (PRNE)
Explore the DevNet Certification area for specific topics and labs related to this course and certificationCourse Outline
This class includes lecture sections and self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning courses, the lectures are on recorded videos. In both versions, you will need to review self-study sections on your own before taking the certification exam.
Practicing Modern Software Development — Lecture
Describing Software Development Process — Self-study
Designing Software — Self-study
Introducing Network-Based APIs — Lecture
Consuming REST-Based APIs — Lecture
Employing Programmability on Cisco Platforms — Lecture
Introducing Cisco Platforms — Self-study
Describing IP Networks (ELT only) — Self-study
Relating Network and Applications — Lecture
Employing Model-Driven Programmability with YANG — Lecture
Deploying Applications — Lecture
Testing and Securing Applications — Lecture
Automating Infrastructure — LectureLab Outline
Parse API Data Formats with Python
Use Git for Version Control
Identify Software Architecture and Design Patterns on a Diagram
Implement Singleton Pattern and Abstraction-Based Method
Inspect HTTP Protocol Messages
Use Postman
Troubleshoot an HTTP Error Response
Utilize APIs with Python
Use the Cisco Controller APIs
Use the Cisco Webex Teams™ Collaboration API
Interpret a Basic Network Topology Diagram
Identify the Cause of Application Connectivity Issues
Perform Basic Network Configuration Protocol (NETCONF) Operations
Use Cisco Software Development Kit (SDK) and Python for Automation Scripting
Utilize Bash Commands for Local Development
Construct a Python Unit Test
Interpret a Dockerfile
Utilize Docker Commands to Manage Local Developer Environment
Exploit Insufficient Parameter Sanitization
Construct Infrastructure Automation Workflow - CBROPS — Understanding Cisco Cybersecurity Operations Fundamentals
- Длительность: 5 дней (40 часов)
- Код курса: CBROPS
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) training provides an understanding of the network infrastructure devices, operations, and vulnerabilities of the TCP/IP protocol suite, and basic information security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data that are used to investigate security incidents. After completing this training, you will have the basic knowledge that is required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center (SOC).
This training prepares you for the 200-201 CBROPS v1.2 exam. If passed, you earn the Cisco Certified Cybersecurity Associate certification and the role of a junior or entry-level cybersecurity operations analyst in a SOC. This training also earns you 30 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn the fundamental skills, techniques, technologies, and the hands-on practice necessary to prevent and defend against cyberattacks as part of a SOC team
Prepare for the 200-201 CBROPS v1.2 exam
Earn 30 CE credits toward recertificationWho Should Enroll
This training is designed for associate-level cybersecurity analysts who are working in security operation centers.
What to Expect in the Exam
Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) v1.2 is a 120-minute exam associated with the Cisco Certified Cybersecurity Associate certification.
This exam tests your knowledge and skills related to:
Security concepts
Security monitoring
Host-based analysis
Network intrusion analysis
Security policies and proceduresCourse Objectives
Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
Explain the data that is available to the network security analyst.
Describe the basic concepts and uses of cryptography.
Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
Understand common endpoint security technologies.
Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
Identify resources for hunting cyber threats.
Explain the need for event data normalization and event correlation.
Identify the common attack vectors.
Identify malicious activities.
Identify patterns of suspicious behaviors.
Conduct security incident investigations.
Explain the use of a typical playbook in the SOC.
Explain the use of SOC metrics to measure the effectiveness of the SOC.
Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT).
Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format.Course Prerequisites
Before taking this course, you should have the following knowledge and skills:
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows and Linux operating systems
Familiarity with basics of networking security conceptsCourse Outline
Defining the Security Operations Center
Understanding SOC Metrics
Understanding SOC Workflow and Automation
Understanding Windows Operating System Basics
Understanding Linux Operating System Basics
Understanding Endpoint Security Technologies
Understanding Network Infrastructure and Network Security Monitoring Tools
Understanding Common TCP/IP Attacks
Exploring Data Type Categories
Understanding Basic Cryptography Concepts
Cloud Security Fundamentals
Securing Cloud Deployments
Understanding Incident Analysis in a Threat-Centric SOC
Identifying Common Attack Vectors
Identifying Malicious Activity
Identifying Patterns of Suspicious Behavior
Identifying Resources for Hunting Cyber Threats
Understanding Event Correlation and Normalization
Conducting Security Incident Investigations
Using a Playbook Model to Organize Security MonitoringLab Outline
Explore the Windows Operating System
Explore the Linux Operating System
Explore Endpoint Security
Explore TCP/IP Attacks
Use NSM Tools to Analyze Data Categories
Explore Cryptographic Technologies
Investigate Hacker Methodology
Investigate Browser-Based Attacks
Analyze Suspicious DNS Activity
Explore Security Data for Analysis
Investigate Suspicious Activity Using Security Onion
Hunt Malicious Traffic
Cisco XDR to Splunk Enterprise Integration Simulation
Correlate Event Logs, PCAPs, and Alerts of an Attack
Investigate Advanced Persistent Threats
Explore SOC Playbooks - CBRTHD — Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps
- Длительность: 5 дней (40 часов)
- Код курса: CBRTHD
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting training that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.
This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified CyberOps Professional certification. This training also earns you 40 credits towards recertification.
How You'll Benefit
This training will help you:
Learn how to perform a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools
Gain leading-edge career skills focused on cybersecurity
Prepare for the 300-220 CBRTHD v1.0 exam
Earn 40 CE credits toward recertificationWho Should Enroll
Security Operations Center staff
Security Operations Center (SOC) Tier 2 Analysts
Threat Hunters
Cyber Threat Analysts
Threat Managers
Risk ManagementsWhat to Expect in the Exam
Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (300-220 CBRTHD v1.0) is a 90-minute exam associated with the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfies the concentration exam requirement for the Cisco Certified CyberOps Professional certification.
The exam tests your knowledge of conducting threat hunting and defending, including:
Threat modeling techniques
Threat actor attribution techniques
Threat hunting techniques, processes, and outcomesCourse Objectives
Define threat hunting and identify core concepts used to conduct threat hunting investigations
Examine threat hunting investigation concepts, frameworks, and threat models
Define cyber threat hunting process fundamentals
Define threat hunting methodologies and procedures
Describe network-based threat hunting
Identify and review endpoint-based threat hunting
Identify and review endpoint memory-based threats and develop endpoint-based threat detection
Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting
Describe the process of threat hunting from a practical perspective
Describe the process of threat hunt reportingCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
General knowledge of networks and network securityThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Performing CyberOps Using Cisco Security Technologies (CBRCOR)Course Outline
Threat Hunting Theory
Threat Hunting Concepts, Frameworks, and Threat Models
Threat Hunting Process Fundamentals
Threat Hunting Methodologies and Procedures
Network-Based Threat Hunting
Endpoint-Based Threat Hunting
Endpoint-Based Threat Detection Development
Threat Hunting with Cisco Tools
Threat Hunting Investigation Summary: A Practical Approach
Reporting the Aftermath of a Threat Hunt InvestigationLab Outline
Categorize Threats with MITRE ATTACK Tactics and Techniques
Compare Techniques Used by Different APTs with MITRE ATTACK Navigator
Model Threats Using MITRE ATTACK and D3FEND
Prioritize Threat Hunting Using the MITRE ATTACK Framework and Cyber Kill Chain
Determine the Priority Level of Attacks Using MITRE CAPEC
Explore the TaHiTI Methodology
Perform Threat Analysis Searches Using OSINT
Attribute Threats to Adversary Groups and Software with MITRE ATTACK
Emulate Adversaries with MITRE Caldera
Find Evidence of Compromise Using Native Windows Tools
Hunt for Suspicious Activities Using Open-Source Tools and SIEM
Capturing of Network Traffic
Extraction of IOC from Network Packets
Usage of ELK Stack for Hunting Large Volumes of Network Data
Analyzing Windows Event Logs and Mapping Them with MITRE Matrix
Endpoint Data Acquisition
Inspect Endpoints with PowerShell
Perform Memory Forensics with Velociraptor
Detect Malicious Processes on Endpoints
Identify Suspicious Files Using Threat Analysis
Conduct Threat Hunting Using Cisco Secure Firewall, Cisco Secure Network Analytics, and Splunk
Conduct Threat Hunt Using Cisco XDR Control Center and Investigate
Initiate, Conduct, and Conclude a Threat Hunt - CBRCOR — Performing CyberOps Using Cisco Security Technologies
- Длительность: 5 дней (40 часов)
- Код курса: CBRCOR
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity operations fundamentals, methods, and automation. The knowledge you gain in this course will prepare you for the role of Information Security Analyst on a Security Operations Center (SOC) team. You will learn foundational concepts and their application in real-world scenarios, and how to leverage playbooks in formulating an Incident Response (IR). The course teaches you how to use automation for security using cloud platforms and a SecDevOps methodology. You will learn the techniques for detecting cyberattacks, analyzing threats, and making appropriate recommendations to improve cybersecurity.
This course also earns you 40 Continuing Education (CE) credits towards recertification and prepares you for the 350-201 CBRCOR core exam.
How You'll Benefit
This course will help you:
Gain an advanced understanding of the tasks involved for senior-level roles in a security operations center
Configure common tools and platforms used by security operation teams via practical application
Prepare you to respond like a hacker in real-life attack scenarios and submit recommendations to senior management
Prepare for the 350-201 CBRCOR core exam
Earn 40 CE credits toward recertificationWho Should Enroll
Although there are no mandatory prerequisites, the course is particularly suited for the following audiences:
Cybersecurity engineer
Cybersecurity investigator
Incident manager
Incident responder
Network engineer
SOC analysts currently functioning at entry level with a minimum of 1 year of experienceWhat to Expect in the Exam
350-201 Performing CyberOps Using Cisco Security Technologies (CBRCOR) is a 120-minute exam associated with the Cisco Certified CyberOps Professional certification. The multiple-choice format tests knowledge of core cybersecurity operations including cybersecurity fundamentals, techniques, policies, processes, and automation. The exam will test for knowledge in the following areas:
Monitoring for cyberattacks
Analyzing high volume of data using automation tools and platforms—both open source and commercial
Accurately identifying the nature of attack and formulate a mitigation plan
Scenario-based questions; for example, using a screenshot of output from a tool, you may be asked to interpret portions of output and establish conclusionsCourse Objectives
After taking this course, you should be able to:
Describe the types of service coverage within a SOC and operational responsibilities associated with each.
Compare security operations considerations of cloud platforms.
Describe the general methodologies of SOC platforms development, management, and automation.
Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections.
Describe Zero Trust and associated approaches, as part of asset controls and protections.
Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC.
Use different types of core security technology platforms for security monitoring, investigation, and response.
Describe the DevOps and SecDevOps processes.
Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, Comma-Separated Values (CSV).
Describe API authentication mechanisms.
Analyze the approach and strategies of threat detection, during monitoring, investigation, and response.
Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs).
Interpret the sequence of events during an attack based on analysis of traffic patterns.
Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools).
Analyze anomalous user and entity behavior (UEBA).
Perform proactive threat hunting following best practices.Course Prerequisites
Although there are no mandatory prerequisites, to fully benefit from this course, you should have the following knowledge:
Familiarity with UNIX/Linux shells (bash, csh) and shell commands
Familiarity with the Splunk search and navigation functions
Basic understanding of scripting using one or more of Python, JavaScript, PHP or similar.Recommended Cisco offerings that may help you prepare for this course:
Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
Implementing and Administering Cisco Solutions (CCNA)Recommended third-party resources:
Splunk Fundamentals 1
Blue Team Handbook: Incident Response Edition by Don Murdoch
Threat Modeling- Designing for Security y Adam Shostack
Red Team Field Manual by Ben Clark
Blue Team Field Manual by Alan J White
Purple Team Field Manual by Tim Bryant
Applied Network Security and Monitoring by Chris Sanders and Jason SmithCourse Outline
Understanding Risk Management and SOC Operations
Understanding Analytical Processes and Playbooks
Investigating Packet Captures, Logs, and Traffic Analysis
Investigating Endpoint and Appliance Logs
Understanding Cloud Service Model Security Responsibilities
Understanding Enterprise Environment Assets
Implementing Threat Tuning
Threat Research and Threat Intelligence Practices
Understanding APIs
Understanding SOC Development and Deployment Models
Performing Security Analytics and Reports in a SOC
Malware Forensics Basics
Threat Hunting Basics
Performing Incident Investigation and ResponseLab Outline
Explore Cisco SecureX Orchestration
Explore Splunk Phantom Playbooks
Examine Cisco Firepower Packet Captures and PCAP Analysis
Validate an Attack and Determine the Incident Response
Submit a Malicious File to Cisco Threat Grid for Analysis
Endpoint-Based Attack Scenario Referencing MITRE ATTACK
Evaluate Assets in a Typical Enterprise Environment
Explore Cisco Firepower NGFW Access Control Policy and Snort Rules
Investigate IOCs from Cisco Talos Blog Using Cisco SecureX
Explore the ThreatConnect Threat Intelligence Platform
Track the TTPs of a Successful Attack Using a TIP
Query Cisco Umbrella Using Postman API Client
Fix a Python API Script
Create Bash Basic Scripts
Reverse Engineer Malware
Perform Threat Hunting
Conduct an Incident Response - DTCSM — Cisco Customer Success Manager
- Длительность: 3 дня (24 часов)
- Код курса: DTCSM
- Стоимость
- Очный формат: 806 000 ₸
- Онлайн формат: 711 000 ₸
Описание курса
Course Description
The Cisco Customer Success Manager (DTCSM) v2.2 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers.
This course is based on understanding the customer lifecycle and how to optimize that journey, increasing the value realized by the customer, and maximizing your likelihood to maintain their loyalty and renew or expand their business opportunities. The course helps you prepare for the 820-605 Cisco Customer Success Manager (CSM) exam. By passing this exam, you earn the Cisco Customer Success Manager Specialist certification.
How You'll Benefit
This course will help you:
Develop skills and knowledge around the increasingly crucial CSM role, which drives organizational and business outcomes from technology solutions in customer engagements
Understand key concepts and terminologies related to the CSM role
Prepare for the 820-605 CSM exam, which earns the Cisco Customer Success Manager Specialist certification examWho Should Enroll
Individuals preparing for the Cisco Customer Success ManagerSpecialist certification
Individuals who have experience working with customers to determine, measure, and deliver business outcomes through the implementation of technologyWhat to Expect in the Exam
What to expect in the exam
The 820-605 CSM exam certifies your knowledge and skills related to developing and integrating solutions, identifying adoption barriers and actions to remove them, implementing adoption frameworks, and interpreting customer usage data while leading customers to renewals and cultivating new sales opportunities through the entire customer lifecycle.Course Objectives
After taking this course, you should be able to:
Describe the role of the Customer Success Manager
Describe the tools that the Customer Success Manager uses to ensure customer experience
Describe the lifecycle approach to customer experienceCourse Prerequisites
This course has no formal prerequisites, but we recommend that you have:
Experience working with customers to determine, measure, and deliver business outcomes through the implementation of technologyCourse Outline
Transition to Subscription Economy
Customer and Industry Trends
Defining Customer Success and the CSM Role
Engaging the Customer for Success
Engaging the Customer for Success
Addressing Barriers
Customer Success Management Activities
Success Plan Elements
Customer Success Management Activities - CSE01 — Cisco Technical Overview for Sales
- Длительность: 3 дня (24 часа)
- Код курса: CSE01
- Стоимость
- Очный формат: 471 500 ₸
- Онлайн формат: 453 000 ₸
Описание курса
Day 1.
Cisco Catalyst Enterprise Wireless and Wired Solutions
Cisco SD-WAN Architecture and Solutions
Cisco SD-Access Architecture
Cisco Meraki FamilyDay 2.
Cisco Access Control Technologies
Enterprise Access Control with ISE and Duo
Cisco Threat Defense Technologies
Cisco Secure Firewall, Secure Email and Secure Web Solutions
Cisco Security Monitoring with Secure Network Analytics
Cisco Client Security Solutions. Cisco Secure Endpoint and UmbrellaDay 3.
Cisco Unified Computing System Solution
Cisco Data Center LAN Networking with Nexus
Cisco Data Center SAN Networking with MDS
Cisco Application Centric Infrastructure
Cisco Collaboration Architecture
Cisco Collaboration Solutions - CSE02 — Cisco Technical Overview for Sales
- Длительность: 5 дней (40 часов)
- Код курса: CSE02
- Стоимость
- Очный формат: 577 500 ₸
- Онлайн формат: 565 000 ₸
Описание курса
Module 1. Cisco WLAN Technologies and Catalyst Wireless Solutions
Module 2. Cisco Routing and Switching Technologies and Catalyst Wired Solutions
Module 3. Cisco SD-WAN Architecture and Solutions
Module 4. Cisco SD-Access Architecture. Catalyst Center SDA and Assurance Solutions
Module 5. Cisco Access Control Technologies
Module 6. Enterprise Access Control with ISE and Duo
Module 7. Cisco Threat Defense Technologies
Module 8. Cisco Secure Firewall, Secure Email and Secure Web Solutions
Module 9. Cisco Security Monitoring with Secure Network Analytics
Module 10. Cisco Client Security Solutions. Cisco Secure Endpoint and Umbrella
Module 11. Cisco Meraki Family
Module 12. Cisco Data Center Unified Computing
Module 13. Cisco Data Center Networking Technologies
Module 14. Cisco MDS, Nexus and Application Centric Infrastructure
Module 15. Cisco Secure AI Factory with NVIDIA and Cisco AI PODs
Module 16. Voice-over-IP Technologies and Protocols
Module 17. Cisco Collaboration Core and Edge Solutions
Module 18. Summary and Exam - AUTOCOR — Designing, Deploying and Managing Network Automation Systems
- Длительность: 5 дней (40 часов)
- Код курса: AUTOCOR
- Стоимость
- Очный формат: По запросу
- Онлайн формат: По запросу
Описание курса
Course Description
The Designing, Deploying and Managing Network Automation Systems (AUTOCOR) training prepares you for a professional role as a network automation engineer. It focuses on designing and implementing automation systems, from writing Python scripts and Ansible playbooks, and applying Terraform for network automation, to building complex CI/CD pipelines that integrate multiple tools. The training also shows how to leverage AI for network automation by building Large Language Model (LLM)-powered network agents and by using MCP servers. Additionally, the training focuses on operational aspects of managing a modern, automated network and explores secure coding practices, collecting logs, containerization, and model-driven telemetry. Overall, the training focuses on practical implementation that directly prepares you to design, deploy, and operate automated networks.
This training prepares you for the 350-901 AUTOCOR v2.0 exam. If passed, you earn the Cisco Certified Specialist - Automation Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Automation and Cisco Certified Internetwork Expert (CCIE) Automation certifications. This training also earns you 32 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Explore industry-standard automation tools, including Python, Ansible, and Terraform, to design and implement robust Infrastructure as Code (IaC) solutions
Integrate Generative AI and LLMs into network workflows by building intelligent agents and utilizing MCP servers for advanced automation
Construct automated CI/CD pipelines using GitLab, Cisco Modeling Labs (CML), and pyATS to streamline network testing, validation, and deployment
Enhance network operations and security through the application of model-driven telemetry, secure coding practices, and containerized environments using Docker Compose
Prepare for the 350-901 AUTOCOR v2.0 exam
Earn 32 CE credits toward recertificationWho Should Enroll
Individuals seeking the CCNP Automation certification
Network Automation Engineers
Network Engineers with coding experience
DevOps Engineers working with network infrastructure
System Engineers
Network Site Reliability Engineers (SREs)What to Expect in the Exam
Designing, Deploying and Managing Network Automation Systems (350-901 AUTOCOR) v2.0 is a 120-minute exam associated with the Cisco Certified Specialist - Automation Core certification and satisfies the core exam requirement for the CCNP Automation and CCIE Automation certifications.
The exam tests your knowledge of network automation systems development and design, including:
Infrastructure as code
Operations
AI in automationCourse Objectives
Evaluate various network automation tools and approaches
Use Python for CLI-based network automation
Integrate REST APIs in network automation workflows
Automate device configuration using RESTCONF requests based on YANG data models
Create network automation solutions with AnsibleCreate network automation solutions with Terraform
Implement the Infrastructure as Code approach for network management
Use Git to track network changes
Design and build GitLab CI pipelines for network automation
Integrate CML topologies in automated workflows
Create network validation tools with pyATS and include them in automated workflows
Configure model-driven telemetry streams to collect real-time operational data from Cisco devices
Diagnose common automation failures using well-structured logs from Python, Ansible, and RESTCONF integrations
Harden network automation code by validating inputs, protecting credentials, and sanitizing outputs
Build and run multi-service Docker Compose environments for network automation
Generate, sign, and install certificates to secure web interfaces and APIs used by network automation tools
Describe the role, value, and risks of generative AI in network automation script creation
Create AI agents for network automation
Integrate LLMs with external capabilities using MCP serversCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Hands-on experience with a programming language (specifically Python)
Experience with common network designs and configurations
Understanding of the utilization of APIs
Awareness of network device APIs such as NETCONF and RESTCONF
Understanding of the basics of version control with Git
Familiarity with platforms like GitLab and GitHub
Comfort with the Linux shell, SSH, files, and virtual environments
Exposure to Docker/containerization
Basic knowledge of AI and LLMsThese skills can be found in the following Cisco Learning Offerings:
Automating Networks Using Cisco Platforms (CCNAAUTO)
Intermediate Python for Network Engineers (IPYNE)Course Outline
Network Automation Toolkits
Network Task Automation with Python
REST APIs in Network Automation
Network Automation with Ansible
Network Automation with Terraform
Infrastructure as Code Implementation
Network Change Tracking with Git
Configuration Change Deployment with CI Pipelines
Cisco Modeling Labs Integration for Test Network Environments
Network State Validation with pyATS
Model-Driven Telemetry for Network Monitoring
Network Automation Solution Troubleshooting
Secure Coding Practices for Network Automation
Network Automation Environment Containerization with Docker Compose
Trusted TLS Certificates Deployment for Secure Communication
Generative AI for Network Automation
AI Agents for Network Automation
LLM and MCP Server IntegrationLab Outline
Use Python to Automate Common Network Tasks
Explore REST API Documentation
Automate API Calls with Python Requests
Construct and Send RESTCONF Requests
Automate the Device Configuration with RESTCONF
Create a Network Automation Solution with Ansible
Automate Network Infrastructure with Terraform
Manage Router Interfaces as Code
Start Tracking Your Network State with GitLab
Build a GitLab CI Pipeline for Network Configuration
Create a Testing Network Environment with Cisco Modeling Labs
Build a Python Script to Launch Test Topologies in Cisco Modeling Labs
Integrate Cisco Modeling Labs Topologies into CI Pipeline
Create a Configuration Validation Tool with pyATS
Integrate pyATS Testing into Automated Pipelines
Set Up MDT on a Cisco Router Using YANG Suite
Troubleshoot an Automation Script
Harden an Automation Script
Containerize Automation Components
Add a Trusted Certificate to Cisco ISE
Set Up Local LLM with Ollama
Build a Network Automation Tool with Python and Ollama
Build and Launch a FastMCP Server - SCAZT — Designing and Implementing Secure Cloud Access for Users and Endpoints
- Длительность: 5 дней (40 часов)
- Код курса: SCAZT
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Designing and Implementing Secure Cloud Access for Users and Endpoints training teaches you the skills for designing and implementing cloud security architecture, user and device security, network and cloud security, cloud application and data security, cloud visibility and assurance, and responding to cloud threats.
This training prepares you for the 300-740 SCAZT v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Secure Cloud Access certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification.
How You'll Benefit
This training will help you:
Attain skills for designing and implementing cloud security architecture, user and device security, network and cloud security, cloud application and data security, cloud visibility and assurance, and responding to cloud threats
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level cloud design and implementation rolesWho Should Enroll
Network Engineers
Network Security Engineers
Network Architects
Sales/Presales EngineersWhat to Expect in the Exam
300-740 SCAZT v1.0: Designing and Implementing Secure Cloud Access for Users and Endpoints is a 90-minute exam associated with the Cisco Certified Specialist – Secure Cloud Access certification and satisfies the concentration exam requirement for the CCNP Security certification.
The exam tests your knowledge of designing and implementing:
Cloud security architecture
User and device security
Network and cloud security
Application and data security
Visibility and assurance
Threat responseCourse Objectives
Compare and contrast the National Institute of Standards and Technology (NIST), Cybersecurity and Infrastructure Security Agency (CISA), and Defense Information Systems Agency (DISA) security frameworks, and understand the importance of adopting standardized frameworks for cybersecurity in enhancing an organization’s security posture
Describe the Cisco Security Reference Architecture and its five main components
Describe commonly deployed use cases and recommend the necessary capabilities within an integrated security architecture to address them effectively
Describe the Cisco Secure Architecture for Everyone (SAFE) architecture
Review the benefits, components, and process of certificate-based authentication for both users and devices
Enable Duo multi-factor authentication (MFA) to protect an application from the Duo Administration Portal, and then configure the application to use Duo MFA for user login authentication
Install Cisco Duo and implement its multifactor authentication on remote access virtual private network (VPN)
Configure endpoint compliance
Review and demonstrate the ability to understand Stateful Switchover (SSO) using security assertion markup language (SAML) or OpenID Connect together with Cisco Duo
Describe Cisco software-defined wide-area network (SD-WAN) on-box and integrated threat prevention security services
Describe SD-WAN on-box and integrated content filtering security services
Describe the features and capabilities of Cisco Umbrella Secure Internet Gateway (SIG), such as DNS Security, Cloud-Delivered Firewall (CDFW), intrusion prevention systems (IPS), and interaction with Cisco SD-WAN
Introduce the reverse proxy for internet-facing applications protections
Explore the Cisco Umbrella SIG use case to secure cloud application access, the limitations and benefits of the solution, and the features available to discover and control access to cloud delivered applications
Explore the Cisco ThousandEyes capabilities for monitoring the Cisco SD-WAN deployment
Describe the challenges of accessing SaaS applications in modern business environments and explore the Cisco SD-WAN Cloud OnRamp for SaaS solution with direct or centralized internet access
Introduce the Cisco Secure Firewall platforms, use cases, and security capabilities
Demonstrate a comprehesive understanding of web application firewalls
Demonstrate a comprehensive understanding of Cisco Secure Workload capabilities, deployment options, agents, and connectors
Demonstrate a comprehensive understanding of Cisco Secure Workload application dependency mapping and policy discovery
Demonstrate a comprehensive understanding of common cloud attack tactics and mitigation strategies
Demonstrate a comprehensive understanding of multicloud security requirements and policy capabilities
Introduce the security issues with the adoption of public clouds and common capabilities of cloud visibility and assurance tools to mitigate these issues
Introduce Cisco Secure Network Analytics and Cisco Security Analytics and Logging
Describe Cisco Attack Surface Management
Describe how Application Program Interfaces (APIs) and automation can help in troubleshooting cloud policy, especially in the context of misconfigurations
Demonstrate a comprehensive knowledge of the appropriate responses to cloud threats in specific scenarios
Demonstrate the comprehensive knowledge required to use automation for cloud threat detection and responseCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic understanding of enterprise routing
Basic understanding of WAN networking
Basic understanding of Cisco SD-WAN
Basic understanding of Public Cloud servicesThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions 2.0
Implementing Cisco SD-WAN Solutions 3.0
Cisco SD-WAN Operation and Deployment 2.0Course Outline
Industry Security Frameworks
Cisco Security Reference Architecture Fundamentals
Cisco Security Reference Architecture Common Use Cases
Cisco SAFE Architecture
Certificate-Based User and Device Authentication
Cisco Duo Multifactor Authentication for Application Protection
Cisco Duo with AnyConnect VPN for Remote Access
Introducing Cisco ISE Endpoint Compliance Services
SSO using SAML or OpenID Connect
Deploying On-Premises Threat Prevention
Examining Content Filtering
Exploring Cisco Umbrella SIG
Reverse Proxy
Securing Cloud Application with Cisco Umbrella SIG
Exploring Cisco SD-WAN ThousandEyes
Optimizing SaaS Applications
Security Policies for Remote Access VPN
Cisco Secure Access
Cisco Secure Firewall
Web Application Firewall
Cisco Secure Workload Deployments, Agents, and Connectors
Cisco Secure Workload Structure and Policy
Cloud Security Attacks and Mitigations
Multicloud Security Policies
Cloud Visibility and Assurance
Cisco Secure Network Analytics and Cisco Secure Analytics and Logging
Cisco XDR
Cisco Attack Surface Management
Cloud Applications and Data Access Verifications
Automation of Cloud Policy
Response to Cloud Threats
Automation of Cloud Threat Detection and ResponseLab Outline
Explore Cisco SecureX
Windows Client BYOD Onboarding Interactive Activity
Use Cisco Duo MFA to Protect the Splunk Application
Integrate the Cisco Duo Authentication Proxy to Implement MFA for Cisco Security Secure Firewall AnyConnect Remote Access VPN
Configure Cisco ISE Compliance Services
Configure Threat Prevention
Implement Web Security
Deploy DIA Security with Unified Security Policy
Configure Cisco Umbrella DNS Policies
Deploy Cisco Umbrella Secure Internet Gateway
Implement CASB Security
Microsoft 365 SaaS Testing by Using Cisco ThousandEyes
Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
Configure Cisco Secure Firewall Policies
Explore Cisco Secure Workload
Explore the ATT&CK Matrix Cloud-Based Techniques
Explore Cisco Secure Network Analytics
Explore Cisco XDR Incident Response Tasks - SISE — Implementing and Configuring Cisco Identity Services Engine
- Длительность: 5 дней (40 часов)
- Код курса: SISE
- Стоимость
- Очный формат: 890 000 ₸
- Онлайн формат: 868 000 ₸
Описание курса
Course Overview
The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the Implementing and Configuring Cisco Identity Services Engine (300-715 SISE) exam, which leads to CCNP® Security and the Cisco Certified Specialist — Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education (CE) credits toward recertification
How You’ll Benefit
This class will help you use Cisco ISE to:
Develop and implement SASE architecture
Understand application of ISE capabilities towards development of a Zero Trust approach
Enable BYOD and guest access
Centrally configure and manage posture, authentication, and authorization services in a single webbased GUI console
Gain leading-edge career skills for high-demand job roles and responsibilities focused on enterprise security
Earn 40 CE credits toward recertificationWho should attend
Network security engineers
Network security architects
ISE administrators
Senior Security Operations Center (SOC) personnel responsible for Incidence Response
Cisco integrators and partnersPrerequisites
To fully benefit from this course, you should have the following knowledge:
Familiarity with the Cisco IOS® Software Command-Line Interface (CLI) for wired and wireless devices
Familiarity with Cisco AnyConnect® Secure Mobility Client
Familiarity with Microsoft Windows operating systems
Familiarity with 802.1XCourse Objectives
After taking this course, you should be able to:
Describe the Cisco Identity Services Engine (ISE)
Explain Cisco ISE deployment
Describe Cisco ISE policy enforcement components
Describe Cisco ISE policy configuration
Troubleshoot Cisco ISE policy and third-party Network Access Device (NAD) support
Configure guest access
Configure hotspots and guest portals
Describe the Cisco ISE profiler services
Describe profiling best practices and reporting
Configure a Cisco ISE BYOD solution
Configure endpoint compliance
Configure client posture services
Configure Cisco ISE device administration
Describe Cisco ISE TrustSec configurationsOutline
Introducing Cisco ISE Architecture
Introducing Cisco ISE Deployment
Introducing Cisco ISE Policy Enforcement Components
Introducing Cisco ISE Policy Configuration
Troubleshooting Cisco ISE Policy and Third-Party NAD Support
Introducing Web Authentication and Guest Services
Configuring Hotspots and Guest Portals
Introducing the Cisco ISE Profiler
Introducing Profiling Best Practices and Reporting
Configuring Cisco ISE BYOD
Introducing Cisco ISE Endpoint Compliance Services
Configuring Client Posture Services and Compliance
Working With Network Access Devices
Exploring Cisco TrustSecLab Topology
Configure Initial Cisco ISE Setup and System Certificate Usage
Integrate Cisco ISE with Active Directory
Configure Cisco ISE Policy for MAC Authentication Bypass (MAB)
Configure Cisco ISE Policy for 802.1X
Configure Guest Access
Configure Hotspot and Self-Registered Guest Access
Configure Sponsor-Approved and Fully Sponsored Guest Access
Create Guest Reports
Configure Profiling
Customize the Cisco ISE Profiling Configuration
Create Cisco ISE Profiling Reports
Configure BYOD
Manage a Lost or Stolen BYOD Device
Configure Cisco ISE Compliance Services
Configure Client Provisioning
Configure Posture Policies
Test and Monitor Compliance-Based Access
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization
Configure Cisco TrustSec - SWSA — Securing the Web with Cisco Web Security Appliance v3.0
- Длительность: 2 дня (16 часов)
- Код курса: SWSA
- Стоимость
- Очный формат: 632 000 ₸
- Онлайн формат: 532 000 ₸
Описание курса
Course Description
The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA), which leads to CCNP® Security and the Cisco Certified Specialist - Web Content Security. This course also earns you 16 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This class will help you:
Implement Cisco WSA to secure web gateways, provide malware protection, and use policy controls to address the challenges of securing and controlling web traffic
Gain valuable hands-on skills focused on web security
Earn 16 CE credits toward recertificationWho Should Enroll
Security architects
System designers
Network administrators
Operations engineers
Network managers, network or security technicians, and security engineers and managers responsible for web security
Cisco integrators and partnersWhat to Expect in the Exam
This exam certifies your knowledge of Cisco Web Security Appliance including proxy services, authentication, decryption policies, differentiated traffic access policies and identification policies, acceptable use control settings, malware defense, and data security and data loss prevention.
After you pass 300-725 SWSA:
You earn the Cisco Certified Specialist - Web Content Security certification.
You will have satisfied the concentration exam requirement for new the CCNP Security certification. To complete CCNP Security, you also need to pass the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam or its equivalent.Course Objectives
After taking this course, you should be able to:
Describe Cisco WSA
Deploy proxy services
Utilize authentication
Describe decryption policies to control HTTPS traffic
Understand differentiated traffic access policies and identification profiles
Enforce acceptable use control settings
Defend against malware
Describe data security and data loss prevention
Perform administration and troubleshootingCourse Prerequisites
To fully benefit from this course, you should have knowledge of these topics:
TCP/IP services, including Domain Name System (DNS), Secure Shell (SSH), FTP, Simple Network Management Protocol (SNMP), HTTP, and HTTPS
IP routingYou are expected to have one or more of the following basic technical competencies or equivalent knowledge:
Cisco certification (CCENT certification or higher)
Relevant industry certification [International Information System Security Certification Consortium ((ISC)2), Computing Technology Industry Association (CompTIA) Security+, International Council of Electronic Commerce Consultants (EC-Council), Global Information Assurance Certification (GIAC), ISACA]
Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
Windows expertise: Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Solutions Expert (MCSE)], CompTIA (A+, Network+, Server+)Course Outline
Describing Cisco WSA
Deploying Proxy Services
Utilizing Authentication
Creating Decryption Policies to Control HTTPS Traffic
Understanding Differentiated Traffic Access Policies and Identification Profiles
Defending Against Malware
Enforcing Acceptable Use Control Settings
Data Security and Data Loss Prevention
Performing Administration and Troubleshooting
ReferencesLab Outline
Configure the Cisco Web Security Appliance
Deploy Proxy Services
Configure Proxy Authentication
Configure HTTPS Inspection
Create and Enforce a Time/Date-Based Acceptable Use Policy
Configure Advanced Malware Protection
Configure Referrer Header Exceptions
Utilize Third-Party Security Feeds and MS Office 365 External Feed
Validate an Intermediate Certificate
View Reporting Services and Web Tracking
Perform Centralized Cisco AsyncOS Software Upgrade Using Cisco SMA - SESA — Securing Email with Cisco Email Security Appliance v3.0
- Длительность: 4 дня (32 часа)
- Код курса: SESA
- Стоимость
- Очный формат: 1 333 000 ₸
- Онлайн формат: 1 317 000 ₸
Описание курса
Course Description
The Securing Email with Cisco Email Security Appliance (SESA) training shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on training provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities, such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention.
This training prepares you for the 300-720 SESA v1.1 exam. If passed, you earn the Cisco Certified Specialist – Email Content Security certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
Gain leading-edge career skills focused on enterprise security
Prepare for the 300-720 SESA v1.1 exam
Earn 24 CE credits toward recertificationWho Should Enroll
Security Engineers
Security Administrators
Security Architects
Operations Engineers
Network Engineers
Network Administrators
Network or Security Technicians
Network Managers
System Designers
Cisco Integrators and PartnersCourse Objectives
Describe and administer the Cisco Email Security Appliance
Control sender and recipient domains
Control spam with Talos SenderBase and anti-spam
Use anti-virus and outbreak filters
Use mail policies
Use content filters
Use message filters
Prevent data loss
Perform lightweight directory access protocol (LDAP) queries
Authenticate simple mail transfer protocol (SMTP) sessions
Authenticate email
Encrypt email
Use system quarantines and delivery methods
Perform centralized management using clusters
Test and troubleshootCourse Prerequisites
The basic technical competencies you are expected to have before attending this training are:
Cisco certification, such as Cisco Certified Support Technician (CCST) Cybersecurity certification or higher
Relevant industry certification, such as (ISC)2, CompTIA Security+, EC-Council, Global Information Assurance Certification (GIAC), and ISACA
Cisco Networking Academy letter of completion (CCNA® 1 and CCNA 2)
Windows expertise, such as Microsoft [Microsoft Specialist, Microsoft Certified Solutions Associate (MCSA), Microsoft Certified Systems Engineer (MCSE)], and CompTIA (A+, Network+, Server+)The knowledge and skills you are expected to have before attending this training are:
Transmission control protocol/internet protocol (TCP/IP) services, including domain name system (DNS), secure shell (SSH), file transfer protocol (FTP), simple network management protocol (SNMP), hypertext transfer protocol (HTTP), and hypertext transfer protocol secure (HTTPS)
Experience with IP routingCourse Outline
Describing the Cisco Email Security Appliance
Controlling Sender and Recipient Domains
Controlling Spam with Talos SenderBase and Anti-Spam
Using Anti-Virus and Outbreak Filters
Using Mail Polices
Using Content Filters
Using Message Filters
Preventing Data Loss
Using LDAP
Describing SMTP Session Authentication
Using Email Authentication
Using Email Encryption
Administering the Cisco Email Security Appliance
Using System Quarantines and Delivery Methods
Centralizing Management Using Clusters
Testing and TroubleshootingLab Outline
Verify and Test Cisco ESA Configuration
Advanced Malware in Attachments (Macro Detection)
Protect Against Malicious or Undesirable URLs Beneath Shortened URLs
Protect Against Malicious or Undesirable URLs Inside Attachments
Intelligently Handle Unscannable Messages
Leverage AMP Cloud Intelligence Via Pre-Classification Enhancement
Integrate Cisco ESA with AMP Console
Prevent Threats with Anti-Virus Protection
Applying Outbreak Filters
Configure Attachment Scanning
Configure Outbound Data Loss Prevention
Integrate Cisco ESA with LDAP and Enable the LDAP Accept Query
Domain Keys Identified Mail (DKIM)
Sender Policy Framework (SPF)
Forged Email Detection
Perform Basic Administration
Configure the Cisco Secure Email and Web Manager for Tracking and Reporting - SCOR — Implementing and Operating Cisco Security Core Technologies
- Длительность: 5 дней (40 часов)
- Код курса: SCOR
- Стоимость
- Очный формат: 826 500 ₸
- Онлайн формат: 807 500 ₸
Описание курса
Course Description
The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.
This training prepares you for the 350-701 SCOR v1.1 exam. If passed, you earn the Cisco Certified Specialist - Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions
Qualify for professional and expert-level security job roles
Prepare for the 350-701 SCOR v1.1 exam
Earn 64 CE credits toward recertificationWho Should Enroll
Security Engineers
Network Engineers
Network Designers
Network Administrators
Systems Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators and Partners
Network Managers
Program Managers
Project ManagersWhat to Expect in the Exam
Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) v1.1 is a 120-minute exam associated with the Cisco Certified Specialist - Security Core certification and satisfies the core exam requirement for the CCNP Security and CCIE Security certifications.
This exam tests your knowledge of implementing and operating core security technologies, including:
Network security
Cloud security
Content security
Endpoint protection and detection
Secure network access
Visibility and enforcementCourse Objectives
Describe information security concepts and strategies within the network
Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
Describe network application-based attacks
Describe how various network security technologies work together to guard against attacks
Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
Deploy Cisco Secure Firewall Threat Defense basic configurations
Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
Deploy Cisco Secure Email Gateway basic configurations
Deploy Cisco Secure Email Gateway policy configurations
Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
Describe various attack techniques against the endpoints
Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
Describe Cisco Secure Endpoint architecture and basic features
Describe Cisco Secure Network Access solutions
Describe 802.1X and extensible authentication protocol (EAP) authentication
Configure devices for 802.1X operations
Introduce VPNs and describe cryptography solutions and algorithms
Describe Cisco secure site-to-site connectivity solutions
Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describe Cisco secure remote access connectivity solutions
Deploy Cisco secure remote access connectivity solutions
Provide an overview of network infrastructure protection controls
Examine various defenses on Cisco devices that protect the control plane
Configure and verify Cisco IOS software layer 2 data plane controls
Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
Examine various defenses on Cisco devices that protect the management plane
Describe the baseline forms of telemetry recommended for network infrastructure and security devices
Describe deploying Cisco Secure Network Analytics
Describe basics of cloud computing and common cloud attacks
Describe how to secure cloud environment
Describe the deployment of Cisco Secure Cloud Analytics
Describe basics of software-defined networks and network programmabilityCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Familiarity with Ethernet and TCP/IP networking
Working knowledge of the Windows operating system
Working knowledge of Cisco IOS networking and concepts
Familiarity with basics of networking security conceptsThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA)Course Outline
Network Security Technologies
Cisco Secure Firewall ASA Deployment
Cisco Secure Firewall Threat Defense Basics
Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
Cisco Secure Email Gateway Basics
Cisco Secure Email Policy Configuration
Cisco Secure Web Appliance Deployment
VPN Technologies and Cryptography Concepts
Cisco Secure Site-to-Site VPN Solutions
Cisco IOS VTI-Based Point-to-Point IPsec VPNs
Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Cisco Secure Remote-Access VPN Solutions
Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
Describing Information Security Concepts
Describe Common TCP/IP Attacks
Describe Common Network Application Attacks
Common Endpoint Attacks
Cisco Umbrella Deployment
Endpoint Security Technologies
Cisco Secure Endpoint
Cisco Secure Network Access Solutions
802.1X Authentication
802.1X Authentication Configuration
Network Infrastructure Protection
Control Plane Security Solutions
Layer 2 Data Plane Security Controls
Layer 3 Data Plane Security Controls
Management Plane Security Controls
Traffic Telemetry Methods
Cisco Secure Network Analytics Deployment
Cloud Computing and Cloud Security
Cloud Security
Cisco Secure Cloud Analytics Deployment
Software-Defined NetworkingLab Outline
Configure Network Settings and NAT on Cisco Secure Firewall ASA
Configure Cisco Secure Firewall ASA Access Control Policies
Configure Cisco Secure Firewall Threat Defense NAT
Configure Cisco Secure Firewall Threat Defense Access Control Policy
Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
Configure Cisco Secure Firewall Threat Defense Malware and File Policy
Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
Configure Cisco Secure Email Policies
Configure Proxy Services, Authentication, and HTTPS Decryption
Enforce Acceptable Use Control and Malware Protection
Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
Examine Cisco Umbrella Dashboard and DNS Security
Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
Explore Cisco Umbrella CASB Functionalities
Explore Cisco Secure Endpoint
Perform Endpoint Analysis Using Cisco Secure Endpoint Console
Explore File Ransomware Protection by Cisco Secure Endpoint Console
Explore Secure Network Analytics v7.4.2
Explore Global Threat Alerts Integration and ETA Cryptographic Audit
Explore Cloud Analytics Dashboard and Operations
Explore Secure Cloud Private and Public Cloud Monitoring - SVPN — Implementing Secure Solutions with Virtual Private Networks
- Длительность: 5 дней (40 часов)
- Код курса: SVPN
- Стоимость
- Очный формат: 1 462 500 ₸
- Онлайн формат: 1 446 500 ₸
Описание курса
Course Description
The Implementing Secure Solutions with Virtual Private Networks (SVPN) training teaches you how to implement, configure, monitor, and support enterprise virtual private network (VPN) solutions. Through a combination of lessons and hands-on experiences, you will acquire the knowledge and skills to deploy and troubleshoot traditional internet protocol security (IPsec), dynamic multipoint virtual private network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.
This training prepares you for the 300-730 SVPN v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfy the concentration exam requirement for the CCNP Security certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Acquire the knowledge and skills to enhance internet privacy, speed, and performance
Gain hands-on experience using the tools to ensure premium data security
Prepare for the 300-730 SVPN v1.1 exam
Earn 40 CE credits toward recertificationWho Should Enroll
Network Security Engineers
CCNP Security Candidates
Channel Partners
Cisco CustomersWhat to Expect in the Exam
Implementing Secure Solutions with Virtual Private Networks (300-730 SVPN v1.1) is a 90-minute exam associated with the Cisco Certified Specialist – Network Security VPN Implementation certification and satisfies the concentration exam requirement for the CCNP Security certification.
The exam tests your knowledge of implementing secure remote communications with VPN solutions, including:
Secure communications
Architectures
TroubleshootingCourse Objectives
Introduce site-to-site VPN options available on Cisco router and firewalls
Introduce remote access VPN options available on Cisco router and firewalls
Review site-to-site and remote access VPN design options
Review troubleshooting processes for various VPN options available on Cisco router and firewallsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Familiarity with the various Cisco router and firewall command modes
Experience navigating and managing Cisco routers and firewalls
Clear understanding of the benefits of site-to-site and remote access VPN options
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Security Core Technologies (SCOR)Course Outline
Introducing VPN Technology Fundamentals
Implementing Site-to-Site VPN Solutions
Implementing Cisco IOS Site-to-Site Flex VPN Solutions
Implement Cisco IOS GET VPN Solutions
Implementing Cisco AnyConnect VPNs
Implementing Clientless VPNsLab Outline
Explore IPsec Technologies
Implement and Verify Cisco IOS Point-to-Point VPN
Implement and Verify Cisco ASA Point-to-Point VPN
Implement and Verify Cisco IOS VTI VPN
Implement and Verify DMVPN
Troubleshoot DMVPN
Implement and Verify FlexVPN with Smart Defaults
Implement and Verify Point-to-Point FlexVPN
Implement and Verify Hub-and-Spoke FlexVPN
Implement and Verify Spoke-to-Spoke FlexVPN
Troubleshoot Cisco IOS FlexVPN
Implement and Verify AnyConnect TLS VPN on ASA
Implement and Verify Advanced AAA on Cisco AnyConnect VPN
Implement and Verify Clientless VPN on ASA - SECICC — Introducing Cisco Cloud Consumer Security
- Длительность: 1 день (8 часов)
- Код курса: SECICC
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 433 500 ₸
Описание курса
Длительность обучения:
Instructor-led training: 1 day in the classroom
Virtual instructor-led training: 1 day of web-based classes
E-learning: Equivalent of 1 day of instruction with hands-on lab practiceКому следует посетить:
This course benefits cloud consumers and administrators of public cloud, private cloud, and hybrid cloud infrastructures:
Security architects
Cloud architects
Network engineers and administrators
System engineers and adminstrators
Cloud security consumers
Cloud application administrators
IT managers
Line of business managers
Cisco integrators and partnersПредварительные требования:
This course has no prerequisites, but you’ll get the most from the course if you have the following knowledge and skills:
Basic computer literacy
Basic PC operating system navigation skills
Basic Internet usage skills
Basic IP address knowledge
We also recommend that you have the following skills:
Prior knowledge of cloud computing and virtualization software basicsПрограмма курса:
After taking this course, you should be able to:
Describe public, private, and hybrid cloud models, concepts, and design
Explain the concepts and components for securing cloud environments
Describe Cisco security offerings for Amazon Web Services (AWS)
Define methods to secure SaaS application usageДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
- SECCLD — Securing Cloud Deployments with Cisco Technologies
- Длительность: 4 дня (32 часа)
- Код курса: SECCLD
- Стоимость
- Очный формат: 1 318 500 ₸
- Онлайн формат: 1 302 000 ₸
Описание курса
Длительность обучения:
Instructor-led training: 4 days in the classroom with hands-on lab practice
Virtual instructor-led training: 4 days of web-based classes with hands-on lab practice
E-learning: Equivalent of 4 days of instruction with videos, practice, and challengesКому следует посетить:
This course is open to engineers, administrators, and security-minded users of public, private, and hybrid cloud infrastructures responsible for implementing security in cloud environments:
Security architects
Cloud architects
Security engineers
Cloud engineers
System engineers
Cisco integrators and partnersПредварительные требования:
To fully benefit from this course, you should have completed the following course or obtained the equivalent knowledge and skills:
Knowledge of cloud computing and virtualization software basics
Ability to perform basic UNIX-like OS commands
Cisco CCNP® security knowledge or understanding of the following topic areas:
Topic areas/Available in these courses
Cisco Adaptive Security Appliance (ASA) and Adaptive Security Virtual Appliance (ASAv) deployment, and Cisco IOS® Flexible NetFlow operations/Implementing Cisco Edge Network Security Solutions (SENSS)
Cisco NGFW (Cisco Firepower Threat Defense [FTD]), Cisco Firepower, and Cisco Firepower Management Center (FMC) deployment
Cisco Content Security operations including Cisco Web Security Appliance (WSA)/ Cisco Email Security Appliance (ESA)/Cisco Cloud Web Security (CWS)Cisco AMP for network and endpoints deployment/Implementing Cisco Threat Control Solutions (SITCS)
Cisco ISE operations and Cisco TrustSec architecture/Implementing Cisco Secure Access Solutions (SISAS)
VPN operation/Implementing Cisco Secure Mobility Solutions (SIMOS)Программа курса:
After taking this course, you should be able to:
Contrast the various cloud service and deployment models
Implement the Cisco Security Solution for SaaS using Cisco Cloudlock Micro Services
Deploy cloud security solutions using Cisco AMP for Endpoints, Cisco Umbrella, and Cisco Cloud Email Security
Define Cisco cloud security solutions for protection and visibility using Cisco virtual appliances and Cisco Stealthwatch Cloud
Describe the network as a sensor and enforcer using Cisco Identity Services Engine (ISE), Cisco Stealthwatch Enterprise, and Cisco TrustSec®
Implement Cisco Firepower NGFW Virtual (NGFWv) and Cisco Stealthwatch Cloud to provide protection and visibility in AWS environments
Explain how to protect the cloud management infrastructure by using specific examples, defined best practices, and AWS reporting capabilitiesДополнительно:
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are on recorded videos
- UCSEC — Implementing Cisco Unified Communications Security
- Длительность: 5 дней (40 часов)
- Код курса: UCSEC
- Стоимость
- Очный формат: 1 614 500 ₸
- Онлайн формат: 1 561 500 ₸
Описание курса
Кому следует посетить:
Курс предназначен для тех, кто работает на стыке телефонии и информационной безопасности, а также всем инженерам, работающим с архитектурой и продуктами UC. Данный курс следует посетить сетевым администраторам, сетевым инженерам, а также системным инженерам.
Предварительные требования:
Перед посещением данного курса слушатели должны обладать следующими навыками:
Практические знания конвергентных голосовых сетей и СХД
Знакомство с Cisco IOS gateway, Cisco Unified SRST gateway и Cisco Unified Border Element
Знание продуктов Cisco Unified Communications Manager и Cisco Unified Communications Manager Express
Рекомендовано наличие сертификата CCNP® VoiceДополнительные навыки, которые будут полезны:
Знание основ сетевой безопасности
Знание технологий Cisco IOS Firewall и Cisco ASA adaptive security appliance firewalls
Знакомство с IPsec и SSL VPNs
Рекомендовано наличие сертификата CCNA® SecurityЦели курса:
После посещения тренинга слушатели смогут:
Определять уязвимые места в сетях Cisco Unified Communications, а также описывать стратегии безопасности, криптографические сервисы , PKI и технологии VPN
Использовать функционал системы безопасности сетевой инфраструктуры
Внедрять Cisco Unified Communications Manager и Cisco Unified Communications endpoint security featuresСодержание курса:
5-дневный курс UCSEC посвящен описанию уязвимостей и атак на инфраструктуру IP-телефонии, а также методов борьбы с ними и методов обеспечения безопасности инфраструктуры. За время курса слушатели научатся определять уязвимые места в сетях Cisco Unified Communications, а также описывать стратегии безопасности, криптографические сервисы PKI и технологии VPN, использовать функционал системы безопасности сетевой инфраструктуры и внедрять функции безопасности в Cisco Unified Communications Manager и терминалах Cisco.
Программа курса
1. Введение
2. Уязвимости сети Cisco Unified Communications и основы безопасности
2.1. Оценка уязвимостей сети Cisco Unified Communications
2.2. Стратегии реализации безопасности
2.3. Криптографические службы и функции
2.4. Управления ключами и PKI
2.5. IPsec и Cisco AnyConnect SSL VPN
2.6. Лабораторная работа 1: Идентификация уязвимых мест в Cisco UC сетях3. Функционал системы безопасности сетевой инфраструктуры
3.1. Разделение сети и фильтрация пакетов
3.2. Функции безопасности коммутаторов
3.3. Cisco AnyConnect SSL VPN в сетях Cisco Unified Communications
3.4. Лабораторная работа 2: Внедрение межсетевых экранов
3.5. Лабораторная работа 3: Внедрение 802.1X
3.6. Лабораторная работа 4: Внедрение Cisco AnyConnect SSL VPN-ов4. Cisco Unified Communications Manager и функции защиты абонентских устройств
4.1. Повышение защиты абонентских устройств
4.2. Предотвращение мошеннических звонков
4.3. Встроенные функции безопасности Cisco Unified Communications Manager
4.4. Функции безопасности Cisco Unified Communications Manager, основанные на маркерах безопасности
4.5. Лабораторная работа 5: Внедрение механизмов безопасности Cisco Unified Communications Manager, основанных на безопасных токенах5. Интеграция Cisco Unified Communications с внешними элементами защиты
5.1. Применение SRTP для шлюзов и защита сигнала средствами IPSec
5.2. Применение SRTP для шлюзов и защита сигнала в SRST and Cisco Unified Communications Manager Express
5.3. Trusted Relay Points
5.4. Прокси
5.5. Лабораторная работа 6: Внедрение SRTP на шлюзах и защита сигнализации с помощью IPsec
5.6. Лабораторная работа 7: Внедрение безопасного SRST и безопасного Cisco Unified Communications Manager Express
5.7. Лабораторная работа 8: Внедрение Trusted Relay Points
5.8. Лабораторная работа 9: Внедрение прокси для сигнализации и RTP потоков - 802.1x — Introduction to 802.1X Operations for Cisco Security Professionals
- Длительность: 3 дня (24 часа)
- Код курса: 802.1X
- Стоимость
- Очный формат: 752 000 ₸
- Онлайн формат: 657 000 ₸
Описание курса
Course Description
The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.
How You'll Benefit
This class will help you:
Learn about and practice configuring Cisco Identity-Based Networking Services solutions at your own pace
Build your skills using Cisco Identity-Based Networking Services (IBNS) to secure network connectivity and resources.Who Should Enroll
Security architects
Design engineers
Network engineers
Cisco integrators and partnersCourse Objectives
After taking this course, you should be able to:
Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks.
Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications.
Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation.
Describe how to configure access for non-supplicant devices in an 802.1X deployment.
Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X.Course Prerequisites
To fully benefit from this course, you should have knowledge of these topics:
Cisco wireless LAN controllers
Basic command-line configuration of Cisco Catalyst switches
Microsoft Windows Server Active Directory
Here are some recommended Cisco learning offerings that can help you meet these prerequisites:Cisco CCNA® Security Certification training
Cisco CCNA Routing and Switching Certification training
Cisco CCNA Wireless Certification trainingCourse Outline
Describing Cisco Identity-Based Networking Services
Cisco IBNS Overview
Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS
Compare Cisco IBNS and Cisco ISE Solutions
Explore Cisco IBNS Architecture Components
Explore Cisco TrustSecDescribing 802.1X EAP Authentication
Explore the IEEE 802.1X Standard
Explore 802.1X and EAP
Explain EAP Methods
Describe the Role of RADIUS in EAP CommunicationsConfiguring Devices for 802.1X Operation
Identify 802.1X Components and Topologies
Configure Cisco Catalyst Switch for 802.1X
Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch
Configure Cisco WLC for 802.1X
Configure Cisco ISE for 802.1X
Configure Supplicants for 802.1X OperationConfiguring Access for Non-Supplicant Devices
Configure Cisco IBNS for Non-Supplicant Devices
Explore IBNS 2.0 for Non-Supplicant Devices
Configure Cisco Central Web Authentication for GuestsDesigning Cisco IBNS Networks with Cisco ISE and 802.1X
Cisco ISE Architectural Components
Introducing the Cisco ISE Bring Your Own Device (BYOD) Process
Identify Cisco ISE Deployment Options
Identify Component Compatibilities with 802.1X
Review 802.1X Design ConsiderationsLab Outline
Configure and Test 802.1X Operations
- SSFIPS — Securing Networks with Cisco Firepower Next-Generation IPS
- Длительность: 5 дней (40 часов)
- Код курса: SSFIPS
- Стоимость
- Очный формат: 1 564 500 ₸
- Онлайн формат: 1 547 500 ₸
Описание курса
Кому следует посетить:
Этот курс предназначен для технических специалистов, которым необходимо знать, как развертывать Cisco Firepower NGIPS и управлять им в своей сетевой среде.
Администраторы безопасности
Консультанты по безопасности
Сетевые администраторы
Системные инженеры
Персонал технической поддержки
Торговые партнеры и реселлерыПредварительные требования:
Для прохождения данного курса рекомендуется обладать знаниями и навыками:
Базовое понимание работы TCP/IP сетей
Базовые знания о работе систем IDS и IPSЦели курса:
После прохождения данного курса слушатели будут уметь:
Описывать компоненты Cisco Firepower Threat Defense, управлять процессом регистрации устройства
Настраивать политику обнаружения устройств
Внедрять политик контроля доступа
Настраивать intrusion-политики
Создавать и анализировать отчеты Firepower Management Center
Интегрировать Firepower Management Center с внешними системами логирования
Обновлять ПО и управлять административными аккаунтами Firepower Management Center
Использовать базовые команды и инструменты для поиска и устранения неполадок в работе Firepower Management Center и устройств Firepower Threat DefenseПрограмма курса:
Введение
Обзор Cisco Firepower Threat Defense
Сравнение и анализ систем предотвращения вторжений и межсетевых экранов
Основные функции и компоненты системы Firepower Threat Defense
Сравнение модельного ряда
Принципы лицензирования
Процесс внедрения FirepowerНастройки устройства Firepower NGFW
FXOS и Firepower Device Manager
Управление устройствами
Исследование политик Firepower Management Center
Системные настройки, показатели здоровья устройстваКонтроль трафика
Packet Processing
BypassingМеханизм анализа сети Firepower Discovery
Обзор механизма анализа сети
Анализ профиля хоста
Работа с идентификационной информацией пользователяПолитика контроля доступа к ресурсам
Введение, анализ работы политики
Анализ списка правил, действие по умолчанию
Further Inspection
Расширенные функции
Рекомендации для внедрения политики контроля доступаМеханизм Security Intelligence
Обзор механизма Security Intelligence
Объекты Security Intelligence
Настройка Security Intelligence, анализ логовКонтроль файлов и расширенная защита от вредоносного ПО
Анализ файловой политики
Анализ сервиса AMPСистема предотвращения вторжений
Введение, Snort-правила
Variables, Variable Set
Создание IPS-политики
Настройка IPS-политики
Управление IPS-политикойПолитика анализа сети
Исследование работы препроцессора
Обзор политики анализа сетиДополнительные техники анализа
Анализ событий
Типа событий
Контекстная информация
Инструменты для анализаИнтеграция с другими платформами
Интеграция с Cisco ISE
Интеграция со SplunkПолитики корреляции и оповещения
Оповещение внешних систем
Политика корреляцииСистемное администрирование
Обновления ПО
Управление пользовательскими аккаунтамиПоиск и устранение неполадок в работе системы Firepower
Распространенные ошибки в настройках
Команды для поиска и устранения неполадок
Packet Capture - FTD — Cisco Secure Firewall 7.2 Implementation
- Длительность: 5 дней (40 часов)
- Код курса: FTD
- Стоимость
- Очный формат: 1 593 500 ₸
- Онлайн формат: 1 567 000 ₸
Описание курса
Этот курс поможет Вам:
Получить знания и навыки, которые необходимы для настройки и эксплуатации передовой сетевой системы защиты информации Cisco.
В процессе прохождения данного курса Вы научитесь:
Понимать архитектуру, разбираться в управляющих и исполнительных компонентах системы, понимать взаимодействия между компонентами системы;
Понимать принципы лицензирования;
Понимать возможные варианты разворачивания компонентов системы;
Понимать назначение, редактировать и создавать политики Management;
Понимать возможные пути прохождения трафика через систему;
Использовать механизм Discovery для анализа сети и создания профилей хостов;
Использовать механизм Security Intelligence;
Понимать принципы работы, редактировать и создавать политики контроля доступа к ресурсам, политики контроля файлов и сервиса AMP, политики системы предотвращения вторжений, политики анализа сети;
Работать с инструментами для анализа событий;
Искать и устранять неполадки в работе системы.Предварительные требования:
Данный курс предполагает наличие у слушателей базового знания сетевых технологий, терминологии в области ИБ, умения работать с Windows Workstation, понимания TCP/IP.
Course Outline
1. Cisco Secure Firewall Family
2. Cisco Firepower Threat Defense Components and Features
3. Firepower Threat Defense High Availability and Clustering
4. Routing for Firepower Threat Defense
5. Network Address Translation (NAT)
6. Firepower Discovery
7. Prefiltering and Prefilter Policies
8. Security Intelligence
9. SSL Policy
10. Access Control Policy
11. File Control and Advanced Malware Protection
12. Next-Generation Intrusion Prevention Systems
13. Network Analysis Policies
14. Correlation Policy
15. Firepower QoS
16. Firepower Threat Defense VPN
17. Cisco Threat Intelligence Director
18. Event Analysis Techniques
19. Cisco Secure Firewall TroubleshootingLab Outline
1. Navigating Firepower Management Center
2. FTD Device Configuration
3. NAT Configuration
4. Network Discovery Policy
5. Object Management
6. Access Control Policy
7. Security Intelligence
8. File Policy
9. Intrusion Policy
10. Network Analysis Policy
11. SSL Policy Configuration
12. QoS Policy Configuration
13. Correlation Policy - SDAFND — Understanding Cisco SDA Fundamentals
- Длительность: 3 дня (24 часа)
- Код курса: SDAFND
- Стоимость
- Очный формат: 1 011 000 ₸
- Онлайн формат: 917 000 ₸
Описание курса
Course Overview
The Understanding Cisco SDA Fundamentals (SDAFND) v1.0 course introduces you to Cisco® Software-Defined Access and teaches you, through a combination of lectures and labs, how to implement simple, single-site fabric networks. You will learn the benefits of leveraging Software-Defined Access in the Cisco-powered Enterprise Campus network. SDAFND will introduce the solution, its architecture and components, and guide you through labs to design and deploy simple Cisco SD-Access networks.
This course will help you:
Deploy Cisco SD-Access networks
Explain Cisco Software-Designed Access
Operate, manage, and integrate Cisco DNA Center™
Prepare for various Cisco certifications: Cisco Certified Specialist – Enterprise Core (ENCOR), and Cisco Certified Specialist – Enterprise Design (ENSLD)Who should attend
Field engineers
Network engineers
Network administrators
System engineersPrerequisites
To fully benefit from this course, you should have the following knowledge and skills:
CCNP® level core networking knowledge
Ability to use Windows and Linux CLI tools such as ping, SSH, or running scripts
These are the recommended Cisco offerings that may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Objectives
After taking this course, you should be able to:
Describe Cisco SD-Access architecture and its components
Explain Cisco DNA Center deployment models, scaling, and high availability
Identify Cisco SD-Access fabric protocols and node roles
Understand the Cisco SD-Access Wireless deployment models
Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP
Deploy simple Cisco SD-Access fabric networks
Monitor health and performance of the network with Cisco DNA Center Assurance
Interact with the Cisco DNA Center Platform Intent APIsCourse Outline:
Understanding Cisco SDA Fundamentals (SDAFND)
Introducing Cisco SD-Access
Introducing Cisco DNA Center
Exploring Cisco SD-Access Solution Components
Exploring Cisco SD-Access Wireless Architecture
Automating Network Changes with Cisco DNA Center
Deploying Fabric Networks with Cisco DNA Center
Exploring Cisco DNA Center Assurance
Exploring Cisco DNA Center ProgrammabilityLab Topology
Explore Cisco DNA Center User Interface
Verify Location Identifier Separation Protocol (LISP) Operation in Cisco SD-Access
Integrate Cisco DNA Center and Cisco Identity Services Engine (Cisco ISE)
Provision Access Points in Cisco DNA Center
Provision Underlay Networks with Cisco DNA Center LAN Automation
Provision Underlay Networks with Cisco DNA Center LAN Automation (cont.)
Deploy Cisco SD-Access Single Site Fabric
Deploy Cisco SD-Access Single Site Fabric (cont.)
Explore Cisco DNA Center Assurance
Cisco DNA Assurance Issues and Guided Remediation
Interact with Cisco DNA Center Intent APIs Using Python - SSFRULES — Securing Cisco Networks with Snort Rule Writing Best Practices
- Длительность: 3 дня (24 часа)
- Код курса: SSFRULES
- Стоимость
- Очный формат: 750 500 ₸
- Онлайн формат: 655 500 ₸
Описание курса
Course Overview
The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 course shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this course provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, how to integrate OpenAppID into rules, rules filtering, rules tuning, and more. The hands-on labs give you practice in creating and testing Snort rules.
This course will help you:
Gain an understanding of characteristics of a typical Snort rule development environment
Gain hands-on practices on creating rules for Snort
Gain knowledge in Snort rule development, Snort rule language, standard and advanced rule optionsWho should attend
This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes:
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel using open source IDS and IPS
Channel partners and resellersPrerequisites
To fully benefit from this course, you should have:
Basic understanding of networking and network protocols
Basic knowledge of Linux command-line utilities
Basic knowledge of text editing utilities commonly found in Linux
Basic knowledge of network security concepts
Basic knowledge of a Snort-based IDS/IPS systemCourse Objectives
After taking this course, you should be able to:
Describe the Snort rule development process
Describe the Snort basic rule syntax and usage
Describe how traffic is processed by Snort
Describe several advanced rule options used by Snort
Describe OpenAppID features and functionality
Describe how to monitor the performance of Snort and how to tune rulesCourse Outline:
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
Introduction to Snort Rule Development
Snort Rule Syntax and Usage
Traffic Flow Through Snort Rules
Advanced Rule Options
OpenAppID Detection
Tuning SnortLab Topology
Connecting to the Lab Environment
Introducing Snort Rule Development
Basic Rule Syntax and Usage
Advanced Rule Options
OpenAppID
Tuning Snort - SSFSNORT — Securing Cisco Networks with Open Source Snort
- Длительность: 4 дня (32 часа)
- Код курса: SSFSNORT
- Стоимость
- Очный формат: 1 206 000 ₸
- Онлайн формат: 1 116 000 ₸
Описание курса
Course Overview
The Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more.
How You'll Benefit
This training will help you:
Learn how to implement Snort, an open-source, rule-based, intrusion detection and prevention system
Gain leading-edge skills for high-demand responsibilities focused on security
Earn 32 CE credits towards recertificationWho should attend
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel
Channel partners and resellersCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Technical understanding of transmission control protocol/internet protocol (TCP/IP) networking and network architecture
Proficiency with Linux and UNIX text editing tools, such as vi editorThese skills can be found in the following Cisco Learning Offering:
Implementing and Administering Cisco Solutions (CCNA)Course Objectives
Describe Snort technology and identify resources available for maintaining a Snort deployment
Install Snort on a Linux-based operating system
Describe the Snort operation modes and their command-line options
Describe the Snort intrusion detection output options
Download and deploy a new rule set to Snort
Describe and configure the snort.conf file
Configure Snort for inline operation and configure the inline-only features
Describe the Snort basic rule syntax and usage
Describe how traffic is processed by the Snort engine
Describe several advanced rule options used by Snort
Describe OpenAppID features and functionality
Describe how to monitor Snort performance and how to tune rules
Course BenefitsCourse Outline
Snort Installation
Snort Operation
Snort Intrusion Detection Output
Rule Management
Snort Configuration
Inline Operation and Configuration
Snort Rule Syntax and Usage
Traffic Flow Through Snort Rules
Advanced Rule Options
OpenAppID Detection
Tuning SnortLab Outline
Connecting to the Lab Environment
Snort Installation
Snort Operation
Snort Intrusion Detection Output
Pulled Pork Installation
Configuring Variables
Reviewing Preprocessor Configurations
Inline Operations
Basic Rule Syntax and Usage
Advanced Rule Options
OpenAppID
Tuning Snort - SSNGFW — Securing Networks with Cisco Firepower Next Generation Firewall
- Длительность: 5 дней (40 часов)
- Код курса: SSNGFW
- Стоимость
- Очный формат: 1 564 500 ₸
- Онлайн формат: 1 547 500 ₸
Описание курса
Course Overview
The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 course shows you how to deploy and use Cisco Firepower® Threat Defense system. This hands-on course gives you knowledge and skills to use and configure Cisco® Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and SSL decryption before moving on to detailed analysis, system administration, and troubleshooting.
Course Prerequisites
Attendees should meet the following prerequisites:
Knowledge of TCP/IP and basic routing protocols — ICND1 or CCNA Recommended
Familiarity with firewall, vpn and IPS concepts — IINS or SFNDU RecommendedRecommended prerequisites:
CCNA — Implementing and Administering Cisco Solutions
SCOR — Implementing and Operating Cisco Security Core TechnologiesTarget Audience:
This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS and NGFW in their network environments.
Course Objectives:
After completing this course, you should be able to:
Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system and identify deployment scenarios
Perform initial Firepower Threat Defense device configuration and setup tasks
Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense
Describe how to implement NAT by using Cisco Firepower Threat Defense
Perform an initial network discovery, using Cisco Firepower to identify hosts, applications and services
Describe the behavior, usage and implementation procedure for access control policies
Describe the concepts and procedures for implementing security Intelligence features
Describe Cisco AMP for Networks and the procedures for implementing file control and Advanced Malware Protection
Implement and manage intrusion policies
Describe the components and configuration of site-to-site VPN
Describe and configure a remote-access SSL VPN that uses Cisco AnyConnect
Describe SSL decryption capabilities and usageCourse Content:
Cisco Firepower Threat Defense Overview:
Examining Firewall and IPS Technology
Firepower Threat Defense Features and Components
Examining Firepower Platforms
Examining Firepower Threat Defense Licensing
Cisco Firepower Implementation Use CasesCisco Firepower NGFW Device Configuration
Firepower Threat Defense Device Registration
FXOS and Firepower Device Manager
Initial Device Setup
Managing NGFW Devices
Examining Firepower Management Center Policies
Examining Objects
Examining System Configuration and Health Monitoring
Device Management
Examining Firepower High Availability
Configuring High Availability
Cisco ASA to Firepower Migration
Migrating from Cisco ASA to Firepower Threat DefenseCisco Firepower NGFW Traffic Control
Firepower Threat Defense Packet Processing
Implementing QoS
Bypassing TrafficCisco Firepower NGFW Address Translation
NAT Basics
Implementing NAT
NAT Rule Examples
Implementing NATCisco Firepower Discovery
Examining Network Discovery
Configuring Network DiscoveryImplementing Access Control Policies
Examining Access Control Policies
Examining Access Control Policy Rules and Default Action
Implementing Further Inspection
Examining Connection Events
Access Control Policy Advanced Settings
Access Control Policy Considerations
Implementing an Access Control PolicySecurity Intelligence
Examining Security Intelligence
Examining Security Intelligence Objects
Security Intelligence Deployment and Logging
Implementing Security IntelligenceFile Control and Advanced Malware Protection
Examining Malware and File Policy
Examining Advanced Malware ProtectionNext-Generation Intrusion Prevention Systems
Examining Intrusion Prevention and Snort Rules
Examining Variables and Variable Sets
Examining Intrusion PoliciesSite-to-Site VPN
Examining IPsec
Site-to-Site VPN Configuration
Site-to-Site VPN Troubleshooting
Implementing Site-to-Site VPNRemote-Access VPN
Examining Remote-Access VPN
Examining Public-Key Cryptography and Certificates
Examining Certificate Enrollment
Remote-Access VPN Configuration
Implementing Remote-Access VPNSSL Decryption
Examining SSL Decryption
Configuring SSL Policies
SSL Decryption Best Practices and MonitoringDetailed Analysis Techniques
Examining Event Analysis
Examining Event Types
Examining Contextual Data
Examining Analysis Tools
Threat AnalysisSystem Administration
Managing Updates
Examining User Account Management Features
Configuring User Accounts
System AdministrationCisco Firepower Troubleshooting
Examining Common Misconfigurations
Examining Troubleshooting Commands
Firepower TroubleshootingLabs
Lab 1: Initial Device Setup
Lab 2: Device Management
Lab 3: Configuring High Availability
Lab 4: Migrating from Cisco ASA to Firepower Threat Defense
Lab 5: Implementing QoS
Lab 6: Implementing NAT
Lab 7: Configuring Network Discovery
Lab 8: Implementing an Access Control Policy
Lab 9: Implementing Security Intelligence
Lab 10: Implementing Site-to-Site VPN
Lab 11: Implementing Remote Access VPN
Lab 12: Threat Analysis
Lab 13: System Administration
Lab 14: Firepower Troubleshooting - SFWIPA — Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention
- Длительность: 5 дней (40 часов)
- Код курса: SFWIPA
- Стоимость
- Очный формат: 1 484 500 ₸
- Онлайн формат: 1 464 500 ₸
Описание курса
Course Description
The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPA) training shows you how to deploy Cisco Secure Firewall Threat Defense system and its features as a data center network firewall or as an Internet Edge firewall with Virtual Private Network (VPN) support. You will learn how to configure identity-based policies, Secure Sockets Layer (SSL) decryption, remote-access VPN, and site-to-site VPN before moving on to advanced Intrusion Prevention System (IPS) configuration and event management, integrations with other systems, and advanced troubleshooting. You will also learn how to automate configuration and operations of Cisco Secure Firewall Threat Defense system using programmability and Application Programming Interfaces (APIs) and how to migrate configuration from Cisco Secure Firewall Adaptive Security Appliances (ASA).
This training prepares you for the Securing Networks with Cisco Firepower (300-710 SNCF) v1.1 exam. If passed, you earn the Cisco Certified Specialist – Network Security Firepower certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Attain advanced knowledge of Cisco Secure Firewall Threat Defense technology
Gain competency and skills required to implement and manage a Cisco Secure Firewall Threat Defense system regardless of platform
Learn detailed information on policy management, traffic flow through the system, and the system architecture
Deploy and manage many of the advanced features available in the Cisco Secure Firewall Threat Defense system
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level security roles
Prepare for the 300-710 SNCF v1.1 exam
Earn 40 CE credits toward recertificationWho Should Enroll
System Installers
System Integrators
System Administrators
Network Administrators
Solutions DesignersWhat to Expect in the Exam
300-710 SNCF: Securing Networks with Cisco Firepower is a 90-minute exam associated with the Cisco Certified Specialist – Network Security Firepower certification and satisfies the concentration exam requirement for the CCNP Security certification.
The multiple-choice format tests your knowledge of Cisco Firepower Threat Defense and Firepower 7000 and 8000 Series virtual appliances, including:
Policy configurations
Integrations
Deployments
Management and troubleshootingCourse Objectives
Describe Cisco Secure Firewall Threat Defense
Describe advanced deployment options on Cisco Secure Firewall Threat Defense
Describe advanced device settings for Cisco Secure Firewall Threat Defense device
Configure dynamic routing on Cisco Secure Firewall Threat Defense
Configure advanced network address translation on Cisco Secure Firewall Threat Defense
Configure SSL decryption policy on Cisco Secure Firewall Threat Defense
Deploy Remote Access VPN on Cisco Secure Firewall Threat Defense
Deploy identity-based policies on Cisco Secure Firewall Threat Defense
Deploy site-to-site IPsec-based VPN on Cisco Secure Firewall Threat Defense
Deploy advanced access control settings on Cisco Secure Firewall Threat Defense
Describe advanced event management on Cisco Secure Firewall Threat Defense
Describe available integrations with Cisco Secure Firewall Threat Defense
Troubleshoot traffic flow using advanced options on Cisco Secure Firewall Threat Defense
Describe benefits of automating configuration and operations of Cisco Secure Firewall Threat Defense
Describe configuration migration to Cisco Secure Firewall Threat DefenseCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Knowledge of Transmission Control Protocol/Internet Protocol (TCP/IP)
Basic knowledge of routing protocols
Familiarity with the content explained in the Securing Internet Edge with Cisco Secure Firewall Threat Defense trainingThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)Course Outline
Introducing Cisco Secure Firewall Threat Defense
Describing Advanced Deployment Options on Cisco Secure Firewall Threat Defense
Configuring Advanced Device Settings on Cisco Secure Firewall Threat Defense
Configuring Dynamic Routing on Cisco Secure Firewall Threat Defense
Configuring Advanced NAT on Cisco Secure Firewall Threat Defense
Configuring SSL Policy on Cisco Secure Firewall Threat Defense
Deploying Remote Access VPN on Cisco Secure Firewall Threat Defense
Deploying Identity-Based Policies on Cisco Secure Firewall Threat Defense
Deploying Site-to-Site VPN on Cisco Secure Firewall Threat Defense
Configuring Snort Rules and Network Analysis Policies
Describing Advanced Event Management Cisco Secure Firewall Threat Defense
Describing Integrations on Cisco Secure Firewall Threat Defense
Troubleshooting Advanced Traffic Flow on Cisco Secure Firewall Threat Defense
Automating Cisco Secure Firewall Threat Defense
Migrating to Cisco Secure Firewall Threat DefenseLab Outline
Deploy Advanced Connection Settings
Configure Dynamic Routing
Configure SSL Policy
Configure Remote Access VPN
Configure Site-to-Site VPN
Customize IPS and NAP Policies
Configure Cisco Secure Firewall Threat Defense Integrations
Troubleshoot Cisco Secure Firewall Threat Defense
Migrate Configuration from Cisco Secure Firewall ASA - SFWIPF — Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
- Длительность: 5 дней (40 часов)
- Код курса: SFWIPF
- Стоимость
- Очный формат: 871 000 ₸
- Онлайн формат: 851 000 ₸
Описание курса
Course Description
The Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next generation firewall at the internet edge. You’ll gain an understanding of Cisco Secure Firewall architecture and deployment, base configuration, packet processing and advanced options, and conducting Secure Firewall administration troubleshooting.
This training prepares you for the CCNP Security certification, which requires passing the 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) core exam and one concentration exam such as the 300-710 Securing Networks with Cisco Firepower (SNCF) concentration exam. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will teach you how to implement, configure, and manage Cisco Secure Firewall Threat Defense for deployment, including:
Configure settings and policies on Cisco Secure Firewall Threat Defense
Gain an understanding of Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Perform basic threat analysis and administration tasks using Cisco Secure Firewall Management CenterWho Should Enroll
Network security engineers
AdministratorsWhat to Expect in the Exam
350-701 SCOR: Implementing and Operating Cisco Security Core Technologies is a 120-minute exam associated with the CCNP Security certification. The multiple-choice format tests knowledge and skills related to implementing and operating core security technologies, including:
Network security
Cloud security
Content security
Endpoint protection and detection
Secure network access
Visibility and enforcement300-710 SNCF: Securing Networks with Cisco Firepower is a 90-minute exam associated with the CCNP Security certification. The multiple-choice format tests knowledge of Cisco Firepower® Threat Defense and Firepower® 7000 and 8000 Series virtual appliances, including:
Policy configurations
Integrations
Deployments
Management and troubleshootingCourse Objectives
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco Secure Firewall Threat Defense
Configure basic Network Address Translation on Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense ManagerCourse Prerequisites
Before taking this offering, you should understand:
TCP/IP
Basic routing protocols
Firewall, VPN, and IPS conceptsCourse Outline
Introducing Cisco Secure Firewall Threat Defense
Describing Cisco Secure Firewall Threat Defense Deployment Options
Describing Cisco Secure Firewall Threat Defense Management Options
Configuring Basic Network Settings on Cisco Secure Firewall Threat Defense
Configuring High Availability on Cisco Secure Firewall Threat Defense
Configuring Auto NAT on Cisco Secure Firewall Threat Defense
Describing Packet Processing and Policies on Cisco Secure Firewall Threat Defense
Configuring Discovery Policy on Cisco Secure Firewall Threat Defense
Configuring Prefilter Policy on Cisco Secure Firewall Threat Defense
Configuring Access Control Policy on Cisco Secure Firewall Threat Defense
Configuring Security Intelligence on Cisco Secure Firewall Threat Defense
Configuring File Policy on Cisco Secure Firewall Threat Defense
Configuring Intrusion Policy on Cisco Secure Firewall Threat Defense
Performing Basic Threat Analysis on Cisco Secure Firewall Management Center
Managing Cisco Secure Firewall Threat Defense System
Troubleshooting Basic Traffic Flow
Cisco Secure Firewall Threat Defense Device ManagerLab Outline
Perform Initial Device Setup
Configure High Availability
Configure Network Address Translation
Configure Network Discovery
Configure Prefilter and Access Control Policy
Configure Security Intelligence
Implement File Control and Advanced Malware Protection
Configure Cisco Secure IPS
Detailed Analysis Using the Firewall Management Center
Manage Cisco Secure Firewall Threat Defense System
Secure Firewall Troubleshooting Fundamentals
Configure Managed Devices Using Cisco Secure Firewall Device Manager - C2C — Cisco DoD Comply-to-Connect
- Длительность: 5 дней (40 часов)
- Код курса: C2C
- Стоимость
- Очный формат: 1 247 500 ₸
- Онлайн формат: 1 163 000 ₸
Описание курса
Course Description
The Cisco DoD Comply-to-Connect (C2C) training teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.
How You'll Benefit
This training will help you:
Learn how to operate, manage, configure, and troubleshoot the Cisco C2C solution
Gain an understanding of how the Cisco ISE security components relate to the C2C architecture
Earn 32 CE credits towards recertificationWho Should Enroll
This training is a Department of Defense mandate, ensuring compliance with cybersecurity protocols and procedures. The target audience includes individuals seeking the knowledge and skills involved in deploying, operating, and verifying Cisco DoD C2C network architecture, such as:
Network Security Engineers
Network Administrators
Security AdministratorsCourse Objectives
Define DoD C2C, including its steps and alignment with ISE features/functions and Zero Trust
Describe Cisco Identity-Based Networking Services
Explain 802.1X extensible authentication protocol (EAP)
Configure devices for 802.1X operation
Configure access for non-supplicant devices
Describe the Cisco Identity Services Engine
Explain Cisco ISE deployment
Describe Cisco ISE policy enforcement concepts
Describe Cisco ISE policy configuration
Explain PKI fundamentals, technology, components, roles, and software supplicants
Troubleshoot Cisco ISE policy and third-party network access device (NAD) support
Describe Cisco ISE TrustSec configurations
Describe the Cisco ISE profiler service
Describe profiling best practices and reporting
Configure endpoint compliance
Configure client posture services
Configure Cisco ISE device administration
Describe the four main use cases within C2CCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Familiarity with 802.1X
Familiarity with Microsoft Windows Operating Systems
Familiarity with Cisco IOS CLI for wired and wireless network devices
Familiarity with Cisco Identity Service Engine
The following recommended Cisco offering may help you meet these prerequisites:
Implementing and Operating Cisco Security Core Technologies (SCOR)Course Outline
C2C Fundamentals
Cisco Identity-Based Networking Services
802.1X EAP Authentication
Configure Devices for 802.1X Operation
Configure Access for Non-Supplicant Devices
Introducing Cisco ISE Architecture
Introducing Cisco ISE Deployment
Introducing Cisco ISE Policy Enforcement Components
Introducing Cisco ISE Policy Configuration
PKI and Advanced Supplicants
Troubleshooting Cisco ISE Policy and Third-Party NAD Support
Exploring Cisco TrustSec
Introducing the Cisco ISE Profiler
Introducing Profiling Best Practices and Reporting
Introducing Cisco ISE Endpoint Compliance Services
Configuring Client Posture Services and Compliance
Working with Network Access Devices
C2C Use CasesLab Outline
Configure and Test 802.1X Operations
Configure Initial Cisco ISE Configuration and System Certificate Usage
Integrate Cisco ISE with Active Directory
Configure Cisco ISE Policy for MAB
Configure Cisco ISE Policy for 802.1X
TEAP on Windows
Configure Cisco TrustSec
Configure Profiling
Customize the Cisco ISE Profiling Configuration
Create Cisco ISE Profiling Reports
Configure Cisco ISE Compliance Services
Configure Client Provisioning
Configure Posture Policies
Test and Monitor Compliance-Based Access
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization
DISA Reports
Certificate-Based Authentication for Cisco ISE Administration
Configure Cisco TrustSec
Configure Cisco ISE for Basic Device Administration
Configure Cisco ISE Command Authorization - CLCOR — Implementing Cisco Collaboration Core Technologies
- Длительность: 5 дней (40 часов)
- Код курса: CLCOR
- Стоимость
- Очный формат: 1 445 500 ₸
- Онлайн формат: 1 436 500 ₸
Описание курса
Course Description
The Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) training provides you with the knowledge and skills to deploy, configure and troubleshoot core collaboration and networking technologies. Topics include infrastructure design protocols, codecs, and endpoints, Cisco Internetwork Operating System (IOS®) XE gateway and media resources, call control, and Quality of Service (QoS). This training also earns you 64 Continuing Education (CE) credits towards recertification.
This training helps prepare you to take the exam:
350-801 Implementing Cisco Collaboration Core Technologies (CLCOR)How You'll Benefit
This course will help you:
Integrate and troubleshoot Cisco Unified Communications Manager with Lightweight Directory Access Protocol (LDAP) for user synchronization and user authentication
Implement Cisco Unified Communications Manager provisioning features
Configure and troubleshoot collaboration endpoints
Earn 64 credits toward recertificationWho Should Enroll
Students preparing to take the CCNP Collaboration certification
Network administrators
Network engineers
Systems engineersCourse Objectives
Describe the Cisco Collaboration solutions architecture
Compare the IP Phone signaling protocols of Session Initiation Protocol (SIP), H323, Media Gateway Control Protocol (MGCP), and Skinny Client Control Protocol (SCCP)
Integrate and troubleshoot Cisco Unified Communications Manager with LDAP for user synchronization and user authentication
Implement Cisco Unified Communications Manager provisioning features
Describe the different codecs and how they are used to transform analog voice into digital streams
Describe a dial plan and explain call routing in Cisco Unified Communications Manager
Describe cloud calling using the on-premises local gateway option through Webex by Cisco
Configure calling privileges in Cisco Unified Communications Manager
Implement toll fraud prevention
Implement globalized call routing within a Cisco Unified Communications Manager cluster
Implement and troubleshoot media resources in Cisco Unified Communications Manager
Implement and troubleshoot Webex Calling dial plan features in a hybrid environment
Deploy the Webex app in a Cisco Unified Communications Manager environment and migrate from Cisco Jabber to Webex app
Configure and troubleshoot Cisco Unity Connection integration
Configure and troubleshoot Cisco Unity Connection call handlers
Describe how Mobile Remote Access (MRA) is used to allow endpoints to work from outside the company
Analyze traffic patterns and quality issues in converged IP networks supporting voice, video, and data traffic
Define QoS and its models
Implement classification and marking
Configure classification and marking options on Cisco Catalyst switchesCourse Prerequisites
Before taking this offering, you should have:
Working knowledge of fundamental terms of computer networking, including LANs, WANs, switching, and routing
Basics of digital interfaces, Public Switched Telephone Networks (PSTNs), and Voice over IP (VoIP)
Fundamental knowledge of converged voice and data networks and Cisco Unified Communications Manager deploymentCourse Outline
Module 1: Cisco Collaboration Solutions Architecture
Module 2: Call Signaling over IP Networks
Module 3: Cisco Unified Communications Manager LDAP
Module 4: Cisco Unified Communications Manager Provisioning Features
Module 5: Exploring Codecs
Module 6: Dial Plans and Endpoint Addressing
Module 7: Cloud Calling Hybrid Local Gateway
Module 8: Calling Privileges in Cisco Unified Communications Manager
Module 9: Toll Fraud Prevention
Module 10: Globalized Call Routing
Module 11: Media Resources in Cisco Unified Communications Manager
Module 12: Webex Calling Dial Plan Features
Module 13: Webex App
Module 14: Cisco Unity Connection Integration
Module 15: Cisco Unity Connection Call Handlers
Module 16: Collaboration Edge Architecture
Module 17: Quality Issues in Converged Networks
Module 18: QoS and QoS Models
Module 19: Classification and Marking
Module 20: Classification and Marking on Cisco Catalyst SwitchesLab Outline
Discovery 1: Use Certificates
Discovery 2: Configure IP Network Protocols
Discovery 3: Configure and Troubleshoot Collaboration Endpoints
Discovery 4: Troubleshoot Calling Issues
Discovery 5: Configure and Troubleshoot LDAP Integration in Cisco Unified Communications Manager
Discovery 6: Deploy an IP Phone Through Auto and Manual Registration
Discovery 7: Configure Self-Provisioning
Discovery 8: Configure Batch Provisioning
Discovery 9: Configure Regions and Locations
Discovery 10: Implement Endpoint Addressing and Call Routing
Discovery 11: Configure Calling Privileges
Discovery 12: Implement Toll Fraud Prevention on Cisco Unified Communications Manager
Discovery 13: Implement Globalized Call Routing
Discovery 14: Configure the Integration Between Unity Connection and Cisco Unified CM
Discovery 15: Manage Unity Connection Users
Discovery 16: Configure QoS - CLICA — Implementing Cisco Collaboration Applications
- Длительность: 5 дней (40 часов)
- Код курса: CLICA
- Стоимость
- Очный формат: 1 354 000 ₸
- Онлайн формат: 1 343 500 ₸
Описание курса
Course Description
The Implementing Cisco Collaboration Applications (CLICA) training teaches you the knowledge and skills to configure and troubleshoot Single Sign-On (SSO), Cisco Unity Connection and Cisco Unity Express, and Application clients. Topics covered include streamlining communication procedures, strengthening compliance measures, and enhancing communication systems and devices. This course also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This course will help you:
Learn to implement and troubleshoot voice mail and Interactive Voice Response (IVR) solutions using Cisco Unity Connections and Cisco Unity Express
Prepare for the 300-810 CLICA examWho Should Enroll
Collaboration engineers
Collaboration administratorsWhat to Expect in the Exam
The 300-810 CLICA exam certifies your knowledge and skills related to collaboration applications, including SSO, Cisco Unified IM and Presence, Cisco Unity Connection, Cisco Unity Express, and application clients.
After you pass 300-810 CLICA, you earn the Cisco Certified Specialist - Collaboration Applications Implementation certification, and you satisfy the concentration exam requirement for the CCNP® Collaboration certification.
Course Objectives
Configure Cisco Unity Connection integration
Configure and troubleshoot Cisco Unity Connection and Cisco Unity Connection call handlers
Configure and troubleshoot Cisco Unity Express
Describe SSO for Cisco Unified Communications applications
Describe how Cisco Jabber and Cisco Unified Communications Manager IM and Presence are integrated with other Cisco or third-party applications
Customize the Cisco Unified Communications Manager IM and Presence and Cisco Jabber functionality
Configure and troubleshoot Chat rooms and message archiving
Troubleshoot Cisco Jabber and Cisco Unified Communications Manager IM and Presence
Integrate Cisco Unified Attendant Console Advanced with Cisco Unified Communications Manager and Cisco Unified Communications Manager IM & Presence server
Configure call recording and monitoringCourse Prerequisites
Before taking this offering, you should have:
Basic understanding of networking technologies
Basic understanding of voice and video
Cisco Unified Communications Manager experience including single-site dial plan, single PSTN gateway, and SIP trunks.Course Outline
Module 1: Cisco Unity Connection Integration
Module 2: Cisco Unity Connection Call Handlers
Module 3: Cisco Unity Connection Troubleshooting
Module 4: SSO for Cisco Unified Communications Applications
Module 5: Cisco IM and Presence and Cloud Messaging
Module 6: Cisco IM and Presence and Jabber Customization
Module 7: Cisco IM and Presence Compliance Message Archiving
Module 8: Webex App Troubleshooting
Module 9: Cisco Unified Attendant Console
Module 10: Call Recording and MonitoringLab Outline
Discovery 1: Integrate and Set Up Cisco Unity Connection
Discovery 2: Configure Cisco Unity Connection Call Handlers
Discovery 3: Implement Toll Fraud Prevention
Discovery 4: Troubleshoot Cisco Unity Connection Call Handlers
Discovery 5: Troubleshoot Cisco Unity Connection
Discovery 6: Configure Cisco Unified Communications Manager IM and Presence High Availability
Discovery 7: Implement Cisco Jabber
Discovery 8: Configure Centralized Cisco Unified Communications Manager IM and Presence
Discovery 9: Configure Cisco Unified Communications Manager IM and Presence Service Functionality
Discovery 10: Enable Message Archiving and Chat Rooms
Discovery 11: Troubleshoot the Cisco Unified Communications IM and Presence Database Connection
Discovery 12: Integrate Cisco Unified Attendant Console Advanced
Discovery 13: Implement Call Recording and Monitoring Using a SPAN-Based Solution
Discovery 14: Implement Cisco Unified Communications Manager Call Recording and Monitoring - CLCEI — Implementing Cisco Collaboration Cloud and Edge Solutions
- Длительность: 5 дней (40 часов)
- Код курса: CLCEI
- Стоимость
- Очный формат: 1 584 000 ₸
- Онлайн формат: 1 539 500 ₸
Описание курса
Course Description
The Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) training provides you with an understanding of Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Topics covered also include details about the Webex solutions, and the benefits of hybrid integrations between Cisco on-premises solutions and Webex Meetings in the cloud. This training also earns you 40 Continuing Education (CE) credits towards recertification.
This training helps prepare you to take the exam:
300-820 Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)How You'll Benefit
This course will help you:
Acquire the knowledge and skills to use the tools and systems designed to facilitate team-based collaboration whether in-office or remote.
Gain hands-on experience in using Cisco Expressway software for secure, remote access for phones, endpoints, smartphones, tablets, video, and other communication devices to support nontraditional workspaces.
Prepare for the 300-820 CLCEI examWho Should Enroll
Collaboration engineers
Collaboration administratorsWhat to Expect in the Exam
The 300-820 CLCEI exam certifies your knowledge and skills related to collaboration cloud and edge solutions, expressway configurations, and Cisco WebEx Teams™ hybrid and emerging technologies.
