Onderwerp
Automatisering & ICT/IT
Communicatie
Financieel
HR
Inkoop & logistiek
Management
Secretarieel & Administratief
Marketing
Opleiding & Onderwijs
Persoonlijke Effectiviteit
Productie, techniek & bouw
Kwaliteit- & Projectmanagement
Sales
Vitaliteit & Gezondheid
Taalcursus
Zorg & Verzorging
Juridisch
Internet & Media
Arbo & Veiligheid
Hobby & Vrije Tijd
Vastgoed & Makelaardij
Abonnementen
Locatie
Niveau
Type
Keurmerk

Opleidingen

56.187 resultaten

Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD-CPLL]

OVERVIEW The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting course that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors. This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified CyberOps Professional certification. This course is worth 40 Continuing Education (CE) Credits. OBJECTIVES After completing this course you should be able to: Define threat hunting and identify core concepts used to conduct threat hunting investigations  Examine threat hunting investigation concepts, frameworks, and threat models  Define cyber threat hunting process fundamentals  Define threat hunting methodologies and procedures  Describe network-based threat hunting  Identify and review endpoint-based threat hunting  Identify and review endpoint memory-based threats and develop endpoint-based threat detection  Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting  Describe the process of threat hunting from a practical perspective  Describe the process of threat hunt reporting  CONTENT Threat Hunting Theory Threat Hunting Concepts Threat Hunting Types Conventional Threat Detection vs Threat Hunting Threat Hunting Concepts, Frameworks and Threat Models Cybersecurity Concepts Common Threat Hunting Platforms Threat Hunting Frameworks Threat Modeling Case Study: Use the PASTA Threat Model Threat Hunting Process Fundamentals Threat Hunting Approaches Threat Hunting Tactics and Threat Intelligence Defining Threat Hunt Scope and Boundaries Planning the Threat Hunt Process  Threat Hunting Methodologies and Procedures Investigative Thinking Identify Common Anolmalies Analyze Device and System Logs Determine the Best Threat Hunt Methods Automate the Threat Hunting Process Network-Based Threat Hunting Operational Security Considerations Performing Network Data Analysis and Detection Development Performing Threat Hunting in the Cloud Endpoint-Based Threat Hunting Threat Hunting for Endpoint-Based Threats Acquiring Data from Endpoint Performing Host-Based Analysis Endpoint-Based Threat Detection Development Analyze Endpoint Memory Examining Systems Memory Using Forensics Developing Endpoint Detection Methods Uncovering New Threats, Indicators and Building TTPs Threat Hunting with Cisco Tools Threat Hunting with Cisco Tools Cisco XDR Components Threat Hunting Investigation Summary: A Practical Approach Conducting a Threat Hunt Reporting the Aftermath of a Threat Hunt Investigation Measure the Success of a Threat Hunt Report Your Findings Threat Hunting Outcomes Labs Discovery Lab 1: Categorize Threats with MITRE ATTACK Tactics and Techniques  Discovery Lab 2: Compare Techniques Used by Different APTs with MITRE ATTACK Navigator  Discovery Lab 3: Model Threats Using MITRE ATTACK and D3FEND  Discovery Lab 4: Prioritize Threat Hunting Using the MITRE ATTACK Framework and Cyber Kill Chain  Discovery Lab 5: Determine the Priority Level of Attacks Using MITRE CAPEC  Discovery Lab 6: Explore the TaHiTI Methodology  Discovery Lab 7: Perform Threat Analysis Searches Using OSINT  Discovery Lab 8: Attribute Threats to Adversary Groups and Software with MITRE ATTACK  Discovery Lab 9: Emulate Adversaries with MITRE Caldera  Discovery Lab 10: Find Evidence of Compromise Using Native Windows Tools  Discovery Lab 11: Hunt for Suspicious Activities Using Open-Source Tools and SIEM  Discovery Lab 12: Capturing of Network Traffic  Discovery Lab 13: Extraction of IOC from Network Packets  Discovery Lab 14: Usage of ELK Stack for Hunting Large Volumes of Network Data   Discovery Lab 15: Analyzing Windows Event Logs and Mapping Them with MITRE Matrix  Discovery Lab 16: Endpoint Data Acquisition  Discovery Lab 17: Inspect Endpoints with PowerShell   Discovery Lab 18: Perform Memory Forensics with Velociraptor  Discovery Lab 19: Detect Malicious Processes on Endpoints  Discovery Lab 20: Identify Suspicious Files Using Threat Analysis  Discovery Lab 21: Conduct Threat Hunting Using Cisco Secure Firewall, Cisco Secure Network Analytics, and Splunk  Discovery Lab 22: Conduct Threat Hunt Using Cisco XDR Control Center and Investigate  Discovery Lab 23: Initiate, Conduct, and Conclude a Threat Hunt 
€825
E-Learning