After you pass 300-820 CLCEI, you earn the Cisco Certified Specialist - Collaboration Cloud and Edge Implementation certification, and you satisfy the concentration exam requirement for this professional-level certification:
CCNA CollaborationCourse Objectives
Describe the Cisco Expressway Core features and functionality within the collaboration architecture
Describe the Cisco Expressway Core additional features
Configure and troubleshoot Cisco Unified Communications Manager and Cisco Expressway Series integration
Configure and troubleshoot Cisco Collaboration solutions for Business-to-Business calls
Describe how to secure B2B communication with Cisco Expressway Series
Describe the Mobile and Remote Access (MRA) feature
Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity Connection and Cisco Unified Communications Manager IM and Presence Service
Describe deployment models for Cisco Webex cloud-based collaboration, management of users and sites within Webex Control Hub, and other administrative tasks
Describe Cisco Webex Hybrid ServicesCourse Prerequisites
Before taking this training, you should have the following knowledge and skills:
Understanding of networking technologies
Understanding voice and video
Knowledge of Cisco collaboration core technologies
Session Initiation Protocol (SIP) and Extensible Messaging and Presence Protocol (XMPP) signaling protocol fundamentals
Collaboration call control fundamentals of Cisco Unified Communications Manager
The following Cisco trainings can help you gain the knowledge you need to prepare for this training:
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)Course Outline
Configuring and Troubleshooting the Cisco Expressway Series
Configuring Cisco Expressway Additional Features
Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series
Configuring and Troubleshooting Cisco Collaboration Solutions for Business-to-Business
Securing Business-to-Business Communication
Configuring and Troubleshooting Mobile and Remote Access
Integrating and Securing Mobile and Remote Access
Configuring Cisco Webex Hybrid ServicesLab Outline
Discovery 1: Deploy Virtualized Cisco Expressway
Discovery 2: Perform the Initial Cisco Expressway Series Configuration
Discovery 3: Register Endpoints on Cisco Expressway Series
Discovery 4: Call Search History and Registrations
Discovery 5: Troubleshooting Tools
Discovery 6: Configure Cisco Expressway Series Bandwidth Management and Registration Restrictions
Discovery 7: Troubleshoot Cisco Expressway Series Endpoint Registration and Local Dial Plan
Discovery 8: Configure Cisco Expressway Series Security Features
Discovery 9: Configure Cisco Unified Communications Manager to Connect with Cisco Expressway-C
Discovery 10: Troubleshoot Cisco Unified Communications Manager and Cisco Expressway Series Integration
Discovery 11: Configure Cisco Unified Communications Manager and Cisco Expressway Series Integration
Discovery 12: Implement a Business-to-Business Cisco Collaboration Solution
Discovery 13: Troubleshoot Business-to-Business Calls on the Cisco Expressway Series
Discovery 14: Secure a B2B Cisco Collaboration Communication
Discovery 15: Configure MRA on the Cisco Expressway Series
Discovery 16: Troubleshoot MRA on the Cisco Expressway Series
Discovery 17: Configure MRA with Additional Application Integrations
Discovery 18: Prepare for Cisco Webex Integration - CLACCM — Implementing Cisco Advanced Call Control and Mobility Services
- Длительность: 5 дней (40 часов)
- Код курса: CLACCM
- Стоимость
- Очный формат: 1 584 000 ₸
- Онлайн формат: 1 539 500 ₸
Описание курса
Course Description
The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) training provides you with knowledge about advanced call control and mobility services, focusing on Cisco Unified Communications Manager features such as Globalized Call Routing, Global Dial Plan Replication, Cisco Unified Mobility, Cisco Extension Mobility, SIP URI call routing, Call Admission Control, Cisco Unified Communications Manager Express and SRST gateway technologies, Cisco Unified Border Element Call deployments, signaling and media protocols, and features such as call coverage and time of day routing.
This training prepares you for the 300-815 CLACCM exam. If passed, you earn the Cisco Collaboration Specialist – Collaboration Call Control and Mobility Implementation certification and you satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Collaboration certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the skills to deploy advanced call control and mobility services in Cisco Unified Communications Manager, CME and SRST, Cisco Unified Communications Manager Express and advanced SRST gateway technologies, and Cisco Unified Border Element.
Earn 40 CE credits toward recertification.Who Should Enroll
Collaboration Engineers
Collaboration AdministratorsWhat to Expect in the Exam
300-815 CLACCM: Implementing Cisco Advanced Call Control and Mobility Services is a 90-minute exam associated with the Cisco Collaboration Specialist – Collaboration Call Control and Mobility Implementation certification and satisfies the concentration exam requirement for the CCNP Collaboration certification.
The multiple-choice format tests your knowledge of advanced call control and mobility services, including:
Signaling and media protocols
CME/SRST gateway technologies
Cisco Unified Border Element
Call control and dial planning
Cisco Unified CM Call Control
MobilityCourse Objectives
Analyze and troubleshoot SIP and media protocol
Understand call recording options and implement time-of-day routing, call park, call pickup, and Meet-Me conferences in Cisco Unified Communications Manager
Describe call recording options in Cisco Unified Communications Manager
Describe how to implement call coverage in Cisco Unified Communications Manager
Describe how to configure and troubleshoot Cisco Unified Communications Manager Extension Mobility
Describe how to configure and troubleshoot Cisco Unified Communications Manager Unified Mobility
Describe how to implement Cisco Unified Communications Manager Express for SIP phones
Describe how to implement globalized call routing within and between Cisco Unified Communications Manager clusters
Describe how to implement advanced and enhanced SRST in Cisco Unified Communications Manager and Cisco IOS gateways
Describe how to implement CAC and AAR in Cisco Unified Communications Manager
Describe how to implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters
Describe how to troubleshoot multisite Cisco Unified Communications Manager deployments
Describe how to implement ILS between Cisco Unified Communications Manager clusters and enable GDPR
Configure and troubleshoot Cisco Unified Border ElementCourse Prerequisites
The knowledge and skills you are expected to have before attending this course can be found in the following Cisco Learning Offerings:
Understanding Cisco Collaboration Foundations (CLFNDU v1.0)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR v1.2)Course Outline
Signaling and Media Protocols
Cisco Unified Communications Manager Supplemental Services
Call Coverage in Cisco Unified Communications Manager
Cisco Unified Communications Manager Extension Mobility
Cisco Unified Communications Manager Unified Mobility
Cisco Unified Communications Manager Express
Globalized Call Routing
Advanced Remote Site Survivability
Call Admission Control in Cisco Unified Communications Manager
URI Calling in Cisco Unified Communications Manager
Multisite Cisco Unified Communications Manager Deployments
Global Dial Plan Replication
Cisco Unified Border ElementLab Outline
Analyze SIP, H.323, and Media Protocols
Troubleshoot SIP and Media Protocols
Implement Cisco Unified Communications Manager Supplemental Services
Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager
Configure Cisco Unified Communications Manager Extension Mobility
Troubleshoot Cisco Unified Communications Manager Extension Mobility
Configure Cisco Unified Mobility
Troubleshoot Cisco Unified Mobility
Implement Endpoints in Cisco Unified Communications Manager Express
Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express
Implement Calling Privileges in Cisco Unified Communications Manager Express
Implement Globalized Call Routing
Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment
Implement Advanced Survivable Remote Site Telephony
Implement CAC
Implement a URI-Based Dial Plan for Multisite Deployments
Troubleshoot Globalized Call Routing
Troubleshoot Call Admission Control
Implement Global Dial Plan Replication
Implement Cisco Unified Border Element
Troubleshoot Cisco Unified Border Element - CLFNDU — Understanding Cisco Collaboration Foundations
- Длительность: 5 дней (40 часов)
- Код курса: CLFNDU
- Стоимость
- Очный формат: 1 584 000 ₸
- Онлайн формат: 1 539 500 ₸
Описание курса
Course Description
The Understanding Cisco Collaboration Foundations (CLFNDU) training gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (UCM) solution with Session Initiation Protocol (SIP) gateway. The training covers initial parameters, management of devices including phones and video endpoints, management of users, and management of media resources, as well as Cisco Unified Communications solutions maintenance and troubleshooting tools. In addition, you will learn the basics of SIP dial plans including connectivity to Public Switched Telephone Network (PSTN) services, and how to use class-of-service capabilities.
This training does not lead directly to a certification exam, but it does cover foundational knowledge that can help you prepare for several Cisco Certified Network Professional (CCNP) and other professional-level collaboration trainings and exams. This training also earns you 21 Continuing Education (CE) credits toward recertification
How You'll Benefit
This training will help you:
Administer a single-site Cisco Unified Communications Manager, handling daily tasks such as add, moves, changes and deletions of phones, video endpoints, and users
Configure Jabber devices and implement common endpoint features including call park, shared lines, pickup groups, and phone button templates
Introduce you to the SIP protocol, how calls are connected, and how media codes are determined
Introduce you to the capabilities and basic configuration of an SIP gateway for PSTN access
Introduce you to the dial plan elements used to route calls, and the class-of-service capabilities to control who can route calls where
Administer Cisco Unity Connection handling daily tasks such as add, moves, and changes and deletions of voicemail boxes and users
Administer maintenance tasks and use the troubleshooting tools available on Cisco Unified Communications Manager and Cisco Real-time Monitoring Tool
Earn 21 CE credits toward recertificationWho Should Enroll
Students preparing to take the CCNP Collaboration certification
Network Administrators
Network Engineers
Systems EngineersCourse Objectives
Describe benefits of using Cisco collaboration solution, collaboration deployment models, and components of collaboration solution in on-premises, cloud, and hybrid deployments
Explore different codecs used in voice and video calls and explain how SIP signaling is used to set up and teardown calls
Identify Cisco Unified Communications Manager User Types and use Active Directory to manage Users in Cisco Unified Communications Manager
Identify the appropriate Cisco Unified IP Phone software solution for registration, recognize different Cisco Unified IP Phone models and their supported software, and identify various models of Webex video endpoints
Provide an understanding of Cisco Unified Communications Manager, including its deployment models, cluster architecture, network requirements, collaboration services, administration tools, and redundancy strategies to design, implement, and maintain robust collaboration networks
Examine the lifecycle of Cisco collaboration endpoints
Understand the dial plans and call routing in Cisco Unified Communications Manager including the key components, digit manipulation techniques, translation patterns, and practical skills to create and configure a basic dial plan
Configure a class of service elements in the Cisco Unified Communications Manager
Provide an overview of the reporting and maintenance tools available for managing and monitoring Cisco Unified Communications systems
Analyze media resources within Cisco Unified Communications systems, including conferencing solutions, transcoders, media termination points, and music on hold, to optimize their configuration and usage
Describe the differences between a rendezvous, Meet-Me and ad hoc conference, describe how to create a SIP Trunk for Cisco Meeting Server in Cisco Unified Communications Manager, and how to set up media resources to support ad hoc and Meet-Me conferences
Analyze the deployment, integration, and use cases of Cisco Instant Messaging and Presence Service alongside Cisco Unified Communications Manager to optimize communication through scalable, redundant, and secure solutions
Evaluate the features, deployment options, and integration of Cisco Jabber with Cisco Unified Communications Manager to optimize communication workflows, enhance team collaboration, and provide a smooth transition to modern communication solutions
Analyze Cisco Unity Connection components, architecture, and call handlers, focusing on the system’s deployment, configuration, and user management to optimize communication workflows and enhance user experience
Describe the Cisco Edge Services Components
Analyze the architecture and configuration of Cisco Expressway Zones, as well as the role of Search Rules, security certificates, and encryption strategies to enable efficient and secure voice, video, and collaboration services between internal and external networks
Analyze the architecture and configuration of Cisco Unified Border Element, including its key features for signaling and media interworking, security demarcation, toll-fraud prevention, and call admission control to enable secure, cost-effective voice and video connectivity across disparate VoIP networks
Describe how to access the Control Hub and navigate the menus to setup a Webex collaboration solution
Introduce User administration in Control Hub
Explore the registration process to Control Hub
Examine Webex Calling options using the Control Hub
Explore admin-configurable features and user configurable features in Webex calling
Describe Reporting and Maintenance
Provide a technical understanding of Cisco Webex cloud and hybrid media resources, including voicemail management, Edge Audio, and Video Mesh
Describe Cisco Webex Hybrid Cloud Connected Unified Communications
Describe Webex Hybrid ServicesCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Internet web browser usability knowledge and general computer usage
Knowledge of Cisco Internetwork Operating System (Cisco IOS®) command lineCourse Outline
Collaboration Technology and Benefits
Codecs and Call Signaling
User Management in Cisco Unified Communications Manager
Endpoints and Phones
Initial Parameters Administration for Cisco Unified Communications Manager
Registration Process to Cisco Unified Communications Manager
Basic Dial Plan
Class of Service
Reporting and Maintenance
Media Resources
Cisco Meeting Server Integration with Cisco Unified Communications Manager
Cisco Instant Messaging and Presence Service
Soft Client Registration to Cisco Unified Communication Manager
Cisco Unity Connection
Edge Services
Cisco Expressway Series
Cisco Unified Border Element
Control Hub
User Management in Control Hub
Registration Process to Control Hub
Webex Calling Options
Webex Calling Features
Cloud Management and Troubleshooting
Cloud and Hybrid Media Resources
Cisco Webex Hybrid Cloud Connected Unified Communications
Cisco Webex Hybrid ServicesLab Outline
Create a Local User Account and Configure LDAP
Configure Cisco Unified Communication Manager Initial Parameters
Configure Cisco Unified Communications Manager Core System Settings
Deploy an IP Phone Through Manual Registration
Create a Basic Dial Plan
Explore Partitions and CSSs
Use Reporting and Maintenance Tools
Register Cisco Meeting Server to Cisco Unified Communications Manager
Register Cisco Jabber Client to Cisco Unified Communications Manager
Configure the Integration Between Cisco Unity Connection and Cisco Unified Communications Manager
Manage Cisco Unity Connection Users
Explore the Configuration of Traversal Zones in Cisco Expressway
Explore the Cisco Unified Border Element Interoperability between VoIP Networks
Explore the Configuration of Webex Control Hub
Add Users to Webex Control Hub
Configure Webex Calling Using Cisco Calling Plans
Configure Webex Calling Features in Control Hub - CLCNF — Implementing Cisco Collaboration Conferencing
- Длительность: 5 дней (40 часов)
- Код курса: CLCNF
- Стоимость
- Очный формат: 2 000 000 ₸
- Онлайн формат: 1 980 000 ₸
Описание курса
Course Description
The Implementing Cisco Collaboration Conferencing (CLCNF) v1. course focuses on Cisco® on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and implement common conferencing deployment scenarios of Cisco Meeting Server, its integration with call control features such as Cisco Unified Communications Manager and Cisco Expressway, and other Cisco collaboration conferencing devices.
This course offers lessons and hands-on labs to prepare you for the 300-825 Implementing Cisco Collaboration Conferencing (CLCNF) exam.
How You'll Benefit
This class will help you:
Learn how to configure and troubleshoot on-premises conferencing solutions with Cisco Meeting Server.
Integrate on-premises conferencing solutions with other collaboration components to meet the needs of modern-day workplaces.Who Should Enroll
Deployment engineer
Network engineer
Sales engineerWhat to Expect in the Exam
This course will help you:
Learn how to configure and troubleshoot on-premises conferencing solutions with Cisco Meeting Server.
Integrate on-premises conferencing solutions with other collaboration components to meet the needs of modern-day workplaces.Course Objectives
After taking this course, you should be able to:
Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing
Describe the physical deployment options and deployment models for Cisco Meeting Server, including Cisco Meeting Server 1000, 2000, and virtual machine
Configure a Cisco Meeting Server single combined deployment for Web-Real Time Communications (WebRTC) endpoints within the enterprise
Use APIs and the Cisco Meeting Server API Guide to configure profiles using Postman and the Webadmin API tool
Configure a scalable and resilient deployment of Cisco Meeting Server with three servers for WebRTC endpoints within the enterprise
Configure a scalable and resilient deployment of Cisco Meeting Server to support standard Session Initiation Protocol (SIP) and WebRTC connectivity outside the enterprise
Configure a scalable and resilient deployment of Cisco Meeting Server to support recording and streaming of conferences
Configure Cisco Unified Communications Manager and Cisco Meeting Server to support Rendezvous, Scheduled, and Ad-hoc conferencing for Cisco Unified CM registered endpoints
Configure Cisco Meeting Server to integrate with a preconfigured on-premise Microsoft Skype for Business installation
Install Cisco TelePresence Management Suite (Cisco TMS) and Cisco TelePresence Management Suite for Microsoft Exchange (Cisco TMSXE) on a single Microsoft Windows 2012 server and connect to an existing SQL environment
Install and integrate Cisco Meeting Management with Cisco TMS and Cisco Meeting Server
Set up and manage a scheduled conference with Cisco TMS and Cisco Meeting Management
Capture and analyze logs from Cisco Meeting Server and Cisco Meeting Manager to diagnose faults, including a SIP connection errorCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
PC skills
Addition and management of devices and users in Cisco Unified CM
SIP signaling fundamentals
Video endpoint operation and configuration
Management of media resources in Cisco Unified CM
Familiarity with Cisco Expressway ideal but not required
Familiarity with APIs ideal but not required
Recommended Cisco offerings that may help you meet these prerequisites:
Cisco Collaboration Fundamentals (CLFNDU)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI)Course Outline
Describing Cisco Conferencing Architecture
Configuring a Single Combined Deployment
Installing Cisco Meeting Server
Using APIs with Cisco Meeting Server
Configuring a Cisco Meeting Server Scalable and Resilient Deployment
Configuring Business to Business (B2B) and WebRTC Firewall Traversal Connectivity for Cisco Meeting Server
Configuring Recording and Streaming with Cisco Meeting Server
Troubleshooting Cisco Meeting Server
Integrating Cisco Meeting Server with Cisco Unified CM
Integrating Cisco Meeting Server with Microsoft Skype for Business
Installing and Operating Cisco TMS and Cisco TMSXE
Installing and Integrating Cisco Meeting ManagementLab Outline
Cisco Meeting Server Initial Configuration
Cisco Meeting Server Single Combined Deployment
Install a Cisco Meeting Server Virtual Machine
Using Postman with Cisco Meeting Server
Using Cisco Meeting Server Webadmin API Tool
Cluster Cisco Meeting Server Databases
Cluster Cisco Meeting Server Call Bridges
Configure Cisco Meeting Server Distributed Spaces and Active Directory
Configure Cisco Meeting Server Scalable and Resilient Web Bridges
Configure External WebRTC Connectivity for Cisco Meeting Server
Configure External B2B Connectivity for Cisco Meeting Server
Configure Cisco Meeting Server Recording
Capturing Log Files in Cisco Meeting Server
Troubleshoot Cisco Meeting Server
Configure Cisco Meeting Server Integration with Cisco Unified CM Using a SIP Trunk
Configure Cisco Meeting Server Integration with Cisco Unified CM as a Conference Resource
Install, Upgrade, and Maintain Cisco TMS and TMSXE
Configure Cisco TMS for Scheduled Conferences
Manage Endpoints in Cisco TMS Part 1
Manage Endpoints in Cisco TMS Part 2
Cisco Meeting Management Initial Installation
Integrate Cisco Meeting Management
Manage Conferences in Cisco TMS and Cisco Meeting Management
Specific Lab Issues - CCER — Reporting Cisco Contact Center Enterprise
- Длительность: 2 дня (16 часов)
- Код курса: CCER
- Стоимость
- Очный формат: 1 165 500 ₸
- Онлайн формат: 1 122 500 ₸
Описание курса
Course Description
The Reporting Cisco Contact Center Enterprise (CCER) v1.0 course provides an architectural overview of the Contact Center Enterprise (CCE) Solution components and deployment models. You will learn the end-to-end reporting solutions of CCE designed to assist customers and partners in the task of creating reports and managing disparate data sources. The course explains the nuances of analyzing and troubleshooting in various deployment scenarios: Designed Tier 2/Day 2 Support. The Cisco® Contact Center Enterprise (CCE) solution helps businesses deliver a connected digital experience, enabling you to provide contextual, continuous, and capability-rich journeys for your customers, across time and channels. The course teaches you the business application of the CCE solution providing the framework of interrelationship between both core and optional components required to configure the CCE solution.
How You'll Benefit
This course will help you:
Consolidate disparate data into manageable, comprehensive reports
Understand the business application of the CCE solution and how it provides a framework of correlation between core and optional componentsWho Should Enroll
Administrators
Business liaisons
Deployment engineers
Managers overseeing CCE deploymentsCourse Objectives
After taking this course, you should be able to:
Explain the Cisco Unified Intelligence Center including the benefits and features of the system and describe the high-level architecture of Cisco Unified Intelligence Center in the UCCE environment
Understand the Cisco Unified Intelligence Center administration console to perform Cisco Unified Intelligence Center administrative, maintenance and provisioning functions
Discuss the functional attributes of the Cisco Unified Intelligence Center
Customize Cisco Unified Intelligence Center Reports and ViewsCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of computer networking components: Windows Active Directory (AD) SQL Server and components (servers, routers, switch) is helpful but not required
Understanding of Cisco Packaged Contact Center Enterprise components and call flows
Experience administering Cisco Packaged Contact Center Enterprise
Recommended Cisco offerings that may help you meet these prerequisites:
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Administering Cisco Contact Center Enterprise (CCEA)
Cisco Certified Network Associate (CCNA)
Understanding Cisco Foundation Collaborations (CLFNDU)Course Outline
Cisco Unified Intelligence Center Foundations
Cisco Unified Intelligence Center - Basics
Cisco Unified Intelligence Center - Deployment Models
Cisco Unified Intelligence Center Administration and Operations Console
Operations Console (OAMP) Console Introduction
Admin User Management
Cisco Unified Intelligence Center Attributes
Stock Reporting
Dashboard Features
Cisco Unified Intelligence Center Custom Reports and Views
Creating Views
Building Report DefinitionsLab outline
Exploring Cisco Unified Intelligence Center (CUIC) OAMP
Working with Stock Reports
Working with Dashboards
Value Lists and Collections
Exploring Supervisor Defaults
Using Groups
Editing Report Views Pt 1 of 2
Editing Report Views Pt 2 of 2
Report Definitions and Drilldowns
Create Custom Route Call Detail (RCD) Report Definition (Database Query) and Report
Value Lists and DrilldownsLab Outline
Exploring Cisco Unified Intelligence Center (CUIC) OAMP
Working with Stock Reports
Working with Dashboards
Value Lists and Collections
Exploring Supervisor Defaults
Using Groups
Editing Report Views Pt 1 of 2
Editing Report Views Pt 2 of 2
Report Definitions and Drilldowns
Create Custom Route Call Detail (RCD) Report Definition (Database Query) and Report
Value Lists and Drilldowns - CCEF — Understanding Cisco Contact Center Enterprise Foundations
- Длительность: 1 день (8 часов)
- Код курса: CCEF
- Стоимость
- Очный формат: 995 500 ₸
- Онлайн формат: 969 000 ₸
Описание курса
Course Description
The Understanding Cisco Contact Center Enterprise Foundations (CCEF) v1.0 course gives you an overview of the Cisco® Packaged Contact Center Enterprise (PCCE) and Unified Contact Center Enterprise solutions. You will gain an understanding of contact center basics and describe the available Cisco contact center solutions and intended target customers. You will also focus on the Cisco Contact Center Enterprise (CCE) family of products and explore key features and functionality of the solution including architecture, major system components, and tools used for administration and reporting. This course is the foundation for additional courses required to deploy, configure, support, and troubleshoot Cisco CCE solutions.
How You'll Benefit
This class will help you:
Learn how to manage timely, disparate data using CCER as a reporting solution
Apply the CCE as a business solution to deploy, troubleshoot, and tailor application usage to support business processes.
Understand the foundational components of Contact Center Enterprise solutionsWho Should Enroll
Account and project managers
Business liaisons
Deployment engineers
Managers overseeing CCE deployments
Technical salesCourse Objectives
After taking this course, you should be able to:
Provide a high-level overview of the Cisco Contact Center portfolio
List the key components within the Packaged Contact Center Enterprise (PCCE) architecture and their functions
Describe how calls flow through PCCE using appropriate terms and naming conventions
Introduce the tools used in the configuration, scripting, reporting and support of a PCCE deployment
Identify advanced features available within the PCCE solutionCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
Working knowledge of Unified Communications Manager and Voice Gateways
Basic understanding of IP networksRecommended Cisco offerings that may help you meet these prerequisites:
CCNA
Understanding Cisco Foundation Collaborations (CLFNDU)Course Outline
Introduction to CCE
Cisco Contact Center Basics
Cisco Contact Center Fundamentals
Functionality of PCCE Components
Public Switched Telephone Network (PSTN) and Voice Gateways
Cisco Unified Border Element (CUBE)
Terms and Naming Conventions Used in CCE
CCE Access Environment
CCE Routing Configuration
Access Tools Available in CCE
Single Pane of Glass (SPOG)
Cisco Intelligent Contact Management (ICM) Configuration Manager
Discovering CCE Features Beyond Default
Agent Management
Agent Efficiency
Lab outline
This class does not have any labs. - CCEA — Administering Cisco Contact Center Enterprise
- Длительность: 4 дня (32 часа)
- Код курса: CCEA
- Стоимость
- Очный формат: 1 467 000 ₸
- Онлайн формат: 1 415 500 ₸
Описание курса
Course Description
The Administering Cisco Contact Center Enterprise (CCEA) v1.0 course teaches you the contextual information around call flow between components in the Cisco® Unified Contact Center Enterprise (UCCE) solution including intelligent contact routing, call treatment, network-to-desktop Computer Telephony Integration (CTI), and multichannel contact management over an IP infrastructure. You receive hands-on practice using administrative tools to perform routine adds, moves, and changes in an inbound contact center environment.
How You'll Benefit
This class will help you:
Leverage the Cisco Unified Contact Center Enterprise (UCCE) for a smooth integration of inbound and outbound voice applications to support multiple communication channels.
Manage a multichannel contact functionality with IP telephony as a unified solution to rapidly deploy within a distributed contact center infrastructure.Who Should Enroll
Account and project managers
Contact Center Enterprise (CCE) administrators
Deployment engineers
Technical salesCourse Objectives
After taking this course, you should be able to:
Navigate CCE configuration and scripting tools
Configure a dialed number, call type, and media routing domain
Build a basic Cisco Intelligent Contact Management (ICM) script
Configure agents and skill groups
Configure basic Interactive Voice Response (IVR) functionality
Implement attributes and precision queues
Configure Ring-No-Answer (RONA) using CCE configuration tools
Configure and populate an agent team and primary supervisor
Improve agent efficiency through finesse enhancements
Build and test a basic Voice XML (VXML) application
Implement roles, departments, and business hours
Run Cisco Unified Intelligence Center (CUIC) reports using the Reporting toolCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required
Working knowledge of Unified Communications Manager and voice gateways
Basic understanding of Cisco Unified Contact Center Enterprise architecture and operationRecommended Cisco offerings that may help you meet these prerequisites:
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Understanding Cisco Collaboration Foundations (CLFNDU)Course Outline
Cisco Unified Contact Center Review
Contact Center Basics
Components and ArchitectureDeploying Basic Call Settings
Associate Basic Call Settings
Explore Media Routing DomainsBuilding a Basic Cisco Unified Contact Center Enterprise Script
Introduce Script Editor
Use Script Editor NodesConfiguring Basic Agent Functionality
Introduce Agent Functionality
Configure Agent Desk SettingsConfiguring Basic Call Treatment and Queuing
Explore Media Server and Files
Introduce MicroappsImplementing Precision Routing
Introduce Precision Routing Basics
Examine the Migration PathConfiguring RONA Support
Introduce RONA Functionality
Identify RONA Timeout ConsiderationsConfiguring Agent Teams and Supervisors
Configuring Teams and Supervisors
Explore Agent RolesAdministering the Cisco Finesse Desktop
Administering Cisco Finesse Desktop
Introduce Cisco Finesse AdministrationImplementing Voice XML Applications
Introduce VXML
Build a Basic Call Studio ProjectConfiguring Roles, Departments, and Business Hours
Examine Post-Call Survey Functionality
Configure Post-Call SurveyRunning Unified CC Enterprise Reports with Unified Intelligence Center (IC)
Configure Unified CC Enterprise Administrators
Configure DepartmentsLab Exercises
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Administering ICM Dialed Numbers and Call Types
Prepare a Basic Label Script
Using ICM Tools for ICM Scripts
Configure ICM for Basic Agent and Skill Group Functionality
Configure UCM for Agent Functionality
Test Basic Skill Group Functionality in an ICM Script
Examine Media Files and Variables in ICM Scripts
Build Basic ICM Scripts with MicroApps
Configure and Implement Precision Routing
Configure RONA
Configure Agent Teams and Supervisors
Cisco Finesse Administration
Configure VXML Server and Install Call Studio
Create and Deploy a Call Studio Project
Integrate VXML Applications with a Unified CC Enterprise Script
Configuring Roles, Departments, and Business Hours
Run Unified IC Stock ReportsLab Outline
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Administering ICM Dialed Numbers and Call Types
Prepare a Basic Label Script
Using ICM Tools for ICM Scripts
Configure ICM for Basic Agent and Skill Group Functionality
Configure UCM for Agent Functionality
Test Basic Skill Group Functionality in an ICM Script
Examine Media Files and Variables in ICM Scripts
Build Basic ICM Scripts with MicroApps
Configure and Implement Precision Routing
Configure RONA
Configure Agent Teams and Supervisors
Cisco Finesse Administration
Configure VXML Server and Install Call Studio
Create and Deploy a Call Studio Project
Integrate VXML Applications with a Unified CC Enterprise Script
Configuring Roles, Departments, and Business Hours
Run Unified IC Stock Reports - CCEAA — Administering Advanced Cisco Contact Center Enterprise
- Длительность: 3 дня (24 часа)
- Код курса: CCEAA
- Стоимость
- Очный формат: 1 379 500 ₸
- Онлайн формат: 1 312 500 ₸
Описание курса
Course Description
The Administering Advanced Cisco Contact Center Enterprise (CCEAA) v1.0 course teaches you how to execute advanced administration tasks associated with the Cisco® Contact Center Enterprise (CCE) solution through an in-depth examination of technical and operational requirements, and of the tools used to configure and ensure CCE solution functionality.
This class will help you:
Learn how to optimize management of CCE solutions for proactive management of contact centers tasks
Manage the effects of using CCE solutions for scalability and interaction between the solution components for centralized application managementAfter taking this course, you should be able to:
Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities.
Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration.
Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop.
Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new.
Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop.
Successfully deploy Mobile Agent in a CCE Environment.
Successfully deploy Post Call Survey in a CCE Environment.How You'll Benefit
This class will help you:
Learn how to optimize management of CCE solutions for proactive management of contact centers tasks
Manage the effects of using CCE solutions for scalability and interaction between the solution components for centralized application managementWho Should Enroll
Deployment engineer
Sales engineerCourse Objectives
After taking this course, you should be able to:
Describe the components, protocols, and call flow of Cisco Packaged Contact Center Enterprise (PCCE) by referencing the discovery platform to prepare for further scripting and configuration activities.
Run the CCE Bulk Import utility using the CCE Web Administration tool to develop a base line CCE configuration.
Configure an advanced VoiceXML (VXML) application implementing DB lookup functionality and digit collection using Call Studio and CCE Scripting tools; present call data collected from the caller to the Agent desktop.
Provision CCE to support Cisco Unified Communications Manager (CUCM) calls to the Contact Center using CUCM and CCE configuration tools. This functionality enables CCE Route Requests from CUCM to support contacts initiated from a CUCM managed device (Gateways, Phones, Line Side Interactive Voice Response [IVR] Ports). This functionality can also enable non-Contact Center calls and calls handled by Agents, whether existing or new.
Access and deploy custom gadgets to the Finesse desktop using the CCE Web Administration tool to further enhance functionality of the Finesse Agent Desktop.
Successfully deploy Mobile Agent in a CCE Environment.
Successfully deploy Post Call Survey in a CCE Environment.Course Prerequisites
To fully benefit from this course, you should have the following knowledge:
Basic knowledge of networking (Windows Active Directory, SQL) and components (servers, routers, switch) is helpful but not required.
Working knowledge of Unified Communications Manager and voice gateways
Basic understanding of Cisco Unified Contact Center Enterprise architecture and operationRecommended Cisco offerings that may help you meet these prerequisites:
Administering Cisco Contact Center Enterprise (CCEA)
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Understanding Cisco Collaboration Foundations (CLFNDU)Course Outline
PCCE Review
Review PCCE Architecture and Components
Review PCCE ProtocolsIntroducing Bulk Import Tools
Use the PCCE Bulk Import Tool
Use Bulk Import TemplatesConfiguring Advanced Scripting and CCE Data Exchange
Design for Advanced Scripting
CCE Data ExchangeCisco Unified Communications Manager Initiated Call Flows
Understand Transfer Types and Cisco Unified Custom Voice Portal (CVP) Call Flow Models
Describe Subsequent TransfersUsing Gadgets to Customize the Finesse Desktop
Obtain Finesse Custom Gadgets
Deploy Finesse Custom GadgetsImplementing Mobile Agent
Examine Mobile Agent Functionality
Identify Mobile Agent Architecture and ComponentsImplementing Post Call Survey
Examine Post Call Survey Functionality
Configure Post Call SurveyLab Practice
Review Discovery
Navigate CCE Discovery Architecture and Components
Import Bulk Data
Create a VXML Application Using Call Studio
Configure Precision Queues
Create a CCE Routing Script
Customize the Finesse Desktop
Test Your Call Flow
Configure Cisco Unified Communications Manager (CUCM) as Routing Client and Agent Transfers
Deploy Cisco Finesse Gadgets
Implement Mobile AgentLab Outline
Review Discovery
Navigate CCE Discovery Architecture and Components
Import Bulk Data
Create a VXML Application Using Call Studio
Configure Precision Queues
Create a CCE Routing Script
Customize the Finesse Desktop
Test Your Call Flow
Configure Cisco Unified Communications Manager (CUCM) as Routing Client and Agent Transfers
Deploy Cisco Finesse Gadgets
Implement Mobile Agent - CCEI — Implementing Cisco Contact Center Enterprise
- Длительность: 3 дня (24 часа)
- Код курса: CCEI
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 918 000 ₸
Описание курса
Course Description
The Implementing Cisco Contact Center Enterprise (CCEI) v1.0 course teaches you how to build and implement a Cisco® Packaged Contact Center Enterprise (PCCE) solution, including advanced integration of external data, Single Sign-On (SSO), and process detail for the Contact Center Enterprise (CCE) solution with examples of the various deployment models. This integration process enables businesses and organizations to deliver a connected digital experience of continuous and capability-rich journeys for your customers, across time and channels. This course teaches you to install the CCE solution and provide Tier 2–3 solution support. The focus is on Day 1 support for a new CCE deployment.
How You'll Benefit
This class will help you:
Learn how to optimize management of CCE solutions for smooth, connected, and efficient digital experiences across multiple channels
Manage the effects of using CCE solutions for scalability, flexibility, and growth to support larger contact center enterprisesWho Should Enroll
Deployment engineer
Sales engineerCourse Objectives
After taking this course, you should be able to:
Examine components, protocols, and variables that influence selection of the design and sizing of a PCCE deployment
Identify concepts necessary to create CCE system design specifications and deployment plans
Configure an advanced VXML application implementing DB lookup functionality and digit collection; use Call Studio and CCE Scripting tools to present call data collected from the caller to the gent desktop
Discover how to install CCE software
Administer CA signed security certificates to support the successful addition of a PCCE site
Identify the tasks associated with adding Remote Site functionality to the PCCE environment
Discuss integration of the CUIC, LiveData, and Finesse reporting environments
Configure the PCCE Dial Plan end-to-end, incorporating the use of Cisco Unified Border Element (CUBE), Cisco Unified SIP Proxy (CUSP), Cisco Virtualized Voice Browsers (VVBs), Voice XML (VXML) Gateways (GW), and Significant Digits
Examine concepts necessary to create CCE system design specifications and deployment plans
Create a series of routing scripts using PCCE
Configure Single sign-on for Unified CCECourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Advanced knowledge of computer networking components: Windows A/D, SQL Server, and components
Understanding of IP networks
Strong understanding of Cisco Packaged Contact Center Enterprise functionality
Advanced experience administering of Cisco Packaged Contact Center Enterprise
Working knowledge of Unified Communications Manager and Voice GatewaysRecommended Cisco offerings that may help you meet these prerequisites:
Administering Cisco Contact Center Enterprise (CCEA)
Administering Advanced Cisco Contact Center Enterprise (CCEAA)
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Administering Cisco Solutions (CCNA)Course Outline
Planning a Cisco Packaged Contact Center Enterprise Deployment
Packaged CCE Component Overview
Call Flows ReviewStaging a Packaged CCE Deployment
PCCE Deployment Planning and System Design Specification
Software Compatibility and OS RequirementsPreparing CCE Software for Installation
General Considerations and System Requirements
Active Directory ConsiderationsAdministering Security Certificates
Security Certificate Overview
Install and Configure Certificate AuthorityIntroducing the Packaged CCE Integration Wizard
PCCE Inventory and Service Accounts
Run the PCCE Wizard Adding a Site to Packaged CCEAdding a Site to Packaged CCE
PCCE Remote Site Overview
Remote Site Security Certificate ConsiderationsIntegrating Cisco Unified Intelligence Center, LiveData, and Finesse
Compare Real Time vs. Live Data
Complete Cisco Unified Intelligence Center IntegrationPersonalizing the Packaged CCE Dial Plan
CCE Dial Plan Components
Ingress Gateway and Cisco Unified Border Element Dial Plans Configuring to Validate DeploymentConfiguring to Validate Deployment
Confirm Configuration Readiness
Cisco Unified Communications Manager AdministrationScripting for Packaged Contact Center Enterprise
Configure Script Editor
Use MicroappsConfiguring Single Sign-On
SSO Overview
Configure SSO PrerequisitesLab Practice
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Observe Installed CCE Software
Navigate Certificate Store
Add a Remote Site to PCCE
Personalize Finesse Server
Configure Site Dial Plan
Verify Configuration Details for Final Testing
Build a Series of Test Scripts
Enable Single Sign-OnLab Outline
Navigate CCE Discovery Architecture and Components
Explore ICM Configuration Tools
Observe Installed CCE Software
Navigate Certificate Store
Add a Remote Site to PCCE
Personalize Finesse Server
Configure Site Dial Plan
Verify Configuration Details for Final Testing
Build a Series of Test Scripts
Enable Single Sign-On - CCET — Cisco Contact Center Enterprise
- Длительность: 2 дня (16 часов)
- Код курса: CCET
- Стоимость
- Очный формат: 1 150 000 ₸
- Онлайн формат: 1 139 000 ₸
Описание курса
Course Description
The Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco® PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues.
How You'll Benefit
This class will help you:
Learn the troubleshooting techniques to maximize the benefits the prepackaged deployment model PCCE
Anticipate and rectify possible deployment issues by learning the tools and processes that provide solutions for deployment issuesWho Should Enroll
Account manager
Deployment engineer
Deployment project manager
Sales engineerCourse Objectives
After taking this course, you should be able to:
Describe CCE flows and processes required to support and troubleshoot the PCCE deployment
Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment
Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE DeploymentCourse Prerequisites
To fully benefit from this course, you should have the following knowledge:
Strong knowledge of computer networking components: Windows A/D, SQL Server, and components (servers, routers, switches)
Strong understanding of IP networks
Advanced experience administering of Cisco Packaged Contact Center Enterprise
Experience deploying Cisco Packaged Contact Center Enterprise
Experience administering and troubleshooting Cisco Unified Communications Manager and Voice GatewaysRecommended Cisco offerings that may help you meet these prerequisites:
Understanding Cisco Contact Center Enterprise Foundations (CCEF)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Administering Cisco Solutions (CCNA)
Administering Cisco Contact Center Enterprise (CCEA)
Administering Advanced Cisco Contact Center Enterprise (CCEAA)
Implementing Cisco Contact Center Enterprise (CCEI)Course Outline
CCE Flows and Process Review
Troubleshooting and Support Methodology
PCCE Components
PCCE Call Flow Review
CCE Diagnostic Tools
Diagnostic Framework Suite
Run Analysis Manager
Run Unified System Command-Line Interface (CLI)
Troubleshooting CCE
Troubleshooting Certificates
Troubleshooting Cisco Finesse
Troubleshooting a PCCE DeploymentLab Exercises
Configure Access to Discovery Environment
Explore CCE Components
Explore Diagnostic Framework Suite
Analyze Peripheral Gateway (PG) Logs
Navigate Certificate Store
View Cisco Finesse LogsLab Outline
Configure Access to Discovery Environment
Explore CCE Components
Explore Diagnostic Framework Suite
Analyze Peripheral Gateway (PG) Logs
Navigate Certificate Store
View Cisco Finesse Logs - CVPS — Scripting for Comprehensive Model
- Длительность: 5 дней (40 часов)
- Код курса: CVPS
- Стоимость
- Очный формат: 1 638 500 ₸
- Онлайн формат: 1 611 500 ₸
Описание курса
Lesson 1. What is CVP? CVP Solution Overview
CVP Overview
CVP Components
CVP Comprehensive Model Call Flow (with ICM)Lesson 2. Making VXML projects with Cisco Unified Call Studio
Call Studio Overview
VXML Project Properties
Importing / Exporting VXML Projects
Call Studio Basics
Deploying Call Studio Projects on CVP VXML ServerLesson 3. Troubleshooting, Administration and Logs
General troubleshooting tips
Using logs for Studio applications troubleshooting
Using the Studio Debugger to test applications within Studio
Using Studio Documenter to print Visio-like diagrams of the applicationLesson 4. Using Call Studio Native Elements
Element Properties Overview
VoiceXML Properties
Understanding Variables
Audio Element
Digit / Digit with Confirm, Number / Number with Confirm Elements
Form Element
Menu Elements
Flag Element
Decision Element
Action Element
Counter Element
CVP Subdialog Return Element
Sending data from/to ICMLesson 5. Using Customized Call Studio Elements
*.java to *.jar Conversion via Call Studio
Installing *.jar Files at Call Studio and CVP VXML ServerLesson 6. Integration with MS SQL Database
JNDI Configuration
Database Lookup Element
Processing Multiple MS SQL Queries
Using of Built-in Functions at the ICM
Working with multiple pages at Call Studio. Connectors
Hotlinks & HoteventsLesson 7. Post Call Survey at UCCE
Enabling Post Call Survey at ICM
Configuring CVP Dialed Patterns
ICM and CVP Call Studio Sample Scripts for Post Call Survey
Record Element
Email Element
Math ElementLesson 8. Subflows, Subdialogs, Multi-language Call Studio Application and Transfer to Another VXML Application
Using Subflows in Call Studio projects
Subdialog Invoke
Creating a Multilanguage Call Studio Application
Transfer control from one application to another via Application TransferLesson 9. Courtesy Callback
Courtesy Callback basics
Courtesy Callback call flow
Courtesy Callback configuration
Sample Courtesy Callback enabled ICM scriptLesson 10. Super Lab
Creating a Customer Support Call Studio project.
- CLWXCALL — The Essentials of Webex Calling
- Длительность: 3 дня (24 часа)
- Код курса: CLWXCALL
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 705 500 ₸
Описание курса
Course Description
The Essentials of Webex Calling (CLWXCALL) training is designed to guide you through a complete Webex Calling setup, from the initial installation of Webex Control Hub and adding users to configuring Webex Calling features through an existing on-premises Cisco Unified Communications Manager (CUCM) and Cisco Unified Border Element (CUBE) public switch telephone network (PSTN) setup. This training also earns you 18 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain an understanding of the Webex solutions, including Webex Meetings, Webex Messaging, and Webex Calling
Learn how to configure and manage the features of the Webex Control Hub
Earn 18 CE credits towards recertificationWho Should Enroll
Collaboration Engineers
Collaboration AdministratorsCourse Objectives
Introduce the components that make up the Webex solution, including Webex Meetings, Webex Messaging, and Webex Calling
Introduce the components that make up Webex Calling Control Hub, including analytics, troubleshooting, and reporting
Introduce the Management feature of Webex Control Hub, including how to set it up for a business
Introduce the Services section of the Webex Control Hub, including the Webex Services, Cloud-Connected Unified Communications Services, and Hybrid Services
Identify the methods available to add users to the Webex Control Hub
Explain Cisco IP Phone software registration with Webex Control Hub, eligible devices, and provisioning methods
Explain how an administrator can configure calling features from the Webex Control Hub that will affect the organization
Understand how users or administrators can configure calling features either from the Webex Control Hub or from their personal user portal
Introduce the three different methods available to bring PSTN calling capabilities into the Webex calling solution
Identify the different types of Cisco routers, as well as third-party routers, that can support the local gateway in a premises-based PSTN deployment
Describe different deployment scenarios using the local gateway in a premises-based PSTN Webex Calling solution
Understand how the high-availability solution within Cisco routers can be used in a Webex Calling deployment to offer failover for the local gateway and the Cisco Unified Border Element
Configure the Webex Control Hub to support Webex Calling in a premises-based PSTN deployment
Configure Cisco Unified Border Element and local gateway settings on a Cisco router to support Webex Calling using a premises-based PSTN deployment
Describe different methods that can be used to troubleshoot setup issues and media issues when configuring Webex Calling using the premises-based PSTN deploymentCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
A basic understanding of unified communications
A basic understanding of cloud-based unified communications solutions
These skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Collaboration Foundations (CLFNDU)
Implementing and Operating Cisco Collaboration Core Technologies (CLCOR)Course Outline
Webex Overview
Webex Control Hub Overview and Monitoring
Webex Control Hub Management
Webex Control Hub Services
Methods to Add Users to Webex Control Hub
Methods to Add Devices to Webex Control Hub
Admin-Configurable Webex Calling Features
User-Configurable Webex Calling Features
Webex Calling Public Switched Telephone Network Options
Routers Supporting Local Gateway
Deployment Scenarios for Local Gateways
Local Gateway and Cisco Unified Border Element with High Availability
Control Hub Settings for Webex Calling
Router Settings for Webex Calling
Webex Calling TroubleshootingLab Outline
Set Up Webex Control Hub
Add Users to Webex Control Hub
Configure Admin-Configurable Webex Calling Features
Configure User-Configurable Webex Calling Features
Configure High Availability on Cisco Routers
Configure Webex Control Hub for Webex Calling
Configure Local Gateway for Webex Calling
Troubleshooting Issues with Webex Calling - DCCOR — Implementing and Operating Cisco Data Center Core Technologies
- Длительность: 5 дней (40 часов)
- Код курса: DCCOR
- Стоимость
- Очный формат: 1 622 000 ₸
- Онлайн формат: 1 599 000 ₸
Описание курса
Course Description
The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) training teaches you to implement data center local area networks (LANs) and storage area networks (SANs) and compute using Cisco Nexus Switches, Cisco MDS Switches, Cisco Unified Computing System (UCS) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. You will also learn the essentials of automation and security in data centers. The training provides rich, hands-on experience with deploying, securing, operating, and maintaining Cisco data center networking, storage, and computing.
This training prepares you for 350-601 DCCOR v1.2 exam. If passed, you earn the Cisco Certified Specialist – Data Center Core certification and satisfy the core exam requirements for the Cisco Certified Network Professional (CCNP) Data Center and Cisco Certified Internetwork Expert (CCIE) Data Center certifications. This training also earns you 64 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain experience implementing, securing and automating network, compute, and storage infrastructure
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Qualify for professional and expert-level job roles in the high-demand area of enterprise-class data center environments
Prepare for the 350-601 DCCOR v1.2 exam
Earn 64 CE credits toward recertificationWho Should Enroll
Network Designers
Network Administrators
Network Engineers
Systems Engineers
Data Center Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators and Partners
Field Engineers
Server Administrators
Network Managers
Storage Administrators
Program Managers
Project ManagersWhat to Expect in the Exam
Implementing Cisco Data Center Core Technologies (350-601 DCCOR) v1.2 is a 120-minute associated with the Cisco Certified Specialist – Data Center Core certification and satisfies the core exam requirements for the CCNP Data Center and CCIE Data Center certifications.
This exam tests your knowledge of implementing core data center technologies, including:
Network
Compute
Storage network
Automation
SecurityCourse Objectives
Implement spanning tree protocol, port channels, and virtual port channels in the data center
Implement first-hop redundancy protocols in the data center using Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP), and Gateway Load Balancing Protocol (GLBP)
Implement routing in the data center by using Open Shortest Path First (OSPF)v2, OSPFv3, and Border Gateway Protocol (BGP)
Implement multicast functionality in the data center on the Cisco Nexus switches
Implement overlay networks in the data center by using Virtual Extensible LAN (VXLAN)
Implement network infrastructure security features on the Cisco Nexus switches
Understand the architecture and features of high-performance Ethernet fabrics
Introduce high-level Cisco Application Centric Infrastructure (ACI) concepts and describe various fabric discovery parameters
Describe Cisco ACI building blocks and Virtual Machine Manager (VMM) domain integration
Describe packet flow for various traffic types (unicast, multicast, and broadcast) in the data center
Describe Cisco Cloud Service and deployment models
Describe Cisco ACI fabric setup
Implement network configuration management, describe software updates and their impacts, and implement network infrastructure monitoring
Describe Cisco network assurance concepts such as Cisco Streaming Telemetry
Implement Fibre Channel fabric
Implement storage infrastructure services in the data center such as distributed device aliases, zoning, N Port Virtualization (NPV), and Fibre Channel over IP (FCIP)
Implement Fibre Channel over Ethernet (FCoE) unified fabric
Implement storage infrastructure security features in the data center
Describe storage infrastructure software updates and their impacts, and implement infrastructure monitoring
Describe Cisco UCS Server form factors
Implement Cisco UCS Fabric Interconnect and establish network connectivity for the Cisco UCS B-Series Blade Servers and Cisco UCS C-Series Rack Servers
Implement Cisco Unified Computing Server abstraction
Implement SAN connectivity for Cisco UCS
Implement Cisco UCS security features in the data center
Implement Cisco UCS configuration management, describe software updates and their impacts, and implement infrastructure monitoring
Implement Cisco automation and scripting tools in the data center
Describe and evaluate the Cisco integration with automation and orchestration software platforms, such as Ansible, Puppet, and Python
Describe and evaluate Cisco data center automation and orchestration technologiesCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Familiarity with Ethernet and TCP/IP networking
Familiarity with SANs
Familiarity with Fibre Channel protocol
Identify products in the Cisco Data Center Nexus and Cisco MDS families
Understanding of Cisco Enterprise Data Center architecture
Understanding of server system design and architecture
Familiarity with hypervisor technologies (such as VMware)Course Outline
Implementing Data Center Switching Protocols
Implementing First-Hop Redundancy Protocols
Implementing Routing in Data Center
Implementing Multicast in Data Center
Implementing Data Center Overlay Protocols
Implementing Network Infrastructure Security
High-Throughput Converged Fabrics
Describing Cisco Application-Centric Infrastructure
Describing Cisco ACI Building Blocks and VMM Domain Integration
Describing Packet Flow in Data Center Network
Describing Cisco Cloud Service and Deployment Models
Describing Data Center Network Infrastructure Management
Explaining Cisco Network Assurance Concepts
Implementing Fibre Channel Fabric
Implementing Storage Infrastructure Services
Implementing FCoE Unified Fabric
Implementing Storage Infrastructure Security
Describing Data Center Storage Infrastructure Maintenance and Operations
Describing Cisco UCS Server Form Factors
Implementing Cisco Unified Computing Network Connectivity
Implementing Cisco Unified Computing Server Abstraction
Implementing Cisco Unified Computing SAN Connectivity
Implementing Cisco Unified Computing System Security
Describing Data Center Unified Computing Management, Maintenance, and Operations
Implementing Cisco Data Center Automation and Scripting Tools
Describing Cisco Integration with Automation and Orchestration Software Platforms
Describing Cisco Data Center Automation and Orchestration TechnologiesLab Outline
Configure VXLAN
Explore the Cisco ACI Fabric
Implement Cisco ACI Access Policies and Out-of-Band Management
Implement Cisco ACI Tenant Policies
Integrate Cisco ACI with VMware
Configure Fibre Channel
Configure Device Aliases
Configure Zoning
Configure NPV
Provision Cisco UCS Fabric Interconnect
Configure Server and Uplink Ports
Configure VLANs
Configure Cisco UCS Server Profile Using Hardware Identities
Configure Basic Identity Pools
Configure a Cisco UCS Service Profile Using Pools
Configure an iSCSI Service Profile
Configure Cisco UCS Manager to Authenticate Users with Microsoft Active Directory
Configure Cisco Nexus Switches with Ansible
Program a Cisco Nexus Switch with Python - DCID — Designing Cisco Data Center Infrastructure
- Длительность: 5 дней (40 часов)
- Код курса: DCID
- Стоимость
- Очный формат: 1 293 000 ₸
- Онлайн формат: 1 280 000 ₸
Описание курса
Course Description
The Designing Cisco Data Center Infrastructure (DCID) provides training on designing data centers using Cisco data centers solutions and technologies. Topics covered include network designs with virtualization technologies, Layer 2 and Layer 3 technologies and routing protocols, and data center interconnect design options. You’ll learn design practices for the Cisco Unified Computing System™ (Cisco UCS®) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric, while gaining experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This training also earns you 40 Continuing Education (CE) credits towards recertification.
This training helps you prepare to take the exam:
300-610 Designing Cisco Data Center Infrastructure (DCID)How You'll Benefit
This training will help you:
Make design choices for optimal data center infrastructure performance, virtualization, security, and automation
Master the practical and theoretical knowledge necessary to design a scalable, reliable, and intelligent data center based on Cisco technologies
Qualify for professional-level job roles in the high-demand area of enterprise-class data center environmentsWho Should Enroll
IT professionals with five to eight years of experience in these roles:
Data center engineers
Network designers
Network administrators
Network engineers
Systems engineers
Consulting systems engineers
Technical solutions architects
Server administrators
Network managers
Cisco integrators or partnersWhat to Expect in the Exam
This exam certifies your knowledge of data center infrastructure design including network, compute, storage network, and automation.
After you pass 300-610 DCID:
You earn the Cisco Certified Specialist - Data Center Design certification and you will have satisfied the concentration exam requirement for the CCNP Data Center certification.Course Objectives
Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center
Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core
Describe Locator/ID separation protocol
Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding
Describe the hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center
Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV)
Describe security threats and solutions in the data center
Describe advanced data center security technologies and best practices
Describe device management and orchestration in the data center
Describe the storage options for the compute function and the different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective
Describe Fibre Channel concepts and architecture
Describe Fibre Channel topologies and industry terms
Describe Fibre Channel over Ethernet (FCoE)
Describe security options in the storage network
Describe the management and automation options for the storage networking infrastructure
Describe Cisco UCS servers and use cases for various Cisco UCS platforms
Explain the connectivity options for fabric interconnects for southbound and northbound connections
Describe the hyperconverged solution and integrated systems
Describe the systemwide parameters for setting up a Cisco UCS domain
Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager
Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager
Describe the different policies in the service profile
Describe the Ethernet and Fibre Channel interface policies and additional network technologies
Describe the advantages of templates and the difference between initial and updated templates
Describe data center automation toolsCourse Prerequisites
Before taking this offering, you should be able to:
Implement data center networking [Local Area Network (LAN) and Storage Area Network (SAN)]
Describe data center storage
Implement data center virtualization
Implement Cisco Unified Computing System (Cisco UCS)
Implement data center automation and orchestration with the focus on Cisco Application Centric Infrastructure (ACI) and Cisco UCS Director
Describe products in the Cisco Data Center Nexus and MDS familiesCourse Outline
Section 1: Describing High Availability on Layer 2
Section 2: Designing Layer 3 Connectivity
Section 3: Designing Data Center Topologies
Section 4: Designing Data Center Interconnects with Cisco OTV
Section 5: Describing Locator/ID Separation Protocol
Section 6: Describing VXLAN Overlay Networks
Section 7: Describing Hardware and Device Virtualization
Section 8: Describing Cisco FEX Options
Section 9: Describing Basic Data Center Security
Section 10: Describing Advanced Data Center Security
Section 11: Describing Management and Orchestration
Section 12: Describing Storage and RAID Options
Section 13: Describing Fibre Channel Concepts
Section 14: Describing Fibre Channel Topologies
Section 15: Describing FCoE
Section 16: Describing Storage Security
Section 17: Describing SAN Management and Orchestration
Section 18: Describing Cisco UCS Servers and Use Cases
Section 19: Describing Fabric Interconnect Connectivity
Section 20: Describing Hyperconverged and Integrated Systems
Section 21: Describing Cisco UCS Manager Systemwide Parameters
Section 22: Describing Cisco UCS RBAC
Section 23: Describing Pools for Service Profiles
Section 24: Describing Policies for Service Profiles
Section 25: Describing Network-Specific Adapters and Policies
Section 26: Describing Templates in Cisco UCS Manager
Section 27: Designing Data Center Automation.Lab Outline
Module 1: High Availability on Layer 2
Module 2: Designing Layer 3 Connectivity
Module 3: Designing Data Center Topologies
Module 4: Locator/ID Separation Protocol
Module 5: VXLAN Overlay Networks
Module 6: Hardware and Device Virtualization
Module 7: Cisco FEX Options
Module 8: Basic Data Center Security
Module 9: Advanced Data Center Security
Module 10: Management and Orchestration
Module 11: Storage and RAID Options
Module 12: Fibre Channel Topologies
Module 13: Fibre Channel Topologies
Module 14: FCoE
Module 15: Storage Security
Module 16: SAN Management and Orchestration
Module 17: Cisco UCS Servers and Use Cases
Module 18: Fabric Interconnect Connectivity
Module 19: Hyperconverged and Integrated Systems
Module 20: Cisco UCS Manager Systemwide Parameters
Module 21: Cisco UCS RBAC
Module 22: Pools for Service Profiles
Module 23: Policies for Service Profiles
Module 24: Network-Specific Adapters and Policies
Module 25: Templates in Cisco UCS Manager
Module 26: Designing Data Center Automation - DCIT — Troubleshooting Cisco Data Center Infrastructure
- Длительность: 5 дней (40 часов)
- Код курса: DCIT
- Стоимость
- Очный формат: 1 693 000 ₸
- Онлайн формат: 1 669 000 ₸
Описание курса
Course Description
The Troubleshooting Cisco Data Center Infrastructure (DCIT) training builds your knowledge and skills in troubleshooting LANs, SANs, Cisco Unified Fabric, Cisco Unified Computing System (Cisco UCS), and Cisco Application-Centric Infrastructure (Cisco ACI). You’ll gain hands-on experience resolving problems on Cisco Multilayer Director Switch (MDS) switches, Cisco Nexus switches, Cisco Fabric Extenders (FEXs), Cisco UCS, Cisco ACI, and more. This training also earns you 50 Continuing Education (CE) credits towards recertification.
This training helps prepare you to take the exam:
300-615 Troubleshooting Cisco Data Center Infrastructure (DCIT)How You'll Benefit
This training will help you:
Learn how to deploy and troubleshoot various components of Cisco data center infrastructure to support performance, resiliency, scalability needs
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Qualify for professional-level job rolesWho Should Enroll
Network designers
Network administrators
Network engineers
System engineers
Data center engineers
Consulting systems engineers
Technical solutions architects
Server administrators
Network managers
Cisco integrators and partnersWhat to Expect in the Exam
The 300-615 DCIT exam certifies your knowledge of troubleshooting a data center infrastructure including network, compute platforms, storage network, automation, management, and operations.
After you pass 300-615 DCIT, you earn the Cisco Certified Specialist - Data Center Operations certification and you satisfy the concentration exam requirement for new CCNP Data Center certification.Course Objectives
Describe how to troubleshoot the data center network
Describe the troubleshooting tools and methodologies that are available from the Command-Line Interface (CLI) and are used to identify and resolve issues in a Cisco Data Center network architecture
Identify and resolve issues that are related to Virtual LANs (VLANs) and private VLANs (PVLANs)
Identify and resolve issues that are related to port channels and virtual port channels
Identify and resolve issues that are related to VXLAN
Describe troubleshooting of routing and high-availability protocols
Describe troubleshooting of the LAN security features
Identify and resolve issues that are related to a single device
Identify and resolve issues that are related to Fibre Channel interface operation
Identify and resolve Fibre Channel switching issues when the Cisco NX-OS Software is used in switched mode
Identify and resolve issues that are related to Fibre Channel switching when a Cisco NX-OS switch is used in N-Port Virtualization (NPV) mode
Identify and resolve issues that are related to FIP and FCoE, including Fibre Channel over Ethernet (FCoE) performance
Describe Cisco UCS architecture, initial setup, tools, and service aids that are available for Cisco UCS troubleshooting and interpretation of the output
Describe Cisco UCS configuration and troubleshooting
Describe Cisco UCS B-Series Blade Server operation and troubleshoot related issues
Describe Cisco UCS B-Series LAN, SAN, and Fibre Channel operations, including in-depth troubleshooting procedures
Describe Cisco Integrated Management Controller (IMC) tools for validating performance and facilitating data-gathering activities for Cisco UCS C-Series server troubleshooting, and the troubleshooting approach for hardware and firmware failures
Define the proper procedures for configuring Cisco UCS C-Series LAN and SAN connectivity, avoiding issues with the VIC, and troubleshooting connectivity issues
Troubleshoot Cisco UCS C-Series server integration with Cisco UCS Manager
Identify the tools, protocols, and methods to effectively troubleshoot Cisco ACI
Describe how to troubleshoot automation and scripting tools
Describe how to troubleshoot programmabilityCourse Prerequisites
Before taking this offering, you should be able to:
Configure, secure, and maintain LAN and SAN based on Cisco Nexus and MDS switches
Configure, secure, and maintain Cisco Unified Computing System
Configure, secure, and maintain Cisco ACICourse Outline
Section 1: Describing the Troubleshooting Process
Section 2: Understanding CLI Troubleshooting Tools
Section 3: Troubleshooting VLANs and PVLANs
Section 4: Troubleshooting Port Channels and Virtual Port Channels
Section 5: Troubleshooting VXLAN
Section 6: Troubleshooting Routing and High-Availability Protocols
Section 7: Troubleshooting Data Center LAN Security
Section 8: Troubleshooting Platform-Specific Issues
Section 9: Troubleshooting Fibre Channel Interfaces
Section 10: Troubleshooting Fibre Channel Fabric Services
Section 11: Troubleshooting NPV Mode
Section 12: Troubleshooting FCoE
Section 13: Troubleshooting Cisco UCS Architecture and Initialization
Section 14: Troubleshooting Cisco UCS Configuration
Section 15: Troubleshooting Cisco UCS B-Series Servers
Section 16: Troubleshooting Cisco UCS B-Series LAN and SAN Connectivity
Section 17: Troubleshooting Cisco UCS C-Series Servers
Section 18: Troubleshooting Cisco UCS C-Series LAN and SAN Connectivity
Section 19: Troubleshooting Cisco UCS C-Series and Cisco UCS Manager Integration
Section 20: Exploring the Tools and Methodologies for Troubleshooting Cisco ACI
Section 21: Troubleshooting Automation and Scripting Tools
Section 22: Troubleshooting ProgrammabilityLab Outline
Discovery 1: Document the Network Baseline
Discovery 2: Troubleshoot Rapid PVST+
Discovery 3: Troubleshoot LACP
Discovery 4: Troubleshoot vPC
Discovery 5: Troubleshoot VXLAN
Discovery 6: Troubleshoot OSPF
Discovery 7: Troubleshoot FHRP
Discovery 8: Troubleshoot Cisco Fabric Services
Discovery 9: Troubleshoot VRF
Discovery 10: Troubleshoot Cisco FEX
Discovery 11: Troubleshoot Fibre Channel Interfaces
Discovery 12: Troubleshoot Fibre Channel VSANs, Zones, and Domain Services
Discovery 13: Troubleshoot NPV Mode
Discovery 14: Troubleshoot FCoE
Discovery 15: Troubleshoot DCB
Discovery 16: Troubleshoot Cisco UCS Management and Service Profile Deployment
Discovery 17: Troubleshoot Cisco UCS C-Series Server LAN Connectivity
Discovery 18: Troubleshoot Cisco UCS C-Series Server Boot from the Fibre Channel LUN
Discovery 19: Troubleshoot Cisco UCS C-Series Server Management Connectivity
Discovery 20: Troubleshoot Cisco ACI Integration with VMware vCenter
Discovery 21: Troubleshoot Contracts in Cisco ACI
Discovery 22: Troubleshoot Cisco ACI External Layer 3 Connectivity
Discovery 23: Troubleshoot Cisco ACI External Layer 2 Connectivity - DCACI — Implementing Cisco Application Centric Infrastructure
- Длительность: 5 дней (40 часов)
- Код курса: DCACI
- Стоимость
- Очный формат: 1 750 000 ₸
- Онлайн формат: 1 731 000 ₸
Описание курса
Course Description
The Implementing Cisco Application Centric Infrastructure (DCACI) training introduces you to the implementation and management of the Cisco Nexus 9000 Series Switches in Cisco Application Centric Infrastructure (ACI) mode. The 5-day lab-intensive training covers the key components and procedures you need to know to understand, configure, and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and fundamentals of Virtual Machine Manager (VMM) integration.
This training prepares you for the 300-620 DCACI exam, which certifies your knowledge of working with Cisco switches in ACI mode including configuration, implementation, and management. After you pass 300-620 DCACI, you earn the Cisco Certified Specialist – Data Center ACI Implementation certification and you satisfy the concentration exam requirement for the CCNP Data Center certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Gain the skills and hands-on practice integrating the enhanced, automated capabilities of Cisco Nexus 9000 Series Switches in ACI mode for quicker application deployment
Get the knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center job roles
Earn 40 CE credits toward recertificationWho Should Enroll
Primary audience includes:
Network Designer
Network Administrator
Network Engineer
Systems Engineer
Data Center Engineer
Consulting Systems Engineer
Technical Solutions Architect
Cisco Integrators/Partners
Field EngineerSecondary audience includes:
Server Administrator
Network Manager
Storage Administrator
Program Manager
Project ManagerWhat to Expect in the Exam
300-620 DCACI: Implementing Cisco Application Centric Infrastructure is a 90-minute exam associated with the Cisco Certified Specialist – Data Center ACI Implementation certification and satisfies the concentration exam requirement for the CCNP Data Center certification.
The multiple-choice format tests your knowledge of Cisco switches in ACI mode including:
ACI Fabric Infrastructure
ACI Packet Forwarding
External Network Connectivity
Integrations
ACI Management
ACI AnywhereCourse Objectives
Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts
Describe Cisco ACI policy model logical constructs
Describe Cisco ACI basic packet forwarding
Describe external network connectivity
Describe VMM Integration
Describe Layer 4 to Layer 7 integrations
Explain Cisco ACI management featuresCourse Prerequisites:
Before taking this offering, you should have:
Understanding of networking protocols, routing, and switching
Familiarity with Cisco Ethernet switching products
Understanding of Cisco data center architecture
Familiarity of virtualization fundamentalsCourse Outline:
Section 1: Introducing Cisco ACI Fabric Infrastructure and Basic Concepts
Section 2: Describing Cisco ACI Policy Model Logical Constructs
Section 3: Describing Cisco ACI Basic Packet Forwarding
Section 4: Introducing External Network Connectivity
Section 5: Introducing VMM Integration
Section 6: Describing Layer 4 to Layer 7 Integrations
Section 7: Explaining Cisco ACI ManagementLab Outline:
Discovery 1: Validate Fabric Discovery
Discovery 2: Configure NTP
Discovery 3: Create Access Policies and vPC
Discovery 4: Enable Layer 2 Connectivity in the Same EPG
Discovery 5: Enable Inter-EPG Layer 2 Connectivity
Discovery 6: Enable Inter-EPG Layer 3 Connectivity
Discovery 7: Compare Traffic Forwarding Methods in a Bridge Domain
Discovery 8: Configure External Layer 2 Connection
Discovery 9: Configure External Layer 3 (L3Out) Connection
Discovery 10: Integrate Cisco APIC with VMware vCenter Using VMware VDS - DCCUCS — Configuring Cisco Unified Computing System
- Длительность: 3 дня (24 часа)
- Код курса: DCCUCS
- Стоимость
- Очный формат: 1 137 000 ₸
- Онлайн формат: 1 126 000 ₸
Описание курса
Course Description
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System™ (Cisco UCS®) B-series blade servers, Cisco UCS C-Series, and S-Series rack servers for use in data centers. You will learn how to implement management and orchestration software for Cisco UCS. You will gain hands-on practice: configuring key features of Cisco UCS, Cisco UCS Director, and Cisco UCS Manager; implementing UCS management software including Cisco UCS Manager and Cisco Intersight™; and more.
How You'll Benefit
This course will help you:
Gain in-depth experience implementing and maintaining Cisco UCS servers to help you accelerate and provide robust UCS deployments
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and softwareWho Should Enroll
Server administrators
Network engineers
Systems engineers
Consulting systems engineers
Technical solutions architects
Network administrators
Storage administrators
Network managers
Cisco integrators and partnersCourse Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
General knowledge of servers
Routing and switching knowledge
Storage area networking knowledge
Server virtualization knowledge
These are the recommended Cisco courses that may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA) v1.0
Understanding Cisco Data Center Foundations (DCFNDU) v1.0
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
Introducing Cisco Unified Computing System (DCIUCS) v1.0
Introducing Cisco Data Center Networking (DCICN) v6.2
Introducing Cisco Data Center Technologies (DCICT) v6.2
Interconnecting Cisco Networking Devices: Accelerated (CCNAX) or Interconnecting Cisco Networking Devices Part 1 (ICND1) and Interconnecting Cisco Networking Devices Part 2 (ICND2)Course Objectives
After taking this course, you should be able to:
Describe and implement SAN on Cisco UCS
Describe Cisco UCS policies for service profiles
Describe and implement Role-Based Access Control (RBAC) on Cisco UCS
Describe and implement external authentication providers on Cisco UCS Manager
Describe and implement key management on Cisco UCS Manager
Describe Cisco UCS Director
Describe and implement Cisco Intersight
Describe the scripting options for Cisco UCS Manager
Describe and implement monitoring on Cisco UCS ManagerCourse Outline
Implementing Cisco UCS Storage Area Network (SAN)
SAN Introduction
Cisco UCS Fabric Interconnect Fibre Channels modes
Named VSANs
Cisco UCS Fibre Channel and FCoE Storage ConnectivityDescribing Cisco UCS Policies for Service Profiles
Storage Policies and Profiles
Basic Input Output System (BIOS) Policies
Boot Policy
Intelligent Platform Management Interface (IPMI) Policies
Scrub Policies
Maintenance PoliciesDescribing Cisco Adapter FEX and Single Root I/O Virtualization
Cisco FEX Overview
Cisco Adapter FEX
Single Root I/O VirtualizationImplementing RBAC on Cisco UCS
RBAC in Cisco UCS
Users, Roles, and Privileges
Functions of Organizations and Locales
Effective Rights of a UserImplementing External Authentication Providers
Options for External Authentication ProvidersImplementing Key Management on Cisco UCS Manager
Public Key InfrastructureImplementing Cisco UCS Director
Cisco UCS Director Overview
Policies, Virtual Data Centers, and Catalogs
Cisco UCS Director Virtualization Support
Managing Compute with Cisco UCS Director
Cisco UCS Manager Orchestration
Self-Service Portal
Reporting and Monitoring in Cisco UCS DirectorImplementing Cisco Intersight
Cisco UCS Director Overview
Important Features of Cisco IntersightDescribing the Scripting Options for Cisco UCS Manager
Cisco UCS Manager XML API
Cisco UCS Management Information Tree
Managed Object Browser
Cisco UCS PowerTool
Cisco UCS Python Software Development Kit (SDK)Implementing Key Management on Cisco UCS Manager
Public Key InfrastructureImplementing Cisco Intersight
Cisco Intersight Overview
Important Features of Cisco IntersightDescribing the Scripting Options for Cisco UCS Manager
Cisco UCS Manager XML API
Cisco UCS Management Information Tree
Managed Object Browser
Cisco UCS Manager PowerTool
Cisco UCS Python SDKImplementing Monitoring on Cisco UCS Manager
Logging Sources in Cisco UCS Manager
Port Monitoring Capabilities of Cisco UCS Manager
Simple Network Management Protocol (SNMP) Security Ramifications
Cisco UCS Manager Call Home FeatureLab Outline
Configure Pod-Specific Device Aliases
Configure Zoning
Configure VSANs in Cisco UCS Manager
Configure Unified Ports on Cisco UCS Fabric Interconnects
Install and Boot VMware Elastic Sky X Integrated (ESXi) on Cisco UCS from the FCoE Logical Unit Number (LUN) via FCoE
Configure RBAC
Configure Cisco UCS Manager to Authenticate Users via Open Lightweight Directory Access Protocol (OpenLDAP)
Configure a Trusted Point and Key Ring in Cisco UCS Manager
Configure Cisco UCS Manager Using Scripting
Implement Syslog and Call Home - DCIUCS — Introducing Cisco Unified Computing System
- Длительность: 2 дня (16 часов)
- Код курса: DCIUCS
- Стоимость
- Очный формат: 888 000 ₸
- Онлайн формат: 880 000 ₸
Описание курса
Course Description
The Introducing Cisco Unified Computing System (DCIUCS) v1.0 is an introductory course that shows you how to deploy, secure, operate, and maintain the Cisco Unified Computing system (Cisco UCS) B-Series blade servers, Cisco UCS C-Series and S-Series rack servers, and Cisco HyperFlex™ product family for use in data centers. You will gain hands-on practice on basic Cisco UCS server configuration, performing backup and restore activities, and more.
How You'll Benefit
This course will help you:
Learn how to implement and maintain Cisco UCS servers
Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software
Prepare for data center job rolesWho Should Enroll
Server administrators
Network engineers
Systems engineers
Consulting systems engineers
Technical solutions architects
Network administrators
Storage administrators
Network managers
Sales engineers
Cisco integrators and partnersCourse Objectives
After taking this course, you should be able to:
Describe Cisco UCS server hardware
Describe Cisco UCS connectivity
Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization
Describe and configure Cisco UCS service profiles
Describe and configure Cisco UCS service profile templates
Describe and implement Internet Small Computer Systems Interface (iSCSI) on Cisco UCS
Describe and implement Cisco UCS firmware updates
Describe and implement Cisco UCS backupsCourse Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
General knowledge of servers
Routing and switching
Storage area networking
Server virtualizationThese Cisco courses are recommended to help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU) v1.0
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)Course Outline
Describing Cisco UCS Server Hardware
Cisco UCS B-Series Blade Servers
Cisco UCS C-Series Rack Servers
Cisco UCS S-Series Rack Servers
Cisco Virtual Interface Cards
Hyperconvergence Overview
Cisco HyperFlex HX-Series ServersDescribing Cisco UCS Connectivity
Cisco UCS Fabric Interconnect
Cisco UCS B-Series Connectivity
Cisco UCS C-Series Connectivity
Cisco UCS S-Series Connectivity
Cisco HyperFlex Connectivity Architecture
Cisco HyperFlex Edge Connectivity
Cisco UCS Fabric Interconnect Ethernet End-Host Mode Compared to Switching Mode
Cisco UCS Fabric Interconnect Uplink Pinning
Cisco UCS C-Series IntegrationDescribing the Cisco HyperFlex HX Data Platform
Cisco HyperFlex HX Data Platform Software
Writing Data to Cisco HyperFlex HX Data Platform
Reading Data from Cisco HyperFlex HX Data Platform
Data Optimization in Cisco HyperFlex HX Data PlatformConfiguring Cisco UCS Service Profiles
Portability Issue with Nonabstracted Identities
Cisco UCS Service Profile
Identity Pools
Server Pools
IP PoolsConfiguring Cisco UCS Service Profile Templates
Service Profile TemplatesImplementing iSCSI on Cisco UCS
iSCSI Addressing
iSCSI Support in Cisco UCSImplementing Cisco UCS Firmware Updates
Update Cisco UCS C-Series Server Firmware
Download Tasks for the Infrastructure Image
Download Tasks for Cisco UCS B-Series Firmware Packages
Best Practices for Updating Firmware in Cisco UCS Manager
Firmware Upgrades Using Auto Install
Capability Catalog Updates
Host Firmware Packages
Driver Updates for Operating Systems and HypervisorsImplementing Cisco UCS Backups
Compare Backup Options in Cisco UCS Manager
Compare Two Import Types
Policy BackupLab Outline
Explore Cisco UCS Manager GUI
Configure Server and Uplink Ports
Configure VLANs
Configure Basic Identity Pools
Configure a Cisco UCS Service Profile Using Pools
Configure a Service Profile Template
Configure an iSCSI Service Profile on Cisco UCS
Perform Backup and Restore Activities - ENC9K — Implementing Cisco Catalyst 9000 Series Switches
- Длительность: 3 дня (24 часа)
- Код курса: ENC9K
- Стоимость
- Очный формат: 869 000 ₸
- Онлайн формат: 775 000 ₸
Описание курса
Course Description
The Implementing Cisco Catalyst 9000 Series Switches (ENC9K) v4.0 course provides you with insight into Cisco Catalyst 9000 Series Switches and its solution components. You will learn about the architecture, capabilities, positioning, and implementation of the Cisco Catalyst 9000 Series switches, as well as the management of the switches using CLI, Cisco DNA Center, and IOS-XE web user GUI. Additionally, you will be introduced to security, cloud, automation, and other important features of Cisco Catalyst 9000 Series switches.
How You'll Benefit
This course will help you:
Prepare for successful deployment of the Cisco Catalyst 9000 Series Switches
Understand the role of Cisco Catalyst 9000 Series Switches in the SD-Access fabric
Learn to provision Cisco Catalyst 9000 Series Switches using Cisco DNA center as the orchestration platform
Gain hands-on practice through in-depth lab exercisesWho Should Enroll
Network designers
Network managers
System engineersCourse Objectives
After taking this course, you should be able to:
Review the Cisco Catalyst 9000 Series Switches identify the switches’ features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution.
Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration.
Identify the role and value of Cisco Silicon One in a campus environment.
Examine management capabilities of the Cisco Catalyst 9000 Series Switches.
Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches.
Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features.
Describe automation features, Application Programming Interface (API), Infrastructure as Code, and automation tools supported on Cisco Catalyst 9000 Series switches.
Describe the new QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches.
Describe the maintenance features on Cisco Catalyst 9000 Series switches.
Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices.
Automate Day 0 device onboarding with Cisco DNA Center LAN Automation and Network PnP.
Describe how to manage and host applications on Cisco Catalyst 9000 Series switches using Cisco DNA Center.
Explore a modern approach to cloud-managed networking for Cisco Catalyst 9000 Series switches and wireless access points that uses the Meraki Dashboard and analytics.
Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities.
Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables.
Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports
Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles.
Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features.Course Prerequisites
You are expected to have the following knowledge and skills before attending this course:
Cisco CCNP® certification or equivalent experience
Knowledge of configuring LAN routing and switching with Cisco Catalyst switches
Familiarity with the Cisco IOS XE operating system
Familiarity with using network management software
Familiarity with Cisco Intent-based networking and policy-based management automation technologiesThe following Cisco offerings can help you prepare for this course:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Introducing the Cisco Catalyst 9000 Series Switches
Positioning Cisco Catalyst 9000 Series Switches
Cisco Catalyst Silicon One Architecture
Exploring Cisco Catalyst 9000 Series Switches Management Capabilities
Scale and Performance Features on Cisco Catalyst 9000 Series Switches
Security Features on Cisco Catalyst 9000 Series Switches
Automation Features on Cisco Catalyst 9000 Series Switches
QoS, IoT, and BGP EVPN Features on Cisco Catalyst 9000 Series Switches
Maintenance Features on Cisco Catalyst 9000 Series Switches
Cisco SD-Access Solution on Cisco Catalyst 9000 Series Switches
Application Hosting on Cisco Catalyst 9000 Series Switches
Cloud Management for Catalyst 9000 Series Using Meraki Dashboard
Automating Network Changes with Cisco DNA Center
Introducing Cisco Catalyst 9200 Series Switches
Introducing Cisco Catalyst 9300 Series Switches
Introducing Cisco Catalyst 9400 Series Switches
Introducing Cisco Catalyst 9500 Series Switches
Introducing Cisco Catalyst 9600 Series SwitchesLab Outline
Configure and Troubleshoot Network Issues Using WebGUI
Application Hosting on Cisco Catalyst 9000 Series Switches Using the CLI
Configure a Switch Stack Using Cisco Catalyst 9300 Series Switches
Enable and Verify Switch-to-Switch MACSec
Enable and Verify Encrypted Traffic Analytics
Explore Switch Management Automation and Programmability
Network Automation Using Ansible Playbooks and Terraform Scripts on the Cisco IOS XE
Configure Perpetual PoE and fast PoE on the Cisco Catalyst 9000 Series Switches
Configure Packet Capture on Cisco Catalyst 9300 Series Switches
Perform GIR on a Cisco Catalyst 9000 Series Switch
Application Hosting on Cisco Catalyst 9300 Using Cisco DNA Center
Integrate Cisco DNA Center and Cisco ISE
Provision Underlay Networks with Cisco DNA Center LAN Automation - DCAUI — Implementing Automation for Cisco Data Center Solutions
- Длительность: 3 дня (24 часа)
- Код курса: DCAUI
- Стоимость
- Очный формат: 886 500 ₸
- Онлайн формат: 802 000 ₸
Описание курса
Course Description
The Implementing Automation for Cisco Data Center Solutions (DCAUI) training shows you how to implement Cisco Data Center automated solutions, including programming concepts, orchestration, and automation tools. The goal of this 5-day training is to highlight the tools and benefits of leveraging programmability and automation in the Cisco-powered Data Center. Examined platforms include Cisco ACI (the controller-based Data Center environment), Cisco NX-OS on all Cisco Nexus platforms for device-centric automation, and Cisco UCS for Data Center compute. Their current ecosystem of APIs, software development toolkits, and relevant workflows is inspected in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG.
This training prepares you for the 300-635 Automating and Programming Cisco Data Center Solutions (DCAUTO) certification exam. Introducing Automation for Cisco Solutions (CSAU) is required prior to enrolling in Implementing Automation for Cisco Data Center Solutions (DCAUI) because it provides crucial foundational knowledge essential to success. This training also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will teach you to implement Cisco Data Center automated solutions to:
Learn the tools and the benefits of leveraging programmability and automation in the Cisco-powered Data Center
Examine platforms include Cisco ACI (the controller-based Data Center environment), Cisco NX-OS on all Cisco Nexus platforms for device-centric automation, and Cisco UCS for Data Center compute
Inspect the current ecosystem of APIs, software development toolkits, and relevant workflows in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANGWho Should Enroll
Channel and Customer Engineers including Network Engineers, System Engineers, Wireless Engineers, Consulting Systems Engineers, Technical Solutions Architects, Network Administrators, Wireless Design Engineers, Network Managers, Site Reliability Engineers, and Deployment Engineers
Channel Sales Engineers
Channel Account ManagersWhat to Expect in the Exam
300-635 DCAUTO: Automating and Programming Cisco Data Center Solutions is a 90-minute exam associated with the Cisco Certified DevNet Specialist–Data Center Automation and Programmability certification and satisfies the concentration exam requirements for these professional-level certifications:
CCNP Data Center
Cisco Certified DevNet ProfessionalThe multiple-choice format tests knowledge and skills related to implementing Data Center automated solutions, including:
Programming concepts
Orchestration
Automation toolsCourse Objectives
Review Cisco ACI fundamental concepts, GUI workflows, and create the case for implementing automation
Introduce the Cisco ACI REST API, the tools already available on the Cisco APIC, and understand basic API interaction using Postman
Understand the functionality provided by the Python ACI libraries and write scripts that apply configuration and verify state on the Cisco ACI fabric
Understand Cisco ACI Ansible modules, build playbooks that apply Infrastructure-as-Code concepts to Cisco ACI tenant configuration, and generate a health report using Ansible
Understand Cisco ACI Apps Center integration and the benefits of integrating Kubernetes infrastructure with Cisco ACI
Understand the API types and capabilities available on Cisco Nexus product family
Understand Day 0 operations and how ZTP, POAP, and iPXE fulfill these goals with their respective tooling
Understand functionality provided by the on-box tooling on the Cisco Nexus series switches and implement simple solutions to improve daily operations
Use Python and Ansible to leverage the NX-API to implement and verify configuration state using modern workflows
Understand the paradigm shift of Model-Driven Telemetry and explore a fully set up pipeline for data collection and analysis
Understand the Cisco UCS developer tools and implement management workflows leveraging Cisco UCS APIs, Python, and Ansible modules
Review Cisco NDFC product capabilities and understand how its API can be leveraged to automate the Cisco Data Center
Understand the advantages of using Cisco Intersight and how to implement automation tasks using its REST APIs via Python and Ansible
Describe Terraform plans for Cisco ACI deploymentsCourse Prerequisites
Before taking this offering, you should have:
Basic knowledge of programming language concepts
Basic understanding of virtualization and VMware
Ability to use Linux and CLI tools, such as SSH and bash
CCNP level data center knowledge
Foundational understanding of Cisco ACICourse Outline
Describing the Cisco ACI Policy Model
Describing the Cisco APIC REST API
Using Python to Interact with the Cisco ACI REST API
Using Ansible to Automate Cisco ACI
Introducing Cisco NX-OS Programmability
Describing Day-Zero Provisioning with Cisco NX-OS
Implementing On-Box Programmability and Automation with Cisco NX-OS
Implementing Off-Box Programmability and Automation with Cisco NX-OS
Automating Cisco UCS Using Developer Tools
Describing Cisco IntersightLab Outline
Use Cisco APCI Web GUI
Discover the Cisco APIC REST API
Use Postman with the APIC REST API
Use Python with Cisco APIC REST API
Configure and Verify Cisco ACI Using Acitoolkit
Use Cobra and Arya to Recreate a Tenant
Manage Configuration Using Ansible
Set Up a New Tenant the NetDevOps Way
Create an Infrastructure Health Report
Set Up Power On Auto Provisioning on the Cisco Nexus 9000
Use Bash and Guest Shell on Cisco NX-OS
Use Python to Enhance CLI Commands
Trigger a Python Script Using EEM
Configure and Verify Using NX-API and Python
Configure and Verify Using NETCONF and YANG
Use Ansible with Cisco NX-OS
Connect, Query, and Modify Cisco UCS Manager Objects Using Cisco UCS PowerTool
Connect, Query, and Modify Cisco UCS IMC Objects Using Cisco UCS PowerTool
Utilize Cisco UCS Python SDK
Utilize Cisco IMC Python SDK
Implement Ansible Playbooks to Modify and Verify the Configuration of Cisco UCS Manager - DCNX — Implementing Cisco NX-OS Switches and Fabrics in the Data Center
- Длительность: 5 дней (40 часов)
- Код курса: DCNX
- Стоимость
- Очный формат: 1 388 000 ₸
- Онлайн формат: 1 369 000 ₸
Описание курса
Course Overview
The Implementing Cisco NX-OS Switches and Fabrics in the Data Center training gives you a detailed understanding of the Cisco® Nexus switch platform and teaches you how to install, configure, and manage Cisco Nexus® switch platforms in a scalable, highly available environment. Through a combination of lectures and hands-on labs, you will learn how to describe various aspects of the Cisco Nexus product families and platforms, including implementation, management, security, programmability and storage. Additionally, you will learn how to configure device aliases and zoning, Fibre Channel over Ethernet (FCoE), and N-Port Identifier Virtualization (NPIV), and N-Port Virtualization (NPV) mode.
This training also earns you 40 Continuing Education (CE) credits towards recertification.How you’ll benefit
This course will help you:
Describe, implement, configure, and manage Cisco Nexus product families and platforms, including redundancy protocols and security features, in a scalable environment
Gain valuable hands-on experience with Cisco Nexus products in a lab setting
Develop expertise with the Cisco Nexus product families and platformsWho should attend
Data center systems engineers
Field engineers
Architects
Cisco partners using Cisco Nexus Series switch platformsCourse Objectives
Describe the platforms that make the Cisco Nexus 9000, 7000, 3000, and 2000 product families
Describe Cisco Nexus platform implementations
Explain Cisco Nexus platform management
Describe Port Channels and Virtual Port Channels
Configure First Hop Redundancy protocols
Configure security features of Cisco Nexus devices
Describe the Cisco Nexus devices routing and forwarding
Describe Virtual Extensible LAN (VXLAN)
Describe Quality of Service (QoS) on Cisco Nexus Devices
Explain system management and monitoring processes
Describe Cisco NX-OS programmability
Describe Cisco Nexus storage services
Configure device aliases and zoning
Configure FCoE
Configure NPIV and NPV modesCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Be familiar with Cisco data center technologies
Understand networking protocols, routing, and switchingThe following recommended Cisco offerings may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)Course Outline
Describing Cisco Nexus Series Switches
Describing Cisco Nexus Platforms Implementation
Describing Cisco Nexus Platforms Management
Describing Port Channels and Virtual Port Channels
Configuring First Hop Redundancy Protocols
Configuring Cisco Nexus Security Features
Describing Cisco NX-OS Routing and Forwarding
Describing Virtual Extensible LAN
Describing QoS on Cisco Nexus Devices
Configuring System Management and Monitoring
Describing Cisco NX-OS Programmability
Describing Cisco Nexus Storage Services
Configuring Fibre Channel Over Ethernet
Describing Device Aliases and Zoning
Configuring NPIV and NPV ModesLab Topology
Test Cisco Nexus Platforms
Configure User Management
Configure vPC
Configure First Hop Redundancy Protocol (FHRP) Protocols
Configure Cisco Nexus Security Features
Configure Open Shortest Path First (OSPF)
Configure VXLAN
Configure QoS
Configure System Management
Configure Cisco NX-OS On-Box Programmability
Configure Containers on Cisco NX-OS
Configure Cisco NX-OS Using Ansible
Configure Basic Fibre Channel Features
Configure FCoE
Configure Fiber Channel Device Aliases and Zoning
Configure NPV - DCNXA- Implementing Cisco Nexus 9000 Switches in NX-OS Mode – Advanced
- Длительность: 4 дня (32 часа)
- Код курса: DCNXA
- Стоимость
- Очный формат: 1 601 000 ₸
- Онлайн формат: 1 572 000 ₸
Описание курса
Description
The Implementing Cisco Nexus 9000 Switches in NX-OS Mode–Advanced (DCNXA) training provides advanced training
in applying and managing the Cisco Nexus® 9000 Series Switches in NX-OS mode. The Cisco® NX-OS platform deploys
Virtual Extensible LAN (VXLAN) and Ethernet VPN (EVPN) using Cisco Data Center Network Manager (DCNM),
implements Multi-Site VXLAN EVPN, and integrates L4-L7 services into the fabric providing external connectivity, utilizing
advanced tenant features. You will also learn how to implement Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and
Intelligent Traffic Director (ITD) features.
This training also earns 32 Continuing Education (CE) credits toward recertification.How you’ll benefit
This training will help you:
Learn how you can integrate Cisco Nexus 9000 Switches in NX-OS mode to manage your enterprise IT
environment
Understand the common platform architecture and key features of the Cisco Nexus 9000 Series in NX-OS mode
to provide a consistent set of provisioning, management, and diagnostic capabilities for applications
Earn 32 CE credits toward recertificationWho should enroll
Data Center Engineers
Field Engineers
Network Designers
Network Administrators
Network Engineers
Systems Engineers
Technical Solutions ArchitectsTechnology areas
Data Center
Objectives
Configure VXLAN EVPN in a single site using Cisco DCNM
Configure a Multi-Site VXLAN EVPN
Configure L4-L7 service redirection
Configure external connectivity from a VXLAN EVPN
Configure tenant-level features and Tenant-Routed Multicast (TRM) in VXLAN EVPN
Configure Cisco NX-OS Enhanced Policy-Based Redirect (ePBR) and Intelligent Traffic Director (ITD)Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending
this training are:
Networking protocols, routing, and switching
General Cisco data center technologies
Virtualization fundamentals
Cisco Nexus platform management
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
Implementing Cisco Nexus 9000 Switches in NX-OS Mode (DCNX)Outline
Describing VXLAN EVPN in Single Site
Describing Multi-Site VXLAN EVPN
Describing Layer 4-Layer 7 Service Redirection
Describing External Connectivity from VXLAN EVPN
Describing VXLAN EVPN Functionality Enhancements
Describing Cisco NX-OS Enhanced Policy-Based Redirect and Intelligent Traffic DirectorLab Outline
Import an Existing VXLAN Border Gateway Protocol (BGP) EVPN Fabric into Cisco DCNM
Configure vPC and Layer 3 Connectivity
Configure Multi-Site VXLAN EVPN
Configure Routed Firewall Integration into VXLAN EVPN Using PBR
Configure External VRF Lite Connectivity and Endpoint Locator
Configure Tenant DHCP Relay
Configure Tenant-Routed Multicast
Configure Enhanced Policy-Based Redirect
Configure Traffic Load-Balancing Using the ITD - DCACIT — Troubleshooting Cisco Application Centric Infrastructure
- Длительность: 2 дня (16 часов)
- Код курса: DCACIT
- Стоимость
- Очный формат: 995 000 ₸
- Онлайн формат: 973 000 ₸
Описание курса
Course Description
The Troubleshooting Cisco Application-Centric Infrastructure (DCACIT) v5.2 course teaches you through a combination of lectures and labs the key components and procedures needed to troubleshoot Cisco Nexus 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. This course is for advanced engineers who have installed and managed existing fabrics or for those who have completed the Implementing Cisco Application-Centric Infrastructure-Advanced (DCACI) course.
How You'll Benefit
This course will help you:
Learn how to design policy-driven automation to streamline the deployment lifecycle
Integrate a comprehensive solution using any hypervisor, supporting any workload, for any location, and in any cloud
Expand your knowledge of Cisco Nexus 9000 Series SwitchesWho Should Enroll
This course is ideal for developers and engineers including:
Network engineers
Systems engineers
Data center engineers
Consulting systems engineers
Technical solutions architects
Cisco integrators/partners
Field engineers
Server administrators
Network managersCourse Objectives
After taking this course, you should be able to:
Apply troubleshooting methodology to Cisco ACI networks
Troubleshoot logical and physical constructs of the Cisco ACI policy
Understand Cisco APIC and its troubleshooting aspects
Troubleshoot endpoint learning in Cisco ACI
Troubleshoot Layer 2 traffic bridging and Layer 3 routing in the Cisco ACI network
Troubleshoot hypervisor integration in Cisco ACI
Troubleshoot Layer 4 to Layer 7 service insertion
Troubleshoot contracts and route leaking in Cisco ACICourse Prerequisites
You should have the following knowledge and skills before attending this course:
Familiarity with data center infrastructure operations
Familiarity with management of Cisco data center switches
Basic programming
Basic network troubleshooting
System or network administration (Linux or Windows)
Data center operations
These are the recommended Cisco offerings that may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA) v1.0
Understanding Cisco Data Center Foundations (DCFNDU) v1.0
Implementing Cisco Application-Centric Infrastructure (DCACI) v1.0
Cisco Application-Centric Infrastructure Operation and Troubleshooting (DCACIO) v5.2Course Outline
Describing Cisco ACI Troubleshooting Methodology
Troubleshooting Logical and Physical Constructs
Troubleshooting Cisco APIC
Troubleshooting Endpoint Learning
Troubleshooting Layer 2
Troubleshooting Layer 3 Routing
Troubleshooting VMM Integration
Troubleshooting Layer 4-7 Service Insertion
Troubleshooting Contracts and Route LeakingLab Outline
Verify Endpoints
Examine VLANs
Troubleshoot ACI Policy
Troubleshoot CMM integrat - DCNDA — Cisco Nexus Dashboard Advanced
- Длительность: 3 дня (24 часов)
- Код курса: DCNDA
- Стоимость
- Очный формат: 717 500 ₸
- Онлайн формат: 623 000 ₸
Описание курса
Course Description
The Data Center Nexus Dashboard Advanced (DCNDA) training focuses on how to deploy and use Cisco Nexus Dashboard Insights (NDI) and Cisco Nexus Dashboard Orchestrator (NDO) to successfully monitor data center networks, and to provision a Cisco Application Centric Infrastructure (ACI)-based multisite network. The training is three days long and includes several activities that are either lab simulations or live labs. Activities that pertain to Nexus Dashboard Insights are implemented with lab simulations based on a real-world lab environment, while the lab activity related to Nexus Dashboard Orchestrator uses live software.
This training earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Learn how to deploy and use Cisco Nexus Dashboard Insights and Cisco Nexus Dashboard Orchestration to successfully monitor data center networks, and to provision a Cisco ACI-based multisite network
Gain leading-edge skills for a career focused on data center technology
Earn 24 CE credits toward recertificationWho Should Enroll
Data Center Network Administrators
Data Center Network Operators
Data Center Architects
Data Center Engineers
Data Center Technical Managers
IT Managers/Directors
Account ManagersCourse Objectives
Describe Cisco Nexus Dashboard Insights
Describe day-2 operational needs
Describe the Cisco Nexus Dashboard Insights installation on Cisco NexusDashboard
Describe Cisco Nexus Dashboard Insights switch telemetry
Describe assurance analysis including multisite assurance
Describe resource analysis
Describe alerts analysis
Describe Cisco NDI dashboards
Describe the options for exporting data from NDI
Describe Cisco NDI use cases
Explore Cisco Nexus Dashboard Insights
Explore vCenter Integration with Cisco NDI
Explore Cisco NDI Assurance functions
Describe Cisco Nexus Dashboard Orchestrator
Describe Cisco NDO features and use cases
Describe Cisco NDO platform support and the installation process
Describe Cisco intersite connectivity
Describe multisite schemas and templates
Describe multipod and multisite integration
Orchestrate Cisco NDO policiesCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Understanding of Cisco routing and switching in a data center
Fundamentals of network management and network operation
Understanding of Cisco ACI
These skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Data Center Foundations (DCFNDU)
Implementing Cisco Application Centric Infrastructure (DCACI)Course Outline
Cisco Nexus Dashboards Insights Overview
Day-2 Operational Needs
Cisco Nexus Dashboard Insights Installation on Cisco Nexus Dashboard
Cisco Nexus Dashboard Insights Switch Telemetry
Assurance Analysis Including Multisite Assurance
Resource Analysis
Alerts Analysis
Explore Cisco Nexus Dashboard Insights
Cisco Nexus Dashboard Insights Dashboards
Options for Exporting Data from Cisco Nexus Dashboard Insights
Cisco Nexus Dashboard Insights Use Cases
Cisco Nexus Dashboard Insights Integration with vCenter
Explore Cisco NDI Assurance Functions
Cisco NDO Overview
Cisco NDO Features and Use Cases
Cisco NDO Platform Support and Installation
Cisco NDO with Cisco ACI Multisite
Intersite Connectivity
Multisite Schemas and Templates
Multipod and Multisite Integration
Orchestrate Cisco NDO PoliciesLab Outline
Explore Cisco Nexus Dashboard Insights
Configure and Explore vCenter Integration with Cisco NDI
Explore Cisco NDI Assurance Functions
Orchestrate Cisco NDO Policies - DCNDE — Cisco Data Center Nexus Dashboard Essentials
- Длительность: 5 дней (40 часов)
- Код курса: DCNDE
- Стоимость
- Очный формат: 1 022 500 ₸
- Онлайн формат: 938 000 ₸
Описание курса
Course Description
The Cisco Data Center Nexus Dashboard Essentials training teaches you how to plan, implement, manage, operate, monitor, and troubleshoot the infrastructure of your data centers using the Cisco Nexus Dashboard platform.
The goal of this training is to provide fundamental knowledge for the Cisco Nexus Dashboard platform. It discusses the components and the structure of the platform, as well as how to plan for the installment and deployment, looking at the physical and virtual resource requirements, licensing, connectivity, cluster size, and software stack. Additionally, you will be acquainted with the Graphical User Interface (GUI) and the different functions to create and manage sites in the Cisco Nexus Dashboard. You will learn how to monitor, troubleshoot, and administer the platform, covering the authentication and authorization of the administrators’ access. This training also earns you 26 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the needed skills to utilize the Cisco Nexus Dashboard platform
Boost knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center roles
Earn 26 CE credits toward recertificationWho Should Enroll
Personnel seeking professional- or expert-level data center roles
Course Objectives
Explore the Cisco Nexus Dashboard platform
Explain Cisco Nexus Dashboard licensing options, cluster connectivity, GUI, software stack, roles, permissions, tech support, troubleshooting, and installation procedure for adding applications
Perform Cisco Nexus Dashboard firmware upgrades
Configure Cisco Nexus Dashboard remote authentication
Monitor Cisco Nexus Dashboard resources
Describe Cisco Nexus Dashboard Fabric Controller (NDFC) and its dashboards
Explore the Data Center with Cisco NDFC topology, including customizable templates, deployment, existing network devices, Virtual eXtensible Local Area Network (VXLAN) Ethernet Virtual Private Network (EVPN), Representational State Transfer (REST) Application Program Interface (API), migration, and image, license, and network management
Describe enhanced Role-Based Access Control (RBAC) for fabric objectsCourse Prerequisites
none
Course Outline
Cisco Nexus Dashboard Platforms
Cisco Nexus Dashboard Licensing Options
Cisco Nexus Dashboard Cluster Connectivity
Cisco Nexus Dashboard GUI Overview
Cisco Nexus Dashboard Software Stack
Cisco Nexus Dashboard Installation Procedures
Cisco Nexus Dashboard Firmware Upgrades
Application Installation on Cisco Nexus Dashboard
Cisco Nexus Dashboard Roles and Permissions
Cisco Nexus Dashboard Remote Authentication
Cisco Nexus Dashboard Resource Monitoring
Cisco Nexus Dashboard Tech Support and Troubleshooting
Add Sites to Cisco Nexus Dashboard
Explore Cisco Nexus Dashboard
Cisco Nexus Dashboard Fabric Controller Overview
Cisco Nexus Dashboard Fabric Controller Dashboards
Data Center Exploration with Cisco NDFC Topology
Cisco NDFC Customizable Templates
Image Management Using Cisco NDFC
License Management Using Cisco NDFC
Enhanced RBAC for Fabric Objects
Explore Cisco Nexus Dashboard Fabric Controller
Manage the Network with Cisco NDFC
Deploying Cisco Nexus Dashboard Fabric Controller
Discovering Network Devices with Cisco NDFC
Deploy VXLAN EVPN with Cisco NDFC
Managing and Monitoring the Data Center with Cisco NDFC
Cisco Nexus Dashboard Fabric Controller REST API
Cisco Data Center Network Manager to Cisco NDFC Migration
Configure and Execute Cisco NDFC POAP
Configure VXLAN with a BGP Control PlaneLab Outline
Connect Sites to Cisco Nexus Dashboard
Explore Cisco Nexus Dashboard
Explore Cisco Nexus Dashboard Fabric Controller
Manage the Network with Cisco NDFC
Configure and Execute Cisco NDFC POAP
Configure VXLAN with a BGP Control Plane - DCACIO — Cisco Application Centric Infrastructure Operations and Troubleshooting
- Длительность: 3 дня (24 часа)
- Код курса: DCACIO
- Стоимость
- Очный формат: 1 126 000 ₸
- Онлайн формат: 1 117 500 ₸
Описание курса
Course Description
The Cisco Application Centric Infrastructure Operations and Troubleshooting (DCACIO) v5.2 course shows you how to manage, monitor, and troubleshoot Cisco® Nexus® 9000 Series Switches in Application-Centric Infrastructure (ACI) mode. Through expert instruction and hands-on practice, you will learn about operational tools, best practices, caveats, and practice troubleshooting common issues on a live fabric. Based on lessons learned in wide range of production deployments, this course gives you the real-world knowledge and skills to boost operational efficiencies in your own deployment.
How You'll Benefit
This course will help you:
Quickly ramp up on Cisco ACI® operational knowledge, skills, and best practices honed from real-world production deployments
Gain hands-on troubleshooting techniques
Optimize the benefits of using Cisco ACI, such as streamlined operationsWho Should Enroll
This course is ideal for developers and engineers including:
Network Engineer
Systems Engineer
Data Center Engineer
Consulting Systems Engineer
Technical Solutions Architect
Cisco Integrators/Partners
Field Engineer
Server Administrator
Network ManagerCourse Objectives
After taking this course, you should be able to:
Describe the Cisco ACI built0in tools for operating and monitoring the fabric.
Describe the complex challenges related to monitoring and Cisco tools that address them: Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights.
Describe fabric installation upgrade, backup, restore, and best practices for Cisco NX-OS-to-ACI migration and Cisco ACI management access.
Describe the tools and best practices for monitoring ACI fabric.
Describe best practices for Cisco ACI naming conventions, Day-0 configuration, VMM integration, and Cisco ACI migrations.Course Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Understanding of ACI architecture and concepts need to get an ACI fabric into production
Familiarity with data center infrastructure operations
Familiarity with management of Cisco data center switches
Data center operationsThe following course will provide you with the required ACI skills:
Implementing Cisco Application-Centric Infrastructure (DCACI)
Implementing and Administering Cisco Solution (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)Course Outline
Describing Cisco ACI Day-0 to Day-2 Operations
Describing Day-2 Operational Tools
Describing Cisco ACI Configuration Management
Describing Cisco ACI Monitoring
Cisco ACI Best PracticesLab Outline
Safeguard ACI Operation Using Network Assurance Engine
Explore Cisco Network Insights and Nexus Dashboard
Configure SNMP and Perform Export/Import Operations
Monitor Cisco ACI and Configure Syslog
Configure ELAM Assistant
Explore the Management Information Tree
Configure SPAN - DCACIA — Implementing Cisco Application Centric Infrastructure — Advanced
- Длительность: 5 дней (40 часов)
- Код курса: DCACIA
- Стоимость
- Очный формат: 2 408 000 ₸
- Онлайн формат: 2 383 500 ₸
Описание курса
Course Description
The Implementing Cisco Application Centric Infrastructure–Advanced (DCACIA) training shows you how to integrate the capabilities of the Cisco Nexus 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode providing enhanced management and policy framework, along with the protocols used in the underlying fabric. The course also covers how to use Cisco ACI as a policy-driven solution that integrates software and hardware, and how to implement Cisco ACI Multi-Pod and Multi-Site deployments. You will gain hands-on practice implementing advanced ACI capabilities such as Rogue Endpoint Feature, Transit Routing, VRF Route Leaking, Contracts and Zoning Rules, Policy Based Redirect to Layer 4–7 Service Node, Multi-Pod Fabric and Cisco ACI Multi-Site Orchestrator.
How You'll Benefit
This course will help you:
Gain the skills and hands-on practice integrating the enhanced, automated capabilities of Cisco Nexus 9000 Series Switches in ACI mode for quicker application deployment
Get the knowledge for protocols, solutions and designs to acquire professional-level and expert-level data center job roles
Earn 40 CE credits toward recertificationWho Should Enroll
This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:
Network Designers
Network Administrators
Network Engineers
Systems Engineers
Data Center Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators/Partners
Field Engineers
Server Administrators
Network Managers
Storage Administrators
Cisco Integrators and PartnersWhat to Expect in the Exam
The 300-630 DCACIA exam certifies your knowledge of working with Cisco switches in ACI mode including configuration, implementation, and management.
After you pass 300-630 DCACIA, you earn the Cisco Certified Specialist – ACI Advanced Implementation certification and you satisfy the concentration exam requirement for the CCNP Data Center certification.
Course Objectives
After completing the course, you should be able to:
Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts
Describe Cisco ACI policy model logical constructs
Describe Cisco ACI basic packet forwarding
Describe external network connectivity
Describe VMM Integration
Describe Layer 4 to Layer 7 integrations
Explain Cisco ACI management featuresCourse Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Understanding of networking protocols, routing, and switching
Familiarity with Cisco Ethernet switching products
Understanding of Cisco data center architecture
Familiarity with virtualization fundamentalsThe following Cisco courses may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Understanding Cisco Data Center Foundations (DCFNDU)Course Outline
Section 1: Describing Cisco ACI Advanced Packet Forwarding
Section 2: Using Advanced Cisco ACI Policy and Tenant Configuration
Section 3: Implementing Traditional Network in Cisco ACI
Section 4: Describing Cisco ACI Service Graph PBR
Section 5: Describing Cisco ACI Multi-Pod Deployment
Section 6: Describing Cisco ACI MultiSite DeploymentLab Outline
Discovery 1: Examine Local and Remote Endpoint Learning
Discovery 2: Verify Bounce Entries
Discovery 3: Validate IP Learning
Discovery 4: Mitigate IP and MAC Flapping with the Rogue Endpoint Feature
Discovery 5: Enable Transit Routing
Discovery 6: Implement VRF Route Leaking - DCEIS — Cisco Intersight Essentials
- Длительность: 3 дня (24 часа)
- Код курса: DCEIS
- Стоимость
- Очный формат: 750 500 ₸
- Онлайн формат: 655 500 ₸
Описание курса
Course Description
The Cisco Intersight Essentials training teaches you various aspects of Cisco Unified Computing System (UCS), including hardware, connectivity, and management. You will learn Cisco Intersight characteristics, licensing, and features, along with insights into server profile deployment and prerequisites for installing operating systems from Cisco Intersight.
This training prepares you for configuring, managing, and monitoring your network, computing, and storage assets. You will gain experience using features, such as Cisco Intersight Workload Optimizer (IWO), Cisco Intersight Cloud Orchestrator (ICO), and Cisco Intersight Virtualization Services (IVS). Also, you will become familiar with the Cisco Intersight Application Programming Interface (API) by using HashiCorp Terraform to automate Cisco Intersight configuration. This training also earns you 18 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the needed skills to utilize Cisco Intersight
Learn how to centralize configuration, management, and monitoring of the network, computing, storage, and cloud assets under a single pane of glass
Boost knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center roles
Earn 18 CE credits toward recertificationWho Should Enroll
Server Administrators
Network Engineers
Systems Engineers
Consulting Systems Engineers
Network Administrators
Storage Administrators
Network Managers
Sales Engineers
Technical Solutions ArchitectsCourse Objectives
Describe Cisco UCS hardware, connectivity, and management
Describe Cisco Intersight characteristics
Describe Cisco Intersight licensing and its features
Describe Cisco Intersight server profile deployment
Describe prerequisites and various options for installing an operating system from Cisco Intersight
Describe Cisco Intersight Virtual Appliance and how to deploy and configure different deployment modes
Describe the Cisco UCS X-Series Platform
Describe Cisco UCS M6 portfolio of products
Describe firmware management in Intersight for Cisco UCS infrastructure devices
Describe Cisco UCS Converged Infrastructure
Describe Cisco Intersight account creation and the most important settings
Describe Cisco Intersight Managed Mode (IMM)
Describe Cisco HyperFlex Deployment with Cisco Intersight
Describe Cisco Intersight IVS features and functionality and describe additional ecosystem services that support virtualization service
Describe Cisco Intersight IWO, model your environment as a market with buyers and sellers, and discover IWO’s monitoring targets, policies, and planning scenarios to set up a configuration plan
Describe how to use Intersight ICO and Workflow Automation to manage and automate IT operations, create and manage tasks, and design custom workflows using a drag-and-drop interface, resulting in greater efficiency and reduced costs
Provide a brief description of HashiCorp Terraform
Describe Cisco Intersight API
Describe the process of using Cisco Intersight to install vMedia-based operating systems on managed servers in your data center, unattended installations on Cisco UCS C-Series standalone servers, and Cisco Intersight Managed Mode servers
Describe the usage of the IMM Transition ToolCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
General knowledge of Cisco UCS servers
Server virtualization knowledgeCourse Outline
Cisco Unified Computing System Fundamentals
Cisco Intersight Characteristics
Cisco Intersight Licensing Options
Cisco Intersight Server Profile Deployment
Cisco Intersight Server Operating System Installation
Cisco Intersight Virtual Appliance
Cisco Unified Computing System X-Series
Cisco Unified Computing System B- and C-Series Servers
Cisco Intersight Platform Firmware Operation
Cisco Unified Computing System Converged Infrastructure
Accessing Cisco Intersight
Cisco Intersight Managed Mode
Cisco HyperFlex Deployment with Cisco Intersight
Cisco Intersight Virtual Services
Cisco Intersight Workload Optimizer
Cisco Intersight Cloud Orchestration
Terraform Provider Registry
Cisco Intersight API
Deploying VMware ESXi to a Blade Using Cisco Intersight
Cisco IMM Transition ToolLab Outline
Navigate the Cisco Intersight User Interface
Configure Organizations and Roles
Configure Server Features
Create Pools and Policies
Create Server Profile
Create Server Profiles from Server Profile Template
Configure Cisco ICO
Configure Terraform Provider Registry
Configure Cisco Intersight API with Python
Configure Cisco Intersight API with Ansible - DCNAUTO — Automating Cisco Data Center Networking Solutions
- Длительность: 5 дней (40 часов)
- Код курса: DCNAUTO
- Стоимость
- Очный формат: По запросу
- Онлайн формат: По запросу
Описание курса
Course Description
The Automating Cisco Data Center Networking Solutions (DCNAUTO) training teaches you how to implement and optimize automation in Cisco data center environments. You will gain hands-on experience with Cisco Nexus platforms, programmability features, and modern automation tools used to streamline operations across switching, compute, and fabric controllers. The training covers foundational concepts in network programmability, then advances into day-zero provisioning, on-box automation using Bash, Python, and Guest Shell, and off-box automation with Cisco NX-API, NETCONF/RESTCONF, and YANG models. You will also explore Infrastructure as Code (IaC) workflows with Cisco Nexus Dashboard Fabric Controller (NDFC), Ansible, and Terraform, as well as network validation and testing with Cisco pyATS. Finally, you will learn how AI-driven operations enhance network automation and simplify lifecycle management.
This training prepares you for the 300-635 DCNAUTO v2.0 exam. If passed, you earn the Cisco Certified Specialist - Data Center Networking Automation certification and satisfy the concentration exam requirements for the Cisco Certified Network Professional (CCNP) Data Center and Automation certifications. This training also earns you 43 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain practical, hands-on experience with Cisco Nexus platforms and automation tools used in modern data centers
Acquire skills in network programmability, including scripting with Python and using APIs for automating network operations
Learn to implement IaC workflows using tools like Ansible and Terraform for efficient configuration management
Develop troubleshooting expertise in both infrastructure automation and AI-driven operations, enhancing job readiness for advanced network roles
Prepare for the 300-635 DCNAUTO v2.0 exam
Earn 43 CE credits toward recertificationWho Should Enroll
Network Designers
Systems Engineers
Wireless Engineers
Consulting Systems Engineers
Technical Solutions Architects
Network Administrators
Wireless Design Engineers
Network Managers
Site Reliability Engineers
Deployment Engineers
Sales Engineers
Account Managers
Program Managers
Project ManagersWhat to Expect in the Exam
Automating Cisco Data Center Networking Solutions (300-635 DCNAUTO) v2.0 is a 90-minute exam associated with the Cisco Certified Specialist - Data Center Networking Automation certification and satisfies the concentration exam requirements for the CCNP® Data Center and Automation certifications.
This exam tests your knowledge and skills related to implementing data center automated solutions, including:
Infrastructure as code
Network element programmability
Operations
AI in automationCourse Objectives
Explain the role of programmability and automation in Cisco data center networks
Explain the benefits of programmability compared to manual CLI workflows
Identify data models and data formats (XML, JSON, YAML) used in Cisco automation frameworks
Use version control systems such as Git for storing and managing configuration files
Perform day-zero provisioning on Cisco Nexus devices using Power-On Auto Provisioning (POAP)
Enable and use the Bash shell and Guest Shell on Cisco Nexus devices
Run Linux commands inside Guest Shell to interact with NX-OS and external services
Write Python scripts on-box to parse CLI output and enhance operational workflows
Describe and configure Cisco NX-API CLI and REST interfaces
Send JSON/XML payloads to NX-API using Python scripts and verify device responses
Use Cisco NX-API Developer Sandbox for testing and validation
Implement model-driven programmability using NETCONF/RESTCONF and YANG data models
Construct and validate Python scripts to configure and verify protocols with NX-OS APIs
Implement off-box automation with Cisco NX-API CLI/REST, NETCONF/RESTCONF, and YANG models
Describe Cisco NDFC architecture and automation capabilities
Use NDFC REST APIs for fabric automation tasks
Automate fabric provisioning and configuration with Ansible playbooks
Build and apply Terraform plans for managing data center fabrics with NDFC
Describe Cisco pyATS and Genie frameworks for network validation
Build and run pyATS test cases to verify device state before and after automation
Interpret test results and integrate them into automation workflows
Describe how AI and ML capabilities are applied in Cisco Data Center automation
Explain AI-driven monitoring and anomaly detection workflows
Correlate AI insights with automated remediation actionsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic programming language concepts
Basic understanding of virtualization and VMware
Ability to use Linux and CLI tools, such as SSH and bash
CCNP level data center knowledge
Foundational understanding of Cisco ACIThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
Introducing Automation for Cisco Solutions (CSAU)Course Outline
Day-Zero Provisioning
On-Box Automation with Cisco NX-OS
Cisco Nexus Automation with NX-API CLI
Cisco Nexus Programmability with NX-API REST
Model-Driven Programmability on NX-OS
IaC Tools
IaC Lifecycle
Cisco NX-OS Automation with IaC Tools
Cisco ACI Automation with IaC Tools
Cisco Nexus Dashboard Automation with IaC Tools
Simulation of Data Center Topologies
Network Change Validation with pyATS
Model-Driven Telemetry Implementation
Troubleshoot Infrastructure Automation
Troubleshoot Container Workloads Connectivity
AI-Assisted Coding
AI Security Considerations
AI Agent IntegrationLab Outline
Set Up PowerOn Auto Provisioning on the Cisco Nexus 9000
Use Bash and Guest Shell on Cisco NX-OS
Use Python to Enhance CLI Commands
Make NX-API Calls with NX-API Sandbox
Configure and Verify NX-OS Using Python
Set Up API Calls with Bruno
Use NX-API REST with Python
Configure and Verify Using NETCONF, RESTCONF, and YANG
Track Changes with Git and GitHub
Use Ansible with Cisco NX-OS
Use Terraform with Cisco NX-OS
Generate Configuration Using Jinja2 Templates
Manage ACI Configuration Using Ansible
Set Up a New Tenant the NetDevOps Way
Automate ACI with Terraform
Automate NDFC with REST API and Python
Retrieve NX-OS Health Data Using Cisco Nexus Dashboard
Create NDFC Fabric with Ansible
Automate NDFC with Terraform
Explore Cisco Modeling Labs Basics
Simulate Data Center Network with Cisco Modeling Labs
Cisco ACI Simulator Installation and Initialization Simulation
Capture and Compare Network State with pyATS CLI
Run Network Tests Using pyATS and Python
Configure a Subscription for Model-Driven Telemetry
Troubleshoot Infrastructure as Code
Troubleshoot Linux Container Connectivity
AI Toolset—Jupyter Notebook
Al-Driven Monitoring Using Nexus Dashboard Simulation - DCAI — Implementing Cisco Data Center AI Infrastructure
- Длительность: 5 дней (40 часов)
- Код курса: DCAI
- Стоимость
- Очный формат: По запросу
- Онлайн формат: По запросу
Описание курса
Course Description
The Implementing Cisco Data Center AI Infrastructure (DCAI) training is designed to equip professionals with the skills to support, secure, and optimize AI workloads within modern data center environments. This comprehensive program delves into the unique characteristics of AI/ML applications, their influence on infrastructure design, and best practices for automated provisioning. Participants will gain in-depth knowledge of security considerations for AI deployments and master day-2 operations, including monitoring and advanced troubleshooting techniques such as log correlation and telemetry analysis. Through hands-on experience, including practical application with tools like Splunk, learners will be prepared to efficiently monitor, diagnose, and resolve issues in AI/ML-enabled data centers, ensuring optimal uptime and performance for critical organizational workloads.
This training prepares you for the 300-640 DCAI v1.0 exam. If passed, you earn the Cisco Certified Specialist - Data Center AI Infrastructure certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Data Center certification. This training also earns you 38 Continuing Education (CE) credits toward recertification. This training combines content from Operate and Troubleshoot AI Solutions on Cisco Infrastructure (DCAIAOT) and AI Solutions on Cisco Infrastructure Essentials (DCAIE) training.
How You'll Benefit
This training will help you:
Acquire comprehensive skills to support, secure, and optimize AI workloads within modern data center environments
Understand the design, implementation, and advanced troubleshooting of AI infrastructure, including network challenges and specialized hardware
Gain in-depth knowledge of AI/ML concepts, generative AI, and their practical application in network management and automation
Apply hands-on techniques for monitoring, diagnosing, and resolving issues, leveraging tools like Splunk and utilizing AI for enhanced productivity in network operations
Prepare for the 300-640 DCAI v1.0 exam
Earn 38 CE credits toward recertificationWho Should Enroll
Network Designers
Network Administrators
Storage Administrators
Network Engineers
Systems Engineers
Data Center Engineers
Consulting Systems Engineers
Technical Solutions Architects
Cisco Integrators/Partners
Field Engineers
Server Administrators
Network Managers
Program Managers
Project ManagersWhat to Expect in the Exam
Implementing Cisco Data Center AI Infrastructure (300-640 DCAI) v1.0 is a 90-minute exam associated with the Cisco Certified Specialist - Data Center AI Infrastructure certification and satisfies the concentration exam requirement for the CCNP Data Center certification.
This exam tests your knowledge of AI infrastructure, including:
Design
Implementation
Monitoring
TroubleshootingCourse Objectives
Describe key concepts in artificial intelligence, focusing on traditional AI, machine learning, and deep learning techniques and their applications
Describe generative AI, its challenges, and future trends, while examining the nuances between traditional and modern AI methodologies
Explain how AI enhances network management and security through intelligent automation, predictive analytics, and anomaly detection
Describe the key concepts, architecture, and basic management principles of AI-ML clusters, as well as describe the process of acquiring, fine-tuning, optimizing and using pre-trained ML models
Use the capabilities of Jupyter Lab and Generative AI to automate network operations, write Python code, and leverage AI models for enhanced productivity
Describe the essential components and considerations for setting up robust AI infrastructure
Evaluate and implement effective workload placement strategies and ensure interoperability within AI systems
Explore compliance standards, policies, and governance frameworks relevant to AI systems
Describe sustainable AI infrastructure practices, focusing on environmental and economic sustainability
Guide AI infrastructure decisions to optimize efficiency and cost
Describe key network challenges from the perspective of AI/ML application requirements
Describe the role of optical and copper technologies in enabling AI/ML data center workloads
Describe network connectivity models and network designs
Describe important Layer 2 and Layer 3 protocols for AI and fog computing for Distributed AI processing
Migrate AI workloads to dedicated AI network
Explain the mechanisms and operations of RDMA and RoCE protocols
Understand the architecture and features of high-performance Ethernet fabrics
Explain the network mechanisms and QoS tools needed for building high-performance, lossless RoCE networks
Describe ECN and PFC mechanisms, introduce Cisco Nexus Dashboard Insights for congestion monitoring, explore how different stages of AI/ML applications impact data center infrastructure, and vice versa
Introduce the basic steps, challenges, and techniques regarding the data preparation process
Use Cisco Nexus Dashboard Insights for monitoring AI/ML traffic flows
Describe the importance of AI-specific hardware in reducing training times and supporting the advanced processing requirements of AI tasks
Understand the compute hardware required to run AI/ML solutions
Understand existing intelligence and AI/ML solutions
Describe virtual infrastructure options and their considerations when deploying
Explain data storage strategies, storage protocols, and software-defined storage
Use NDFC to configure a fabric optimized for AI/ML workloads
Use locally hosted GPT models with RAG for network engineering tasksCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Cisco UCS compute architecture and operations
Cisco Nexus switch portfolio and features
Data Center core technologiesThese skills can be found in the following Cisco Learning Offerings:
Introducing Cisco Unified Computing System (DCIUCS)
Implementing Cisco NX-OS Switches and Fabrics in the Data Center (DCNX)
Cisco Data Center Nexus Dashboard Essentials (DCNDE)
Implementing Cisco Data Center Core Technologies (DCCOR)Course Outline
Fundamentals of AI
Generative AI
AI Use Cases
AI-ML Clusters and Models
AI Toolset—Jupyter Notebook
AI Infrastructure
AI Workloads Placement and Interoperability
AI Policies
AI Sustainability
AI Infrastructure Design
Key Network Challenges and Requirements for AI Workloads
AI Transport
Connectivity Models
AI Network
Architecture Migration to AI/ML Network
Application-Level Protocols
High-Throughput Converged Fabrics
Building Lossless Fabrics
Congestion Visibility
Data Preparation for AI
AI/ML Workload Data Performance
AI-Enabling Hardware
Compute Resources
Compute Resource Solutions
Virtual Resources
Storage Resources
Setting Up AI Cluster
Deploy and Use Open Source GPT Models for RAG
AI Infrastructure Operations and Monitoring
Troubleshooting AI Infrastructure
Troubleshoot Common Issues in AI/ML FabricLab Outline
AI Toolset—Jupyter Notebook
AI/ML Workload Data Performance
Setting Up AI Cluster
Deploy and Use Open Source GPT Models for RAG
Troubleshoot Common Issues in AI/ML Fabric - CCNA – Implementing and Administering Cisco Solutions 2.2
- Длительность: 5 дней (40 часов)
- Код курса: CCNA
- Стоимость
- Очный формат: 648 000 ₸
- Онлайн формат: 627 000 ₸
Описание курса
Course Description
This training teaches you how to install, operate, configure, and verify a basic IPv4 and IPv6 network, configure network components, such as switches, routers, and wireless local area network (LAN) controllers (WLNs), manage network devices, and identify basic security threats. This training also covers the introduction of AI and machine learning (ML) in network operations.
This Learning Path prepares you for the Cisco Certified Network Associate (200-301 CCNA) v1.1 exam. If passed, you earn your CCNA certification.How You'll Benefit
This training will help you:
Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network
Gain a foundation in the essentials of networking, security, and automation
Prepare for the 200-301 CCNA v1.1 exam
Earn 30 CE credits toward recertificationWho Should Enroll
Entry-level Network Engineers
Entry-level Network Administrators
Entry-level Network Support Technicians
Entry-level Help Desk TechniciansWhat to Expect in the Exam
Cisco Certified Network Associate (200-301 CCNA) v1.1 is a 120-minute exam associated with the CCNA certification.
The exam tests your knowledge and skills related to:
Network fundamentals
Network access
IP connectivity
IP services
Security fundamentals
Automation and programmabilityCourse Objectives
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco IOS Software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of transmission control protocol and the internet protocol (TCP/IP) and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP transport layer and application layer
Explore the functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement and verify virtual local area networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of open shortest path first (OSPF)
Explain how spanning tree protocol (STP) and rapid spanning tree protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic wide-area network (WAN) and virtual private network (VPN) concepts
Describe the operation of access control lists (ACLs) and their applications in the network
Configure internet access using dynamic host configuration protocol (DHCP) clients and explain and configure network address translation (NAT) on Cisco routers
Describe the basic quality of service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC
Describe network and device architectures and introduce virtualization
Explain software-defined networks
Configure basic Cisco IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Discuss the need of network programmability in Enterprise networks, common programmability protocols, and configuration management tools
Describe AI and ML in network operationsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Basic IP address knowledgeCourse Outline
Exploring the Functions of Networking
Introducing the Host-To-Host Communications Model
Operating Cisco IOS Software
Introducing LANs
Exploring the TCP/IP Link Layer
Starting a Switch
Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets
Explaining the TCP/IP Transport Layer and Application Layer
Exploring the Functions of Routing
Configuring a Cisco Router
Exploring the Packet Delivery Process
Troubleshooting a Simple Network
Introducing Basic IPv6
Configuring Static Routing
Implementing VLANs and Trunks
Routing Between VLANs
Introducing OSPF
Building Redundant Switched Topologies
Improving Redundant Switched Topologies with EtherChannel
Explaining the Basics of ACL
Enabling Internet Connectivity
Introducing AI and ML in Network Operations
Introducing System Monitoring
Managing Cisco Devices
Securing Administrative Access
Implementing Device Hardening
Exploring Layer 3 Redundancy
Introducing WAN Technologies
Introducing QoS
Explaining Wireless Fundamentals
Introducing Architectures and Virtualization
Explaining Software-Defined Networking
Introducing Network Programmability
Examining the Security Threat Landscape
Implementing Threat Defense TechnologiesLab Outline
Get Started with Cisco CLI
Observe How a Switch Operates
Perform Basic Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure IPv6 Static Routes
Configure VLANs and Trunks
Configure Inter-VLAN Routing
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Configure and Verify IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and PAT
Configure and Verify NTP
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Configure and Verify Port Security
Log in to and Monitor the WLC
Configure an Open Wireless Network
Define a RADIUS Server and Enable SNMP and Syslog
Configure a WLAN to Use WPA2 PSK - ENCOR — Implementing and Operating Cisco Enterprise Network Core Technologies
- Длительность: 5 дней (40 часов)
- Код курса: ENCOR
- Стоимость
- Очный формат: 763 000 ₸
- Онлайн формат: 740 500 ₸
Описание курса
Course Description
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.3 training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot an enterprise network and introduces you to overlay network design by using SD-Access and SD-WAN solutions. You’ll also learn to understand and implement security principles and automation and programmability within an enterprise network.
How You'll Benefit
This training will help you:
Configure and implement identified solutions by applying planned implementation processes using Cisco IOS Software commands and applications.
Verify appropriate show and debug commands and applications to ensure correct solution implementation and performance.
Troubleshoot appropriate show and debug commands and applications to identify the cause of basic-level network issues and correctly implement a solution that ensures that the network is performing as desired.Who Should Enroll
Entry- to mid-level network engineers
Network administrators
Network support technicians
Help desk techniciansCourse Objectives
After taking this training, you should be able to:
Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
Compare and contrast the various hardware and software switching mechanisms and operation while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM) along with process switching, fast switching, and Cisco Express Forwarding concepts
Troubleshoot Layer 2 connectivity using VLANs and trunking
Implement redundant switched networks using Spanning Tree Protocol
Troubleshoot link aggregation using Etherchannel
Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
Implement and optimize Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types and areas, summarization, and route filtering for IPv4 and IPv6
Implement External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
Implement network redundancy using protocols such as Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
Implement internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
Describe the virtualization technology of servers, switches, and the various network devices and components
Implement overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
Describe the components and concepts of wireless networking, including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
Describe the various wireless deployment models available, including autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
Describe wireless roaming and location services
Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-shared Key (PSK) wireless client authentication on a WLC
Troubleshoot wireless client connectivity issues using various available tools
Troubleshoot Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
Explain basic Python components and conditionals with script writing and analysis
Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
Describe APIs in Cisco DNA Center and ManageCourse Prerequisites
Knowledge and skills you should have before attending this training:
Implementation of Enterprise LAN networks
Basic understanding of Enterprise routing and wireless connectivity
Basic understanding of Python scriptingCourse Outline
Examining Cisco Enterprise Network Architecture
Exploring Cisco Switching Paths
Implementing Campus LAN Connectivity
Building Redundant Switched Topology
Implementing Layer 2 Port Aggregation
Understanding EIGRP
Implementing OSPF
Optimizing OSPF
Exploring EBGP
Implementing Network Redundancy
Implementing NAT
Introducing Virtualization Protocols and Techniques
Understanding Virtual Private Networks and Interfaces
Understanding Wireless Principles
Examining Wireless Deployment Options
Understanding Wireless Roaming and Location Services
Examining Wireless AP Operation
Implementing Wireless Client Authentication
Troubleshooting Wireless Client Connectivity
Implementing Network Services
Using Network Analysis Tools
Implementing Infrastructure Security
Implementing Secure Access Control
Discovering the Basics of Python Programming
Discovering Network Programmability Protocols
Implementing Layer 2 Port Aggregation
Discovering Multicast Protocols
Understanding QoS
Exploring Enterprise Network Security Architecture
Exploring Automation and Assurance Using Cisco DNA Center
Examining the Cisco SD-Access Solution
Understanding the Working Principles of the Cisco SD-WAN SolutionLab Outline
Investigate the CAM
Analyze Cisco Express Forwarding
Troubleshoot VLAN and Trunk Issues
Tune Spanning Tree Protocol (STP) and Configure Rapid Spanning Tree Protocol (RSTP)
Configure Multiple Spanning Tree Protocol
Troubleshoot EtherChannel
Implement Multi-area OSPF
Implement OSPF Tuning
Apply OSPF Optimization
Implement OSPFv3
Configure and Verify Single-Homed EBGP
Implement Hot Standby Routing Protocol (HSRP)
Configure Virtual Router Redundancy Protocol (VRRP)
Implement NAT
Configure and Verify Virtual Routing and Forwarding (VRF)
Configure and Verify a Generic Routing Encapsulation (GRE) Tunnel
Configure Static Virtual Tunnel Interface (VTI) Point-to-Point Tunnels
Configure Wireless Client Authentication in a Centralized Deployment
Troubleshoot Wireless Client Connectivity Issues
Configure Syslog
Configure and Verify Flexible NetFlow
Configure Cisco IOS Embedded Event Manager (EEM)
Troubleshoot Connectivity and Analyze Traffic with Ping, Trace route, and Debug
Configure and Verify Cisco IP SLAs
Configure Standard and Extended ACLs
Configure Control Plane Policing
Implement Local and Server-Based AAA
Write and Troubleshoot Python Scripts
Explore JavaScript Object Notation (JSON) Objects and Scripts in Python
Use NETCONF Via SSH
Use RESTCONF with Cisco IOS XE Software - ENARSI — Implementing Cisco Enterprise Advanced Routing and Services v1.0
- Длительность: 5 дней (40 часов)
- Код курса: ENARSI
- Стоимость
- Очный формат: 763 000 ₸
- Онлайн формат: 740 500 ₸
Описание курса
Course Description
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) training gives you the knowledge and skills needed to install, configure, operate, and troubleshoot a dual stack enterprise network. This training covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) training.
This training prepares you for the 300-410 ENARSI v1.1 exam. If passed, you earn the Cisco Certified Specialist – Enterprise Advanced Infrastructure Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification. This training also earns you 40 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Gain the knowledge you need to install, configure, operate, and troubleshoot a dual stack enterprise network
Qualify for professional-level job roles in advance routing and services
Prepare for the 300-410 ENARSI 1.0 exam
Earn 40 CE credits toward recertificationWho Should Enroll
Entry-Level Network Engineers
Network Administrators
Network Support Technicians
Help Desk TechniciansWhat to Expect in the Exam
Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) v1.1 is a 90-minute exam associated with the Cisco Certified Specialist – Enterprise Advanced Infrastructure Implementation certification and satisfies the core exam requirement for the CCNP Enterprise certification.
This exam tests your knowledge of implementing and troubleshooting for advanced routing technologies and services, including:
Layer 3
VPN services
Infrastructure security
Infrastructure servicesCourse Objectives
Configure, optimize, and troubleshoot enhanced interior gateway routing protocol (EIGRP)
Configure, optimize, and troubleshoot open shortest path first (OSPF)v2 and OSPFv3
Implement and troubleshoot route redistribution using filtering mechanisms
Implement path control using policy-based routing (PBR) and IP service level agreement (SLA)
Configure, optimize, and troubleshoot border gateway protocol (BGP)
Implement multiprotocol BGP (MP-BGP)
Describe the features of multiprotocol label switching (MPLS)
Describe the major architectural components of an MPLS virtual private network (VPN)
Identify the routing and packet forwarding functionalities for MPLS VPNs
Explain how packets are forwarded in an MPLS VPN environment
Implement Cisco internetwork operating system (IOS®) dynamic multipoint VPNs (DMVPNs)
Implement and troubleshoot dynamic host configuration protocol (DHCP)
Describe the tools available to secure the IPV6 first hop
Troubleshoot Cisco router security features
Troubleshoot infrastructure security and services
Troubleshoot network issues with Cisco DNA Center AssuranceCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
General understanding of network fundamentals
Basic knowledge of local area network (LAN) implementation
General understanding of network device management and security
Basic knowledge of network automation
General understanding of interior gateway protocol (IGP) routing, including EIGRP and OSPF
General understanding of BGP
General understanding of infrastructure security and services, including access control lists (ACLs), simple network management protocol (SNMP), DHCP, IP SLA, Syslog, authentication, authorization, and accounting (AAA), and control plane policing (CoPP)These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Implementing EIGRP
Optimizing EIGRP
Troubleshooting EIGRP
Implementing OSPF
Optimizing OSPF
Troubleshooting OSPF
Configuring Redistribution
Troubleshooting Redistribution
Implementing Path Control
Implementing IBGP
Optimizing BGP
Implementing MP-BGP
Troubleshooting BGP
Exploring MPLS
Introducing MPLS L3 VPN Architecture
Introducing MPLS L3 VPN Routing
Configuring VRF-Lite
Implementing DMVPN
Implementing DHCP
Introducing IPv6 First Hop Security
Securing Cisco Routers
Troubleshooting Infrastructure Security and Services
Troubleshooting with DNA Center AssuranceLab Outline
Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6
Verify the EIGRP Topology Table
Configure EIGRP Stub Routing, Summarization, and Default Routing
Configure EIGRP Load Balancing and Authentication
Troubleshoot EIGRP Issues
Configure OSPFv3 for IPv4 and IPv6
Verify the Link-State Database
Configure OSPF Stub Areas and Summarization
Configure OSPF Authentication
Troubleshoot OSPF Issues
Implement Routing Protocol Redistribution
Manipulate Redistribution
Manipulate Redistribution Using Route Maps
Troubleshoot Redistribution Issues
Implement PBR
Configure IBGP and EBGP
Implement BGP Path Selection
Configure BGP Advanced Features
Configure BGP Route Reflectors
Configure MP-BGP for IPv4 and IPv6
Troubleshoot BGP Issues
Configure Routing with VRF-Lite
Implement Cisco IOS DMVPN
Obtain IPv6 Addresses Dynamically
Troubleshoot DHCPv4 and DHCPv6 Issues
Troubleshoot IPv4 and IPv6 ACL Issues
Configure and Verify uRPF
Troubleshoot Network Management Protocol Issues: Lab 1
Troubleshoot Network Management Protocol Issues: Lab 2 - ENSLD — Designing Cisco Enterprise Networks
- Длительность: 5 дней (40 часов)
- Код курса: ENSLD
- Стоимость
- Очный формат: 873 000 ₸
- Онлайн формат: 853 000 ₸
Описание курса
Course Description
The Designing Cisco Enterprise Networks (ENSLD) training deepens your knowledge of designing enterprise networks. Topics covered include enterprise network design, including protocols and media for wired and wireless networks, SD-Access, VPN, Quality of Service (QoS), IPv6, and network programmability. This training earns you 40 Continuing Education (CE) credits towards recertification and helps prepare you to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam, which is part of the CNP Enterprise, Cisco Certified Specialist - Enterprise Design certification.
How You'll Benefit
This training will help you:
Learn the skills, technologies, and best practices needed to design an enterprise network.
Deepen your understanding of enterprise design including advanced addressing and routing solutions, advanced enterprise campus networks, WAN, security services, network services, and software-defined access SDA.
Validate your knowledge and prepare to take the 300-420 Designing Cisco Enterprise Networks (ENSLD) exam.Who Should Enroll
Network design engineers
Network engineers
System administratorsCourse Objectives
Design Enhanced Interior Gateway Routing Protocol (EIGRP) internal routing for the enterprise network
Design Open Shortest Path First (OSPF) internal routing for the enterprise network
Design Intermediate System to Intermediate System (IS-IS) internal routing for the enterprise network
Design a network based on customer requirements
Design Border Gateway Protocol (BGP) routing for the enterprise network
Describe the different types and uses of Multiprotocol BGP (MP-BGP) address families
Describe BGP load sharing
Design a BGP network based on customer requirements
Decide where the L2/L3 boundary will be in your Campus network and make design decisions
Describe Layer 2 design considerations for Enterprise Campus networks
Design a LAN network based on customer requirements
Describe Layer 3 design considerations in an Enterprise Campus network
Examine Cisco SD-Access fundamental concepts
Describe Cisco SD-Access Fabric Design
Design a Software-Defined Access (SD-Access) Campus Fabric based on customer requirements
Design service provider-managed VPNs
Design enterprise-managed VPNs
Design a resilient WAN
Design a resilient WAN network based on customer requirements
Examine the Cisco SD-WAN architecture
Describe Cisco SD-WAN deployment options
Understand Cisco SD-WAN – NAT and hybrid design considerations
Design Cisco SD-WAN redundancy
Explain the basic principles of Quality of Service (QoS)
Design QoS for the WAN
Design QoS for enterprise network based on customer requirements
Explain the basic principles of multicast
Explore multicast with PIM-SM
Designing rendezvous point distribution solutions
Describe high-level considerations when doing IP addressing design
Create an IPv6 addressing plan
Plan an IPv6 deployment in an existing enterprise IPv4 network
Describe the challenges that you might encounter when transitioning to IPv6
Design an IPv6 addressing plan based on customer requirements
Describe Network APIs and protocols
Describe Yet Another Next Generation (YANG), Network Configuration Protocol (NETCONF), and Representational State Transfer Configuration Protocol (RESTCONF)Course Prerequisites
Before taking this offering, you should be familiar with the following:
Understanding network fundamentals
Implementing LANs
Implementing LAN connectivityCourse Outline
Module 1: Designing EIGRP routing
Module 2: Designing OSPF routing
Module 3: Designing IS-IS routing
Module 4: Designing BGP routing and redundancy
Module 5: Exploring BGP Address Families and Attributes
Module 6: Designing an Enterprise Campus LAN
Module 7: Designing Layer 2 Campus
Module 8: Designing a Layer 3 Campus
Module 9: Discovering the Cisco SD-Access Architecture
Module 10: Exploring Cisco SD-Access Fabric Design
Module 11: Exploring Cisco SD-Access Site Design Strategy and Considerations
Module 12: Discovering Service Provider-Managed VPNs
Module 13: Designing Enterprise-Managed VPNs
Module 14: Designing WAN Resiliency
Module 15: Examining Cisco SD-WAN Architectures
Module 16: Examining Cisco SD-WAN Deployment Design Considerations
Module 17: Examining Cisco SD-WAN—NAT and Hybrid Design Considerations
Module 18: Designing Cisco SD-WAN Routing and High Availability
Module 19: Exploring QoS
Module 20: Designing LAN and WAN QoS
Module 21: Introducing Multicast
Module 22: Exploring Multicast with PIM-SM
Module 23: Designing Rendezvous Point Distribution Solutions
Module 24: Designing an IPv4 Address Plan
Module 25: Exploring IPv6
Module 26: Deploying IPv6
Module 27: Introducing Network APIs and Protocols
Module 28: Exploring YANG, NETCONF, RESTCONF, and Model-Driven TelemetryLab Outline
Discovery 1: Designing Enterprise Connectivity
Discovery 2: Designing an Enterprise Network with BGP Internet Connectivity
Discovery 3: Designing an Enterprise Campus LAN
Discovery 4: Designing SD-Access in the Enterprise
Discovery 5: Designing Resilient Enterprise WAN
Discovery 6: Designing QoS in an Enterprise Network
Discovery 7: Designing an Enterprise IPv6 Network - ENWLSD — Designing Cisco Enterprise Wireless Networks
- Длительность: 5 дней (40 часов)
- Код курса: ENWLSD
- Стоимость
- Очный формат: 877 500 ₸
- Онлайн формат: 856 000 ₸
Описание курса
Course Description
The Designing Cisco Enterprise Wireless Networks (ENWLSD) training introduces you to concepts you need to know when planning advanced designs of Cisco wireless products. The training covers design specifics from scenario design concepts, through the installation phase, and into post-deployment validation.
This training prepares you for the ENWLSD exam. If passed, you earn the Cisco Enterprise Wireless Design Specialist certification and satisfy the concentration exam requirement for the CCNP Enterprise certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Learn how to successfully design Cisco Wireless Networks.
Gain leading-edge skills for high-demand responsibilities focused on wireless networks.
Earn 40 CE credits toward recertification.Who Should Enroll
Network Engineers
Systems Engineers
Wireless Engineers
Consulting Systems Engineers
Technical Solutions Architects
Network Administrators
Wireless Design Engineers
Network ManagerWhat to Expect in the Exam
300-425 ENWLSD: Designing Cisco Enterprise Wireless Networks is a 90-minute exam associated with the Cisco Enterprise Wireless Design Specialist certification and satisfies the concentration exam requirement for the CCNP Enterprise certification.
The multiple-choice format tests your knowledge of wireless network design, including:
Site surveys
Wired and wireless infrastructure
Mobility
Wireless Local Area Network (WLAN) high availabilityCourse Objectives
Describe Cisco-recommended structured wireless design methodology
Describe wireless industry standards, amendments, certifications, and Retain for Comments (RFCs)
Examine the wireless technology
Describe and implement Cisco enhanced wireless feature
Describe Cisco mobility, roaming, and Work Group Bridges
Describe the wireless design process
Describe and implement specific wireless application designs
Describe and implement specific wireless network vertical designs
Describe and implement bridge and mesh designs in wireless networks
Describe special considerations in advanced wireless designs
Understand requirements to adapt a wireless network for Cisco Connected Mobile Experiences (CMX) and Cisco Spaces
Describe site survey processes
Describe third-party planning tools
Describe and implement wireless network validation processes
Describe and implement final phases of the design projectCourse Prerequisites
The knowledge and skills you are expected to have before attending this course are:
General knowledge of networks
General knowledge of wireless networks
Routing and switching knowledge
These skills can be found in the following Cisco Learning Offerings:
Understanding Cisco Wireless Foundations (WLFNDU)
Cisco Certified Network Professional Enterprise (CCNP)Course Outline
Structured Wireless Design Methodology
Wireless Industry Protocols and Standards
The Science of Wireless Technology
Cisco Enhanced Wireless Features
Cisco Mobility and Roaming
Wireless Design Process
Wireless Network Design for Specific Applications
Designing Wireless Networks for Specific Vertical Designs
Bridging and Mesh in Wireless Networks
Special Considerations in Advanced Wireless Designs
Cisco CMX and Cisco Spaces
Survey Processes
Wireless Network Design with Third-Party Tools
Wireless Network Validation Processes
Completing the Wireless Design ProjectLab Outline
Examine Ekahau Site Survey Predictive Fundamentals
Create a Site Survey Report
Design a Data Network in an Enterprise Environment
Design a Voice and Data Network in a Healthcare Environment
Convert an Enterprise Data Design to Include Voice
Design a Voice and Data Network in a Warehouse Environment with Directional Antennas
Review a Live Site Survey Using Ekahau Tools
Simulate a Post Installation Network Validation Survey
Analyze Layer 1 Data - ENWLSI — Implementing Cisco Enterprise Wireless Networks
- Длительность: 5 дней (40 часов)
- Код курса: ENWLSI
- Стоимость
- Очный формат: 763 000 ₸
- Онлайн формат: 740 500 ₸
Описание курса
Course Description
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) training helps you implement network settings to provide a secure wireless network infrastructure and troubleshoot any related issues. The goal of this 5-day instructor-led training is to prepare you to secure and implement the wireless infrastructure, and use Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), Cisco DNA Center, Cisco Spaces, and Cisco Connect Mobile Experience to monitor and troubleshoot network issues. This training provides you with hands-on labs to reinforce concepts including deploying Cisco Catalyst 9800 Wireless Controller Release IOS XE Bengaluru 17.6.3, Cisco Digital Network Architecture (DNA) Center Release 2.3.3, Cisco Prime Infrastructure Release 3.5, Cisco Spaces, Cisco CMX Release 10.5, features, and Cisco Identity Services Engine (ISE) Release 3.0.
This training prepares you for the 300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks exam. If passed, you earn the Cisco Certified Specialist – Enterprise Wireless Implementation certification and satisfy the concentration exam requirement for the CCNP Enterprise certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain the skills to secure the wireless infrastructure, implement the wireless infrastructure, and use Cisco Identity Service Engine (ISE), Cisco DNA Center, Cisco Prime Infrastructure (PI), Cisco Spaces, and Cisco Connected Mobile Experience (CMX) to monitor and troubleshoot network issues
Get the knowledge for protocols, solutions, and designs to acquire professional-level and expert-level enterprise roles
Earn 40 CE credits toward recertificationWho Should Enroll
Wireless Network Engineers
Security Network Engineers
Sales Engineers
Wireless Network Technicians
Test Engineers
Network Designers
Network Administrators
Network Managers
Midlevel Wireless Support Engineers
Project ManagersWhat to Expect in the Exam
300-430 ENWLSI: Implementing Cisco Enterprise Wireless Networks is a 90-minute exam associated with the Cisco Certified Specialist – Enterprise Wireless Implementation certification and satisfies the concentration exam requirement for the CCNP Enterprise certification.
The multiple-choice format tests your knowledge of wireless network implementation, including:
FlexConnect
QoS
Multicast
Advanced location services
Security for client connectivity
Monitoring
Device hardeningCourse Objectives
Explain how to secure the wireless network infrastructure
Access and navigate the remote lab
Explain device administration
Describe security best practices for administrative access to Cisco WLC
Describe Cisco WLC configuration and overview for TACACS+
Explain role-based access control in Cisco ISE
Explain how to configure access to the access point
Configure secure port access for the access points
Implement the 802.1X authentication process
Explain how to configure access points and Cisco ISE for the 802.1X authentication
Describe how to monitor and troubleshoot a wireless network
Describe access point joint issue troubleshooting
Describe the tools for CAPWAP access point discovery, DTLS, and join issues troubleshooting
Capture a successful AP authentication
Describe how to monitor and manage the network for rogue devices and RF interferers on Cisco WLC and Cisco Prime Infrastructure
Describe how to implement and add devices to Cisco Prime Infrastructure
Describe how to add access points to maps and monitor wireless clients
Explain reports and their functions in Cisco Prime Infrastructure
Describe enhanced client information with Cisco ISE and location details with Cisco CMX
Discover how to use Cisco Prime Infrastructure for network monitoring
Explain how to observe wireless networks for rogue devices, add devices to, monitor radio frequency interferers, and integrate Cisco DNA Center with external resources
Explain how to troubleshoot access point and WLC issues with Cisco DNA Center Assurance
Explain enhanced network insights with Cisco AI Network Analytics
Observe and learn how to use reports in Cisco DNA Center
Explain how to implement AAA-Based wireless security on Cisco WLC and Cisco ISE
Explain how to configure WLAN for 802.1X on Cisco WLC and wireless clients for 802.1X authentication
Explain how to implement and configure AAA override on Cisco WLC and Cisco ISE
Configure, understand, and perform FlexConnect authentication, identity-based networking, split tunneling, and AAA services on Cisco WLC
Explain how to upgrade FlexConnect access points
Describe how to configure OfficeExtend
Implement guest access in the wireless network
Explain how to implement central web authentication
Describe how to configure Cisco WLC and Cisco ISE for Centralized Web Authentication
Show Cisco WLC configuration for Guest Services
Explain the basics, onboarding process of BYOD
Explain how to configure Cisco ISE for BYOD in the wireless network
Describe how to monitor and troubleshoot client connectivity on Cisco WLC and authentication issues
Show how to capture successful client authentication by using Radioactive Trace and Cisco ISE
Describe the issues that affect client performance
Explain wireless coverage and capacity, how to enhance client performance, and troubleshoot client throughput and data rate issues
Describe how to implement QoS in wireless networks
Describe QoS In wireless networks, marking QoS, and traffic classifications
Explain congestions in the wireless world
Describe IEEE 802.11 QoS fundamentals and how to configure Cisco WLC to support voice traffic
Show how to configure QoS in the wireless network for voice and video services
Describe how to optimize wireless utilization with Cisco Aire Time Fairness, QoS profiles, and Cisco Fastlane
Implement and configure multicast services, forwarding, and Cisco AVC in wireless networks and on Cisco WLC
Implement multicast services
Explain how to configure mDNS and Cisco Media Stream
Describe Cisco DNA Center Service for Bonjour and Cisco Media Stream
Explain the QoS troubleshooting process in the wireless network and on Cisco WLC
Describe how to use AVC to identify issues
Describe how to verify and troubleshoot mDNS and media stream on Cisco WLC
Explain how to deploy Cisco Spaces and Cisco CMX
Describe how to implement location-based services and the provided functionalities
Describe how to design for location services, deploy Cisco Spaces and Cisco CMX, and integrate Cisco Spaces and Cisco XMC with Cisco DNA Center, and Cisco CMS with Cisco Prime Infrastructure
Describe how to deploy and configure Cisco Hyperlocation
Describe how to implement detect and locate services in Cisco Spaces
Describe how to prepare maps for location services in Cisco DNA Center, implement, detect, and locate services on Cisco CMX, analytics services in Cisco Spaces, and on Cisco CMX
Describe how to implement presence services on Cisco CMX
Describe how to implement and configure guest services, monitor, detect, and run analytics on wireless clients, rouge devices, and interferers in Cisco Spaces and with Facebook on Cisco CMX
Describe how to troubleshoot location accuracyCourse Prerequisites
Before taking this offering, you should have:
WLFNDU or equivalent knowledge or Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) trainingCourse Outline
Secure the Wireless Network Infrastructure
Monitor and Troubleshoot Wireless Network
Monitor Wireless Networks with Cisco Prime Infrastructure
Monitor Wireless Network with Cisco DNA Center
Implementing 802.1X Authentication
Configure Cisco FlexConnect
Implement Guest Access
Monitor and Troubleshoot Client Connectivity
Implement QoS in Wireless Network
Implement Cisco AVC in Wireless Networks
Implement Multicast Services
Troubleshoot QoS
Deploy Cisco Spaces and Cisco CMX
Implement Location Services
Monitor Wireless Network with Cisco Spaces and Cisco CMXLab Outline
Lab Familiarization (Base Learning Lab)
Configure Secure Management Access for WLCs and APs
Capture a Successful AP Authentication
Network Monitoring with Cisco Prime Infrastructure
Add Network Devices to Cisco DNA Center
Integrate Cisco DNA Center with External Resources
Use Cisco DNA Center for Network Monitoring
Use Cisco DNA Center Reports
Configure Cisco WLC for AAA Services
Configure Cisco ISE for AAA Services
Configure AAA Services for Cisco FlexConnect
Configure Cisco WLC for Guest Services
Configure Cisco ISE for Guest Services
Configure BYOD in the Wireless Network
Capture Successful Client Authentication Using Radioactive Trace
Capture Successful Client Authentication Using Cisco ISE
Configure QoS in the Wireless Network for Voice and Video Services
Configure Cisco AVC in the Wireless Network - WLFNDU — Understanding Cisco Wireless Foundations
- Длительность: 5 дней (40 часов)
- Код курса: WLFNDU
- Стоимость
- Очный формат: 763 000 ₸
- Онлайн формат: 740 500 ₸
Описание курса
Course Description
The Understanding Cisco Wireless Foundations (WLFNDU) training teaches you the knowledge and skills you need to configure, manage, and troubleshoot a Cisco wireless LAN (WLAN) network. Topics include understanding critical aspects of RF technology, industry standards for Wi-Fi and security, how to design, install, and configure a WLAN network of any size, and using Cisco DNA Center. This training also earns you 30 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Learn the skills, technologies, and best practices needed to manage a Cisco WLAN network
Understand and implement a Cisco wireless network architecture
Design and implement WLAN maintenance and troubleshooting solutionsWho Should Enroll
Network engineer
Systems engineer
Wireless engineer
Technical solutions architect
Network administrator
Wireless design engineer
Network managerCourse Objectives
Describe and implement foundational wireless theory
Describe and implement foundational wireless math and antennas
Describe and implement foundational wireless operation including Wi-Fi 6
Describe security and client access in a wireless network
Implement 802.1X and Extensible Authentication Protocol (EAP)
Implement wireless guest access and configure wireless security
Describe Cisco wireless architecture components and deployment options
Describe Cisco wireless architecture and its deployment modes, the Control and Provisioning of Wireless Access Points (CAPWAP) protocol, and the Cisco WLC and AP line up
Describe the wired support for implementing wireless networks
Deploy Cisco centralized wireless networks using Cisco 9800 WLC
Describe the centralized wireless access model and its configuration
Describe maintenance and troubleshooting in the centralized WLAN model
Describe the management and monitoring of Cisco Wireless Networks with Cisco DNA CenterCourse Prerequisites
Before taking this offering, you should have:
General knowledge of networks
General knowledge of wireless networks
Routing and switching knowledgeCourse Outline
Module 1: RF and WLAN Theory
Module 2: WLAN Math and Antennas
Module 3: Wi-Fi Operations
Module 4: Basic WLAN Security
Module 5: Advanced WLAN Security
Module 6: Configuring WLAN Security
Module 7: Cisco Wireless Network Architecture
Module 8: Implementing Cisco Wireless Network
Module 9: Implementing Cisco Wireless Network Wired Support
Module 10: Deploying Cisco Centralized Wireless Networks
Module 11: Configuring Cisco Centralized Wireless Networks
Module 12: Maintaining and Troubleshooting Cisco Wireless Networks
Module 13: Managing and Monitoring Cisco Wireless Networks with Cisco DNA CenterLab Outline
Discovery 1: Practice RF Math
Discovery 2: Antenna Calculations
Discovery 3: Explore the Wi-Fi Environment
Discovery 4: Analyze Wireless Frames
Discovery 5: Configure Client Access
Discovery 6: Deploy Cisco 9800 WLC
Discovery 7: Configure Cisco 9800 WLC
Discovery 8: Perform Cisco 9800 WLC Maintenance - QOS — Implementing Cisco Quality of Service V3.0
- Длительность: 5 дней (40 часов)
- Код курса: QOS
- Стоимость
- Очный формат: 938 000 ₸
- Онлайн формат: 919 000 ₸
Описание курса
Course Description
The Implementing Cisco Quality of Service (QoS) training provides you with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms. The training covers the theory of QoS, design issues, and configuration of various QoS mechanisms to facilitate the creation of effective administrative policies providing QoS.
The training also gives you design and usage rules for advanced QoS features. This gives you the opportunity to design and implement efficient, optimal, and trouble-free multiservice networks. The new version of the training also includes QoS for modern wireless networks and software-defined networks.
This training earns you 40 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Gain the skills to identify, describe, and correctly implement the appropriate QoS mechanisms that are required to create an effective administrative policy providing QoS
Get the knowledge for designs and usage rules for advanced QoS features
Earn 40 CE credits toward recertificationWho Should Enroll
Pre- and post-sales technical engineers responsible for designing, implementing, or troubleshooting networks
Network architects responsible for designing multiservice networks to carry voice, video, and data traffic in enterprise or service provider environmentsCourse Objectives
Explain the need for QoS, describe the fundamentals of QoS policy, and identify and describe the different models that are used for ensuring QoS in a network
Explain the use of MQC and AutoQoS to implement QoS on the network and describe some of the mechanisms used to monitor QoS implementations
Given a converged network and a policy defining QoS on the network and describe some of the mechanisms used to monitor QoS implementations
Use Cisco QoS queuing mechanisms to manage network congestion
Use Cisco QoS congestion avoidance mechanisms to reduce the effects of congestion on the network
Describe how link efficiency mechanisms can be used collectively to improve bandwidth efficiency and reduce delay
Describe the need for wireless QoS in WLANs due to the expansion of high-bandwidth data applications and time-sensitive multimedia applications in vertical and enterprise environments, and the need for a unified approach to support multi-vendor time-sensitive applications and accelerate the adoption rate of QoS
Describe the need for QoS in modern Software-Defined Networks (SDN) for ensuring reliable performance of crucial applications and services
Describe the steps and best practices for optimally deploying QoS and understand the network elements involved in an enterprise end-to-end QoS deployment, as well as the importance of QoS interaction between the enterprise and service provider networksCourse Prerequisites
Before taking this offering, you should have:
Cisco Certified Networking Associate v2.0 certificationCourse Outline
Section 1: Introduction to QoS
Section 2: Implement and Monitor QoS
Section 3: Classification
Section 4: Marking
Section 5: Congestion Management
Section 6: Congestion Avoidance
Section 7: Traffic Policing and Shaping
Section 8: Link Efficiency Mechanisms
Section 9: Introducing QoS for Modern Wireless Networks
Section 10: Introducing QoS for Software-Defined Networks
Section 11: Deploying End-to-End QoSLab Outline
Case Study 1-1: QoS Mechanisms
Lab 2-1: IP SLA Setup and QoS Baseline Measurement
Lab 2-2: Configuring QoS with Cisco AutoQoS
Case Study 3-1: Classification and Marking
Lab 3-2: Classification and Marking Using MQC
Lab 3-3: Using NBAR for Classification
Lab 3-4: Configuring QoS Preclassify
Lab 3-5: Campus Classification and Marking Using MQC
Lab 4-1: Configuring Fair Queuing
Lab 4-2: Configuring LLQ-CBWFQ
Lab 4-3: Configuring Campus-Based Queuing Mechanisms
Case Study 5-1: WRED Traffic Profiles
Lab 5-2: Configuring DSCP-Based WRED
Lab 5-3: Configuring WTD Thresholds
Lab 6-1: Configuring Class-Based Policing
Lab 6-2: Configuring Class-Based Shaping
Lab 7-1: Configuring Class-Based Header Compression
Lab 7-2: Configuring LFI - SDWFND — Cisco SDWAN Fundamentals
- Длительность: 2 дня (16 часов)
- Код курса: SDWFND
- Стоимость
- Очный формат: 498 000 ₸
- Онлайн формат: 398 000 ₸
Описание курса
Course Description
The Cisco SD-WAN Operation and Deployment (SDWFND) v2.0 course provides a comprehensive overview of the Cisco® Software-Defined WAN (SD-WAN) solution and Cisco SD-WAN components such as vManage, vSmart and vBond.
You will learn how to deploy, manage, and operate a secure, programmable, and scalable SD-WAN fabric using IOS XE Cisco SD-WAN products. The course also covers how to configure, operate, and monitor overlay routing across the Cisco SD-WAN network. In addition, you will learn about data and control policies, and how to deploy Quality of Service (QoS) and Direct Internet Access (DIA) in the SD-WAN overlay network.How You'll Benefit
This class will help you learn to use Cisco SD-WAN to:
Establish transport-independent WAN for lower cost and higher diversity
Meet SLAs for business-critical and real-time applications
Provide end-to-end segmentation for protecting critical enterprise compute resources
Extend seamlessly into the public cloud
Optimize the user experience for Software-as-a-Service (SaaS) applicationsWho Should Enroll
Enterprise network system installers
System integrators
System administrators
Network administrators
Solutions designersCourse Objectives
After taking this course, you should be able to:
Identify the various network elements of the Cisco SD-WAN solution.
Deploy WAN Edge routers.
Create templates to aid in the deployment and operation of the Cisco SD-WAN network.
Configure and verify Cisco SD-WAN overlay routing.
Create simple policies to control traffic flow through the Cisco SD-WAN fabric.Course Prerequisites
Before taking this course, you should have the following knowledge and skills:
Strong understanding of enterprise WAN design
Strong understanding of routing protocol operation, including interior and exterior routing protocol operation
Familiarity with Transport Layer Security (TLS) and IP Security (IPsec)
These recommended Cisco learning offerings may help students meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Cisco SD-WAN Solution Components
Cisco SD-WAN Network Deployment
Cisco SD-WAN Configuration Management
Cisco SD-WAN Overlay Routing
Cisco SD-WAN PoliciesLab Outline
Manage and Monitor Cisco SD-WAN Components
Deploy and Verify Cisco SD-WAN Edge Routers
Deploy Cisco SD-WAN Edge Configuration
Implement Cisco SD-WAN Overlay Routing
Deploy Cisco SD-WAN Policies - ENSDWI — Implementing Cisco SD-WAN Solutions v2.0
- Длительность: 5 дней (40 часов)
- Код курса: ENSDWI
- Стоимость
- Очный формат: 697 000 ₸
- Онлайн формат: 677 000 ₸
Описание курса
Course Description
The Implementing Cisco SD-WAN Solutions (ENSDWI) training helps you design, deploy, configure, and manage the Cisco Software-Defined WAN (SD-WAN) solution in a large-scale network, including how to migrate from legacy WAN to Cisco SD-WAN. You will learn best practices for configuring routing protocols in the data center and the branch, and how to implement advanced control, data, and application-aware policies. This training also covers Cisco SD-WAN deployment and migration options, placement of controllers, how to deploy WAN Edge devices, multicast and quality of service (QoS), how to configure Direct Internet Access (DIA) breakout, and how to deploy a Multi-Region Cisco SD-WAN fabric. You will also learn about the various Application Quality of Experience (AppQoE) traffic optimization capabilities. Finally, the training looks at the different Cisco SD-WAN security options available.
How You'll Benefit
This training will teach you to use Cisco SD-WAN to:
Establish a transport-independent WAN for lower cost and higher flexibility
Meet Service Level Agreements (SLAs) for business-critical and real-time applications
Provide secure end-to-end segmentation for protecting critical enterprise compute resources
Extend seamlessly into the public cloud
Optimize the user experience for Software-as-a-Service (SaaS) applicationsWho Should Enroll
Individuals seeking the Cisco CCNP Enterprise certification or the Cisco Certified Specialist—Enterprise SD-WAN Implementation
Pre- and post-sales network engineers involved in the installation, support, and troubleshooting of a Cisco SD-WAN overlay networkCourse Objectives
Describe the Cisco SD-WAN solution and how modes of operation differ in traditional WAN versus Cisco SD-WAN
Describe options for Cisco SD-WAN cloud and on-premises deployment
Explain how to deploy WAN Edge devices
Compare the Zero-Touch Provisioning (ZTP) and traditional Plug-n-Play (PnP) processes and examine technical specifics for on-premises deployment
Describe configuration groups and feature profiles for configuration management
Describe device and feature configuration templates
Describe options for providing scalability, high availability, and redundancy
Explain how dynamic routing protocols are deployed in Cisco SD-WAN environment, on the service side and transport side
Describe Cisco SD-WAN policy concepts, which includes how policies are defined, attached, distributed, and applied
Define and implement advanced control policies, such as policies for custom topologies and service insertion
Describe the Multi-Region Cisco SD-WAN fabric feature
Define and implement advanced data policies, such as policies for traffic engineering and QoS
Describe the Application Quality of Experience (AppQoE) capabilities available in Cisco SD-WAN
Define and implement an application-aware routing (AAR) policy
Implement Direct Internet Access (DIA) and Cisco SD-WAN Cloud OnRamp options
Describe Cisco SD-WAN security components and integration
Describe how to design pure and hybrid Cisco SD-WAN solutions, as well as how to perform a migration to Cisco SD-WAN
Describe the different tools and options available for managing a Cisco SD-WAN fabric
Describe the different options available for monitoring the Cisco SD-WAN fabric
Describe Cisco SD-WAN support for multicastCourse Prerequisites
Before taking this offering, you should have:
Knowledge of Software-Defined Networking (SDN) concepts as applied to large scale live network deployments
Strong understanding of enterprise WAN design
Strong understanding of routing protocol operation, including both interior and exterior routing protocol operation
Familiarity with Transport Layer Security (TLS) and IP Security (IPsec)Course Outline
Section 1: Examining the Cisco SD-WAN Architecture
Section 2: Examining Cisco SD-WAN Deployment Options
Section 3: Deploying WAN Edge Devices
Section 4: Managing Device Configuration
Section 5: Exploring Redundancy, High Availability, and Scalability
Section 6: Enabling Service-Side and Transport-Side Routing
Section 7: Understanding Cisco SD-WAN Policy Configuration Basics
Section 8: Defining Advanced Control Policies
Section 9: Defining Advanced Data Policies
Section 10: Implementing Application Quality of Experience
Section 11: Implementing AAR
Section 12: Examining DIA and Cisco Cloud OnRamp
Section 13: Exploring Cisco SD-WAN Security
Section 14: Designing and Migrating to Cisco SD-WAN
Section 15: Performing Cisco SD-WAN Network Management and Troubleshooting
Section 16: Examining Cisco SD-WAN Multicast SupportLab Outline
Discovery 1: Deploy Cisco SD-WAN Controllers
Discovery 2: Deploy Cisco SD-WAN Devices Using Configuration Groups
Discovery 3: Configure Cisco SD-WAN Controller Affinity
Discovery 4: Implement Service-Side Routing Protocols
Discovery 5: Implement TLOC Extensions
Discovery 6: Implement Control Policies
Discovery 7: Implement Data Policies
Discovery 8: Implement Application-Aware Routing
Discovery 9: Implement Branch and Regional Internet Breakouts
Discovery 10: Configure Application Firewall
Discovery 11: Migrate Branch Sites
Discovery 12: Perform Cisco SD-WAN Software Upgrade - DNAAS — Leveraging Cisco Intent-Based Networking DNA Assurance
- Длительность: 2 дня (16 часов)
- Код курса: DNAAS
- Стоимость
- Очный формат: 523 000 ₸
- Онлайн формат: 498 000 ₸
Описание курса
Course Overview
The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco® Digital Network Architecture (Cisco DNA™) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer.
This course will help you:
Monitor, identify, and respond to changing network and wireless conditions
Automate manual operations to reduce the costs associated with human errors, resulting in more uptime and improved security
Save time by using a single dashboard to manage and automate your networkWho should attend
This course is designed for network and software engineers who hold the following job roles:
Network administrators
Network operatorsPrerequisites
Before taking this course, you should have the following knowledge and skills: I
Internet web browser usability knowledge
Working knowledge of TCP/IP networking
Familiarity with network management concepts such as Simple Network Management Protocol (SNMP), Syslog, and NetFlow
The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Objectives
After taking this course, you should be able to:
Explain the benefits of using Cisco DNA Center in a traditional, enterprise network
Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts
Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance
Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends
Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause
Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applicationsCourse Outline:
Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS)
Introducing Cisco DNA Center Assurance
Monitoring Health and Performance with Cisco DNA Center Assurance
Troubleshooting Issues, Observing Insights and Trends
Troubleshooting Wireless Issues with Cisco DNA Center Assurance ToolsLab Topology
Prepare Cisco DNA Center for Assurance
Monitor Overall Health and the Health of Network Devices
Monitor the Health of Clients and Applications
Troubleshoot Network, Client, and Application Issues
Observer Assurance AI Network Analytics
Analyze Wireless Allocation, Capabilities, and Threats
Monitor Wireless Networks with Advanced Assurance Tools - ENTEIT — Implementing and Troubleshooting Networks Using Cisco ThousandEyes
- Длительность: 3 дня (24 часа)
- Код курса: ENTEIT
- Стоимость
- Очный формат: 842 000 ₸
- Онлайн формат: 747 000 ₸
Описание курса
Course Description
The Implementing and Troubleshooting Networks Using Cisco ThousandEyes (ENTEIT) training is designed to introduce you to and get you familiar with Cisco ThousandEyes. The focus of this training is implementation and configuration of the Cisco ThousandEyes solution. This training provides hands-on experience with installing and configuring Cisco ThousandEyes agents with different test types. This solution is also used to perform root cause analysis when troubleshooting.
This training also earns you 24 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Describe and define Cisco ThousandEyes
Integrate, implement, and deploy Cisco ThousandEyes solutions
Configure Cisco ThousandEyes agents
Perform root cause analysis when troubleshooting
Customize dashboard and reports
Monitor solutions
Administer the system
Earn 24 CE credits toward recertificationWho Should Enroll
Network Administrators
Network Engineers
Network Managers
System EngineersCourse Objectives
Introduce Cisco ThousandEyes
Describe different Enterprise Agent deployment options, requirements, and procedures for agent deployment
Describe different ThousandEyes test types
Compare ThousandEyes web layer tests
Describe, deploy, and configure an Endpoint Agent
Describe how to perform system administration
Utilize ThousandEyes when performing the root cause analysis
Describe Internet Insights
Explain alerts and dashboards configuration
Explain monitoring solutionsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic understanding of network fundamentals
Basic understanding of Internet Control Message Protocol (ICMP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), HTTP, SSL, and DNS protocol
These skills can be found in the following Cisco Learning Offering:Course Outline
Introducing Cisco ThousandEyes
Enterprise Agents Deployment
BGP, Network, DNS, and Voice Tests Configuration
Web Layer Tests Configuration
Endpoint Agent
System Administration
Network Troubleshooting with Cisco ThousandEyes
Internet Insights
Alerts and Dashboards Configuration
Monitoring SolutionsLab Outline
Schedule a Test
Deploy Enterprise Agent
Configure Network, DNS, and Voice Tests
Configure Web Server Tests
Configure Transaction Tests
Deploy and Configure an Endpoint Agent
Configure Account Administration
Utilize Device Layers
Examine Internet Insights
Configure Alerts
Build a Dashboard and Report - IBNTRN — Transforming to a Cisco Intent-Based Network
- Длительность: 5 дней (40 часов)
- Код курса: IBNTRN
- Стоимость
- Очный формат: 1 317 500 ₸
- Онлайн формат: 1 233 000 ₸
Описание курса
Course Overview
The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended.
How you’ll benefitThis course will help you:
Configure an open, software-driven approach that makes the network simpler, more agile, and responsive to business needs
Leverage the functionality of Cisco DNA Center to streamline operations, reduce costs, detect and contain threats, and continuously align the network to business needsWho should attend
Channel partners and resellers
Network administrators
Network engineers
Sales engineers
System engineers
Technical architects
Technical support personnelPrerequisites
To fully benefit from this course, you should have the following knowledge:
Understanding of network routing and switching principles equivalent to a CCNP® Enterprise level
Experience with Cisco Unified Wireless Network technologies
Experience with Cisco ISE, 802.1x, and Cisco TrustSec
Understanding of segmentation technologies such as VLANs and Virtual Routing and Forwarding (VRF)
Basic understanding of overlay technologies such as Virtual Extensible LAN (VXLAN)
Basic understanding of Locator ID Separation Protocol (LISP).
Recommended Cisco courses that may help you meet these prerequisites:
Understanding Cisco Wireless Foundations (WLFNDU)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
Configuring Cisco ISE Essentials for SD-Access (ISESDA)Course Objectives
After taking this course, you should be able to:
Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components.
Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance.
Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access.
Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding.
Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network.
Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access.
Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes.
Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network.
Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless.
Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution
Describe the use cases and migration scenarios for migrating users from traditional campus to SDCourse Outline:
Transforming to a Cisco Intent-Based Network (IBNTRN)
Introducing Cisco DNA Architecture
Cisco DNA Center Design
Cisco DNA Center Inventory
Cisco DNA Center Automation
Explore Cisco DNA Center and Automating Network Changes
Introducing Cisco Software-Defined Access
Deploying Cisco Software-Defined Access
Deploy Wired Fabric Networks with Cisco DNA Center
Cisco SD-Access for Wireless
Cisco SD-Access Extension for IoT
Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
Migrating to Cisco SD-Access
Cisco SD-Access Multicast
Integrating Cisco DNA Center
Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications
Understanding Programmable Network Infrastructure
Operating and Managing Cisco DNA Infrastructure
Test Drive Cisco DNA Center APIsLab Topology
Explore Cisco DNA Center and Automate Network Changes
Deploy Wired Fabric Networks with Cisco DNA Center
Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center
Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications - MCAST — Implementing Cisco Multicast
- Длительность: 5 дней (40 часов)
- Код курса: MCAST
- Стоимость
- Очный формат: 819 500 ₸
- Онлайн формат: 800 500 ₸
Описание курса
Course Description
The Implementing Cisco Multicast (MCAST) v2.0 course teaches you the fundamentals of IP multicasting, including multicast applications, sources, receivers, group management, and IP multicast routing protocols such as Protocol Independent Multicast (PIM) used within a single administrative domain. You will learn about issues in switched LAN environments and reliable IP multicasting, and technical solutions for simple deployments of IP multicast within a provider or customer network. The course reviews the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco® routers. Labs offer hands-on experience to help you prepare to deploy IP multicast successfully.
How You'll Benefit
This course will help you:
Gain a solid understanding of the fundamentals of IP multicasting
Understand the configuration and troubleshooting guidelines for implementation of IP multicast on Cisco routers
Prepare to deploy IP multicast within a provider or customer networkWho Should Enroll
Network professionals, including systems engineers
Channel Partners
CustomersCourse Objectives
After taking this course, you should be able to:
Describe IP multicast services
Identify IP multicast issues on a data link layer
Explain why Protocol Independent Multicast Sparse Mode (PIM-SM) is the most current scalable IP multicast routing protocol
Describe Rendezvous Point (RP) distribution solutions
Recognize the drawbacks of the PIM-SM and describe two extensions to provide possible solutions
Explain basic concepts of Multiprotocol BGP (MP-BGP) and its use in the IP multicast environment
Configure and deploy Multicast Source Discovery Protocol (MSDP) in the interdomain environment
Describe solutions to mitigate security issues in the IP multicast network
Describe the process of monitoring and maintaining multicast high-availability operations
Design multicast-related application and network solutions in customer and service provider networks
Upon completion of this course, you will be able to:
Introduce IP multicast services, to evaluate the functional model of IP multicasting and the technologies present in IP multicasting, acknowledge IP multicast benefits and associated caveats, and determine various types of multicast applications in order to understand the IP multicast conceptual model and its implementation prerequisites
Identify IP multicast issues on a data link layer, explain the methods of mapping network layer multicast addresses to data link layer addresses, and list the mechanisms for constraining multicast streams in a LAN environment
Introduce Protocol Independent Multicast sparse mode (PIM-SM) as the most current scalable IP multicast routing protocol to learn the principles of protocol operation and details, become familiar with the determinism built into sparse mode multicast protocols, and configure and deploy PIM-SM in complex IP multicast network deploymentsCourse Prerequisites
It is recommended, but not required, that students have the following knowledge and skills:
Work experience and configuration skills for Cisco routers and LAN switches
CCNA Routing and Switching Certification
Attended the Implementing Cisco IP Routing (ROUTE) Training CourseCourse Outline
Module 1: IP Multicast Concepts and Technologies
Module 2: Multicast on the LAN
Module 3: PIM Sparse Mode
Module 4: Rendezvous Point Engineering
Module 5: PIM Sparse Mode Protocol Extensions
Module 6: Multiprotocol Extensions for BGP
Module 7: Interdomain IP Multicast
Module 8: IP Multicast Security
Module 9: Multicast Optimization and High-Availability Features
Module 10: Applications of MulticastLab Outline
Layer 2 and Layer 3 Multicast
PIM-SM Protocol Basics
PIM-SM Protocol Mechanics and Timers
PIM Sparse-Dense Mode and Manual RP Configuration
Configuring Dynamic RP Information Distribution
Bidirectional PIM
Source-Specific Multicast
Anycast RP, External MP-BGP, and MSDP Peering - SDWSCS — Implementing Cisco SD-WAN Security and Cloud Solutions
- Длительность: 3 дня (24 часа)
- Код курса: SDWSCS
- Стоимость
- Очный формат: 457 000 ₸
- Онлайн формат: 444 000 ₸
Описание курса
Course Description
The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) training teaches you advanced knowledge and skills related to Cisco software-defined wide area network (SD-WAN) security and cloud services. Through a series of labs and lectures, you will learn about on-box security services, including application-aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and Transport Layer Security (TLS) or Secure Socket Layer (SSL) decryption. You will also learn about cloud integration with multiple cloud service providers across multiple use cases.
Additionally, the labs will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows.
This training also earns you 24 Continuing Education (CE) credits toward recertification.How You'll Benefit
This training will help you:
Gain introductory knowledge of the security and cloud services available in Cisco SD-WAN
Expand your knowledge of integrated security services, such as the application aware firewall and intrusion prevention and cloud and collocated security services in on-premises and private or public cloud environments
Understand drivers, benefits, available features, and architecture of Cisco SD-WAN integrated and distributed security and cloud networking services
Gain leading-edge skills for high-demand responsibilities focused on security and cloud services
Earn 24 CE credits towards recertificationWho Should Enroll
Network Engineers
Network Security Engineers
Network Architects
Sales/Presales EngineersCourse Objectives
Describe Cisco SD-WAN security functions and deployment options
Understand how to deploy on-premises threat prevention
Describe content filtering options
Implement secure Direct Internet Access (DIA)
Explain and implement service chaining
Explore Secure Access Service Edge (SASE) and identify use cases
Describe Cisco Umbrella SIG and deployment options
Implement Cisco Umbrella SIG and DNS policies
Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365)
Discover how to use Cisco ThousandEyes to monitor cloud services
Configure Cisco ThousandEyes to monitor Microsoft 365 applications
Examine how to protect and optimize access to the software as a service (SaaS) application with Cisco SD-WAN Cloud OnRamp
Discover and deploy Cloud OnRamp for multi-cloud, including interconnect and collocation use cases
Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalyticsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic understanding of enterprise routing
Basic understanding of WAN networking
Basic understanding of Cisco SD-WAN
Basic understanding of public cloud services
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing Cisco SD-WAN Solutions (ENSDWI)
Cisco SD-WAN Operation and Deployment (SDWFND)Course Outline
Introducing Cisco SD-WAN Security
Deploying On-Premises Threat Prevention
Examining Content Filtering
Exploring Cisco SD-WAN Dedicated Security Options
Examining Cisco SASE
Exploring Cisco Umbrella SIG
Securing Cloud Applications with Cisco Umbrella SIG
Exploring Cisco SD-WAN ThousandEyes
Optimizing SaaS Applications
Connecting Cisco SD-WAN to Public Cloud
Examining Cloud Interconnect Solutions
Exploring Cisco Cloud OnRamp for Colocation
Monitoring Cisco SD-WAN Cloud and Security SolutionsLab Outline
Configure Threat Prevention
Implement Web Security
Deploy DIA Security with Unified Security Policy
Deploy Service Chaining
Configure Cisco Umbrella DNS Policies
Deploy Cisco Umbrella Secure Internet Gateway
Implement CASB Security
Microsoft 365 SaaS Testing by Using Cisco ThousandEyes
Configure Cisco OnRamp for SaaS
Deploy Cisco SD-WAN Multicloud Gateways
Cisco vAnalytics Overview - CCECE — Implementing Cisco Contact Center Enterprise Chat & Email
- Длительность: 4 дня (32 часа)
- Код курса: CCECE
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 1 059 000 ₸
Описание курса
Course Description
The Implementing Cisco Contact Center Enterprise Chat and Email (CCECE) v1.0 course teaches you how to deploy Cisco® Enterprise Chat and Email (ECE) into an existing Enterprise Contact Center environment. You will learn the steps required to prepare and configure both Cisco Packaged Contact Center Enterprise (PCCE) and ECE environments for integration, as well as gain experience with the operation and administration tasks required for initial ECE deployment. Additionally, you will experience ongoing system administration tasks such as enabling Single Sign-On (SSO), importing objects, preparing queues and workflows, using the scripting tool, generating reports, and enabling system logs for troubleshooting. Finally, you will also learn how to implement features that enhance ECE operations for Agents.
How You'll Benefit
This course will help you:
Configure, integrate, and deploy Cisco Enterprise Chat and Email into existing Enterprise Contact Center environments
Grow your understanding of Cisco ECE administration and featuresWho Should Enroll
Deployment engineers
Course Objectives
After taking this course, you should be able to:
Describe the ECE solution as deployed with Cisco Contact Center Enterprise (CCE)
Define the components of ECE that make up the available deployment models available for enterprise solutions
Utilize the Classic ECE interface to differentiate between partitions
Utilize the Classic ECE interface to differentiate between processes and instances
Configure the PCCE requirements necessary to integrate ECE
Configure the requirements necessary to integrate ECE with the Single Pane of Glass used with PCCE
Configure the requirements necessary to integrate ECE with email services
Add the ECE Agent gadget to the Cisco Finesse Desktop layout
Describe the installation requirements for a high-availability deployment of ECE
Describe a basic email and chat call flow through the ECE/PCCE environment
Understand the general operational requirements for adding CCE Agent, skill, and scripting objects and importing them into CCE
Navigate the administrative tabs in both the Business Partition and Department view of the Single Pane of Glass
Add and import objects into the ECE
Describe the configurations options found in the Email and Chat Queue
Describe the configuration and verification of chat functionality in a CCE ECE environment
Configure and verify ECE settings
Configure an entry point for a chat queue and introduce template sets
Customize the chat experience
Define and verify the configuration requirements to deploy callback and delayed callback
Describe the benefits of implementing Agent Single Sign-on in the ECE/CCE environment
Configure the requirements necessary to implement Agent Single Sign-on in the ECE/CCE environmentCourse Prerequisites
Before taking this course, student should have:
Strong knowledge of computer networking components: Windows A/D, SQL
Strong understanding of IP networks
Advanced experience administering Cisco Packaged Contact Center Enterprise
Experience deploying Cisco Packaged Contact Center EnterpriseCourse Outline
Deploying Cisco Enterprise Chat and Email
ECE General administration
Cisco ECE Email administration
Cisco ECE Chat administration
Cisco Enterprise Chat and Email features
Lab outline
Navigate CCE discovery architecture and components
Navigate ECE and CCE discovery architecture and components
Navigate ECE Email and Cisco Finesse integration
Add and Import CCE Resources into ECE
Personalize the Email Trail
Build a Department Workflow
Build CCE Script for Email
Agent Verification of Email
Configure and Verify Chat Operation
Customize Chat
Explore Reporting for ECE
Support Single Sign On (SSO) for ECE
Troubleshoot ECELab Outline
Navigate CCE discovery architecture and components
Navigate ECE and CCE discovery architecture and components
Navigate ECE Email and Cisco Finesse integration
Add and Import CCE Resources into ECE
Personalize the Email Trail
Build a Department Workflow
Build CCE Script for Email
Agent Verification of Email
Configure and Verify Chat Operation
Customize Chat
Explore Reporting for ECE
Support Single Sign On (SSO) for ECE
Troubleshoot ECE - ENNA — Designing and Implementing Enterprise Network Assurance
- Длительность: 4 дня (32 часа)
- Код курса: ENNA
- Стоимость
- Очный формат: 967 500 ₸
- Онлайн формат: 878 000 ₸
Описание курса
Course Description
The Designing and Implementing Enterprise Network Assurance (ENNA) training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training collectively encompasses a broad spectrum of network assurance and monitoring aspects. You will overview different Cisco assurance products, Cisco ThousandEyes, and Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day operations that ensure continuous, seamless network assurance.
This training prepares you for the 300-445 ENNA v1.0 exam. If passed, you earn the Enterprise Network Assurance Specialist certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification. This training also earns you 32 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Position different assurance products from Cisco portfolio
Install, configure, and manage Cisco ThousandEyes solution
Utilize Cisco ThousandEyes to perform network troubleshooting
Configure and leverage Meraki Insight and available dashboard tools to manage network assurance in Meraki environments
Prepare for the 300-445 ENNA v1.0 exam
Earn 32 CE credits toward recertificationWho Should Enroll
Network Administrators
System Engineers
Network Analysts
NOC Operators
IT ProfessionalsWhat to Expect in the Exam
Designing and Implementing Enterprise Network Assurance (300-445 ENNA) v1.0 is a 90-minute exam associated with the Enterprise Network Assurance Specialist certification and satisfies the concentration exam requirement for the CCNP Enterprise certification.
The multiple-choice format tests your knowledge of network assurance design and implementation, including:
Platforms and architecture
Data collection and implementation
Data analysis
Insights and alertsCourse Objectives
Describe enterprise network assurance
Describe how to monitor health and performance with Cisco Catalyst Center Assurance
Introduce Cisco AppDynamics, Cisco Catalyst SD-WAN Assurance, and Cisco ThousandEyes
Describe different Enterprise Agent deployment options, requirements, and procedures for agent deployment
Describe different ThousandEyes test types
Compare ThousandEyes web layer tests
Describe, deploy, and configure an Endpoint Agent
Describe how to perform system administration
Utilize ThousandEyes when performing the root cause analysis
Describe Internet Insights
Explain alerts and dashboards configuration
Explain monitoring solutions
Describe Cisco Meraki Network Assurance
Showcase Cisco Meraki InsightsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic understanding of network fundamentals
Basic understanding of Internet Control Message Protocol (ICMP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), Hypertext Transfer Protocol Secure (HTTPS), Secure Sockets Layer (SSL), and Domain Name System (DNS) protocol
Basic familiarity with Cisco Catalyst SD-WAN, Cisco Catalyst Center, and Cisco Meraki
These skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Enterprise Network Assurance Overview
Introduction to Cisco Catalyst Center Assurance
Introduction to Splunk AppDynamics
Introduction to Cisco Catalyst SD-WAN Assurance
Introduction to Cisco ThousandEyes
Enterprise Agents Deployment
BGP, Network, DNS, and Voice Tests Configuration
Web Layer Tests Configuration
Endpoint Agent
System Administration
Network Troubleshooting with Cisco ThousandEyes
Internet Insights
Alerts and Dashboards Configuration
Monitoring Solutions
Cisco Meraki Network Assurance
Cisco Meraki InsightLab Outline
Troubleshoot the Health of Network Devices
Explore Cisco Catalyst SD-WAN Analytics
Schedule a Test
Deploy Enterprise Agent
Configure Network, DNS, and Voice Tests
Configure Web Server Tests
Configure Transaction Tests
Deploy and Configure an Endpoint Agent
Configure Account Administration
Utilize Device Layers
Examine Internet Insights
Configure Alerts
Build a Dashboard
Implementing Network Assurance with Cisco Meraki
Examine Cisco Meraki Insight - ECMS — Engineering Cisco Meraki Solutions
- Длительность: 4 дня (32 часов)
- Код курса: ECMS
- Стоимость
- Очный формат: 840 000 ₸
- Онлайн формат: 750 500 ₸
Описание курса
Course Description
The Engineering Cisco Meraki Solutions training helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This training combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. This training helps prepare you for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.
This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This training also earns you 24 Continuing Education (CE) credits towards recertification.
How You'll Benefit
This training will help you:
Gain a comprehensive understanding of the Cisco Meraki platform
Develop expertise in designing, implementing, and securing Cisco Meraki networks
Operate and manage networks using Cisco Meraki’s cloud-based tools and features
Apply advanced monitoring and troubleshooting techniques
Prepare for the ECMS 500-220 exam
Earn 24 CE credits towards recertificationWho Should Enroll
This training is designed for anyone seeking the Cisco Meraki Solution Specialist certification. The training provides foundational knowledge and skills to engineer Cisco Meraki solutions, including cloud management, design, implementation, monitoring, troubleshooting, and the comprehensive features of the Cisco Meraki product suite.
The job roles best suited to the material in this training are:
Consulting Systems Engineers
Deployment Engineers
Network Administrators
Network Engineers
Network Managers
Site Reliability Engineers
Systems Engineers
Technical Solutions Architects
Wireless Design Engineers
Wireless Engineers
Sales Engineers
Account ManagersWhat to Expect in the Exam
Cisco Meraki Solutions Specialist (ECMS 500-220) is a 90-minute exam associated with the Cisco Meraki Solutions Specialist certification.
The exam tests your knowledge and skills to engineer Meraki solutions, including:
Cloud management
Design
Implementing
Monitoring
TroubleshootingCourse Objectives
Describe Cisco Meraki cloud architecture, administration, and licensing
Describe the hardware and features of Cisco Meraki product families
Describe best practices for troubleshooting and when to contact Cisco Meraki support
Plan new Cisco Meraki architectures and expand existing deployments
Design the network for scalable management and high availability
Describe how to automate and scale Cisco Meraki deployments with dashboard tools
Use dynamic routing protocols to expand networks and improve wide-area network (WAN) performance
Describe proper quality of service (QoS), policy, and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
Describe virtual private network (VPN) and WAN topologies and how to integrate them
Secure, expand, and shape the network
Implement switched network concepts and practices, and configure guest networks
Implement wireless configuration practices and concepts
Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
Describe physical security concepts and practices
Gain network insight by monitoring applications
Describe how to prepare monitoring, logging, and alerting services
Set up reporting and auditing capabilities in the Cisco Meraki dashboard
Monitor and troubleshoot issues using Cisco Meraki toolsCourse Prerequisites
Before taking this offering, you should have earned a Cisco Certified Networking Associate (CCNA) certification or be familiar with:
General Networking
Be actively engaged in the design, deployment, scaling, configuration, and management of enterprise networks, IPsec, and associated VPN technologies
Be experienced with hierarchical network segmentation (access, distribution, and core layer) design and best practices
Strong fundamental knowledge of internet protocol (IP) addressing and subnetting schemas necessary to build local area networks (LANs)
A foundational understanding of network authentication, authorization, and accounting services
Strong fundamental knowledge of dynamic routing protocols with focus and emphasis on open shortest path first (OSPF) and border gateway protocol (BGP)
A foundational understanding of wired and wireless QoS mechanisms, packet queue operations, and practical implementations
A foundational understanding of threat modeling concepts and methodologies and the ability to apply them to identify, analyze, and respond to cybersecurity threats
A foundational understanding of network security controls and protocols, network management best practices, and data security
Intermediate fundamental knowledge of radio frequency (RF) concepts, terminology, design principles, and practical implementations as they apply to wireless networking and current 802.11 wireless standards
A foundational understanding of wireless security best practices centered on access control (802.1x) and spectrum security through wireless intrusion detection system (WIDS) and prevention system (WIPS)
A foundational understanding of standard logging and monitoring protocols with a focus and emphasis on simple network management protocol (SNMP), syslog, and webhooks, and related implementation components or tools
Be familiar with and have basic knowledge of Application Programming Interface (APIs) and related languages and formats, such as representational state transfer (REST) and JavaScript Object Notation (JSON)
The following recommended Cisco offerings may help you meet these prerequisites:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Introducing the Cloud and the Cisco Meraki Dashboard
Introducing Cisco Meraki Products and Administration
Introducing Cisco Meraki Troubleshooting
Planning New Cisco Meraki Architectures and Expanding Existing Deployment
Designing for Scalable Management and High Availability
Automating and Scaling Cisco Meraki Deployments
Designing Routing on the Cisco Meraki Platform
Introducing QoS and Traffic Shaping Design
Building VPN and WAN Topologies
Securing, Expanding, and Shaping the Network
Introducing Switched Network Concepts and Practices
Implementing Wireless Configuration Practices and Concepts
Introducing Endpoint Management Concepts and Practices
Introducing Physical Security Concepts and Practices
Gaining Network Insight by Monitoring Applications
Preparing, Monitoring, Logging, and Alerting Services
Setting Up Reporting and Auditing Capabilities in the Cisco Meraki Dashboard
Gaining Visibility and Resolving Issues Using Cisco Meraki ToolsLab Outline
Configure the Cisco Meraki Dashboard
Enable Advanced Features and Optimize Networking
Troubleshoot the Network Using the Cisco Meraki Dashboard
Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
Configure Routing on the Cisco Meraki Platform
Configure QoS, Traffic Shaping, and Load Balancing
Configure Network Security
Configure Access Policies and Wireless Guest Access
Configure SSIDs, RF Profiles, and Air Marshal
Implement Endpoint Management
Deploy and Configure Physical Security Devices
Enable Alerts and Configure Monitoring and Reporting
Troubleshoot a Cisco Meraki Network - ENAUI — Implementing Automation for Cisco Enterprise Solutions
- Длительность: 3 дня (24 часа)
- Код курса: ENAUI
- Стоимость
- Очный формат: 909 000 ₸
- Онлайн формат: 897 500 ₸
Описание курса
Course Description
The Implementing Automation for Cisco Enterprise Solutions (ENAUI) training teaches you how to implement Cisco Enterprise automated solutions, including programming concepts, orchestration, telemetry, and automation tools.
This course highlights the tools and the benefits of leveraging programmability and automation in the Cisco-powered Enterprise Campus and WAN. You will also examine platforms including IOS XE software for device-centric automation, Cisco DNA Center for the intent-based enterprise network, Cisco Software-Defined WAN, and Cisco Meraki. Their current ecosystem of APIs, software development toolkits, and relevant workflows are studied in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG.
How You'll Benefit
This course will help you:
Gain high-demand skills using modern programming languages, APIs, and systems such as Python, Ansible, and Git to automate, streamline, and enhance business operations.
Acquire the skills and knowledge to customize tools, methods, and processes that improve network performance and agility
Earn 24 CE credits toward recertification
Prepare for the 300-435 ENAUTO examWho Should Enroll
This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles:
Account manager
Consulting systems engineer
Network administrator
Network engineer
Network manager
Sales engineer
Systems engineer
Technical solutions architect
Wireless design engineer
Wireless engineerWhat to Expect in the Exam
What to expect in the exam
The 300-435 ENAUTO exam certifies your knowledge and skills in implementing Enterprise automated solutions, including programming concepts, Python programming, APIs, controllers, and automation tools.
After you pass 300-435 ENAUTO, you earn the Cisco Certified DevNet Specialist - Enterprise Automation and Programmability certification, and you satisfy the concentration exam requirement for these professional-level certifications:
CCNP Enterprise
Cisco Certified DevNet ProfessionalCourse Objectives
After completing the course, you should be able to:
Get familiar with different API styles (REST, RPC) and synchronous and asynchronous API requests
Learn how to use Postman software development tool in order to test the API calls
Learn how to automate repetitive tasks using Ansible automation engine
Explore a Python programming language, Python libraries and Python virtual environments and learn how can they be used for automation of network configuration tasks
Get introduced to GIT version control system and its common operations
Learn how to leverage the various models and APIs of the Cisco IOS XE platform to perform day-zero operations, improve troubleshooting methodologies with custom tools, augment the CLI using scripts, and integrate various workflows using Ansible and Python
Learn about the paradigm shift of model-driven telemetry and the building blocks of a working solution
Learn how to leverage the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center™
Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman
Understand Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure
Learn how to leverage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible, and PostmanCourse Prerequisites
Before taking this course, you should have the following knowledge and skills:
Basic programming language concepts
Basic understanding of virtualization
Ability to use Linux and CLI tools, such as Secure Shell (SSH) and bash
CCNP level core networking knowledge
Foundational understanding of Cisco DNA, Meraki, and Cisco SD-WAN
The following Cisco courses can help you gain the knowledge you need to prepare for this course:
Introducing Automation for Cisco Solutions (CSAU)
Implementing and Administering Cisco Solutions (CCNA)
Implementing Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Network Programmability Foundation
Automating APIs and Protocols
Managing Configuration with Python and Ansible
Implementing On-Box Programmability and Automation with Cisco IOS XE Software
Implementing Model-Driven Telemetry
Day 0 Provisioning with Cisco IOS-XE Software
Implementing Automation in Enterprise Networks
Building Cisco DNA Center Automation with Python
Automating Operations using Cisco DNA Center
Introducing Cisco SD-WAN Programmability
Building Cisco SD-WAN Automation with Python
Building Cisco SD-WAN Automation with Ansible
Automating Cisco Meraki
Implementing Meraki Integration APIsLab Outline
Automate Networks with Netmiko
Use Postman for REST API Consumption
Use Ansible to Configure and Verify Device Configuration
Implement On-Box Programmability and Automation with Cisco IOS XE Software
Use Python on Cisco IOS XE Software
Implement Streaming Telemetry with Cisco IOS XE
Explore Cisco DNA Center APIs
Build Python Scripts to Interact with Cisco DNA Center Intent APIs
Build Python Scripts with Cisco DNA Center Assurance APIs
Troubleshoot End-to-End Connectivity and Health-Check the Network via the Cisco DNA Center API
Perform Administrative Tasks Using the Cisco SD-WAN API
Build, Manage, and Operate Cisco SD-WAN Programmatically
Consume SD-WAN APIs Using the Uniform Resource Identifier (URI) Module
Manage Policies with Ansible
Build Reports Using Ansible-Cisco SD_WAN Role
Implement Cisco Meraki API Automation
Explore Cisco Meraki Integration APIs
Explore Cisco Meraki Webhook Alerts - ENAUTO — Automating and Programming Cisco Enterprise Solutions
- Длительность: 5 дней (40 часов)
- Код курса: ENAUTO
- Стоимость
- Очный формат: По запросу
- Онлайн формат: По запросу
Описание курса
Course Description
The Automating and Programming Cisco Enterprise Solutions (ENAUTO) training teaches you how to implement Cisco Enterprise automated solutions, including programming concepts, orchestration, telemetry, and automation tools. The goal of this training is to highlight the tools and the benefits of leveraging programmability and automation in the Cisco-powered Enterprise Campus and WAN. Examined platforms include Cisco IOS XE software for device-centric automation, Cisco Catalyst Center for the intent-based enterprise network, Cisco Catalyst Software-Defined WAN (SD-WAN), and Cisco Meraki. Their current ecosystem of APIs, software development toolkits, and relevant workflows are inspected in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG.
This training prepares you for the 300-435 ENAUTO v2.0 exam. If passed, you earn the Cisco Certified Specialist - Enterprise Automation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise and Automation concentration exams. This training also earns you 34 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Gain hands-on experience automating Cisco enterprise networks using Python, Ansible, APIs, and modern automation tools
Explore automation across multiple Cisco platforms, including IOS XE, Catalyst Center, SD-WAN, and Meraki
Learn to leverage AI and security best practices in network automation to boost operational efficiency and reliability
Prepare for the 300-435 ENAUTO v2.0 exam
Earn 34 CE credits toward recertificationWho Should Enroll
Network Engineers
Systems Engineers
Wireless Engineers
Consulting Systems Engineers
Technical Solutions Architects
Network Administrators
Wireless Design Engineers
Network Managers
Sales Engineers
Account ManagersWhat to Expect in the Exam
Automating and Programming Cisco Enterprise Solutions (300-435 ENAUTO) v2.0 is a 90-minute exam associated with the Cisco Certified Specialist - Enterprise Automation certification and satisfies the concentration exam requirement for the CCNP Enterprise and Automation certifications.
This exam tests your knowledge of implementing enterprise automated solutions, including:
Device-level and controller-based network automation
Operations
AI in automationCourse Objectives
Explain the need for data models for network automation
Explain how to use Ansible and YANG Suite tools for effective network automation
Describe Python and Netmiko as tools for CLI automation and explain how to automate VLANs, routing protocols, policies, and VPNs
Introduce NETCONF and RESTCONF as model-driven protocols, explain their operations, datastores, and workflows, and compare where each is most effective
Monitor configuration and operational data with NETCONF and RESTCONF, troubleshoot connectivity and model issues, and interpret errors for faster resolution
Introduce Ansible for Cisco configuration management to detect drift, validate compliance, maintain a source of truth, and apply resource modules with safe rollout and rollback recovery
Describe how Cisco IOS EEM automates tasks with events and policies, Guest Shell provides a secure Linux container for scripts, and ZTP creates the initial configuration
Explore how to perform Day-0 operations with PnP in Cisco Catalyst Center
Explore options for configuration management with Cisco Catalyst Center
Explore advanced features of configuration templates with Jinja templates
Learn about managing controller-based configuration with Ansible
Learn about security automation
Learn about techniques for troubleshooting authentication with the REST APIs of Cisco controllers
Learn how to test and validate automation deployed on Cisco Catalyst Center and Cisco Catalyst SD-WAN Manager
Learn how to use Catalyst Center and SD-WAN APIs to automate Software Image Management
Learn how to use APIs to monitor network health with Cisco Controllers
Learn how to use streaming telemetry and webhooks to monitor network health on Course Cisco Catalyst Center and Cisco Catalyst SD-WAN Manager
Explain how to use AI capabilities in Cisco Catalyst Center, Cisco Catalyst SD-WAN Manager, and Meraki dashboard
Explain how to use AI-assisted code development for network automation
Explore security risks in AI-based network automation
Explain the deployment of MCP servers and clients, and Python FastMCP support for AI agentsCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Basic programming language concepts
Basic understanding of virtualization
Ability to use Linux and CLI tools, such as SSH and bash
CCNP level core networking knowledge
Foundational understanding of Cisco Catalyst Center, Meraki, and Cisco Catalyst SD-WANThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Introducing Automation for Cisco Solutions (CSAU)
Implementing Cisco Enterprise Network Core Technologies (ENCOR)Course Outline
Network Automation Models
Network Automation Tooling
CLI Automation with Python
NETCONF and RESTCONF Automation
Automating Configuration Monitoring
Device Automation with Ansible
On-Box Automation
Controller-Based Day-0 Provisioning
Catalyst Center Day-0 with Configuration Management
Advanced Configuration Templates
Controller-Based Configuration Management with Ansible
Security Automation
Troubleshoot Controller-Based Network Automation
Testing and Validating Network Automation
Controller-Based Software Management
Automate Network Health Monitoring with Controller APIs
Monitor Network Health with Streaming Telemetry and Webhooks
AI Capabilities in Network Controllers
AI Assistance in Network Automation
Security Risks in AI-based Automation
Support AI Agents with Python FastMCPLab Outline
Explore YANG Trees with YANG Suite
Validate XML Payloads Against the YANG Schema
Configure and Monitor Routing with Python and Netmiko
Configure and Monitor IPsec VPNs with Python and Netmiko
Manage Device Configurations with ncclient
Manage Device Configurations with RESTCONF
Monitor Device Configurations with NETCONF and RESTCONF
Troubleshoot Network Automation Solutions
Configuration Compliance with Ansible
Use Ansible to Configure and Verify Device Configuration
EEM-Based Device Automation
On-Box Python-Based Automation
Python-Based ZTP for Cisco IOS XE Devices
Manage Device Configuration with Catalyst Center APIs
Manage Device Configuration with SD-WAN Manager APIs
Manage Device Configuration with Cisco Meraki APIs
Construct Advanced Jinja Configuration Templates
Manage Catalyst Center Devices with Ansible
Manage Cisco Catalyst SD-WAN Devices with Ansible
Manage Cisco Meraki Networks with Ansible
Enforce Network Segmentation with Cisco Catalyst Center APIs
Enforce Group-Based Access Control with Cisco Catalyst Center APIs
API-Driven Segmentation and Policy Enforcement with Meraki
Troubleshoot Cisco Catalyst Center API Authentication
Troubleshoot Cisco Catalyst SD-WAN Manager API Authentication
Troubleshoot Cisco Catalyst Center API Requests
Software Management with Cisco Catalyst Center API
Software Management with SD-WAN Manager APIs
Monitor Network Health with Cisco Catalyst Center APIs
Monitor Network Health with SD-WAN Manager APIs
Monitor Network Health with Meraki Dashboard APIs
Subscribe to Device Telemetry Using NETCONF
Implement Webhook-Based Alerting with Cisco Catalyst Center
Code Development with AI Assistant
Providing Network Information to MCP Clients Using Python FastMCP - ENCC — Designing and Implementing Cloud Connectivity
- Длительность: 4 дня (32 часа)
- Код курса: ENCC
- Стоимость
- Очный формат: По запросу
- Онлайн формат: По запросу
Описание курса
Course Description
The Designing and Implementing Cloud Connectivity (ENCC) training helps you develop the skills required to design and implement enterprise cloud connectivity solutions. You will learn how to leverage both private and public internet-based connectivity to extend the enterprise network to cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). You will explore the basic concepts surrounding public cloud infrastructure and how services like Software as a Service (SaaS), Direct Internet Access (DIA), and Cisco Umbrella can be integrated. You will practice how to analyze and recommend connectivity models that are scalable, resilient, secure, and provide the best quality of experience for users. You will learn to implement both Internet Protocol Security (IPsec) and Software-Defined Wide-Area Network (SD-WAN) cloud connectivity, as well as build overlay routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). You will also implement control and data policies across the SD-WAN fabric and integrate Cisco Umbrella cloud security. Finally, you will practice troubleshooting cloud connectivity issues relating to IPsec, SD-WAN, routing, application performance, and policy application.
This training prepares you for the 300-440 ENCC v1.0 exam. If passed, you earn the Cisco Certified Specialist–Enterprise Cloud Connectivity certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Enterprise certification. This training also earns you 32 Continuing Education (CE) credits toward recertification.
How You'll Benefit
This training will help you:
Develop the skills required to design and implement enterprise cloud connectivity solutions
Learn how to apply the virtual private network (VPN) and overlay networking technology, including Cisco Catalyst SD-WAN to extend the enterprise network to cloud providers, such as AWS, Microsoft Azure, and GCP using both private connectivity services and public internet as an underlay
Examine the solutions for optimizing access to SaaS cloud providers and the workflows for diagnosing and troubleshooting cloud connectivity issues
Gain knowledge for protocols, solutions, and designs to acquire professional-level and expert-level enterprise roles
Prepare for the 300-440 ENCC v1.0 exam
Earn 32 CE credits toward recertificationWho Should Enroll
Cloud Architects
Cloud Administrators
Cloud Engineers
Cloud Network Engineers
Cloud Automation Engineers
Cloud Systems Engineers
Cloud Security Managers
Cloud Consultants
Cloud Application Developers
Systems Engineers
Technical Solutions ArchitectsWhat to Expect in the Exam
Designing and Implementing Cloud Connectivity (300-440 ENCC) v1.0 is a 90-minute exam associated with the Cisco Certified Specialist–Enterprise Cloud Connectivity certification and satisfies the concentration exam requirement for the CCNP Enterprise certification.
The multiple-choice format tests your knowledge of designing and implementing cloud connectivity, including:
Architecture models
IPsec
SD-WAN
Operation
DesignCourse Objectives
Describe the fundamental components and concepts of cloud computing, including deployment models, cloud services, and cloud providers, to provide learners with a comprehensive overview of the subject
Describe the options available for establishing connectivity to public cloud services, including point-to-point IPsec VPN and various Cisco Catalyst SD-WAN Cloud OnRamp deployment options
Describe private connectivity options to public cloud provider infrastructure
Describe the available options for connectivity to SaaS applications from a geographically distributed organization’s premises
Describe various cloud connectivity options and explore high availability, resiliency, and scalability capabilities with Cisco cloud connectivity
Describe and explore public cloud security and its components comprehensively
Describe regulatory compliance requirements
Explain the available options and describe the procedures for implementing IPsec-driven internet-based public cloud connectivity
Introduce overlay routing
Introduce the Cisco Catalyst SD-WAN capabilities for internet-based public cloud connectivity
Describe Cisco SD-WAN native and cloud security capabilities
Introduce the Cloud OnRamp for SaaS
Introduce the Catalyst Cisco SD-WAN Policies
Introduce AppQoE
Describe how to diagnose and troubleshoot common issues for connectivity to public cloud environments using internet-based connectivity
Troubleshoot OSPF, BGP, route redistribution, and static routes deployed in cloud environments
Describe Cisco SD-WAN and connectivity to public cloud providersCourse Prerequisites
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
Good understanding of enterprise routing
Good understanding of WAN networking
Good understanding of VPN technology
Good understanding of Cisco Catalyst SD-WAN
Good understanding of Public Cloud services, such as AWS, Microsoft Azure, and GCPThese skills can be found in the following Cisco Learning Offerings:
Implementing and Administering Cisco Solutions (CCNA)
Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
Cisco SD-WAN Operation and Deployment (SDWFND)
Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS)Course Outline
Public Cloud Fundamentals
Internet-Based Connectivity to Public Cloud
Private Connectivity to Public Cloud
SaaS Connectivity
Resilient and Scalable Public Cloud Connectivity
Cloud-Native Security Policies
Regulatory Compliance Requirements
Internet-Based Public Cloud Connectivity
Overlay Routing Deployment
Cisco SD-WAN Internet-Based Cloud Connectivity
Cisco SD-WAN Cloud Security
Cloud OnRamp for Saas
Cisco SD-WAN Policies
Application Quality of Experience
Internet-Based Public Cloud Connectivity Diagnostics
Overlay Routing Diagnostics
Cisco SD-WAN Public Cloud Connectivity DiagnosticsLab Outline
Initial Lab Network Exploration
Implement IPsec Connectivity to Public Cloud Gateways
Implement IPsec Connectivity to Cloud-Hosted Cisco IOS-XE Routers
Implement Overlay Routing
Deploy Cloud OnRamp for Multicloud
Deploy Umbrella Cloud Security
Implement Cloud OnRamp for SaaS with AppQoE
Troubleshoot Underlay Connectivity
Troubleshoot Overlay Routing
Diagnose Cloud OnRamp for Multicloud
Fortinet
- FG1 — FortiGate Security on FortiOS
Описание курса
Описание курса:
в этом трехдневном курсе Вы узнаете как использовать базовый функционал устройств FortiGate, включая профили безопасности. В ходе интерактивных лабораторных работ Вы разберетесь с политиками межсетевого экранирования, аутентификацией пользователей, SSL VPN, dial-up IPsec VPN, а также научитесь защищать Вашу сеть, используя такие профили безопасности как IPS, AV, WEB-фильтрация, AC, и другие. Эти основы администрирования позволят Вам сформировать целостное представление о внедрении механизмов сетевой безопасности с помощью продуктов FortiNet. Данный курс рекомендован для подготовки к сертификации NSE4.
Аудитория курса:
профессионалы в области информационной безопасности, занимающиеся управлением, настройкой, администрированием и мониторингом устройств FortiGate для обеспечения сетевой безопасности своей организации.
Предварительные требования к аудитории: понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности.
Содержание:
1. Основы работы с FortiGate и фабрика безопасности
2. Политики межсетевого экранирования
3. Трансляция адресов
4. Аутентификация средствами межсетевого экрана
5. Аудит и мониторинг
6. Работа цифровых сертификатов
7. WEB-фильтрация
8. Контроль за приложениями
9. Антивирус
10. Система предотвращения вторжений
11. TLS VPN
12. Dial-UP IPsec VPN
13. Предотвращение утечек данных - FG2 — FortiGate Infrastructure on FortiOS
- Длительность: 2 дня (16 часов)
- Код курса: FG2
- Стоимость
- Очный формат: 553 000 ₸
- Онлайн формат: 537 500 ₸
Описание курса
Описание курса:
в этом двухдневном курсе Вы узнаете как использовать расширенные возможности устройств FortiGate в области сетевой безопасности. Темы включают в себя разделы, описывающие наиболее часто применяемые в крупных инфраструктурах механизмы сетевой безопасности, включая transparent режим, site-to-site VPN, единый вход (SSO), web-proxy, а также маршрутизация, кластеризацию и диагностику. Данный курс рекомендован для подготовки к сертификации NSE4.
Аудитория курса:
профессионалы в области информационной безопасности, занимающиеся управлением, настройкой, администрированием и мониторингом устройств FortiGate для обеспечения сетевой безопасности своей организации.
Предварительные требования к аудитории: понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности. Знание основ настройки механизмов безопасности на устройствах FortiGate.
Содержание:
1. Маршрутизация
2. SD-WAN
3. Коммутация
4. Виртуальные домены
5. Site-to-Site VPN
6. Единый вход FortiNet (FSSO)
7. Высокая доступность (HA)
8. Web proxy
9. Диагностика - FG3 — FortiGate Enterprise FireWall Management and Troubleshooting
Описание курса
Описание курса:
в этом трехдневном курсе Вы узнаете как внедрять, поддерживать, устранять неисправности и управлять инфраструктурой информационной безопасности предприятия, построенной на устройствах FortiGate. Данный курс рекомендован для подготовки к сертификации NSE7.
Аудитория курса:
профессионалы в области информационной безопасности, занимающиеся управлением, настройкой, администрированием и мониторингом устройств FortiGate для обеспечения сетевой безопасности своей организации.
Предварительные требования к аудитории:
глубокое понимание работы сетей пакетной передачи данных. Знание принципов настройки и работы механизмов безопасности на устройствах FortiGate. Практические навыки работы с устройствами FortiGate.
Содержание:
1. Основные подходы и методики по поиску и устранению неисправностей
2. Архитектура FortiOS
3. Устранение системных неисправностей FortiOS
4. Мониторинг трафика и сессий
5. Устранение неисправностей маршрутизации
6. OSPF
7. IS-IS
8. BGP
9. Устранение неисправностей с FortiGuard
10. Централизованное управление инфраструктурой
11. Расширенные возможности Web-фильтрации
12. Пользовательские сигнатуры и возможности IPS
13. Устранение неисправностей с IPsec
14. ADVPN - FG4 — Использование решения Web Application Firewall
Описание курса
Содержание курса
В ходе данного трехдневного курса слушатели узнают, как разворачивать, настраивать и устранять неполадки в работе механизма Fortinet Web Application Firewall: FortiWeb.
Преподаватели объяснят ключевые концепции безопасности веб-приложений и проведут лабораторные занятия, в ходе которых слушатели изучат особенности защиты и механизмы для оптимизации производительности. В лабораторных работах используются симуляции трафика с атаками на реальные веб-приложения. Слушатели будут работать с этими симуляциями, чтобы узнать, как лучше распределять нагрузку с виртуальных серверов на реальные серверы, как проверять поток трафика, как обеспечить безопасность файлов cookies сеанса HTTP.
Цели курса
После прохождения данного курса слушатели будут уметь:
Знать угрозы, который могут возникнуть на уровне приложений
Защищать сеть от атак DoS
Предотвращать атаки нулевого дня без сбора полезного трафика
Делать приложения совместимыми с OWASP Top 10 и PCI DSS 3.0
Обнаруживать уязвимости на серверах и в размещенных веб-приложениях
Настраивать FortiGate совместно с системой FortiWeb для усиленной защиты HTTP и XML
Предотвращать сканирование FTP и SSH
Настраивать централизованную отчетность
Выбирать подходящий режим работы
Балансировать нагрузку между пудами серверов
Использовать SSL/TLS, аутентификацию, комплексный контроль доступа для незащищенных приложений, трафик которых передается в открытом виде
Тренировать FortiWeb для защиты специфичных приложений
Создавать черные списки подозрительных адресов, и участников DDoS
Устранять неполадки в обработке трафика FTP/SSH.
Диагностировать ложные срабатывания и настраивать исключения
Оптимизировать производительностьКому следует посетить
Специалистам по сетевым технологиям и безопасности, которые занимаются занимаются администрированием и поддержкой FortiWeb.
Предварительные требования
Для прохождения данного курса требуется обладать следующими знаниями и навыками:
Знание уровней модели OSI и протокола HTTP
Базовый опыт работы с HTML, JavaScript, языками программирования для создания динамических сайтов, например, PHP
Базовый опыт работы с платформой FortiGatПрограмма курса
Введение
Базовые настройки
Интеграция с внешней системой SIEM
Интеграция Front-End SNAT & Load Balancers
DoS & Defacement
Подписи и автообучение
SSL & TLS
Аутентификация и контроль доступа
Соответствие PCI DSS 3.0
Кэширование и сжатие
Перенаправление трафика
Устранение неполадок - FG5 — FortiMail — NSE 6 — Защита почтового email-трафика
Описание курса
Содержание курса
В ходе данного трехдневного курса, слушатели узнают, как использовать FortiMail для защиты корпоративной сети от атак, которые берут свое начало в инфраструктуре почтового трафика, а также, как использовать FortiSandbox для детектирования и срочного блокирования угроз. В ходе интерактивных лабораторных работ, слушатели познакомятся с ролью FortiMail в сети, проанализируют функции платформы, которые расширяют функционал FortiGate по фильтрации почтового трафика, протестируют работу отказоустойчивой модели внедрения. Инструктор в ходе курса поможет слушателям решать основные вопросы, связанные с обслуживанием, поддержкой, поиском и устранением неполадок в работе платформы FortiMail.
Цели курса
После прохождения данного курса слушатели будут уметь:
Внедрять FortiMail в уже существующую или вновь построенную инфраструктуру электронной почты, используя гибкие модели развертывания
Понимать архитектуру системы FortiMail: как письма проходят через модули системы и обрабатываются ими, как защищать MTA
Использовать корпоративный LDAP-сервер для управления и аутентификации пользователей
Защищать процесс передачи электронных сообщений, используя для этого лучшие рекомендованные технологии: SMTPS, SMTP over TLS, Identity Based Encryption
Блокировать спам, используя встроенные комплексные механизмы, например, глубокое инспектирование заголовков, правила фильтрации, эвристический анализ, облачный сервис FortiGuard Antispam
Обнаруживать в почтовом трафике фишинговые ссылки и вирусы нулевого дня
Интегрировать FortiMail c FortiSandbox для расширенной защиты от угроз
Предотвращать утечку конфиденциальных данных в исходящем почтовом трафике
Создавать резервные копии
Внедрять архитектуру высокой доступности для того, чтобы инфраструктура корпоративной почты работала без простоев
Диагностировать и устранять распространенные проблемы в настройках платформы FortiMailКому следует посетить
Сетевым инженерам и специалистам по информационной безопасности, которые ответственны за администрирование и поддержку решения FortiMailКому следует посетить
Сетевым инженерам и специалистам по информационной безопасности, которые ответственны за администрирование и поддержку решения FortiMail
Предварительные требования
Базовые знания о работе сетей TCP/IP и механизмах сетевой безопасности
Опыт работы с технологиями Simple Mail Transfer Protocol, Public Key Infrastructure, Secure Sockets Layer, Transport Layer Security, Remote Authentication Dial-In User Service, Lightweight Directory.
Знания о протоколах контроля доступаПрограмма курса
Концепции передачи email-трафика
Первичные базовые настройки FortiMail
Политики и контроль доступа
Аутентификация
Управление сессиями
Антивирусная проверка и проверка контента
Антиспам
Защищенные соединения
Технологии обеспечения отказоустойчивости
Server Mode
Transparent Mode
Обслуживание и устранение неполадок в работе FortiMail - FA-AN — Forti Analyzer Analyst
- Длительность: 1 день (8 часов)
- Код курса: FA-AN
- Стоимость
- Очный формат: 362 000 ₸
- Онлайн формат: 347 000 ₸
Описание курса
In this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products.
Objectives
After completing this course, you should be able to:
Understand basic FortiAnalyzer concepts and features
Describe the purpose of collecting and storing logs
View and search for logs in Log View and FortiView
Understand SOC features
Manage events and event handlers
Configure and analyze incidents
Perform threat hunting tasks
Understand outbreak alerts
Describe how reports function within ADOMs
Customize and create charts and datasets
Customize and run reports
Configure external storage for reports
Attach reports to incidents
Troubleshoot reports
Understand playbook concepts
Create and monitor playbooksPrerequisites
Familiarity with all topics presented in the FCP – FortiGate Security and FCP – FortiGate Infrastructure courses
Knowledge of SQL SELECT syntax is helpfulSystem Requirements
If you take the online format of this class, you must use a computer that has the following:
A high-speed Internet connection
An up-to-date web browser
A PDF viewer
Speakers or headphones
One of the following:
HTML 5 support
An up-to-date Java Runtime Environment (JRE) with Java Plugin enabled on your web browser
You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.Course Outline
Agenda
Introduction and Initial Access
Logging
Incidents and Events
Reports
Playbooks
Python
- PYT01 — Программирование на языке Python, базовый курс
- Длительность: 5 дней (40 часов)
- Код курса: PYT01
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Python – это высокоуровневый язык программирования, который активно набирает популярность в последнее время. Данный язык часто рассматривается как первый язык для освоения, так как он достаточно прост в изучении, но, не смотря на простоту, возможности языка позволяют решать широкий спектр задач. Данный курс разрабатывался для быстрого введения в основы языка. После прохождения курса слушатель будет иметь общее представление о современных концепциях программирования и сможет самостоятельно разрабатывать простые программы. Курс основан на актуальной версии языка.
Аудитория курса:
Курс будет полезен всем желающим начать осваивать язык программирования Python (как с опытом работы с другими языками, так и без него) для применения в дальнейшем в различных направлениях.
Язык Python используют : Разработчики ПО, WEB программисты, сетевые инженеры.Содержание курса:
1. Язык Python и типы данных
Обзор языка Python
Среды разработки ПО
Интерпретатор и выполнение программ
Типы и структуры данных
Динамическая типизация
Ввод и вывод данных
Лабораторная работа
Работа с типами данных2. Условия, циклы, словари
Структура программы
Условная инструкция
Циклы
Итерации и генераторы
Коллекции (кортежи, множества, словари)
Лабораторная работа
Работа со структурами
Лабораторная работа
Написание первых программ3. Функциональное программирование
Структура и создание функций
Виды аргументов функций
Модули
Знакомство и работа с полезными модулями
Рубежная контрольная работа по Введению в Python
Лабораторная работа
Словари. Проект.
Лабораторная работа
Создание функций и работа с модулями4. Обработка исключений и дополнительные возможности Python
Основы исключений
Особенности использования исключений
Объекты исключений
Использование исключений
Лабораторная работа
Функции и коллекции. Часть 2
Лабораторная работа
Обработка исключений5. Объектно-ориентированное программирование
ООП и функциональное программирование
Общая концепция ООП
Парадигмы ООП
Классы
Создание классов
Дополнительные возможности классов
Лабораторная работа
Работа с ООП. Классы
Лабораторная работа
Парсинг строковых данных - PYT02 — Программирование на Python, продвинутый курс
- Длительность: 5 дней (40 часов)
- Код курса: PYT02
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Курс подойдет всем, кто уже пробовал писать скрипты и несложные сервисы на языке Python, автоматизировать рабочие задачи. Предполагается, что участник данного курса, как минимум, отлично разбирается в материале базового уровня, а также хочет сильно углубить свои знания в объектно-ориентированном программировании на Python, лучше писать код, проектировать системы и делать другие сложные вещи.
Аудитория курса:
Всем, заинтересованным в углублении знаний в python, подробном рассмотрении ООП, различных аспектов проектирования сервисов и знакомству с асинхронным программированием.
Предварительные требования:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Содержание курса:
1. ООП в Python
Повторим основы Объектно-ориентированного программирования, посмотрим особенности реализации в Python, попрактикуемся в написании собственных классов. В дополнение рассмотрим темы, необходимые каждому python-разработчику, такие как статические методы, абстрактные классы и метаклассы.
Основы ООП. Создание и методы классов
Принципы ООП. Декораторы, метод super()
Композиция, перегрузка операторов
Дандер методы, статические методы
Абстрактные классы, модуль АВС
Метаклассы2. Разберем и напишем собственные классы для генераторов, итераторов, исключений и менеджера контекста.
Генераторы
Итераторы
Исключения
Менеджеры контекста
Стек и очередь3. Познакомимся с такими темами как мультипроцессинг и асинхронность, без которых сейчас не обходится ни один сервис.
Разберемся в различиях, применении, терминологии и библиотеках multiprocessing и asyncio.
Мультипроцессинг
Асинхронное программирование4. Рассмотрение основных дизайн-паттернов и практика их использования.
- PYT03 — Программирование на Python для сетевых инженеров, базовый курс
- Длительность: 5 дней (40 часов)
- Код курса: PYT03
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
В данном курсе рассматриваются как общие аспекты работы языка программирования Python, так и применение его возможностей в сценариях обслуживания работы сетевого оборудования в сетях передачи данных. В курсе изучаются общие положения программирования и использование специализированных инструментов и библиотек для взаимодействия с сетевыми устройствами.
Аудитория курса:
Сетевые инженеры и сетевые администраторы, которые хотят дополнить свои знания сетей передачи данных использованием инструментов программирования.
Предварительные требования:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC)
Знания принципов работы сетей пакетной передачи данных в объеме сертификации CCNA (или аналогичных) и более. Рекомендуется знакомство с оборудованием одного из крупных производителей сетевого оборудования (Cisco Systems, Juniper Networks и т.д.)Содержание курса:
1. Python. Типы данных
Основные факты о языке программирования Python 3 (тип, устройство, сферы применения). Преимущества использования Python в сетях передачи данных.
Примеры синтаксиса языка. Документация PEP.
Стандартные типы данных (переменные, списки, кортежи, словари, сеты, файлы) с примерами использования и основными операциями над ними (преобразования типов, генерирование и т. д.).
Типы данных (и библиотеки), используемые в работе с сетевым оборудованием (ipAddress, XML, JSON, YAML) с примерами использования и основными операциями над ними (преобразования типов, генерирование и т. д.).
Лабораторная работа 1.
Работа с типами данных (стандартными и дополнительными).2. Операторы, функции и библиотеки
Условный оператор if/elif/else.
Операторы циклов while и for. Работа с циклами (break, continue).
Понятие функций. Рассмотрение синтаксиса, локальные и нелокальные переменные. Операторы return и yield. Отличие и примеры использования функций и генераторов.
Регулярные выражения и использование библиотеки re.
Модули и библиотеки. Назначение, использование, правила оформления.
Лабораторная работа 2.
Работа с условными операторами и циклами.
Лабораторная работа 3.
Работа с функциями и генераторами.3. Исключения и Netmiko
Обработка исключений. Операторы try/except/else/finally, оператор raise. Назначение и примеры использования.
Библиотеки взаимодействия с сетевыми устройствами посредством CLI. Библиотека Netmico.
Лабораторная работа 4.
Использование библиотек Netmiko для взаимодействия с сетевыми устройствами.4. NETCONF, REST API
Протокол NETCONF и библиотека ncclient. Применение, основные понятия, принципы работы с библиотекой. Поддержка производителями.
Формат REST API и библиотека request. Применение, основные понятия, принципы работы с библиотекой. Поддержка производителями. Cisco NX-API – примеры, особенности.5. Объектно-ориентированное программирование
Общая концепция ООП.
Парадигмы ООП.
Классы.
Создание классов.
Дополнительные возможности классов.
Лабораторная работа 5.
Работа с ООП. Классы. - PYT04 — Python для сетевых инженеров, дополнительные темы
- Длительность: 5 дней (40 часов)
- Код курса: PYT04
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
В данном курсе рассматриваются расширенные темы использования языка программирования Python для обслуживания сетевого оборудования и автоматизации различных задач сетевого администратора. Изучаются принципы работы с инструментами парсинга и генерации конфигурационных файлов, инструменты анализа конфигурации, а также установка и настройка средств автоматизации управления сетевыми устройствами
Аудитория курса:
Сетевым инженерам и сетевым администраторам, которые хотят дополнить свои знания сетей передачи данных использованием инструментов программирования.
Предварительные требования:
Знания принципов работы сетей пакетной передачи данных в объеме сертификации CCNA (или аналогичных) и более.
Рекомендуется знакомство с оборудованием одного из крупных производителей сетевого оборудования (Cisco Systems, Juniper Networks и т.д.).
Также рекомендуется прохождение курса Программирование на Python для сетевых инженеров. Базовый курс (PYTHON_NET) или эквивалентный объем знаний.Содержание курса:
1. Установка сред написания программ и скриптов, установка тестовых сетевых сред
Работа с Jupyter Lab
Установка Docker
Установка и настройка ContainerLab
Лабораторная работа.
Подготовка среды для упражнений2. Парсинг конфигурационных файлов и выводов команд устройств
Основы парсинга текстовых документов в Python
Библиотека TextFSM
Библиотека TTP
Соединение операций библиотеки Netmiko и парсинга выводов команд
Лабораторная работа 1.
Парсинг выводов команд сетевого оборудования3. Библиотека Batfish
Назначение инструмента Batfish
Установка контейнера Batfish
Подготовка к использованию Batfish в Python
Возможности Batfish по анализу файлов конфигурации
Лабораторная работа 2.
Установка Batfish и работа с конфигурационными файлами устройств4. Библиотека Jinja2 для создания конфигурационных файлов
Подготовка к использованию Jinja2
Синтаксис шаблонов Jinja2
Лабораторная работа 3.
Создание конфигурационных файлов с помощью Jinja25. Nornir (подготовка и инициализация)
Установка и подготовка
Построение инвентарных данных
Основы синтаксиса
Лабораторная работа 4.
Установка и подготовка фреймворка Nornir6. Nornir (использование)
Конфигурационные опции и подготовка результатов
Задания и обработка инвентарных данных
Пользовательские задания
Обработка неполадок и ошибок заданий
Лабораторная работа 5.
Использование Nornir для настройки и обслуживания сетевого оборудования7. Готовые библиотеки и фреймворки от производителей оборудования
Рассмотрение работы библиотек различных сетевых производителей (Cisco, Juniper и т.д.)
Лабораторная работа 6.
Использование фреймворков и библиотек от производителей оборудования8. Использование инструментов CI/CD для работы с сетевым оборудованием
Установка и настройка Jenkins
Построение pipeline в Jenkins для выполнения серий заданий на сетевых устройствах
Лабораторная работа 7.
Использование Jenkins для работы с сетевым оборудованием - PYT05 — Настройка сетевого оборудования с использованием Ansible
- Длительность: 5 дней (40 часов)
- Код курса: PYT05
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
На данном курсе участники познакомятся с системой управления конфигурациями Ansible для работы с настройкой сетевого оборудования различных производителей. В курсе рассматриваются аспекты подготовки инфраструктуры под использование Ansible и осуществление конфигурационных и мониторинговых работ над оборудованием с помощью встроенных и дополнительных инструментов Ansible. Участники курса получат навыки эксплуатации Ansible с использованием рекомендованных практик, а также информацию о поиске и устранении неполадок в работе системы управления конфигураций.
Аудитория курса:
Курс будет интересен сетевым администраторам, сетевым архитекторам и специалистам технической поддержки.
Предварительные требования:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Содержание курса:
1. Основы Ansible и установка.
Архитектура и назначение Ansible
Устройство инвентарных данных Ansible
Установка и предварительная настройка
Установка и настройка Ansible AWX
Основы построения Ansible Playbook
Переменные и модули
Отправка команд командной строки2. Построение комплексных плейбуков
Управление учетными записями
Сбор фактов о сетевых устройствах
Tag, limit и check
Условия
Петли (циклы)
Шаблонизация конфигурации3. Масштабирование работы с инфраструктурой
Специализированные модули для конфигурации
Import и Include
Роли
Парсинг выводов сетевых устройств
Динамическая инвентаризация
Управление процессом выполнения4. Расширенные возможности Ansible
Jinja2 lookup плагин
Фильтры
Плагины
Устранение неполадок работы Ansible
Ansible Vault5. Интеграция и расширенные темы
Интеграция со сторонними системами инвентаризации
Интеграция со сторонними системами конфигурирования
Создание пользовательских модулейУпражнения
Установка и настройка Ansible и Ansible AWX
Инвентаризация и базовая отправка команд на группы устройств
Использование условий и циклов
Создание и использование шаблонов конфигурации
Роли и импорты
Использование плагинов и фильтров
Использование Ansible Vault
Устранение неполадок
Интеграция с NetBox и NAPALM - PYT06 — Автоматизация задач на основе Python
- Длительность: 5 дней (40 часов)
- Код курса: PYT06
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Курс подойдет всем, кто уже умеет писать несложные скрипты для рабочих задач и хочет научиться автоматизировать и другие процессы. На курсе вы научитесь с помощью python-скриптов открывать и обрабатывать различные виды файлов, обрабатывать табличные данные, используя подходящие решения и фреймворки python, научитесь автоматически генерировать документы и отчеты из обрабатываемых данных, познакомитесь с клиент-серверной архитектурой и создадите собственный телеграм-бот, а так же узнаете о большом количестве полезных библиотек, способных упростить вам работу.
Аудитория курса:
Всем специалистам, заинтересованным во внедрении Python в свою работу и автоматизации рутинных задач и бизнес-процессов.
Предварительные требования к аудитории:
Знание языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Для проверки уровня предварительных знаний можно пройти тестирование.Содержание курса:
1. Работа с файлами txt, xml, yaml, json, csv.
Чтение, запись, обработка.
Методы обработки словарей
Практика: обработка данных из файлов, анализ табличных данных2. Библиотеки для анализа данных pandas и numpy.
Визуализация данных с помощью matplotlib/seaborn.
Обработка и анализ больших данных.3. Автоматизация работы с файлами word и excel.
Библиотеки openpyxl и docxtpl.
Регулярные выражения.
Практика: генерирование отчетов по шаблону по данным из базы, проверка данных4. Работа с HTTP в Python.
Модуль requests.
Работа с API.
Практика: Развертывание telegram бота.Модуль 5. Обзор полезных библиотек и фреймворков Python для автоматизации
- PYT07 — Применение Python для обработки данных
- Длительность: 5 дней (40 часов)
- Код курса: PYT07
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Данный курс рассматривает основные возможности языка Python и вспомогательных библиотек для работы с большими объемами структурированных и неструктурированных данных с использованием локальных ресурсов и облачных сред. Изучаются основы машинного обучения как способа работы с неструктурированными данными на основе библиотеки Tensorflow. Также рассматриваются распространённые инструменты визуализации данных.
Аудитория курса:
Инженеры по работе с данными, а также разработчики ПО, желающие изучить основы машинной обработки данных
Предварительные требования к аудитории:
Знания языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Содержание курса:
1. Python для работы с данными.
Обработка данных с помощью Python
Введение в Jupyter Lab
Собственные структуры данных Python
Библиотека NumPy (цель и возможности)
Библиотека MatPlotLib (цель и возможности)
Лабораторная работа 1.
Работа с типами данных2. Оценка данных, введение в машинное обучение
Библиотека Pandas, понятие датафреймов и операции над ними
Введение в машинное обучение
Терминология
Виды и возможности
Обучение моделей
Градиентный спуск
Hyperparameters, Losses, Learning Rate
Generalization
Сеты данных
Лабораторная работа 2.
Работа с датафреймами
Лабораторная работа 3.
Изучение зависимостей в машинном обучении3. Tensorflow и Feature Engineering
Введение в Tensorflow и Keras
Возможности и способы использования
Готовые модели
Инструменты для создания собственных моделей
Feature Selection and Engineering
Лабораторная работа 4. Использование Tensorflow
Лабораторная работа 5.
Feature Engineering4. Глубокое обучение и среды для обучения моделей
Глубокое обучение
Применение и возможности
Ресурсы для обучения моделей
Облачные ресурсы для обучения моделей
Лабораторная работа 6.
Глубокое обучение
Лабораторная работа 7.
Обучение моделей в подготовленной среде5. Визуализация данных.
Библиотеки Python для визуализации
Облачные среды для визуализации данных
Статистическая оценка данных
Лабораторная работа 8. Визуализация и статистическая оценка данных - PYT08 — Python для web разработки, фреймворк flask
- Длительность: 5 дней (40 часов)
- Код курса: PYT08
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Flask — самый простой фреймворк для создания веб-приложений на языке программирования Python. Он подходит как для генерации страниц сайта или сервиса, так и для создания API мобильных приложений. Данную технологию можно интегрировать в люблю сферу, в том числе для создания личных и рабочих проектов. В ходе обучения рассматривается комплекс тем, начиная с того, что такое HTTP и как работает Интернет, заканчивая особенностями создания своего полноценного сервиса и развертывания его на сервере.
Предварительные требования к аудитории:
Знание языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Для проверки уровня предварительных знаний можно пройти тестирование.Содержание курса:
Модуль 1.
Фреймворк Flask и основы WEB
Как работает Интернет
Создание веб приложения на фреймворке Flask;
Маршрутизация
Рендеринг HTML
Язык шаблонов JinjaМодуль 2.
Создание URL адресов для сайта;
Обработка GET и POST запросов;
Связь backend и frontend;
Обработка запросов клиента на сервере
Получение данных запроса на сервереМодуль 3.
Реляционные базы данных. Введение
Основы SQL, ORM
Запросы к базе данных. Вывод информации из базы данных на страницах сайта;
Подключение базы данных в Flask
Библиотека SQLAlchemyМодуль 4.
Добавление, изменение, удаление данных;
Модели, отношения между моделями, миграции;
Защита сайта от атак
Итоговый проект - PYT09 — Python фреймворк Django
- Длительность: 5 дней (40 часов)
- Код курса: PYT09
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Django – бесплатный и свободный фреймворк для веб-приложений, написанный на Python. Изучение фреймворка значительно сложнее аналогичного Flask, однако предоставляет разработчикам больший функционал для создания сервисов. Преимуществами Django являются скорость, безопасность и масштабируемость. За курс вы получите базовые знания фреймворка, научитесь применять их на практике и спроектируете своё первое веб-приложение.
Предварительные требования:
Знание языка Python на уровне курса Программирование на языке Python (PYTHON_BASIC).
Для проверки уровня предварительных знаний можно пройти тестирование.Содержание курса:
Модуль 1.
Фреймворк Django – основные понятия
Установка Django и создание первого проекта
Приложения в проекте (Applications)
URL. Параметры в URL-запросах
Шаблоны (Templates)
Формы (Forms). Получение данных с формыМодуль 2.
Разработка архитектуры базы данных
Реляционные базы данных
Типы и свойства полей базы данных
Разработка архитектуры базы данных – отношения между моделями в DjangoМодуль 3.
Введение в Django ORM
Выполнение запросов к базе данных
Создание и редактирование записей в базе данных
Введение в Git и GithubМодуль 4.
CRUD приложения
Рендеринг шаблонов
Язык шаблонов. Шаблонные фильтры
Итоговый проект - PYT10 — Использование Python для работы с базами данных
- Длительность: 5 дней (40 часов)
- Код курса: PYT10
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Курс предназначен для тех, кто уже знаком с основами языка программирования Python и хочет расширить свои навыки, используя их для работы с базами данных. В течение курса вы узнаете, как подключаться к базам данных, выполнять запросы, изменять данные и многое другое, используя мощные библиотеки Python, такие как SQLAlchemy и psycopg2.
Аудитория курса:
Курс предназначен для программистов и разработчиков, которые хотят использовать Python для работы с базами данных. Участники должны иметь базовые знания языка программирования Python и понимание основных понятий баз данных.
Предварительные требования к аудитории:
Базовые знания языка программирования Python.
Понимание основных понятий баз данных.Содержание курса:
Модуль 1
Введение в работу с базами данных в Python.
Установка и настройка необходимых инструментов.
Подключение к базе данных.
Лабораторная работа 1: Настройка окружения и подключение к базе данных.Модуль 2
Основные операции с базами данных в Python.
Выполнение запросов.
Изменение данных.
Лабораторная работа 2: Выполнение запросов и изменение данных в базе данных.Модуль 3
Работа с ORM (Object-Relational Mapping).
Использование SQLAlchemy.
Лабораторная работа 3: Использование SQLAlchemy для работы с базой данных.Модуль 4
Работа с PostgreSQL базами данных.
Использование библиотеки psycopg2.
Лабораторная работа 4: Работа с PostgreSQL базами данных в Python.Модуль 5
Оптимизация работы с базами данных.
Масштабирование баз данных.
Лабораторная работа 5: Оптимизация работы с базами данных в Python. - PYT11 — Анализ данных с помощью Python
- Длительность: 5 дней (40 часов)
- Код курса: PYT11
- Стоимость
- Очный формат: 716 500 ₸
- Онлайн формат: 693 000 ₸
Описание курса
Описание курса:
Данный интенсивный курс разработан для сотрудников, желающих овладеть современными инструментами автоматизации рабочих процессов, анализа данных и поддержки цифровой трансформации в инженерных и научных направлениях.
Программа охватывает фундаментальные и прикладные аспекты работы с языком Python и его специализированными библиотеками, включая все этапы аналитики: от сбора и предварительной обработки данных до визуализации и построения простых моделей машинного обучения.
В ходе курса большое внимание уделяется автоматизации типовых задач, преобразованию данных для последующего анализа, а также актуальным методикам презентации и внедрения полученных решений в рабочие процессы.
Аудитория курса:
Курс предназначен для инженеров, научных сотрудников, специалистов по цифровой трансформации, аналитиков данных и всех заинтересованных в автоматизации рабочих процессов и анализе данных.
Предварительные требования к аудитории:
Предварительный опыт программирования не обязателен, но приветствуется базовое владение компьютером и желание применять полученные знания для решения производственных и исследовательских задач.
Содержание курса:
Модуль 1 Введение в Python для анализа данных
Python как инструмент для анализа данных и автоматизации
Установка окружения (Python, Anaconda, Jupyter)
Базовые структуры и синтаксис языка: переменные, типы данных, списки, кортежи, словари
Операторные конструкции, функции, работа с модулями
Основы работы с файлами: чтение, запись, структура CSV и JSON
Введение в pandas как инструмент работы с табличными данными
Краткий обзор реальных задач из инженерии и науки.Модуль 2 Обработка и подготовка данных— Структурированные и неструктурированные данные
Импорт данных из разных источников (CSV, Excel, базы данных, API)
Очистка данных: работа с пропусками, дубликатами, выбросами
Преобразование данных: фильтрация, группировка, агрегация
Кодирование переменных, обработка категориальных данных
Методы автоматизации этих процессов с помощью Python
Обработка текстовых данных, регулярные выражения
Практические аспекты ускорения загрузки и подготовки данныхМодуль 3 Визуализация данных— Важность визуального представления информации
Основные библиотеки: matplotlib, seaborn, pandas plotting
Построение и настройка различных типов графиков (столбчатые, линейные, точечные, круговые, boxplot)
Визуализация для инженерных и научных задач, анализ временных рядов
Кастомизация визуализации для деловой презентации
Использование интерактивных графиков для отчетностиМодуль 4 Математические методы и машинное обучение — Основы статистики
Pandas и numpy: базовые математические и статистические операции
Применение агрегирования и сводных таблиц для анализа больших массивов
Введение в машинное обучение: типы задач, этапы работы с моделями
Знакомство с библиотекой tensorflow: задачи классификации и регрессии
Оценка и интерпретация моделей: точность, метрики, визуализация
Сценарии применения ML для автоматизации научных и инженерных задачМодуль 5 Автоматизация рабочих процессов — Автоматизация типовых операций с помощью скриптов Python
Подходы к написанию повторно используемого кода, управление проектами
Использование git и систем управления версиями
Организация end-to-end пайплайнов аналитики
Документирование аналитических процессов, подготовка к внедрению решений
Интеграция Python с корпоративными платформами и API
Тренды в аналитике: искусственный интеллект, большие данные, облачные решения.
VMware
- CDICM106 — VMware Cloud Director: Deploy, Configure, Manage v10.6
- Длительность: 5 дней (40 часов)
- Код курса: CDICM106
- Стоимость
- Очный формат: 1 108 500 ₸
- Онлайн формат: 1 055 500 ₸
Описание курса
Course Overview
In this five-day course, you focus on installing, configuring, and managing on-premises VMware Cloud Director 10.6. You will learn how to set up and manage VMware Cloud Director, including the provisioning of workloads, creating organizations and Virtual Data Centers (VDCs), and use catalog services that include predefined virtual machines. You will learn about different networks that a system administrator and an organization administrator can configure and use with virtual machines and vApps.
Course Content
Course Introduction
VMware Cloud Director Deployment and Configuration
VMware Cloud Director Provider Configuration
VMware Cloud Director User, Roles, and Quota Management
VMware Cloud Director Virtual Machines and vApps
Managing Catalogs and Templates
VMware Cloud Director Networking
Sub-Provider in VMware Cloud Director
VMware Avi Load Balancer
Edge Data Center Group Networking
Additional Features of VMware Cloud DirectorWho should attend
Cloud architects, systems engineers, data center administrators, and cloud administrators with experience in managed services or managing a service provider environment.
Prerequisites
This course requires completion of the following course and equivalent knowledge:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware NSX: Install, Configure, Manage [V4.0] (NSXICM4)Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the architecture and main components of VMware Cloud Director
Explain the features and benefits of VMware Cloud Director
Deploy high availability VMware Cloud Director cluster
Create VMware Cloud Director provider virtual data centers and organizations
Configure and create vApps and VMs
Create users and role-based access control
Create and manage VMware Cloud Director catalogs
Create and manage VMware Cloud Director networks
Create VM sizing and placement policies
Discuss additional features of VMware Cloud DirectorOutline: VMware Cloud Director: Deploy, Configure, Manage [V10.6] (VCDDCM106)
1 Course Introduction
Introductions and course logistics
Course objectives2 VMware Cloud Director Deployment and Configuration
Describe VMware Cloud Director features and functions
Describe the VMware Cloud Director architecture
List the prerequisites for deploying VMware Cloud Director
Recognize the design considerations when creating a cloud environment
Describe various VMware Cloud Director deployment methods and options
Explain the two-stage deployment of VMware Cloud Director cells
Back up and restore a VMware Cloud Director appliance
Describe the appliance failover methods
Describe failover, switchover, and promote in the VMware Cloud Director appliance
Monitor the VMware Cloud Director appliance services and cluster status3 VMware Cloud Director Provider Configuration
Describe the provider portal
Define a provider VDC, an organization, and organization VDCs
Configure VMware Cloud Director objects from the VMware Cloud Director provider portal as a system administrator
Describe provider VDCs and their role in resource allocation
Explain the configuration of resource pools and storage containers in a provider VDC
Configure organizations and access the tenant portal
Identify allocation models for organization VDCs
Recognize the advantages and disadvantages of allocation models
Describe how organization VDCs work4 VMware Cloud Director User, Roles, and Quota Management
Configure LDAP integration with Active Directory
Enable a SAML and an OIDC identity provider
Identify the various types of users in VMware Cloud Director
Create and import users from the provider portal and the tenant portal
Describe the options for managing users and groups
Describe how role-based access control works in VMware Cloud Director
Explain provider roles
Recognize the function of the rights bundles
Explain global roles and their usage in VMware Cloud Director
Create custom tenant roles
Explain Quota Management and its use cases
Configure VMware Cloud Director as an OpenID Provider Proxy Server5 VMware Cloud Director Virtual Machines and vApps
Explain standalone VMs and VMs in a vApp
Describe VM actions
List the properties of a VM
Create and manage VMs
Explain vApp deployment methods
Explain vApp actions and functions
Describe VM encryption and how VMs and disks are encrypted
Describe named disks and shared named disks
Create multiple snapshots for vApps and VMs
Describe Auto Scale Groups and their advantages
Explain VM placement, VM sizing, and vGPU policies
Describe NVIDIA vGPU and NVIDIA AI Enterprise
Explain the NVIDIA GRID vGPU requirements
Implement vGPU in VMware Cloud Director6 Managing Catalogs and Templates
Describe Content Hubb and their advantages
Create and manage VMware Marketplace Resource
Create and manage External Helm Chart Repository Resource
Explain the purpose and use of catalogs
Create and manage catalogs
Describe, how catalogs are shared between and within organizations
Describe vApp templates and their advantages
Create and manage the vApp template
Create and manage the organization VDC template7 VMware Cloud Director Networking
Discuss the integration of VMware Cloud Director with VMware NSX
Describe VMware Cloud Director networks
Perform provider networking tasks
Discuss organization VDC networks
List the types of organization VDC networks
Discuss vApp networks
List the various types of vApp networks
Describe the segment profile template
Configure edge gateway services8 Sub-Provider in VMware Cloud Director
Explain the concept of Sub-Providers
Explain the configuration of resources to a Sub-Provider
Manage a Sub-Provider organization
Use the Sub-Provider organization to configure identity provider and manage users
Configure quotas and policies to a Sub-Provider
Perform common catalog tasks in the Sub-Provider organization
Perform common networking tasks in the Sub-Provider organization9 VMware Avi Load Balancer
Discuss VMware Cloud Director integration with VMware NSX Advanced Load Balancer
Describe NSX Advanced Load Balancer components
Configure NSX Advanced Load Balancer in the provider portal
Configure NSX Advanced Load Balancer in the tenant portal10 Edge Data Center Group Networking
Describe Data Center Group network
Create Data Center Group
Add a NSX Edge gateway to a Data Center Group
Activate Distributed Firewall for a Data Center Group
Configure Data Center Groups using NSX Federation11 Additional Features of VMware Cloud Director
Explain the purpose and features of advisories.
Describe the Guided Tour feature and its use cases
Configure VMware Cloud Director branding
Explain the Solution Add-Ons feature in Vmware Cloud Director
Briefly discuss VMware Cloud Director integration with the following solutions:
VMware Cloud Director Availability
VMware Cloud Director App Launchpad
VMware Cloud Director Container Service Extension
VMware Cloud Director Object Storage Extension
VMware vCloud Usage Meter
VMware Aria Operations for Logs
VMware Aria Operations
VMware Chargeback
VMware Aria Automation
VMware Cloud Director Extension for Data Solutions
VMware Cloud Provider Lifecycle Manager
VMware Workspace ONE - VCFBMS90 — VMware Cloud Foundation: Build, Manage and Secure V9.0
- Длительность: 5 дней (40 часов)
- Код курса: VCFBMS90
- Стоимость
- Очный формат: 1 792 000 ₸
- Онлайн формат: 1 738 500 ₸
Описание курса
Course Overview
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, operating and securing private cloud using VMware Cloud Foundation® (VCF). You will learn about the architecture of VCF, storage and network management, licensing, and certificates. In addition to workload domains, availability, and life cycle management, the course also covers upgrade scenarios.
Course Content
Course Introduction
VCF Private Cloud: Overview and Architecture
VCF Private Cloud Deployment
VCF Post-deployment Tasks
VCF Fleet Management
VCF Workload Domain
VCF Networking
VCF Storage Management
VCF Certificate Management
VCF Life Cycle Management
VCF Security
VCF Upgrade PathsWho should attend
System Administrators, Solution Engineers, Consultants, Architects, and Support Personnel
Prerequisites
This course has the following prerequisites:
Implement Learning Path Stage-1 Training
Working experience and knowledge of VMware vSphere®, VMware NSX®, and vSAN environmentsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Define VCF and its key features
Describe the use cases of VCF
Explain the architecture of the VCF private cloud
Recognize the components of the VCF private cloud
Outline the sequence for deploying the VCF private cloud
Describe the deployment configuration of VCF instance core components
Explain the deployment configuration of VCF fleet management components
Deploy VMware Cloud Foundation®
Operations for networks, VMware Cloud Foundation®
Operations for logs, and VMware Cloud Foundation®
Identity Broker
Describe the VCF licensing model
Describe the single sign-on architecture in VCF
Identify the steps to configure single sign-on in VCF
Manage users and user groups in VCF
Outline the steps to manage passwords in VCF
Outline the steps to create a workload domain
Configure VMware® vCenter® linked groups
Import vCenter as a workload domain using VCF Operations
Describe the process for configuring Fibre Channel storage
Identify the components of an iSCSI storage system
Outline the process of provisioning NFS storage to VMware® ESX hosts
Identify and use built-in tools to validate a successful VMware® vSAN deployment
Compare the various tools used to monitor a vSAN cluster
Explain the types of vSAN reports available in VMware Cloud Foundation® Operations
Explain Virtual Private Cloud concepts and constructs
Differentiate between Centralized and Distributed Network Connectivity
Identify the steps to configure virtual private cloud
Manage certificates in VCF
Explain the life cycle management of VCF components
Identify the supported upgrade paths to VCF 9.0
Define security, compliance and resilience in VCF
Describe the integrated security features across all layers in VCF
Discuss and perform VCF upgrade pathsOutline: VMware Cloud Foundation: Build, Manage, and Secure (VCFBMS)
Course Introduction
Introduction and course logistics
Course objectivesVCF Private Cloud: Overview and Architecture
Define VCF and its key features
Describe the use cases of VCF
Explain the capabilities of VCF
Describe the integrated security across all layers in VCF
Explain the advanced services of VCF
Explain the architecture of the VCF private cloud
Recognize the components of the VCF private cloud
Distinguish between VCF fleet-level components and VCF instance-level components
Describe the various roles in VCF private cloudVCF Private Cloud Deployment
Identify the VCF fleet deployment considerations
Describe the process for planning and preparing a VCF deployment
Identify the information required for the Planning and Preparation Workbook
Explain the high-level steps to deploy VCF private cloud
Outline the sequence for deploying the VCF private cloud
Describe the deployment configuration of VCF instance core components
Explain the deployment configuration of VCF fleet management components
Use the VCF Installer deployment wizard to deploy a new VCF fleet
Use a deployment specification JSON file to deploy a new VCF fleetVCF Post-deployment Tasks
Navigate the VCF Operations user interface
Navigate the VMware Cloud Foundation® Automation user interface
Navigate the vSphere Client user interface
Explain VCF Operations for networks, VCF Operations for logs, and VCF Identity Broker
Deploy VCF Operations for networks, VCF Operations for logs, and VCF Identity BrokerVCF Fleet Management
Describe the VCF licensing model
Assign and manage VCF licenses
Identify key log files to troubleshoot licensing issues
Discuss single sign-on in VCF
Describe the single sign-on architecture in VCF
Discuss VCF Identity Broker in VCF
Identify the steps to configure single sign-on in VCF
List the supported directories and IDPs in VCF
Configure SSO and enablement for all components in a VCF Instance
Manage users and user groups in VCF
Outline the steps to manage passwordsVCF Workload Domain
Explain VCF domains
Describe the management of the workload domains
List design considerations for workload domains
Describe design prerequisites for a workload domain
Outline the steps to create a workload domain
Describe vCenter Groups
Configure vCenter linked groups
Import vCenter as a workload domain using VCF OperationsVCF Networking
Describe the role of VMware NSX in VCF
Describe the default NSX objects that are created during the VCF deployment
Discuss the Workload domain networking options
Describe the networking constructs in NSX
Explain Virtual Private Cloud concepts and constructs
Differentiate between Centralized and Distributed Network Connectivity
Configure Distributed Network Connectivity
Configure Centralized Network Connectivity
Identify key CLI commands to determine the NSX Edge cluster status and BGP peering
Create a Virtual Private Cloud
Create subnets within a virtual private cloudVCF Storage Management
Define the key components involved in Fibre Channel storage systems
Describe the process for configuring Fibre Channel storage
Identify the components of an iSCSI storage system
Explain how iSCSI addressing works
Describe the benefits and considerations of using multipathing with iSCSI storage
List the requirements to use NFS as principal and supplemental storage
Outline the process of provisioning NFS storage to ESX hosts
Describe the steps involved in deploying a vSAN cluster
Identify and use built-in tools to validate a successful vSAN deployment
Apply a custom storage policy to an individual virtual machine or virtual disk
Compare the various tools used to monitor a vSAN cluster
Explain the types of vSAN reports available in VCF Operations
Compare different maintenance mode options and their impact on object health
Summarize the steps to power down a vSAN cluster in a workload domainVCF Certificate Management
Describe public key infrastructure
Explain the purpose of certificate signing requests
Outline the steps to integrate certificates in VCF
List the available CA options in SDDC Manager
Integrate VCF Operations with Microsoft CA and OpenSSL CA
Manage certificates in VCFVCF Life Cycle Management
Discuss life cycle management in VCF
Explain the life cycle management of VCF fleet management
Describe how to configure software depots
Describe how to upgrade and patch fleet management components
Explain the life cycle management of VCF components
Describe how to upgrade and patch the VCF management components
Explain the process for backing up and restoring fleet-level management components
Explain the process for backing up and restoring VCF management componentsVCF Security
Define security, compliance and resilience in VCF
Describe the integrated security features across all layers in VCF
Explain the advanced networking and security capabilities of VCF
Outline the steps to monitor User and Infrastructure Security
Explain how Compliance Benchmark works
Outline the steps to monitor Configuration DriftVCF Upgrade Paths
Identify the supported upgrade paths to VCF 9.0
Explain the upgrade key consideration
Evaluate both existing and future compatibility assessments
Explain the upgrade sequence to the VCF 9 fleet using the existing vSphere
Explain the upgrade sequence to the VCF 9 fleet using the existing vSphere and VCF Operations
Explain the upgrade sequence to the VCF 9 fleet using the existing VCF 5.2 with multiple Aria components - VCFAOP90 — VMware Cloud Foundation: Automate and Operate v9.0
- Длительность: 5 дней (40 часов)
- Код курса: VCFAOP90
- Стоимость
- Очный формат: 1 792 000 ₸
- Онлайн формат: 1 738 500 ₸
Описание курса
Course Overview
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in automating and operating a VCF private cloud using VMware Cloud Foundation® Automation and VMware Cloud Foundation® Operations. You will learn about the architecture of VCF Automation, provider and organization management, provider and organization networking, and content library management. The course covers blueprints, catalogs, Supervisor management, and deploying workloads using the Catalog and IaaS portals. You will learn about VCF Operations overview, architecture, and navigating the user interface. You will explore customizing alerts, views, reports, dashboards, and policies. This course also explains VCF logs, storage, and network operations, health and diagnostics, service discovery, and application monitoring concepts.
Course Content
VCF Automation Overview and Architecture
Provider Infrastructure Management
Provider Identity Management
Regions
Organizations
Provider Networking
Organization Networking with VPC
Provider Content Library
Organization Management
Organization Content Management
IaaS Platform Architecture and Deployment
Deploying Modern Apps with IaaS
VCF Operations Overview
VCF Metrics, Views, and Reports
VCF Dashboards
VCF Symptoms and Alerts
VCF Health and Diagnostics
VCF Logs, Storage, and Network Operations
VCF Operations Policies
VCF Centralized MonitoringWho should attend
System architects and system administrators
Prerequisites
Before taking this course, students should take the following courses:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware NSX: Install, Configure, Manage [V4.0] (NSXICM4)Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe VCF Automation components and supporting architecture
Perform infrastructure management as a cloud provider
Deploy Regions and Organizations as the cloud provider
Configure networking at the cloud provider and organization levels
Configure and manage content libraries at the provider and organization levels
Manage access control in the organization using users and groups
Create and manage infrastructure blueprints and catalogs
Describe the use of the embedded orchestrator to create workflows
Deploy VM workloads using catalog deployment and Kubernetes-based IaaS deployments
List the key features of VCF Operations
Outline VCF Operations use cases
Create custom views and reports
Describe the functions of dashboards
Create custom dashboards
Create custom symptoms and alert definitions
Outline the role of VCF Health and Diagnostics
Explain Troubleshooting Workbench
Describe the VMware Cloud Foundation® Operations for logs overview
Identify performance and health issues with the Storage clusters using Storage Operations
Identify performance and health issues with the VCF Network objects
Create policies to meet the operational needs of your environment
Configure service discovery and application monitoringOutline: VMware Cloud Foundation: Automate and Operate (VCFAO)
VCF Automation Overview and Architecture
Describe the features, benefits, and purposes of VCF Automation
Explain the architecture of VCF AutomationProvider Infrastructure Management
Describe the provider management and provider consumption portals
List the supported options for provider administrator from the provider portal
Explain managing tasks and events from the provider portal
Describe the features of the provider consumption organization
Describe how to discover infrastructure resources
Explain how to manage IP spaces and provider gatewaysProvider Identity Management
Explain how to enable VCF SSO for the Automation appliance
Discuss configuring VMware Cloud Foundation® Identity Broker as the identity provider
List the supported IdP (ODIC, SAML, LDAP)
Discuss how to register a provider-scoped identity provider
Explain managing VCF Automation roles and rights
Discuss managing VCF Automation users and groups
Discuss provider-scoped service accountsRegions
Explain the basics of a Region
Identify the utilization of the Region
Discuss prerequisites and available options for creating a RegionOrganizations
Describe the different Organizations offered in VCF Automation
Identify the use cases for manual setup and multitenancy
Identify use cases for Quick Setup
Create a VCF Automation VM Apps Organization
Create a VCF Automation All Apps OrganizationProvider Networking
Discuss prerequisites for creating the provider network
Discuss the workflow for configuring the provider network
Describe IP Spaces
Discuss Edge nodes, Edge clusters, and the network services it offers
Configure IP Spaces and verify the configuration
Configure the Provider Gateway and verify the status
Synchronize Edge clusters and verify the status
Configure regional networking for an Organization
Discuss steps to verify the creation of network resources in VMware NSX®, VMware vCenter®, and VCF Automation.
Discuss the mapping of resources between VCF Automation, NSX, and vCenterOrganization Networking with VPC
Discuss Organization Networking
Discuss the architecture of the VPC
Discuss access modes and subnet types in VPC
Describe the scope of different subnet types in VPC
Discuss Outbound Routing and Network Address Translations in VPC
Configure VPC with a default, custom connectivity profile and verify its status
Configure Private-TGW IP Block, associate it with a VPC, and verify its statusProvider Content Library
Describe the Provider Content Library creation workflow
Explain publishing and subscribing to a Content LibraryOrganization Management
Identify the key components of an All Apps Organization
Explain namespace classes
Explain creating and managing Projects
Discuss Chargeback for Organizations
Integrate identity providers into Organizations
Manage users and groups in an Organization
Create and manage deployment-centric policies
Create and manage Supervisor resource-centric policiesOrganization Content Management
Identify and manage the different content available in Content Hub
Differentiate between catalog self-service versus IaaS self-service
Publish content to Catalog for end-user consumption
Deploy and modify Catalog items
Configure and use custom forms
Explain the role of YAML in configuring and managing infrastructure as code
Publish Content to Catalog for End User Consumption
Discuss the use of the embedded orchestrator
Discuss the use cases of an external orchestrator
Describe orchestrator workflowsIaaS Platform Architecture and Deployment
Explain Supervisor architecture
Discuss Supervisor requirements
List Supervisor use cases
Discuss the vSphere administrator workflow
List the components of the Supervisor
Discuss the types of Supervisor deployment
Discuss the requirements of Supervisor deployment
Describe Supervisor deployment during the VI Workload Domain creationDeploying Modern Apps with IaaS
Discuss self-service consumption with IaaS services in VCF 9
Discuss the features of the IaaS console
Describe how to get instance information from the console
Explain the YAML Spec for the VM service
Discuss VCF CLI commandsVCF Operations Overview
List the key features of VCF Operations
Outline VCF Operations use cases
Navigate the VCF Operations console
Identify the components of a VCF Operations node
Describe the different roles of the node in a VCF Operations clusterVCF Metrics, Views, and Reports
Outline the role of metrics in VCF Operations
Outline the role of views in VCF Operations
List the steps to create a basic custom view and configure view settings
Outline the roles of reports in VCF Operations
List the steps to create a basic report and configure report settingsVCF Dashboards
Describe the functions of dashboards
Create dashboards that use predefined and custom widgets
Manage dashboards by grouping and sharing with users
Explain the use cases of predefined dashboards and custom dashboards
List VCF Operations use casesVCF Symptoms and Alerts
Describe the purpose of using alerts
Identify the components of an alert definition
Create symptom definitions
View and manage triggered alerts in the VCF Operations console
Configure a custom alert using the Create Alert Definition workflowVCF Health and Diagnostics
Outline the role of VCF Health and Diagnostics
Describe the VCF Health and Diagnostic Findings features
Monitor the operational state of VCF instances
Explain Troubleshooting Workbench
Enable support teams with full context using Log AssistVCF Logs, Storage, and Network Operations
Describe the VCF Operations for logs overview
Describe the key benefits of the VCF Operations for logs
Describe the capabilities of VCF Operations for logs
Describe the VCF Storage Operations overview
Identify performance and health issues with the Storage clusters
Describe the benchmarking and optimization tool to detect issues for a new cluster
Describe the VCF Network Operations overview
Discuss the different widgets available in VCF Network Operations
Identify the performance and health issues with the VCF Network objectVCF Operations Policies
Describe the purposes of policies in VCF Operations
Configure policies and other componentsVCF Centralized Monitoring
Describe the infrastructure services monitoring capabilities
Describe the application monitoring capabilities
Describe the different types of application metrics
Outline the requirements to enable service discovery and application monitoring
Describe the different types of service metrics
Use collected metrics to interpret the status of services - VCFSD90 — VMware Cloud Foundation: Solution Architecture and Design 9.0
- Длительность: 5 дней (40 часов)
- Код курса: VCFSD90
- Стоимость
- Очный формат: 954 500 ₸
- Онлайн формат: 905 500 ₸
Описание курса
Course Overview
This five day course explores the architecture and design considerations for an initial deployment of VMware Cloud Foundation (VCF). The course explains the architecture framework and language, as well as design considerations for building, operationalizing, and consuming a VMware Cloud Foundation deployment. The scope of the course is centered on the core design considerations applicable to a VMware Cloud Foundation deployment in a single site.
Course Content
Course Introduction
Architecture Frameworks and Models
VMware Cloud Foundation Overview
VCF Fleet and Instance Design
Building the Physical Fabric and VCF Networking Design
Storage and vSAN Essentials
Management Domain
Workload Domains
VCF AMPRS Considerations Summary
VCF Consumption Design with VCF Automation and Supervisor
Day 2 Operations with VCF
VCF Upgrade Considerations
VCF Advanced ServicesWho should attend
Technical and Solution Architects and Consultants who design enterprise-grade private cloud environments
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe and apply an appropriate design framework.
Apply a design process for gathering requirements, constraints, assumptions and risks.
Understand VMware VCF constructs such as site, fleet and instance.
Understand data center fabric needs to support VCF.
Understand VCF storage and network design options.
Design a single site single fleet deployment of VCF with recommended design options.
Design management and workload domains with appropriate compute and storage resources.
Design a consumption layer leveraging VCF Automation and Supervisor.
Understand the day-2 operating model, operations metrics, and reporting needs of VCF.
Understand future opportunities to extend the VCF platform with advanced services.Outline: VMware Cloud Foundation: Solution Architecture and Design (VCFSAD)
Course Introduction
Introduction and course logistics
Course ObjectivesArchitecture Frameworks and Models
Architecture Frameworks
Business Objectives
Design ModelsVMware Cloud Foundation Overview
VCF Design Blueprints and Use Cases
Upgrade Overview
License Management OverviewVCF Fleet and Instance Design
Sites, Fleets and Instances
Management and Workload Domains
Designing Conceptual and Logical Designs
VCF Operations Platform DesignBuilding the Physical Fabric and VCF Networking Design
Networking Fabric Design
VCF Networking DesignStorage and vSAN Essentials
VCF Storage Overview
Storage Design ConsiderationsManagement Domain
Management Domain Design Overview
Management Domain Design Sizing Considerations
Management Domain Design Decisions
Storage Requirements for Management Workloads
Networking Requirements for Management Workloads
Platform-Based Protection MechanismsWorkload Domains
Workload Domain Design Overview
Cluster Design Overview
Storage Requirement for Workload Domains
Networking Requirements for Workload Domains
Security Design ConsiderationsVCF AMPRS Considerations Summary
Designing for Availability
Designing for Manageability
Designing for Performance
Designing for Recoverability
Designing for SecurityVCF Consumption Design with VCF Automation and Supervisor
VCF Automation Overview
VCF Automation Tenancy Models
VCF Automation and Supervisor Components
VCF Automation and Supervisor Design ConsiderationsDay 2 Operations with VCF
Day 2 Operations Overview
VCF Operations Overview and Metric/Dashboard Design
VCF Operations Key Metrics for Compute, Storage and Networks
VCF Operations for Networks Overview and DesignVCF Upgrade Considerations
VCF Upgrade Overview
VCF Upgrade Key ConsiderationsVCF Advanced Services
Introduction to Private AI
Introduction to VMware Live Recovery
Introduction to Advanced Security - VCFTS90 — VMware Cloud Foundation: Troubleshooting v9.0
- Длительность: 5 дней (40 часов)
- Код курса: VCFTS90
- Стоимость
- Очный формат: 1 792 000 ₸
- Онлайн формат: 1 738 500 ₸
Описание курса
Who should attend
System Administrators, Solution Engineers, Consultants, and Support Personnel
Prerequisites
Before taking this course, students should have completed the VMware Cloud Foundation Fundamentals for Technical Support training from Support Learning Path Stage-1.
Familiarity with command-line interfaces is strongly recommended.Course Objectives
This comprehensive five-day hands-on training is designed to provide you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware Cloud Foundation® (VCF) 9.0 environments. This course blends lecture and hands-on lab exercises to deliver advanced skills to diagnose and resolve problems in VMware Cloud Foundation 9.0 environments. This course also focuses on investigating and resolving problems and analyzing log files to help you recognize log file entries that identify root causes.
By the end of the course, you should be able to meet the following objectives:
Describe the VCF solution
Describe the VCF architecture and components
Describe the deployment model based on the existing infrastructure
Explain the troubleshooting methodology to resolve common validation precheck errors
Identify and use the correct logs to troubleshoot VMware Cloud Foundation (VCF) Installer
Describe the license assignment process for connected and disconnected deployments
Identify the log file and log locations for VCF licensing components
Explain the workload domain creation workflow
Troubleshoot network pool creation
Troubleshoot VMware® ESX® host commissioning
Monitor VMware vSAN™ health using the VMware Cloud Foundation® Operations console
Monitor vSAN Health using vSphere Client
Monitor network operations
Analyze flows and network performance
Describe central password management in VCF Operations
Monitor password expiration
Describe the architecture and components of the VMSP cluster
Identify key log files to troubleshoot the VMSP cluster provisioning
Identify key kubectl commands and logs to check the health status of the VMSP cluster
Generate, download, and review the structure of the VMware Cloud Foundation® Automation support log bundle - VCFDCM52 — VMware Cloud Foundation: Deploy, Configure, and Manage v5.2
- Длительность: 5 дней (40 часов)
- Код курса: VCFDCM52
- Стоимость
- Очный формат: 1 141 000 ₸
- Онлайн формат: 1 088 000 ₸
Описание курса
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, and operating VMware® Cloud Foundation™. You will learn about the architecture of VMware Cloud Foundation, storage and network management, licensing, and certificates. In addition to workload domains, availability, life cycle management, and troubleshooting, the course also covers VMware® Aria Suite™ integration and VMware® Private AI Foundation with NVIDIA architecture and components.
Target Audience
System architects and system administrators.
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Plan a deployment for VMware Cloud Foundation
Describe VMware Cloud Foundation components and supporting architecture
Explain the VMware Cloud Foundation licensing model
Perform day 0 tasks
Perform VMware Cloud Foundation platform onboarding
Manage user credentials in VMware Cloud Foundation
Configure VMware NSX® networking in VMware Cloud Foundation
Deploy and manage workload domains
Understand and implement storage solutions and related policies
Perform maintenance tasks for the VMware Cloud Foundation platform
Manage certificates for VMware Cloud Foundation and connected technologies
Manage the life cycle for VMware Cloud Foundation
Deploy and manage VMware Aria Suite on VMware Cloud Foundation
Understand the Private AI Foundation with NVIDIA architecture and components
Engage with VMware Cloud Foundation Technical Support services - AAICM817 — VMware Aria Automation: Install, Configure, and Manage v8.17
- Длительность: 5 дней (40 часов)
- Код курса: AAICM817
- Стоимость
- Очный формат: 1 141 000 ₸
- Онлайн формат: 1 088 000 ₸
Описание курса
Course Overview
During this five-day course, you focus on installing, configuring, and managing VMware® Aria Automation™ 8.17 on- premises systems. You learn to use VMware Aria Automation to automate the delivery of virtual machines, applications, and personalized IT services across different data centers and hybrid cloud environments. The course covers how VMware® Aria Automation Service Broker™ can aggregate content in native formats from multiple clouds and platforms into a common catalog.
This course also covers interfacing VMware Aria Automation with other systems using VMware® Aria Automation Orchestrator™ and how to use VMware Aria Automation to manage Kubernetes systems and use other systems. In this course, you will use VMware® Aria Automation Config™ as a configuration management tool.
Course Content
Course Introduction
VMware Aria Automation Overview and Architecture
Installing VMware Aria Automation
Authentication and Authorization
Basic Initial Configuration
VMware Aria Automation Templates
Using VMware Aria Automation Tags
Configuring Storage in VMware Aria Automation
Integrating NSX With VMware Aria Automation
Integrating VMware Aria Automation with Cloud Systems
Using VMware Aria Automation Service Broker
VMware Aria Automation Extensibility
Integration with Kubernetes
Introduction to VMware Aria Automation Config
Troubleshooting and Integration with VMware Aria SuiteWho should attend
System administrators and system integrators responsible for designing, implementing, and managing VMware Aria Automation
Prerequisites
This course requires the students to have strong knowledge on basic VMware vSphere® concepts.
Students should be able to perform the following tasks with no assistance or guidance before enrolling in this course:
Create VMware® vCenter® objects, such as data centers and folders
Create a virtual machine using a wizard or a template
Modify a virtual machine’s hardware
Navigate through the VMware vSphere ClientCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Install and configure VMware Aria Automation
Describe the VMware Aria Automation architecture and its use cases in multitenant cloud environments
Identify the roles of VMware Identity Manager and VMware Aria Suite Lifecycle
Configure and manage cloud accounts and projects for compute resources
Configure, customize, and manage VMware Aria Automation Templates
Configure VMware Aria Automation Service Broker for creating a self-service catalog
Use the self-service portal to request and manage deployments in VMware Aria Automation
Integrate NSX with VMware Aria Automation
Integrate VMware Aria Automation with VMware Cloud Foundation
Describe VMware Aria Automation extensibility
Use and manage Kubernetes clusters from VMware Aria Automation
Use VMware Aria Automation Config for software deployment and configuration management
Identify the key log files and commands to troubleshoot VMware Aria AutomationOutline: VMware Aria Automation: Install, Configure, Manage [V8.17] (VAAICM817)
1 Course Introduction
Introductions and course logistics
Course objectives2 VMware Aria Automation Overview and Architecture
Describe the purpose and functionality of VMware Aria Automation
Identify the key services offered by VMware Aria Automation
Describe the VMware Aria Automation architecture
Describe the use of VMware Identity Manager
Describe the relationship between Kubernetes clusters, container, and VMware Aria Automation services3 Installing VMware Aria Automation
List the different VMware Aria Automation deployment types
Describe the purpose of Easy Installer
Describe the VMware Aria Automation installation process4 Authentication and Authorization
Identify the steps to integrating VMware Identity Manager with Active Directory
Describe the features of VMware Identity Manager
Describe the user roles available in VMware Aria Automation
Identify the key tasks performed by each user role
Define custom roles
Configure branding and multitenancy5 Basic Initial Configuration
List the VMware Aria Automation basic configuration steps for creating and deploying a VMware Aria Automation template
Create a basic configuration with a cloud account, cloud zone, project, flavor mapping, and image mapping6 VMware Aria Automation Templates
Configure and deploy a basic VMware Aria Automation template
Create a VMware Aria Automation template that can run on any cloud
Use cloudConfig and cloudbase-init to run commands, create users, and install software
Use YAML for inputs, variables, and conditional deployments7 Using VMware Aria Automation Tags
Configure tags
Describe functions of tags
Manage tags8 Configuring Storage in VMware Aria Automation
Configure storage profiles
Use tags and storage profiles9 Integrating NSX With VMware Aria Automation
List the capabilities and use cases of NSX
Describe the NSX architecture and components
Integrate NSX with VMware Aria Automation
List the supported network profiles in VMware Aria Automation
Use the NSX components to design a multitier application with VMware Aria Automation Templates
Identify the network and security options available in design canvas
Create and manage on-demand networks and security groups
Configure NSX Day 2 actions10 Integrating VMware Aria Automation with Cloud Systems
Configure and use VMware Cloud Foundation® accounts
Configure and use a VMware® Cloud Director™ account
Configure and use an AWS cloud account
Configure and use an Azure cloud account
Configure and use a Google Cloud Platform cloud account11 Using VMware Aria Automation Service Broker
Release a VMware Aria Automation template
Define content source and content sharing
Define VMware Aria Automation policy enforcement
Use custom forms for catalog items12 VMware Aria Automation Extensibility
Describe VMware Aria Automation extensibility
Use event topics
Create a subscription
Call a VMware Aria Automation Orchestrator workflow
Create ABX actions13 Integration with Kubernetes
Explore Kubernetes integration
Describe a Tanzu Kubernetes cluster deployment
Connect to an existing Kubernetes cluster
Create a VMware Aria Automation template with Kubernetes components14 Introduction to VMware Aria Automation Config
Describe VMware Aria Automation Config
Use VMware Aria Automation Config for software deployment
Use VMware Aria Automation Config for configuration management
Use VMware Aria Automation Config with event-driven orchestration15 Troubleshooting and Integration with VMware Aria Suite
Demonstrate how to monitor deployment history
Demonstrate basic troubleshooting
Execute CLI commands
Explain how to collect logs
Describe integration with VMware® Aria Operations™ for Logs
Describe integration with VMware Aria Operations - AAAT814 — VMware Aria Automation: Advanced Topics V8.14
- Длительность: 5 дней (40 часов)
- Код курса: AAAT814
- Стоимость
- Очный формат: 1 237 000 ₸
- Онлайн формат: 1 185 000 ₸
Описание курса
Course Overview
This four-day course is a follow-on to the VMware Aria Automation: Install, Configure, Manage course. During this course, you will take a deeper dive into advanced topics using features of VMware Aria Automation such as deploying user systems and interfacing Aria Automation with other platforms. You will also learn how to deploy a cluster environment using VMware Aria Suite Lifecycle and interface with, and use, vSphere with Tanzu Kubernetes. This course makes heavy use of hands-on labs.
Product Alignment
VMware vSphere™ 7.0.3, VMware vSphere™ 8.0.1
VMware Aria Automation™ 8.13
VMware Aria Suite Lifecycle™ 8.13
VMware Aria Automation Config™ 8.13
VMware Aria Automation Orchestrator™ 8.13
VMware vSphere With Tanzu 8.0 update 2
VMware NSX Advanced Load Balancer (AVI) 22.1.5Who should attend
Experienced system administrators and system integrators responsible for using VMware Aria Automation in advanced configurations in enterprise deployments.
Prerequisites
This course requires completion of the following courses:VMware Aria Automation: Install, Configure, Manage [V8.17] (VAAICM817)
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe and configure VMware Aria Automation in a clustered enterprise deployment using with VMware Aria Suite Lifecycle
Scale out VMware Identity Manager to support High Availability
Use external Certificate Authorities to configure security certificates in VMware Aria Automation
Create YAML templates to configure VMware Aria Automation using cloudConfig
Use VMware Aria Automation advanced templates to deploy a 2-tier Database-Server using MySQL and phpMyAdmin
Use Advanced VMware NSX networking features including NAT, routed networks, load balancers, security groups, and tags
Integrate and use NSX Advanced Load Balancer with VMware Aria Automation and VMware NSX
Create and use Aria Automation Pipelines to deploy software and connect to Kuberenetes
Create and use Ansible playbooks that integrate with VMware Aria Automation
Integrate Aria Automation with Terraform
Integrate Aria Automation with GitLab
Create Orchestrator Workflows and ABX Actions that interface with other systems and use REST calls
Configure and use Orchestrator Workflows and ABX actions to create day-2 actions and interface with Powershell scripts
Use Aria Automation to deploy minions and deploy softwareOutline: VMware Aria Automation: Advanced Topics (AAAT814)
1 Course Introduction
Introductions and course logistics
Course objectives2 VMware Aria Automation Clustered Deployment
Using Aria Suite Lifecycle in a clustered deployment
Configure External Certificates
Configure VMware NSX Advanced Load Balancer
Install VMware Aria Automation using Clustered Deployment
Scale out VMware Identity Manager to support High Availability3 Advanced VMware Aria Automation Templates
Use advanced YAML and cloudConfig to deploy a functioning 2-tier application with a phpMyAdmin front end server and a MySQL database server
Use cloudConfig and cloug-init
Use advanced YAML techniques to create configuration files and add users to deployed virtual machines4 Advanced Networking
Use VMware NSX advanced features in VMware Aria Automation templates
Interfacing to IPAMs
Use VMware NSX NAT in VMware Aria Automation templates
Use VMware NSX Routed Networks
Use VMware NSX Advanced Load Balancer
Use VMware NSX Security Groups5 Advanced Orchestrator Workflows
Create Day-2 Actions with Orchestrator workflows
Use Orchestrator to Add computer objects to Active Directory when VMware Aria Automation deploys templates
Create VMware Aria Automation Custom Resources
Create VMware Aria Automation Resource Actions
Use VMware Aria Automation with Orchestrator to perform REST calls6 Using ABX Actions
Use ABX to create day-2 Actions
Create ABX Action-Flows
Use ABX to make REST calls7 Kubernetes Integration
Describe vSphere With Tanzu
Create a Supervisor Cluster
Create a Supervisor Namespace
Create Cluster Plans
Deploy a Tanzu Kubernetes cluster from Aria Automation
Manage Kubernetes Tanzu clusters from Aria Automation
Execute YAML code and deploy software in a managed Tanzu Kubernetes cluster
Connect to an existing generic Kubernetes cluster
Create Kubernetes namespaces from Aria Automation
Interface Aria Automation to other Kubernetes systems8 Aria Automation Pipelines
Create and use CI/CD pipelines
Use the Pipeline user interface
Add states and tasks to a pipeline
Integrate code from a pipeline with Gitlab
Use an Aria Automation pipeline to install software
Use an Aria Automation Pipeline to Create a Kubernetes Namespace and a Deployment9 Aria Automation and Configuration Management
Describe Ansible, Puppet, and Terraform
Integrate Ansible with VMware Aria Automation
Integrate Terraform with VMware Aria Automation
Call Terraform from VMware Aria Automation
Use Terraform to manage VMware Aria Automation
Deploy an Aria Automation Config minion
Install software on an Aria Automation Config minion
Create and manage files on a Linux system with Aria Automation Config - AAOE813 — VMware Aria Automation: Orchestration and Extensibility V8.13
- Длительность: 5 дней (40 часов)
- Код курса: AAOE813
- Стоимость
- Очный формат: 1 326 000 ₸
- Онлайн формат: 1 272 000 ₸
Описание курса
Course Overview
During this five-day course, you focus on using VMware Aria Automation Orchestrator™ to extend the functionality of VMware Aria Automation™. You learn how to provide XaaS (Anything as a Service) and implement machine lifecycle extensibility using the VMware Aria Automation Event Broker. You also learn how to create VMware Aria Automation Orchestrator workflows and VMware Aria Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in VMware Aria Automation Orchestrator.
The course introduces the VMware Aria Automation Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plug-ins and scripts. This course is designed to give you the tools to craft custom solutions in the product.
Product Alignment
VMware vSphere® 8.0
VMware Aria Automation 8.13
VMware Aria Automation Orchestrator 8.13
VMware Aria Suite Lifecycle™ 8.12Who should attend
Experienced VMware administrators, automation and orchestration specialists, system integrators, private cloud administrators, and public cloud administrators
Prerequisites
Before taking this course, you should have completed the following course:
You should also have the following understanding or knowledge:
Knowledge of VMware vSphere
Working knowledge of scripting or programming using JavaScript, Windows PowerShell, Perl, Java, Python, or similar languages. All code is provided during class.Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the features, benefits, components, and integration of VMware Aria Automation Orchestrator and VMware Aria Automation
Describe the role of VMware Aria Automation Orchestrator workflows and content elements in automation
Use the VMware Aria Automation Orchestrator client to access and navigate the VMware Aria Automation Orchestrator platform, and to import and run VMware Aria Automation Orchestrator library workflows
Design, develop, and run custom reusable VMware Aria Automation Orchestrator workflows
Use VMware APIs in the VMware Aria Automation Orchestrator workflow
Integrate VMware Aria Automation with VMware Aria Automation Orchestrator instances to extend infrastructure as a service (IaaS) system life-cycle processes and to enhance and deliver custom IT services
Use anything as a service (XaaS) to extend VMware Aria Automation to other enterprise systems
Use the VMware Aria Automation Event Broker service to trigger specific VMware Aria Automation Orchestrator workflowsOutline: VMware Aria Automation: Orchestration and Extensibility [V8.13] (VRAOE13)
1 Course Introduction
Introductions and course logistics
Course objectives2 Overview of VMware Aria Automation and VMware Aria Automation Orchestrator
Define the purpose of VMware Aria Automation
Outline the purpose of VMware Aria Automation Orchestrator
Describe the main components of VMware Aria Automation
Describe the main components of VMware Aria Automation Orchestrator3 Using Schema Elements
Describe a scriptable task
Run a Polyglot script from a VMware Aria Automation Orchestrator workflow
Run JavaScript from a VMware Aria Automation Orchestrator workflow
Run a VMware Aria Automation Orchestrator workflow from a VMware Aria Automation Orchestrator workflow
Run an action from a VMware Aria Automation Orchestrator workflow
Use VMware Aria Automation Orchestrator workflows both synchronously and asynchronously4 Working with Variables
Define inputs, outputs, and variables in VMware Aria Automation Orchestrator workflows
Bind variables in VMware Aria Automation Orchestrator workflows
Explain the purpose of binding in VMware Aria Automation Orchestrator workflows
Wrap VMware Aria Automation Orchestrator workflows
Using APIs and the API Explorer
Create actions in VMware Aria Automation Orchestrator
Use VMware Aria Automation Orchestrator input forms
Handle user interactions in VMware Aria Automation Orchestrator5 Handling Exceptions, Logging, and Debugging
Identify the function of exception handling
Handle exceptions in VMware Aria Automation Orchestrator workflows
Use logs in VMware Aria Automation Orchestrator workflows
Debug VMware Aria Automation Orchestrator workflows
Monitor variable values6 Branching and Looping
Use decision schema element for branching in VMware Aria Automation Orchestrator workflows
Use switch schema element for branching in VMware Aria Automation Orchestrator workflows
Use loops in VMware Aria Automation Orchestrator workflows7 Working with Assets
Create and use configuration elements in VMware Aria Automation Orchestrator
Use resources in VMware Aria Automation Orchestrator
Create and use packages in VMware Aria Automation Orchestrator8 Working with Plug-Ins
Explain the functionality of VMware Aria Automation Orchestrator plug-ins
Download and install plug-Ins
Use the SSH plug-In in VMware Aria Automation Orchestrator
Use the REST plug-in in VMware Aria Automation Orchestrator
Use the VMware Aria Automation plug-in in VMware Aria Automation Orchestrator
Use the PowerShell plug-in in VMware Aria Automation Orchestrator
Use dynamic types in VMware Aria Automation Orchestrator9 Working with Versioning and Git
Manage versioning in VMware Aria Automation Orchestrator
Use Git in VMware Aria Automation Orchestrator10 Working with Time-Related Schema Elements
Use scheduling in VMware Aria Automation Orchestrator
Use sleeping in VMware Aria Automation Orchestrator
Use waiting in VMware Aria Automation Orchestrator11 Introduction to Extensibility
Introduction to VMware Aria Automation extensibility
Explain the Event Broker Service
Explain life cycle integration12 Using the Event Broker
Explain the functionality of the Event Broker Service
Overview of VMware Aria Automation Event Broker
Create VMware Aria Automation subscriptions
Data exchange between VMware Aria Automation and VMware Aria Automation Orchestrator13 Using ABX Actions
Overview of Action Based Extensibility (ABX)
Describe Function as a Service (FaaS)
Differentiate between VMware Aria Automation Orchestrator and ABX
Create an ABX action that is called by a VMware Aria Automation subscription14 Working with Services, Custom Resources, and Resource Actions
Describe the service broker service
Use VMware Aria Automation Orchestrator as a content source in VMware Aria Automation
Create custom resources in VMware Aria Automation
Create resource actions in VMware Aria Automation15 Capturing the vSphere Client Code
Use vSphere Client code capture to capture code in VMware Aria Automation Orchestrator workflow, JavaScript, PowerCLI or other languages
Use the captured code in VMware Aria Automation Orchestrator workflows or actions - AOICM817 — VMware Aria Operations: Install, Configure, Manage V8.17
- Длительность: 5 дней (40 часов)
- Код курса: AOICM817
- Стоимость
- Очный формат: 1 141 000 ₸
- Онлайн формат: 1 088 000 ₸
Описание курса
Course Overview
This five-day, hands-on training course provides you with the knowledge and skills to deploy a VMware® Aria Operations™ cluster that meets the monitoring requirements of your environment. This course includes advanced capabilities, such as customizing alerts, views, reports, and dashboards, and explains the deployment and architecture in VMware Aria Operations. This course explains application monitoring, certificates, policies, capacity and cost concepts, and workload optimization with real-world use cases. This course covers troubleshooting using the workbench, alerts, and predefined dashboards, and how to manage compliance and configurations. This course also covers several management packs.
Course Content
Course Introduction
Introduction to VMware Aria Operations
VMware Aria Operations Architecture
Deploying VMware Aria Operations
Tags and Custom Groups
Policies and Certificate Management
Capacity Optimization
What-If Scenarios and Costing in VMware Aria Operations
Performance Optimization
Troubleshooting and Managing Configurations
Service Discovery and Application Monitoring
Custom Alerts
Custom Views and Reports
Custom Dashboards
Super Metrics
User Access Control
Extending and Managing a VMware Aria Operations DeploymentWho should attend
Experienced system administrators and system integrators
Consultants responsible for designing, implementing, and customizing VMware Aria OperationsPrerequisites
Before taking this course, you must meet at least one of the following requirements:
VMware vSphere®: Install, Configure, Manage
6 months of hands-on VMware Aria Operations experienceCourse Objectives
By the end of the course, you should be able to meet the following objectives:
List the VMware Aria Operations use cases
Identify features and benefits of VMware Aria Operations
Describe the functions of nodes and components in VMware Aria Operations clusters
Determine the VMware Aria Operations cluster that meets your monitoring requirements
Deploy and configure a VMware Aria Operations cluster
Use tags and tag values in grouping objects
Describe VMware Aria Operations certificates
Create policies to meet the operational needs of your environment
Recognize effective ways to optimize performance, capacity, and cost in data centers
Use the Workload Placement (WLP) feature to optimize performance
Troubleshoot and manage issues using workbench, alerts, and predefined dashboards
Manage configurations
Configure Application Monitoring using VMware Cloud Proxy
Create custom symptoms and alert definitions, reports, and views
Create various custom dashboards using the dashboard creation canvas
Configure widgets and widget interactions for dashboards
Describe the concept, components, and benefits of super metrics
Configure users and user groups for controlled access to your environment
Extend the capabilities of VMware Aria Operations by adding management packs and configuring solutionsOutline: VMware Aria Operations: Install, Configure, Manage [V8.17] (VROICM817)
1 Course Introduction
Introduction and course logistics
Course objectives2 Introduction to VMware Aria Operations
List the key features of VMware Aria Operations
Outline VMware Aria Operations use cases3 VMware Aria Operations Architecture
Describe the role of the primary node in a VMware Aria Operations cluster
Identify the functions of components in a VMware Aria Operations node
Identify the types of nodes and their role in a VMware Aria Operations cluster
Outline how high availability is achieved in VMware Aria Operations
List the components required to enable Continuous Availability (CA)4 Deploying VMware Aria Operations
Describe the VMware Aria Operations cluster design and sizing principles
Prepare an environment for a VMware Aria Operations deployment
Deploy a VMware Aria Operations node
Describe different VMware Aria Operations deployment scenarios5 Tags and Custom Groups
Use tags and tag values in grouping objects
Create custom group types to collect and report data from objects
Describe Business Applications and Custom Datacenter6 Policies and Certificate Management
Use policies to analyze information about various object types and objects in your environment
Configure policies and other components
Create Certificate Signing Requests for your VMware Aria Operations instance7 Capacity Optimization
Define capacity planning terms
Explain capacity planning models
Define the capacity concepts
Configure custom profiles8 What-If Scenarios and Costing in VMware Aria Operations
Assess what-if scenarios for adding and removing VM workloads to a data center
Assess what-if scenarios for adding and removing hosts to a data center
Assess what-if scenarios to plan the migration of workloads to VMware and public clouds9 Performance Optimization
Describe performance optimization
Define the business and operational intentions for a data center
Use the Optimize Now feature to optimize workload performance
Review optimization history and potential
Automate the process of optimizing and balancing workloads in data centers10 Troubleshooting and Managing Configurations
Use the troubleshooting workbench to analyze a problem
Troubleshoot objects using the Troubleshooting Workbench Alerts and Metrics tabs
Outline how VMware Aria Operations applies compliance in your environment
Use configuration and compliance dashboards to assess the status of objects in your environment11 Service Discovery and Application Monitoring
Describe native service discovery and application monitoring features
Configure application monitoring
Monitor applications by using VMware Cloud Proxy for VMware Aria Operations12 Custom Alerts
Identify the components of an alert definition
Create symptom definitions
Create recommendations, actions, and notifications
Configure a custom alert using the Create Alert Definition workflow
Attach symptoms, conditions, and recommendations to an alert definition13 Custom Views and Reports
Outline the role of views in VMware Aria Operations
Create a basic custom view
Configure view settings
Create a custom report template14 Custom Dashboards
Create dashboards that use predefined and custom widgets
Configure widgets to interact with other widgets and other dashboards
Manage dashboards by grouping dashboards and sharing dashboards with users15 Super Metrics
Describe the concept, components, and benefits of supermetrics
Define the types of super metrics and their usage
Describe super metric design considerations
Manage super metrics with the super metric wizard16 User Access Control
Outline access control in VMware Aria Operations
Create local users and user groups
Determine privilege priorities when a user has multiple privileges
Import users and user groups from an LDAP source17 Extending and Managing a VMware Aria Operations Deployment
Identify common management packs that are available to your environment
Monitor the health of a VMware Aria Operations cluster
Generate a support bundle
View VMware Aria Operations logs and audit reports
Perform VMware Aria Operations cluster management tasks - AOLICM812 — VMware Aria Operations for Logs: Install, Configure, Manage v8.12
- Длительность: 3 дня (24 часа)
- Код курса: AOLICM812
- Стоимость
- Очный формат: 786 500 ₸
- Онлайн формат: 734 000 ₸
Описание курса
Course Overview
This three-day course features hands-on training that focuses on deploying, configuring, and managing VMware Aria Operations™ for Logs 8.12. You will learn the UI enhancements, features, architecture, use cases, and benefits of VMware Aria Operations for Logs. This course provides you with the knowledge and skills to use VMware Aria Operations for Logs 8.12 to monitor your environment.
Product Alignment
VMware vSphere 8.0 U1
VMware Aria Operations for Logs 8.12
VMware Aria Operations 8.12Course Content
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to VMware Aria Operations for Logs
Describe the VMware Aria cloud management platform
Describe the VMware Aria™ use cases
Describe the key capabilities of VMware Aria Operations for Logs
Describe the requirements for a log analytics solution
Explain the importance of efficient log management
Navigate the VMware Aria Operations for Logs UI
Describe the various stages of log processingVMware Aria Operations for Logs Architecture and Deployment
Identify the minimum requirements for deploying VMware Aria Operations for Logs
Explain how to use the VMware Aria Operations for Logs sizing calculator
Describe VMware Aria Operations for Logs compatibility with other VMware products
Describe the VMware Aria Operations for Logs architecture
Explain how to install the VMware Aria Operations for Logs virtual applianceVMware Aria Operations for Logs Queries and Dashboards
Describe the primary functions of the VMware Aria Operations for Logs UI
Use the Interactive Analytics tab to get a deeper understanding of log data
Create and manage queries
Create VMware Aria Operations for Logs custom dashboards
Describe and use the VMware Aria Operations for Logs widgetsAdministering VMware Aria Operations for Logs
Describe user access control in VMware Aria Operations for Logs
Describe user management
Access the VMware Aria Operations for Logs Administration page
Configure VMware Aria Operations for Logs settings
Manage certificates
Configure system notifications
Explain how to upgrade VMware Aria Operations for Logs
Describe the VMware Aria Operations for Logs ImporterVMware Aria Operations for Logs Integrations
Describe how to integrate vRealize Operations with VMware Aria Operations for Logs
Discuss the advantages of integrating vRealize Operations with VMware Aria Operations for Logs
Discuss the advantages of using the vSAN content pack
Explain how to install NSX content packsVMware Aria Operations for Logs (SaaS)
Explain the VMware Aria Operations for Logs (SaaS) architecture
Describe the ingestion options for Aria Operations for Logs (SaaS)
Discuss integration with on-premises Aria Operations for Logs
Configure log forwarding to VMware Aria Operations for Logs (SaaS) without deploying additional VMware Cloud Proxy instancesWho should attend
System administrators
System engineers
ConsultantsPrerequisites
System administration experience with VMware vSphere® deployments or completion of one of the following courses:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware vSphere: Operate, Scale and Secure [V8] (VSOSS8)Course Objectives
By the end of the course, you should be able to meet the following objectives:
Identify the features and benefits of VMware Aria Operations for Logs
Determine which VMware Aria Operations for Logs cluster meets your monitoring requirements
Describe the VMware Aria Operations for Logs architecture and use cases
Deploy and configure a VMware Aria Operations for Logs cluster
Use the Explore Logs page to get a deep understanding of log data
Create and manage queries
Manage VMware Aria Operations for Logs agents and agent Groups
Create custom dashboards
Explain how to use the VMware Aria Operations for Logs widgets
Extend the capabilities of VMware Aria Operations for Logs by adding content packs and configuring solutions
Discuss VMware Aria Operations for Logs (SaaS) - ASLICM810 — VMware Aria Suite Lifecycle: Install, Configure, and Manage v8.10
- Длительность: 2 дня (16 часов)
- Код курса: ASLICM810
- Стоимость
- Очный формат: 583 500 ₸
- Онлайн формат: 531 000 ₸
Описание курса
Course Overview
This two-day, hands-on training course focuses on installing, configuring, and managing VMware Aria Suite Lifecycle™, which manages products such as VMware Aria Operations™, VMware Aria Operations™ for Logs, and VMware Aria Automation™. This course prepares you to perform Day 0 to Day 2 operations for your environment using VMware Aria Suite Lifecycle.
Who should attend
Experienced system administrators and system engineers
Prerequisites
You should also have the following understanding or knowledge:
Knowledge and working experience of VMware vSphere™ environments
Good understanding of one or more VMware Aria Suite productsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
List the use cases for VMware Aria Suite Lifecycle
Deploy and configure VMware Aria Suite Lifecycle
Manage certificates in VMware Aria Suite Lifecycle environments
Create, manage, and scale VMware Aria Suite Lifecycle environments
Add VMware Aria Suite products to VMware Aria Suite Lifecycle
Manage VMware Aria Suite products with VMware Aria Suite Lifecycle
Use VMware Aria Suite Lifecycle to perform content life cycle management
Migrate a legacy VMware Aria Suite Lifecycle instance
Explain the VMware Aria Suite Lifecycle component settings
Troubleshoot day-to-day operations of VMware Aria Suite LifecycleOutline: VMware Aria Suite Lifecycle: Install, Configure, Manage [V8.10] (VASLICM810)
1 Course Introduction
Introductions and course logistics
Course objectives2 Introduction to VMware Aria Suite Lifecycle
Describe the use cases for VMware Aria Suite Lifecycle
List the features of VMware Aria Suite Lifecycle
List system requirements for VMware Aria Suite Lifecycle
Use Easy Installer to deploy VMware Aria Suite Lifecycle3 VMware Aria Suite Lifecycle Configuration
Create Certificate Signing Requests (CSRs) for VMware Aria Suite product instances
Configure VMware Aria Suite Lifecycle settings
Add certificates to VMware Aria Suite product instances
Add VMware Aria Suite Lifecycle environments
Add VMware Aria Suite product binaries4 Adding VMware Aria Suite Products
Deploy a new VMware Aria Suite product
Manage a VMware Aria Suite product using VMware Aria Suite Lifecycle
Add an existing VMware Aria Suite product to an environment5 VMware Aria Suite Lifecycle Day 2 Operations
Perform ongoing management tasks
Monitor the health of the environment
Use content from the marketplace
Use VMware Aria Suite Lifecycle to perform content life cycle management6 VMware Aria Suite Lifecyle Migration
Prepare a legacy VMware Aria Suite Lifecycle instance for migration
Migrate VMware Aria Suite Lifecycle using Easy Installer7 Troubleshooting VMware Aria Suite Lifecycle
Identify the VMware Aria Suite Lifecycle component settings
Describe the procedure to generate and download the log bundle
Use Linux commands to assist with troubleshooting VMware Aria Suite Lifecycle
Recognize entries in commonly accessed VMware Aria Suite Lifecycle log files - SRMICM86 — VMware Site Recovery Manager: Install, Configure, Manage v8.6
- Длительность: 2 дня (16 часов)
- Код курса: SRMICM86
- Стоимость
- Очный формат: 583 500 ₸
- Онлайн формат: 531 000 ₸
Описание курса
Course Overview
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.6. This course also shows you how to write and test disaster recovery plans that use Site Recovery Manager.
Who should attend
vSphere administrators, architects, system engineers, and systems integrators who are responsible for the deployment or management of Site Recovery Manager
Prerequisites
Before taking this course, you should have completed one of the following course(s):
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware vSphere: Fast Track [V8] (VSFT8)
VMware vSphere: What's New [V8] (VSWN8)
VMware vSphere: Troubleshooting [V8] (VSTS8)
Or equivalent knowledge and administration experience with VMware ESXi™ and VMware vCenter Server™.Course Objectives
By the end of the course, you should be able to meet the following objectives:
Summarize the components of Site Recovery Manager architecture
Deploy and configure the Site Recovery Manager appliance
Describe the principal disaster recovery topologies that are used with Site Recovery Manager
Configure inventory and resource mappings
Describe the storage replication options that are used with Site Recovery Manager
Configure Site Recovery Manager to leverage array-based replication
Describe VMware vSphere® Replication™ functionality
Describe the vSphere Replication architecture
Deploy and configure vSphere Replication for use with Site Recovery Manager
Build Site Recovery Manager array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups.
Build, edit, execute, test, and remove a recovery plan
Perform a planned migrationOutline: VMware Site Recovery Manager: Install, Configure, Manage [8.6] (SRMICM86)
1 Course Introduction
Introductions and course logistics
Course objectives2 Site Recovery Manager Architecture
Describe Site Recovery Manager architecture
Identify disaster recovery options with Site Recovery Manager
Evaluate how Site Recovery Manager integrates with VMware products
Describe Site Recovery Manager licensing options
List the disaster recovery topologies supported by Site Recovery Manager
Describe how VMware Site Recovery for VMware Cloud on AWS integrates with Site Recovery Manager3 Deploying and Configuring Site Recovery Manager
Identify the vSphere and vCenter Server requirements for deploying Site Recovery Manager
Define Site Recovery Manager virtual appliance system requirements
Deploy the Site Recovery Manager appliance
Navigate the Site Recovery Manager configuration UI
Describe the process for registering Site Recovery Manager with vCenter Server
Describe how to start and stop services in Site Recovery Manager
Identify ways to perform updates to the Site Recovery Manager appliance
Describe the options for accessing the Site Recovery Manager
Describe the process for configuring site pairing
Describe how to import and export Site Recovery Manager configuration
Navigate the Site Recovery Manager configuration UI
Describe the process for registering Site Recovery Manager with vCenter Server
Describe how to start and stop services in Site Recovery Manager
Identify ways to perform updates to the Site Recovery Manager appliance
Describe the options for accessing the Site Recovery Manager
Describe the process for configuring site pairing
Describe how to import and export Site Recovery Manager configuration4 Configuring Inventory Mappings
Explain the importance of inventory mappings
Identify configuration options for inventory mappings
Describe the importance of placeholder virtual machines and datastores
Describe the importance of the vSphere inventory changes for Site Recovery Manager operation5 Using Array-Based Replication
Describe array-based replication
Describe Storage Replication Adapters and explain their role for the array-based replication
Describe the concept and configuration of array pairs
Describe datastore groups and the relationship between devices and datastore groups
Describe the role of consistency groups
Identify the advantages of array-based replication6 vSphere Replication
Describe Site Recovery Manager with vSphere Replication Architecture
Discuss the role of vSphere Replication components
Discuss use cases for vSphere Replication
Discuss system requirements and operational limits of vSphere Replication
Determine how to calculate bandwidth requirements for vSphere Replication
Identify the advantages of vSphere Replication
Deploy a vSphere Replication appliance
Configure a vSphere Replication appliance and register it with vCenter Server
Pair vSphere Replication appliances
Deploy an additional vSphere Replication server
Register a vSphere Replication server with a vSphere Replication management server7 Replicating VMs Using vSphere Replication
Describe the replication process used by vSphere Replication
List vSphere Replication replica states
Describe vSphere Replication of encrypted virtual machines
Describe vSphere native key provider
Describe how to configure vSphere Replication
Discuss vSphere Replication RPO settings
Describe MPIT instances
Describe additional vSphere Replication settings
Describe how to disable vSphere Replication8 Protection Groups
Define protection group functionality
Examine the differences between array-based protection groups, protection groups based on vSphere Replication, and Virtual Volumes protection groups
Create a protection group
View a placeholder virtual machine in the inventory
Configure protection for virtual machines and edit protection groups9 Recovery Plans
Discuss recovery plan concepts
Discuss network planning
Discuss the organization of storage for recovery plans
Describe customization options in recovery planning
Describe priority groups and VM dependencies
Describe how to implement a recovery plan
Configure VM recovery plan properties
Describe the customization of recovery plans
Configure additional steps in the recovery plan
Delete a recovery plan10 Executing Recovery Plans
Discuss use cases for Site Recovery Manager
Describe planned migration
Identify Site Recovery Manager workflows
Examine Site Recovery Manager integration with various vSphere technologies
Describe how to conduct a recovery plan test
Perform a recovery plan test
Identify the effect on the storage layer during the test recovery steps
Review the recovery plan test steps
Describe how to cancel a recovery plan test and clean up after recovery plan test cancelation
Explain a recovery plan execution in planned migration or disaster recovery mode
Identify the recovery steps for each execution type
Describe a forced recovery
Explain the importance of reprotection processes and states
Examine failback steps
Describe how to reprotect a data center11 Monitoring and Troubleshooting
Identify Site Recovery Manager alarm options
Generate Site Recovery Manager recovery plan history reports
Configure Site Recovery Manager advanced settings
Identify Site Recovery Manager logs
Describe the vRealize Operations management pack for Site Recovery Manager - VSANICM8 — VMware vSAN: Install, Configure, Manage v8.0
- Длительность: 5 дней (40 часов)
- Код курса: VSANICM8
- Стоимость
- Очный формат: 1 085 500 ₸
- Онлайн формат: 1 027 500 ₸
Описание курса
Course Overview
During this four-day course, you gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You learn how to manage and operate vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks. Administrator tasks include vSAN node management, cluster maintenance, security operations, troubleshooting, and advanced vSAN cluster operations. You acquire the course skills through the completion of instructor-led activities and hands-on lab exercises.
Product Alignment
VMware ESXi™ 8.0
VMware vCenter Server® 8.0
VMware vSAN 8.0Course Content
Course Introduction
Introduction to vSAN
Planning a vSAN Cluster
Deploying a vSAN Cluster
vSAN Storage Policies
vSAN Resilience and Data Availability
Managing vSAN Storage Space Efficiency
vSAN Security Operations
vSAN HCI Mesh
vSAN File Services
vSAN Stretched and Two Node Clusters
vSAN Cluster Maintenance
vSAN Cluster Monitoring
vSAN Troubleshooting
vSAN Express Storage ArchitectureWho should attend
Storage and virtual infrastructure consultants, solution architects, and administrators who are responsible for production support and administration of VMware vSAN 8.0.
Prerequisites
Equivalent knowledge or completion of the following course is required:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe vSAN concepts
Detail the underlying vSAN architecture and components
Explain the key features and use cases for vSAN
Identify requirements and planning considerations for vSAN clusters
Explain the importance vSAN node hardware compatibility
Describe the different vSAN deployment options
Explain how to configure vSAN fault domains
Detail how to define and create a VM storage policy
Discuss the impact of vSAN storage policy changes
Detail vSAN resilience and data availability
Describe vSAN storage space efficiency
Explain how vSAN encryption works
Detail VMware HCI Mesh™ technology and architecture
Detail vSAN File Service architecture and configuration
Describe how to setup a stretched and a two-node vSAN cluster
Describe vSAN maintenance mode and data evacuation options
Define the steps to shut down a vSAN cluster for maintenance
Explain how to use proactive tests to check the integrity of a vSAN cluster
Use VMware Skyline Health™ for monitoring vSAN health
Use VMware Skyline Health to investigate and help determine failure conditions
Discuss vSAN troubleshooting best practices
Describe vSAN Express Storage Architecture conceptsOutline: VMware vSAN: Install, Configure, Manage [V8] (VSANICM8)
Course Introduction
Introduction and course logistics
Course objectivesIntroduction to vSAN
Describe vSAN architecture
Describe the vSAN software components: CLOM, DOM, LSOM, CMMDS, and RDT
Identify vSAN objects and components
Describe the advantages of object-based storage
Describe the difference between All-Flash and Hybrid vSAN architecture
Explain the key features and use cases for vSAN
Discuss the vSAN integration and compatibility with other VMware technologiesPlanning a vSAN Cluster
Identify requirements and planning considerations for vSAN clusters
Apply vSAN cluster planning and deployment best practices
Determine and plan for storage consumption by data growth and failure tolerance
Design vSAN hosts for operational needs
Identify vSAN networking features and requirements
Describe ways of controlling traffic in a vSAN environment
Recognize best practices for vSAN network configurationsDeploying a vSAN Cluster
Recognize the importance of hardware compatibility
Ensure the compatibility of driver and firmware versioning
Use tools to automate driver validation and installation
Apply host hardware settings for optimum performance
Use vSphere Lifecycle Manager to perform upgrades
Deploy and configure a vSAN Cluster using the Cluster QuickStart wizard
Manually configure a vSAN Cluster using VMware vSphere® Client™
Explain and configure vSAN fault domains
Using VMware vSphere® High Availability with vSAN
Understand vSAN Cluster maintenance capabilities
Describe the difference between implicit and explicit fault domains
Create explicit fault domainsvSAN Storage Policies
Describe a vSAN object
Describe how objects are split into components
Explain the purpose of witness components
Explain how vSAN stores large objects
View object and component placement on the vSAN datastore
Explain how storage policies work with vSAN
Define and create a virtual machine storage policy
Apply and modify virtual machine storage policies
Change virtual machine storage policies dynamically
Identify virtual machine storage policy compliance statusvSAN Resilience and Data Availability
Describe and configure the Object Repair Timer advanced option
Plan disk replacement in a vSAN cluster
Plan maintenance tasks to avoid vSAN object failures
Recognize the importance of managing snapshot utilization in a vSAN clusterManaging vSAN Storage Space Efficiency
Discuss deduplication and compression techniques
Understand deduplication and compression overhead
Discuss compression only mode
Configure erasure coding
Configure swap object thin provisioning
Discuss reclaiming storage space with SCSI UNMAP
Configure TRIM/UNMAPvSAN Security Operations
Identify differences between VM encryption and vSAN encryption
Perform ongoing operations to maintain data security
Describe the workflow of data-in transit encryption
Identify the steps involved in replacing Key Management ServervSAN HCI Mesh
Understand the purpose of vSAN HCI Mesh
Detail vSAN HCI Mesh technology and architecture
Perform mount and unmount of a remote datastorevSAN File Services
Understand the purpose of vSAN File Services
Detail vSAN File Services architecture
Configure vSAN File SharesvSAN Stretched and Two Node Clusters
Describe the architecture and uses case for stretched clusters
Detail the deployment and replacement of a vSAN witness node
Describe the architecture and uses case for two-node clusters
Explain storage policies for vSAN stretched clustervSAN Cluster Maintenance
Perform typical vSAN maintenance operations
Describe vSAN maintenance modes and data evacuation options
Assess the impact on cluster objects of entering maintenance mode
Determine the specific data actions required after exiting maintenance mode
Define the steps to shut down and reboot hosts and vSAN clusters
Use best practices for boot devices
Replace vSAN nodesvSAN Cluster Monitoring
Describe how the Customer Experience Improvement Program (CEIP) enables VMware to improve products and services
Use VMware Skyline Health for monitoring vSAN cluster health
Manage alerts, alarms, and notifications related to vSAN in VMware vSphere® Client™
Create and configure custom alarms to trigger vSAN health issues
Use IOInsight metrics for monitoring vSAN performance
Use a vSAN proactive test to detect and diagnose cluster issuesvSAN Troubleshooting
Use a structured approach to solve configuration and operational problems
Apply troubleshooting methodology to logically diagnose faults and optimize troubleshooting efficiency
Use VMware Skyline Health to investigate and help determine failure conditions
Explain which log files are useful for vSAN troubleshootingvSAN Express Storage Architecture
Understand the purpose of vSAN Express Storage Architecture
Describe the vSAN Express Storage Architecture components
Identify Storage Policy differences
Understand compression and encryption operation differences - VSANT8 — VMware vSAN Troubleshooting v8.0
- Длительность: 2 дня (16 часов)
- Код курса: VSANT8
- Стоимость
- Очный формат: 642 000 ₸
- Онлайн формат: 590 000 ₸
Описание курса
Course Overview
This two-day, hands-on training course provides the knowledge to troubleshoot VMware vSAN™ clusters. In this course, you will learn the best practices to maintain a healthy vSAN environment and mitigate potential issues that may occur with operation of the software. You will learn the GUI and CLI vSAN monitoring and troubleshooting tools. The course provides a logical framework for a systematic troubleshooting approach. You will learn how to troubleshoot vSAN common issues with examples. The labs provided in the course simulate real-world problems to evaluate and enhance your troubleshooting skills.
Product Alignment
VMware ESXi™ 8.0
VMware vCenter Server® 8.0
VMware vSAN 8.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesvSAN Best Practice and Problems Prevention
Discuss the importance of vSAN planning and availability best practice
Discuss vSAN networking best practice
Discuss the importance of vSAN Data protection
Understand the Data protection best Practice
Discuss the importance of vSAN hardware compatibility
Learn how to check hardware compatibility for vSAN
List the factors that impact vSAN performance
Learn how to benchmark vSAN performance
Discuss the importance of Skyline Advisor
Learn how to use Skyline AdvisorvSAN Monitoring and Troubleshooting tools
Explain vSAN Skyline Health features
Discuss the other vSAN cluster-level monitoring in the VMware vSphere® client
Discuss vSAN host-level monitoring in the vSphere client
Discuss vSAN VM-level monitoring in the vSphere Client
Understand tasks and events views within the vSphere client
Describe vSphere Alarms
Learn how to use the CLI to find information about vSAN clustervSAN Best Practice and Problems Prevention
Discuss the importance of vSAN planning and availability best practice
Discuss vSAN networking best practice
Discuss the importance of vSAN Data protection
Understand the Data protection best Practice
Discuss the importance of vSAN hardware compatibility
Learn how to check hardware compatibility for vSAN
List the factors that impact vSAN performance
Learn how to benchmark vSAN performance
Discuss the importance of Skyline Advisor
Learn how to use Skyline AdvisorTroubleshooting Process
Learn the recommended vSAN troubleshooting process
Describe the PNOMA framework
Learn how to troubleshoot vSAN common issuesGetting Support
Discuss how to get further support from the community and the knowledge base articles
Learn how to effectively contact VMware technical supportTroubleshooting Labs
Enhance and test vSAN troubleshooting skills through labs
Who should attend
Experienced system vSAN administrators
Customers, cloud architects, systems engineers, data center administratorsPrerequisites
Before taking this course, you must complete at least one of the following courses:
VMware vSphere: Install, Configure, Manage [V8] (VSICM8)
VMware vSAN: Install, Configure, Manage [V8] (VSANICM8)You should also have understanding or knowledge of these technologies:
Good understanding of storage concepts
Good understanding of network conceptsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Learn vSAN best practices for planning and availability
Outline vSAN networking best practices
Describe Skyline Advisor™ Pro
Learn about vSAN Skyline™ Health
Discuss vSAN monitoring and troubleshooting tools integrated within vSphere
Outline the common vSAN troubleshooting commands
Understand how to benchmark vSAN performance
Identify factors which may impact vSAN performance
Outline vSAN troubleshooting framework
List the most common vSAN issues
Learn how to troubleshoot vSAN common issues
Discuss how to get further support from the VMware community and knowledge base articles
Learn how to effectively contact VMware technical support
Enhance and test vSAN troubleshooting skills through labs - NSXICM4 — VMware NSX: Install, Configure and Manage V4.x
- Длительность: 5 дней (40 часов)
- Код курса: NSXICM4
- Стоимость
- Очный формат: 1 141 000 ₸
- Онлайн формат: 1 088 000 ₸
Описание курса
Course Overview
This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.
Product Alignment
NSX 4.0.0.1
NSX 4.0.1Who should attend
Experienced security administrators or network administrators
Prerequisites
Good understanding of TCP/IP services and protocols
Knowledge and working experience of computer networking, including switching and routing technologies (L2 through L3) and L2 through L7 firewall
Knowledge and working experience with VMware vSphere® environments
Knowledge and working experience with Kubernetes or VMware vSphere® with VMware Tanzu® environmentsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Describe the architecture and main components of NSX
Explain the features and benefits of NSX
Deploy the NSX Management cluster and VMware NSX® Edge™ nodes
Prepare VMware ESXi™ hosts to participate in NSX networking
Create and configure segments for layer 2 forwarding
Create and configure Tier-0 and Tier-1 gateways for logical routing
Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX
Configure Advanced Threat Prevention features
Configure network services on NSX Edge nodes
Use VMware Identity Manager™ and LDAP to manage users and access
Explain the use cases, importance, and architecture of FederationOutline: VMware NSX: Install, Configure, Manage [V4.0] (NSXICM4)
Course Introduction
Introductions and course logistics
Course objectivesVMware Virtual Cloud Network and VMware NSX
Introduce the VMware Virtual Cloud Network vision
Describe the NSX product portfolio
Discuss NSX features, use cases, and benefits
Explain NSX architecture and components
Explain the management, control, data, and consumption planes and their functions.Preparing the NSX Infrastructure
Deploy VMware NSX® ManagerTM nodes on ESXi hypervisors
Navigate through the NSX UI
Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more
Perform transport node preparation and configure the data plane infrastructure
Verify transport node status and connectivity
Explain DPU-based acceleration in NSX
Install NSX using DPUsNSX Logical Switching
Introduce key components and terminology in logical switching
Describe the function and types of L2 segments
Explain tunneling and the Geneve encapsulation
Configure logical segments and attach hosts using NSX UI
Describe the function and types of segment profiles
Create segment profiles and apply them to segments and ports
Explain the function of MAC, ARP, and TEP tables used in packet forwarding
Demonstrate L2 unicast packet flow
Explain ARP suppression and BUM traffic handlingNSX Logical Routing
Describe the logical routing function and use cases
Introduce the two-tier routing architecture, topologies, and components
Explain the Tier-0 and Tier-1 gateway functions
Describe the logical router components: Service Router and Distributed Router
Discuss the architecture and function of NSX Edge nodes
Discuss deployment options of NSX Edge nodes
Configure NSX Edge nodes and create NSX Edge clusters
Configure Tier-0 and Tier-1 gateways
Examine single-tier and multitier packet flows
Configure static routing and dynamic routing, including BGP and OSPF
Enable ECMP on a Tier-0 gateway
Describe NSX Edge HA, failure detection, and failback modes
Configure VRF LiteNSX Bridging
Describe the function of logical bridging
Discuss the logical bridging use cases
Compare routing and bridging solutions
Explain the components of logical bridging
Create bridge clusters and bridge profilesNSX Firewalls
Describe NSX segmentation
Identify the steps to enforce Zero-Trust with NSX segmentation
Describe the Distributed Firewall architecture, components, and function
Configure Distributed Firewall sections and rules
Configure the Distributed Firewall on VDS
Describe the Gateway Firewall architecture, components, and function
Configure Gateway Firewall sections and rulesNSX Advanced Threat Prevention
Explain NSX IDS/IPS and its use cases
Configure NSX IDS/IPS
Deploy NSX Application Platform
Identify the components and architecture of NSX Malware Prevention
Configure NSX Malware Prevention for east-west and north-south traffic
Describe the use cases and architecture of VMware NSX® Intelligence™
Identify the components and architecture of VMware NSX® Network Detection and Response™
Use NSX Network Detection and Response to analyze network traffic events.NSX Services
Explain and configure Network Address Translation (NAT)
Explain and configure DNS and DHCP services
Describe VMware NSX® Advanced Load Balancer™ architecture, components, topologies, and use cases.
Configure NSX Advanced Load Balancer
Discuss the IPSec VPN and L2 VPN function and use cases
Configure IPSec VPN and L2 VPN using the NSX UINSX User and Role Management
Describe the function and benefits of VMware Identity Manager™ in NSX
Integrate VMware Identity Manager with NSX
Integrate LDAP with NSX
Identify the various types of users, authentication policies, and permissions
Use role-based access control to restrict user access
Explain object-based access control in NSXNSX Federation
Introduce the NSX Federation key concepts, terminology, and use cases.
Explain the onboarding process of NSX Federation
Describe the NSX Federation switching and routing functions.
Describe the NSX Federation security concepts. - NSXTO4 — VMware NSX: Troubleshooting and Operations V4.x
- Длительность: 5 дней (40 часов)
- Код курса: NSXTO4
- Стоимость
- Очный формат: 1 326 000 ₸
- Онлайн формат: 1 272 000 ₸
Описание курса
Course Content
VMware NSX: Troubleshooting and Operations is a 5 day instructor led courses that prepares you to troubleshoot and operate a VMware NSX deployment by leaning how to isolate problems and identify resolutions through a systematic process. You will also gain an understanding on how VMware NSX integrates with VMware vRealize® Operations Manager™, VMware vRealize® Log Insight™, and other management tools.
Who should attend
Network professionals that work with enterprise networks and VMware vSphere®.
Prerequisites
Understanding of concepts presented in the course or .
Passing of the VCP-NV certification is recommendedCourse Objectives
By the end of the course, you will be able to:
Create and apply a troubleshooting methodology
Troubleshoot VMware NSX component issues
Troubleshoot physical networking issues
Troubleshoot logical networking issues
Troubleshoot security configuration issues
Troubleshoot VMware NSX® Edge™ services
Use vRealize Log Insight for centralized logging
Create a monitoring and operational plan for VMware NSXOutline: VMware NSX: Troubleshooting and Operations (NSXTO)
Module 1: Course Introduction
Introductions and course logistics
Course objectivesModule 2: Troubleshooting Methodology
Develop a structured approach to troubleshooting
Understand troubleshooting in a network overlayModule 3: Troubleshooting the VMware NSX Infrastructure
Describe VMware NSX infrastructure components
Troubleshoot NSX Manager deployment and registration with VMware vCenter Server®
Troubleshoot network connectivity with NSX Manager and vCenter Server
Troubleshoot deployment and connectivity of the controller cluster
Troubleshoot user work agentsModule 4: Troubleshooting Logical Switching
Describe the logical switching architecture
Troubleshoot logical switchingModule 5: Troubleshooting Logical Routing
Describe the VMware NSX® for vSphere® logical routing architecture
Describe the administration of logical routing
Describe and troubleshoot DHCP replay for the distributed logical router
Troubleshoot logical routing
Monitor log files to discover logical routing failuresModule 6: Troubleshooting Advanced NSX Edge Services
Troubleshoot NSX Edge high availability models
Troubleshoot NSX Edge routing
Troubleshoot DHCP services for the NSX Edge services gateway
Troubleshoot VPN services
Troubleshoot load balancingModule 7: Troubleshooting Security Services
Describe the components of the distributed firewall
Troubleshoot a distributed firewall
Troubleshoot the Service Composer
Monitor a distributed firewall
Troubleshoot an NSX Edge services gatewayModule 8: Operationalizing VMware NSX
Use vRealize Operations with VMware NSX
Use vRealize Log Insight with VMware NSX
Describe the key components for operationalizing VMware NSX - NSXD4 — VMware NSX: Design V4.x
- Длительность: 5 дней (40 часов)
- Код курса: NSXD4
- Стоимость
- Очный формат: 976 500 ₸
- Онлайн формат: 923 500 ₸
Описание курса
Course Overview
This five-day course provides comprehensive training on considerations and practices to design a VMware NSX® environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer’s business needs.
Product Alignment
VMware NSX 4.1.0Course Content
Course Introduction
Introduction and course logistics
Course objectivesNSX Design Concepts
Identify design terms
Describe framework and project methodology
Describe the role of VMware Cloud Foundation™ in NSX design
Identify customers’ requirements, assumptions, constraints, and risks
Explain the conceptual design
Explain the logical design
Explain the physical designNSX Architecture and Components
Recognize the main elements in the NSX architecture
Describe the NSX management cluster and the management plane
Identify the functions and components of management, control, and data planes
Describe the NSX Manager sizing options
Recognize the justification and implication of NSX Manager cluster design decisions
Identify the NSX management cluster design optionsNSX Edge Design
Explain the leading practices for edge design
Describe the NSX Edge VM reference designs
Describe the bare-metal NSX Edge reference designs
Explain the leading practices for edge cluster design
Explain the effect of stateful services placement
Explain the growth patterns for edge clusters
Identify design considerations when using L2 bridging servicesNSX Logical Switching Design
Describe concepts and terminology in logical switching
Identify segment and transport zone design considerations
Identify virtual switch design considerations
Identify uplink profile and transport node profile design considerations
Identify Geneve tunneling design considerations
Identify BUM replication mode design considerationsNSX Logical Routing Design
Explain the function and features of logical routing
Describe the NSX single-tier and multitier routing architectures
Identify guidelines when selecting a routing topology
Describe the BGP and OSPF routing protocol configuration options
Explain gateway high availability modes of operation and failure detection mechanisms
Identify how multitier architectures provide control over stateful service location
Identify EVPN requirements and design considerations
Identify VRF Lite requirements and considerations
Identify the typical NSX scalable architecturesNSX Security Design
Identify different security features available in NSX
Describe the advantages of an NSX Distributed Firewall
Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall
Determine a security policy methodology
Recognize the NSX security best practicesNSX Network Services
Identify the stateful services available in different edge cluster high availability modes
Describe failover detection mechanisms
Compare NSX NAT solutions
Explain how to select DHCP and DNS services
Compare policy-based and route-based IPSec VPN
Describe an L2 VPN topology that can be used to interconnect data centers
Explain the design considerations for integrating VMware NSX® Advanced Load Balancer™ with NSXPhysical Infrastructure Design
Identify the components of a switch fabric design
Assess Layer 2 and Layer 3 switch fabric design implications
Review guidelines when designing top-of-rack switches
Review options for connecting transport hosts to the switch fabric
Describe typical designs for VMware ESXi™ compute hypervisors with two pNICs
Describe typical designs for ESXi compute hypervisors with four or more pNICs
Differentiate dedicated and collapsed cluster approaches to SDDC designNSX Multilocation Design
Explain scale considerations in an NSX multisite design
Describe the main components of the NSX Federation architecture
Describe the stretched networking capability in Federation
Describe stretched security use cases in Federation
Compare the Federation disaster recovery designsNSX Optimization and DPU-Based Acceleration
Describe Geneve Offload
Describe the benefits of Receive Side Scaling and Geneve Rx Filters
Explain the benefits of SSL Offload
Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput
Explain the available enhanced datapath modes and use cases
List the key performance factors for compute nodes and NSX Edge nodes
Describe DPU-Based Acceleration
Define the NSX features supported by DPUs
Describe the hardware and networking configurations supported with DPUsWho should attend
Network and security architects and consultants who design the enterprise and data center networks and NSX environments
Prerequisites
Before taking this course, you must complete the following course:VMware NSX: Install, Configure, Manage [V4.0] (NSXICM4)You should also have understanding or knowledge of these technologies:
Good understanding of TCP/IP services and protocols
Knowledge and working experience of computer networking and security, including:
Switching and routing technologies (L2 and L3)
Network and application delivery services (L4 through L7)
Firewalling (L4 through L7)
vSphere environmentsThe VMware Certified Professional – Network Virtualization certification is recommended.Course Objectives
By the end of the course, you should be able to meet the following objectives:
Describe and apply a design framework
Apply a design process for gathering requirements, constraints, assumptions, and risks
Design a VMware vSphere® virtual data center to support NSX requirements
Create a VMware NSX® Manager™ cluster design
Create a VMware NSX® Edge™ cluster design to support traffic and service requirements in NSX
Design logical switching and routing
Recognize NSX security best practices
Design logical network services
Design a physical network to support network virtualization in a software-defined data center
Create a design to support the NSX infrastructure across multiple sites
Describe the factors that drive performance in NSX - TKGICM25 — VMware Tanzu Kubernetes Grid: Install, Configure, Manage v2.5
- Длительность: 4 дня (32 часа)
- Код курса: TKGICM25
- Стоимость
- Очный формат: 972 500 ₸
- Онлайн формат: 924 000 ₸
Описание курса
Course Overview
During this four-day course, you focus on installing VMware Tanzu® Kubernetes Grid™ in a VMware vSphere® environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multipod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds.
Course Content
Course Introduction
Introductions and course logistics
Course objectivesIntroducing VMware Tanzu Kubernetes Grid
Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them
Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management, supervisor, and workload clusters
List the components of a Tanzu Kubernetes Grid instanceVMware Tanzu Kubernetes Grid CLI and API
Illustrate how to use the Tanzu CLI
Define the Carvel Tool set
Define Cluster API
Identify the infrastructure providers
List the Cluster API controllers
Identify the Cluster API custom resource definitionsAuthentication
Explain how Kubernetes manages authentication with Management clusters
Explain how Kubernetes manages authentication with supervisor clusters
Define Pinniped
Define Dex
Describe the Pinniped authentication workflowLoad Balancers
Illustrate how load balancing works for the Kubernetes control plane
Illustrate how load balancing works for application workload
Explain how Tanzu Kubernetes Grid integrates with VMware NSX Advanced Load Balancer
List load balancing options available on public cloudsVMware Tanzu Kubernetes Grid on vSphere
List the requirements for deploying a supervisor cluster
List the steps to install a Tanzu Kubernetes Grid supervisor cluster
Summarize the events of a supervisor cluster creation
List the requirements for deploying a management cluster
List the steps to install a Tanzu Kubernetes Grid management cluster
Summarize the events of a management cluster creation
Demonstrate how to use commands when working with management clustersVMware Tanzu Kubernetes Grid on Public Clouds
List the requirements for deploying a management cluster on AWS and Microsoft Azure
List the configuration options to install a Tanzu Kubernetes Grid a management cluster on AWS and AzureTanzu Kubernetes Workload Clusters
List the steps to build a custom image
Describe the available customizations
Identify the options for deploying Tanzu Kubernetes Grid clusters
Explain the difference between the v1alpha3 and v1beta1 APIs
Explain how Tanzu Kubernetes Grid clusters are created
Discuss which VMs compose a Tanzu Kubernetes Grid cluster
List the pods that run on a Tanzu Kubernetes Grid cluster
Describe the Tanzu Kubernetes Grid core add-ons that are installed on a clusterTanzu Kubernetes Grid Packages
Define the Tanzu Kubernetes Grid packages
Explain the difference between Auto-Managed and CLI-Managed packages
Define packages repositoriesConfiguring and Managing Tanzu Kubernetes Grid Operation and Analytics Packages
Describe Cert-Manager
Describe the Harbor Image Registry
Describe Fluent Bit
Identify the logs that Fluent Bit collects
Explain basic Fluent Bit configuration
Describe Prometheus and GrafanaConfiguring and Managing Tanzu Kubernetes Grid Networking Packages
Describe the Contour ingress controller
Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster
Describe ExternalDNS
Demonstrate how to install Service Discovery with ExternalDNS
Describe Multus CNITanzu Kubernetes Grid Day 2 Operations
List the load balancer configuration options in vSphere to load balance applications
Demonstrate how to configure Ingress with the NodePortLocal Mode
Explain how to install VMware Tanzu Application Platform
Describe life cycle management in Tanzu Kubernetes Grid
Explain how backup and restore are implemented in Tanzu Kubernetes Grid
Describe Velero and Restic
List the steps to back up a Workload cluster using Velero and ResticTroubleshooting Tanzu Kubernetes Grid
Discuss the various Tanzu Kubernetes Grid logs
Identify the location of Tanzu Kubernetes Grid logs
Explain the purpose of crash diagnostics
Demonstrate how to check the health of a Tanzu Kubernetes Grid cluster
Explain packages cleanup procedures
Explain management recovery proceduresWho should attend
Platform operators who are responsible for deploying and managing Tanzu Kubernetes clusters
Prerequisites
Understanding of Kubernetes and the Kubernetes cluster architecture
Experience deploying and managing multiple Kubernetes clustersCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Describe how Tanzu Kubernetes Grid fits in the VMware Tanzu® portfolio
Describe the Tanzu Kubernetes Grid architecture
Deploy and manage Tanzu Kubernetes Grid management and supervisor clusters
Deploy and manage Tanzu Kubernetes Grid workload clusters
Deploy, configure, and manage Tanzu Kubernetes Grid packages
Perform basic troubleshooting - KFACO — Kubernetes Fundamentals and Cluster Operations
- Длительность: 4 дня (32 часа)
- Код курса: KFACO
- Стоимость
- Очный формат: 972 500 ₸
- Онлайн формат: 924 000 ₸
Описание курса
Course Overview
This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes.
Course Content
Course Introduction
Introductions and objectives
Containers
What and Why containers
Building images
Running containers
Registry and image managementKubernetes Overview
Kubernetes project
Plugin interfaces
Building Kubernetes
Kubectl CLIBeyond Kubernetes Basics
Kubernetes objects
YAML
Pods, replicas, and deployments
Services
Deployment management
Rolling updates
Controlling deployments
Pod and container configurationsKubernetes Networking
Networking within a pod
Pod-to-Pod Networking
Services to Pods
ClusterIP, NodePort, and LoadBalancer
Ingress controllers
Service Discovery via DNSStateful Applications in Kubernetes
Stateless versus Stateful
Volumes
Persistent volumes claims
StorageClasses
StatefulSetsAdditional Kubernetes Considerations
Dynamic configuration
ConfigMaps
Secrets
Jobs, CronJobsSecurity
Network policy
Applying a NetworkPolicy
SecurityContext
runAsUser/Group
Service accounts
Role-based access controlLogging and Monitoring
Logging for various objects
Sidecar logging
Node logging
Audit logging
Monitoring architecture
Monitoring solutions
Octant
VMware vRealize® Operations Manager™Cluster Operations
Onboarding new applications
Backups
Upgrading
Drain and cordon commands
Impact of an upgrade to running applications
Troubleshooting commands
VMware Tanzu™ portfolio overviewWho should attend
Anyone who is preparing to build and run Kubernetes clusters
Prerequisites
Linux concepts and command line proficiency
General networking proficiencyCourse Objectives
By the end of the course, you should be able to meet the following objectives:Build, test, and publish Docker container images
Become familiar with YAML files that define Kubernetes objects
Understand Kubernetes core user-facing concepts, including pods, services, and deployments
Use kubectl, the Kubernetes CLI, and become familiar with its commands and options
Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet)
Learn how to troubleshoot issues with deployments on Kubernetes
Apply resource requests, limits, and probes to deployments
Manage dynamic application configuration using ConfigMaps and Secrets
Deploy other workloads, including DaemonSets, Jobs, and CronJobs
Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies - VSICM8 — VMware vSphere: Install, Configure, Manage V8
- Длительность: 5 дней (40 часов)
- Код курса: VSICM8
- Стоимость
- Очный формат: 1 141 000 ₸
- Онлайн формат: 1 088 000 ₸
Описание курса
Course Overview
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8. This course prepares you to administer a vSphere infrastructure for an organization of any size.
This course is the foundation for most VMware technologies in the software-defined data center.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesvSphere and Virtualization Overview
Explain basic virtualization concepts
Describe how vSphere fits in the software-defined data center and the cloud infrastructure
Recognize the user interfaces for accessing vSphere
Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUsInstalling and Configuring ESXi
Install an ESXi host
Recognize ESXi user account best practices
Configure the ESXi host settings using the DCUI and VMware Host ClientDeploying and Configuring vCenter
Recognize ESXi hosts communication with vCenter
Deploy vCenter Server Appliance
Configure vCenter settings
Use the vSphere Client to add and manage license keys
Create and organize vCenter inventory objects
Recognize the rules for applying vCenter permissions
View vCenter logs and eventsConfiguring vSphere Networking
Configure and view standard switch configurations
Configure and view distributed switch configurations
Recognize the difference between standard switches and distributed switches
Explain how to set networking policies on standard and distributed switchesConfiguring vSphere Storage
Recognize vSphere storage technologies
Identify types of vSphere datastores
Describe Fibre Channel components and addressing
Describe iSCSI components and addressing
Configure iSCSI storage on ESXi
Create and manage VMFS datastores
Configure and manage NFS datastoresDeploying Virtual Machines
Create and provision VMs
Explain the importance of VMware Tools
Identify the files that make up a VM
Recognize the components of a VM
Navigate the vSphere Client and examine VM settings and options
Modify VMs by dynamically increasing resources
Create VM templates and deploy VMs from them
Clone VMs
Create customization specifications for guest operating systems
Create local, published, and subscribed content libraries
Deploy VMs from content libraries
Manage multiple versions of VM templates in content librariesManaging Virtual Machines
Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances
Migrate VMs using vSphere vMotion
Describe the role of Enhanced vMotion Compatibility in migrations
Migrate VMs using vSphere Storage vMotion
Take a snapshot of a VM
Manage, consolidate, and delete snapshots
Describe CPU and memory concepts in relation to a virtualized environment
Describe how VMs compete for resources
Define CPU and memory shares, reservations, and limits
Deploying and Configuring vSphere Clusters
Create a vSphere cluster enabled for vSphere DRS and vSphere HA
View information about a vSphere cluster
Explain how vSphere DRS determines VM placement on hosts in the cluster
Recognize use cases for vSphere DRS settings
Monitor a vSphere DRS cluster
Describe how vSphere HA responds to various types of failures
Identify options for configuring network redundancy in a vSphere HA cluster
Recognize vSphere HA design considerations
Recognize the use cases for various vSphere HA settings
Configure a vSphere HA cluster
Recognize when to use vSphere Fault ToleranceManaging the vSphere Lifecycle
Enable vSphere Lifecycle Manager in a vSphere cluster
Describe features of the vCenter Update Planner
Run vCenter upgrade prechecks and interoperability reports
Recognize features of VMware vSphere® Lifecycle Manager™
Distinguish between managing hosts using baselines and managing hosts using images
Describe how to update hosts using baselines
Describe ESXi images
Validate ESXi host compliance against a cluster image and update ESXi hosts
Update ESXi hosts using vSphere Lifecycle Manager
Describe vSphere Lifecycle Manager automatic recommendations
Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardwareWho should attend
System administrators
System engineersPrerequisites
This course has the following prerequisites:
System administration experience on Microsoft Windows or Linux operating systemsCourse ObjectivesBy the end of the course, you should be able to meet the following objectives:Install and configure ESXi hosts
Deploy and configure vCenter
Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users
Create virtual networks using vSphere standard switches and distributed switches
Create and configure datastores using storage technologies supported by vSphere
Use the vSphere® Client™ to create virtual machines, templates, clones, and snapshots
Create content libraries for managing templates and deploying virtual machines
Manage virtual machine resource allocation
Migrate virtual machines with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
Create and configure a vSphere cluster that is enabled with VMware vSphere® High Availability and VMware vSphere® Distributed Resource Scheduler™
Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date - VSOSS8 — VMware vSphere: Operate, Scale and Secure V8
- Длительность: 5 дней (40 часов)
- Код курса: VSOSS8
- Стоимость
- Очный формат: 1 326 000 ₸
- Онлайн формат: 1 272 000 ₸
Описание курса
Course Overview
This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesVirtual Machine Operations
Recognize the role of a VMware Tools Repository
Configure a VMware Tools Repository
Recognize the backup and restore solution for VMs
Identify the components in the vSphere Replication architecture
Deploy and configure vSphere Replication
Recover replicated VMsvSphere Cluster Operations
Create and manage resource pools in a cluster
Describe how scalable shares work
Describe the function of the vCLS
Recognize operations that might disrupt the healthy functioning of vCLS VMsNetwork Operations
Configure and manage vSphere distributed switches
Describe how VMware vSphere Network I/O Control enhances performance
Explain distributed switch features such as port mirroring and NetFlow
Define vSphere Distributed Services Engine
Describe the use cases and benefits of vSphere Distributed Services EngineStorage Operations
Discuss vSphere support for NVMe and iSER technologies
Describe the architecture and requirements of vSAN configuration
Describe storage policy-based management
Recognize components in the vSphere Virtual Volumes architecture
Configure Storage I/O ControlvCenter and ESXi Operations
Create a vCenter backup schedule
Recognize the importance of vCenter High Availability
Explain how vCenter High Availability works
Use host profiles to manage ESXi configuration compliance
Use the vSphere client to manage vSphere certificatesvSphere Monitoring
Monitor the key factors that can affect a virtual machine's performance
Describe the factors that influence vCenter performance
Use vCenter tools to monitor resource use
Create custom alarms in vCenter
Describe the benefits and capabilities of VMware Skyline
Recognize uses for Skyline Advisor ProvSphere Security and Access Control
Recognize strategies for securing vSphere components, such as vCenter, ESXi hosts, and virtual machines
Describe vSphere support for security standards and protocols
Describe identity federation and recognize its use cases
Configure identity federation to allow vCenter to use an external identity providervSphere Trusted Environments and VM Encryption
Configure ESXi Host Access and Authentication
Describe virtual machine security features
Describe the components of a VM encryption architecture
Create, manage, and migrate encrypted VMs
List VM encryption events and alarms
Describe the benefits and use cases of vSphere Trust Authority
Configure vSphere Trust AuthorityWho should attend
Experienced system administrators, system engineers, and system integrators
Prerequisites
Attending this course meets the training requirement to achieve the following certification:
Attend VMware vSphere: Install, Configure, Manage [V8]
Equivalent knowledge and administration experience with ESXi and vCenterCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Configure and manage a VMware Tools Repository
Configure vSphere Replication and recover replicated VMs
Manage VM resource usage with resource pools
Configure and manage vSphere networking and storage for a large and sophisticated enterprise
Configure vCenter High Availability
Use host profiles to manage VMware ESXi host compliance
Use the vSphere Client to manage certificates
Monitor the vCenter, ESXi, and VMs performance in the vSphere client
Secure vCenter, ESXi, and VMs in your vSphere environment
Use VMware vSphere Trust Authority to secure the infrastructure for encrypted VMs
Use Identity Federation to configure the vCenter to use external identity sources - VST8 — VMware vSphere: Troubleshooting V8.0
- Длительность: 5 дней (40 часов)
- Код курса: VST8
- Стоимость
- Очный формат: 1 326 000 ₸
- Онлайн формат: 1 272 000 ₸
Описание курса
Course Overview
This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere® Client™, log files, and other tools to analyze and solve problems.
Product Alignment
VMware ESXi 8.0
VMware vCenter Server 8.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to Troubleshooting
Define the scope of troubleshooting
Use a structured approach to solve configuration and operational problems
Apply troubleshooting methodology to logically diagnose faults and improve troubleshooting efficiencyTroubleshooting Tools
Discuss the various methods to run commands
Discuss the various ways to access ESXi Shell
Use commands to view, configure, and manage your vSphere components
Use the vSphere CLI
Use ESXCLI commands from the vSphere CLI
Use Data Center CLI commands
Identify the best tool for command-line interface troubleshooting
Identify important log files for troubleshooting vCenter Server and ESXi
Describe the benefits and capabilities of VMware SkylineTM
Explain how VMware Skyline works
Describe VMware SkylineTM Health
Describe VMware Skyline AdvisorTMTroubleshooting Virtual Networking
Analyze and troubleshoot standard switch problems
Analyze and troubleshoot virtual machine connectivity problems
Analyze and troubleshoot management network problems
Analyze and troubleshoot distributed switch problemsTroubleshooting Storage
Discuss the vSphere storage architecture
Identify the possible causes of problems in the various types of datastores
Analyze the common storage connectivity and configuration problems
Discuss the possible storage problems causes
Solve the storage connectivity problems, correct misconfigurations, and restore LUN visibility
Review vSphere storage architecture and functionality necessary to troubleshoot storage problems
Use ESXi and Linux commands to troubleshoot storage problems
Analyze log file entries to identify the root cause of storage problems
Investigate ESXi storage issues
Troubleshoot VM snapshots
Troubleshoot storage performance problems
Review multipathing
Identify the common causes of missing paths, including PDL and APD conditions
Solve the missing path problems between hosts and storage devicesTroubleshooting vSphere Clusters
Identify and troubleshoot vSphere HA problems
Analyze and solve vSphere vMotion problems
Diagnose and troubleshoot common vSphere DRS problemsTroubleshooting Virtual Machines
Discuss virtual machine files and disk content IDs
Identify, analyze, and solve virtual machine snapshot problems
Troubleshoot virtual machine power-on problems
Identify possible causes and troubleshoot virtual machine connection state problems
Diagnose and recover from VMware Tools installation failuresTroubleshooting vCenter Server and ESXi
Analyze and solve vCenter Server service problems
Diagnose and troubleshoot vCenter Server database problems
Use vCenter Server Appliance shell and the Bash shell to identify and solve problems
Identify and troubleshoot ESXi host problemsWho should attend
System architects and system administrators
Prerequisites
This course requires completion of one the following courses:VCP-DCV certification
VMware vSphere: Install, Configure, Manage
VMware vSphere: Operate, Scale and SecureThe course material presumes that you can perform the following tasks with no assistance or guidance before enrolling in this course:Install and configure ESXi
Install vCenter Server
Create vCenter Server objects, such as data centers and folders
Create and modify a standard switch
Create and modify a distributed switch
Connect an ESXi host to NAS, iSCSI, or Fibre Channel storage
Create a VMware vSphere VMFS datastore
Modify a virtual machine’s hardware
Migrate a virtual machine with VMware vSphere® vMotion® and VMware vSphere® Storage vMotion®
Configure and manage a VMware vSphere® Distributed Resource SchedulerTM cluster
Configure and manage a VMware vSphere HA cluster
Basic knowledge of command line tools like ESXCLI, DCLI, and PowerCLICourse Objectives
By the end of the course, you should be able to meet the following objectives:
Introduce troubleshooting principles and procedures
Use command-line interfaces, log files, and the vSphere Client to diagnose and resolve problems in the vSphere environment
Explain the purpose of common vSphere log files
Identify networking issues based on reported symptoms
Validate and troubleshoot the reported networking issue
Identify the root cause of networking issue
Implement the appropriate resolution to recover from networking problems
Analyze storage failure scenarios using a logical troubleshooting methodology
Identify the root cause of storage failure
Apply the appropriate resolution to resolve storage failure problems
Troubleshoot vSphere cluster failure scenarios
Analyze possible vSphere cluster failure causes
Diagnose common VMware vSphere® High Availability problems and provide solutions
Identify and validate VMware ESXiTM host and VMware vCenter® problems
Analyze failure scenarios of ESXi host and vCenter problems
Select the correct resolution for the failure of ESXi host and vCenter problems
Troubleshoot virtual machine problems, including migration problems, snapshot problems, and connection problems
Troubleshoot performance problems with vSphere components - VSFT8 — VMware vSphere: Fast Track V8
- Длительность: 5 дней (40 часов)
- Код курса: VSFT8
- Стоимость
- Очный формат: 1 456 000 ₸
- Онлайн формат: 1 401 500 ₸
Описание курса
Course Overview
This five-day, extended hour course takes you from introductory to advanced VMware vSphere® 8 management skills. Building on the installation and configuration content from our best-selling course, you will also develop advanced skills needed to manage and maintain a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you will install, configure, and manage vSphere 7. You will explore the features that build a foundation for a truly scalable infrastructure and discuss when and where these features have the greatest effect. This course prepares you to administer a vSphere infrastructure for an organization of any size using vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter Server® 8.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Course Content
Course Introduction
vSphere and Virtualization Overview
vCenter Management
Configure and Manage vSphere Networking
Configure and Manage vSphere Storage
Deploying Virtual Machines
Managing Virtual Machines
vSphere Cluster Management
Managing the vSphere Lifecycle
Network Operations
Storage Operations
ESXi Operations
vSphere MonitoringWho should attend
System administrators
System engineersPrerequisites
This course has the following prerequisites:System administration experience on Microsoft Windows or Linux operating systems
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Install and configure ESXi hosts
Deploy and configure vCenter
Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users
Configure vCenter High Availability
Create and configure virtual networks using vSphere standard switches and distributed switches
Create and configure datastores using storage technologies supported by vSphere
Use the vSphere Client to create virtual machines, templates, clones, and snapshots
Configure and manage a VMware Tools Repository
Create content libraries for managing templates and deploying virtual machines
Manage virtual machine resource use
Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion
Create and configure a vSphere cluster that is enabled with vSphere High Availability and vSphere Distributed Resource Scheduler
Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date
Configure and manage vSphere networking and storage for a large and sophisticated enterprise
Use host profiles to manage VMware ESXi host compliance
Monitor the vCenter, ESXi, and VMs performance in the vSphere clientOutline: VMware vSphere: Fast Track [V8] (VSFT8)
1 Course Introduction
Introductions and course logistics
Course objectives2 vSphere and Virtualization Overview
Explain basic virtualization concepts
Describe how vSphere fits in the software-defined data center and the cloud infrastructure
Recognize the user interfaces for accessing vSphere
Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs
Install an ESXi host3 vCenter Management
Recognize ESXi hosts communication with vCenter
Deploy vCenter Server Appliance
Configure vCenter settings
Use the vSphere Client to add and manage license keys
Create and organize vCenter inventory objects
Recognize the rules for applying vCenter permissions
View vSphere tasks and events
Create a vCenter backup schedule
Recognize the importance of vCenter High Availability
Explain how vCenter High Availability works4 Configure and Manage vSphere Networking
Configure and view standard switch configurations
Configure and view distributed switch configurations
Recognize the difference between standard switches and distributed switches
Explain how to set networking policies on standard and distributed switches5 Configure and Manage vSphere Storage
Recognize vSphere storage technologies
Identify types of vSphere datastores
Describe Fibre Channel components and addressing
Describe iSCSI components and addressing
Configure iSCSI storage on ESXi
Create and manage VMFS datastores
Configure and manage NFS datastores
Discuss vSphere support for NVMe and iSER technologies6 Deploying Virtual Machines
Create and provision VMs
Explain the importance of VMware Tools
Identify the files that make up a VM
Recognize the components of a VM
Navigate the vSphere Client and examine VM settings and options
Modify VMs by dynamically increasing resources
Create VM templates and deploy VMs from them
Clone VMs
Create customization specifications for guest operating systems
Create local, published, and subscribed content libraries
Deploy VMs from content libraries
Manage multiple versions of VM templates in content libraries7 Managing Virtual Machines
Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances
Migrate VMs using vSphere vMotion
Describe the role of Enhanced vMotion Compatibility in migrations
Migrate VMs using vSphere Storage vMotion
Take a snapshot of a VM
Manage, consolidate, and delete snapshots
Describe CPU and memory concepts in relation to a virtualized environment
Describe how VMs compete for resources
Define CPU and memory shares, reservations, and limits
Recognize the role of a VMware Tools Repository
Configure a VMware Tools Repository
Recognize the backup and restore solution for VMs8 vSphere Cluster Management
Use Cluster Quickstart to enable vSphere cluster services and configure the cluster
View information about a vSphere cluster
Explain how vSphere DRS determines VM placement on hosts in the cluster
Recognize use cases for vSphere DRS settings
Monitor a vSphere DRS cluster
Describe how vSphere HA responds to different types of failures
Identify options for configuring network redundancy in a vSphere HA cluster
Recognize the use cases for various vSphere HA settings
Configure a cluster enabled for vSphere DRS and vSphere HA
Recognize when to use vSphere Fault Tolerance
Describe the function of the vCLS
Recognize operations that might disrupt the healthy functioning of vCLS VMs9 Managing the vSphere Lifecycle
Generate vCenter interoperability reports
Recognize features of vSphere Lifecycle Manager
Describe ESXi images and image depots
Enable vSphere Lifecycle Manager in a vSphere cluster
Validate ESXi host compliance against a cluster image and remediate ESXi hosts using vSphere Lifecycle Manager
Describe vSphere Lifecycle Manager automatic recommendations
Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware10 Network Operations
Configure and manage vSphere distributed switches
Describe how VMware vSphere Network I/O Control enhances performance
Define vSphere Distributed Services Engine
Describe the use cases and benefits of vSphere Distributed Services Engine11 Storage Operations
Describe the architecture and requirements of vSAN configuration
Describe storage policy-based management
Recognize components in the vSphere Virtual Volumes architecture
Configure Storage I/O Control12 ESXi Operations
Use host profiles to manage ESXi configuration compliance
Recognize the benefits of using configuration profiles13 vSphere Monitoring
Monitor the key factors that can affect a virtual machine's performance
Describe the factors that influence vCenter performance
Use vCenter tools to monitor resource use
Create custom alarms in vCenter
Describe the benefits and capabilities of VMware Skyline
Recognize uses for Skyline Advisor Pro - VSD8 — VMware vSphere: Design V8
- Длительность: 3 дня (24 часа)
- Код курса: VSD8
- Стоимость
- Очный формат: 760 500 ₸
- Онлайн формат: 703 000 ₸
Описание курса
This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions.
Course Objectives
By the end of the course, you should be able to meet the following objectives:
Create a vSphere design given a case study
Identify and assess the business objectives of the vSphere environment
Identify business requirements, constraints, assumptions, and risks, for all layers in the vSphere environment
Apply a framework to a design
Analyze design choices for vCenter, ESXi, storage, networking, vSphere clusters, and virtual machines
Identify design decisions to ensure manageability, which include scalability, capacity planning and lifecycle management
Identify design decisions to ensure that the vSphere environment is highly available
Identify design decisions to ensure that the vSphere environment performs well
Identify design decisions to ensure that the vSphere environment is secure
Identify design decisions to ensure that the vSphere environment can recover from data loss or disasterTarget Audience
System integrators, Consultants, Solution architects
Prerequisites
This course requires completion of the one of the following:
VMware vSphere: Install, Configure, Manage
VMware vSphere: Operate, Scale, and Secure - VSFBMO9 — VMware vSphere Foundation: Build, Manage, Operate v9
- Длительность: 5 дней (40 часов)
- Код курса: VSFBMO9
- Стоимость
- Очный формат: 1 124 500 ₸
- Онлайн формат: 1 078 500 ₸
Описание курса
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, configuring and managing VMware vSphere Foundation. You will learn about the architecture of vSphere Foundation, compute, storage, networks and licensing. This course prepares you to administer a vSphere Foundation, which includes VCF Operations 9.0, vCenter 9.0, and ESX 9.0.
Course Objectives
By the end of the course, you should be able to meet the following objectives
Define the key features, use cases and, capabilities of vSphere Foundation.
Navigating the VCF Operations User Interface.
Describe the licensing options and manage licenses for vSphere Foundation.
Describe the installation and configuration of ESX.
Create virtual networks using vSphere standard switches and distributed switches.
Create and configure datastores using storage technologies supported by vSphere.
Use the vSphere Client to create virtual machines, templates, clones, and snapshots.
Create content libraries for managing templates and deploying virtual machines.
Manage virtual machine resource allocation.
Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion.
Create and configure a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphereDistributed Resource Scheduler.
Analyzing the Placement of VM Objects and Components in the vSAN Cluster.
Creating Custom Views and Policies in VCF Operations.
Describe vSphere Kubernetes, vSphere Supervisor Service.
Deploy and configure vSphere Foundation.
Deploy additional vSphere Foundation components such as VCF Operations Collector, VCF Operations for Logs, andVCF Operations for Orchestrator.
Manage the life cycle of VCF Operations and vSphere components.Target Audience
System Administrators
Solution Engineers
Consultants
Architects
Support PersonnelPrerequisites
This course has the following prerequisites:
Working experience and knowledge of VMware vSphere, VMware NSX, and vSAN environments - VSAA8 — VMware vSphere: Advanced Administration v8
- Длительность: 5 дней (40 часов)
- Код курса: VSAA8
- Стоимость
- Очный формат: 1 326 000 ₸
- Онлайн формат: 1 272 000 ₸
Описание курса
Course Overview
This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere 8 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure.
This course uses scenario-based lab exercises and does not provide guided step-by-step instructions. To complete the scenario-based lab exercises, you are required to analyze the task, research, and deduce the required solution. References and suggested documentation are provided. This course utilizes labs to teach students how to effectively navigate and manage vSphere. The course aligns fully with the VMware Certified Advanced Professional – Data Center Virtualization Deploy exam objectives.
Product Alignment
VMware ESXi 8.0
VMware vCenter 8.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesCreating and Configuring Management Clusters
Create a vSphere cluster for management workloads
Activate vSphere cluster features that help to improve resource allocation and availability of virtual machines
Use standard virtual switches to create networking in a cluster
Select the appropriate vSphere storage types to meet requirements
Configure iSCSI storage
Configure VMFS and NFS datastores
Recognize when to configure ESXi NTP and PTP support
Recognize ESXi user account best practices
Configure ESXi host settings
Use vSphere configuration profiles to maintain consistent ESXi host configurationsCreating and Configuring Production Clusters
Use Cluster Quickstart to create a vSAN-activated cluster
Configure advanced vSphere HA settings
Configure the vCenter identity provider
Assign specific permissions and roles to Active Directory Federation Services (ADFS) users
Configure Enhanced vMotion Compatibility on a cluster and a VM
Perform a Cross vCenter Server migration
Use content libraries to share virtual machine templates between sites
Manage VM and ESXi host resources using resource pools, scalable shares, and vSphere DRS rulesTroubleshooting vSphere and Backing Up Configurations
Troubleshoot ESXi connectivity issues
Troubleshoot ESXi storage issues
Troubleshoot vSphere cluster issues
Troubleshoot PowerCLI issues
Generate vCenter and ESXi log bundles
Back up vCenter
Create a vCenter profile to standardize configurations in the environmentLifecycle Management
Troubleshoot upgrade-blocking issues
Increase logging levels on vCenter
Configure a VMware Tools™ shared repository
Upgrade vCenter
Upgrade ESXi
Upgrade VMware Tools
Upgrade virtual machine hardware compatibilityvSphere Security
Configure a key management server
Encrypt virtual machines using vSphere VM encryption
Secure VMs in transit with encrypted vSphere vMotion
Identify and implement different ESXi CPU scheduler options
Apply security hardening guidelines to ESXi hosts
Replace vCenter certificates with trusted CA-signed certificates
Reconfigure the primary network identifier for a vCenter instanceWho should attend
System administrators
System engineersPrerequisites
This course requires completion of the following prerequisites:VMware vSphere: Install, Configure, Manage
VMware vSphere: Operate, Scale, and Secure
Working knowledge of VMware vSAN™
System administration experience on Microsoft Windows or Linux operating systemsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Configure VMware vCenter® and VMware ESXi™
Configure and manage a vSphere cluster solution for vSphere HA, vSphere DRS, and vSAN
Configure vSphere storage and networking
Perform lifecycle operations on vSphere components
Troubleshoot vSphere infrastructure and connectivity issues
Back up vCenter configurations
Implement solutions for securing the vSphere infrastructure - VSTDCM8 — VMware vSphere with Tanzu: Deploy, Configure, Manage v8
- Длительность: 3 дня (24 часа)
- Код курса: VSTDCM8
- Стоимость
- Очный формат: 872 500 ₸
- Онлайн формат: 824 000 ₸
Описание курса
Course Overview
During this three-day course, you focus on deploying and managing VMware vSphere® with VMware Tanzu® in a VMware vSphere® 8 environment. You learn how vSphere with Tanzu provides services to deploy and manage virtual machines, vSphere Pods, Supervisor Services, and VMware Tanzu® Kubernetes Grid™ clusters. You will also gain experience with day 2 operations and life cycle management of a vSphere with Tanzu environment.
Product Alignment
VMware vSphere® 8 Update 1
VMware NSX® Advanced Load Balancer™ 22.1.3
VMware Tanzu® Kubernetes Grid™ 2.0Course Content
Course Introduction
Introductions and course logistics
Course objectivesIntroduction to Containers and Kubernetes
Differentiate between containers and virtual machines
Identify the parts of a container system
List the steps in a basic Docker workflow
Explain the importance of Kubernetes
Identify the basic architecture of Kubernetes
Describe a basic Kubernetes workflowIntroducing vSphere with Tanzu
Describe vSphere with Tanzu
Describe Tanzu Kubernetes Grid
Describe VMware Tanzu® Mission Control
Describe VMware Tanzu® for Kubernetes Operations
Explain the purpose of vSphere with Tanzu
Identify the capabilities of vSphere with Tanzu
Describe the vSphere with Tanzu Supervisor
Identify the components of the vSphere with Tanzu Supervisor
Describe vSphere Namespaces
Describe the Supervisor Services
Describe the VM Service
Describe Tanzu Kubernetes Grid clustersvSphere with Tanzu Infrastructure
Discuss storage concepts for vSphere with Tanzu
Describe storage policies
Describe content libraries
Explain the Container Storage Interface plug-in functionalities
Discuss storage for Tanzu Kubernetes Grid clusters
Describe the vSAN Direct datastore for vSphere with Tanzu
Identify the two network stacks available for vSphere with Tanzu deployments
List the VDS components that vSphere with Tanzu supports
List the NSX components that vSphere with Tanzu supports
Outline the supported load balancer solutions by vSphere with TanzuvSphere with Tanzu Architecture
Describe the Supervisor architecture
List the different options for deploying the Supervisor
Outline the requirements for deploying a Supervisor
Outline the licensing requirements for the Supervisor
Describe vSphere Namespaces
List vSphere Namespace resources and Kubernetes object limits
Define content libraries and VM images
Explain VM classes
Describe Kubernetes CLI Tools for vSphere
List the different types of authentication available in vSphere with Tanzu
Explain vSphere privileges
Explain roles and permissions in vSphere Namespaces
Explain Tanzu Kubernetes Grid RBAC
List the Tanzu Kubernetes Grid authentication methods
List the vSphere with Tanzu services and workloads
Identify the supportability for vSphere with Tanzu services and workloads based on the Supervisor deployment typesvSphere with Tanzu Workloads and Services
Describe the characteristics of vSphere Pods
Identify the capabilities of vSphere Pods
List the components of vSphere Pods
Explain the concept of Supervisor Services
Describe the Supervisor Services catalog and its available services
Discuss how to add Supervisor Services and manage their life cycle
Describe Tanzu Kubernetes Grid clusters
List the components of Tanzu Kubernetes Grid
List the options for deploying Tanzu Kubernetes Grid workload clusters
List the different types of Tanzu Kubernetes Grid workload clusters
Outline the requirements for deploying a Tanzu Kubernetes Grid workload cluster
Describe the VM Service
Explain the use cases of the VM Service
List the VM Service parameters
Outline the requirements for deploying a VM using the VM ServiceDay 2 Operations
Explain how to view Kubernetes namespace events
List the ways to monitor vSphere Pod, Tanzu Kubernetes Grid cluster, and VM performance and utilization
Describe vSphere with Tanzu control plane certificate management
Describe load balancer certificate management
Describe the prerequisites and steps for updating vSphere with Tanzu
Describe the Supervisor updates
Describe the vSphere Namespace updates
Describe the update process of Tanzu Kubernetes Grid clusters
List the steps to back up the vSphere with Tanzu components
Explain how to back up a Supervisor
Define Velero Plugin for vSphere and standalone Velero
Identify the steps to install Velero on workload clusters
Explain how to back up and restore vSphere with Tanzu workloads with the Velero CLI
Describe the various vSphere with Tanzu logs
Explain how to generate a vSphere with Tanzu support bundle
Explain how to use SSH to connect to Supervisor control plane nodesWho should attend
vSphere administrators and platform operators who are responsible for deploying and managing workloads and services in vSphere with Tanzu
Prerequisites
Experience deploying and managing vSphere
Understanding of Kubernetes and the Kubernetes cluster architecture
Attending one of the following courses is recommended:
VMware vSphere: Install, Configure, Manage
Kubernetes Fundamentals and Cluster OperationsCourse Objectives
By the end of the course, you should be able to meet the following objectives:
Describe how vSphere with Tanzu fits in the VMware Tanzu® portfolio
Describe the vSphere with Tanzu concepts and architecture
Describe vSphere with Tanzu on VMware NSX®
Describe vSphere with Tanzu on VMware vSphere® Distributed Switch™
List the load balancer solutions supported by vSphere with Tanzu
Describe the vSphere with Tanzu storage components
Deploy and manage Supervisors
Describe vSphere Pod capabilities and components
Deploy and configure Contour as a Supervisor Service
Deploy and configure ExternalDNS as a Supervisor Service
Deploy and configure Harbor as a Supervisor Service
Deploy and manage Tanzu Kubernetes Grid workload clusters
Deploy and manage virtual machines using the VM Service
Deploy applications in a vSphere with Tanzu environment
Perform a backup using Velero
Use the vSphere UI and CLI to monitor the health of the vSphere with Tanzu environment
Use logs and CLI commands to troubleshoot the vSphere with Tanzu environment
Безопасность по стандартам ISO
- ИБ01 — Система управления информационной безопасностью ISO 27001 и управление рисками ISO 27005
- Длительность: 5 дней (40 часов)
- Код курса: ИБ01
- Стоимость
- Очный формат: 437 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Аннотация
Основными задачами курса являются: ознакомление слушателей с современными взглядами и подходами к обеспечению информационной безопасности (ИБ), понятию и управлению рисками ИБ, раскрытие значения ИБ для успешного осуществления деятельности предприятия, пояснение основных этапов разработки и внедрения системы управления ИБ и рисками ИБ.
Данный курс адаптирован к действующим международным версиям стандартов ИСО/МЭК 27001:2022 и ИСО/МЭК 27005:2018.
Эти стандарты являются обобщением мирового опыта в организации управления информационной безопасностью и определяет общую организацию, направления планирования, использование оценки риска, оценки эффективности, контроля улучшений и т.д. в контексте информационной безопасности.Аудитория
Курс предназначен для руководителей проектов по внедрению СУИБ, руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка
Начальный курс «Управление информационной безопасностью. Организация, подходы, принципы».
Опыт работы в подразделениях информационных технологий или информационной безопасности.Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 80% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью финального тестирования.Результаты курса
По окончании курса слушатели смогут:
Сформировать план разработки и внедрения СУИБ у себя на предприятии
Определить механизмы и подходы к управлению актуальных рисков ИБ
Внедрить у себя в организации (при необходимости скорректировать имеющийся) процесс управления рисками ИБ
Обоснованно подходить к выбору механизмов контроля требуемого уровня безопасности
Оценить качество выполнения работ внутренними и внешними аудиторами ИБ.
Ориентироваться в проблемах информационных рисков, в современных технологиях управления рисками
Выявлять актуальные угрозы, имеющиеся уязвимости и определять приоритетные направления деятельности по нейтрализации рисков у себя в компанииПрограмма курса
1. Информация, информационная безопасность и защита информации
Определение ИБ, виды информации, соотношение понятий ИБ и ЗИ
2. Объекты защиты и угрозы
Виды классификаций активов, угроз, уязвимостей
3. Основные термины и определения ИБ
Риски ИБ и стратегии их обработки
Понятие, подходы и стратегии управления рисками. Факторы, определяющие риск4. Комплексность и системность при управлении ИБ
Применение принципов комплексности и системности на практике.
5. Процессный подход в управлении ИБ
«Семейство» стандартов ИСО по системам управления. Понятие процессного подхода. История его использования и тенденции.
6. Назначение стандартов ИСО 27001 и ИСО 27002
Механизм взаимодействия и применения стандартов. Их структура. Термины и определения.
7. Область действия СУИБ и Политика ИБ
Определение границ СУИБ. Концепция и политика ИБ, методы их формирования.
8. Процесс управления рисками ИБ. Основные этапы, их разработка и реализация.
Идентификация рисков ИБ, их оценка, анализ, оценивание и обработка.
9. Инвентаризация активов
Инвентаризация активов, их оценка и ранжирование. Факторы, влияющие на ценность активов
10. Понятие процесса управления рисками управления ИБ. Основные его стадии.
Понятие информационных рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления информационными рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
11. Процесс управления рисками ИБ. Основные этапы, их разработка и реализация.
Идентификация рисков ИБ, их оценка, анализ, оценивание и обработка.
12. Инвентаризация активов
Инвентаризация активов, их оценка и ранжирование. Факторы, влияющие на ценность активов
13. Понятие процесса управления рисками управления ИБ. Основные его стадии.
Понятие информационных рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления информационными рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
14. Выбор и обоснование средств обработки рисков
Выбор стратегий и средств управления рисками. Рекомендации Стандарта, документ «Положение о применимости». Остаточные риски.
15. Значение рисков в современных системах информационной безопасности
Принцип комплексности и системности в контексте обеспечения ИБ, его обоснование и отражение в ведущих международных стандартах по информационной безопасности. Организационные, правовые и программно-технические механизмы безопасности, их согласованное применение и критерии выбора.
16. Обязательные процессы управления ИБ
Основы построения СУИБ. Требования Стандарта.
17. Завершение внедрения СУИБ
Документация СУИБ. Матрица применимости. Записи СУИБ. Механизмы анализа и пересмотра СУИБ.
18. Жизненный цикл PDCA
Цикл Деминга-Шухарта в применении к СУИБ
19. Сертификация СУИБ
Этапы сертификационного процесса, сроки и ориентировочный бюджет.
20. Аудит информационной безопасности
Планирование аудита. Подготовка аудитора. Документы. Сбор свидетельств. Техника аудита. Ведение записей. Формулирование несоответствий.
21. Экзамен
Оценка уровня усвоения слушателями материалов курса.
- ИБ03 — Управление рисками информационной безопасности (ISO 27005)
- Длительность: 5 дней (40 часов)
- Код курса: ИБ03
- Стоимость
- Очный формат: 437 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Аннотация
Основными задачами курса являются: ознакомление слушателей с современными взглядами и подходами к обеспечению информационной безопасности (ИБ), раскрытие значения рисков для успешного обеспечения информационной безопасности предприятия, пояснение основных этапов разработки и внедрения системы управления рисками ИБ, ознакомление с основными положениями ведущих мировых стандартов по ИБ.
Аудитория
Курс предназначен для руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка
Курс рассчитан на слушателей, имеющих практический опыт, как в вопросах комплексных систем ИБ, так и специализирующихся в какой-либо отдельной области обеспечения ИБ.
Знание слушателями основ современных информационных технологий желательно, но не обязательно.
Обучение по настоящему курсу рекомендуется проходить после курсов «Управление информационной безопасностью. Организация, подходы, принципы» или «Система Управления Информационной безопасностью. ИСО/МЭК 27001».
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Результаты курса
По окончанию курса слушатели смогут:
Ориентироваться:
в проблемах информационных рисков
в современных технологиях управления рисками
Выявлять актуальные угрозы, имеющиеся уязвимости и определять приоритетные направления деятельности по нейтрализации рисков у себя в компании
Обоснованно подходить к выбору необходимых средств защиты информации
Дополнительно
Каждый слушатель получает на руки презентации всех частей курса в печатном виде.В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
1. Введение в предмет «Управление рисками Информационной безопасности»
Основные информационные угрозы и атаки, уязвимости систем безопасности и условия для их возникновения. Термины и определения.
2. Основные механизмы и средства защиты ресурсов информационных систем
Идентификация и аутентификация, разграничение доступа, регистрация и аудит, контроль целостности, криптографические механизмы обеспечения конфиденциальности, целостности и аутентичности информации, контроль содержимого, обнаружение и противодействие атакам, анализ защищенности и др.
3. Значение рисков в современных системах Информационной безопасности
Принцип комплексности и системности в контексте обеспечения ИБ, его обоснование и отражение в ведущих международных стандартах по информационной безопасности. Организационные, правовые и программно-технические механизмы безопасности, их согласованное применение и критерии выбора.
4. Введение в процесс управления рисками ИБ
Понятие информационных рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления информационными рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
Понятие процесса управления рисками управления ИБ. Основные его стадии.
5. Определение уровня рисков ИБ
Анализ и оценка рисков. Идентификация и ранжирование активов, угроз, уязвимостей, возможного ущерба. Практическое вычисление уровня рисков.
6. Обработка рисков ИБ
Выбор стратегии управления рисками ИБ. Обоснование необходимых мер безопасности.
7. Обмен информацией о рисках информационной безопасности
Процедуры по обмену информацией о рисках между должностными лицами и заинтересованными сторонами.
8. Мониторинг и переоценка рисков ИБ
Построение системы контроля рисков, влияющих на них факторов и критериев их оценки.
- ИБ04 — Аудит информационной безопасности (ISO 27001)
- Длительность: 5 дней (40 часов)
- Код курса: ИБ04
- Стоимость
- Очный формат: 437 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Аннотация
Аудит – это ключевой момент любой Системы Менеджмента, на котором лежит ответственность за преодоление любых препятствий на всех этапах жизненного цикла Системы Менеджмента.
Настоящий курс является первым шагом на пути практического изучения деятельности аудитора информационной безопасности по стандарту ИСО/МЭК 27001.
Стандарт ИСО/МЭК 27001 является обобщением мирового опыта в организации управления информационной безопасностью и определяет общую организацию, направления планирования, использование оценки риска, оценки эффективности, контроля улучшений и т.д. в контексте информационной безопасности.
Аудитория
Курс предназначен для руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Потенциальные кандидаты:
Те, кто собирается внедрять СУИБ в соответствии с требованиями ИСО/МЭК 27001;
Консультанты по разработке и внедрению СУИБ;
Профессионалы в области IT-технологий и ISO 9001
Предварительная подготовка
Опыт работы в подразделениях информационных технологий или информационной безопасности.
Курсы «Управление информационной безопасностью. Организация, подходы, принципы» и «Система Управления Информационной Безопасностью. ИСО 27001»
Форма проведения
Обучение предусматривает проведение теоретических занятий, практическую работу в группах, а также ролевые игры. Основные занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится не менее 50% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью финального тестирования.
Результаты курса
По окончании настоящего курса слушатели смогут:
Сформировать план разработки и внедрения у себя на предприятии системы контроля эффективности информационной безопасности
Определить механизмы и подходы к проведению оценки соответствия применимым требованиям ИБ
Оценить качество выполнения работ внутренними и внешними аудиторами ИБ.
Программа курса
Программа курса включает в себя материалы из области разработки, внедрения и проведения аудита СУИБ, рассматриваются проблемы и сложности, часто встречающихся при работе по этим направлениям.
Основными разделами курса являются:
Информационная безопасность. Подходы, принципы, организация.
ИСО/МЭК27001 и ИСО/МЭК 27002 (17799)
Управление рисками информационной безопасности
Международный стандарт по проведению аудита систем управления ИСО 19011
Место аудита безопасности в процессах СУИБ
Проведение аудита по стандарту ИСО/МЭК 27001
Техника аудита по стандарту ИСО/МЭК 27001
Разработка плана
Процессы аудита
Управление командой аудиторов
Техника интервьюирования
Отчётность аудитора. Структура, формирование.
- ИБ05 — Система управления противодействием коррупции (ISO 37001)
- Длительность: 5 дней (40 часов)
- Код курса: ИБ05
- Стоимость
- Очный формат: 437 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
В 2016 году Международная Организация по Стандартизации ИСО выпускает новый стандарт из «семейства систем управления» — ИСО 37001 «Система управления антикоррупционными мероприятиями».
Коррупция значительно замедляет общее развитие бизнеса во многих странах и секторах экономики. Систематическое взяточничество снижает темпы экономического роста и выступает препятствием для инвестиционных потоков. Оно стимулирует рост бедности и социального неравенства. И, что самое главное, коррупцию очень трудно искоренить.
Стандарт ИСО 37001 предназначен для упрощения решения этой серьезной задачи путем использования международного опыта в области антикоррупционных инициатив. Стандартописывает «Систему Управления Противодействием Коррупции» (СУПК), определяет общую организацию, направления планирования, использование оценки рисков, оценки эффективности, контроля улучшений и т.д. в контексте борьбы со взяточничеством.Он применим для любых организаций независимо от их размера, формы собственности и области деятельности.
Настоящий курс предназначен для представления концепции антикоррупционных мероприятий, выявления преимуществ использования СУПК, пояснения ключевых требования стандарта ИСО 37001 и возможностей его использования в РК, освещения основных этапов разработки, внедрения и сопровождения СУПК.
Аудитория
Курс предназначен для лиц, которые отвечают за управление антикоррупционными мероприятиями, соблюдении в компании норм корпоративной этики, корпоративное управление, риски и обеспечение соответствие, системы управления, человеческие ресурсы, закуп, а также лиц, кто управляет бизнес-партнерами или выбирает их, особенно при работе в условиях высоких рисков взяточничества.
В число рекомендуемых должностей входят: руководители высшего и среднего звена, HR-менеджеры, юристы, риск-менеджеры и менеджеры по обеспечению соответствия, менеджеры по закупу, группы расследования внутренних нарушений, внутренние аудиторы, а также иные, которым требуется повысить уровень своей компетенции в области антикоррупционных мероприятий.
Предварительная подготовка
Фиксированных требований к предварительной подготовке слушателей нет. Однако приветствуется опыт управленческой деятельности, работы с системами управления ИСО, в подразделениях контроля, аудита и/или риск-менеджмента.
Форма проведения
Занятия курса проводятся в аудиторной форме путем сочетания лекций, практических занятий в группах и живого обсуждения. Для практических занятий не менее 60% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью ряда промежуточных и финального тестирований.
Результаты курса
По окончанию настоящего курса слушатели смогут:
оценить текущие риски взяточничества в своей организации
помочь бизнесу осознать ключевые понятия и выгоды применения СУПК
разработать и реализовать в своей организации проект по внедрению СУПК с использованием цикла PDCA
определить и реализовать процессы поддержания функционирования и непрерывного улучшения СУПК
Дополнительно
Каждый слушатель получает на руки презентации всего курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
Часть 1. Введение управление противодействием коррупции
«происхождение» стандарта ИСО 37001
История и условия возникновения Стандарта. Понятие коррупции, ее виды и проблемы борьбы.
объекты защиты и угрозы
Защищаемые активы, угроз, уязвимостей
риски АК и стратегии их обработки
Понятие, подходы и стратегии управления рисками. Факторы, определяющие риск
комплексность и системность при управлении АК
Применение принципов комплексности и системности на практике.
процессный подход в управлении СУПК
«Семейство» стандартов ИСО по системам управления. Понятие процессного подхода. История его использования и тенденции. Цикл PDCA
использование цикла PDCA в Стандарте
Соответствие разделов Стандарта циклу PDCA. Его структура и возможность интеграции с иными стандартами «семейства систем управления» ИСО
Часть 2. Разработка и внедрение Системы Управления Противодействием Коррупции
Определение контекста организации
Определение границ СУПК. Область действия, понимание потребностей заинтересованных сторон, оценка антикоррупционных рисков. Учет антикоррупционного законодательства РК.
Лидерство
Антикоррупционная политика. Организационная структура и распределение ролей СУПК.
Планирование и поддержка
Выбор стратегий и обработка антикоррупционных рисков. Выбор средств управления АК. Необходимые ресурсы, работа с персоналом, коммуникации.
Завершение внедрения СУПК
Документация СУПК. Критерии оценки средств управления АК.
Часть 3. Сопровождение и улучшение СУПК
Поддержание функционирования СУПК
Обострение проблем. Обработка событий и инцидентов СУПК (случаев взяточничества, создания условий для них). Финансовые и нефинансовые средства управления.
Оценка исполнения и улучшение СУПК
Аудит, анализ со стороны руководства. Мониторинг, измерения, анализ и оценивание. Формулирование несоответствий. Коррекция и корректирующие действия.
Сертификация СУПК
Выгоды сертификации, ее основные этапы и длительность. Участники процесса сертификации.
«Экзамен»
Оценка уровня усвоения слушателями материалов курса.
- ИБ06 — Система управления рисками (ISO 31000)
- Длительность: 5 дней (40 часов)
- Код курса: ИБ06
- Стоимость
- Очный формат: 437 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
Настоящий учебный курс имеет целью ознакомление слушателей с современным принятым в ИСО (Международная организация по сертификации) подходом к управлению рисками, раскрытие значения рисков для успешного функционирования инфраструктуры предприятия, пояснение основных этапов разработки и внедрения системы управления рисками, ознакомление с возможностями автоматизации процесса управления рисками.
Данный Курс разработан на основе международного стандарта ИСО 31000 «Управление рисками. Принципы и руководящие указания».
Аудитория
Курс предназначен для руководителей структурных подразделений организаций, руководителей и специалистов, отвечающих за обеспечение безопасности и/или техническую поддержку, сотрудников подразделений информационной безопасности и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка
Курс рассчитан на слушателей, имеющих практический опыт, например,
в вопросах поддержки и сопровождения комплексных инфраструктурных систем,
в отдельных специализированных областях обеспечения безопасности,
стратегического планирования,
руководства организациями и отдельными структурными подразделениями
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Результаты курса
По окончании настоящего курса слушатели смогут:
Ориентироваться:в вопросах идентификации, анализа рисков и оценивания рисков
в современных технологиях обработки рисками
в вопросах разработки своих методик для оценки рисков в различных областях
Выявлять актуальные угрозы, имеющиеся уязвимости и определять приоритетные направления деятельности по нейтрализации рисков у себя в компании
Обоснованно подходить к выбору необходимых средств нейтрализации рисков
Дополнительно
Каждый слушатель получает на руки презентации всех частей курса в печатном виде.В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
1. Введение в предмет «Управление рисками»
Понятия угрозы, уязвимости, объекта защиты и воздействия на бизнес, средств нейтрализации рисков, вероятности риска и сценария инцидента. Термины и определения.
·Значение рисков в современных комплексных системах корпоративного управления
Принцип комплексности и системности управления рисками в контексте корпоративного управления, его обоснование и отражение в ведущих международных стандартах ИСО семейства систем управления. Организационные, правовые и программно-технические механизмы нейтрализации рисков, их согласованное применение и критерии выбора.
2. Введение в процесс «Управления рисками»
Понятие рисков, остаточного и приемлемого рисков. Факторы, влияющие на изменение рисков. Основы управления рисками. Понятие количественной и качественной оценки рисков, существующие программные реализации различных методов оценки рисков.
Понятие процесса управления рисками. Основные его стадии
3. Идентификация рисков
Анализ и оценивание рисков. Идентификация и ранжирование активов, угроз, уязвимостей, возможного ущерба. Практическое вычисление уровня рисков.
4. Обработка рисков
Выбор стратегии обработки риска. Обоснование необходимых мер безопасности.
5. Обмен информацией о рисках
Процедуры по обмену информацией о рисках между должностными лицами и заинтересованными сторонами.
6. Мониторинг и переоценка рисков
Построение системы контроля рисков, влияющих на них факторов и критериев их оценки.
7. Поддержание и корректировка системы управления рисками
Разработка и внедрение цикла PDCA применительно к системе управления рисками с целью ее непрерывного совершенствования.
- ИБ07 — Система управления непрерывностью бизнеса (ISO 22301)
- Длительность: 5 дней (40 часов)
- Код курса: ИБ07
- Стоимость
- Очный формат: 437 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
Обеспечение бесперебойной работы – серьёзная проблема, требующая решения в каждой Компании, а управление непрерывностью бизнеса является ключевым элементом системы управления Компании, вне зависимости от её типа и масштаба, направления деятельности или отрасли экономики. Способность Компании поддерживать свои критичные операции в процессе и по завершении инцидента, также, как и скорость полного восстановления работоспособности, может стать основным фактором в решении задач целесообразности дальнейшего существования бизнеса Компании после инцидента любого масштаба.
Потребность в едином стандарте управления непрерывностью бизнеса (Business Continuity Management, BCM), основанном на передовом мировом опыте, стала причиной публикации BSI Стандарта BS 25999, определяющего высокоуровневую структуру управления непрерывностью бизнеса. В 2012 году Стандарт BS 25999 был признан международной организацией по стандартизации и приобрел статус ISO 22301.
Курс «Система управления непрерывностью бизнеса. ИСО 22301» (СУНБ) имеет целью ознакомление слушателей с современным подходом к обеспечению непрерывности бизнеса (НБ), раскрытие значения НБ для успешного осуществления деятельности предприятия, пояснение основных этапов разработки и внедрения системы управления НБ, ознакомление с моделью СУНБ, описанной в международном стандарте ИСО 22301.
Настоящий курс позволяет руководителям и специалистам, прошедшим обучение, обоснованно подойти к разработке, внедрению и поддержанию функционирования СУНБ у себя в Компании, а также (если потребуется) подготовиться к прохождению сертификации на соответствие требованиям международного стандарта ИСО 22301.
Аудитория
Курс предназначен для консультантов, руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка (желательно)
Любые курсы по стандартам из «семейства» систем управления: управление качеством (ИСО 9001), энергосбережением (ИСО 50000), информационной безопасностью (ИСО 27001), экологической безопасностью (ИСО 14001), ИТ-сервисами (ИСО 20000) и т.п.
Опыт работы на руководящих должностях.
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью входного и финального тестирования.
Результаты курса
По окончании настоящего курса слушатели смогут:
Сформировать план разработки и внедрения СУНБ у себя на предприятииОпределить механизмы и подходы к учету бизнес-потребностей организации в процессах обеспечения НБ
Оценивать риски НБ, создавать свои методики оценки рисков
Обоснованно подходить к выбору механизмов и средств поддержания требуемого уровня непрерывности бизнеса
Организовать работу внутренних аудиторов. Оценивать качество выполнения работ как внутренними, так и внешними аудиторами НБ.
Дополнительно
Каждый слушатель получает на руки презентации всего курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.
Программа курса
Модуль 1. Знакомство со стандартом ИСО 22301 (далее Стандарт)
Аспекты проблем непрерывности бизнеса
Основные задачи и принципы управления непрерывностью бизнеса. Преимущества для бизнеса от внедрения СУНБ. Основные препятствия и факторы успеха для СУНБ в РК.
Непрерывность бизнеса и стратегия развития Компании
Понятие анализа внутреннего и внешнего контекста Компании. Учет НБ в планах развития Компании. Основные роли и функции СУНБ.
Основные понятия и термины в области непрерывности бизнеса
Термины и определения Стандарта, его структура. Сопутствующие документы и стандарты. Механизм их взаимодействия и применения. Взаимосвязь с иными стандартами ИСО из «семейства» систем управления.
Жизненный цикл СУНБ
Модель PDCA в применении к НБ.
Инциденты, непрерывность бизнеса, восстановления
Соотношение понятий. Структура планов и механизмов функционирования.
Модуль 2. Разработка и внедрение системы управления непрерывностью бизнеса
Определение области действия и разработка политики СУНБ
Входные данные. Требования к области действия и политике НБ. Их место в структуре документации Компании в общем и документации НБ в частности.
Анализ Компании
Понимание потребностей Компании. Этапы процесса анализа.
Стратегия и планирование НБ
Входные данные, Построение процессов НБ.
Разработка планов
Планы управления инцидентами (IMP). Планы обеспечения НБ (BCP). Планы восстановления (DRP).
Обучение в области НБ для сотрудников Компании
Описание процесса. Подходы и методы.
Непрерывное улучшение и корректировка СУНБ
Входные данные. Инициация улучшения. Коррекция, корректирующие и превентивные действия.
Завершение внедрения СУНБ
Документация СУНБ. Записи СУНБ. Механизмы анализа и пересмотра СУНБ.
Модуль 3. Обеспечение и контроль функционирования СУНБ
Понятие контроля СУНБ
Необходимость контроля его виды, цели, задачи.
Подготовка к аудиту и его проведение.
Планирование аудита. Подготовка аудитора. Документы. Сбор свидетельств. Техника проведения аудита. Ведение записей. Формулирование несоответствий.
Завершение аудита
Общий отчет. Заключительное совещание.
Сертификация на соответствие требованиям Стандарта
Международная и национальная системы сертификации. Особенности и преимущества сертификации СУНБ. Основные этапы сертификационного процесса, его сроки и ориентировочная стоимость.
- ИБ08 — Управление инцидентами информационной безопасности (ISO 27035)
- Длительность: 3 дня (24 часа)
- Код курса: ИБ08
- Стоимость
- Очный формат: 324 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Продолжительность:
3 дн 24 ак.часа, при условии предварительного прохождения курса: Система управления информационной безопасностью (ISO 27001)
Без предварительной подготовки: 5 дн 40 ак. часовОписание курса:
Курс «Управление инцидентами информационной безопасности, ISO 27035, нацелен на ознакомление слушателей с основными подходами и фазами процесса управления инцидентами информационной безопасности (ИБ).
В настоящее время данный курс адаптирован к действующей международной версии стандарта: ISO 27035:2016.
Стандарт ISO 27035 является обобщением мирового опыта в организации управления инцидентами ИБ и содержит лучшие практики по следующим видам деятельности в отношении инцидентов ИБ: выявление, оповещение, оценка, реагирование, а также извлечение уроков.
Настоящий курс позволяет руководителям и специалистам, прошедшим обучение, разработать и внедрить процесс управления ИБ в рамках действующей (разрабатываемой) Системы Управления Информационной Безопасности, соответствующей международному стандарту ISO 27001.Аудитория:
Курс предназначен для руководителей проектов по внедрению СУИБ, руководителей структурных подразделений организаций, руководителей и специалистов ИТ-подразделений, отвечающих за обеспечение безопасности и/или техническую поддержку в области ИТ, сотрудников подразделений ИБ и служб охраны, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.
Предварительная подготовка (желательно):
Курсы «Основы по управлению информационной безопасностью.» и/или «Система управления информационной безопасностью (ISO 27001)».
Опыт работы в подразделениях информационных технологий и/или информационной безопасности приветствуется.Формат проведения:
Занятия проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 80% учебного времени.
Контроль усвоения слушателями материала курса проводится с помощью финального тестирования.По окончании настоящего курса слушатели будут уметь:
Формировать план разработки и внедрения процесса управления инцидентами ИБ у себя на предприятии
Адаптировать рекомендации Стандарта к своей организации в зависимости от ее типа, размера и видов деятельности
Интегрировать процесс управления инцидентами ИБ с процессами оценки рисков и контроля ИБ
Оценить степень зрелости существующего в организации процесса управления инцидентами ИБ
Выполнить вышеприведенные работы для предприятий-заказчиков в рамках аутсорсинговых сервисовДополнительно:
Каждый слушатель получает на руки презентацию курса в распечатанном виде.
В случае успешного завершения обучения слушателям выдаются сертификаты.Программа курса:
Часть 1. Введение в управление информационной безопасностью.
Информация, информационная безопасность и защита информации
Определение ИБ, виды информации, соотношение понятий ИБ и ЗИ
Объекты защиты и угрозыВиды классификаций активов, угроз, уязвимостей
Основные термины и определения ИБ
Риски ИБ и стратегии их обработки
Понятие, подходы и стратегии управления рисками. Факторы, определяющие риск
Комплексность и системность при управлении ИБ
Применение принципов комплексности и системности на практике.
Процессный подход в управлении ИБ
«СемействоЭ стандартов ISO по системам управления. Понятие процессного подхода.История его использования и тенденции.
Назначение стандартов ISO 27001 и ISO 27002
Механизм взаимодействия и применения стандартов. Их структура. Термины и определения.Часть 2. Структурированный подход к реализации процесса управления инцидентами информационной безопасности.
Основные концепции и принципы процесса
Цели процесса
Определение границ. Концепция и политика, методы их формирования.
Структурирование процесса и его преимущества
Классификация и категорирование инцидентов ИБ. Жизненный цикл PDCA в отношении процесса. Основные операции, их последовательность. Критерии и оценка их исполнения.
Интеграция с процессами оценки рисков и контроля ИБ
Критерии оценки процессов и их операций. Совместное планирование процессов. Синергетический эффект интеграции и его оценка.Часть 3. Реализация процесса управления инцидентами информационной безопасности.
Документация процесса
Структура документации. Обязательные документы, их назначение.
Поэтапная реализация процесса
Этапы разработки и планирования, выявления и оповещения, оценки и принятия решений, реагирования, извлечения уроков.
Управление инцидентами и процессы расследование
Записи, их формирование и защита. Законодательная база, национальная и международная.
Управление инцидентами и анализ воздействия на бизнес
Учет результатов процесса управления инцидентами в процессе анализа воздействия на бизнес (BIA) организации. Варианты представления результатов инцидентов для высшего руководства организации
«Экзамен» — обсуждение результатов обучения и оценка уровня усвоения слушателями материалов курса. - ИБ09 — Анализ корневых причин
- Длительность: 2 дня (16 часов)
- Код курса: ИБ09
- Стоимость
- Очный формат: 250 000 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Описание курса:
Курс «Анализ корневых причин» имеет целью ознакомление слушателей с основными подходами к установлению и выбору корневых причин существующих проблем.
Настоящий курс разработан в рамках программ специализированного продолженного обучения в таких областях, как управление рисками, расследование инцидентов, проведение аудита, целеполагание и пр.
Курс применим к специалистам любого профиля, независимо от сферы их деятельности: безопасность (любая), корпоративное управление, охрана труда, управление качеством, расследование, планирование и пр.
В рамках курса разбирается ряд рабочих методик, на практику отводится до 90% учебного времени. В связи с этим обучение проводится только в очной аудиторной форме.Результаты курса
Настоящий курс позволяет слушателям, прошедшим обучение:
принципиально повысить уровень аналитической обработки информации в своей области;
упростить процессы идентификации проблем и путей их решения;
существенно снизить затраты на устранение проблем и их причин;
повысить уверенность в том, что снятые проблемы не проявятся повторно в будущем;
обосновать свои решения и предложения перед вышестоящим руководством;
обучить освоенным техникам своих подчиненных и коллег.Аудитория курса:
Курс предназначен в первую очередь для руководителей любого уровня, а также специалистов в области аналитики, рисков, аудита и/или инцидентов.
Предварительные требования к аудитории:
Практические навыки в какой-либо из следующих областей:
управление подразделением/компанией,
проведение анализа данных,
управление рисками,
обработка инцидентов,
проведение и/или сопровождение аудитаФорма проведения
Занятия курса проводятся в форме семинаров. Краткие теоретические блоки используются только как вступительная часть перед практической отработкой. Практика курса построена на групповой работе с последующим общим разбором и нарастанием сложности заданий.
Дополнительно
Каждый слушатель получает на руки презентацию всего курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.Содержание курса:
Оценка входного уровня слушателей
1. Введение в аналитическую обработку информации
Что такое аналитика и ее значимость в современном корпоративном управлении
Корпоративное управление и процессный подход
Основные этапы процессов аудита, управления рисками, инцидентами
Основные виды аналитической обработки информации2. Причинно-следственная методика
Ознакомление с методикой
Практическая отработка методики3. Структурно-причинная методика
Ознакомление с методикой
Практическая отработка методики4. Комплексная методика
Ознакомление с методикой
Практическая отработка методики
Подведение итогов
Оценка выходного уровня слушателей - ИБ10 — Система управления сервисами. ISO/IEC 20000
- Длительность: 5 дней (40 часов)
- Код курса: ИБ10
- Стоимость
- Очный формат: 437 500 ₸
- Онлайн формат: Не проводится (только очный формат)
Описание курса
Обучение проходит только в очном формате,
так как в курсе много практических заданий
на общее взаимодействие между слушателями в группе.Аннотация
Курс «Система управления сервисами. ISO/IEC 20000» имеет целью ознакомление слушателей с современным подходом к управлению предоставляемыми или закупаемыми сервисами, раскрытие значимости управления сервисами, подходами к обоснованию инициатив в этой области, пояснение основных этапов разработки и внедрения системы управления сервисами.
В настоящее время курс адаптирован к действующей версии международного стандарта ISO/IEC 20000-1:2018. Данный стандарт призван помочь организации в создании и эффективном использовании Системы Управления Сервисами (СУС), для чего в нем определяются требования к ее внедрению, поддержанию, оцениванию и улучшению. При этом оцениваются возможности организации по удовлетворению потребностей пользователей (как внутренних, так и внешних) с учетом особенностей бизнеса.
Данный стандарт входит в т.н. «семейство» стандартов ИСО в отношении систем управления. Он способствует внедрению процессного подхода и стратегии жизненного цикла услуг в организации с целью обеспечения актуальности и повышения ценности предоставляемых или потребляемых сервисов.
Изначально стандарт ISO/IEC 20000 был разработан для управления ИТ-услугами. Однако заложенные в нем системные принципы и требования, как оказалось, также могут эффективно использоваться для управления любыми иными (внутренними или внешними) сервисами организации: транспорт, консалтинг, сопровождение, разработка, экспертиза, обучение и пр.Аудитория
Курс ориентирован на сотрудников, ответственных за разработку и внедрение СУС как в компании в целом, так и непосредственно в своих бизнес-процессах.
Также курс будет полезен для руководителей и сотрудников подразделений организаций, занятых в области ИТ, информационной безопасности, поддержания и обеспечения качества предоставляемых сервисов, представителей аналитических служб, риск-менеджеров и сотрудников служб внутреннего аудита.Предварительная подготовка
Курс рассчитан на персонал любого уровня, которому необходимо знакомство с стандартом ISO/IEC 20000 и процессом аудита в соответствии с ним.
Форма проведения
Занятия курса проводятся в форме лекций-семинаров. При разборе практических примеров используются приемы тренинга. Для практических занятий отводится 50% учебного времени.
Результаты курса
По окончании настоящего курса слушатели смогут:
Сформировать план разработки и внедрения СУC у себя в организации
Определить механизмы и подходы к управлению актуальных для сервисов рисков
Обоснованно подходить к выбору механизмов контроля требуемого уровня сервисов
Интегрировать СУС с иными системами управления у себя в компании (СМК, СУИБ, СУНБ и пр.)
Оценить качество выполнения работ внутренними и внешними аудиторами СУС.Дополнительно
Каждый слушатель получает на руки презентации всех частей курса в печатном виде.
В случае успешного завершения обучения слушателям выдаются фирменные сертификаты.Программа курса
Модуль «Внедрение СУС»
Введение в предмет «Управление сервисами»
Процессный подход в управлении сервисами
Разработка плана внедрения СУС
Управление рисками и возможностями в рамках СУС
Структура документация СУСМодуль «Функционирование СУС»
Планирование сервисов, управление активами, конфигурацией
Управление бизнес-отношениями, уровнем обслуживания, поставщиками
Бюджетирование и учет, управление спросом, мощностями,
Проектирование, выпуск и развертывание, управление изменениями
Управление инцидентами, запросами, проблемами
Управление доступностью, непрерывностью, информационной безопасностьюМодуль «Оценивание и улучшение СУС»
Внутренний аудит СУС: подход, планирование, проведение, оценка результатов, документация
Анализ СУС со стороны руководства
Обработка несоответствий и проблем, коррекция и корректирующие действия, возможности для улучшенияМодуль «Что дальше?»
Интеграция СУС с иными «родственными» системами управления
Сертификация СУС и персонала
Экзамен
Информационная безопасность
- CYAA — Базовый курс по информационной безопасности “Cybersecurity Awareness”
- Длительность: 3 дня (24 часа)
- Код курса: CYAA
- Стоимость
- Очный формат: Только в корпоративном формате, цена по запросу
- Онлайн формат: 218 000 ₸
Описание курса
Описание курса:
Материал данного курса состоит из множества модулей, которые позволят слушателям познакомиться с актуальными проблемами кибербезопасности и научиться противостоять угрозам кибератак и мошенников, а также контролировать персональную информацию, которую они «выкладывают» в сеть.
Аудитория курса:
Сотрудники компаний любой квалификации.
Содержание курса:
Направление 1 – Что такое кибербезопасность.
Кибератаки и хакеры.
Кто такие хакеры.
Источники киберугроз.
Опасности социальной инженерии.Методы защиты от кибератак.
Ваша роль в обеспечении кибербезопасности.
Средства защиты от киберугроз на персональных устройствах.
Средства защиты от киберугроз на корпоративных устройствах.Направление 2 – Защита персональных устройств.
Обновления.
Зачем нужны обновления.
Могут ли обновления нести угрозу.
Как правильно обновляться.Антивирус.
Что такое антивирус и зачем он нужен.
Лучше ли один антивирус другого.
Как использовать антивирус.USB-флешки.
Какие угрозы несут USB-флешки.
Как правильно пользоваться USB-флешками.
Как проверять файлы на USB-флешках.Резервные копии.
Зачем нужны резервные копии.
Как создавать резервные копии.Мобильные устройства.
Какие угрозы несут мобильные устройства.
Клоны SIM-карт и защита от них.Данные на персональных устройствах.
Использование VPN.
Защита персональных устройств в поездках.Направление 3 – Безопасность в Интернете.
Защита E-mail.
Что такое спам.
Как сообщить о спаме.
Что такое фишинг.
Как сообщить о фишинге через Outlook.
Как сообщить о фишинге через Google Chrome.
Переписка с руководством компании.
Что делать с вложениями в электронные письма.Безопасность браузера.
Как безопасно искать информацию в интернете.
Скачивание файлов из интернета.
Ссылки в интернете.Безопасность мессенджеров.
Безопасность переписки в мессенджерах.
Как безопасно отправить свои и чужие контакты.
Безопасный обмен файлами в мессенджерах.Информация в интернете.
Как распознать Deep Fake’и, созданные ИИ.
Как проверять информацию в интернете.Направление 4 – Защита частной информации.
Защита информации в социальных сетях.
Как информация о вас может быть использована против вас.
«Романтические» знакомства через соц. сети.Защита от мошенников.
Как распознать мошенника при звонке или смс.
Что такое программы-вымогатели.
Как защититься от программ-вымогателей.Использование паролей.
Как правильно создавать пароли.
Как правильно использовать пароли.Безопасность банковских операций.
Как безопасно использовать банковские карты.
Как безопасно пользоваться платёжными системами.Направление 5 – Безопасность Wi-Fi.
Настройки Wi-Fi сети.
Как настроить безопасный доступ к Wi-Fi.Wi-Fi оборудование.
Можно ли пользоваться открытым Wi-Fi.Направление 6 – Корпоративная безопасность.
Организация безопасной работы.
Безопасность при удаленной работе.
Как пользоваться персональными устройствами на работе.
Кибербезопасность SCADA.Безопасное использование инструментов ИИ.
Проблемы кибербезопасности при использовании ИИ и МО.
Безопасность при подготовке данных для инструментов ИИ и МО.
Защита данных от изменений злоумышленниками.
Безопасность при объединении нескольких инструментов ИИ и МО.
Защита интеллектуальной собственности от кражи при её использовании ИИ и МО.
Проблемы приватности при использовании ИИ и МО.
Соблюдение принципов приватности при использовании ИИ и МО.
Проблемы этичности при использовании ИИ.Политики безопасности в компании.
Что такое политики безопасности.
Как применять политики безопасности при работе.
Как взаимодействовать со службой безопасности.Инциденты кибербезопасности.
Признаки кибератаки.
Как сообщить о подозрительной активности.
Что делать при, если вы стали жертвой кебератаки.Внутренняя безопасность.
Ситуация конфликта интересов.
Утечка корпоративных данных.
Интеллектуальная собственность.
Как правильно уничтожить данные.
Инсайдерские угрозы.
Взятки и коррупция.Направление 7 – Кибербезопасность для топ-менеджмента.
Сколько стоит кибербезопасность.
Что такое риски кибербезопасности и сколько они «стоят».
Как оценивать продукты и услуги кибербезопасности.
Как принимать решения на основании данных кибербезопасности.
Насколько эффективна ваша кибербезопасность.Роль топ-менеджмента в обеспечении кибербезопасности.
Угрозы, направленные на руководство компании.
Проблемы социальной инженирии в руководстве компании.
Поддержка и развитие инициатив кибербезопасности. Требования регуляторов.
Какие регуляторы действуют на территории РК и РФ.
Требования регуляторов и издержки по их обеспечению. - CISSP — Certified Information Systems Security Professional Base
- Длительность: 5 дней (40 часов)
- Код курса: CISSP
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Описание курса:
Данный курс предназначен для специалистов в области информационной безопасности, и помогает основательно проверить теоретические знания по информационной безопасности, а также дает хорошую базу для развития профессиональных навыков в будущем. Также курс помогает подготовиться к сдаче экзамена на получение престижной вендор-независимой сертификации в области информационной безопасности CISSP (Certified Information Systems Security Professional), учитывая, что контент данного курса покрывает все 8 доменов CISSP CBK.
Программа курса:
1. Безопасность и управление рисками
1.1. Концепция конфиденциальности, целостности и доступности
1.2. Принципы управления безопасностью
1.3. Соответствие требованиям
1.4. Нормативные вопросы
1.5. Профессиональная этика
1.6. Политики безопасности, стандарты и процедуры2. Безопасность активов (защита безопасности активов)
2.1. Классификация информации и активов
2.2. Владение
2.3. Защита конфиденциальности
2.4. Элементы управления безопасностью данных
2.5. Требования к обработке3. Инжиниринг безопасности
3.1. Процессы инжиниринга и проектирование защищенной инфраструктуры
3.2. Концептуальные концепции безопасности
3.3. Модели оценки безопасности
3.4. Возможности безопасности информационных систем
3.5. Архитектуры безопасности, проектирование и уязвимости элементов решений
3.6. Уязвимости веб-систем
3.7. Уязвимости мобильных систем
3.8. Встраиваемые устройства и уязвимости в кибер-физических системах
3.9. Криптография
3.10. Принципы проектирования безопасности объектов
3.11. Физическая охрана4. Сетевая и телекоммуникационная безопасность
4.1. Проектирование защищенной сетевой архитектуры
4.2. Компоненты сетевой безопасности
4.3. Защита каналов связи
4.4. Сетевые атаки5. Управление доступом
5.1. Управление физическими и логическими ресурсами
5.2. Идентификация и аутентификация людей и устройств
5.3. Идентификация как сервис
5.4. Сторонние службы идентификации
5.5. Атаки на управление доступом
5.6. Жизненный цикл управления доступом6. Оценка и тестирование безопасности
6.1. Стратегии оценки и тестирования
6.2. Данные процесса безопасности
6.3. Тестирование контроля безопасности
6.4. Обработка данных тестирования
6.5. Уязвимости архитектуры безопасности7. Операционное управление безопасностью
7.1. Поддержка расследований и требования
7.2. Деятельность по ведению журнала и мониторингу
7.3. Выделение ресурсов
7.4. Основные концепции операционной безопасности
7.5. Методы защиты ресурсов
7.6. Управление инцидентами
7.7. Превентивные меры
7.8. Управление патчами и уязвимостями
7.9. Процессы управления изменениями
7.10. Стратегии восстановления
7.11. Процессы и планирование аварийного восстановления
7.12. Планирование непрерывности бизнеса
7.13. Физическая безопасность
7.14. Безопасность персонала8. Безопасность разработки программного обеспечения
8.1. Безопасность в жизненном цикле разработки программного обеспечения
8.2. Средства контроля безопасности среды разработки
8.3. Эффективность обеспечения безопасности программного обеспечения
8.4. Влияние безопасности на процессы разработки программного обеспечения - CEH — Этичный хакинг: тестирование на проникновение (v.13)
- Длительность: 5 дней (40 часов)
- Код курса: CEH
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Цель курса
Дать слушателям знания и навыки для формирования системного подхода к обеспечению компьютерной безопасности, научить методам проверки безопасности различных узлов компьютерной сети и познакомить слушателей с инструментарием злоумышленников, с их преимуществами и ограничениями.
Аудитория
Этот курс предоставляет развернутые знания по обеспечению компьютерной безопасности современных систем и будет важен администраторам безопасности в качестве справочника по различным методам и средствам взлома компьютерных сетей и систем. Также курс полезен сотрудникам службы безопасности для повышения эффективности работы с учетом новых уловок злоумышленников, и бесспорно данный курс будет интересен руководителям отделов ИТ для формирования реалистичной оценки современной ситуации в сфере обеспечения компьютерной безопасности. Кроме того, курс полезен специалистам в сфере безопасности в качестве подготовки к получению международной сертификации.
По окончании курса слушатели смогут:
Понимать взаимосвязь компонентов безопасности сети, сферу ответственности и влияния каждого из узлов;
Знать и управлять уязвимыми местами сети;
Самостоятельно обнаруживать уязвимости;
Работать с инструментами взлома сетей и систем;
Знать хакерские уловки для проникновения в системы и сети;
Проводить тестирование любых компонентов сети на предмет взлома;
Классифицировать рабочие станции по степени риска проведения атаки;
Понимать ход мыслей злоумышленника;
Оценить масштаб потенциально возможных атак;
Противодействовать несанкционированному сбору информации о сети организации;
Понимать стратегию злоумышленника;
Оценивать защищенность платформ виртуализации и облачных вычислений;
Определять атаку на основе социальной инженерии;
Изучить методы взлома беспроводной сети;
Определить наиболее уязвимые места мобильных платформ;
Противодействовать криптографическим атакам;
Понимать процесс вторжения в систему;
Проводить аудит систем безопасности;
Противодействовать вторжению.Сертификационные экзамены
Курс помогает подготовиться к следующим сертификационным экзаменам:
312-50: Certified Ethical HackerНеобходимая подготовка
Для эффективного обучения на курсе слушатели должны обладать следующими знаниями и навыками:
Опыт работы с клиентским и серверными ОС;
Понимание работы сети и сетевых устройств;
Понимание базовых концепций безопасности.Материалы слушателя
Слушателям предоставляется фирменное учебное пособие и руководство по проведению лабораторных работ (в электронном виде), а также прочие материалы и программное обеспечение, необходимые для выполнения этих работ.
Содержание курса
Модуль 1: Введение в этичный хакинг
Обзор концепций информационной безопасности
Угрозы информационной безопасности и векторы атак
Концепции хакинга
Этапы хакинга
Типы атак
Управление обеспечением информационной безопасности (ИБ) предприятия
Модель угроз ИБ
Политики, процедуры и процессы обеспечения ИБ
Методы оценки защищенности — аудит, анализ уязвимостей и тестирование на проникновение
Планирование и проведение тестирования на проникновение
Законодательство и стандарты в области ИБ
Лабораторная работа:
Подготовка тестовой среды;Модуль 2: Предварительный сбор информации о цели
Концепции изучения целевой системы
Угрозы утечки информации об информационной системе организации
Методологии сбора информации из открытых источников
Средства сбора информации
Меры противодействия утечкам информации
Тестирование на предмет получения информации об информационной системе организации
Лабораторная работа:
Сбор информации об Интернет-ресурсах исследуемой организации;
Получение данных об инфраструктуре сети и используемых технологиях;
Анализ публичных сайтов организации;Модуль 3: Сканирование сети
Обзор возможностей сканирования сети
Методология сканирования
Техники обнаружения открытых портов
Техника скрытого сканирования
Техники уклонения от систем обнаружения вторжений
Анализ баннеров
Сканирование уязвимостей
Построение диаграмм топологии сети
Подготовка прокси
Техники туннелирования
Анонимайзеры
Спуфинг IP адреса и меры противодействия
Сканирование сети как этап тестирования на проникновение
Лабораторная работа:
Мониторинг TCP/IP соединения;
Сканирование портов;
Построение топологии сети;Модуль 4: Инвентаризация ресурсов
Концепции инвентаризации
Инвентаризация NetBIOS
Инвентаризация SNMP
Инвентаризация LDAP
Инвентаризация NTP
Инвентаризация SMTP
Инвентаризация DNS
Меры противодействия инвентаризации
Инвентаризации ресурсов как этап тестирования на проникновение
Лабораторная работа:
Инвентаризация целевой сети;
Получение доступа на основе стандартных паролей;Модуль 5: Хакинг системы
Цели взлома системы
Методология взлома системы
Последовательность хакинга системы
Взлом паролей
Повышение привилегий
Выполнение приложений
Сокрытие файлов
Сокрытие следов
Тестирование на предмет взлома системы
Лабораторная работа:
Взлом базы паролей и получение прав администратора;
Сокрытие информации в NTFS;
Использование стеганографии;Модуль 6: Вредоносный код
Классификация вредоносного ПО — трояны, вирусы и черви
Пути проникновения вредоносного ПО
Методы и средства анализа вредоносного ПО
Методы обнаружения вредоносного ПО
Меры противодействия и средства защиты
Тестирование на предмет запуска вредоносных программ
Лабораторная работа:
Создание трояна;
Создание червя;
Выявление и деактивация трояна;Модуль 7: Снифферы
Концепции сниффинга
MAC атаки
DHCP атаки
ARP атаки
Спуфинг адресов
Отравление кэша DNS
Инструменты сниффинга
Меры противодействия сниффингу
Лабораторная работа:;
Подмена MAC-адресов;
MITM-атака через отравление таблиц ARP;
Использование анализаторов трафика;Модуль 8: Социальная инженерия
Концепции социальной инженерии
Методы и техники социальной инженерии
Подмена личности в социальных сетях
Кража персональных данных
Меры противодействия социальной инженерии
Тестирование на предмет противодействия социальной инженерии
Лабораторная работа:
Фишинговые технологии;Модуль 9: Отказ в обслуживании
Концепции атак на доступность системы (отказ в обслуживании, Denial-of-Service)
Распределенный отказ в обслуживании (DDoS атака)
Методы и средства организации DoS/DDoS атак
Бот-сети
Изучение примера реализация DDoS атаки
Инструменты проведения DoS атак
Меры противодействия DoS атакам
Инструменты защиты от DoS
Тестирование на предмет устойчивости к DoS атакам
Лабораторная работа:
Проведение простейших DoS атак — SYN- и HTTP-flood, slowloris;
Обнаружение DoS путем анализа трафика;Модуль 10: Перехват сесии
Концепции перехвата сессии
Типы и методы перехвата сессий
Перехват на прикладном уровне
Перехват на сетевом уровне
Инструменты для перехвата сессий
Меры противодействия перехвату сессий
Оценка возможности перехвата сессии ка этап тестирования на проникновение
Лабораторная работа:
Перехват сессии на уровне приложения;Модуль 11: Хакинг веб-серверов
Концепции веб-серверов
Типы атак на веб-серверы
Методология атак
Инструменты взлома веб-серверов
Меры противодействия взлому веб-серверов
Управление исправлениями
Повышение безопасности веб-серверов
Управление патчами
Тестирование на предмет взлома веб-сервера
Лабораторная работа:
Изучение веб-сервера;
Взлом веб-сервера;
Использование уязвимости браузера;Модуль 12: Хакинг веб-приложений
Концепции веб-приложений
Угрозы веб-приложениям
Методология атаки на веб-приложения
Инструменты взлома веб-приложений
Меры противодействия взлому веб-приложений
Инструменты защиты веб-приложений
Тестирование на предмет взлома веб-сервера
Лабораторная работа:
Взлом веб-приложений;
Тестирование веб-приложений на предмет взлома;Модуль 13: SQL инъекции
Концепции SQL инъекции
Тестирование на SQL возможность инъекции
Типы SQL инъекций
Слепая SQL инъекция
Методология SQL инъекции
Примеры применения SQL инъекции
Средства для выполнения SQL инъекции
Сокрытие SQL инъекции от IDS
Меры противодействия SQL инъекции
Лабораторная работа:
SQL инъекция;
Тестирование с использованием SQL инъекции;Модуль 14: Хакинг беспроводных сетей
Концепции построения беспроводных сетей
Шифрование в беспроводных сетях
Угрозы беспроводным сетям
Методология взлома беспроводных сетей
Основные этапы атаки на беспроводную сеть
Получение несанкционированногог доступа к беспроводной сети
Инструменты хакинга беспроводных сетей
Взлом Bluetooth
Меры противодействия атакам на беспроводные сети
Инструменты защиты беспроводных сетей
Тестирование беспроводной сети на проникновение
Лабораторная работа:
Обнаружение беспроводных устройств;
Взлом беспроводной сети;Модуль 15: Хакинг мобильных платформ
Векторы атаки на мобильные платформы
Взлом Android OS
Техники и инструменты получения прав администратора Android
Взлом iOS
Техники и инструменты джейлбрейка
Взлом Windows Phone OS
Уязвимости Windows Phone 8
Взлом BlackBerry
Атаки на телефоны BlackBerry
Управление мобильными устройствами и современные MDM-решения
Инструменты и рекомендации по защите мобильных устройств
Тестирование на проникновение в мобильные платформы
Лабораторная работа:
Взлом мобильной ОС Android с помощью Metasploit Framework;
Средства защиты ОС Android;Модуль 16: Обход систем обнаружения вторжений, брандмауэры и Honey Pot
Концепции IDS, брандмауэра и Honey Pot
Системы IDS, брандмауэра и Honey Pot
Уклонение от IDS
Обход брандмауэра
Обнаружение Honey Pot
Инструменты обхода брандмауэра
Противодействие обходу систем обнаружения
Тестирование системы на предмет обхода системы обнаружения вторжений и брандмауэра
Лабораторная работа:
Конфигурирование IDS;
Обход брандмауэра;Модуль 17: Облачные вычисления
Концепции облачных вычислений
Основные угрозы ИБ при использовании облачных вычислений
Атаки на среду виртуализации и облачные платформы
Обеспечение безопасности вычислительных облаков
Методы и средства защиты облачной инфраструктуры
Тестирование облачных приложений на проникновение
Лабораторная работа:
Исследование работы платформ wamp и ownCloud;
Атака на облачную среду с использованием уязвимости в Java;
Автоматизированный анализ уязвимостей облачной среды;Модуль 18: Криптография
Концепции криптографии
Алгоритмы шифрования
Криптографические средства
Инфраструктура публичных ключей
Шифрование почты
Шифрование диска
Криптографические атаки
Средства крипто анализа
Лабораторная работа:
Работа со средствами криптографии; - CHFI — Расследование инцидентов компьютерной безопасности (v.9)
- Длительность: 5 дней (40 часов)
- Код курса: CHFI
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Цель курса
Дать слушателям знания и навыки работы с ключевыми методиками обнаружения компьютерных преступлений как в локальной сети, так и при взаимодействии в сети Интернет с мобильными клиентами и облачными сервисами. Также в курсе широко представлены программные продукты по сбору и восстановлению информации, свидетельствующей о вторжении в систему.
Аудитория
Этот курс предоставляет развернутые знания по анализу безопасности современных компьютерных сетей и будет полезен всем заинтересованным ИТ-специалистам, в том числе сетевым и системным администраторам и ИТ-руководителям. Курс будет интересен сотрудникам службы информационной безопасности, сотрудникам правоохранительных органов и военным представителям, связанным с расследованием вторжений в компьютерные сети. Кроме того, курс полезен специалистам в сфере безопасности в качестве подготовки к получению международной сертификации.
По окончании курса слушатели смогут:
Самостоятельно обнаруживать вторжения в ОС, веб-приложения, мобильные устройства и облачные сервисы;
Использовать проверенные методы обнаружения вторжений;
Собирать доказательную базу для подтверждения вторжения;
Использовать специализированные инструменты для анализа вторжений;
Анализировать потоки текстового, графического или медиа трафика на предмет наличия закладок;
Проводить анализ систем хранения для обнаружения следов вторжения;
Восстанавливать и анализировать состояние постоянной(энергонезависимой) и оперативной(энергозависимой) памяти из ОС Windows, Mac и Linux;
Восстанавливать удалённые файлы и разделы в Windows, Mac и Linux;
Анализировать состояние систем на предмет атак инсайдеров;
Применять технику обратного инжиниринга для анализа атакующего кода;
Обнаруживать взлом (или попытку взлома) запароленных файлов;
Извлекать и анализировать журналы прокси-серверов, брандмауэров, систем обнаружения/предотвращения вторжений, рабочих станций, серверов, коммутаторов, маршрутизаторов, контроллеров домена, DNS и DHCP серверов, систем управления доступом и других устройств;
Выполнять необходимые мероприятия для передачи доказательств в правоохранительные органы.Сертификационные экзамены
Курс помогает подготовиться к следующим сертификационным экзаменам:
312-49: Computer Hacking Forensic InvestigatorНеобходимая подготовка
Для эффективного обучения на курсе слушатели должны обладать следующими знаниями и навыками:
Опыт работы с клиентским и серверными ОС;
Понимание работы сети и сетевых устройств;
Понимание базовых концепций безопасности;
Курсы CEH и CND или эквивалентные знания и навыки.
Материалы слушателя
Слушателям предоставляется фирменное учебное пособие и руководство по проведению лабораторных работ (в электронном виде) а также прочие материалы и программное обеспечение, необходимые для выполнения этих работ.Модуль 1: Расследование инцидентов ИБ в современном мире
Определение компьютерных угроз
Классификация кибер-атак
Вызовы для исследователей кибер-преступлений
Типы кибер-атак и основные правила расследования
Правила сбора доказательств и основные типы цифровых улик
Оценка готовности к рассмотрению инцидента и план действий
Сфера деятельности исследователей инцидентов компьютерной безопасности и сфера ответственности
Обзор юридических, этических и конфиденциальных вопросов при расследовании инцидентаМодуль 2: Процесс расследования инцидента ИБ
Процесс расследования инцидента ИБ
Этапы процесса расследования инцидента ИБ
Требования к лабораторной среде и команде исследователей инцидента
Программное обеспечение для исследования
Задачи первых исследователей инцидента ИБ
Поиск улик и сбор доказательств
Размещение и хранение доказательств
Дедупликация данных, восстановление удалённых данных и проверка доказательств
Написание отчёта
Лабораторная работа:
Восстановление данных с помощью EasyUS Data Recovery Wizard;
Использование HashCalc для вычисления хэша, контрольной суммы или HMAC;
Использование MD5 Calculator;
Просмотр файлов различных форматов через File Viewer;
Обнаружение следов работы с данными с помощью P2 Commander;
Создание образа раздела с помощью R-Drive Image.Модуль 3: Сбор доказательств с дисков и файловых систем
Классификация средств обеспечения безопасности компьютерных сетей
Методы и средства контроля доступа
Методы и средства аутентификации, авторизации и аудита доступа
Краткий обзор основных методов криптографической защиты информации
Основные классы технических и программных средств защиты компьютерных сетей и принципы их работы
Сетевые протоколы, предназначенные для обеспечения безопасности, и принципы их работы
Лабораторная работа:
Обнаружение удалённых файлов с помощью WinHex;
Анализ файловых систем с помощью The Sleuth Kit;
Анализ Raw-изображений с помощью Autopsy.Модуль 4: Расследование инцидентов, связанных с операционной системой
Способы получения данных
Получение текущих данных
Поучение статических данных
Дупликация данных
Блокировка изменения устройств
Методы и средства получения данных
Получение данных в Windows и Linux
Лабораторная работа:
Исследование NTFS раздела с помощью DiskExplorer for NTFS;
Просмотр графического контента с помощью FTK Imager Tool.Модуль 5: Противодействие методам сокрытия доказательств
Противодействие методам сокрытия доказательств и цели противодействия
Обзор техник противодействия методам сокрытия доказательств
Извлечение доказательств с удалённых файлов и разделов, файлы с парольной защитой и стеганография
Запутывание кода, зачистка артефактов, перезапись данных/метаданных и шифрование
Методы обнаружения протоколов шифрования, упаковщиков программ и руткитов
Контр-меры по противодействию методов сокрытия улик
Лабораторная работа:
Взлом паролей приложений;
Обнаружение стеганографии.Модуль 6: Методы сбора и копирования данных
Проверка изменяющихся и неизменяющихся данных Windows
Анализ памяти и реестра Windows
Проверка кэша, куки-файлов и истории браузера
Проверка файлов и метаданных Windows
Анализ текстовых журналов и журналов событий Windows
Команды и файлы журналов Linux
Проверка журналов Mac
Лабораторная работа:
Обнаружение и извлечение скрытых на компьютере материалов с помощью OSForensics;
Получение информации о процессе загрузки с помощью ProcessExplorer;
Просмотр, мониторинг и анализ событий с помощью Event Log Explorer;
Исследование компьютера на предмет проникновения с помощью Helix;
Получение изменяющихся (оперативных) данных в Linux;
Анализ неизменяющихся (статичных) данных в Linux.Модуль 7: Расследование инцидентов, связанных с сетевыми технологиями
Сетевые вторжения
Основные концепции журналирования
Обзор способов сопоставления событий
Проверка маршрутизаторов, брандмауэров, IDS, DHCP и журналов ODBC
Проверка сетевого трафика
Сбор доказательств по проникновению в сеть
Реконструкция вторжения
Лабораторная работа:;
Перехват и анализ событий с помощью GFI EventsManager;
Расследование инцидента и сбор данных с помощью XpoLog Center Suite;
Расследование сетевых атак с помощью Kiwi Log Viewer;
Отслеживание сетевого трафика с помощью Wireshark.Модуль 8: Расследование атак на веб-приложения
Угрозы для веб-приложений
Архитектура веб-приложений
Веб-атаки и шаги их осуществления
Веб-атаки на сервера Windows
Архитектура сервера IIS и работа с его журналом
Архитектура веб-сервера Apache и работа с его журналом
Способы атак на веб-приложения
Лабораторная работа:
Анализ сети домена и запросов IP-адресов с помощью SmartWhois.Модуль 9: Расследование инцидентов, связанных с СУБД
Угрозы базам данных
Угрозы MSSQL
Признаки вторжения в базе данных
Сбор доказательств вторжения с помощью SQL Server Management Studio и Apex SQL DBA
Угрозы MySQL
Архитектура MySQL и определение структуры директорий данных
Утилиты для анализа и сбора доказательств проникновения в MySQL
Угрозы MySQL для баз веб-приложений на WordPress
Лабораторная работа:
Извлечение базы данных с Android-устройств с помощью Andriller;
Анализ базы SQLiteс помощью DB Browser for SQLite;
Изучение базы данных на MySQL.Модуль 10: Расследование инцидентов, связанных с облачными приложениями
Описание принципов облачных вычислений
Атаки на облако
Способы защиты облаков
Заинтересованные лица защите облаков
Облачные сервисы DropBox и GoogleDrive
Лабораторная работа:
Обнаружение уязвимостей в DropBox;
Исследование Google Drive.Модуль 11: Расследование инцидентов, связанных с вредоносным кодом
Способы проникновения вредоносного ПО в ОС
Базовые компоненты и распространение вредоносного ПО
Концепции защиты от вредоносного ПО
Обнаружение и извлечение вредоносного ПО из систем
Анализ вредоносного ПО – правила анализа и тестовая среда
Статический и динамический анализ вредоносного ПО
Лабораторная работа:
Статический анализ подозрительных файлов;
Динамический анализ вредоносного кода;
Анализ заражённых PDF-файлов;
Сканирование PDF-файлов с помощью веб-ресурсов;
Сканирование подозрительных файлов MS Office.Модуль 12: Расследование инцидентов, связанных с электронной почтой
Почтовые системы, почтовые клиенты и почтовые сервера
Управление аккаунтами
Атаки на электронную почту
Компоненты сообщений электронной почты
Общие заголовки и X-заголовки
Обнаружения атак на почту
Средства анализа почтовых сообщений
Американский закон CAN-SPAM
Лабораторная работа:
Восстановление удалённых сообщений в эл.почте с помощью Recover My Email;
Обнаружение опасных сообщений с помощью Paraben’s Email Examiner;
Отслеживание эл.сообщений с помощью eMailTrackerPro.Модуль 13: Расследование инцидентов, связанных с мобильными устройствами
Угрозы мобильным устройствам
Особенности взлома мобильных устройств и мобильных ОС
Архитектура мобильных устройств
Архитектура стека Android и процесс загрузки
Архитектура стека iOS и процесс загрузки
Хранилища мобильных данных
Подготовка и вторжение в мобильную ОС
Лабораторная работа:
Анализ опасных изображений и восстановление удалённых файлов с помощью Autopsy;
Исследование Android-устройства с помощью Andriller.Модуль 14: Подготовка отчетов о расследовании инцидента
Структура отчёта о расследование инцидента
Признаки хорошего отчёта
Шаблон отчёта о расследовании инцидента
Классификация отчётов и руководства по их написанию
Экспертные заключения в отчёте
Различия технических и экспертных заключений
Стандарты Дауберта (Daubert) и Фёе (Fyre)
Этические нормы при ведении расследования - CCSP — Certified Cloud Security Professional
- Длительность: 5 дней (40 часов)
- Код курса: CCSP
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Обучение ориентированно на:
Экспертов, готовящихся к международно-признаваемой сертификации в области обеспечения информационной безопасности при применении облачной модели потребления ИТ-услуг (ISC)2 Certified Cloud Security Professional
Предварительные требования к участникам:
Сертификация CompTIA Security+ или эквивалентный набор знаний и навыков
5-летний опыт в сфере обеспечения информационной безопасности, например, ISACA Certified Information Systems Auditor, (ISC)2 Certified Information Systems Security Professional или ISACA Certified Information Systems ManagerФормат и продолжительность обучения:
Семинар 5 дней 40 часов (80% времени лекции/20% практические занятия)
Методические материалы:
Учебное пособие с теоретической и практической частью
Документ об окончании курса:
Сертификат учебного центра «Human Growth Kazakhstan».
Программа курса
Модуль 0. Оценочный тест.
Модуль 1. Архитектурные концепции и требования к проектированию
Урок 1.1. Концепция облачных вычислений
Урок 1.2. Эталонная архитектура облачных вычислений
Урок 1.3. Концепции безопасности для облачных вычислений
Урок 1.4. Принципы построения безопасных облачных вычислений
Урок 1.5. Доверенные облачные службы
Домашнее задание – промежуточный тест.Модуль 2. Безопасность облачных данных
Урок 2.1. Жизненный цикл облачных данных
Урок 2.2. Проектирование и реализация архитектур облачных хранилищ данных
Урок 2.3. Разработка и применение стратегий обеспечения безопасности данных
Урок 2.4. Внедрение технологий обнаружения и классификации данных
Урок 2.5. Разработка и внедрение соответствующих юрисдикции мер защиты персональных данных
Урок 2.6. Разработка и внедрение средств управления правами доступа к данным
Урок 2.7. Планирование и внедрение политик хранения, удаления и архивирования данных
Урок 2.8. Проектирование и внедрение аудита, отслеживания и учета событий данных
Домашнее задание – промежуточный тест.Модуль 3. Безопасность облачной платформы и инфраструктуры
Урок 3.1. Осмысление компонентов облачной инфраструктуры
Урок 3.2. Анализ рисков, связанных с облачной инфраструктурой
Урок 3.3. Проектирование и планирование средств контроля безопасности
Урок 3.4. Планирование аварийного восстановления и управления непрерывностью бизнеса
Домашнее задание – промежуточный тест.Модуль 4. Безопасность облачных приложений
Урок 4.1. Обучение и осведомленность в области безопасности приложений
Урок 4.2. Гарантия и проверка облачного программного обеспечения
Урок 4.3. Использование проверенного безопасного программного обеспечения
Урок 4.4. Процесс жизненного цикла разработки программного обеспечения
Урок 4.5. Применение жизненного цикла разработки безопасного программного обеспечения
Урок 4.6. Архитектура облачных приложений
Урок 4.7. Разработка соответствующих решений управления идентификацией и доступом.
Домашнее задание – промежуточный тест.Модуль 5. Операции
Урок 5.1. Поддержка процесса планирования для проектирования центра обработки данных
Урок 5.2. Реализация и построение физической инфраструктуры для облачной среды
Урок 5.3. Запуск физической инфраструктуры для облачной среды
Урок 5.4. Управление физической инфраструктурой для облачной среды
Урок 5.5. Построение логической инфраструктуры для облачной среды
Урок 5.6. Запуск логической инфраструктуры для облачной среды
Урок 5.7. Управление логической инфраструктурой для облачной среды
Урок 5.8. Обеспечение соответствия правилам и средствам контроля (например, ITIL, ISO/IEC 20000-1)
Урок 5.9 Проведение оценки риска для логической и физической инфраструктуры
Урок 5.10. Сбор, получение и сохранение цифровых доказательств
Урок 5.11. Управление связью с соответствующими сторонами
Домашнее задание – промежуточный тест.Модуль 6. Закон и требования регуляторов
Урок 6.1. Правовые требования и уникальные риски в облачных вычислениях
Урок 6.2. Вопросы конфиденциальности с учетом изменения юрисдикции
Урок 6.3. Процесс аудита, методологии и необходимые адаптации для облачной среды
Урок 6.4. Последствия облачных вычислений для корпоративного управления рисками
Урок 6.5. Аутсорсинг и оформление облачных контрактов
Урок 6.6. Выполнение управления поставщиками
Домашнее задание – промежуточный тест.Модуль 7. Знакомство с экзаменом.
Модуль 8. Итоговый тест.
- CISA — Certified Information Systems Auditor
- Длительность: 5 дней (40 часов)
- Код курса: CISA
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Обучение ориентированно на:
Аудиторов информационных систем, готовящихся к сдаче сертификационного экзамена CISA
Предварительные требования к подготовке слушателей:
Сертификация CompTIA Security+ или ISC2 SSCP или эквивалентный набор знаний и навыков по основам ИБ
5-летний опыт в одном и более доменах CISA, например, в качестве архитектора систем защиты CompTIA CASP; практика по управлению непрерывностью бизнеса DRII ABCP; специалиста по форензике GIAC GASF и пр.Формат и продолжительность:
семинар 5 дней (80% времени лекции/20% практические занятия)
Методические материалы:
Учебное пособие с теоретической и практической частью на английском языке
Программа курса:
Модуль 1.Основы аудита информационных систем
Модуль 2. Стратегическое управление ИТ
Модуль 3. Процесс аудита
Модуль 4. Основы сетевых технологий
Модуль 5. Управление жизненным циклом информационных систем
Модуль 6. Использование, обслуживание и поддержка информационных систем
Модуль 7. Защита информационных ресурсов
Модуль 8. Непрерывность бизнеса и восстановление после катастрофВ качестве практики в обучение включены оценочный, промежуточные и итоговый тесты, 600 вопросов которые соответствуют официальным экзаменационным вопросам.
Соответствие доменов экзамена и модулей курса:
Domain 1— Information Systems Auditing Process Systems (21%)
Модули: 1,3
Domain 2— Governance and Management of IT (17%)
Модули: 2,8
Domain 3— Information Systems Acquisition, development, and Implementation (12%)
Модули: 4,5
Domain 4— Information Systems Operations, and Business Resilience (23%)
Модули: 4,6,8
Domain 5— Protection of Information Assets (27%)
Модули: 4,7 - CISSPEX — Подготовка к сертификациям CISSP и CISM
- Длительность: 5 дней (40 часов)
- Код курса: CISSPEX
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Курс ориентирован на:
Руководителей/экспертов в области обеспечения информационной безопасности (далее ИБ), готовящихся к международно-признаваемым сертификациям (ISC)2 Certified Information Systems Security Professional и ISACA Certified Information Systems Manager
Предварительные требования к знаниям слушателей курса:
1) Сертификация CompTIA Security+ или ISC2 SSCP или эквивалентный набор знаний и навыков по основам ИБ
2) 5-летний опыт в сфере обеспечения ИБ в 2х и более доменах, например, в качестве аудитора информационных систем ISACA Certified Information Systems Auditor; архитектора систем защиты CompTIA CASP; практика по управлению непрерывностью бизнеса DRII ABCP; специалиста по форензике GIAC GASF и пр.Формат и продолжительность:
5 дней (80% времени лекции/20% практические занятия)
Методические материалы:
Учебное пособие с теоретической и практической частью на английском языке
Сертификационные статусы и экзамены:
Сертификация ISC2 Certified Information Systems Security Professional
Сертификация ISACA Certified Information Systems Manager
Руководителей и экспертов мы готовим к получению сертификации являющейся Золотым Стандартом в сфере ИБ Certified Information Systems Security Professional (CISSP) от консорциума ISC2 и Certified Information Systems Manager от ISACAПрограмма курса:
Модуль 01. Security Governance Through Principles and Policies
Модуль 02. Personnel Security and Risk Management Concepts
Модуль 03 Business Continuity Planning
Модуль 04 Laws, Regulations, and Compliance
Модуль 05 Protecting Security of Assets
Модуль 06 Cryptography and Symmetric Key Algorithms
Модуль 07 PKI and Cryptographic Applications
Модуль 08 Principles of Security Models, Design, and Capabilities
Модуль 09 Security Vulnerabilities, Threats, and Countermeasures
Модуль 10 Physical Security Requirements
Модуль 11 Secure Network Architecture and Securing Network Components
Модуль 12 Secure Communications and Network Attacks
Модуль 13 Managing Identity and Authentication
Модуль 14 Controlling and Monitoring Access
Модуль 15 Security Assessment and Testing
Модуль 16 Managing Security Operations
Модуль 17 Preventing and Responding to Incidents
Модуль 18 Disaster Recovery Planning
Модуль 19 Investigations and Ethics
Модуль 20 Software Development Security
Модуль 21 Malicious Code and Application Attacks
В качестве практики в обучение включены оценочный, промежуточные и итоговый тесты, 600 вопросов которые соответствуют официальным экзаменационным вопросам.Соответствие доменов экзамена CISSP и модулей:
Модуль 1, 2, 3, и 4: Security и Risk Management
Модуль 5: Asset Security
Модуль 6, 7, 8, 9, и 10: Security Architecture и Engineering
Модуль 11 и 12: Communication и Network Security
Модуль 13 и 14: Identity и Access Management (IAM)
Модуль 15: Security Assessment и Testing
Модуль 16, 17, 18, и 19: Security Operations
Модуль 20, 21: Software Development Security
Всем четырем доменам экзамена CISM соответствуют модули курса, изучаемые в первые 3 дня. - ESCA — EC-Council Certified Security Analyst
- Длительность: 5 дней (40 часов)
- Код курса: ESCA
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Описание:
Этот курс посвящен освоению методики проведения тестов на проникновение (pentest’ов), а также подготовке к соответствующему сертификационному экзамену. На курсе разбираются практики подготовки к проведению тестов на проникновение, особенности применения различных методов проникновения и специализированного программного и аппаратного обеспечения. Также рассматриваются вопросы подготовки сопроводительной документации и составления отчета о проведении теста на проникновение, включая анализ выявленных угроз и уязвимостей, корректную интерпретацию результатов и выработку необходимых рекомендаций.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся тестированием на проникновения, обработкой инцидентов ИБ, и обеспечением информационной безопасности корпоративной инфраструктуры.
Материалы курсы включают также материалы для самоподготовки!Программа курса:
Модуль 01: Introduction to Penetration Testing and Methodologies
(Введение в тестирование на проникновения и соответствующие методики).Модуль 02: Penetration Testing Scoping and Engagement Methodology
(Рамки проведения тестов на проникновение и методология работы с подобными проектами).Модуль 03: Open-Source Intelligence (OSINT) Methodology
(Конкурентная разведка в открытых источниках информации).Модуль 04: Social Engineering Penetration Testing Methodology
(Методика использования методов социальной инженерии).Модуль 05: Network Penetration Testing Methodology – External
(Методика проведения тестов на проникновение «извне»).Модуль 06: Network Penetration Testing Methodology – Internal
(Методика проведения тестов на проникновение «изнутри»).Модуль 07: Network Penetration Testing Methodology – Perimeter Devices
(Методика проникновения за периметр безопасности).Модуль 08: Web Application Penetration Testing Methodology.
(Методика тестов на проникновение, направленных на web-приложения).Модуль 09: Database Penetration Testing Methodology
(Методика тестов на проникновение, направленных на базы данных).Модуль 10: Wireless Penetration Testing Methodology.
(Методика тестов на проникновение, направленных на беспроводные сети передачи данных).Модуль 11: Cloud Penetration Testing Methodology.
(Методика проведения тестов на проникновения в облачных средах).Модуль 12: Report Writing and Post Testing Actions.
(Составления отчета и рекомендаций по результатам проведения теста на проникновение). - GCFA — GIAC Certified Forensic Analyst
- Длительность: 5 дней (40 часов)
- Код курса: GCFA
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Описание:
Данный курс направлен на подготовку к сертификационному экзамену GIAC Forensic Analyst. На курсе рассматриваются методы цифровой криминалистики, конкретные механизмы и инструменты обработки инцидентов информационной безопасности.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся цифровой криминалистикой и обработкой инцидентов информационной безопасности. Специалистам из “синих” и “красных” команд, аудиторам информационной безопасности.
Программа курса:
Модуль00: Enterprise Environment Incident Response
(Работа с инцидентами ИБ в корпоративной среде).Модуль 01: File System Timeline Artifact Analysis
(Анализ артефактов в файловых системах).Модуль 02: Identification of Malicious System and User Activity
(Обнаружение вредоносной активности систем и пользователей).Модуль 03: Identification of Normal System and User Activity
(Построение шаблонов нормальной работы систем и пользователей).Модуль 04: Introduction to File System Timeline Forensics
(Введение в построение и анализ временных последовательностей событий в файловых системах).Модуль 05: Introduction to Volatile Data Forensics
(Анализ волатильной информации).Модуль 06: NTFS Artifact Analysis
(Анализ артефактов файловой системы NTFS).Модуль 07: Volatile Data Artifact Analysis of Malicious Events
(Анализ волатильных артефактов вредоносных событий).Модуль 08: Volatile Data Artifact Analysis of Windows Events
(Анализ волатильных артефактов вредоносных событий в ОС Windows).Модуль 09: Windows Artifact Analysis
(Анализ артефактов в ОС Windows). - GPEN — GIAC Penetration Tester
- Длительность: 5 дней (40 часов)
- Код курса: GPEN
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Описание:
Данный курс направлен на подготовку к сертификационному экзамену GIAC Penetration Tester. На курсе рассматриваются методики и конкретные механизмы проведения рекогносцировки IT-инфраструктуры, а также применения эксплойтов при тестировании на проникновение.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся проведением тестов на проникновение, моделированием угроз, выявлением существующих уязвимостей. Специалистам из «синих» и «красных» команд, аудиторам информационной безопасности.
Программа курса:
Модуль00: Advanced Password Attacks
(Расширенные атаки на пароли).Модуль 01: Attacking Password Hashes
(Атаки на хэшированные пароли).Модуль 02: Domain Escalation and Persistence Attacks
(Направленные атаки).Модуль 03: Escalation and Exploitation
(Эскалация и эксплуатация).Модуль 04: Exploitation Fundamentals
(Основы создания эксплойтов).Модуль 05: Kerberos Attacks
(Атаки на Kerberos).Модуль 06: Metasploit
Модуль 07: Moving Files with Exploits
(Передача файлов с помощью эксплойтов).Модуль 08: Password Attacks
(Атаки на пароли).Модуль 09: Password Formats and Hashes
(Форматы хранения паролей).Модуль 10: Penetration Test Planning
(Планирование тестов на проникновение).Модуль 11: Penetration Testing with PowerShell and the Windows Command Line (Тестирование на проникновение с помощью инструментов Windows: cmd, PowerShell).
Модуль 12: Reconnaissance
(Рекогносцировка).Модуль 13: Scanning and Host Discovery
(Сканирование и обнаружение хостов).Модуль 14: Vulnerability Scanning
(Сканирование уязвимостей).Модуль 15: Web Application Injection Attacks
(Атаки инъекций на Web-приложения).Модуль 16: Web Application Reconnaissance
(Рекогносцировка Web-приложений). - HGK08 — Аудит IT систем
- Длительность: 3 дней (24 часа)
- Код курса: HGK08
- Стоимость
- Очный формат: 527 500 ₸
- Онлайн формат: 502 000 ₸
Описание курса
Назначение курса:
Данный курс описывает основы аудита информационных технологий и процессов их работы в корпоративных инфраструктурах. Подробно приводится методика построение самого процесса аудита, а также описываются инструменты, полезные про проведении аудита IT-систем.
Курс будет интересен:
Специалистам, занимающимся аудитом IT-систем.
Содержание курса:
1. Аудит информационных технологий
IT-инфраструктура
Необходимость и текущие тренды аудита
Внутренний и внешний аудит
IT-аудит2. Процесс IT-аудита
Основные framework’и процесса IT-аудита
Планирование IT-аудита
Формулирование целей и желаемых результатов IT-аудита
Документация для IT-аудита3. Инструменты для проведения IT-аудита
Метрики проведения IT-аудита
Работа с данными
Анализ данных на компьютере
Управление ресурсами IT-аудита4. Особенности работы IT-систем
Основные framework’и процессов работы IT-систем
Метрики работы IT-систем
Стратегия развития и бизнес-задачи IT-систем5. Управление рисками
Основные подходы управления рисками
Основные framework’и процесса управления рисками6. Управление IT-проектами
Планирование IT-проекта
Оценка эффективности IT-проекта
Аудит IT-проектов7. Аудит IT-приложений
Риски для приложений
Риски для пользователей приложений
Контроль приложений
Специальные инструменты для аудита IT-приложений8. Управление процессами контроля изменений[в IT-системах]
Процесс контроля изменений
Процедуры контроля изменений
Аудит процессов контроля изменений9. Управление резервным копирование и восстановлением
Обработка данных в IT-системах
Проектирование решений резервного копирования
Отказоустойчивость IT-систем
Аудит резервного копирования и отказоустойчивости IT-систем10. Информационная безопасность
Основные процессы информационной безопасности
Основные стандарты и framework’и процессов информационной безопасности
Политики информационной безопасности
Управление информационной безопасностью
Механизмы контроля доступа
Аудит процессов информационной безопасности - HGK09 — Как продавать проекты Информационной Безопасности
- Длительность: 4 дня (32 часа)
- Код курса: HGK09
- Стоимость
- Очный формат: 382 000 ₸
- Онлайн формат: 373 000 ₸
Описание курса
Аннотация
Основными задачами курса «Как продавать проекты ИБ» являются:
Ознакомление слушателей с современными взглядами и подходами к продаже проектов информационной безопасности.
Определение ИБ, как неотъемлемой части любого бизнеса, ознакомление с основными положениями международных стандартов в области ИБ
Определение категорий продуктов, решений и сервисов ИБ
Определение категорий потенциальных заказчиков для правильного подбора решений ИБ
Ознакомление с методиками продаж в области ИБ
Ознакомление с этапами подготовки пилотных проектов и проектов внедрения.Аудитория
Курс ориентирован на сотрудников отдела продаж.
Потенциальные кандидаты:
Менеджеры по продажам, имеющие небольшой опыт в продаже ИТ/ИБ решений.
Продукт-менеджеры ИТ/ИБ решений.
Руководители отдела продажПредварительная подготовка
Опыт работы в продажах B2B
Форма проведения
Обучение предусматривает проведение теоретических занятий, практическую работу в группах. Основные занятия курса проводятся в форме лекций-семинаров.
При разборе практических примеров используются приемы тренинга. Для практических занятий отводится не менее 50% учебного времени.
Контроль усвоения слушателями материала курса определяется по результатам выполнения практических заданий и экзамена.Результаты курса
По окончанию курса слушатели смогут:
Понимать и определять задачи заказчика в области ИБ, и подбирать актуальные продукты защиты.
Писать продающие письма, проводить результативные звонки, подготавливать и проводить презентации решений или проектов ИБ.
Формировать и руководить командой пилотного проекта, проводить пилотные проекты, переходящие в продажу.
Готовить уникальные предложения с описанием проекта ИБ.
Формировать и руководить командой проекта по внедрению решений ИБ.Программа курса
Что такое информационная безопасность:
Международные стандарты ИБ и законодательство РК в области ИБ, как инструменты в работе с заказчиком. (ISO 27001, NIST, ISO 27005, МЦРИАП и др.)
Что такое ИБ с позиции международных стандартов и законодательства.
Понимание концепции ИБ, какие классы продуктов и сервисов используют и почему.Инструменты информационной безопасности:
Классификация продуктов и сервисов ИБ
Продукты защиты конечных точек
Продукты для выявления угроз на конечных точках
Продукты для выявления угроз в корпоративной сети
Продукты для защиты корпоративной сети
Продукты для предотвращения утечки данных
Продукты для управления инцидентамиЗаказчики информационной безопасности:
Классификация заказчиков – по размерам бизнеса, по направлениям бизнеса.
Типы заказчиков и их задачи в ИБ
Как формировать предложение для каждого типа заказчиковВход к заказчику:
Холодные звонки – Что это такое? Как правильно готовиться к холодным звонкам? Как правильно делать холодные звонки? Самые распространённые ошибки в холодных звонках.
Продающие письма – Что это такое? Как правильно готовить продающие письма?
Холодные встречи – когда этот инструмент эффективен и как его использовать?Презентация решения информационной безопасности:
Как готовить презентацию онлайн/оффлайн
Как проводить презентацию онлайн/оффлайн
Как отвечать на сложные вопросы
Что делать, когда ситуация выходит из под контроля?Пилотный проект информационной безопасности:
Что такое пилотный проект?
Документация проекта – готовим документы пилотного проекта ИБ
Процессы проекта – разрабатываем процессы для проведения пилотного проекта
Регламенты проекта – разрабатываем регламенты для проведения пилотного проектаПодготовка уникального предложения проекта:
Шаблоны предложений на все случаи жизни.
Подготовка ценовых предложений
Подготовка коммерческих предложений.Проект внедрения информационной безопасности:
Что такое проект внедрения?
В чём отличие проекта внедрения от проекта пилота
Документация проекта внедрения
Процессы проекта внедрения
Регламенты проекта внедрения - DDoS — Защита от DDoS атак с помощью Radware vDefensePro для Cisco FirePower
- Длительность: 2 дня (16 часов)
- Код курса: DDOS
- Стоимость
- Очный формат: 632 000 ₸
- Онлайн формат: 602 000 ₸
Описание курса
Назначение курса:
на данном курсе рассматриваются методы защиты от различных DDoS-атак с помощью Radware virtual DefensePro для Cisco FirePower.
Содержание:
1. Классификация DDoS атак.
DoS и DDoS атаки.
Сетевые DDoS атак.
DDoS атаки приложений.
Мультивекторные DDoS атаки.
Botnet’ы.
Основные метода защиты от DDoS атак.2. Radware vDefensePro для Cisco FirePower.
Система защиты от DDoS атак Radware DefensePro.
UTM-система Cisco FirePower.
Установка компонента vDefensePro на платформу Cisco FirePower.
Процесс обработки сетевого трафика и архитектура комбинированной системы Cisco FirePower + Radware vDefensePro.3. Настройка Radware vDefensePro.
Системные настройки Radware vDefensePro на Cisco FirePower.
Настройка Protection Profile’ов для защиты от DDoS атак.
Мониторинг системы защиты от DDoS атак. - GREM — GIAC Reverse Engineering Malware
- Длительность: 5 дней (40 часов)
- Код курса: GREM
- Стоимость
- Очный формат: 760 000 ₸
- Онлайн формат: 722 000 ₸
Описание курса
Описание:
Данный курс направлен на подготовку к сертификационному экзамену GIAC Reverse Engineering Malware. На курсе рассматриваются методы и средства reverse engineering’а вредоносного п/о.
Курс будет полезен:
Специалистам в области информационной безопасности, занимающимся reverse engineering’ом, выявлением существующих уязвимостей. Специалистам из “синих” и “красных” команд, аудиторам информационной безопасности.
Программа курса:
Модуль00: Analysis of Malicious Document Files
(Анализ вредоносных файлов документов).Модуль 01: Analyzing Protected Executables
(Анализ зищищённых исполнимых файлов).Модуль 02: Analyzing Web-Based Malware
(Анализ вредоносных компонентов Web-приложений).Модуль 03: Common Windows Malware Characteristics in Assembly
(Основные характеристики вредоносного п/о Windows с т.з. Ассемблера).Модуль 04: In-Depth Analysis of Malicious Browser Scripts
(Глубокий анализ вредоносных скриптов браузеров).Модуль 05: In-Depth Analysis of Malicious Executables
(Глубокий анализ вредоносных исполнимых файлов).Модуль 06: Malware Analysis Using Memory Forensics
(Анализ вредоносного п/о методами анализа оперативной памяти).Модуль 07: Malware Code and Behavioral Analysis Fundamentals
(Основы анализа вредоносного исходного кода и поведенческий анализ).Модуль 08: Windows Assembly Code Concepts for Reverse-Engineering
(Основы ассемблера в ОС Windows для reverse engineering’а).
Veeam
- VMCEv13 — Veeam Backup & Replication: Configure, Manage, and Recover v13
- Длительность: 4 дня (32 часа)
- Код курса: VMCEv13
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 759 000 ₸
Описание курса
Overview
The Veeam® Backup & Replication™ v13: Configure, Manage and Recover training course is a fourday technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam Backup & Replication v13 solution. With extensive hands-on labs, the class promotes situational resiliency in responding to recovery scenarios and enables administrators and engineers to effectively protect and manage data in an ever-changing technical and business environment, bringing tangible benefit to business in the digital world. This course is based on Veeam Backup & Replication v13, part of Veeam Data Platform.
Theory/labs: 60/40
Certification
VMCE is the foundational training required to qualify for the upcoming VMCE-E certification. To progress to this next-level Veeam certification, candidates must complete the designated courses in Veeam Backup & Replication, Veeam Data Platform: Monitor, Manage, Analyze (Veeam ONE), and Veeam Data Platform: Scale, Automate, Secure (Veeam Recovery Orchestrator).
Objectives
After completing this course, students will be able to:
Articulate Veeam’s data protection strategy
Explain the role of each of Veeam’s core components
Configure and manage the Veeam Software Appliance
Given a scenario, configure a backup job and backup copy job
Protect physical servers with Veeam agents
Configure unstructured data backup jobs (NAS/SMB shares, etc)
Describe Veeam’s replication capabilities
Determine appropriate use case for backups, replicas and continuous data protection
Ensure backup recoverability by leveraging SureBackup and immutable repositories
Describe Veeam security concepts and how to implement within the product
Configure malware detection and explain how to remediate
Given a scenario, recover data from backups for VMs, agents and applications
Articulate the enterprise products Veeam has developed plug-ins for
Describe how to monitoring, reporting and alerting function
Implement the enterprise manager
Explain how to perform basic troubleshooting procedures and how to work with supportPrerequisites
Students should have fundamental IT experience working with networking, servers, storage, cloud, virtualization and operating systems.
>To get the most out of this course, students should be familiar with the core fundamental concepts of Veeam Backup & Replication through hands-on experience.Audience
This course is suitable for anyone responsible for configuring, managing, or supporting a Veeam Backup & Replication v12.3 environment. It is also ideal for IT professionals across various roles, including backup administrators, disaster recovery specialists, system engineers, technical support staff, IT administrators, cloud administrators, cybersecurity professionals, compliance officers, monitoring specialists, reporting analysts, and security teams — reflecting the broad applicability of Veeam University PRO trainings.
Course Contents
Data Protection Strategies
Review of key data protection strategies that ensure the safety of your data.
Analysis of risks to data
Explore different risk scenarios. What risks do we face daily within our environment?
What is protected?
Review of Veeam Data Platform and introduction to the class scenario.
Security and protection considerations
Describe strategies and tools to secure the Veeam backup server to avoid unauthorized access and data leaks.
Protecting workloads
Efficiently protect VMware and Hyper-V virtual machines based on well-defined SLAs through the creation of backup jobs.
Deploying agents
Identify the use of protection groups to automate the installation of Veeam Agents and protect workloads with agent backup jobs.
Unstructured data backup
List required components and features available to protect unstructured data.
Optimizing your backups
Analyze features and settings that allow backup storage optimization, faster backups and data consistency.
Backup copy jobs
Ensure recoverability and adhere to the 3-2-1 Rule with backup copy jobs.
Immutability and hardened repositories
Describe backup data protection mechanisms to avoid premature deletion and unwanted modifications. Identify characteristics and deployment steps of Linux Hardened Repositories to achieve backup data immutability.
Backup infrastructure optimization
List deployment options and additional settings to improve general backup solution performance.
Replication
Describe use cases, architectures and features of replication jobs and continuous data protection (CDP) policies.
Long-term retention
List different mechanisms for data archiving, including grandfather-father-son retention policies.
Scale-out Backup Repository™
Describe architecture, placement policies, data tiers and management of Scale-out Backup Repositories.
Move and copy backups with VeeaMover
Identify use cases for virtual machine and backup migrations with VeeaMover.
Recovery verification
Create automated tests to ensure recoverability from backups and replicas.
Veeam Backup Enterprise Manager
Describe the use cases for Veeam Backup Enterprise Manager.
Incident Response Planning
Integrating Veeam Backup and Replication into your incident response plan.
Advanced recovery features
Explore some more in-depth recovery features of Veeam Backup and Replication.
Selecting the ideal recovery method
What are the implications of different recovery methods and selecting the correct recovery method.
Enacting a recovery
Get practice in recovering different recovery types with a variety of data types
Malware Detection
Using Veeam’s malware detection capabilities.
Post-incident processes
Investigate post-incident activities.
Enterprise Plugins
Learn which plug-ins Veeam currently supports and how they work
Monitoring, alerting and reporting
Discover how to run reports and understand backup job status summaries
Troubleshooting
Understand the basics of troubleshooting Veeam issues and how to resolve with support
Veeam Calculators
Where to find them and an intro on how to utilize
Asterisk
- AST01 — IP телефония Asterisk
- Длительность: 5 дней (40 часов)
- Код курса: AST01
- Стоимость
- Очный формат: 689 500 ₸
- Онлайн формат: 603 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить технологии построения VoIP связи на базе IP АТС Asterisk.Аудитория курса:
Специалисты, занимающиеся IP-телефонией.Предварительные требования к аудитории:
Знание работы сетевых протоколов и технологий в рамках стека TCP/IP.Длительность курса:
5 дней.Содержание курса:
Модуль 1 – Основы IP-телефонии.
Механизм передачи голоса по IP-сети.
Аналогово-цифровое преобразование и голосовые кодеки.Модуль 2 – Протоколы IP-телефонии.
Протоколы сигнализации — H.323, SIP.
Протоколы передачи media — SDP, RTP.
Подключение VoIP сети к ТФоП.Модуль 3 – Архитектура Asterisk.
Архитектура Asterisk.
Загружаемые модули.Модуль 4 – Установка Asterisk.
Установка Asterisk. Особенности выбора платформы, ОС.
Окружение и зависимости.Модуль 5 – Настройка Asterisk. Регистрация софтфонов и IP-телефонов
Конфигурационные файлы Asterisk
Определение SIP-устройств в Asterisk
Регистрация и настройка софтфонов и IP-телефоновМодуль 6 – Dialplan.
Настройка номерного плана.
Настройка VoIP-шлюзов.
Настройка SIP-trunk’ов.Модуль 7 – IVR. Голосовой почта. Конференции.
Настройка IVR.
Настройка голосовой почтой.
Настройка конференций.Модуль 8 – Настройка телефонных сервисов VoIP.
Настройка Call Forward
Настройка Call Pickup
Настройка Call Transfer
Настройка Call Recording
Настройка MOH.Модуль 9 – GUI и управление IP-АТС Asterisk.
Asterisk GUI. Установка и настройка.
Панели оператора
A2billing
Готовые «решения» на базе Asterisk: Elastix, VICIDial, Trixbox, Askozia.Модуль 10 – Отказоустойчивость и производительность.
Принципы обеспечения отказоустойчивости VoIP компонентов.
Настройка HA кластера Asterisk.
Использование механизмов QoS в VoIP сети.Модуль 11 – Поиск и устранение неисправностей VoIP.
Диагностика неисправностей.
Анализ сообщений сигнализации (SIP).
Методика устранение неисправностей. - AST02 — Углубленное администрирование IP-телефонии на базе Asterisk
- Длительность: 5 дней (40 часов)
- Код курса: AST02
- Стоимость
- Очный формат: 689 500 ₸
- Онлайн формат: 695 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям получить углубленные знания по администрирования IP-АТС Asterisk и построению комплексных решений IP-телефонии на ее основе. Также будут изучаться особенности подключения локальной IP-телефонии к сетям операторов связи: использование интерфейсов FXO, FXS, PRI, использование SIP-транков. Кроме того, рассматриваются вопросы безопасности и управления доступом, в том числе трансляции адресов и фильтрации трафика, а также шифрование голосового трафика.Аудитория курса:
Специалисты, занимающиеся IP-телефонией.Предварительные требования к аудитории:
Необходимо иметь опыт системного администрирования, а также знания в области сетей TCP/IP и представления о работе IP-телефонии. Желательно знать материала курса ANT_AS101.Длительность курса:
5 дней.Содержание курса:
Модуль 1 – Архитектура VoIP сетей.
IP-телефония и VoIP.
Открытые стандарты в области реализации IP-телефонии.
Решения IP-телефонии с открытым исходным кодом.Модуль 2 – Сигнализации в телефонии.
Сценарии SIP-сигнализации.
Сценарии подключения VoIP к ТФоП (PSTN).
Сценарии создание распределенной международной VoIP сети.Модуль 3 – IP-АТС Asterisk.
Архитектура.
Программные и аппаратные компоненты
Конфигурационные файлы и модули
Аудио/Видео кодеки.
Драйвера DAHDI.
Создание и управление Extension’ами
Создание базового Dial Plan’а.Модуль 4 – Коммутация вызовов и Dial Plan.
Контексты.
Extension’ы.
Приоритезация.
Приложения.
Переменные.
Построение Dial Plan’а.
Использование pattern’ов.Модуль 5 – Trunk’и.
Подключение к сервис-провайдеру телефонии.
Подключение через PSTN транки.
Создание VoIP SIP-транков
Особенности работы c NAT в VoIP-сетях.Модуль 6 – Сервисные функции IP-АТС.
Parking, Paging.
Конференцсвязь.
IVR.
Системы очередей вызовов.
ACD.Модуль 7 – Схема нумерации.
IPTSP.
DNS и SIP-URI.
ENUM и E.164.Модуль 8 – Мониторинг Asterisk
Интеграция системы с базой данных.
Call Detail Records.
Channel Event Logging.
SNMP.
Использование OpenNMS для мониторинга Asterisk.
Отладка SIP-сообщений.
Отладка низкоуровневых компонентов системы.Модуль 9 – Безопасность VoIP.
Модель угроз VoIP.
Аутентификация абонентов.
Шифрование сигнализации.
Шифрование медиа.
Защита от DoS и DDoS атак.Модуль 10 – Session Border Controller
Назначение и функции SBC.
Фильтрация сигнальной информации (SIP-proxy).
Функции трансляции адресов.
Принудительное шифрование сигнализации и медиа.
Установка и настройка LibreSBC.
Предприятие 4.0
- DGE-00 — Digital и Agile трансформация организаций — практический подход
- Длительность: 5 дней (40 часов)
- Код курса: DGE-00
- Стоимость
- Очный формат: 682 500 ₸
- Онлайн формат: 668 500 ₸
Описание курса
Описание курса:
Любые изменения на предприятии связаны с высокими рисками, большинство компаний в традиционных и высокотехнологичных отраслях оказываются в положении заложников требований рынка и вынуждены идти на потери чтобы начать динамичные изменения. Agile и Digital трансформации являются всего лишь инструментами в руках лидеров для достижения своих бизнес-целей. Критический подход к трансформации позволит разобраться с вызовами, стоящими перед лидерами изменений и командами и спланировать следующие шаги, соответствующие их целям и задачам.
Аудитория курса:
Консультантов
Менеджеров и участников трансформации на предприятии
Руководителей заинтересованных в проведении изменений на предприятииПо окончании курса слушатели смогут:
Изучите последнее понимание отраслью целей и задач трансформационных инициатив
Сильные и слабые стороны известных фреймворков
Разберетесь зачем и когда нужно начинать трансформации
Изучите опыт мировых консалтинговых агентств в планировании и проведении трансформацииСодержание курса:
Модуль 1 — Трансформация и ее разновидности
Индустрия 4.0 — состояние на 2022 год
Современные Цифровые бизнес-модели
Типы трансформационных инициатив и их особенности
Создание культуры инноваций
Управление изменениями на предприятиях
Операционный менеджмент и непрерывные улучшения
Бизнес-архитектура и архитектура предприятия
Лидерство и ответственностьМодуль 2 — Модели управления рисками
Разработка стратегии изменений
Разработка метрик для оценки результатов изменений
Применение стандартных моделей для расчета рисков
Анализ и управление рисками при реализации стратегии, управлении портфелями и программами
Особенности моделирования рисков при Agile и Digital трансформацииМодуль 3 — Как планировать и запускать agile трансформации
Оценка необходимости внедрения Agile культуры
Разработка дорожной карты и видения предприятия после трансформации
Комплексный анализ готовности предпрития к изменениями
Создание плана по изменению культуры предприятия с учетом рисков
Инкрементальное управление изменениями,мониторинг, адаптация и корректировка
Контроль достижения измеримых показателей трансформации
Переход предприятия в новую операционную реальность, поддержка непрерывности улучшений и измененийМодуль 4 — Как планировать и запускать Digital трансформации
Современное понимание цифровой трансформации
Анализ актуальных потребностей, проблем и возможностей предприятия
Формулирование Видения, Задач и целей трансформации
Разработка дорожных карт
Синтезирование новой операционной модели
Анализ рисков бизнеса и готовности предприятия к изменениям
Выбор фреймворков трансформации и разработка пошаговых планов изменений - DGE-01 — Гибкое управление цифровыми продуктами и продуктовыми командами
- Длительность: 5 дней (40 часов)
- Код курса: DGE-01
- Стоимость
- Очный формат: 682 500 ₸
- Онлайн формат: 668 500 ₸
Описание курса
Описание курса:
Гибкое управление исходит из осознания и принятия ценностей и принципов Agile, и ставит своей целью создание выдающихся продуктов и решений. Ключевая роль в прокладывании новаторского пути к конечному решению лежит на Product Manager. Доскональное изучение реальных проблем пользователей, создание культуры инноваций и безопасной среды для достижения успеха это лишь часть области интересов Product Manager.
Аудитория курса:
Начинающих продуктовых менеджеров;
Проектных менеджеров и бизнес-аналитиков;
Всех специалистов связанных с разработкой цифровых продуктов,желающих получить уверенные знания и навыки в области Product Management.По окончании курса слушатели смогут:
Сможете приступить к разработке нового продукта, используя изученные методы и техники;
Окажете влияние на культуру компании,поддерживая инновации и постоянные улучшения;
Начнете выстраивать эффективные коммуникации с технической командой.Содержание курса:
Модуль 1 — Основы Продуктовой Стратегии
Дисциплина управления продуктами
Лидерство и продуктовая культура
Подходы к управлению стратегией для цифровых продуктов
Постановка достижимых целей для продукта (OKR)
Ключевые метрики
Изучение потребностей пользователей (JTBD, CJM)Модуль 2 — Исследование гипотез и поиск возможностей
Формулирование гипотез и постановка целей
Достижение соответствия продукта / рынка
Тестирование гипотез и аналитика данных (A/B testing, Growth Hacking)
Разработка требований к продукту (USM, User Stories, User Jobs)
Создание продуктовой дорожной карты
Приоритезация требований и задач
Проектирование MVPМодуль 3 — Проектирование продукта и разработка
Экономика продукта (Unit Economics, P&L)
Проектирование пользовательского опыта
Agile разработка продукта
Жизненный цикл продукта
Управление рисками
Эффективное взаимодействие с командами разработкиМодуль 4 — Подготовка к запуску продукта, масштабирование и оптимизация
Управление продвижением продукта
Разработка бизнес-моделей
Управление бюджетами в Agile, финансовые оценки и ROI
Практика постоянных улучшений
Успешная презентация продуктаМодуль 5 — Лидерство и развитие продуктовых команд
Как развивать культуру инноваций
Лидерство и принятие решений на основе данные
Как масштабировать команды
Как измерять работу команды и развивать персональную ответственность - DGE-02 — Современный бизнес-анализ и его применение в Agile
- Длительность: 5 дней (40 часов)
- Код курса: DGE-02
- Стоимость
- Очный формат: 682 500 ₸
- Онлайн формат: 668 500 ₸
Описание курса
Описание курса:
Дисциплина бизнес-анализа неотъемлемо присутствует во всех современных организациях, но не всегда явно представлена бизнес-аналитиками. Задачи бизнес-аналитика также меняются под внешними вызовами и зависят от происходящих трансформаций на предприятиях. Что собой представляет бизнес-анализ как дисциплина, какие перспективы есть для ее применения и развития, как спланировать развитие аналитика в Agile мире и понять какое value создает роль, практикующая бизнес-анализ, все это будет рассмотрено на предлагаемом курсе.
Аудитория курса:
Начинающих и практикующих бизнес-аналитиков
Руководителей команд бизнес-анализа и проектных менеджеровПосле прохождения тренинга:
Вы получите полное представление о дисциплине бизнес-анализа в соответствии с IIBA BABOK 3.0 и Agile Extension v2
Сможете решать задачи и проблемы бизнеса с применением продуктовых подходов и инструментов
Научитесь анализировать создаваемую ценность бизнес-анализа и презентовать свою работу
Сформируете целостную картину компетенций и задач бизнес-анализа в Agile мире
Изучите ключевые и практические аспекты дисциплин Data Analytics и CybersecurityСодержание курса:
Модуль 1 State-of-the-art дисциплины бизнес-анализа
Какие пути развития и обучения есть у бизнес-аналитиков
Руководство бизнес-анализом и планирование развития вашей практики
Переосмысление задач центров компетенций
Как разработать модели компетенций
Как спланировать и рассчитать ROI на обучение аналитиков
Новая операционная модель бизнес-анализа
Разбор BABOK 3.0 – Как бизнес-аналитик помогает управлять портфелем, программой, проектом и продуктом
Критический путь БА, области компетенций и техники по BABOK 3.0Модуль 2 Бизнес-анализ в Agile среде и Product Ownership Analysis
Управление коммуникациями
Анализ процессов
Продуктовый менеджмент
Управление требованиями
Исследования потребностей заказчикаМодуль 3 Стратегический бизнес-анализ и Strategy to Execution Framework
Практическое применение инструментов и практик:
Program Strategy
Sponsorship and Governance Framework
Stakeholder Strategy
Execution Roadmaps
Business Case
Sourcing Strategy
User Journeys
Transition Strategy
Change & Adoption StrategyМодуль 4 Перспективные роли бизнес-анализа в цифровых организациях Business Data Analytics:
Как бизнес-аналитик помогает принимать решения для бизнеса с помощью данных?
Какие задачи стоят перед бизнес-анализом при работе с данными?
Как развивать Data Management в вашей организации ?Модуль 5 Перспективные роли бизнес-анализа в цифровых организациях Cybersecurity Analysis:
Бизнес-анализ и кибербезопасность
Архитектура кибербезопасности
Проектирование процессов кибербезопасности
Подходы к построению корпоративного SoC’а - NAUTO-00 — Автоматизация управления сетями TCP/IP
- Длительность: 5 дней (40 часов)
- Код курса: NAUTO-00
- Стоимость
- Очный формат: 682 500 ₸
- Онлайн формат: 668 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, технологии и механизмы автоматизации корпоративных сетей TCP/IP. Материал курса охватывает не только технические вопросы автоматизации, но и её методологию: вопросы подготовки и организации процессов автоматизации корпоративных сетей.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания общей теории программирования.
Содержание курса:
Модуль 1 – Проект автоматизации корпоративной сети TCP/IP.
Управление IT-проектами.
Потребности в автоматизации корпоративной сети.
Готовность процессов к автоматизации.
Адаптация стандартов и рекомендаций.
Бизнес требования.
Функциональные требования.
Создание прототипа автоматизированной корпоративной сети TCP/IP.Модуль 2 – Модель данных для разработки п/о.
Работа с данными при разработке п/о.
Создание модели данных.
Модификация и адаптация модели данных.Модуль 3 – Программное управление сетевыми устройствами.
Возможности программного управления сетевыми устройствами.
Классификация API.
Работа с REST-based API.
Работа с RPC-based API.Модуль 4 – Построение процесса разработки п/о.
Фазы процессов разработки п/о.
Методология Agile.
Методология Waterfall.
Ведение документации при разработке п/о.Модуль 5 – Особенности платформы Linux для разработки п/о.
Архитектура ОС Linux.
Особенности управления процессами в ОС Linux.
Особенности работы компиляторов в ОС.
Особенности работы Linker’ов и Loader’ов.
Работа с высокоуровневыми языками программирования.Модуль 6 – Инструменты разработки п/о.
Среды разработки.
Виртуализация и контейнеры.
Контроль версий при разработке п/о.
Автоматизированное тестирование п/о.
Автоматизированное развертывание п/о.
Методология и компоненты DevOps.Модуль 7 – Использование готовых платформ автоматизации.
Ansible.
SaltStack. - NAUTO-01 — Основы Python для сетевых инженеров
- Длительность: 5 дней (40 часов)
- Код курса: NAUTO-01
- Стоимость
- Очный формат: 656 000 ₸
- Онлайн формат: 642 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы программирования на языке Python для использования в сценариях автоматизации сетей TCP/IP. Курс охватывает не только инструменты языка Python, но и методологию написания стабильного программного кода и применение Python в контексте типовых задач сетевого инженера.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания основ
автоматизации на уровне курса NAUTO-00.Содержание курса:
Модуль 1 – Язык программирования Python.
Основные понятия языка программирования Python.
Подготовка окружения и среды написания программного кода.
Основы синтаксиса и типы данных.Модуль 2 – Основные инструменты языка Python.
Операторы.
Функции.
Библиотеки и модули.
Передача аргументов при запуске программ.Модуль 3 – ООП и обработка исключений.
Основы объектно-ориентированного программирования в Python.
Обработка исключений.
Логирование исполнения программ.Модуль 4 – Взаимодействие с сетевым оборудованием.
Обработка текстовых данных c помощью TTP и TextFSM.
Генерирование тестовых данных с помощью Jinja2.
Использование библиотеки Netmiko.Модуль 5 – Параллельное выполнение программного кода.
Многопоточное и мультипроцессорное выполнение.
Асинхронное выполнение.Модуль 6 – Поддержка качества программного кода.
Lint.
Unittest.
Методы оптимизации и обработки ошибок. - NAUTO-02 — Автоматизация управления сетями TCP/IP с помощью Python
- Длительность: 5 дней (40 часов)
- Код курса: NAUTO-02
- Стоимость
- Очный формат: 656 000 ₸
- Онлайн формат: 642 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, технологии и механизмы автоматизации корпоративных сетей TCP/IP с инструментов, созданных на языке программирования Python.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания основ автоматизации на уровне курса NAUTO-00, а также знания общей теории программирования.
Содержание курса:
Модуль 1 – Основы языка программирования Python.
Принципы языка программирования Python.
Типы данных.
Операции и операторы.
Функции, библиотеки и модули.
Объектно-ориентированное программирование на Python.
Исключения и документация.
Параллельное и асинхронное программирование на Python.
Дизайн-паттерны.
Использование API сетевого оборудования.Модуль 2 – Автоматическая проверка кода Python.
Качество кода Python.
Formatter’ы и linter’ы.
Проверка типов данных.
Методы исполнения кода Python.
Обнаружение и исправление ошибок кода Python.
Оптимизация кода Python.
Инструменты автоматической проверки кода Python.Модуль 3 – Управление сетевыми устройствами с помощью Nornir.
Компоненты Nornir’а.
Подготовка инфраструктуры для работы с Nornir’ом.
Конфигурация.
Конфигурация в YAML.
Статическое inventory.
Динамическое inventory Netbox.
Учетные записи.
Работа с задачами (task’ами).
Обработка результатов работы.
Обработка исключений.
Функции.
Плагин Netmiko.
Плагин NAPALM.
Плагин Utils.
Плагин Scrapli.
Плагин Jinja2.
Обработчики (processors).Модуль 4 – Тестирование сети с помощью Pytest.
Принципы работы Pytest.
Подготовка инфраструктуры для работы с Pytest’ом.
Работа с Fixtures.
Параметризация Pytest.
Интеграция c Nornir и NAPALM.
Интеграция с Batfish.
Интеграция c Suzieq.
Интеграция с CI/CD.Модуль 5 – Управление конфигурацией сетевых устройств с помощью Scrapli.
Принципы работы Scrapli.
Подготовка инфраструктуры для работы со Scrapli.
Передача данных Scrapli и AsyncIO.
TTP parsing.
Genie parsing.
TextFSM parsing.
Расширение Scrapli NETCONF.
Расширение Scrapli Cfg.
Расширение Scrapli Nornir.Модуль 6 – Управление конфигурацией сетевых устройств с помощью Netmiko.
Принципы работы Scrapli.
Подготовка инфраструктуры для работы с Netmiko.
Работа с конфигурацией сетевых устройств средствами Netmiko.
TTP parsing.
Genie parsing.
TextFSM parsing.
Оптимизация работы Netmiko.Модуль 7 – Мониторинг сети с помощью Suzieq.
Принципы работы и компоненты Suzieq.
Подготовка инфраструктуры для работы с Suzieq.
Анализ сетевой статистики
Построение и анализ хронологии сетевых событий.
Автоматизация Suzieq через библиотеки Python и REST
API.Модуль 8 – Анализ сети с помощью Batfish.
Принципы работы и компоненты Batfish.
Подготовка инфраструктуры для работы с Batfish.
Анализ конфигурации сетевых устройств.
Анализ информации Control Plane’а.
Анализ маршрутной информации и информации LSDB.
Анализ информации из таблиц пересылки (Forwarding Plane) сетевых
устройств.
Анализ ACL. - NAUTO-03 — Модели данных YANG для автоматизации управления сетями TCP/IP
- Длительность: 4 дня (32 часа)
- Код курса: NAUTO-03
- Стоимость
- Очный формат: 601 500 ₸
- Онлайн формат: 578 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить принципы, технологии и механизмы создания и использования моделей данных YANG для автоматизации управления корпоративными сетями TCP/IP.
Аудитория курса:
Инженеры, управляющие корпоративной сетью TCP/IP, а также специалисты, отвечающие за автоматизацию её работы.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, а также знания основ автоматизации на уровне курса NAUTO-00.
Содержание курса:
Модуль 1 – Проект автоматизации корпоративной сети TCP/IP.
Управление IT-проектами.
Потребности в автоматизации корпоративной сети.
Готовность процессов к автоматизации.
Адаптация стандартов и рекомендаций.
Бизнес требования.
Функциональные требования.
Создание прототипа автоматизированной корпоративной сети TCP/IP.Модуль 2 – Модель данных для разработки п/о.
Работа с данными при разработке п/о.
Создание модели данных.
Модификация и адаптация модели данных.
Кодировка данных.
Протоколы, использующие модели данных.Модуль 3 – Модель данных и язык описания YANG.
Описание и категоризация данных.
Описание событий и оповещений.
Конфигурационные и операционные данные.
Расширения модели данных.
Модули YANG.
Тестирование и валидация модели данных.
Инструменты Python для работы с YANG.Модуль 4 – NETCONF и YANG.
Принципы работы NETCONF.
Механизм работы PRC.
Формат и типы сообщений.
Сценарии использования NETCONF.
Шаблоны управления устройствами YANG.
Управление устройствами.
Управление сервисами.
Сетевые транзакции.Модуль 5 – RESTCONF.
Принципы работы RESTCONF.
Сравнение RESTCONF и NETCONF.
Сценарии использования RESTCONF.Модуль 6 – Телеметрия.
Принципы сбора телеметрии.
Компоненты сбора телеметрии.
Транспортировка данных телеметрии.
Телеметрия в протоколах NETCONF и RESTCONF - NAUTO-04 — Использование framework’а VPP для разработки сетевых приложений
- Длительность: 3 дня (24 часа)
- Код курса: NAUTO-04
- Стоимость
- Очный формат: 537 000 ₸
- Онлайн формат: 514 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы программного управления аппаратными компонентами обработки сетевого трафика с использованием framework’а Vector Packet Processing.
Аудитория курса:
Инженеры, управляющие оборудованием корпоративной сети TCP/IP, а также специалисты, отвечающие за автоматизацию работы оборудования.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101, знания основ автоматизации на уровне курса NAUTO-00, а также знания общей теории программирования.
Содержание курса:
Модуль 1 – Состояние индустрии сетей TCP/IP.
Классический дизайн сети.
Виртуализация.
Топологии Clos’а и технологии DC Overlay.
Облачные технологии и построение платформы распределенных сервисов.
Процессоры и специализированные аппаратные сетевые компоненты.Модуль 2 – Виртуализация сетевых сервисов и компонентов.
Концепция Software-Defined Networking.
Концепция Network Function Virtualization.
Виртуальные коммутаторы.
Сетевые карты с программным управлением. SmartNIC.Модуль 3 – Архитектура DPDK.
Методы обработки пакетов аппаратными сетевыми компонентами.
Обработка пакетов в User-Space’е.
DPDK и NFV.
DPDK и виртуальные коммутаторы.
DPDK и сети SAN.Модуль 4 – Vector Packet Processing.
Архитектура и компоненты VPP.
Граф обработки пакетов.
Интеграция со стеком TCP/IP в ОС.
DPDK API.
Сценарии применения VPP.
Сценарии интеграции.
Оптимизация производительности. - NAUTO-05 — Управление и автоматизация сетей TCP/IP с NetBox
- Длительность: 5 дней (40 часов)
- Код курса: NAUTO-05
- Стоимость
- Очный формат: 682 500 ₸
- Онлайн формат: 668 500 ₸
Описание курса
О курсе:
Данный 5-дневный курс направлен на предоставление слушателям всестороннего понимания принципов, инструментов и методов работы с Netbox в своих организациях.
Аудитория курса:
Данная программа обучения предназначена для сетевых администраторов, системных администраторов и ИТ-специалистов, которые хотят получить всестороннее понимание NetBox, от базовых концепций до продвинутых тем. Участникам рекомендуется иметь базовое понимание сетевых концепций и знакомство с управлением ИТ-инфраструктурой.
Предварительные требования к аудитории:
Базовые знания сетевых концепций (адресация IP, подсети, VLAN и т. д.)
Знакомство с компонентами ИТ-инфраструктуры (маршрутизаторы, коммутаторы, серверы и т. д.)
Понимание баз данных и веб-приложений
Опыт управления сетевой инфраструктурой будет полезным, но не обязательнымСодержание курса:
Модуль 1: Введение в Netbox и управление инфраструктурой
Введение в Netbox: обзор, преимущества и области применения
Установка и настройка: требования, варианты установки и основы конфигурации
Пользовательский интерфейс Netbox: навигация, ключевые функции и управление учетными записями
Управление инвентарными данными: создание и управление устройствами, стойками и производителями
IP Address Management (IPAM): основы адресации IP и управления подсетями в Netbox
Лабораторная работа 1: Настройка Netbox и начальная конфигурацияМодуль 2. Управление устройствами и подключениями
Device Management: добавление и настройка устройств, типов устройств и пользовательских полей
Rack Management: моделирование стоек, панелей соединения и управление взаимосвязями
Подключение устройств: Понимание управления кабелями, интерфейсами и подключением устройств
Circuit Management: Настройка и отслеживание сетевых подключений
Лабораторная работа 2: Управление устройствами и подключениямиМодуль 3: Документирование и визуализация инфраструктуры
Site Management: управление физическими местоположениями, зданиями и комнатами в Netbox
Визуализация: создание карт топологий, диаграмм связей и настраиваемых макетов
Документирование: конфигурация, управление изменениями и генерация отчетов
Labels, tags и tenancy: использование меток, тегов и функций тенантов для организации и фильтрации
Лабораторная работа 3: Документирование и визуализация инфраструктурыМодуль 4: Управление IP-адресами и интеграция
Управление IP-адресами: IP-адресация, управление подсетями и интеграция с DHCP
Интеграция с DNS: настройка интеграции с DNS, управление записями DNS и синхронизация DNS
REST API: понимание и использование RESTful API Netbox для автоматизации
Лабораторная работа 4. Управление IP-адресами и интеграцияМодуль 5: Продвинутые темы в Netbox и автоматизация
Настойка: создание пользовательских полей, шаблонов и сценариев
Роли и разрешения: управление пользовательскими ролями, разрешениями и контролем доступа в Netbox
Плагины и расширения: изучение доступных плагинов и расширение функциональности Netbox
Вопросы безопасности: реализация мер безопасности и обеспечение безопасности развертывания Netbox
Автоматическое заполнение инвентаря: использование инструментов и техник автоматизации для автоматического заполнения инвентаря Netbox
Лабораторная работа 5. Продвинутые темы и автоматизация - SA-01 — Управление данными для современных предприятий
- Длительность: 5 дней (40 часов)
- Код курса: SA-01
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 695 500 ₸
Описание курса
Описание курса:
Успешное развитие культуры управления данными является ключевой задачей в дальнейшем “выживании” предприятий. Принятие любых стратегических или тактических решений без связи с реальными данными приведет к потерям и утрате возможней для бизнеса. Учитывая опыт ведущих консалтинговых компаний и лидеров индустрии, мы рассмотрим как спланировать и внедрить программу Data Governance, увидеть недостающие звенья в вашей организации для высвобождения всего потенциала данных, а также рассмотрим технические аспекты управления данными.
Аудитория курса:
Для руководителей CDO, CIO
Специалистов в Data Management
Проектных менеджеров, Бизнес-аналитиков
КонсультантовПо окончании курса слушатели смогут:
Знания в области управления данными
Умения анализировать, выявлять и обосновывать необходимость внедрения подходов Data Governance
Навыки планирования проектов по внедрению программ Data GovernanceСодержание курса:
Модуль 1 — Введение в дисциплину управления данными (DAMA 2.0)
Концепция управления данными и ее ключевые аспекты
Фреймворки управления данными
Data Governance и Data Management
Архитектура Данных, моделирование данных, организация хранения данных
Безопасность данных
Интеграция данных
Управление корпоративным контентом
Meta, Master и Reference data management
Качество данных (Data Quality)
Big Data и Data Science
Data Management Organization и Organizational Change ManagementМодуль 2 — Бизнес-кейс для Data Governance
Постановка целей
Описание компонентов
Синтезирование Бизнес-кейсаМодуль 3 — Планирование внедрения Data Governance
Разработка программы и подготовка команды изменений
Выявление границ изменений на предприятиии
Оценка готовности к изменениям
Создание видения,миссии и плана
Выявление бизнес-потребностей и проблем
Формулирование ценности для бизнеса, ожидаемой от Data Governance
Ревью созданных бизнес-кейсов
Формулирование сценариев использования, демонстрирующих создаваемую ценность
Разработка операционной модели, архитектуры и процессов управления
Разработка дорожной карты и плана внедренияМодуль 4 — Операционализация и изменения
Развертывание изменений в соответствии с roll-out планом
Управление ожиданиями заинтересованных лиц и коммуникациями
Измерение промежуточных результатов, метрик и достижения OKR
Мониторинг рисков, устранение блоков и поддержка перехода к новой операционной модели - SA-02 — Системный анализ цифровых решений
- Длительность: 5 дней (40 часов)
- Код курса: SA-02
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 695 500 ₸
Описание курса
Описание курса:
Системный анализ на протяжении многих лет является одной из самых важных дисциплин, позволяющих создавать продуманные технические решения для цифровых продуктов и сервисов. С развитием технологий и подходов инструментарий системного аналитика увеличился и требования к его компетенции возросли.
Аудитория курса:
Бизнес и Системных Аналитиков
Разработчиков
Архитекторов решенийПосле прохождения тренинга:
Рабоать с требованиями в Agile командах
Проектировать сервисы и программные интерфейсы
Разрабатывать пользовательские интерфейсы
Создавать технические спецификации готовые к реализации
Сопровождать команду разработки при реализации требованийПрограмма курса:
Модуль 1 — Системный анализ в IT
Какую ценность создает системный аналитик и как помогает IT командам создавать эффективные решения
Ключевые компетенции системного аналитика
Роль и задачи системного аналитика на этапах жизненного цикла программного решенияМодуль 2 — Основы системной архитектуры информационных систем
Монолитные и распределенные архитектуры (Service-Based Architecture, Space-Based Architecture, EDA, микросервисы)
Архитектурные паттерны и антипаттерныМодуль 3 — Введение в методологии разработки ПО
Работа в Agile проектах , особенности фреймворков (Scrum, Kanban)
Domain-Driven DesignМодуль 4 — Управление требованиями
Управление требованиями по BABOK 3.0
Инструменты и техники бизнес-анализа на службе системного аналитика
Выявление, анализ и формализация требований к системе и подсистемМодуль 5 — Создание спецификаций требований и артефактов системного анализа
Использование подходов IDEF, UML, ARIS
Практическое применение BPM для системного анализа процессов
Описание технической документаций и поддержка команд разработки
Взаимодействие с разными участниками проекта, построение эффективных коммуникаций в Agile командахМодуль 6 — Анализ данных, описание моделей данных, работа с базами данных
Логические и физические модели данных
Интеграция данных
Основы проектирования баз данных, практическая работа с базами данных, написание запросов и анализ данныхМодуль 7 — Проектирование пользовательских интерфейсов
UX дизайн и его элементы, используемые при системном анализе
Использование инструмента Figma, создание wireframesМодуль 8 — Проектирование программных интерфейсов
Подходы к проектированию API
Протокол HTTP и архитектура REST
RESTful и RMM
Работа со swagger и postman
IBM
- BQ105G — IBM QRadar SIEM Foundations
- Длительность: 3 дня (24 часа)
- Код курса: BQ105G
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 783 000 ₸
Описание курса
Course Description
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
Objectives
After completing this course, you should be able to perform the following tasks:
Describe how QRadar collects data to detect suspicious activities
Describe the QRadar architecture and data flows
Navigate the user interface
Define log sources, protocols, and event details
Discover how QRadar collects and analyzes network flow information
Describe the QRadar Custom Rule Engine
Utilize the Use Case Manager app
Discover and manage asset information
Learn about a variety of QRadar apps, content extensions, and the App Framework
Analyze offenses by using the QRadar UI and the Analyst Workflow app
Search, filter, group, and analyze security data
Use AQL for advanced searches
Use QRadar to create customized reports
Explore aggregated data management
Define sophisticated reporting using Pulse Dashboards
Discover QRadar administrative tasksAudience
This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM.
Prerequisites
Before taking this course, make sure that you have the following skills:
IT infrastructure
IT security fundamentals
Linux
Windows
TCP/IP networking
SyslogTopics
Unit 0: IBM Security QRadar 7.5 — Fundamentals
Unit 1: QRadar Architecture
Unit 2: QRadar UI — Overview
Unit 3: QRadar — Log Source
Unit 4: QRadar flows and QRadar Network Insights
Unit 5: QRadar Custom Rule Engine (CRE)
Unit 6: QRadar Use Case Manager app
Unit 7: QRadar — Assets
Unit 8: QRadar extensions
Unit 9: Working with Offenses
Unit 10: QRadar — Search, filtering, and AQL
Unit 11: QRadar — Reporting and Dashboards
Unit 12: QRadar — Admin ConsoleIn this 3-day instructor-led course, you learn how to perform the following tasks:
Describe how QRadar collects data to detect suspicious activities
Describe the QRadar architecture and data flows
Navigate the user interface
Define log sources, protocols, and event details
Discover how QRadar collects and analyzes network flow information
Describe the QRadar Custom Rule Engine
Utilize the Use Case Manager app
Discover and manage asset information
Learn about a variety of QRadar apps, content extensions, and the App Framework
Analyze offenses by using the QRadar UI and the Analyst Workflow app
Search, filter, group, and analyze security data
Use AQL for advanced searches
Use QRadar to create customized reports
Explore aggregated data management
Define sophisticated reporting using Pulse Dashboards
Discover QRadar administrative tasksExtensive lab exercises are provided to allow learners an insight into the routine work of an IT Security Analyst operating the QRadar SIEM platform. The exercises cover the following topics:
Architecture exercises
UI Overview exercises
Log Sources exercises
Flows and QRadar Network Insights exercises
Custom Rule Engine (CRE) exercises
Use Case Manager app exercises
Assets exercises
App Framework exercises
Working with Offenses exercises.
Search, filtering, and AQL exercises
Reporting and Dashboards exercises
QRadar Admin tasks exercises - BQ205G — IBM QRadar SIEM Advanced Topics
- Длительность: 2 дня (16 часов)
- Код курса: BQ205G
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 673 000 ₸
Описание курса
QRadar SIEM provides deep visibility into network, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses.
This 2-day instructor-led course walks you through various advanced topics about QRadar such as custom log sources, reference data collections and custom rules, X-Force data and the Threat Intelligence app, UBA and QRadar Advisor, tuning and custom action scripts. The course also discusses integration with IBM SOAR. Hands-on exercises reinforce the skills learned.
The lab environment for this course uses the IBM QRadar SIEM 7.5 platform.
Objectives
Learn how to create custom log sources
Discover how to work with reference data collections and custom rules
Use X-Force data and Threat Intelligence app
Use the Use Case Manager app
Learn how to use UBA and QRadar Advisor
Discover Tuning
Explore Custom action scriptsDiscuss Integration with IBM SOAR
Audience
This course is designed for security administrators and security analysts.
Prerequisites
Students should be knowledgeable about the following topics:
IT infrastructure
IT security fundamentals
Linux
Windows
TCP/IP networking
Syslog
Foundational skills for the IBM QRadar Security Intelligence Platform (at least the skills that are taught in the IBM QRadar SIEM Foundations — BQ105 course)Topics
Unit 1: Custom log sources
Unit 2: Reference data collections and custom rules
Unit 3: IBM X-Force Threat Intelligence in QRadar
Unit 4: User Behavior Analytics and Advisor with Watson
Unit 5: Tuning
Unit 6: Custom action scripts
Unit 7: IBM SOAR integration - BQ405GUA — QRadar SOAR: Foundations
- Длительность: 2 дня (16 часов)
- Код курса: BQ405GUA
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 512 000 ₸
Описание курса
Course Description:
In this course, you learn about the IBM Security® QRadar® SOAR architecture, and how to position the product in your company’s security architecture design. You gain hands-on experience with the SOAR interface, by investigating and managing cases and users with the SOAR Breach Response module, playbooks, and email integration.
Objectives
In this course, you learn about the following topics:
QRadar SOAR architectural patterns
Install the product, and configure license and access
Review the SOAR Console
Manage cases
Utilize the concept of artifacts
Utilize case management capabilities
Integrate email system for users and case management
Focus on the Breach Response module
Gain hands-on experience with the SOAR platform
Design playbooks
Integrate IBM and third-party solutions with SOARAudience
Security operations center (SOC) Administrator
SOC Analyst
Security Analyst
Incident Responder
Managed Service Security Provider (MSSP)Topics
Getting started
Describe architectural patterns
Install the product and configure license and access
Review the SOAR Console
Manage cases and use Breach Response add-on
Utilize the concept of artifactsCase management and email integration
Utilize case management capabilities
Integrate email system for users and case management
Focus on the Breach Response modulePlaybooks and integrations
Gain hands-on experience with the SOAR platform
Design playbooks
Integrate IBM and third-party solutions with SOAR - 0G53BUA — IBM SPSS Statistics Essentials (V26)
- Длительность: 2 дня (16 часов)
- Код курса: 0G53BUA
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 530 500 ₸
Описание курса
Course overview
This course guides students through the fundamentals of using IBM SPSS Statistics for typical data analysis. Students will learn the basics of reading data, data definition, data modification, data analysis, and presentation of analytical results. In addition to the fundamentals, students will learn shortcuts that will help them save time. This course uses the IBM SPSS Statistics Base; one section presents an add-on module, IBM SPSS Custom Tables.
Course objectives
Introduction to IBM SPSS Statistics
Reading data and defining metadata
Selecting cases for analyses
Transforming variables
Using functions to transform variables
Setting the unit of analysis
Merging data files
Summarizing individual variables
Describing the relationship between variables
Creating presentation-ready tables with Custom Tables
Customizing pivot tables
Working with syntaxControlling the IBM SPSS Statistics environment
Audience
New users of IBM SPSS Statistics
Users who want to refresh their knowledge about IBM SPSS Statistics
Anyone who is considering purchasing IBM SPSS StatisticsPrerequisites
Knowledge of your business requirements
Course topics
1. Introduction to IBM SPSS Statistics
Review basic concepts in IBM SPSS Statistics
Identify the steps in the research process
Review basic analyses
Use Help2. Reading data and defining metadata
Overview of data sources
Read from text files
Read data from Microsoft Excel
Read data from databases
Define variable properties3. Selecting cases for analyses
Select cases for analyses
Run analyses for groups
Apply report authoring styles4. Transforming variables
Compute variables
Recode values of categorical and scale variables
Create a numeric variable from a string variable5. Using functions to transform variables
Use statistical functions
Use logical functions
Use missing value functions
Use conversion functions
Use system variables
Use the Date and Time Wizard6. Setting the unit of analysis
Remove duplicate cases
Create aggregate datasets
Restructure datasets7. Merging data files
Add cases from one dataset to another
Add variables from one dataset to another
Enrich a dataset with aggregated information8. Summarizing individual variables
Define levels of measurement
Summarizing categorical variables
Summarizing scale variables9. Describing the relationship between variables
Choose the appropriate procedure
Summarize the relationship between categorical variables
Summarize the relationship between a scale and a categorical variable10. Creating presentation-ready tables with Custom Tables
Identify table layouts
Create tables for variables with shared categories
Create tables for multiple response questions11. Customizing pivot tables
Perform Automated Output Modification
Customize pivot tables
Use table templates
Export pivot tables to other applications12. Working with syntax
Use syntax to automate analyses
Create, edit, and run syntax
Shortcuts in the Syntax Editor13. Controlling the IBM SPSS Statistics environment
Set options for output
Set options for variables display
Set options for default working foldersa - 0G51AUA — Statistical Analysis Using IBM SPSS Statistics (V25)
- Длительность: 2 дня (16 часов)
- Код курса: 0G51A
- Стоимость
- Очный формат: По запросу
- Онлайн формат: 530 500 ₸
Описание курса
Course overivew
This course provides an application-oriented introduction to the statistical component of IBM SPSS Statistics. Students will review several statistical techniques and discuss situations in which they would use each technique, how to set up the analysis, as well as how to interpret the results. This includes a broad range of techniques for exploring and summarizing data, as well as investigating and testing relationships. Students will gain an understanding of when and why to use these various techniques as well as how to apply them with confidence, interpret their output, and graphically display the results.
Course objectives
Introduction to statistical analysis
Examine individual variables
Test hypotheses about individual variables
Test the relationship between categorical variables
Test on the difference between two group means
Test on differences between more than two group means
Test the relationship between scale variables
Predict a scale variable: Regression
Introduction to Bayesian statistics
Overview of multivariate proceduresAudience
Anyone who has worked with IBM SPSS Statistics and wants to become better versed in the basic statistical capabilities of IBM SPSS Statistics Base.
Anyone who wants to refresh their knowledge and statistical experience.Prerequisites
Familiarity with basic concepts in statistics, such as measurement levels, mean, and standard deviation.
Familiarity with the windows in IBM SPSS Statistics either by experience with IBM SPSS Statistics (version 18 or later) or completion of the IBM SPSS Statistics Essentials (V25) course.Course topics
1. Introduction to statistical analysis
Identify the steps in the research process
Principles of statistical analysisExamine individual variables
Identify measurement levels
Chart individual variables
Summarize individual variables
Examine the normal distribution
Examine standardized scoresTest hypotheses about individual variables
Identify population parameters and sample statistics
Examine the distribution of the sample mean
Determine the sample size
Test a hypothesis on the population mean
Construct a confidence interval for the population mean
Tests on a single variable: One-Sample T Test, Paired-Samples T Test, and Binomial TestTest the relationship between categorical variables
Chart the relationship between two categorical variables
Describe the relationship: Compare percentages in Crosstabs
Test the relationship: The Chi-Square test in Crosstabs
Assumptions of the Chi-Square test
Pairwise compare column proportions
Measure the strength of the associationTest on the difference between two group means
Compare the Independent-Samples T Test to the Paired-Samples T Test
Chart the relationship between the group variable and scale variable
Describe the relationship: Compare group means
Test on the difference between two group means: Independent-Samples T Test
Assumptions of the Independent-Samples T TestTest on differences between more than two group means
Describe the relationship: Compare group means
Test the hypothesis of equal group means: One-Way ANOVA
Assumptions of One-Way ANOVA
Identify differences between group means: Post-hoc testsTest the relationship between scale variables
Chart the relationship between two scale variables
Describe the relationship: Correlation
Test on the correlation
Assumptions for testing on the correlation
Treatment of missing valuesPredict a scale variable: Regression
What is linear regression?
Explain unstandardized and standardized coefficients
Assess the fit of the model: R Square
Examine residuals
Include 0-1 independent variables
Include categorical independent variablesIntroduction to Bayesian statistics
Bayesian statistics versus classical test theory
Explain the Bayesian approach
Evaluate a null hypothesis: Bayes Factor
Bayesian procedures in IBM SPSS Statistics2. Overview of multivariate procedures
Overview of supervised models
Overview of models to create natural groupings
Kubernetes
- ANT_KU101 — Kubernetes и Docker
- Длительность: 5 дней (40 часов)
- Код курса: ANT_KU101
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 690 000 ₸
Описание курса
Описание курса:
Материал данного курса дает слушателям знания и практический опыт работы с системой контейнеризации
Kubernetes, которые они впоследствии смогут использовать для развертывания, управления и масштабирования контейнерных приложений.Аудитория курса:
Инженеры DevOps, разработчики ПО, системные администраторы и IT-специалисты, желающие получить углубленные знания и опыт работы с технологиями Docker и Kubernetes.
Предварительные требования к аудитории:
Необходимо знание основ работы с сетями и концепций виртуализации, а также владение интерфейсом командной строки Linux или знания в области системного администрирования. Опыт разработки и развертывания ПО будет полезен, но не обязателен.
Содержание курса:
Модуль 1 – Основы Docker
Введение в контейнерную виртуализацию и Docker
Архитектура и компоненты Docker
Установка и первичная настройка Docker
Образы и контейнеры
Перенос приложений в Docker
Лабораторная работа 1 Установка Docker и запуск контейнеров.
Лабораторная работа 2 Создание мульти-контейнерного приложения с
помощью Docker ComposeМодуль 2 – Основы Kubernetes
Введение в Kubernetes
Архитектура и компоненты Kubernetes
Внедрение Kubernetes
Объекты Kubernetes
Pods
Services
Deployments
Масштабирование и обновление приложений в Kubernetes
Лабораторная работа 3 Установка и настройка Kubernetes
Лабораторная работа 4 Запуск и обслуживание приложений в KubernetesМодуль 3 – Расширенные возможности Kubernetes
Сетевые настройки Kubernetes и Service Discovery
Настройка Persistent Storage в Kubernetes
Продвинутые стратегии развертывания
Rolling Updates
Canary Deployments
Использование Config Maps и Secrets
Мониторинг и журналирование в Kubernetes
Лабораторная работа 5 Масштабирование приложений с Persistent Storage в KubernetesМодуль 4 – Безопасность и обслуживание Kubernetes
Обеспечение безопасности Kubernetes кластеров
Role-Based Access Control в Kubernetes
Обслуживание Secrets и шифрование
Обслуживание конфигурации приложений
Поиск и устранение неполадок в Kubernetes
Лабораторная работа 6 Внедрение политик RBAC и повышение безопасности кластера KubernetesМодуль 5 – Дополнительные инструменты Kubernetes
Операторы
Custom Resource Definitions (CRD)
Менеджер пакетов Helm
Введение в Istio Service Mesh
Применение CI/CD в Kubernetes
Лабораторная работа 7 Внедрение и обслуживание приложений с помощью Helm - ANT_KU102 — Администрирование Kubernetes
- Длительность: 5 дней (40 часов)
- Код курса: ANT_KU102
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 690 000 ₸
Описание курса
Описание курса:
Материал данного курса знакомит слушателей с основами администрирования системы дирижирования контейнерными приложениями. Кроме того, на курсе рассматриваются вопросы выполнения операционных задач в кластере Kubernetes, а также вопросы обеспечения её отказоустойчивости и надежности.
Аудитория курса:
Курс подходит для IT-специалистов, системных администраторов, разработчиков ПО и других специалистов, занимающихся администрированием и развертыванием инфраструктуры на базе Kubernetes.
Предварительные требования к аудитории:
Необходимо знание основных понятий и инструментов облачных вычислений, опыт работы с Docker и контейнеризацией, а также базовое понимание сетевых технологий и умение работать в командной строке. Понимание концепций микросервисной архитектуры будет полезно, но не обязательно.
Содержание курса:
Модуль 1 – Введение в Kubernetes и установка кластера
Проблемы контейнерных инфраструктур
Введение в Kubernetes
Архитектура Kubernetes
Подготовка и установка Kubernetes
Утилита kubectl
Лабораторная работа 1 Установка и настройка Kubernetes
Лабораторная работа 2 Проверка компонентов KubernetesМодуль 2 – Объекты и сетевые настройки
Понятие объектов Kubernetes
Pods, ReplicaSets, Deployments
Сетевые настройки Kubernetes и передача трафика в кластере
CNI плагины
Балансировщики нагрузки
Лабораторная работа 3 Настройка сети в Kubernetes
Лабораторная работа 4 Развертывание приложений в KubernetesМодуль 3 – Хранение данных приложений и хранение образов
Хранение данных кластера, CSI плагины
Persistent Volumes, Persistent Volume Claims, Storage Classes
Реестры образов, Harbor Registry
Config Maps и Secrets
Масштабирование приложений
Лабораторная работа 5 Установка и настройка Harbor Registry
Лабораторная работа 6 Создание и монтирование Persistent VolumesМодуль 4 – Управление ресурсами Kubernetes и повышение отказоустойчивости
Управление размещением приложений в кластере
Управление ресурсами приложений
Обеспечение отказоустойчивости
Резервное копирование и восстановление etcd базы данных
Управление доступом в кластер и Kubernetes RBAC
Лабораторная работа 7 Управление ресурсами приложений
Лабораторная работа 8 Управление планировщиком и мониторинг кластераМодуль 5 – Мониторинг и устранение неполадок Kubernetes
Обновление кластера Kubernetes
Журналирование кластера и узлов Kubernetes
Мониторинг приложений и контейнеров
Поиск и устранение неполадок
Обзор вспомогательных инструментов и утилит
Лабораторная работа 9 Мониторинг кластера Kubernetes и приложений
Лабораторная работа 10 Использование дополнительных инструментов - ANT_KU103 — GitOps в Kubernetes
- Длительность: 5 дней (40 часов)
- Код курса: ANT_KU103
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 690 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить возможности по интеграции Git c Kubernetes для автоматизации развертывания контейнерных приложений в рамках работы CI/CD pipeline’ов. Кроме того, на курсе также рассматриваются вопросы использования этой же интеграции для управления конфигурациями и настройками программных инфраструктур.
Аудитория курса:
Курс «GitOps в Kubernetes» подходит для IT-специалистов, системных администраторов разработчиков, инженеров по автоматизации, DevOps специалистов и администраторов систем, которые уже имеют базовые знания и опыт работы с Kubernetes и Git.
Предварительные требования к аудитории:
Слушатели должны иметь предварительный опыт работы с контейнеризацией, управлением версиями и использованием командной строки. Также желательно наличие опыта работы с CI/CD и понимание основных принципов DevOps.
Содержание курса:
Модуль 1 – Введение в GitOps
Роль GitOps в управлении инфраструктуры Kubernetes
Принципы GitOps
Инструменты GitOps и их применение в Kubernetes
Лабораторная работа 1 Подготовка инфраструктуры для GitOps
Лабораторная работа 2 Установка инструментов GitOpsМодуль 2 – Управление конфигурацией в GitOps
Использование Git для управления конфигурацией
Создание и управление манифестами Kubernetes
Лабораторная работа 3 Управление конфигурациями в GitOpsМодуль 3 – Автоматизация развертывания
Создание пайплайнов развертывания и обновления инфраструктуры
Интеграция GitOps с CI/CD инструментами
Контроль изменений и управление версиями кода в GitOps
Лабораторная работа 4 Автоматизация развертывания в GitOpsМодуль 4 – Обеспечение надежности и безопасности в GitOps
Управление безопасностью и доступом в GitOps
Резервное восстановление состояния систем
Откат изменений и обеспечение надежности инфраструктуры
Лабораторная работа 5 Резервное восстановление состояния
Лабораторная работа 6 Откат изменений инфраструктурыМодуль 5 – Оптимизация процессов разработки и доставки
Изучение лучших практик оптимизации процессов разработки доставки при помощи GitOps
Методы увеличения скорости развертывания и обновлений в среде Kuberentes
Лабораторная работа 7 Оптимизация процессов в GitOps - ANT_KU104 — Безопасность Kubernetes
- Длительность: 5 дней (40 часов)
- Код курса: ANT_KU104
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 690 000 ₸
Описание курса
Описание курса:
Материал данного курса знакомит слушателей с основными аспектами обеспечения безопасности в инфраструктурах Kubernetes и дает знания в таких областях, как:
подготовка и развертывание безопасных Kubernetes кластеров;
сетевая и системная безопасность Kubernetes;
устранение уязвимостей микросервисных приложений;
обеспечение безопасности образов и реестров приложений;
мониторинг и журналирование уязвимостей.Аудитория курса:
Курс разработан для IT-профессионалов, специализирующихся администрировании, развертывании и обеспечении безопасности инфраструктуры на базе Kubernetes. Также курс может быть полезен для разработчиков, занимающихся разработкой и тестированием кластеров Kubernetes, архитекторов, которые планируют внедрить Kubernetes в своих организациях, и специалистов по безопасности, заинтересованных в обеспечении безопасности контейнерных приложений.
Предварительные требования к аудитории:
Знание администрирования среды Kubernetes, включая понимание основных концепций управления контейнерными приложениями в Kubernetes, настройку и масштабирование кластеров, управление ресурсами, внедрение управление конфигурациями в Kubernetes.
Содержание курса:
Модуль 0 – Развертывание безопасного кластера
Модель угроз для кластера Kubernetes
Основные типы контроля доступа и механизмы их реализации в кластере Kubernetes.
Паттерны безопасности для кластера KubernetesМодуль 1 – Развертывание безопасного кластера
Сетевые политики безопасности
Защита узлов и компонентов Ingress
Ограничение GUI и других сервисов
Ограничение доступа к Kubernetes API
RBAC в кластерах Kubernetes
Управление сервисными аккаунтами
Лабораторная работа 1 Обеспечение базовой безопасности кластера KubernetesМодуль 2 – Системная безопасность
Минимизация поверхности для атак на уровне OS
Минимизация прав ролей IAM
Ограничение внешнего сетевого доступа
Инструменты обеспечения безопасности на уровне ядра
Лабораторная работа 2 Настройка инструментов системной безопасности KubernetesМодуль 3 – Устранение уязвимостей микросервисов
Домены безопасности уровня OS
Управление секретами в Kubernetes
Использование специализированных сред исполнения контейнеров
Использование mTLS для управления взаимодействия подов
Лабораторная работа 3 Обеспечение безопасной работы микросервисовМодуль 4 – Безопасность образов и реестров приложений
Минимизация образов приложений
Белые списки реестров и валидация образов
Защищенные реестры образов
Статический анализ приложений
Обнаружение уязвимостей в образах
Лабораторная работа 4 Обеспечение безопасности образов и реестровМодуль 5 – Мониторинг и журналирование сред выполнения контейнеров
Обнаружение вредоносного поведения на уровне узлов и контейнеров
Обнаружение уязвимостей физической инфраструктуры
Обнаружение фаз атак и их распространение
Идентификация и изучение вредоносного ПО в инфраструктуре
Консистентность контейнерных приложений
Лабораторная работа 5 Мониторинг безопасности работы кластера Kubernetes и приложений
Оптические коммуникации
- ANT-DW101 — Основы оптических коммуникаций
- Длительность: 3 дня (24 часа)
- Код курса: ANT-DW101
- Стоимость
- Очный формат: 589 000 ₸
- Онлайн формат: 566 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить технологии оптических коммуникаций: особенности использования света как переносчика информационного сигнала, оборудование, обеспечивающее работу сегментов оптических коммуникаций, механизмы повышения эффективности использования оптических линий, такие как DWDM. Также на курсе рассматриваются такие технологические стеки как SONET/SDN и OTN.
Аудитория курса:
Люди, начинающие знакомиться с технологиями оптических коммуникаций
Предварительные требования к аудитории:
Желательно обладать знаниями о т.н. электросвязи.
Дополнение:
Курс является теоретическим без лабораторных работ.
Содержание курса:
Модуль 1 – Основы оптических коммуникаций.
Сегменты применения оптических коммуникаций.
Развитие Optical Transport Network.
Типы развертывания
Типы протоколов, используемых в технологиях OTNМодуль 2 – Характеристики света как переносчика сигнала
Оптический спектр
Характеристики световой волны
Энергия света
Характеристики светового канала
Виды дисперсии света и светового канала
Методы компенсации дисперсии
Нелинейные эффекты светового каналаМодуль 3 – Оптическая модуляция.
Техники оптической модуляции
Символьная и битовая скорости
QAMМодуль 4 – Оптические передатчики.
Принципы работы оптических передатчиков
Лазеры
Лазерные диоды
Distributed Feedback Laser
Fabry Perot Laser
Физическое подключение диодных лазеров
Факторы производительности диодных лазеровМодуль 5 – Оптические ресиверы.
Принципы работы оптических ресиверов
Компоненты оптических ресиверов
Фотодиоды и когерентные детекторыМодуль 6 – Световой канал передачи данных.
Конфигурация оптоволокна
Типы оптоволокна
Типы оптоволоконного кабеля
Потери и помехи в оптоволокнеМодуль 7 – Системы DWDM.
Принципы работы DWDM
Компоненты DWDM
Оптические фильтры
Optical Protection Switch
Transponder Protection Tray
Оптические усилителиМодуль 8 – Типы оптических сетей.
Архитектура современных транспортных сетей
Сети PDH
Сети SONET/SDH
DWDM и OTN
Характеристики и требования оптических транспортных сетей
ROADM
Связь с логическими технологиями TCP/IPМодуль 9 – Архитектура и работа сетей SONET.
Основы технологий SONET
Фрейм SONET
Электрические и оптические скорости
Синхронизация
Топологии сети SONETМодуль 10 – Optical Transport Networks.
Принципы построения OTN
OTN over SONET/SDN
Мультиплексирование OTN
Компоненты Control Plane в OTN
LoRaWAN, Wi-Fi
- LRW-101 — Построение сетей LoRaWAN
- Длительность: 3 дня (24 часа)
- Код курса: LRW-101
- Стоимость
- Очный формат: 1 661 500 ₸
- Онлайн формат: 1 640 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить принципы, технологии и протоколы построения сетей LoRaWAN.
Аудитория курса:
Инженеры промышленных объектов, занимающиеся построение сетей LoRaWAN и беспроводными технологиями
Предварительные требования к аудитории:
Необходимо обладать знаниями о радиосвязи.Длительность курса:
4 дня.
Содержание курса:
Модуль 1 – Передача сигналов по стандарту LoRa.
Принципы передачи радиосигналов.
Цифровая модуляция.
Широкополосные сигналы.
Модуляция, используемая в
Скорость передачи данных в LoRa и LoRaWAN.
Энергетические характеристики приемо-передатчиков LoRa.Модуль 2 – Протокол LoRaWAN.
Архитектура сетей.
Конечное оборудование.
Каналы и активация конечного оборудования.
Типы фреймов и MAC-уровень.
Шлюзы LoRaWAN и сервер управления.
Архитектура микроконтроллеровМодуль 3 – Построение сервисной модели LoRaWAN.
Архитектура IoT платформы.
Работа с данными через протокол HTTTP.
Работа с данными через протокол MQTT.
Настройка и использование сервера управления ChirpStack.
Запуск приложений в IoT платформе.Модуль 4 – Решение специальных задач в сетях LoRaWAN.
Синхронизация времени.
Передача данных в режиме multicast.
Фрагментирование данных.
Роуминг.
Использование Join-сервера.
FUOTA. - LRW-TTS — Установка, настройка, управление The Things Stack
- Длительность: 3 дня (24 часа)
- Код курса: LRW-TTS
- Стоимость
- Очный формат: 1 928 000 ₸
- Онлайн формат: 1 897 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить возможности использования LoRaWAN Network Server’а The Things Stack версии Enterprise. Курс охватывает все аспекты работы с данным программным обеспечение, начиная с его установки.
Аудитория курса:
Инженеры промышленных объектов, занимающиеся построение сетей LoRaWAN и беспроводными технологиями
Предварительные требования к аудитории:
Необходимо обладать знаниями о стеке технологий LoRaWAN на уровне материала курса LRW-101.
Длительность курса:
3 дня.
Содержание курса:
Модуль 1 – Построение сервисной модели LoRaWAN.
Архитектура IoT платформы.
Работа с данными через протокол HTTTP.
Принципы с RESTfull API.
Работа с данными через протокол MQTT.
Работа с системой брокеров и распределенных очередей.
Платформы быстрого запуска микросервисных приложений.
Запуск приложений в IoT платформе.Модуль 2 – LoRaWAN сервер The Things Stack.
Архитектура и компоненты TTS версии Enterprise.
Варианты развертывания TTS Enterprise.
Функции Network Server’а.
Регистрация шлюзов и конечных устройств.
Использование разных стеков packet forwarder’ов.
Функции Service Discovery для работы кластера TTS.Модуль 3 – Интеграция TTS с другими компонентами и системами.
Использование Packet Broker’а для обмена трафиком с сетями LoRaWAN.
Интеграция с системами
Организации и использование TTS API.
Интеграция с IoT платформами.Модуль 4 – Поиск и устранение неисправностей TTS.
Методология поиска и устранения неисправностей.
Неисправности развертывания
Неисправности подключения шлюзов и конечных устройств - ANT-WiFi101 — Основы технологий Wi-Fi
- Длительность: 5 дней (40 часов)
- Код курса: ANT-WiFi101
- Стоимость
- Очный формат: 798 000 ₸
- Онлайн формат: 775 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы технологий беспроводной передачи данных семейства стандартов 802.11, также известных как Wi-Fi. На курсе рассматриваются вопросы построения радио части этих сетей беспроводной передачи данных, а также вопросы логической организации и управления этими сетями.
Аудитория курса:
Инженеры, начинающиеся заниматься сетями беспроводной передачи данных.
Предварительные требования к аудитории:
Необходимо обладать знаниями о работе сетей TCP/IP, а также общими представлениями о работе операционных систем.
Содержание курса:
Модуль 1 – Wireless LAN.
Семейство стандартов 802.11
Wi-Fi alliance
Компоненты WLAN
PoE и организация электропитания точек доступаМодуль 2 – Радиочастота и радиоспектр.
Характеристики электромагнитных волн.
Радиочастотный спектр.
Распространение радиосигнала и уравнение Фрииса.
Модуляция радиосигнала и её виды.Модуль 3 – Расчет параметров радиосигнала.
Единицы измерения радиосигнала, дБ и дБм, RSSI.
Мощность шума и мощность сигнала, SNR.Модуль 4 – Антенны.
Виды и типы антенн.
Поляризация, усиление, направленность сигнала.
Антенны точек доступа и антенны клиентских устройств.
Коннекторы для подключения антенн.
MIMO.Модуль 5 – Физический уровень 802.11. PHY.
Диапазоны частот 802.11.
Модуляция и кодирование. MCS.
Технологии формирования радиопотока.
DFS и TPCМодуль 6 – Сетевые устройства Wi-Fi.
Точки доступа.
Wireless bridge’ы.
Контроллеры точек доступа.
Клиентские устройства.
Радиочастотные параметры беспроводных устройств.Модуль 7 – Логический уровень 802.11.
Типы фреймов.
4-way handshake.
Выбор конечным устройством точки доступа.
Обмен EAP.Модуль 8 – Доступ к среде передачи.
DCF.
Обнаружение несущей и интервал между фреймами.
QoS и WMM.
RTS/CTS.
Управление мощность сигнала.Модуль 9 – Архитектура WLAN.
Функции контроллера точек доступа.
Коммутация трафика точками доступа.
Роуминг.
Режимы работы WLAN.Модуль 10 – Дополнительные функции WLAN.
BYOD и MDM.
Hotspot
RRM - ANT-EKH_ECSE — Ekahau Certified Solutions Engineer Design
- Длительность: 4 дня (32 часа)
- Код курса: ANT-EKH_ECSE
- Стоимость
- Очный формат: 712 000 ₸
- Онлайн формат: 685 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить работу с продуктами Ekahau для проектирования беспроводных сетей передачи данных, работающих по стандартам серии 802.11.
Аудитория курса:
Инженеры, занимающиеся проектированием беспроводных сетей Wi-Fi.
Предварительные требования к аудитории:
Необходимо обладать знаниями и опытом, предусмотренными программой CWNA.
Содержание курса:
Модуль 1 – Основы работы сетей стандартов 802.11.
Ekahau Connect & Product Family.
Логика проектирования Wi-Fi.
Принципы передачи радиосиналов.
Модуляция
Wi-Fi MCP Rates.
Wi-Fi каналы 2.4 ГГц, 5 ГГц, 6 ГГц.
Закон обратных квадратов.
Потери в свободном пространстве.
Ассоциация с точкой доступа.
Роуминг.
Загрузка канала.
Планирование емкости канала.
Планирование радиопокрытия.
Механизмы безопасности Wi-Fi.Модуль 2 – Моделирование объекта в Ekahau Desktop.
Требования к проекту.
Создание проекта небольшого офиса..
Работа с форматами CAD.
Работа с данными антенн.
Создание проекта большого офиса.
Создание проекта промышленного объекта.
3D моделирование нескольких этажей.
Auto-Planner.Модуль 3 – Проведение радиообследования.
Ekahau Sidekick.
Типы радиообследования.
Сбор данных при радиообследовании.
Оптимизация радиопокрытия.Модуль 4 – Поиск и устранение неисправностей .
Методика поиска и устранения неисправностей.
Анализ фреймов Wi-Fi.
Система отчетности Ekahau Reporting.
Анализ спектра.
OpenStack
- CL110 — Администрирование OpenStack часть 1
- Длительность: 5 дней (40 часов)
- Код курса: CL110
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 684 500 ₸
Описание курса
Описание курса:
Материал данного курса научит слушателей работать с OpenStack и управлять ресурсами облака для защиты и развертывания современных масштабируемых облачных приложений, сетей и хранилищ.
Аудитория курса:
Администраторы хранилищ и операторы облака, а также специалисты, ответственные за обслуживание приложений в частных или гибридных облаках OpenStack.
Предварительные требования к аудитории:
Опыт администрирования операционных систем.
Программа курса:
Модуль 1 – Введение в OpenStack.
Введение в OpenStack
Компоненты
Терминология
Базовая архитектураМодуль 2 – OpenStack Identity.
Identity Service
Компоненты Keystone
Projects
Groups и Users
Roles
QuotasМодуль 3 – Облачные вычисления.
Облачные вычисления
Виртуальные машины
Контейнеры
OpenStack Kolla
OpenStack MagnumМодуль 4 – Образы и шаблоны виртуальных машин.
Образы (images)
Параметры инстансов (flavor)Модуль 5 – Сетевые подключения в OpenStack.
Сети и подсети
Маршрутизаторы
Floating IP
Security Group
Key PairsМодуль 6 – Хранение данных в OpenStack.
Хранение данных в Openstack
Типы дисков
Volume
Snapshot
Shelve
Swift
S3 MiddlewareМодуль 7 – Дополнительные темы 1.
Cloud-init
Телеметрия
Stacks
Auto Scaling
Network QoS
Инфраструктура
CephМодуль 8 – Дополнительные темы 2.
Работа с образами
Интеграция мониторинга
S3 middleware - CL210 — Администрирование OpenStack часть 2
- Длительность: 5 дней (40 часов)
- Код курса: CL210
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 684 500 ₸
Описание курса
Описание курса:
Материал данного курса научит слушателей настройке, управлению и обслуживанию OpenStack, а также работе с основными компонентами и сервисами, используемыми в частных и гибридных облаках.
Аудитория курса:
Администраторы и операторы облака, а также специалисты, ответственные за поддержку частных и гибридных облаков.
Предварительные требования к аудитории:
Опыт администрирования гибридных облачных сред, а также знание материал курса Администрирование OpenStack часть 1.
Программа курса:
Модуль 1 – Day-0, Day-1 и Day-2 операции в облачных инфраструктурах.
Day-0 операции
Day-1 операции
Day-2 операцииМодуль 2 – Работа с образами виртуальных машин.
Форматы образов
diskimage-builderМодуль 3 – Хранение данных в облаке.
Хранилища в OpenStack
Ceph
Базовые неполадки Ceph
Установка с использованием cephadmМодуль 4 – Сети OpenStack.
Концепция SDN
Виды инкапсуляции
OpenStack Neutron
Сети в OpenStack
Modular Layer 2 plug-inМодуль 5 – Масштабирование ресурсов в облаке.
OpenStack Ironic
OpenStack Instance Migration
OpenStack Heat
OpenStack AutoScalingМодуль 6 – Хранение данных и резервное копирование.
Способы хранения данных
Резервирование хранения в Ceph
Erasure Code в Ceph
RBD Mirroing в Ceph
Резервное копирование в OpenStack
Сравнение Snapshot и BackupМодуль 7 – Устранение неполадок.
Управление состоянием хостов
Устранение сетевых неполадок OpenStack - CL260 — Система хранения данных Ceph
- Длительность: 5 дней (40 часов)
- Код курса: CL260
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 684 500 ₸
Описание курса
Описание курса:
Данный курс по Ceph охватывает все аспекты работы с этим мощным и гибким решением для распределенного хранения данных. Курс включает как теоретические лекции, подробно раскрывающие архитектуру, компоненты и функциональные возможности Ceph, так и практические лабораторные работы, направленные на глубокое понимание и освоение навыков настройки, управления и масштабирования кластеров Ceph.
Аудитория курса:
Курс предназначен для:
Системных администраторов и DevOps инженеров, которые хотят освоить Ceph для управления распределенными системами хранения.
Архитекторов IT-инфраструктуры, заинтересованных в проектировании решений с использованием Ceph.
Разработчиков, которым необходимо глубокое понимание работы с хранилищами данных для интеграции в свои приложения.
IT-менеджеров и специалистов по безопасности, заинтересованных в управлении большим объемом данных и обеспечении их сохранности.Предварительные требования к аудитории:
Для успешного прохождения курса участники должны обладать следующими знаниями и навыками:
Базовые знания сетевых технологий и архитектуры.
Опыт работы с системами Linux/Unix, уверенное использование командной строки.
Знание основ работы с хранилищами данных и файловыми системами.
Желательно, но не обязательно, опыт работы с оркестраторами контейнеров (например, Kubernetes) и виртуализации (например, OpenStack).Программа курса:
Модуль 1: Введение в Ceph
История и эволюция Ceph
Основные концепции и архитектура Ceph
Компоненты Ceph (OSD, Mon, MDS, RGW)
Преимущества и случаи использования CephМодуль 2: Основные операции и инструменты управления
Основные команды Ceph
Управление OSD, мониторами
Полезные утилиты и их использованиеМодуль 3: RADOS и хранение объектов
Модель хранения объектов в Ceph
Использование Librados API
Объектное хранилище и структуры данныхМодуль 4: CephFS — файловая система Ceph
Архитектура CephFS
Использование CephFS и сценарии использования
Клиенты CephFS и конфигурацияМодуль 5: RBD — Блочное хранилище
Архитектура RBD (RADOS Block Device)
Использование RBD с виртуальными машинами
Снапшоты и клонированиеМодуль 6: Безопасность и производительность
Настройка ACL и аутентификации
Инструменты мониторинга производительности
Параметры и оптимизация CephМодуль 7: Администрирование и масштабирование кластера
Практики резервного копирования и восстановления
Планирование и управление масштабированием
Топологии сети и распределение данныхМодуль 8: Практические сценарии использования
Интеграция с Kubernetes и Docker
Целевые задачи в DevOps и CI/CD процессах
Use Case: Ceph для больших данных и анализаМодуль 9: Репликация и удалённое восстановление
Конфигурация и использование DR (Disaster Recovery)
Репликация пулов и объектов
Использование Ceph в географически распределенных инфраструктурахМодуль 10: Новые возможности и развитие Ceph
Новые и предстоящие функции Ceph
Обзор последнего релиза и дорожной карты Ceph
Сообщество и участие в развитии Ceph - CL310 — Устранение неполадок OpenStack
- Длительность: 5 дней (40 часов)
- Код курса: CL310
- Стоимость
- Очный формат: 708 500 ₸
- Онлайн формат: 684 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям познакомиться с наиболее распространёнными проблемами в системах OpenStack и научиться эффективно решать их с помощью инструментов мониторинга, анализа логов и других методов.
Аудитория курса:
Инженеры, отвечающие за управление облачной инфраструктурой OpenStack.
Предварительные требования к аудитории:
Опыт работы с OpenStack
Знание архитектуры OpenStack и его основных компонентов
Опыт администрирования Linux-систем
Основы работы с сетями и концепциями виртуализацииСодержание курса:
Модуль 1 – Основы поиска и устранения неисправностей.
Введение в методы и практики устранения неполадок
Общие подходы и полезные инструменты
Логирование в OpenStack: настройка и обработка логовЛабораторная работа 1: Настройка логирования и реализация аналитики лог-файлов
Углублённый анализ логов для выявления проблем
Разбор частых проблем и ошибок, связанных с аутентификацией и авторизациейЛабораторная работа 2: Устранение ошибок аутентификации и авторизации
Модуль 2 – Неполадки сетевой инфраструктуры.
Устранение неполадок в сетях OpenStack
Анализ сетевой архитектуры Neutron
Диагностика проблем сети на уровнях L2 и L3Лабораторная работа 3: Диагностика и устранение неполадок в Neutron
Проблемы с маршрутизацией и сетевой безопасностью
Лабораторная работа 4: Решение проблем маршрутизации и безопасности в сети
Модуль 3 – Неполадки сервисов хранения данных.
Устранение неполадок в Cinder и Ceph
Общие проблемы с блоками хранения и хранилищами объектов
Методы диагностики и решения проблем производительностиЛабораторная работа 5: Отладка и устранение неполадок в Cinder и Ceph
Отказоустойчивость и восстановление данных
Лабораторная работа 6: Диагностика и решение проблем восстановления данных
Модуль 4 – Инстансы и образы инстансов.
Устранение неполадок в Nova и Glance
Проблемы запуска инстансов и взаимодействия с образами
Логирование и диагностика ошибокЛабораторная работа 7: Диагностика и устранение проблем в сервисах Nova и Glance
Управление и решение проблем ресурсов
Оптимизация и перенастройка инстансовЛабораторная работа 8: Решение проблем оптимизации и менеджмента ресурсов
Модуль 5 – Комплексная диагностика.
Интеграция и межсервисные связи
Устранение неполадок взаимодействия между различными сервисами OpenStack
Кейсы и примеры комплексных проблем
Работа с метриками и мониторингом производительностиЛабораторная работа 9: Решение интегрированных проблем в OpenStack
HAproxy
- ANT-HA101 — Балансировка нагрузки с HAproxy
- Длительность: 3 дня (24 часа)
- Код курса: ANT-HA101
- Стоимость
- Очный формат: 520 000 ₸
- Онлайн формат: 498 500 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям научиться организовывать балансировку нагрузки к корпоративным приложениями посредствам HAproxy.
Аудитория курса:
Системные администраторы, администраторы приложений.
Предварительные требования к аудитории:
Необходим опыт системного администрирования.
Длительность курса:
3 дня.
Содержание курса:
Модуль 1 – HAproxy.
Архитектура и компоненты HA-proxy
Установка HA-proxyМодуль 2 – Принципы и алгоритмы балансировки нагрузки.
Принципы балансировки нагрузки
TCP-based LB
HTTPS-based LB
Механизм proxy
Алгоритмы балансировки нагрузкиМодуль 3 – Управление трафиком.
Content switching
Использование URL пути и параметров
Использование HTTP заголовков
Перенаправление по URL
Использование геолокации
Правила изменения контентаМодуль 4 – Работа с серверами приложений.
Мониторинг серверов приложений при балансировке
Механизмы health-check
Мониторинг ошибок
Отправка оповещений
Механизмы persistenceМодуль 5 – Задачи администрирования HAproxy.
Логирование
SSL/TLS
Обеспечение безопасности HA-proxy
Функции High Availability
Aruba
- AR-DESIGN — Designing Aruba Solutions, Rev.20.11
- Длительность: 5 дней(40 часов)
- Код курса: AR-DESIGN
- Стоимость
- Очный формат: 1 198 500 ₸
- Онлайн формат: 1 043 000 ₸
Описание курса
Course description
This course teaches you how to plan and design enterprise Aruba campus wireless and wired networks. Hands-on labs give you experience with network design from information gathering to planning and high-level design including RF Planning, Redundant Campus Architecture design, and Remote Access Branch office design. This course teaches Aruba Mobility Network Design for Aruba Secure wireless and wired network deployments using Aruba Best Practices on how to plan and design enterprise campus networks including designing for redundancy and high availability. This course is approximately 40% lecture and 60% hands-on lab exercises.
Ideal candidate for this course
Typical candidates for this course are IT Professionals and Network Architects who will design and plan networks based on Aruba wired and wireless products and solutions.
Suggested prerequisites
The recommended prerequisites are the Aruba Certified Switching Associate (ACSA) and the Aruba Certified Mobility Associate (ACMA) certifications.
Topics
Determine Customer Requirements
Determine key Stakeholders expectations and requirements
Determine network usage and requirements
Identify applications to determine throughput and bandwidth, technologies, and products
Determine security requirements and Authentication and Compliance
Determine redundancy requirements
Determine roaming requirementsRF Planning
RF fundamentals
RF Planning and Site Survey
Determine the environment type
Document wireless RF coverage
Plan AP physical location
Selecting APs and antennas
Channel planning and AirmatchAruba Campus Design
Campus Topology
Aruba Campus WLAN logical architecture
Overview of Mobility Manager-based architecture
Planning the deployment architecture
Controller Scaling
Planning and selecting licenses
Using IRISWired Network Design
Selecting 2-tier or 3-tier architecture
VSP and backplane stacking
L2 vs. L3 design
Planning the access layer
Planning the aggregation/core layersNetwork Security
Clearpass features
Clearpass Server Design
Wireless Access Control
Wired access Control
IDS/IPSVLANs
Planning VLANs based on access control requirements
Planning Wired VLAN in a Multiple VLAN design
Planning for a wireless large flat VLAN designRedundancy
Designing types of redundancy: Mobility Master redundancy, mobility controller redundancy, AP redundancy, switch redundancy, and link-level redundancy
Mobility Master redundancy
Mobility Controller redundancy
Wired Network RedundancyPlanning Quality of Service
Determine what traffic needs to be prioritized - Overview of real-time applications such as voice and video
Explain the features the Aruba solutions provide for prioritizing traffic
Map traffic from wireless user device to AP, to controller, and then onto the wired networkVery High Density (VHD) Design
VHD Wireless network design
Planning VHD design for a Wired network
Planning High Density RF CoverageBranch and SMB Topologies
Designing Remote Access and Branch solutions
Remote Access Points
Activation using Aruba Activate
Aruba Instant APs (IAPs)
Wired solutions for the branchNetwork Management
Network Management introduction Airwave
Central
Netedit
LicensesNew Design
Start a new network design
Apply all that has been taught in this courseObjectives
After you successfully complete this course, expect to be able to
Plan and design enterprise Aruba campus wireless and wired networks.
Evaluate the requirements, and select the wired networking technologies for the design.
Evaluate the requirements, and select the wireless networking technologies for the design.
Plan and design an Aruba solution per the customer requirements.
Produce a detailed design specification document.
Recommend the solution to the customer. - AR-MI — Implementing Aruba Mobility, Rev. 20.11
- Длительность: 5 дней (40 часов)
- Код курса: AR-MI
- Стоимость
- Очный формат: 1 198 500 ₸
- Онлайн формат: 1 043 000 ₸
Описание курса
Course description
This course teaches the knowledge, skills and practical experience required to set up and configure advanced features on Aruba WLAN utilizing the AOS 8.X architecture and features. This course includes lectures and labs which provide the technical understanding and hands-on experience of configuring a redundant Mobility Master with two controllers and two APs. Participants will learn how install a redundant Aruba WLAN network with clustering while using many features like Multizone for guest access, voice optimization and tunneled node.This course includes the AirWave management system and troubleshooting commands.
The SWDI course provides the underlying material required to prepare candidates for the Aruba Certified Mobility Professional Exam.
Ideal candidate for this course
Typical candidates for this course are IT professionals who deploy Aruba WLAN with advanced features and individuals who need a basic understanding of AirWave.
Suggested prerequisites
Aruba Mobility Fundamentals, Rev. 20.11
Topics
Introduction
Review topics from the Aruba Mobility Fundamentals course
AP terminology
GUI Hierarchy
WLAN forwarding modes
Explain the features of AOS 8Mobility Master Redundancy
Explain VRRP setup
DB synchronization procedures
Validating MM DB synchronization
IPv6 support for the redundancyMobility Master and MC Operations
Grow the network to multiple controllers
Review the configuration hierarchy
MC deployments methods
Explain advanced license featuresMultizone
Describe Multizone
Explain Multizone AP functional flow
Describe the functions of primary and data zones
Troubleshooting Multizone setupIntroduction to MC clusters
Reviews advantages of a MC cluster
The cluster leader election process
Defines the MC cluster roles
AP and user mapping into a cluster
Requirements for hitless cluster failover
AP and user load balancing within the clusterMobility
Explain standard 802.11 roaming
Describes single and multi-controller roaming
Defines the advantages of cluster mobilityRole Derivation
Review of policies and rules
Explains role derivation using VSAs
Description of user rules
Description of authentication default roles
Explains how to troubleshoot role derivation
Role based ACLRemote Access
Review of all remote access methods RAP/ VIA / IAP-VPN / branch controller
Explains RAP certification and setup methods
Internal and external(CPPM) whitelisting of RAP
Configuration of RAP WLAN
Explores the options for RAP redundancy
Explains how to troubleshoot RAP setup
VIA configuration, downloading and installation
Explains how to troubleshoot VIA setupVoice Optimization
Review of voice QOS
Explanation of WMM
Description of UCC Heuristic and SDN API mode
Monitoring and troubleshooting voice connectionsMesh
Explains mesh networks and technology
Configuration of mesh clusters
Explains Tri-radio Mesh supportAdministration
Explains management accounts and password reset
Configuration of guest provisioning accounts
The use of authentication using RADIUS or TACACS
Describes how to disable console accessOperations
Explains how to upgrade new images
Describes AP preloading
Explains cluster in service upgrade
Auto roll backs of configuration
Describes loadable in service modulesAirGroup
Explains the Aruba AirGroup solution
Configuration of AirGroup with limitations
Explores the integration with ClearPass
Monitoring AirGroup servers and usersDynamic Segmentation
Explains Port-Based Tunnelling (PBT)
Explains User-Based Tunnelling (UBT)
Describes the interaction between switches and Mobility controllers
Explains how to troubleshoot tunnel connectionsAirWave Introduction
Explains the different features of AirWave
The use of groups and folders
AirWave features description
Configuration of device credentials and adding devicesAirWave Network Health
Explains diagnostic page indications
Describe network health graphs to identify network issues
Performance graphs to help in network planning
The use of clarity to direct administrator to the source of the problemAirWave Client and Device Troubleshooting
Explains how to find a client and troubleshoot association issues
Diagnosing associated client issues
Investigating client SNR
Describes AP, network and controller diagnosing
Explains how to monitor a MC cluster within AirWaveAirWave VisualRF, Reports and Alerts
Explains the different VirtualRF display options
Describes the VisualRF application monitoring
Configuration of triggers to create alerts
Generation of 22 type of reports as well as custom reportsObjectives
After you successfully complete this course, expect to be able to:
Explain the integration Mobility Masters and Mobility controllers
Describe redundancy giving the user seamless failover
Setup secure guest access using Multizone
Explain the uses and advantages of clustering
Describe user mobility in the wireless spectrum
Integrate voice over WiFi and give QOS
Explain how roles are assigned to users wireless or wired
Learn to setup remote access using RAPs or VIA
Describe how to create a mesh cluster
Learn the advantages given to AirGroup when leveraged on an Aruba network
Integrating wire users into the security given to wireless users
Learn how to use AirWave to monitor the health of the network
Learn how to useAirWave to troubleshoot client
Explain AirWave’s Virsual RF feature as well as alerts and triggers - AR-MFNDU — Aruba Mobility Fundamentals, Rev. 20.11
- Длительность: 3 дня (24 часа)
- Код курса: AR-MFNDU
- Стоимость
- Очный формат: 721 000 ₸
- Онлайн формат: 611 000 ₸
Описание курса
This course teaches the knowledge, skills and practical experience required to set up and configure a basic Aruba WLAN utilizing OS 8.X architecture and features. Using lecture and labs, this course provides the technical understanding and hands-on experience to configure a single Mobility Conductor with one controller and access points (APs) in the Aruba WLAN. Participants learn how to use Aruba hardware and ArubaOS to install and build a complete, secure controller network with multiple SSIDs. This course provides the material required to prepare candidates for the Aruba Certified Mobility Associate (ACMA) certification exam.
Audience
Ideal candidates for this course are IT professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies.
Course objectives
After successful completion of this course, you should be able to:
Explain how Aruba’s wireless networking solutions meet customers’ requirements
Explain fundamental WLAN technologies, radio frequency (RF) concepts, and 80211 Standards
Learn to configure the Mobility Conductor and Mobility Controller to control access to the employee and guest WLAN
Control secure access to the WLAN using Aruba firewall policies and roles
Recognize and explain radio frequency bands and channels, and the standards used to regulate them
Describe the concept of radio frequency coverage and interference, including successful implementation and diagnosis of WLAN systems
Identify and differentiate antenna technology options to ensure optimal coverage in various deployment scenarios
Describe RF power technology including signal strength, how it is measured and why it is critical in designing wireless networks
Learn to configure and optimize Aruba Adaptive Radio Management (ARM), and Client Match and Client Insight features
Learn how to perform network monitoring functions and troubleshootingWhy HPE Education Services?
Comprehensive worldwide HPE technical, IT industry and personal development training
Training and certification preparation for ITIL®, Security, VMware®, Linux, Microsoft and more
Innovative training options that match individual learning styles
Anytime, anywhere remote learning via HPE Digital Learner subscriptions
Verifiable digital badges for proof of training, skill recognition and career development
Simplified purchase options with HPE Training CreditsDetailed course outline
WLAN Fundamentals
Describe the fundamentals of 80211, RF frequencies and channels
Explain RF patterns and coverage including signal to noise ratio (SNR)
Roaming standards and QOS requirementsMobile First Architecture
Mobile First Architecture
OS 8.X architecture and features
License types and distributionMobility Conductor Mobility Controller Configuration
Understand groups and subgroups
Different methods to join Mobility Controller with Mobility Conductor
Understand hierarchical configurationSecure WLAN Configuration
Identify WLAN requirements such as SSID name, encryption, authentication
Explain AP group structure and profiles
Configure the WLAN using the Mobility Conductor GUIAP Provisioning
Describe the communication between the AP and Mobility Controller
Explain the AP booting sequence and requirements
Explore the AP’s controller discovery mechanisms
Explain how to secure AP-to-controller communication using CPSec
Describe AP provisioning and operationsWLAN Security
Describe 802.11 discovery, authentication and association
Explore various authentication methods, 802.1x with WPA/WPA2, Mac auth
Describe the authentication server communication
Explain symmetric vs asymmetric keys, encryption methods
Describe wireless intrusion protection systems (WIPS) along with rogue discovery and protectionFirewall Roles and Policies
Introduce firewall roles and policies
Explain Aruba’s identity-based firewall
Configuration of policies and rules including aliases
Explain how to assign roles to usersDynamic RF Management
Explain how ARM calibrates the network selecting channels and power settings
Explore OS 8.X AirMatch to calibrate the network
How Client Match and Client Insight match steers clients to better APsGuest Access
Introduce Aruba solutions for guest access and the captive portal process
Configure secure guest access using the internal captive portal
Configure captive portal using Clearpass and discuss its benefits
Create a guest provisioning account
Troubleshoot guest accessNetwork Monitoring and Troubleshooting
Use the Mobility Conductor dashboard to monitor and diagnose client, WLAN and AP issues
Traffic analysis using APPrf with filtering capabilities
AirWave capabilities for monitoring and diagnosing client, WLAN and AP issues - AR-IAPC — Configuring Networking IHnsPtEa nAtr AubPas, Rev. 21.21
- Длительность: 3 дня (24 часа)
- Код курса: AR-IAPC
- Стоимость
- Очный формат: 721 000 ₸
- Онлайн формат: 611 000 ₸
Описание курса
Course description
The lab-intensive HPE Aruba Networking Instant AP course is designed to provide students the knowledge, skills, and practical experience required to set up and configure an Instant AP cluster with WLAN. Using lecture and labs, the class provides the technical understanding and hands-on experience of configuring a WLAN with a cluster of Instant APs. Candidates will also learn to configure with 802.1X and captive portal authentication, and firewall settings. The class also provides troubleshooting skills. Other topics covered are advanced services such as ARM, mesh setup, VPN to a controller, roaming between clusters, IDS/IPS and, configuring IoTs. This Instant AP class can be coupled with an AirWave or HPE Aruba Networking Central class for management and configuration purposes.
Ideal candidate for this course
This course is ideal for technical personnel who want to deep-dive into HPE Aruba Networking Instant Access Points
Topics
Instant AP introduction
Description and features Instant AP clusters
VC election
Country codes
GUI interface
Initial setup
Dynamic installationWLAN
WLAN wizard
WLAN VLAN selection
WLAN authentication
Instant SSID
ZonesCaptive portal
Configuring captive portal
VLAN assignment and Guest Roles
CP Page
Splash page
External CPFirewall
Access rules
Unrestricted, network based role based rules
Extended actions
Role derivationAirGroup
AirGroup features
Configuration of AirGroup in an Instant AP cluster
AirGroup between clusters
Monitoring AirGroupsMonitoring and troubleshooting
Client GUI page
Client view
Support commands
Instant AP logs
Instant AP GUI view
Instant AP network view (WLAN)
Spectrum analysis
AppRFARM
Introduction
Scanning
Indices
Band steering
Airtime fairness
Client match
RF neighborhood
Support commandsMesh, wired access and uplink
Mesh setup
Outdoor mesh
Wired access options and configuration
Uplink options and configurationRoaming
Roaming within a cluster
HAP table
Roaming between clusters
Roaming back home
Roaming load balancingVPN
VPN deployments
VPN tunneling
Controller Instant AP VPN configuration
DHCP L2 options ( L2 distributed, centralized)
DHCP L3 options ( L3 distributed, centralized)
VPN troubleshootingDHCP
DG, DHCP options
Local
Centralized
WLAN and infrastructure
TroubleshootingIDS/IPS
Classification
Attacks
Rogue detection
Containment
IDS monitoring and commandsAdministrative tasks
Backup and restore
Configuration reset and Instant AP reset
Converting Instant AP to RAP / CAP admin user roles
Certification
Centralized management optionsConfiguring IoT
Enabling Instant AP for IoT communications
Supported vendors
IoT radio types, radio, and modesObjectives
After you successfully complete this course, expect to be able to:
Be familiar with Instant AP types
Describe how to form an Instant AP cluster
Be familiar with different installation methods
Connect, reset, and set up an Instant AP (including VC)
Be familiar with types of WLAN settings
Describe methods for assigning a VLAN to a WLAN
Describe different security options while configuring the WLAN
Describe how to set up zones in Instant AP
Configure authentication and security and set up an Instant AP/ WLAN in a zone
Be familiar with various captive portal authentication options
Know how to configure internal and external captive portal pages
Be familiar with types or roles and rules that you can set up
Describe different options for role derivation
Describe limitations that can be applied to Instant AP uplink ports
Summarize features/advantages Instant APs provide in an AirGroup
Be familiar with the different AirGroup settings
Use AirGroup Dashboard to monitor servers
Be familiar with the dashboard and its monitoring capabilities
Invoke spectrum analysis to view spectrum
Look at applications used by clients on the network
Be familiar with ARM functions and features
Describe ClientMatch features
Describe RF Optimization methods for improving network performance
Be familiar with the mesh options and mesh monitoring commands.
Describe how to configure an Instant AP’s wired port for connectivity
Describe how to manage different uplink options
Be familiar with roaming clients in an L2/L3 environment
Client roaming in an L2 and L3 environment
Be familiar with Instant AP VPN setup
Learn the configuration steps for configuring VPN between Instant AP and Mobility Controller
Examine troubleshooting commands
Be familiar with the different deployment options of Instant APs
Understand the different options for configuring DHCP
Look at the BID process for subnet distribution
Troubleshoot client and Instant AP issues
Be familiar with the possible network attacks
Learn how rogue APs are detected and contained
Monitor and secure your network for intrusion by using IDS/IPS
Be familiar with managing firmware and update procedures
Learn how to back up and restore your configuration
Convert Instant APs into RAPS or CAPS
Be familiar with IoT
Configure and interface an IoT with the Instant AP
Be familiar with IoT Device authentication and filtering
Configure the Instant AP for the Zigbee communication
DevOps
- DO-00 — Основы DevOps подхода
- Длительность: 5 дней (40 часов)
- Код курса: DO-00
- Стоимость
- Очный формат: 761 000 ₸
- Онлайн формат: 738 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям изучить основы подхода DevOps и его основные инструменты. Будут изучены контейнеризация и использование Docker для развертывания и администрирования приложениями, Kubernetes для создания и управления кластерами контейнеров, Ansible для автоматизации и Terraform для администрирования инфраструктуры.
Аудитория курса:
Системные администраторы, разработчики, инженеры, которые заинтересованы в совершенствовании своих знаний в качестве разработчика и изучении методов DevOps.
Предварительные требования к аудитории:
Необходимы общие знания об операционных системах Linux и Windows, навыки работы с командной строкой и терминалом, предпочтительно иметь практику работы с виртуальными машинами. Также необходимо понимать методологию DevOps.
Содержание курса:
Модуль 1 – Docker.
Введение в Docker и его роль в DevOps
Установка Docker и его компонентов
Работа с Docker-контейнерами
Запуск приложений в Docker-контейнерах
Создание и управление Docker-контейнерами
Работа с Docker-образами
Использование Dockerfile для создания образовЛабораторная работа 1. Установка и настройка Docker
Лабораторная работа 2. Работа с контейнерами и образами
Модуль 2 – Kubernetes.
Введение в Kubernetes и его роль в оркестрации контейнеров
Установка Kubernetes и его компонентов
Понятие подов, служб и воспроизводимых контейнеров
Развертывание Kubernetes-кластера
Управление подами и службами в Kubernetes
Масштабирование и обновление приложений в KubernetesЛабораторная работа 3. Установка и настройка Kubernetes
Лабораторная работа 4. Запуск и масштабирование приложений в Kubernetes
Модуль 3 – Ansible.
Введение в Ansible и его роль в автоматизации конфигурации и развертывания
Установка и настройка Ansible
Создание и управление инвентаризацией и плейбуками Ansible
Написание простых плейбуков Ansible
Автоматизация развертывания приложений с помощью AnsibleЛабораторная работа 5. Установка и настройка Ansible
Лабораторная работа 6. Разработка плейбуков и ролей
Модуль 4 – Terraform.
Введение в Terraform и его роль в инфраструктурном кодировании
Установка и настройка Terraform
Создание, изменение и удаление инфраструктуры через Terraform
Создание и управление инфраструктурой с помощью Terraform
Использование переменных и модулей в TerraformЛабораторная работа 7. Установка и настройка Terraform
Лабораторная работа 8. Работа с манифестами Terraform
Модуль 5 – GitLab
Введение в системы контроля версий.
Обзор GitLab
Варианты установки Gitlab
Настройка GitLab
Работа с репозиториями
Интеграция GitLabЛабораторная работа 9. Работа с GitLab
Модуль 6 – CI/CD
Введение в CI/CD
Понятие и виды пайплайнов
Настройка пайплайнов в GitLab
Настройка пайплайнов в JenkinsЛабораторная работа 10. Разработка пайплайнов в GitLab
Лабораторная работа 11. Разработка пайплайнов в Jenkins
- DO-01 — Проектирование и создание DevOps pipeline’ов
- Длительность: 5 дней (40 часов)
- Код курса: DO-01
- Стоимость
- Очный формат: 761 000 ₸
- Онлайн формат: 738 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателям освоить принципы, методологию и инструменты DevOps, как, например, технология CI/CD и Ansible. Предусмотренные в курсе практические работы помогут закрепить освоенные инструменты и методики, а также успешно применять DevOps в своей работе.
Аудитория курса:
Системные администраторы, разработчики, инженеры DevOps, специалисты, которые заинтересованы в совершенствовании своих знаний в качестве разработчика и изучении методов DevOps.
Предварительные требования к аудитории:
Необходимы понимать принципы и применение Kubernetes и Docker, иметь навыки работы с командной строкой Linux и с системами контроля версий. Предпочтительно быть знакомым с написанием сценариев (Bash, Python).
Содержание курса:
Модуль 1 – Введение в DevOps.
Понимание принципов и преимуществ DevOps
Непрерывная интеграция (CI) и непрерывная доставка (CD)
Введение в инструменты DevOps и их роль в жизненном цикле разработки программного обеспечения
Лабораторная работа 1. Настройка конвейера CI/CDМодуль 2 – Инструменты и инфраструктура DevOps как код (IaC).
Управление конфигурацией с помощью Ansible
Инфраструктура как код (IaC) с помощью Terraform
Оркестрирование и автоматизация с помощью Ansible
Основы Ansible playbooks и roles
Лабораторная работа 2. Автоматизация подготовки инфраструктуры с помощью Ansible и TerraformМодуль 3 – CI/CD с использованием Jenkins.
Введение в Jenkins и его важность в процессе CI/CD
Настройка пайплайнов Jenkins
Интеграция систем контроля версий (например, Git) с Jenkins
Создание, тестирование и развертывание приложений с использованием Jenkins
Лабораторная работа 3. Создание конвейера Jenkins для примера приложенияМодуль 4 – Мониторинг и журналирование в DevOps
Мониторинг инфраструктуры и приложений DevOps
Введение в инструменты мониторинга Prometheus и Grafana
Управление журналами и их анализ с помощью Elasticsearch и Kibana.
Метрики в реальном времени и ведение журналов с централизованными иформационными панелями
Лабораторная работа 4. Настройка мониторинга и ведения журналов для примера приложенияМодуль 5 – Расширенные концепции DevOps
Оркестрирование контейнеров с помощью Kubernetes
Развертывание приложений в кластерах Kubernetes
Балансировка нагрузки и обнаружение сервисов с помощью Kubernetes
Внедрение синего/зеленого и канареечного развертываний
Лабораторная работа 5. Развертывание контейнерного приложения в кластере Kubernetes с использованием конвейера CI/CD - DO-02 — DevOps-мониторинг
- Длительность: 5 дней (40 часов)
- Код курса: DO-02
- Стоимость
- Очный формат: 761 000 ₸
- Онлайн формат: 738 000 ₸
Описание курса
Общая информация о курсе
Цель курса: Повышение компетенций сотрудников в области системного и прикладного мониторинга DevOps-инфраструктуры
Целевая аудитория: DevOps-инженеры, системные администраторы, SRE-специалистыПредварительные требования:
Базовые знания Linux/Unix
Опыт работы с Docker и Kubernetes
Понимание концепций CI/CDДень 1: Основы DevOps-мониторинга и Observability
Теоретическая часть
Введение в DevOps-мониторинг
Концепция Observability
Основы наблюдаемости: Metrics, Logs, Traces
Различия между мониторингом и наблюдаемостью
Принципы построения наблюдаемых систем
Метрики, логи и трассировки: когда что использоватьАрхитектура мониторинга
Компоненты системы мониторинга
Сбор данных (Collectors, Exporters, Agents)
Хранение и обработка (Time Series DB, Log Aggregation)
Визуализация (Dashboards, Alerting)
Уведомления и эскалацияПрактическая часть
Лабораторная работа 1: Настройка базовой инфраструктуры
Установка и конфигурация Prometheus
Развертывание Prometheus в Docker
Базовая конфигурация prometheus.yml
Проверка работы веб-интерфейса
Изучение метрик по умолчаниюЛабораторная работа 2: Первые метрики
Сбор базовых метрик системы
Установка Node Exporter
Настройка сбора системных метрик
Создание простых запросов PromQL
Анализ полученных данныхДень 2: Prometheus - архитектура и метрики
Теоретическая часть
Архитектура Prometheus
Компоненты и принципы работы
Pull и Push модели
Service Discovery
Retention и хранение данных
Высокая доступность и федерацияPromQL и метрики
Язык запросов Prometheus
Типы метрик (Counter, Gauge, Histogram, Summary)
Основы PromQL синтаксиса
Функции и операторы
Агрегация и группировка данныхПрактическая часть
Лабораторная работа 3: PromQL в действии
Практическое изучение PromQL
Создание базовых запросов
Использование функций rate(), increase()
Агрегация метрик по лейблам
Создание сложных запросов для мониторингаЛабораторная работа 4: Exporters и Service Discovery
Настройка различных exporters
MySQL Exporter для мониторинга БД
Nginx Exporter для веб-серверов
Настройка Service Discovery в Kubernetes
Автоматическое обнаружение сервисовДень 3: Grafana - визуализация и дашборды
Теоретическая часть
Архитектура Grafana
Возможности и компоненты
Источники данных (Data Sources)
Панели и визуализации
Организация и структура дашбордов
Пользователи и ролиСоздание эффективных дашбордов
Принципы дизайна дашбордов
Целевая аудитория и цели
Выбор подходящих визуализаций
Организация информации
Лучшие практики UX/UIПрактическая часть
Лабораторная работа 5: Первый дашборд
Создание базового дашборда
Подключение Prometheus как источника данных
Создание панелей для системных метрик
Настройка временных диапазонов
Добавление аннотацийЛабораторная работа 6: Продвинутые дашборды
Создание комплексного дашборда
Дашборд для мониторинга приложения
Использование переменных и шаблонов
Создание drill-down навигации
Настройка автообновленияДень 4: Alerting и интеграция с Kubernetes
Теоретическая часть
Система алертинга
Alertmanager и правила алертинга
Создание правил в Prometheus
Конфигурация Alertmanager
Группировка и подавление алертов
Интеграция с системами уведомленийМониторинг Kubernetes
Специфика мониторинга K8s
kube-state-metrics и cAdvisor
Мониторинг подов, сервисов, деплойментов
Метрики ресурсов и производительности
Логирование в KubernetesПрактическая часть
Лабораторная работа 7: Настройка алертинга
Создание системы уведомлений
Настройка правил алертинга в Prometheus
Конфигурация Alertmanager
Интеграция с Slack/Email
Тестирование системы алертингаЛабораторная работа 8: Мониторинг Kubernetes
Развертывание мониторинга в K8s
Установка Prometheus Operator
Настройка ServiceMonitor для приложений
Создание дашбордов для Kubernetes
Мониторинг ресурсов кластераДень 5: Интеграция с CI/CD
Теоретическая часть
Мониторинг CI/CD пайплайнов
Интеграция с GitLab CI/CD
Метрики сборки и деплоймента
Мониторинг производительности пайплайнов
Отслеживание качества кода
Интеграция с системами тестированияЛогирование и трассировка
ELK Stack и Jaeger
Централизованное логирование
Структурированные логи
Распределенная трассировка
Корреляция метрик, логов и трейсовПрактическая часть
Лабораторная работа 9: Интеграция с GitLab
Мониторинг CI/CD процессов
Настройка метрик для GitLab Runner
Мониторинг времени выполнения пайплайнов
Создание алертов на сбои сборки
Дашборд для DevOps команды
Wireshark
- WS01 — Анализ сетевого трафика в Wireshark
- Длительность: 3 дня (24 часа)
- Код курса: WS01
- Стоимость
- Очный формат: 611 500 ₸
- Онлайн формат: 588 500 ₸
Описание курса
Описание курса:
Данный курс содержит материал, необходимый для того, чтобы научить специалистов, работающих с сетями TCP/IP, решать проблемы с производительностью сети при помощи п/о Wireshark. В ходе курса станет понятно, как измерять задержки при передаче IP-пакетов в сети, как измерять скорость передачи данных в пределах конкретного TCP-соединения, и многое другое. Кроме того, в курсе рассматриваются вопросы анализа сетевого трафика для обнаружения вредоносных вложений, spam’а и прочих киберугроз. П/о Wireshark широко известно среди специалистов в области сетей, но его функции и их применимость выходят далеко за рамки простого отображения dump’а траифика.
Для кого предназначен:
Курс будет интересен специалистам в области сетевых технологий, людям, занимающимся поиском и устранением проблем с корпоративными сервисами и приложениями, а также аналитикам кибербезопасности.
Программа курса:
1. Работа в Wireshark
Необходимость анализа сетевого трафика.
Установка Wireshark’а и дополнительных компонентов.
Базовая настойка.
Создание dump’ов трафика на сетевых интерфейсах.
Графический интерфейс.2. Базовый анализ трафика.
Фильтрация.
Извлечение файлов.
Измерение задержек.
Создание диаграмм работы протоколов.
Статистика протоколов и приложений.
Восстановление голосовых данных.
Автостатистика «Expert Information».3. Мета-анализ (MATE).
Цель применения MATE.
Компоненты MATE.
Настройка и примеры работы с MATE.4. Анализ DNS-трафика.
Работа протокола DNS.
Разбор DNS-трафика.
Анализ аномалий DNS-трафика.
Анализ DNS-трафика на наличие киберугроз.5. Анализ IPv4-трафика.
Работа протокола IPv4.
Разбор IPv4-трафика.
Анализ аномалий IPv4-трафика.
Анализ IPv4-трафика на наличие киберугроз.6. Анализ ICMP-трафика.
Работа протокола ICMP.
Разбор ICMP-трафика.
Анализ аномалий ICMP-трафика.
Анализ ICMP-трафика на наличие киберугроз.7. Анализ TCP-трафика.
Работа протокола TCP.
Алгоритм Карна.
Разбор TCP-трафика.
Анализ аномалий TCP-трафика.
Измерения производительности канала с помощью TCP-трафика.
Анализ проблем приложений с помощью TCP-трафика.
Анализ TCP-трафика на наличие киберугроз.8. Анализ UDP-трафика.
Работа протокола UDP.
Разбор UDP-трафика.
Анализ аномалий UDP-трафика.
Анализ UDP-трафика на наличие киберугроз.9. Анализ HTTP-трафика.
Работа протокола HTTP.
Разбор HTTP-трафика.
Анализ аномалий HTP-трафика.
Реконструкция данных HTTP.
Дешифрование данных HTTPS.
Анализ ICMP-трафика на наличие киберугроз.10. Анализ FTP-трафика.
Работа протокола FTP.
Разбор FTP-трафика.
Анализ аномалий FTP-трафика.
Реконструкция данных FTP.
Анализ FTP-трафика на наличие киберугроз.11. Анализ трафика электронной почты.
Работа протоколов SMTP, IMAP, POP3.
Разбор трафика электронной почты.
Анализ аномалий в трафике электронной почты и обнаружение spam’а.
Реконструкция данных электронной почты.
Анализ кибератак через электронную почту.12. Анализ трафика канального уровня.
Протоколы DHCP и ARP.
Анализ трафика DHCP и ARP.
Анализ аномалий.
Анализ кибератак на канальном уровне.13. Анализ трафика Wi-Fi сетей.
Особенности работы Wi-Fi сетей на канальном уровне.
Анализ ёмкости и утилизации [радио]канала.
Анализ аномалий трафика Wi-Fi сети.
Анализ кибератак в Wi-Fi сети. - WS02 — Анализ пакетов инструментами анализатора Wireshark
- Длительность: 5 дней (40 часов)
- Код курса: WS02
- Стоимость
- Очный формат: 719 000 ₸
- Онлайн формат: 701 000 ₸
Описание курса
Цель курса:
Цель данного пятидневного курса заключается в обеспечении инженеров технической поддержки различных уровней знаниями и навыками необходимыми для выполнения ежедневных задач по поиску и устранению неисправностей в сетях пакетной передачи данных инструментами анализатора Wireshark. Курс состоит из 9 теоретических глав, сопровождаемых практическими заданиями для закрепления материала.
Программа курса:
1. Обзор Wireshark
Краткий обзор функций
Версии и их отличие2. Пользовательский интерфейс и навигация
Конфигурация внешнего вида
Фильтры отображения
Фильтры захвата
Управление файлами3. Дополнительные параметры конфигурации
Согласование имён
Правила раскраски
Пересборка протоколов
Некоторые особенности работы Wireshark4. Инструменты командной строки
tshark
dumpcap
editcap
и др.5. Таблицы и графики
Конечные станции, сессии, протоколы
Графики ввода/вывода
Графики потоков и экспертная информация6. Метрики производительности
Проблемы прикладного уровня
Пропускная способность
Время отклика
Издержки7. Подход к диагностике
Методология диагностики
Основы захвата
Технологии захвата
Стратегия захвата
Советы по захвату трафика8. Анализ распространенных протоколов:
Ethernet
ARP
IP
ICMP
TCP
UDP
SCTP
RTP
TLS 1.1/1.2/1.39. LUA-скрипты и диссекторы
Варианты применения LUA-скриптов
Пример создание диссектора собственного протокола при помощи LUA - ANT-N102 — Анализ пакетов с помощью Wireshark’а
- Длительность: 5 дня (40 часов)
- Код курса: ANT-N102
- Стоимость
- Очный формат: 719 000 ₸
- Онлайн формат: 701 000 ₸
Описание курса
Описание курса:
Материал данного курса позволит слушателю изучить возможности и приемы по анализу сетевого трафика с помощью п/о Wireshark.
Аудитория курса:
Инженеры, занимающиеся сетями передачи данных.
Предварительные требования к аудитории:
Необходимы знания о работе сетей TCP/IP на уровне курса ANT-N101.
Содержание курса:
Модуль 1 – Анализ сетевого трафика и Wireshark.
Стек TCP/IP. Инкапсуляция сетевого трафика.
Сбор трафика в сети. Архитектура и подходы.
Протоколы SPAN, RSPAN, ERSPAN.
Поведение сетевых карт при сборе трафика.
Wireshark как инструмент анализа сетевого трафика.Модуль 2 – Интерфейс и основные настройки.
Запуск и первичная настройка.
Элементы интерфейса.
Отображение собранного трафика.
Отображение TCP-соединений и UDP-потоков трафика.
Простые фильтры.
«Экспертное меню».
Настройка пре-процессоров.Модуль 3 – Дополнительные возможности Wireshark’а.
Комплексные фильтры.
Использование GeoIP.
Автоматическое определение DNS-имен.
Колоризация трафика и отдельных соединений.
«Сборка» данных прикладных протоколов.
Использование параметров сетевых карт.Модуль 4 – Анализ статистики сетевого трафика.
Вывод статистики в Wireshark’е.
Статистика пропускной способности.
Статистика Round-Trip Time.
Статистика протоколов.
Статистика конечных устройств.
Визуализация потоков данных.Модуль 5 – Анализ производительности сети.
Зависимость задержки от пропускной способности канала. Формула Литтла.
Классификация стеков ТСР.
Алгоритмы и дополнительные функции TCP.
Примеры анализа и определения задержек в сети.
Примеры расчета пропускной способности сети.Модуль 6 – Поиск и устранение неисправностей в сети.
Основные индикаторы неисправностей в сети.
Обнаружение неисправностей в сети с помощью анализа трафика.
Примеры поиска и устранения неисправностей в сети.Модуль 7 – Анализ сетевых протоколов.
Анализ протоколов семейства Ethernet.
Анализ беспроводных сетей Wi-Fi.
Анализ ARP.
Анализ ICMP
Анализ DHCP.
Анализ DNS.
Анализ FTP.
Анализ HTTP.
Дешифрование HTTPS.
Анализ почтовых протоколов. SMTP, IMAP, POP3.
Анализ SMB и NetBIOS.
Анализ протоколов IP-телефонии. RTP, RTCP, SIP.
Воспроизведение захваченных голосовых данных.Модуль 8 – Использование Wireshark’а при обработке инцидентов кибербезопасности.
Отслеживание инцидентов кибербезопасности.
Реагирование на инциденты кибербезопасности.
Использование Wireshark’а для анализа трафика, релевантного инциденту.
Примеры анализа сетевых атак с помощью Wireshark’а.
Примеры анализа поведения вредоносного п/о с помощью Wireshark’а.
Примеры использования Wireshark’а как инструмента Threat Intelligence.
Juniper
- JL3VPNs — Junos Layer 3 VPNs
- Длительность: 3 дня (24 часа)
- Код курса: JL3VPNs
- Стоимость
- Очный формат: 561 500 ₸
- Онлайн формат: 547 000 ₸
Описание курса
Описание курса
Этот трехдневный курс был разработан для ознакомления слушателей с возможностями построения сетей L3 VPN (Layer 3 VPN) на основе технологии MPLS и соответствующими примерами настройки оборудования Juniper. Курс включает обзор концепций L3 VPN на основе MPLS, масштабирование сетей L3 VPN, интернет-доступ, межпровайдерские L3VPN, мультикаст для L3VPN. Курс также описывает характерные именно для операционной системы Junos виртуальные маршрутизаторы для L3 VPN. В лаборатории используется JunOS версии 16.1R3.10.
Примеры и лабораторные работы дают слушателям возможность приобрести опыт в настройке и мониторинге Junos и работы устройств.
Цели
After successfully completing this course, you should be able to:
Describe the value of MPLS VPNs.
Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs.
Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
List the provider-provisioned MPLS VPN features supported by the Junos OS software.
Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN.
Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers.
Describe the propagation of VPN routing information within an AS.
List the BGP design constraints to enable Layer 3 VPNs within a provider network.
Explain the operation of the Layer 3 VPN data plane within a provider network.
Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets.
Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities.
List the steps necessary for proper operation of a PE-CE dynamic routing protocol.
List the troubleshooting and monitoring techniques for routing instances.
Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance.
Monitor the operation of a CE-PE dynamic routing protocol.
Explain the operation of a PE multi-access interface in a Layer 3 VPN and list commands to modify that behavior.
Describe ways to support communication between sites attached to a common PE router.
Provision and troubleshoot hub-and-spoke Layer 3 VPNs,
Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN.
Describe QoS mechanisms available in L3VPNs.
Configure L3VPN over GRE tunnels.
Describe the RFC 4364 VPN options.
Describe the carrier-of-carriers model.
Configure the carrier-of-carriers and «Option C» configuration.
Describe the flow of control and data traffic in a draft-rosen multicast VPN.
Describe the configuration steps for establishing a draft-rosen multicast VPN.
Monitor and verify the operation of draft-rosen multicast VPNs.
Describe the flow of control traffic and data traffic in a next-generation multicast VPN.
Describe the configuration steps for establishing a next-generation multicast VPN.
Monitor and verify the operation of next-generation multicast VPNs.
Describe the flow of control traffic and data traffic when using MPVNs for Internet multicast.
Describe the configuration steps for enabling internet multicast using MVPNs.
Monitor and verify the operation of MVPN internet multicast.Требования
Это курс среднего уровня и предполагает понимание работы протоколов маршрутизации OSPF, IS-IS и BGP, политик маршрутизации, знания MPLS и его настройки в операционной системе Junos.
Слушатели должны предварительно прослушать курсы:
Вводный курс по операционной системе Junos (IJOS)
Маршрутизация в ОС Junos (JIR)
Основы MPLS в ОС Junos (JMF)Программа курса
День 1
Модуль 1: Введение
Модуль 2: Обзор VPN
Обзор VPN
VPN, реализуемые на оборудовании конечного пользователя
VPN, реализуемые на сети провайдераМодуль 3: VPN уровня 3
Терминология
Структура адреса VPN-IPv4
Дополнительные характеристики и параметрыМодуль 4: Базовая конфигурация VPN уровня 3
Подготовительные этапы конфигурации
Настройка PE-маршрутизатора
Лабораторная работа № 7: Настройка VPN уровня 3 со статической и BGP PE-CE маршрутизациейМодуль 5: Масштабирование VPN уровня 3 и обеспечение доступа в Интернет
Масштабирование VPN уровня 3
Обеспечение доступа в Интернет
Лабораторная работа № 8: Применение функции Route Reflector и обеспечение доступа в ИнтернетДень 2
Модуль 6: VPN уровня 3. Изучение вопросов повышенной сложности
Обмен маршрутами между VRF-таблицами
Топологии Hub-and-Spoke
Опции CoS в технологии VPN уровня 3
Интеграция VPN уровня 3 и GRE туннелирования
Интеграция VPN уровня 3 и IPsec
Egress Protection для VPN уровня 3
Лабораторная работа № 9: Интеграция VPN уровня 3 и GRE туннелированияМодуль 7: Организация VPN между провайдерами
Иерархические модели VPN
Модель «Провайдер для провайдеров» (Carrier-of-Carriers)
Применение Carrier-of-Carriers VPN
Лабораторная работа № 13: Carrier-of-Carriers VPNМодуль 8: VPN уровня 3. Поиск и устранение неисправностей
Базовый подход для поиска неисправностей
Использование ключа routing-instance
Трассировка с PE- и CE-маршрутизаторов
Просмотр VRF-таблиц и сигнализации на участке PE-PE
Мониторинг протоколов сигнализации на участке PE-CEМодуль 9: Групповое вещание в виртуальных частных сетях (Multicast VPNs)
Групповое вещание в виртуальных частных сетях. Обзор
Реализация группового вещания в виртуальных частных сетях
Конфигурирование
Мониторинг
Лабораторная работа (Optional) № 14: Конфигурирование и мониторинг Multicast VPN - JL2VPNs — Junos Layer 2 VPNs
- Длительность: 3 дня (24 часа)
- Код курса: JL2VPNs
- Стоимость
- Очный формат: 561 500 ₸
- Онлайн формат: 547 000 ₸
Описание курса
Описание курса
Этот двухдневный курс был разработан для ознакомления слушателей с возможностями построения сетей VPN 2 уровня (Layer 2 VPN, L2 VPN) на основе технологии MPLS и соответствующими примерами настройки оборудования Juniper. Курс включает обзор концепций L2 VPN на основе MPLS, таких как BGP L2 VPN, L2 LDP сети, автообнаружение с использованием опции 129 эквивалентных классов продвижения (Forwarding Equivalent Classes (FEC) 129) протокола BGP, службы виртуальных частных сетей (VPLS), Ethernet VPN (EVPN), L2 VPN между разными автономными системами. Курс также описывает характерные именно для операционной системы Junos виртуальные маршрутизаторы для L2 VPN, VPLS и EVPN. Примеры и лабораторные работы дают слушателям возможность приобрести опыт в настройке и мониторинге Junos и работы устройств.
Цели
After successfully completing this course, you should be able to:
Define the term virtual private network.
Describe the business drivers for MPLS VPNs.
Describe the differences between Layer 2 VPNs and Layer 3 VPNs.
List advantages for the use of MPLS Layer 3 VPNs and Layer 2 VPNs.
Describe the roles of a CE device, PE router, and P router in a BGP Layer 2 VPN.
Explain the flow of control traffic and data traffic for a BGP Layer 2 VPN.
Configure a BGP Layer 2 VPN and describe the benefits and requirements of over-provisioning.
Monitor and troubleshoot a BGP Layer 2 VPN.
Explain the BGP Layer 2 VPN scaling mechanisms and route reflection.
Describe the Junos OS BGP Layer 2 VPN CoS support.
Describe the flow of control and data traffic for an LDP Layer 2 circuit.
Configure an LDP Layer 2 circuit.
Monitor and troubleshoot an LDP Layer 2 circuit.
Describe the operation of FEC 129 BGP autodiscovery for Layer 2 VPNs.
Configure a FEC 129 BGP autodiscovery Layer 2 VPN.
Monitor and troubleshoot a FEC 129 BGP autodiscovery for Layer 2 VPNs.
Describe the difference between Layer 2 MPLS VPNs and VPLS.
Explain the purpose of the PE device, the CE device, and the P device.
Explain the provisioning of CE and PE routers.
Describe the signaling process of VPLS.
Describe the learning and forwarding process of VPLS.
Describe the potential loops in a VPLS environment.
Configure BGP, LDP, and FEC 129 BGP autodiscovery VPLS.
Troubleshoot VPLS.
Describe the purpose and features of Ethernet VPN.
Configure Ethernet VPN.
Monitor and troubleshoot Ethernet VPN.
Describe the Junos OS support for hierarchical VPN models.
Describe the Junos OS support for Carrier-of-Carriers VPN Option C.
Configure the interprovider VPN Option C.
Describe the Junos OS support for multisegment pseudowire for FEC 129.
Describe and configure circuit cross-connect (CCC).Требования
Это курс среднего уровня и предполагает у слушателей понимания работы протоколов маршрутизации OSPF, IS-IS и BGP, политик маршрутизации, знания MPLS и его настройки в операционной системе Junos.
Слушатели должны предварительно прослушать курсы:Вводный курс по операционной системе Junos (V15) (IJOS)
Коммутация данных для операторов связи (JSPX)
Маршрутизация в ОС Junos (JIR)
Основы MPLS в ОС Junos (JMF)Программа курса
День 1
Модуль 1 Введение
Модуль 2: MPLS VPN
MPLS VPN
VPN на сети провайдераМодуль 3: VPN уровня 2 с применением протокола BGP
Обзор VPN уровня 2, реализуемых на сети провайдера
VPN уровня 2: описание работы плоскости управления (control plane)
VPN уровня 2: описание работы плоскости передачи данных (data plane)
Подготовительные этапы конфигурации
Конфигурирование VPN уровня 2 с применением протокола BGP
Мониторинг и устранение неисправностей VPN уровня 2
Лабораторная работа: VPN уровня 2 с применением протокола BGPМодуль 4: Масштабирование VPN уровня 2 и CoS
Обзор способов масштабирования
VPN уровня 2 и CoS
Лабораторная работа: Масштабирование VPN уровня 2Модуль 5: VPN уровня 2 с применением протокола LDP (LDP Layer 2 Circuits)
Описание работы VPN уровня 2 с применением протокола LDP
Конфигурирование VPN уровня 2 с применением протокола LDP
Мониторинг и устранение неисправностей VPN уровня 2
Работа автообнаружения с использованием FEC 129 BGP в сетях уровня 2
Настройка автообнаружения с использованием FEC 129 BGP в сетях уровня 2
Мониторинг и отладка автообнаружения с использованием FEC 129 BGP
Лабораторная работа: VPN уровня 2 с применением протокола LDP и автообнаружение с использованием FEC 129 BGP в сетях уровня 2День 2
Модуль 6: VPLS сервисы
Сравнение L2 MPLS VPN и VPLS
BGP VPLS, работа плоскости управления
BGP VPLS, работа плоскости передачи данных
Процесс изучения и процесс продвижения данных
Варианты появления петельМодуль 7: Конфигурирование VPLS
Конфигурирование VPLS
Поиск и устранение неисправностей VPLS
Лабораторная работа: VPLSМодуль 8: Ethernet VPN (EVPN)
Обзор EVPN
EVPN, работа плоскости управления
Функционирование EVPN
Настройка EVPN
Поиск и устранение неисправностей EVPN
Лабораторная работа: EVPNПриложение А: Организация VPN между провайдерами
Иерархические модели VPN
Модель «Провайдер для провайдеров» (Carrier-of-Carriers)
Применение Carrier-of-Carriers VPN
Мультисегментные псевдопроводаПриложение Б: Circuit Cross-Connect
Circuit Cross-Connect
Лабораторная работа: Circuit Cross-Connect (необязательная) - JMF — Junos MPLS Fundamentals
- Длительность: 2 дня (16 часов)
- Код курса: JMF
- Стоимость
- Очный формат: 476 500 ₸
- Онлайн формат: 441 000 ₸
Описание курса
Course Objectives
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco IOS Software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of transmission control protocol and the internet protocol (TCP/IP) and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP transport layer and application layer
Explore the functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement and verify virtual local area networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of open shortest path first (OSPF)
Explain how spanning tree protocol (STP) and rapid spanning tree protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic wide-area network (WAN) and virtual private network (VPN) concepts
Describe the operation of access control lists (ACLs) and their applications in the network
Configure internet access using dynamic host configuration protocol (DHCP) clients and explain and configure network address translation (NAT) on Cisco routers
Describe the basic quality of service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC
Describe network and device architectures and introduce virtualization
Explain software-defined networks
Configure basic Cisco IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Discuss the need of network programmability in Enterprise networks, common programmability protocols, and configuration management tools
Describe AI and ML in network operationsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Basic IP address knowledge
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco IOS Software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of transmission control protocol and the internet protocol (TCP/IP) and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP transport layer and application layer
Explore the functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement and verify virtual local area networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of open shortest path first (OSPF)
Explain how spanning tree protocol (STP) and rapid spanning tree protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic wide-area network (WAN) and virtual private network (VPN) concepts
Describe the operation of access control lists (ACLs) and their applications in the network
Configure internet access using dynamic host configuration protocol (DHCP) clients and explain and configure network address translation (NAT) on Cisco routers
Describe the basic quality of service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC
Describe network and device architectures and introduce virtualization
Explain software-defined networks
Configure basic Cisco IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Discuss the need of network programmability in Enterprise networks, common programmability protocols, and configuration management tools
Describe AI and ML in network operationsCourse Prerequisites
The knowledge and skills you are expected to have before attending this training are:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Basic IP address knowledgeCourse Outline:
Exploring the Functions of Networking
Introducing the Host-To-Host Communications Model
Operating Cisco IOS Software
Introducing LANs
Exploring the TCP/IP Link Layer
Starting a Switch
Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets
Explaining the TCP/IP Transport Layer and Application Layer
Exploring the Functions of Routing
Configuring a Cisco Router
Exploring the Packet Delivery Process
Troubleshooting a Simple Network
Introducing Basic IPv6
Configuring Static Routing
Implementing VLANs and Trunks
Routing Between VLANs
Introducing OSPF
Building Redundant Switched Topologies
Improving Redundant Switched Topologies with EtherChannel
Explaining the Basics of ACL
Enabling Internet Connectivity
Introducing AI and ML in Network Operations
Introducing System Monitoring
Managing Cisco Devices
Securing Administrative Access
Implementing Device Hardening
Exploring Layer 3 Redundancy
Introducing WAN Technologies
Introducing QoS
Explaining Wireless Fundamentals
Introducing Architectures and Virtualization
Explaining Software-Defined Networking
Introducing Network Programmability
Examining the Security Threat Landscape
Implementing Threat Defense TechnologiesLab Outline
Get Started with Cisco CLI
Observe How a Switch Operates
Perform Basic Switch Configuration
Inspect TCP/IP Applications
Configure an Interface on a Cisco Router
Configure and Verify Layer 2 Discovery Protocols
Configure Default Gateway
Explore Packet Forwarding
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Configure Basic IPv6 Connectivity
Configure and Verify IPv4 Static Routes
Configure IPv6 Static Routes
Configure VLANs and Trunks
Configure Inter-VLAN Routing
Configure and Verify Single-Area OSPF
Configure and Verify EtherChannel
Configure and Verify IPv4 ACLs
Configure a Provider-Assigned IPv4 Address
Configure Static NAT
Configure Dynamic NAT and PAT
Configure and Verify NTP
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image
Secure Console and Remote Access
Enable and Limit Remote Access Connectivity
Configure and Verify Port Security - IJOS — Вводный курс по операционной системе JUNOS v1.5
- Длительность: 2 дня (16 часа)
- Код курса: IJOS
- Стоимость
- Очный формат: 476 500 ₸
- Онлайн формат: 441 000 ₸
Описание курса
Аннотация
Курс дает слушателям базовые знания, необходимые для работы с операционной системой Junos. Курс содержит краткий обзор семейств устройств, работающих под управлением операционной системы Junos, и особенностей их архитектуры. Основные темы курса включают работу с интерфейсом пользователя с упором на командную строку, базовую настройку системы, настройку интерфейсов с рабочими примерами, настройку дополнительных параметров, а также основы мониторинга и технического обслуживания устройств. Далее следует описание основ маршрутизации, политики маршрутизации и фаервольных фильтров, сопровождаемое примерами использования.
Содержание курса:
Модуль 1: Введение
Модуль 2: Основы операционной системы Junos
Операционная система Junos
Процесс обработки трафика
Обзор платформ JunosМодуль 3: Основы пользовательского интерфейса
Опции пользовательского интерфейса
Основы работы в командной строке
Командная строка, режим Operational
Командная строка, режим Configuration
Лабораторная работа №1: Работа в командной строкеМодуль 4: Начальная настройка
Настройка Factory-Default
Начальная настройка
Настройка интерфейсов
Лабораторная работа №2: Начальная настройка оборудованияМодуль 5: Вторичная конфигурация системы
Настройка пользователей и аутентификация
Мониторинг и запись лог-файлов
Протокол NTP
Архивация конфигурации
Протокол SNMP
Лабораторная работа №3: Вторичная конфигурация системыМодуль 6: Мониторинг и техническое обслуживание
Мониторинг платформ и функционирование интерфейсов
Сетевые утилиты
Защита программного обеспечения JUNOS
Восстановление пароля
Очистка системы
Лабораторная работа №4: Эксплуатационный мониторинг системыМодуль 7: Примеры настройки интерфейсов
Обзор иерархии интерфейсов
Примеры настройки интерфейсов
Использование групп для настройкиМодуль 8: J-Web интерфейс
Графическая система управления J-Web
Настройка интерфейса
Лабораторная работа №5: Интерфейс J-WebМодуль 9: Основы маршрутизации
Концепция маршрутизации, основы маршрутизации
Таблицы маршрутизации
Концепция виртуальных маршрутизаторов (Routing Instances)
Статическая маршрутизация
Динамическая маршрутизация
Лабораторная работа №6: Основы маршрутизацииМодуль 10: Политики маршрутизации
Обзор политик маршрутизации
Политики маршрутизации на конкретных примерах
Лабораторная работа №7: Политики маршрутизацииМодуль 11: Использование фильтров (Firewall Filters)
Обзор настройки и применения фильтров
Примеры использования фильтров
Использование проверки «Unicast Reverse-Path-Forwarding»
Лабораторная работа №8: Конфигурирование фильтровМодуль 12: Классы обслуживания
Обзор классов обслуживания
Классификация трафика
Процесс постановки трафика в очередь
Распределение трафика
Классы обслуживания на конкретных примерах
Лабораторная работа №9: Класс обслуживания - JIR — Маршрутизация в ОС JUNOS
- Длительность: 2 дня (16 часов)
- Код курса: JIR
- Стоимость
- Очный формат: 476 500 ₸
- Онлайн формат: 441 000 ₸
Описание курса
Кому следует посетить:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и техническим обслуживанием устройств, работающих под программным обеспечением JUNOS.
Сертификации
Этот курс является частью следующих программ сертификаций:
Juniper Networks Certified Internet Specialist Enterprise Routing & Switching (JNCIS-ENT)
Juniper Networks Certified Internet Specialist Service Provider Routing & Switching (JNCIS-SP)
Предварительные требования
Слушатели должны понимать базовые принципы работы протоколов TCP/IP и маршрутизации и посетить курсы Introduction to JUNOS Software (IJS) and JUNOS Routing Essentials (JRE).Цели курса:
Настраивать статические, агрегированные и генерированные маршруты
Настраивать и использовать routing instances
Конфигурировать балансировку маршрутов.
Конфигурировать маршрутизацию на основе фильтров
Понимать логику работы OSPF.
Конфигурировать и отлаживать OSPF
Понимать логику работы BGP
Конфигурировать и настраивать BGP
Понимать концепцию IP tunneling
Конфигурировать и отлаживать GRE и туннели IP-IP
Понимать и настраивать различные возможности высокой доступности (high availability)Содержание курса:
2-дневный курс JIR дает знания о процессе маршрутизации и рассматривает примеры конфигурации. Основными темами курса являются статическая маршрутизация, балансировка нагрузки, изменение процесса обработки трафика при помощи фильтров, протоколы маршрутизации OSPF и BGP, туннелирование IP-трафика и обеспечение надежности. Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения JUNOS, получат навыки контроля за работой оборудования.
Программа курса:
Модуль 1: Введение
Модуль 2: Статическая маршрутизация
Статические маршруты
Суммаризирующие агрегатные маршруты
Суммаризирующие генерированные маршруты
Немаршрутизируемые адресы
Концепция виртуальных маршрутизаторов
Лабораторная работа №1: Статическая маршрутизацияМодуль 3: Балансировка нагрузки и фильтрация трафика
Методы балансировки нагрузки
Настройка и мониторинг балансировки
Изменение процесса обработки трафика при помощи фильтров
Настройка и мониторинг фильтров
Лабораторная работа №3: Балансировка нагрузки и фильтрация трафикаМодуль 4: Протокол OSPF
Обзор протокола OSPF
Процесс формирования соседства и выбор ведущего маршрутизатора
Обеспечение масштабируемости протокола OSPF
Настройка и мониторинг протокола OSPF
Лабораторная работа №4: Протокол OSPFМодуль 5: Протокол BGP
Обзор протокола BGP
Атрибуты протокола BGP
IBGP и EBGP
Настройка и мониторинг протокола BGP
Лабораторная работа №4: Протокол BGPМодуль 6: Туннелирование IP-трафика
Обзор туннелирования
Туннели GRE и IP-IP
Построение туннелей GRE и IP-IP
Лабораторная работа №5: Туннелирование IP-трафикаМодуль 7: Обеспечение надежности
Обзор обеспечения надежности сетей
Переключение на запасной RE
Обеспечение непрерывной работы маршрутизатора
Протокол BFD
Протокол VRRP
Лабораторная работа №5: Обеспечение надежностиПриложение А: IPv6
Введение в IPv6
Примеры конфигурации
Туннелирование IPv6 поверх IPv4Приложение Б: Протокол IS-IS
Обзор протокола IS-IS
Обзор протокольных сообщений IS-IS
Процесс формирования соседства и выбор ведущего маршрутизатора
Настройка и мониторинг протокола IS-IS - JEX-ELS — Управление коммутаторами для предприятий на ОС Junos c поддержкой ELS
- Длительность: 2 дня (16 часов)
- Код курса: JEX-ELS
- Стоимость
- Очный формат: 476 500 ₸
- Онлайн формат: 441 000 ₸
Описание курса
Предварительные требования:
Слушатели должны понимать базовые принципы работы протоколов TCP/IP и посетить курсы Introduction to Junos Software (IJOS) и Junos Routing Essentials (JRE).
Описание курса:
Двухдневный курс JEX-ELS дает знания о процессе коммутации данных и рассматривает примеры конфигурации для EX-платформ с программным обеспечением Junos Enhanced Layer 2 Software. Основными темами курса являются обзор принципов коммутации, виртуальные локальные вычислительные сети (VLAN), протокол STP, функции по обеспечению безопасности портов и коммутатора, способы реализации надежности. Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения Junos, получат навыки контроля за работой оборудования. Данный курс базируется на версии 13.2X51-D20.3.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и техническим обслуживанием коммутаторов EX-серии c программным обеспечением Junos Enhanced Layer 2 Software, начиная с версии 13.2X50.
Программа курса:
Модуль 1: Введение
Модуль 2: Коммутация на канальном уровне
Основы прозрачной коммутации Ethernet (Ethernet Bridging)
Разбор терминологии и дизайна сети
Обзор коммутаторов для предприятий
Активирование и мониторинг коммутации на канальном уровне
Лабораторная работа № 1: Ввод в эксплуатацию коммутаторов канального уровня.Модуль 3: Виртуальные локальные компьютерные сети (VLAN)
Обзор виртуальных локальных компьютерных сетей (VLAN)
Настройка и мониторинг VLAN
Голосовые VLAN (Voice VLAN)
Нетегированные VLAN (Native VLAN)
Маршрутизируемые VLAN-интерфейсы (RVI)
Лабораторная работа № 2: Настройка и мониторинг VLAN.Модуль 4: Виртуализация с использованием Routing Instances
Виртуализация с использованием Routing Instances. Обзор
Настройка и мониторинг виртуальных коммутаторов.Модуль 5: Механизм Spanning Tree
Протокол Spanning Tree (STP)
Протокол RSTP
Настройка и мониторинг протоколов STP и RSTP
Защитные функции (BPDU Protection, Loop Protection, Root Protection)
Лабораторная работа № 3: Протокол RSTP и защитные функции.Модуль 6: Обеспечение защиты порта
Ограничение количества MAC-адресов
Запоминание MAC-адресов
DHCP Snooping
Защита от атак с использованием протокола ARP (Dynamic ARP Inspection)
Функция IP Source Guard
Лабораторная работа № 4: Включение защитных функций порта.Модуль 7: Фильтры и защита коммутатора
Защита от широковещательного шторма (Storm Control)
Настройка фильтров
Лабораторная работа № 5: Включение защитных функций коммутатора и настройка фильтров.Модуль 8: Виртуальное шасси (Virtual Chassis)
Виртуальное шасси. Обзор
Настройка и мониторинг работы коммутаторов, собранных в виртуальное шасси
Лабораторная работа № 6: Настройка виртуального шасси.Модуль 9: Обеспечение надежности
Обзор функционала
Агрегированные каналы (LAGs)
Redundant Trunk Groups (RTG)
Переключение активного Routing Engine (GRES)
Непрерывная маршрутизация (NSR)
Непрерывная коммутация (NSB)
Лабораторная работа № 7: Внедрение функционала обеспечения надежности
Приложение А: Механизм защиты от петель в кольце (Ethernet Ring Protection)Обзор механизма Ring Protection
Настройка и мониторинг механизма Ring Protection
Приложение Б: Протокол MSTPОбзор протокола MSTP
Настройка и мониторинг протокола MSTP. - JSEC — Программное обеспечение JUNOS для оборудования безопасности
- Длительность: 5 дней (40 часов)
- Код курса: JSEC
- Стоимость
- Очный формат: 661 500 ₸
- Онлайн формат: 647 500 ₸
Описание курса
Описание курса:
5-дневный курс JSEC посвящен изучению внедрения, настройки и функционирования оборудования семейства SRX в типичном сетевом окружении. Основные темы курса включают настройку зон безопасности, политик безопасности, механизмов обнаружения вторжений (IDP), адресной трансляции и отказоустойчивых кластерных конфигураций, а также подробности базовых действий по настройке, управлению и внедрению оборудования. Кроме того, курс описывает возможности централизованного управления с помощью Junos Space и Security Director. Данный курс включает в себя практические занятия, в процессе выполнения которых слушатели приобретут навыки настройки и мониторинга оборудования безопасности на программном обеспечении Junos OS.
Целевая аудитория:
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки, инженерам предпродажной поддержки и другим специалистам, работающим с оборудованием обеспечения безопасности семейства SRX.
Минимальные требования:
Данный курс предполагает наличие у слушателей базовых знаний сетевых технологий, модели OSI и стека TCP/IP. Слушатели должны также пройти курс IJOS или иметь эквивалентный опыт по работе с операционной системой JUNOS.
Содержание курса:
Модуль 1: Введение
Модуль 2: Введение в систему безопасности Junos
Традиционная маршрутизация и традиционное обеспечение безопасности
Архитектура программного обеспечения Junos OS. обзор оборудования
Прохождение пакета через устройство Junos, операции над пакетом
Обзор программ Junos Space и Security DirectorМодуль 3: Зоны (Zones) и защита на 3-4 уровне (Screen Options)
Формулировка понятия зоны
Конфигурация зоны
Мониторинг зон
Настройка Screen Options, примеры применения
Лабораторная работа №1: Настройка зон и Screen OptionsМодуль 4: Политики безопасности
Обзор политик безопасности
Компоненты политик
Конкретные примеры политик безопасности
Лабораторная работа №2: Политики безопасностиМодуль 5: Настройка политик в Security Director
Настройка политик
Порядок применения политик
Развертывание готовых политик
Мониторинг политик
Лабораторная работа №3: Настройка политик в Security DirectorМодуль 6: Дополнительные настройки политик
Управление сессиями
Настройка ALG
Создание и применение расписаний
Логирование
Применение Security Director для дополнительных настроек
Лабораторная работа №4: Дополнительные настройки политикМодуль 7: Отладка настройки зон и политик
Общая отладка устройств Junos
Инструменты отладки
Отладка настойки и работы зон и политик
Примеры применения механизмов отладки
Лабораторная работа №5: Отладка зон и политикМодуль 8: Трансляция адресов (NAT)
Обзор механизмов трансляции
Трансляция адреса источника. Описание работы и настройка
Трансляция адреса получателя. Описание работы и настройка
Статическая трансляция. Описание работы и настройка
Proxy ARP
Настройка адресной трансляции через Security Director
Лабораторная работа №6: Трансляция адресовМодуль 9: Дополнительные настройки адресной трансляции
Persistent NAT
Обработка DNS запросов (DNS Doctoring)
Трансляция IPv6 адресов
Нестандартные сценарии NAT
Отладка работы адресной трансляции
Лабораторная работа №7: Дополнительные настройки адресной трансляцииМодуль 10: Основы виртуальных частных сетей на основе протокола IPsec (IPsec VPNs)
Типы виртуальных частных сетей
Требования к безопасности виртуальных частных сетей
Построение туннеля IPsec
Обработка трафика в туннеле IPsecМодуль 11: Реализация туннелей IPsec
Настройка IPsec
Примеры настроек туннелей
Выбор Proxy ID
Мониторинг туннелей
Лабораторная работа №8: Построение туннеля IPsecМодуль 12: Hub-and-Spoke VPN
Обзор технологии Hub-and-Spoke
Настройка и мониторинг Hub-and-Spoke туннелей
Настройка Hub-and-Spoke с помощью Security Director
Лабораторная работа №9: Построение Hub-and-Spoke VPNМодуль 13: Групповые VPN (Group VPN)
Обзор групповых VPN
Настройка и мониторинг групповых VPN
Лабораторная работа №10: Построение групповой VPNМодуль 14: PKI и VPN с автообнаружением (AutoDiscovery VPN(ADVPN)
Концепции PKI
Обзор ADVPV
Настройка и мониторинг ADVPN
Лабораторная работа №11: Развертывание PKI и ADVPNМодуль 15: Углубленные настройки VPN
Использование адресной трансляции в VPN
Настройка классов обслуживания в VPN
Рекомендации по работе в сети предприятия
Использование OSPF в VPN
Настройка VPN в случае перекрывающихся диапазонов адресов
Построение VPN для шлюза с динамическим адресом
Лабораторная работа №12: Сложные сценарии построения VPNМодуль 16: Отладка работы VPN
Обзор механизмов отладки
Отладка функционирования фаз 1 и 2
Логирование работы IPsec
Примеры отладки IPsec
Лабораторная работа №13: Отладка IPsecМодуль 17: Теория построения отказоустойчивого кластера
Обзор кластера
Компоненты кластера
Рассмотрение работы кластераМодуль 18: Практика построения отказоустойчивого кластера
Настройка кластера
Углубленные параметры настройки кластера
Лабораторная работа №14: Построение отказоустойчивого кластераМодуль 19: Отладка работы кластера
Приемы отладки работы кластера
Примеры применения инструментов отладки кластера
Лабораторная работа №15: Отладка работы кластераПриложение А: Оборудование семейства SRX и типы интерфейсов
Обзор платформ младшего уровня (Branch)
Обзор платформ старшего уровня (High End)
Прохождение трафика через устройства семейства SRX
ИнтерфейсыПриложение Б: Виртуальные SRX
Обзор виртуализации
Виртуализация сетей и SDN
Обзор виртуальных SRX
Сценарии развертывания
Интеграция с облаком AWS - JSB — Учебный курс для подготовки к экзамену JNCIE-SEC
- Длительность: 5 дней (40 часов)
- Код курса: JSB
- Стоимость
- Очный формат: 661 500 ₸
- Онлайн формат: 647 500 ₸
Описание курса
Предварительные требования:
Для прохождения данного курса слушатели должны иметь сертификат JNCIP-SEC или обладать эквивалентными знаниями и навыками.
Описание курса:
Этот пятидневный курс разработан для подготовки к экзамену Juniper Network Certified Internet Expert – Security (JNCIE-SEC). В курсе освещаются особенности экзаменационных заданий и даются советы, полезные будущим экзаменующимся. Особенное внимание уделяется практическим заданиям, представляющим собой набор лабораторных работ с ограничениями по времени выполнения. В последний день курса слушатели выполняют шестичасовую лабораторную работу, имитирующую тестовые задания и ситуацию реального экзамена.
Для кого предназначен курс:
Курс предназначен для тех, кто обладает глубокими знаниями по сетевой безопасности уровня предприятия и нуждается в рекомендациях и практических упражнениях для подготовки к экзамену JNCIE-SEC.
Программа курса:
Модуль 1: Введение
Модуль 2: Экзаменационная стратегия
Подготовка к экзамену
Сдача экзамена
Завершение экзамена.Модуль 3: Концепции инфраструктуры
Темы разделов
Системные задачи
Зоны
Особенности и советы
Лабораторная работа №1: Инфраструктура и зоны.Модуль 4: Построение кластеров
Настройка кластеризации
Redundancy группы и Reth интерфейсы
Обработка сбоев
Особенности и советы
Лабораторная работа №2: Построение кластеров.Модуль 5: Политики безопасности
Политики безопасности
ALG
Работа политик по расписанию
Аутентификация пользователей
Пропуск трафика в пакетном режиме
Файлы регистрации
Особенности и советы
Лабораторная работа №3: Построение политик безопасности.Модуль 6: IPsec VPN
Обзор настроек VPN
Наборы предложений, политики и шлюзы IKE
Наборы предложений, политики и туннели IPsec
Различные типы туннелей — динамические, основанные на маршрутизации, с использованием сертификатов
Отладка построения туннелей
Особенности и советы
Лабораторная работа №4: Построение IPsec VPN.Модуль 7: Трансляция адресов
Использование трансляции адресов
Трансляция адреса источника
Трансляция адреса получателя
Статическая трансляция
Пересекающиеся диапазоны адресов
Команды проверки и общие проблемы трансляции
Лабораторная работа №5: Трансляция адресов.Модуль 8: Предотвращение атак
Обзор механизмов предотвращения атак
IDP
Дополнительные возможности по предотвращению атак
Особенности и советы
Лабораторная работа №6: Предотвращение атак.Модуль 9: Унифицированное управление защитой от угроз (UTM) и опции SCREEN
Обзор механизмов UTM
Фильтрация WEB-адресов
Антивирус
Опции SCREEN
Лабораторная работа №7: Унифицированное управление защитой от угроз и опции SCREEN.Модуль 10: Дополнительные возможности развертывания
Прозрачный режим
Продвижение на основе правил (Filter-Based Forwarding)
Лабораторная работа №8: Дополнительные возможности развертыванияИмитация экзамена JNCIE-SEC.
- AJS — Углубленное изучение ОС JUNOS для оборудования безопасности
- Длительность: 5 дней (40 часов)
- Код курса: AJS
- Стоимость
- Очный формат: 661 500 ₸
- Онлайн формат: 647 500 ₸
Описание курса
Предварительные требования:
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и другим специалистам, работающим с оборудованием обеспечения безопасности под программным обеспечением Junos.
Описание курса:
5-дневный курс AJSEC является продолжением курса JSEC и посвящен углубленному изучению функционала безопасности ОС Junos. В курсе изучается оборудование SRX-серии и рассматриваются темы виртуализации, улучшенной защиты от угроз Sky ATP, безопасности приложений (AppSecure), обеспечения надежности, внедрения IPsec, NAT и реализации безопасности на канальном уровне.
Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели приобретут навыки работы с оборудованием безопасности, изучат основные принципы настройки и мониторинга оборудования безопасности на программном обеспечении Junos.
Для кого предназначен курс:
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и другим специалистам, работающим с оборудованием обеспечения безопасности под программным обеспечением Junos.
Программа курса:
Модуль 1: Введение
Модуль 2: Обработка пакетов и безопасность на канальном уровне
Безопасность в «прозрачном режиме» (Transparent Mode)
Secure Wire
Коммутация на канальном уровне
MACsec
Лабораторная работа №1: Применение механизмов безопасности на канальном уровне.Модуль 3: Виртуализация
Обзор механизмов виртуализации
Виртуальные маршрутизаторы (Routing Instances)
Логические системы (Logical Systems)
Лабораторная работа №2: Настройка виртуальных маршрутизаторов.Модуль 4: Теоретические основы обеспечения безопасности приложений (AppSecure)
Обзор технологии AppSecure
Основы опознавания приложений (AppID)
Технология AppID
Кэш приложений (Application System Cache)
Создание собственных сигнатур приложений.Модуль 5: Использование AppSecure
Отслеживание трафика приложений (AppTrack)
Разрешение и запрет приложений (AppFW)
Реализация QoS для приложений (AppQoS)
Маршрутизация в зависимости от приложения (APBR)
Работа в режиме SSL Proxy
Лабораторная работа № 3: Применение AppSecure.Модуль 6: Работа с системой Log Director
Обзор системы Log Director
Компоненты Log Director
Инсталляция и настройка Log Director
Кластеризация с виртуальной машиной Log Concentrator
Администрирование Log Director
Лабораторная работа №4: Развертывание Log Director.Модуль 7: Теоретические основы Sky ATP
Обзор Sky ATP
Мониторинг Sky ATP
Анализ и обнаружение вредоносного кода.Модуль 8: Применение Sky ATP
Настройка Sky ATP
Инсталляция Sky ATP
Анализ и детектирование вредоносного кода
Пример исследования зараженного хоста
Лабораторная работа №5: Демонстрация инструктором возможностей Sky ATP.Модуль 9: Развертывание UTM
Обзор UTM
Модуль AntiSpam
Работа с антивирусом
Фильтрация содержимого сессий и URL
Лабораторная работа №6: Применение UTM.Модуль 10: Введение в технологию IPS
Обзор IPS
Защита компонентов сети
Методы проникновения атак в сеть
Защита от проникновения
Последовательность действий по обнаружению вторжений.Модуль 11: Политики и настройки IPS
Требования в устройствам SRX для инсталляции IPS
Режимы работы IPS
Базовый обзор системы IPS
Функционирование базы правил IPS
Лабораторная работа №7: Развертывание базовой политики IPS.Модуль 12: Software-Defined Security Networks (SDSN)
Обзор SDSN
Компоненты SDSN
Настройка SDSN
Отладка работы системы Policy Enforcer
Примеры настройки SDSN
Лабораторная работа №8: Внедрение SDSN.Модуль 13: Применение политики, мониторинг и построение отчетов
Обзор механизмов аутентификации пользователей, в том числе интегрированной
Развертывание межсетевого экрана с аутентификацией пользователей
Мониторинг аутентификации
Развертывание интегрированной аутентификации
Мониторинг интегрированной аутентификации
Лабораторная работа №9: Настройка механизмов аутентификации.Модуль 14: Поиск и устранение неисправностей в настройках безопасности ОС Junos
Методология поиска и устранения неисправностей
Средства поиска и устранения неисправностей
Отладка построения IPsec туннелей
Лабораторная работа №10: Выполнение поиска и устранения неисправностей в настройках безопасности
Приложение А: Оборудование SRX-серии и типы интерфейсовОбзор платформ младшего уровня (Branch)
Обзор платформ старшего уровня (High End)
Прохождение трафика через устройства семейства SRX
Интерфейсы. - JAUT — Junos Automation
- Длительность: 4 дня (32 часа)
- Код курса: JAUT
- Стоимость
- Очный формат: 623 000 ₸
- Онлайн формат: 608 000 ₸
Описание курса
Предварительные требования:
Слушатели должны иметь базовые знания в области сетей передачи данных, а также знания по операционной системе JUNOS в рамках курсов Introduction to the Junos Operating System (IJOS) и Junos Routing Essentials (JRE). Также рекомендуется знакомство с каким-либо из языков программирования, таким как C, C++, Perl, Java.
Цели курса:
Это курс среднего уровня сложности. После успешного окончания курса слушатели получат следующие знания и навыки:
Преимущества автоматизации Junos
Разница между commit, op, и event скриптами
Формат документа XML
Использование XML в Junos в операционном и конфигурационном режимах
Взаимодействие скриптов с XML
Структура скрипта SLAX
Переменные SLAX и контроль выполнения
Создание и тест SLAX-скриптов
Функции расширения Junos
Использование commit скриптов для изменения конфигурации
Использование commit скриптов для вывода сообщений и проверки конфигурации
Настройка и подключение commit скриптов
Использование op скриптов
Определение аргументов и вызов команд операционного режима
Использование op скриптов для изменения конфигурации
Настройка op скриптов
Политики и скрипты, выполняемые по событию (event)
Настройка event скриптов.Описание курса:
Этот курс спроектирован с целью дать слушателям знания и практические навыки, необходимые для разработки сценариев (скриптов) при работе с ОС Junos. Курс содержит обзор языков Extensible Markup Language (XML) и Stylesheet Language Alternative Syntax (SLAX), шаблонов и библиотек Junos, и скриптов трех видов: commit, operation и event. Благодаря подробному изложению теоретического материала и большому количеству лабораторных работ, слушатели получат достаточный для практической работы опыт создания скриптов и автоматизации JunOS.
Для кого предназначен курс:
Для специалистов операторов связи.
Программа курса:
Глава 1: Введение
Глава 2: Основы автоматизации
Обзор
Введение в commit, op, и event скрипты
Решения по автоматизации.Глава 3: XML
Обзор XML
XML в Junos
XML в скриптах
Лабораторная работа 1.Глава 4: SLAX
Введение в SLAX
Шаблоны
XML-тэги
Переменные
Контроль выполнения в SLAX
Структура скрипта
Дополнительные ссылки
Лабораторная работа 2.Глава 5: Библиотека функций Junos
Функции расширения Junos
Логические функции
Манипулирование данными
Ввод-вывод
Утилиты
Аргументы
Лабораторная работа 3.Глава 6: Commit-скрипты
Введение
Внесение изменений в конфигурацию
Вывод сообщений об ошибках
Собственные настройки в конфигурации
Настройка и подключение commit скриптов
Лабораторная работа 4.Глава 7: Op-скрипты
Введение
Простой пример
Аргументы
Вызов команд операционного режима
Вывод
Использование op скриптов для изменения конфигурации
Настройка скриптов
Лабораторная работа 5.Глава 8: Event-скрипты
Введение
Обработка событий
Event policy
Написание event-скриптов
Лабораторная работа 6
Дополнение А: XSLTВведение в XSLT
Шаблоны
Контроль выполнения в XSLT
Структура скрипта в XSLT
Дополнительные сcылки. - JSM — Junos Subscriber Management
Описание курса
Предварительные требования:
Слушатели должны иметь твердые знания сетевых технологий и концепции широкополосного доступа, уметь управлять маршрутизаторами на операционной системе Junos через интерфейс командной строки и посетить курс IJOS. Вводный курс по операционной системе JUNOS (IJOS).
Описание курса:
3-дневный курс JSM дает знания, необходимые для настройки и управления широкополосным абонентским доступом на устройствах с операционной системой Junos. В курсе изучается конфигурирование основных компонентов широкополосного доступа: AAA (authentication, authorization and accounting), приложений DHCP local server и DHCP relay/proxy agent, протокола PPP, профилей автоматической настройки (Dynamic profiles), абонентских интерфейсов и адресации, сервиса Layer 3 and Layer2 wholesale, внедрение фильтров защиты, функционала CoS и multicast-сервиса через профили автоматической настройки.
Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга приложений широкополосного доступа в маршрутизаторах MX-серии.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой и мониторингом приложений широкополосного доступа в маршрутизаторах MX-серии на операционной системе Junos.
Программа курса:
Модуль 1: Введение
Модуль 2: Концепция широкополосного доступа
Обзор используемых терминов
Концепция и дизайн сети
Компоненты, используемые при конфигурации, и порядок взаимодействия с серверами
Требуемые лицензии.Модуль 3: Организация и управление доступом абонентов
Обзор тематики
Сервисы AAA
Приложение Extended DHCP Local Server
Приложение Extended DHCP Relay
Назначение адреса абоненту
Организация доступа с применением протокола L2TP
Лабораторная работа №1: Организация и управление доступом абонентов.Модуль 4: Создание абонентских интерфейсов и профилей автоматической настройки (Dynamic Profiles)
Обзор интерфейсов и их идентификации в операционной системе Junos
Варианты настройки VLAN
Профили автоматической настройки (Dynamic Profiles)
Статический и динамический способы создания абонентских интерфейсов
Средства мониторинга и устранения неисправностей
Лабораторная работа №2: Конфигурирование интерфейсов и профилей автоматической настройки.Модуль 5: Использование протокола PPPoE для организации абонентского доступа
Обзор протокола PPPoE
Использование протокола PPPoE для автоматического создания интерфейсов (Dynamic PPPoE)
Конфигурация Dynamic PPPoE
Автоматическое создание интерфейсов с применением сервисных таблиц (PPPoE Service Name Tables)
Лабораторная работа №3: Организация абонентского доступа с применением протокола PPPoE.Модуль 6: Сервисы Layer 3 and Layer2 wholesale
Обзор сервисов Wholesale
Layer 3 DHCP Wholesale
Layer 3 PPPoE Wholesale
Layer 2 Wholesale
Лабораторная работа №4: Конфигурирование Layer 3 Wholesale сервиса.Модуль 7: Применение фильтров защиты через профили автоматической настройки
Обзор функционала фильтрации трафика
Внедрение фильтров защиты через профили автоматической настройки
Мониторинг работы фильтров и просмотр счетчиков
Лабораторная работа №5: Конфигурирование и применение фильтров защиты.Модуль 8: Внедрение функционала CoS через профили автоматической настройки
Обзор функционала CoS (Class of Service)
Классификация трафика, распределение ресурсов между очередями
Варианты внедрения CoS для абонента
Средства мониторинга и устранения неисправностей
Лабораторная работа №6: Конфигурирование CoS для абонента.Модуль 9: Внедрение multicast-сервиса через профили автоматической настройки
Обзор протокола IGMP
Внедрение multicast-сервиса через профили автоматической настройки
Мониторинг multicast-сервиса и протокола IGMP
Лабораторная работа №7: Конфигурирование multicast-сервиса через профили автоматической настройки
Приложение А: Протокол ANCP (Access Node Control Protocol)
Обзор протокола ANCP
Настройка протокола ANCP
Мониторинг протокола ANCP. - IPV6 — Junos IP version 6
- Длительность: 2 дня (16 часов)
- Код курса: IPV6
- Стоимость
- Очный формат: 476 500 ₸
- Онлайн формат: 441 000 ₸
Описание курса
Предварительные требования:
Intermediate-level of networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite.
Attend the IJOS. Вводный курс по операционной системе JUNOS (IJOS), the JRE. Программное обеспечение JUNOS. Основные вопросы маршрутизации (JRE), and the JIR. Маршрутизация в ОС JUNOS (JIR) courses prior to attending this class.Цели курса:
After successfully completing this course, you should be able to:
Describe the similarities and differences between IP version 4 (IPv4) and IPv6.
Explain the different extension headers and their uses.
Identify the different IPv6 address types.
Explain the IPv6 neighbor discovery process.
Describe the maximum transmission unit (MTU) discovery process.
Configure and monitor the Virtual Router Redundancy Protocol (VRRP).
Define the routing tables used for IPv6 routing.
Explain and configure static, aggregated, and generated IPv6 routes.
Identify and explain IPv6 firewall filters.
Describe and implement OSPFv3 routing.
Explain and configure IPv6 networks using IS-IS.
Describe and implement BGP peering sessions using IPv6.
Identify the different transition methods.
Explain concepts for using dual stack.
Explain and identify the different methods for tunneling IPv6 traffic.
Describe a basic troubleshooting method.
Identify and explain common operational mode commands used for troubleshooting IPv6 problems.
Explain protocol enhancements in Routing Information Protocol next generation (RIPng).
Describe and configure RIPng.Описание курса:
This two-day course provides detailed coverage of IP version 6 (IPv6) operations including Neighbor Discovery, ICMPv6, IPv6 protocol independent routing, OSPFv3, IS-IS, BGP, RIPng, transitions methods, and troubleshooting methodology and commands supported by the Junos operating system.
Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the Junos operating system and in monitoring device and IPv6 protocol operations. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1R1.9.
Для кого предназначен курс:
This course benefits individuals responsible for configuring and monitoring IPv6 in the Junos OS.
Программа курса:
Chapter 1: Course Introduction
Chapter 2: Introduction to IPv6 Addressing
Comparing IPv4 and IPv6
Extension Headers
IPv6 Address
Subnetting
Interface Configuration
Lab 1: Configuring IPv6 Interfaces.Chapter 3: IPv6 Protocol and Services
ICMPv6 Overview
Neighbor Discovery
MTU Discovery
VRRP
DHCPv6
DNS
Lab 2: Configuring IPv6 Services.Chapter 4: Protocol Independent Routing and Filters
IPv6 Routing Tables
Protocol Independent Routing
Firewall Filters
Lab 3: Configuring Protocol Independent Routing.Chapter 5: OSPFv3
OSPFv3 Overview
OSPFv3 Configuration
Lab 4: Configuring OSPFv3Chapter 6: IS-IS
IS-IS Overview
IS-IS Configuration
Lab 5: Configuring IS-IS.Chapter 7: BGP
BGP Overview
BGP Configuration
Lab 6: Configuring BGP.Chapter 8: Transition Methods
Transition Plans
Dual Stack
Tunneling
Lab 7: Configuring GRE Tunneling.Chapter 9: Troubleshooting
Basic Troubleshooting Guide
IPv6 Show Commands
Lab 8: Troubleshooting
Appendix A: RIPng
Introduction to RIPng
Configuring RIPng
Lab 9: Configuring RIPng (Optional). - AJSPR — Advanced Junos Service Provider Routing
- Длительность: 5 дней (40 часов)
- Код курса: AJSPR
- Стоимость
- Очный формат: 661 500 ₸
- Онлайн формат: 647 500 ₸
Описание курса
Кому следует посетить:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и устранением неисправностей в работе компонентов сетевого уровня на оборудовании операторов связи.
Предварительные требования:
Слушатели должны иметь базовые знания в области сетей передачи данных, понимать модель Open Systems Interconnection (OSI) и стек протоколов TCP/IP
Слушатели должны иметь знания по операционной системе JUNOS в рамках курсов Introduction to the Junos Operating System (IJOS) и Junos Intermediate Routing (JIR)Цели курса:
После прохождения данного курса слушатели будут уметь:
Понимать разницу между различными типами OSPF link-state advertisement (LSA)
Объяснять лавинную рассылку LSA в сети OSPF
Описывать алгоритм поиска кратчайшего пути (SPF), понимать метрику каналов
Настраивать различные методы аутентификации OSPF
Объяснять ключевые различия между OSPFv2 и OSPFv3
Настраивать различные типы областей OSPF
Суммировать маршруты
Настраивать перераспределение маршрутов в домене OSPF
Понимать концепции и принцип действия IS-IS
Составлять список правил смежности IS-IS и устранять типичные проблемы смежности
Настраивать и контролировать работу IS-IS
Выполнять расширенные параметры конфигурации IS-IS
Настраивать и контролировать многоуровневую сеть IS-IS
Разбираться в ключевых особенностях и атрибутах BGP
Оптимизировать процесс выбора маршрута для BGP
Влиять на процесс передачи трафика с помощью политик BGP
Подробно описывать атрибуты Origin, MED и communities BGP и их работу
Управляйте атрибутами BGP с помощью политики маршрутизации
Знать BGP route reflection
Понимать особенности BGP confederation
Описывать DDoS-атаки и методы их предотвращения
Настраивать и контролировать FlowSpec
Искать и устранять неполадки в архитектуре маршрутизацииСодержание курса:
Данный пятидневный курс AJSPR дает слушателям подробные знания и навыки настройки протоколов маршрутизации OSPF, IS-IS, BGP и политик маршрутизации в JUNOS. Данный курс состоит из теоретического материала и практических занятий, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения Junos, получат навыки контроля за работой оборудования и протоколов маршрутизации.
В курсе используются маршрутизаторы Juniper Networks серии vMX для выполнения практических заданий, но это не исключает возможности применения настроек и на других аппаратных платформах Juniper под управлением ОС Junos. Курс основан на версии 19.3 ОС JunosПрограмма курса:
Глава 1: Введение
Глава 2: Протокол OSPF
Обзор OSPFv2
Разновидности Link State Advertisements
Работа протокола OSPF
Аутентификация OSPF
Лабораторная работа №1: Настройка и мониторинг протокола OSPFГлава 3: Разновидности областей OSPF
Обзор разновидностей областей OSPF
Работа OSPF в области “Stub”
Настройка области “Stub”
Работа OSPF в области “NSSA”
Настройка области “NSSA”
Суммаризация маршрутов
Лабораторная работа №2: Суммаризация маршрутовГлава 4:Протокол OSPF. Примеры настроек и решений
Виртуальные линки
Multiarea Adjacency
Организация достижимости внешних сетей (External Reachability)
Лабораторная работа №3: Настройка и мониторинг политик маршрутизации и специальных опций OSPFГлава 5:Отладка работы протокола OSPF
Поиск и устранение неполадок в работе протокола OSPF
Лабораторная работа №4: Отладка работы протокола OSPFГлава 6:Протокол IS-IS
Обзор протокола IS-IS
Протокольные сообщения IS-IS (PDUs)
Соседи и установление связи между соседями по протоколу IS-IS
Настройка и мониторинг протокола IS-IS
Лабораторная работа №5: Настройка и мониторинг протокола IS-ISГлава 7:Работа протокола IS-IS и возможности конфигурирования
Работа протокола IS-IS
Возможности конфигурирования
Применение политик маршрутизации к протоколу IS-IS
Лабораторная работа №6: Настройка и мониторинг политик и опций протокола IS-ISГлава 8:Настройка многоуровневой топологии IS-IS
Работа протокола IS-IS на первом и втором уровнях
Настройка многоуровневой топологии
Лабораторная работа №7: Настройка многоуровневой топологии IS-ISГлава 9:Отладка работы протокола IS-IS
Поиск и устранение неполадок в работе протокола IS-IS
Лабораторная работа №8: Отладка работы протокола IS-ISГлава 10:Протокол BGP
Обзор протокола BGP
Работа протокола BGP
Алгоритм выбора лучшего маршрута
Изучение конфигурационных параметров
Лабораторная работа №9: Настройка протокола BGP и его атрибутовГлава 11:Атрибуты протокола BGP и использование политик — первая часть
Применение политик к протоколу BGP
Атрибут Next-Hop
Атрибуты Origin и MED
Атрибут AS Path
Лабораторная работа №10: Изучение атрибутов: Next-Hop, Origin, MED и AS PathГлава 12:Атрибуты протокола BGP и использование политик — вторая часть
Атрибут Local Preference
Атрибут Communities
Лабораторная работа №11: Изучение атрибутов: Local Preference и CommunitiesГлава 13:Масштабирование с отражением маршрутов и применением конфедераций
Масштабирование с отражением маршрутов
Конфигурирование и распространение маршрутной информации
Масштабирование с применением конфедераций
Лабораторная работа №12: Масштабирование протокола BGPГлава 14:BGP FlowSpec
Обзор атак DDoS
Методы предотвращения DDoS
Обзор FlowSpec
Настройка и мониторинг FlowSpec
Лабораторная работа №13: BGP FlowSpecГлава 15:Отладка работы протокола BGP
Поиск и устранение неполадок в работе протокола BGP
Лабораторная работа №14: Отладка работы протокола BGPГлава 16:Отладка работы политик маршрутизации
Поиск и устранение неполадок в работе политик маршрутизации
Лабораторная работа №15: Отладка работы политик маршрутизацииГлава 17:Итоговый контроль знаний
- JSPX — Коммутация данных для операторов связи в ОС JUNOS
- Длительность: 2 дня (16 часов)
- Код курса: JSPX
- Стоимость
- Очный формат: 476 500 ₸
- Онлайн формат: 441 000 ₸
Описание курса
Предварительные требования:
Слушатели должны понимать базовые принципы работы протоколов TCP/IP и маршрутизации и посетить курсы Introduction to JUNOS Software (IJS) and JUNOS Routing Essentials (JRE).
Описание курса:
2-дневный курс JSPX дает знания о процессе коммутации данных и рассматривает примеры конфигурации. Основными темами курса являются обзор принципов коммутации, локальные вычислительные сети (LAN), виртуальные локальные компьютерные сети (VLAN), процесс определения адресов на втором уровне, режим прозрачной коммутации (bridging), протокол STP, функции OAM в сетях Ethernet. Также курс включает материал о реализации интерфейсов, совмещающих функции маршрутизации и коммутации (IRB), виртуальных инстанций, виртуальных коммутаторов, балансировки нагрузки и зеркалирования портов. Данный курс включает в себя теоретический материал и практические занятия, в процессе выполнения которых слушатели изучат основные принципы конфигурации и мониторинга программного обеспечения JUNOS, получат навыки контроля за работой оборудования.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и техническим обслуживанием устройств, работающих под программным обеспечением JUNOS.
Программа курса:
Модуль 1: Введение
Модуль 2: Ethernet-коммутация и виртуальные локальные компьютерные сети (VLAN)
Локальные вычислительные сети на технологии Ethernet
Режим прозрачной коммутации (bridging)
Настройка и мониторинг VLAN
Автоматическое администрирование VLAN
Настройка и мониторинг интерфейсов IRB
Определение адресов на втором уровне и передача данных
Применение фильтров на втором уровне
Лабораторная работа №1: Ethernet-коммутация и VLAN.Модуль 3: Концепция виртуальных коммутаторов
Обзор виртуальных инстанций
Настройка и мониторинг виртуальных коммутаторов
Взаимодействие виртуальных инстанций
Логические системы
Лабораторная работа №2: Виртуальные коммутаторы.Модуль 4: Режим прозрачной коммутации (Bridging)
Развитие сетей с прозрачной коммутацией
Режим прозрачной коммутации в операторских сетях
Настройка и мониторинг
Лабораторная работа №3: Режим прозрачной коммутации в операторских сетях.Модуль 5: Протоколы STP
Обзор протокола STP
Обзор протокола RSTP
Обзор протокола MSTP
Обзор протокола VSTP
Настройка и мониторинг протоколов STP
Рассмотрение понятий BPDU, Loop и Root Pritection
Лабораторная работа №4: Протокол MSTP.Модуль 6: Функции OAM в сетях Ethernet
Обзор функций OAM
LFM
CFM
Настройка и мониторинг
Лабораторная работа №5: Функции OAM в сетях Ethernet.Модуль 7: Высокая доступность и оптимизация сетей
Обзор механизма зашиты ERP (Ethernet Ring Protection)
Настройка и мониторинг ERP
Обзор групп агрегированных линков (LAG)
Настройка и мониторинг LAG
Обзор технологии MC-LAG (агрегирование линков с разных устройств)
Настройка и мониторинг технологии MC-LAG
Лабораторная работа №6: Высокая доступность и оптимизация сетей.Модуль 8: Поиск неисправностей и мониторинг
Введение в поиск неисправностей и мониторинг
Инструменты для поиска неисправностей и мониторинга
Пример поиска неисправностей: перегрузка на сети
Лабораторная работа №7: Поиск неисправностей и мониторинг - AJSPT — Углубленный курс по поиску и устранению неисправностей на ОС JUNOS
- Длительность: 2 дня (16 часов)
- Код курса: AJSPT
- Стоимость
- Очный формат: 476 500 ₸
- Онлайн формат: 441 000 ₸
Описание курса
Предварительные требования:
Данный курс является курсом повышенной сложности и для того, чтобы курс прошел максимально эффективно для слушателей, необходимо посетить следующие курсы:
Junos Troubleshooting in the NOC (JTNOC);
Advanced Junos Service Provider Routing (AJSPR);
Junos MPLS and VPNs (JMV);
Junos Multicast Routing (JMR);
Junos Class of Service (JCOS).Описание курса:
2-дневный курс AJSPT включает следующие темы: поиск и устранение неисправностей аппаратной и программной частей маршрутизатора, протоколов OSPF, IS-IS, BGP,политик маршрутизации, MPLS, VPN (2 и 3 уровней), CoS, а также работа с проблемами, возникающими в результате потери и задержки пакетов. Данный курс состоит из теоретического материала и практических занятий, в процессе выполнения которых слушатели изучат основные принципы и команды, используемые в процессе мониторинга и устранения неисправностей. Лабораторные работы выполняются на оборудовании MX-серии, но это не препятствует использовать полученные знания и навыки при работе с другими платформами под ОС JUNOS.
Для кого предназначен курс:
Курс рекомендован и будет полезен специалистам, которые занимаются настройкой, мониторингом и устранением неисправностей на оборудовании операторов связи.
Программа курса:
Модуль 1: Введение
Модуль 2: Методы поиска и устранения неисправностей
Процесс поиска и устранения неисправностей
Сбор информации о проблеме
Воспроизведение ситуации в лаборатории
Анализ причины
Отработка проблемы потери пакетов
Отработка проблемы задержки пакетов
Лабораторная работа: Отработка проблемы потери пакетов.Модуль 3: Поиск и устранение неисправностей в аппаратной части
Основные компоненты в составе шасси
Обеспечение надежности
Изучение примера.Модуль 4: Поиск и устранение неисправностей интерфейсов
Классификация интерфейсов
Основные типы интерфейсов
IPv4 и IPv6
Изучение примеров
Лабораторная работа: Поиск и устранение неисправностей интерфейсов.Модуль 5: Поиск и устранение неисправностей в программной части
Выявление проблемы
Использование базы данных клиентских запросов на сайте (PR)
Использование базы знаний на сайте (KB)
Временные и постоянные варианты решений проблемы
Изучение примеров.Модуль 6: Поиск и устранение неисправностей внутренних протоколов маршрутизации (IGP)
Протокол OSPF
Протокол OSPFv3
Протокол IS-IS
Лабораторная работа: Поиск и устранение неисправностей внутренних протоколов маршрутизации.Модуль 7: Поиск и устранение неисправностей протокола BGP
IBGP (Internal BGP)
EBGP (External BGP)
Лабораторная работа: Поиск и устранение неисправностей протокола BGP.Модуль 8: Поиск и устранение неисправностей в работе политик маршрутизации
Обзор политик маршрутизации и их применение
Структура политики
Использование регулярных выражений
Полезные команды
Изучение примеров
Лабораторная работа: Поиск и устранение неисправностей в работе политик маршрутизации.Модуль 9: Поиск и устранение неисправностей MPLSи VPNs
MPLS
VPN3-го уровня
VPN 2-го уровня
VPLS
Лабораторная работа: Поиск и устранение неисправностей MPLSи VPNs.Модуль 10: Поиск и устранение неисправностей. Дополнительные темы
Широковещание (Multicast)
Качество обслуживания (Classofservice)
Лабораторная работа.
Palo Alto
- PAN-210 — Инсталляция, настройка, управление межсетевым экраном Palo Alto
- Длительность: 5 дней (40 часов)
- Код курса: PAN-210
- Стоимость
- Очный формат: 656 000 ₸
- Онлайн формат: 642 000 ₸
Описание курса
Описание курса
Данный пятидневный курс обеспечивает слушателям глубокие теоретические знания и практические навыки по инсталляции, настройке и управлению всеми межсетевыми экранами из линейки Next-Generation компании Palo Alto Networks. Слушатели познакомятся с механизмами настройки безопасности, сетевого взаимодействия, предупреждения угроз, идентификации приложений, идентификации пользователей, построения VPN туннелей, логирования и построения отчетов операционной системы Palo Alto Networks Operation System (PAN-OS).
Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
Данный курс предполагает наличие у слушателей базовых знаний сетевых технологий, включая основы маршрутизации, коммутации и формирования IP адресов. Слушатели также должны быть знакомы с концепцией обеспечения безопасности с помощью пакетных фильтров. Приветствуются углубленные знания в области компьютерной безопасности — IPS, content filtering, proxy.
Содержание курса
День 1
Модуль 0: Введение
Модуль 1: Обзор платформ и архитектуры
Обзор платформ безопасности
Архитектура обеспечения проверки за один проход
Модель безопасности Zero Trust
Аппаратные платформыМодуль 2: Первоначальная настройка устройства
Графическая среда управления, командная строка и API
Первоначальный доступ к системе
Управление конфигурацией
Установка обновлений операционной системы и программ, лицензирование
Управление учетными записями администраторов
Просмотр и фильтрация логов
Лабораторная работа — Первоначальная настройкаМодуль 3: Настройка интерфейсов
Зоны (Security Zones) и интерфейсы
Типы интерфейсов — L2, L3, Virtual Wire, Tap, VLAN, loopback
Сабинтерфейсы
Виртуальные маршрутизаторы
Маршрутизация на основе политик (Policy Based Forwarding)
Лабораторная работа — Настройка интерфейсовДень 2
Модуль 4: Политики безопасности и адресной трансляции
Базовые концепции политики безопасности
Настройка и управление политикой безопасности
Политика трансляции адресов
Настройка трансляции адреса источника (Source NAT)
Настройка трансляции адреса получателя (Destination NAT)
Лабораторная работа — Политика безопасности
Модуль 5: Идентификация приложений (App-ID)
Процесс идентификации приложений
Использование приложений в политике безопасности
Идентификация неизвестных приложений
Обновление сигнатур приложений
Миграция с правил для портов на правила для приложений
Лабораторная работа — Основы идентификации приложенийМодуль 6: Идентификация контента (Content-ID)
Обзор механизмов идентификации контента
Защита от атак на уязвимости
Антивирус
Защита от программ-шпионов
Блокирование передачи файлов
Блокирование трафика, содержащего запрещенные для передачи данные
Использование идентификации контента в политике безопасности
Телеметрия и анализ угроз
Защита от DoS атак
Лабораторная работа — Идентификация контентаДень 3
Модуль 7: Фильтрация URL
Профайлы фильтрации URL
Применение профайлов в политике безопасности
Лабораторная работа — Фильтрация URLМодуль 8: Расшифровка
Концепции расшифровки SSL
Работа с сертификатами
Расшифровка исходящего SSL трафика
Расшифровка входящего SSL трафика
Дополнительные настройки — неподдерживаемые приложения, отказ от расшифровки, зеркалирование трафика, аппараттные модули, отладка и исправление неполадок
Лабораторная работа — Расшифровка SSL трафикаМодуль 9: WildFire
Концепции WildFire
Настройка и управление WildFire
Отчеты WildFire
Лабораторная работа — WildFireДень 4
Модуль 10: Идентификация пользователей
Обзор механизма идентификации пользователей
Методы сопоставления пользователей с адресами
Настройка идентификации пользователей
Настройка встроенного агента идентификации
Настройки агента идентификации под Windows
Соотнесение пользователей с группами
Использование учетных записей в политике безопасности
Лабораторная работа — Идентификация пользователейМодуль 11: GlobalProtect
Обзор технологии Global Protect
Подготовка межсетевого экрана к использованию Global Protect
Настройка портала
Настройка шлюза
Настройка агентов
Лабораторная работа — Global ProtectМодуль 12: IPSec VPN
Обзор технологии IPSec
Построение туннеля между двумя межсетевыми экранами
Отладка IPSec туннелей
Лабораторная работа — Построение IPSec туннеляДень 5
Модуль 13: Мониторинг и построение отчетов
Работа с закладками Dashboard, ACC и Monitor
Перенаправление логов на внешние сервера
Использование syslog
Настройка SNMP
Лабораторная работа — Мониторинг и построение отчетовМодуль 14: Отказоустойчивость (High Availability, HA)
Компоненты и функционирование HA
Настройка режима Active/Passive
Мониторинг состояния HA
Лабораторная работа — High AvailabilityМодуль 15: Дополнительные возможности и настройки
Рекомендации по настройке и применению
Анализ информации в закладке ACC
Оптимизация профайлов защиты
«Узкие места» и рекомендации по настройке
Лабораторная работа — Полная настройка системыМодуль 16: Что дальше?
Рекомендации по дальнейшему прохождению курсов для разных типов работ
Рекомендации по подготовке к сдаче сертификационных экзаменов - PAN-214 — Firewall 9.0: оптимизация межсетевого экрана для профилактики угроз
- Длительность: 4 дня (32 часа)
- Код курса: PAN-214
- Стоимость
- Очный формат: 566 500 ₸
- Онлайн формат: 557 000 ₸
Описание курса
Описание курса
Данный четырехдневный курс позволит слушателям научиться настраивать, управлять и эксплуатировать систему предотвращения угроз PAN-OS®. Слушатели получают практический опыт настройки, управления и мониторинга системы предотвращения угроз в лабораторной среде. Дополнительно слушатели получат глубокие теоретические знания и практические навыки по темам:
жизненный цикл кибератаки и распознавание общих форм атак;
возможности системы профилактики угроз PAN-OS®;
использование данных журнала событий и отчетов при выборе настроек системы;
настройка межсетевого экрана для обнаружения, блокирования и протоколирования угроз.Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
На курс допускаются слушатели, ранее успешно завершившие обучение на курсе PAN-210 Основы инсталляции, настройки и управления межсетевым экраном Palo Alto версии 9.0 и имеющие опыт работы с межсетевыми экранами Palo Alto Networks не менее 6 месяцев. Также слушатели должны иметь знания в области сетевых технологий, включая основы маршрутизации, коммутации и IP-адресации.
Содержание курса
Модуль 1: Жизненный цикл кибератаки
Модуль 2: Блокирование Packet- и Protocol-Based атак
Модуль 3: Блокирование угроз от известных источников
Модуль 4: Блокирование угроз с использованием AppID™
Модуль 5: Блокирование угроз с использованием приложений пользователей
Модуль 6: Создание сигнатур
Модуль 7: Блокирование угроз в зашифрованном трафике
Модуль 8: Блокирование угроз в отрытом трафике
Модуль 9: Блокирование угроз после кражи учетных данных
Модуль 10: Анализ информации об угрозах и трафике - PAN-220 — Panorama 9.0: масштабирование управления межсетевыми экранами
- Длительность: 2 дня (16 часов)
- Код курса: PAN-220
- Стоимость
- Очный формат: 463 500 ₸
- Онлайн формат: 451 500 ₸
Описание курса
Описание курса
Данный двухдневный курс обеспечивает слушателям глубокие теоретические знания и практические навыки по настройке и работе с сервером управления межсетевыми экранами Palo Alto Networks® Panorama™. Слушатели познакомятся с механизмами создания агрегированных отчетов, обеспечивающих целостное наблюдение за межсетевыми экранами Palo Alto Networks®.
По результатам обучения слушатели
смогут настраивать и управлять сервером Panorama™
получат опыт настройки шаблонов и групп устройств
получат опыт администрирования и работы с функциями сбора, регистрации и создания отчетов
получат опыт решения проблем, возникающих при работе с сервером Panorama™ в отказоустойчивых конфигурациях
изучат возможности сервера Panorama™ при сборе статистики и при работе в публичной облачной среде и в облачном решении GlobalProtect™.Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
На курс допускаются слушатели, ранее успешно завершившие обучение на курсе PAN-210 Основы инсталляции, настройки и управления межсетевым экраном Palo Alto версии 9.0 и имеющие опыт работы с межсетевыми экранами Palo Alto Networks не менее 6 месяцев. Также слушатели должны иметь знания в области сетевых технологий, включая основы маршрутизации, коммутации и IP-адресации.
Содержание курса
Модуль 1: Первоначальная настройка
Модуль 2: Добавление межсетевых экранов
Модуль 3: Шаблоны
Модуль 4: Группы устройств
Модуль 5: Административные аккаунты
Модуль 6: Перенаправление и сбор логов
Модуль 7: Агрегированные мониторинг и создание отчетов
Модуль 8: Примеры реализации
Модуль 9: Поиск и устранение неисправностей - PAN-330 — Firewall 9.0: поиск и решение проблем
- Длительность: 3 дня (24 часа)
- Код курса: PAN-330
- Стоимость
- Очный формат: 520 000 ₸
- Онлайн формат: 498 500 ₸
Описание курса
Описание курса
Данный трехдневный курс позволит слушателям получить глубокие теоретические знания и практические навыки по решению сетевых проблем с помощью встроенных инструментов межсетевого экрана, включая интерфейс командной строки, позволит изучить рекомендованные методы решения проблем для различных ситуаций, научит анализировать детальные журналы событий для реальных сценариев и решать сложные проблемы
Целевая аудитория
Курс рекомендован и будет полезен сетевым инженерам, персоналу технической поддержки и инженерам безопасности, работающим с оборудованием обеспечения безопасности под программным обеспечением Palo Alto.
Предварительные требования
На курс допускаются слушатели, ранее успешно завершившие обучение на курсе PAN-210 Основы инсталляции, настройки и управления межсетевым экраном Palo Alto версии 9.0 и имеющие опыт работы с межсетевыми экранами Palo Alto Networks не менее 6 месяцев. Также слушатели должны иметь знания в области сетевых технологий, включая основы маршрутизации, коммутации и IP-адресации.
Содержание курса
Модуль 1: Инструменты и ресурсы
Модуль 2: Основы CLI
Модуль 3: Логика работы
Модуль 4: Захват пакетов
Модуль 5: Журналы диагностических событий
Модуль 6: Входящий трафик
Модуль 7: Транзитный трафик
Модуль 8: Системные функции
Модуль 9: Расшифровка SSL
Модуль 10: Идентификация пользователей User-ID™
Модуль 11: Технология GlobalProtect™
Модуль 12: Эскалация и RMA
Cloud
- HGK07 — NCTA Cloud Architecture
- Длительность: 3 дня (24 часа)
- Код курса: HGK07
- Стоимость
- Очный формат: 658 000 ₸
- Онлайн формат: 637 000 ₸
Описание курса
О курсе:
Чтобы быть облачным архитектором и мастером облачных вычислений, вы должны применять методы и стратегии для разработки безопасных, масштабируемых, экономичных облачных решений и уметь убеждать руководителей следовать вашим рекомендациям. В этом курсе вы разовьете важные навыки в обнаружении информации, необходимой для успешного планирования облачных проектов, определения требований и документирования информации и рекомендаций. Кроме того, вы будете применять эти концепции для оценки поставщиков облачных услуг и разработки безопасных высокодоступных и масштабируемых решений. Вы оставите этот курс способным сравнивать, оценивать и рекомендовать поставщиков облачных услуг, разрабатывать безопасные и масштабируемые облачные решения, а также проводить убедительные презентации на основе данных, в которых ваши рекомендации будут одобрены, а ваши облачные проекты получат зеленый свет.
Курс будет полезен:
Этот курс предназначен для системных администраторов, которые хотят планировать, разрабатывать и внедрять облачные сервисы для своих организаций. Это включает в себя способность понимать особенности, возможности и компоненты облачных решений, предлагаемые поставщиками облачных услуг, на глубоком уровне, чтобы разрабатывать облачные и гибридные решения для развертывания приложений и сценариев инфраструктуры. Облачные архитекторы должны также оценить и спланировать соответствующие компоненты вычислений, сети, базы данных и безопасности, чтобы создать решение, отвечающее потребностям их организации. Кроме того, они должны защищать, отслеживать и оптимизировать эти решения.
Предварительные требования:
Для успешного прохождения этого курса вы должны иметь опыт базового развертывания, настройки и использования клиента и сервера. Вы также должны быть знакомы с оценкой, внедрением, доступом и администрированием облачных сервисов, включая «Программное обеспечение как услуга» (SaaS), «Платформа как услуга» (PaaS) и «Инфраструктура как услуга» (IaaS). У вас также должен быть опыт развертывания приложений и управления ими в облачных средах.
Цели обучения:
В этом курсе вы:
Оцените варианты облачных решений.
Подготовитесь к миграции в облако.
Определите технические требования.
Оцените компоненты облачной службы.
Выберите компоненты инфраструктуры AWS.
Определите требования к базе данных.
Выберите облачные функции и компоненты Rackspace.
Выберите функции и компоненты Microsoft Azure.
Определите требования к лицензированию и SLA.
Создадите масштабируемые облачные решения.
Обеспечите непрерывность бизнеса и аварийное восстановление.
Защитите данные в облаке.
Безопасный доступ к облачным сервисам.
Представите свой план миграции в облако.Содержание курса:
1. Оценка вариантов облачного решения
Обзор технологий и ролей облачных вычислений
Определение типа моделей облачного сервиса
Определение типа реализации облака2. Подготовка к миграции в облако
Управление рисками миграции в облако
Сбор облачной команды
Информация о проекте Document Cloud3. Определение технических требований
Определение требований к операционной системе
Определение требований к приложению4.Оценка компонентов облачных сервисов
Оценка возможностей облачных вычислений
Оценка компонентов облачных вычислений
Оценка облачных хранилищ и компонентов доставки
Оценка программного обеспечения виртуализации
Оценка компонентов платформы управления облаком5. Выбор компонентов инфраструктуры AWS
Выбор требований центра обработки данных
Выбор вычислительных компонентов AWS
Выбор сетевых компонентов AWS
Выбор компонентов AWS Storage и Content Delivery
Выбор решения для управления и мониторинга AWS
Оценка возможности AWS PaaS6. Определение требований к базе данных
Определение требований к базе данных
Выбор сервиса баз данных AWS7. Выбор функций и компонентов Rackspase Cloud
Выбор Rackspace Cloud Compute и сетевых компонентов
Выбор компонентов Rackspace Cloud Database
Выбор Rackspace Cloud Storage
Мониторинг решений Rackspace с помощью облачной аналитики8.Выбор функций и компонентов Microsoft Azure
Выбор вычислительных и сетевых служб Azure.
Выбор службы баз данных Azure.
Выбор службы хранилища Azure.
Выбор службы приложений Azure.
Выбор решения для мониторинга Azure9.Определение требований к лицензированию и SLA
Определение лицензионных требований для облачных решений
Выбор SLA10. Проектирование масштабируемых облачных решений
Оценка параметров масштабирования
Управление вычислительными ресурсами
Управление использованием памяти для облачных решений
Управление хранилищем для облачных решений
Управление сетевыми компонентами11. Обеспечение непрерывности бизнеса и аварийного восстановления
Защита данных в облаке
Обеспечение непрерывности бизнеса
План аварийного восстановления12. Защита данных в облаке
Использование шифрования для защиты данных
Безопасная передача данных
Безопасные данные в состоянии покоя13. Обеспечение доступа к облачным сервисам
Оценка требований к безопасности периметра
Определение требования к аутентификации
Определение процессы событий безопасности14. Представление вашего плана миграции в облако
Применение основ презентации
Создание презентации по миграции в облако
Проведение презентации по миграции в облако
MikroTik
NetApp
- ONTAP9ADM — Администрирование кластеров ONTAP 9.5
- Длительность: 3 дня (24 часа)
- Код курса: ONTAP9ADM
- Стоимость
- Очный формат: 991 000 ₸
- Онлайн формат: 974 500 ₸
Описание курса
Кому следует посетить
Курс рекомендован сетевым инженерам, партнерам производителя, системным инженерам и клиентам производителя.
Сертификации
Этот курс является частью следующих программ сертификаций:
NetApp Certified Storage Installation Engineer (NCSIE), ONTAP
NetApp Certified Data Administrator, ONTAPЦели курса
По завершении этого курса вы сможете:
Описать, как ONTAP вписывается в стратегию Облако и Data Fabric компании NetApp.
Определить платформы, поддерживаемые ONTAP.
Определить компоненты кластера ONTAP .
Создать кластер.
Управлять администраторами ONTAP.
Настраивать и управлять ресурсами хранения.
Настраивать и управлять сетевыми ресурсами.
Описать роль виртуальной машины хранения данных (SVM) в архитектуре хранения данных от NetApp.
Создавать и настраивать SVM.
Создавать и управлять FlexVols.
Реализовывать функции повышения эффективности хранения.
Создавать сервера протоколов в рамках SVM.
Обновлять и восстанавливать патчи и релизы ONTAP.
Описать уровни, на которых ONTAP защищает данные.Follow On Courses
ONTAP Data Protection Administration (DATAPROT9)
ONTAP SAN Implementation (SANIMP)
ONTAP SMB Administration (CIFSAD)
ONTAP NFS Administration (NFSAD)Содержание курса
3-дневный курс, направленный на получение навыков администрирования кластера ONTAP 9.9. В рамках курса изучаются аспекты администрирования, обслуживания и поддержания работы кластера. В работе с кластером используются как интерфейс командной строки, так и графический интерфейс OnCommand System Manager.
Checkpoint
- CP01 — Управление и настройка UTM-продуктов Checkpoint R81.10
- Длительность: 5 дней (40 часов)
- Код курса: CP01
- Стоимость
- Очный формат: 656 000 ₸
- Онлайн формат: 641 000 ₸
Описание курса
Описание курса:
в рамках данного пятидневного курса рассматриваются вопросы установки и настройка UTM-продуктов Checkpoint под управление операционной системы Gaia R81.10. Основной теоретический материал курса посвящен управлению данными устройствами с позиции внедрения и поддержки механизмов сетевой безопасности, в том числе: межсетевого экранирования, механизмов превентивного контроля доступа с использованием контекстной информации, виртуальных частных сетей, аудита сетевой безопасности. Кроме того, рассматриваются вопросы построения отказоустойчивой и гибкой инфраструктуры сетевой безопасности на базе устройств Checkpoint. Данный курс рекомендован для подготовки к сертификации CCSA.
Аудитория курса:
инженеры информационной безопасности, администраторы устройств Checkpoint, персонал группы реагирования на инциденты ИБ.
Предварительные требования к аудитории: понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности.
Содержание:
1. Архитектура Checkpoint
• Основные компоненты архитектуры Checkpoint
• Шлюзы безопасности
• Сервер управления
• Процедуры установки и начальной настройки Checkpoint
• Приложения управления продуктами Checkpoint
• Приложения мониторинга продуктов и трафика
• Варианты развертывания продуктов Checkpoint
• Работа с командной строкой
• Базовое администрирование продуктов Checkpoint2. Политики безопасности
• Правила и политики безопасности
• База данных правил безопасности
• Встроенные правила безопасности
• Принципы обработки трафика правилами безопасности
• Объекты и база данных объектов
• Пакеты политик безопасности
• Унифицированные (Unified) политики безопасности
• Политики контроля доступа (Access Control Policies)
• Политики управления угрозами (Threat Prevention Policies)
• Фильтрация приложений и URL.
• Политики QoS.
• Многоуровневое построение политик безопасности3. Трансляция сетевых адресов (NAT)
• Правила трансляции сетевых адресов и портов на устройствах Checkpoint
• Автоматические и ручные правила трансляции
• Hide NAT
• Static NAT
• Обеспечение сетевой инфраструктуры для работы NAT4. Администрирование Checkoint
• Активация и деактивация программных компонентов Checkpoint
• Лицензирование и работа с приложением SmartUpdate
• Процедура регистрации и файлы контрактов
• Работа с учетными записями пользователей Checkpoint
• Ведение аудита действий пользователей
• Сбор логов и мониторинг событий информационной безопасности через приложения5. VPN и защищенные каналы связи
• Концепция и механика VPN
• Архитектуры и классификация VPN
• Проблемы построения защищенных каналов связи
• Шифрование и типы криптографических систем
• Технологии VPN в инфраструктуре Checkpoint
• Site-to-Site и Remote Access VPN на Checkpoint
• Основы IPsec VPN на Checkpoint
• Основы TLS VPN на Checkpoint
• Работа с трафиком в рамках VPN Checkpoint6. Идентификация пользователей
• Пользователи и группы пользователей
• Программный компонент Identity Awareness
• Интеграция Checkpoint с LDAP
• Механизм Captive Portal
• Формирование ролей доступа
• Политик безопасности на основе информации о пользователях7. Кластеризация средствами Checkpoint
• Механизм ClusterXL
• Legacy/New HA кластер
• Load Balancing кластер
• Мониторинг работы кластера8. Мониторинг, поиск и устранение неисправностей
• Логирование и поиск логов
• Утилиты командной строки для мониторинга сетевой активности
• Утилиты командной строки для поиска и устранения неисправностей
• CPinfo
• CPview
• Fw - CP02 — Углубленное управление продуктами Checkpoint R81.10
- Длительность: 5 дней (40 часов)
- Код курса: CP02
- Стоимость
- Очный формат: 656 000 ₸
- Онлайн формат: 641 000 ₸
Описание курса
Описание курса:
в рамках данного пятидневного курса рассматриваются вопросы углубленной настройки и управления UTM-продуктами Checkpoint под управление операционной системы Gaia R81.10. Основной теоретический материал курса посвящен управлению данными устройствами с позиции поддержки, поиска и устранения неисправностей в механизмах сетевой безопасности, в том числе: межсетевого экранирования, превентивного контроля доступа с использованием контекстной информации, виртуальных частных сетей, аудита сетевой безопасности. Кроме того, рассматриваются вопросы построения отказоустойчивой и гибкой инфраструктуры сетевой безопасности на базе устройств Checkpoint. Данный курс рекомендован для подготовки к сертификации CCSE и CCSM.
Аудитория курса:
инженеры информационной безопасности, администраторы устройств Checkpoint, персонал группы реагирования на инциденты ИБ.
Предварительные требования к аудитории:
глубокое понимание работы сетей пакетной передачи данных, знание основных концепций и механизмов информационной безопасности в продуктах Checkpoint.
Содержание:
1. Операционная система Gaia
• Командная строка Gaia
• Архитектура шлюзов безопасности Checkpoint
• Обработка пакетов шлюзом безопасности
• Отладка процесса обработки пакетов
• Использование fw monitor
• User-space и kernel-space процессы, их взаимодействие
• Отладка основных процессов на шлюзе безопасности и на сервере управления
• Основные kernel-таблицы и структуры данных шлюза безопасности
• Отладка компонентов kernel-space
• Работка с различными модуля ядра Gaia
• Отладка процессов трансляции сетевых адресов (NAT)
• Процесс установки политик безопасности на шлюз безопасности
• Неисправности при установке политик безопаcности
• Отладка процесса установки политик безопасности2. Оптимизация работы шлюза безопасности Checkpoint
• Механизм CoreXL
• Механизм SecureXL
• Механизмы шаблонизации сетевых соединений
• Акселерация процесса обработки пакетов
• SND (Security Network Dispatcher)
• Механизм Multi-Queue
• Механизм Priority queue
• Практика оптимизации работы шлюза безопасности
• Отладка и мониторинг процессов акселерации3. Механизмы VPN
• Отладка и мониторинг механизмов и процессов VPN
• Route-based Site-to-Site VPN
• Механизмы Remote-Access VPN
• Checkpoint Capsule
• SNX
• Mobile Access Portal4. Защита от APT средствами Checkpoint
• Дешифрование HTTPS
• IPS. Компоненты и отладка
• GEO-политики
• URL фильтрация. Компоненты и отладка
• Anti-bot и Antivirus. Технологии SandBlast.
• Content Awareness
• Antispam5. Кластеризация и отказоустойчивость Checkpoint
• Режимы работы ClusterXL
• Мониторинг кластера
• Отладка синхронизации кластера
• Обновление кластера
• VRRP6. Мониторинг, поиск и устранение неисправностей
• Логирование и поиск логов
• Работа с базой данных SOLR
• Работа с приложением SmartEvent
• Настройка правил корреляции событий7. Автоматизация Checkpoint
• Предоставляемые API
• TCL
• Python
• Web services8. Работа с IPv6
Бизнес тренинги
- BT01 — Управление финансами бизнеса
- Длительность: 3 дня (24 часа)
- Код курса: BT01
- Стоимость
- Очный формат: 200 000 ₸
- Онлайн формат: По запросу
Описание курса
Для кого тренинг:
Собственников, учредителей или соучредителей бизнеса, чтобы увеличивать прибыль, получать стабильно дивиденды, сосредоточиться на стратегическом развитии и масштабироваться, используя инструменты финансового менеджмента.
Руководителей компании, чтобы принимать взвешенные управленческие решения, подкреплённые цифрами и финансовыми показателями, а также грамотно ставить задачи руководителям подразделений и финансистам.
Руководителей нефинансовых подразделений, чтобы анализировать и правильно планировать финансовые результаты подконтрольных подразделений.На тренинге «Управление финансами бизнеса» Вы узнаете:
Как повысить эффективность управления бизнесом и масштабироваться за счёт грамотного управления финансами.
Зачем нужен управленческий финансовый учёт, и как разбираться в сложных финансовых отчётах и терминологии.
Сколько необходимо продавать для достижения целевой прибыли, и как можно управлять прибылью.
Какие основные показатели необходимы для оценки эффективности работы бизнеса.
Как своевременно выявить причины, приводящие бизнес к проблемам с ликвидностью, и какие мероприятия необходимы для поддержания платежеспособности и финансовой стабильности компании.
Как правильно определить оптимальное соотношение собственных и заёмных средств для финансирования вашего бизнеса.
Что такое финансовый рычаг, и как с его помощью «заставить» заёмные средства работать на пользу бизнеса.
Как, грамотно управляя оборотными средствами (деньги, запасы, задолженность), увеличить прибыль бизнеса и предотвратить кассовые разрывы.
Какие инструменты планирования (платёжный календарь, план движения денег, бюджет, финансовая модель) нужны для роста и развития бизнеса.
Как избежать основные ошибки при внедрении системы управления финансами.По итогам тренинга «Управление финансами бизнеса» Вы сможете:
Прогнозировать, а, главное, предотвращать кассовые разрывы (недостаток денег) в компании;
Внедрить план движения денег и платёжный календарь;
Рассчитать точку безубыточности (минимальный объём продаж) и научиться управлять прибыль, используя маржинальный анализ;
Использовать финансовые показатели для анализа эффективности работы компании и принимать на их основе грамотные управленческие решения;
Определить оптимальное соотношение собственных и заёмных средств компании;
Управлять оборотными средствами (деньги, запасы, задолженность), чтобы увеличить доход бизнеса;
Внедрить важные инструменты финансового планирования: бюджет и финансовая модель;
Организовать работу по управлению финансами в компании (постановка управленческого учёта и управление финансовыми службами);<
Понимать управленческую финансовую отчётность компании и терминологию;
Ставить личные финансовые цели и планировать величину своих дивидендов.Программа тренинга:
День 1
УПРАВЛЕНИЕ ФИНАНСАМИ
Финансы компании и финансовый менеджмент: что это и зачем
Управленческий учёт и отчётность: задачи и организация
Основные инструменты управления финансами компании
Основные формы управленческой финансовой отчётности:
Отчёт о движении денежных средств (ОДДС): назначение отчёта, основные элементыУПРАВЛЕНИЕ ДЕНЕЖНЫМИ СРЕДСТВАМИ
Практическое задание: научимся понимать «Отчёт о движении денежных средств»
Как избежать кассовые разрывы: планирование и управление деньгами
Практическое задание: научимся планировать и контролировать движение денег в компании
Научимся составлять платёжный календарьУПРАВЛЕНИЕ ПРИБЫЛЬЮ
Основные формы управленческой финансовой отчётности:
Отчёт о прибылях и убытках (ОПУ): назначение отчёта, основные элементы
Основные виды прибыли
Практическое задание: определим основные виды прибыли компании
Практическое задание: научимся понимать «Отчёт о прибылях и убытках»День 2
УПРАВЛЕНИЕ ПРИБЫЛЬЮ
Маржинальный анализ: управление прибылью компании:
Постоянные и переменные затраты
Маржинальная прибыль
Точка безубыточности
Практическое задание: посчитаем точку безубыточности, маржинальность и определим объём продаж для достижения целевой (желаемой) прибылиФИНАНСОВОЕ СОСТОЯНИЕ КОМПАНИИ
Основные формы управленческой финансовой отчётности:
Отчёт о финансовом положении (ОФП) или Баланс: назначение отчёта, основные разделы и элементы баланса
Практическое задание: научимся понимать Отчёт о финансовом положении (Баланс)
Практическое задание: разберём взаимосвязь управленческих отчётов
Алгоритм внедрения системы управления финансами. Этапы внедрения. Основные ошибки и необходимость автоматизацииАНАЛИЗ ДЕЯТЕЛЬНОСТИ БИЗНЕСА
Финансовые показатели: показатели ликвидности, платежеспособности и финансовой устойчивости
Источники финансирования бизнеса: оптимальная структура капитала
Практическое задание: рассчитаем показатели платёжеспособности и финансовой устойчивостиДень 3
АНАЛИЗ ДЕЯТЕЛЬНОСТИ БИЗНЕСА
Оценка эффективности бизнеса: показатели рентабельности (эффективности)
Практическое задание: рассчитаем показатели рентабельности
Понятие финансового рычага: сколько заёмных средств нужно бизнесу для устойчивого развития
Практическое задание: рассчитаем рентабельность собственного капиталаЭФФЕКТИВНОСТЬ УПРАВЛЕНИЯ ОБОРОТНЫМИ СРЕДСТВАМИ
Эффективность управления оборотными средствами компании: деньги, запасы, дебиторская и кредиторская задолженности
Операционный, производственный и финансовый циклы: что это и как с их помощью можно увеличить прибыль
Практическое задание: рассчитаем операционный, производственный и финансовый циклыФИНАНСОВОЕ ПЛАНИРОВАНИЕ
Бюджетирование: цели и общие вопросы составления бюджета
Практическое задание: рассмотрим алгоритм составления бюджета
Финансовая модель: цели, пользователи и этапы составления
Практическое задание: рассмотрим финансовую модель
Soft Skills
- DISC-01 — Навыки коммуникаций по модели DISC для IT специалистов
- Длительность: 2 дня (16 часов)
- Код курса: DISC-01
- Стоимость
- Очный формат: 522 500 ₸
- Онлайн формат: 432 500 ₸
Описание курса
Тренинг представляет собой интенсивную динамичную программу, имеющую многолетнюю историю успеха. За 2 дня участники смогут полностью понять и научиться использовать на практике наиболее применимую в бизнес-коммуникациях модель психологической типологии DISC. Она была разработана в 1928г У. Марстоном, выдающимся психологом, известным также как изобретатель полиграфа. Сегодня система DISC используется повсеместно, как в небольших компаниях, так и в транснациональных гигантах.
DISC поможет существенно улучшить взаимодействие с коллегами, партнерами и клиентами.Основные характеристики тренинга
Концентрация. Участники полностью освоят модель всего за 2 дня и разберутся, как применять ее в своей практической деятельности.
Динамичность. Тренинг ведется в постоянном диалоге с участниками, а информационные части подаются в формате динамической дискуссии.
Практика. Мероприятие наполнено активной деятельностью участников: дискуссиями, упражнениями, работами в парах и группах.
Эмоциональный интеллект. Изучение модели DISC даст более глубокое понимание себя и других людей, повысит качество взаимодействия с ними.
Малая учебная группа. Интенсивное обучение в малых группах до 20 человек для более глубокого взаимодействия и персонализированного обучения.
Преемственность. При заинтересованности в дальнейшем, более глубоком обучении, участники могут записаться на тренинг по переговорам, презентации или на индивидуальную работу с тренером.
Профессиональный тренер-психолог. 19+ лет опыта, 9 стран, 6000+ часов тренингов и групповых работ. Магистр психологии, дипломированный тренер СПТ, дипломированный психолог-консультант, сертифицирован NLPP, CPBA (по модели DISC), CPMA (по мотивации), CPEQA (по эмоциональному интеллекту).Программа тренинга
Модуль 1. Введение
Цели модуля: подготовка к обучению, согласование целей курса, понимание предмета и способов обучения, актуализация опыта и потребностей.Приветствие, знакомство тренера и участников
Групповые упражнения: «Линейка», «Первое впечатление»
Цели тренинга. Правила тренинга
Цели и ожидания участников
Понятие психотипа. Ярлык VS модель поведения
Что такое типология? Почему именно DISC?
Работа в мини-группах: заземление темы на рабочую плоскостьМодуль 2. Определение поведенческой модели другого человека
Цели модуля: изучение методов определения ведущего «психотипа», опробование этих методов на практике.Разъяснение шкал оценки по модели DISC
Использование вопросов и анализ ответов: подготовка к определению психотипа
Определение психотипа по декартовой плоскости DISC. Групповое упражнение
Работа в мини-группах
Просмотр и анализ видео-материалов для развития навыков определения психотипаМодуль 3. Изучение психотипов и принципов DISC
Цели модуля: детальное изучение модели DISC, каждого из психотипов, сильных и слабых сторон. Исследование собственного профайла, изучение меж типовых взаимодействийМодель DISC: история
Теория: декартова плоскость DISC
Полное описание каждого психотипа
Самоопределение ведущего психотипа
Взаимодействие поведенческих стилей (психотипов), работа в группах
Как распознать каждый психотип
Как сочетаются психотипы в одном человеке
Можно ли изменить свой психотип
Ключевые ошибки в применении модели DISCМодуль 4. Коммуникации на основе DISC
Цели модуля: детальное изучение подходов к каждому из психотипов, закрепление на практике. Детальное знакомство с понятием «манипуляция» через призму модели DISC.Групповая работа: найти подход к «антиподному» психотипу
Подход к каждому из психотипов: специфика и нюансы
Акценты коммуникации по DISC
Что ухудшает коммуникации с различными психотипами. Упражнение
Язык влияния. УпражнениеМодуль 5. Типовые конфликты по DISC
Цели модуля: изучение типичных межтиповых конфликтов и методов работы с ними.Конфликт: вред или польза?
Конфликты скорости
Конфликты ценностей
Диагональные конфликтыМодуль 6. Специфика взаимодействия ИТ-специалистов
Цель модуля: исследовать специфику применения модели DISC в работе ИТ-специалистовТип референции на плоскости DISC
Методы влияния на мнение другого: какие подходы выбрать, а каких избегать
Аргументация как инструмент влияния – когда работает, а когда нет
Ключевые конфликты
Проблемы перфекционизма
Вопросы участников, которые остались не раскрытыми
Разбор кейсов участников с точки зрения модели DISCМодуль 7. Заключительная часть
Цели модуля: обзор типовых ошибок при использовании DISC, подведение общих и индивидуальных итогов тренинга, расширение взгляда участников на модельОсновные ошибки при использовании DISC: «ярлыки», фиксации, игнорирование, типовые предпочтения
Саморазвитие по модели DISC
Области применения DISC
Вопросы участников, которые остались не раскрытыми
Подведение итогов.Что получат участники «на выходе»?
Понимание, как и зачем применять модель DISC в коммуникациях с коллегами и клиентами.
Возможность применять модель с 1-го дня после тренинга в работе и в жизни.
Лучшее понимание себя.
Учебные материалы в электронном виде.
Сертификат об участии в тренинге.
Возможность пройти профессиональное тестирование DISC по специальным ценам.
Новые знакомства с интересными людьми.
Праздничное завершение с бокалом игристого вина.Что дальше?
Тренинг «Коммуникации, 2 ступень»
Контакт: что это и как им управлять.
Формы донесения мыслей: как сделать непрогнозируемые реакции прогнозируемыми и управляемыми.
Формы воздействия на другого человека. Вред и польза манипуляций.
Мотивация к действию: что это и как ее применять к себе и к другим.
Направление мотивации и ее связь с моделью DISC.
Уровень активности и связь с моделью DISC.
Как работать с группой? Какие закономерности нужно знать. - BT02 — Навыки ведения переговоров для ИТ — специалистов
- Длительность: 2 дня (16 часов)
- Код курса: BT02
- Стоимость
- Очный формат: 522 500 ₸
- Онлайн формат: 432 500 ₸
Описание курса
Тренинг представляет собой интенсивную динамичную программу. За 2 дня участники смогут понять и научиться использовать коммуникативные техники и приемы, широко применимые в переговорном процессе и повышающие его результативность.
В основе программы лежат мощные подходы мощные подходы социально-психологического тренинга, элементы авторской модели Криса Воса, НЛП и гарвардского метода ведения переговоров.
Основные характеристики тренинга
Личный опыт. Участники получают возможность повысить свою эффективность в переговорах благодаря качественным упражнениям, рефлексии, совместному анализу и профессиональной поддержке тренера.
Динамичность. Тренинг ведется в постоянном диалоге с участниками, а информационные части подаются в формате динамической дискуссии.
Практика. Мероприятие наполнено активной деятельностью участников: дискуссиями, упражнениями, работами в парах и группах.
Малая учебная группа. Интенсивное обучение в малых группах до 16 человек для более глубокого взаимодействия и персонализированного обучения.
Преемственность. При заинтересованности в дальнейшем, более глубоком обучении, участники могут записаться на тренинг по коммуникативным навыком с помощью DISC, презентации или на индивидуальную работу с тренером.
Профессиональный тренер-психолог. 19+ лет опыта, 9 стран, 6000+ часов тренингов и групповых работ. Магистр психологии, дипломированный тренер СПТ, дипломированный психолог-консультант, сертифицирован NLPP, CPBA (по модели DISC), CPMA (по мотивации), CPEQA (по эмоциональному интеллекту).
Специализация. Тренер курса специализируется на коммуникативной психологии, а его отраслевая специализация это ИТ-компании.
Программа тренинга
МОДУЛЬ 1. Введение
Цели модуля: подготовка к обучению, согласование целей курса, понимание предмета и способов обучения, актуализация опыта и потребностей.Приветствие, знакомство тренера и участников
Групповые упражнения: «Социометрическая линейка»
Цели тренинга. Правила тренинга
Цели и ожидания участников
Дискуссия: сложности ведения переговоров для ИТ-специалистов
Расстановка акцентов программыМОДУЛЬ 2. Введение в переговоры
Цели модуля: изучить виды переговоров и актуальностья их применения в зависимости от ситуации и задачУсловия возникновения переговоров: переговорная ситуация
Интересы сторон как базисный элемент переговоров
Кейсовая дискуссия: анализ необходимости переговоров на примерах участников
Комплексная переговорная практика №1. Резонансная тема, видео-съемка, анализ
Декартова плоскость переговоров: шкала отношений и шкала результата
5 стратегий переговоров. Выбор стратегии как основа переговоров
Жесткий, мягкий и принципиальный подходы в переговорах
Специфика переговоров ИТ и не ИТ специалистов: обзор вариантов
Позиционные переговоры как слабое место ИТ-специалистовМОДУЛЬ 3. Планирование переговоров
Цели модуля: изучить особенности когнитивной и психологической подготовки к переговорам
Алгоритм переговоров
Общие рекомендации к ведению переговоров (неписанные правила)
Элементы когнитивной подготовки к переговорам: цели, ограничения, тезисы, контртезисы, планирование среды и процесса
Групповая работа: когнитивная подготовка к переговорам
Элементы психологической подготовки к переговорам: анализ позиционной диспозиции, анализ состояния переговорщика, поиск и усиление опор (НОАС), психологический настрой
Методы улучшения ресурсного состояния: обзор
Групповая работа: психологическая подготовка к переговорам
Психологический взгляд на переговоры: что часто остается «за кадром»
«Слабое место» ИТ-специалистов: внеплановостьМОДУЛЬ 4. Переговорщик
Цели модуля: формирование/развитие коммуникативных навыков, необходимых для эффективного ведения переговоровКачества и навыки переговорщика: самооценка и планы развития
Позиционирование переговорщика: одежда, жесты, мимика, взгляд
Групповое упражнение: индивидуальная обратная связь каждому участнику
Коммуникативные позиции и их адекватность
Естественный и адаптивный стили переговоров
«Слабое место» ИТ-специалистов: «иррациональность» собеседникаМОДУЛЬ 5. Способы влияния на мнение оппонента
Цели модуля: изучить эффективные методы, техники и коммуникативные приемы, способные изменить мнение оппонента в моменте переговоров.Экспериенциальное упражнение на коммуникативную влиятельность
Методы убеждения: прямой и переферийный
Три канала убеждения: работа в тройках
Виды давления и способы противостояния давлению извне. Упражнение по желанию
Манипуляции как неотъемлемая часть деловых переговоров: структура и суть
Шантаж, угрозы и деловое сотрудничество
Подход Криса Воса в переговорной коммуникации
Техники снижения эмоционального напряжения
Техники повышения эмоционального напряжения
«Слабое место» ИТ-специалистов: сензитивность
Комплексная переговорная практика №2. Актуальная тема, видео-съемка, анализМОДУЛЬ 6. Завершение переговоров
Цель модуля: изучить ключевые принципы завершения переговоров с минимизацией целевого и отношенческого ущербаВзятие обязательств обеими сторонами
Понятие конгруэнтного согласия
Сохранение статуса оппонента
Снижение негативных переживаний и реакций оппонента
Использование рефрейминга смыслов
Подведение итогов
Подстройка к будущемуМОДУЛЬ 7. Заключительная часть
Цели модуля: подведение общих и индивидуальных итогов курсаДальнейшие шаги: групповая работа
Вопросы участников, которые остались не раскрытыми
Подведение итогов.Что получат участники «на выходе»?
Комплексное понимание того, как готовиться к переговорам и как их проводить.
Ответы на вопросы, разобранные кейсы.
Понимание, когда вообще нужны переговоры, а когда они излишни.
Учебные материалы в электронном виде.
Сертификат об участии в тренинге.
Новые знакомства с интересными людьми.
Праздничное завершение с бокалом игристого вина.
Маркетинг
- MA01 — PROКАЧАЙ МАРКЕТИНГ КУРС ПО ОСНОВАМ МАРКЕТИНГА
- Длительность: 2 дня (16 часов)
- Код курса: MA01
- Стоимость
- Очный формат: 200 000 ₸
- Онлайн формат: По запросу
Описание курса
Для кого курс:
Для специалистов по маркетингу (любого уровня)
Для владельцев малого и среднего бизнеса
Для специалистов по продажам
Для тех, кто планирует структурировать свои знания в маркетинге
Для тех кто планирует сменить квалификацию или получить новую профессиюЦель курса:
Анализ
Научим анализировать продажи, долю рынка и потребности клиента. Вы определите размер и частоту покупок, проведете SWOT-анализ и исследуете имиджевые индикаторы бренда.
Разработка
В процессе занятий вы будете выполнять практические задания — определять целевую аудиторию и выстраивать позиционирование бренда.
Внедрение
Из полученных результатов вы составите и внедрите в работу маркетинг-план. Начнете отслеживать ключевые маркетинговые показатели, проводить корректировку маркетинг-тактики.
Структурировать свои знания в маркетинге.
Научиться проводить анализ рынка и целевой аудитории.
Изучить маркетинговые инструменты.
На основе полученных данных выстроить пошаговый маркетинг-план, который можно внедрять в работу или презентовать руководству.Программа курса:
Маркетинг: потребности и желания.
Маркетинговые исследования.
Колесо эмоций Роберта Плутчика.
Цикл запуска продукта.
Позиционирование бренда.
Как определить целевую аудиторию, если данных нет?
Проведение SWOT-анализа на основе данных бренда.
Разбор и составление Сustomer Journey Map (карта путешествия клиента.)
Дерево принятия решения потребителем.
Каналы коммуникации.
Потребительская воронка.
Практическая работа. Маркетинговый План.
Записаться на курс
Контакты
LinkedIn
Email
Web