Cisco Certified Technician Supporting Cisco Collaboration Devices [CLTECH-CPLL]

OVERVIEW The Cisco Certified Technician Supporting Cisco Collaboration Devices (CLTECH) course focuses on the skills required for onsite support and maintenance of Cisco® collaboration endpoints and operating environments. Technicians in this area must be able to identify Cisco collaboration endpoint models, accessories, cabling, and interfaces; understand the Cisco collaboration software and identify commonly found software; and be able to use the Cisco Command-Line Interface (CLI) to connect and service products. You will increase your competency in collaboration fundamentals, use common network tools for Data, Video, and Voice infrastructure components, perform common service-related tasks specific to Cisco Collaboration products, and achieve basic troubleshooting tasks including replacing hardware due to failure or upgrade. This course prepares you for the 100-890 Supporting Cisco Collaboration Devices (CLTECH) exam, OBJECTIVES After completing this course you should be able to: Use basic Cisco software configuration and tools: CLI commands, Tera Term, Putty, file transfer protocols, USB Storage, serial connections, and Windows Describe video and collaboration fundamentals and Cisco collaboration products, including software and hardware components Perform remedial services (hardware break/fix) on Cisco collaboration products including software and configuration backup and restore, test calls, software upgrade/downgrade, endpoint resets, and change passwords Recognize correct connections and configuration Perform basic Layer 1 and basic Layer 2 troubleshooting   CONTENT Collaboration Environment Overview Infrastructure Overview Cisco Converged Network Introducing Cisco Collaboration Technology and Solution Basic Video Concepts Evolution of Cisco IP Video Solutions Cisco Conferencing Infrastructure Overview Cisco On-Premises, Cloud, and Hybrid Deployments Cisco Webex® Product Lines and Their Components Cisco Unified Communications Manager IM and Presence Service Introducing Cisco Unified CM Cisco Collaboration Endpoints Equipment and Related Hardware Cisco Webex Desktop Series Hardware Components Cisco Webex Board Hardware Components Cisco Webex Room Kit System Hardware Components Cisco Webex Room 55 and Cisco Webex Room 70 G2 Hardware Components Cisco Webex Room Panorama Immersive System Hardware Components Cisco MX and SX Quick Set and SX80 Codec Cisco TelePresence® IX-5000 Hardware Components Cisco Collaboration Peripherals Hardware Service-Related Knowledge Basic IP Settings Use CLI Commands Use a Terminal Emulator for a Console Connection Use a Serial Connection to the CLI Connect to the Web Interface Use File Transfer Protocols Use USB for File Transfers Backup and Restore CLI Commands for Hardware Status and Verification Perform a Test Call Use the Touch 10 Controller to Find System Information Manage the Lists of Trusted Certificate Authorities (CAs) Manage Software Add an Option or Release Key Reset Endpoint Devices Change the Device Passphrase Find and Edit IP Information Access Device and Setup Configuration Identify MAC Address Mismatch Determining Endpoint Device Status Special Safety Precautions Hardware Replacement Verifying Successful Operation Content Sharing Speaker Tracking Snap to Whiteboard Presenter Tracking
€275
E-Learning

The Essentials of Webex Calling [CLWXCALL-CPLL]

OVERVIEW The Essentials of Webex Calling (CLWXCALL) course is designed to guide you through a complete Webex Calling setup, from the initial installation of Webex Control Hub and adding users to configuring Webex Calling features through an existing on-premises Cisco Unified Communications Manager (CUCM) and Cisco Unified Border Element (CUBE) public switch telephone network (PSTN) setup. This training also earns you 18 Continuing Education (CE) credits toward recertification. This training will help you: Gain an understanding of the Webex solutions, including Webex Meetings, Webex Messaging, and Webex Calling Learn how to configure and manage the features of the Webex Control Hub This course is worth 18 Continuing Eductaion (CE) Credits e-Learning Interactive self-paced content that provides flexibility in terms of pace, place and time to suit individuals and organisations. These resources also consist of online books, educational podcasts and vodcasts, and video-based learning. OBJECTIVES After completing this course you should be able to: Introduce the components that make up the Webex solution, including Webex Meetings, Webex Messaging, and Webex Calling  Introduce the components that make up Webex Calling Control Hub, including analytics, troubleshooting, and reporting  Introduce the Management feature of Webex Control Hub, including how to set it up for a business  Introduce the Services section of the Webex Control Hub, including the Webex Services, Cloud-Connected Unified Communications Services, and Hybrid Services  Identify the methods available to add users to the Webex Control Hub  Explain Cisco IP Phone software registration with Webex Control Hub, eligible devices, and provisioning methods  Explain how an administrator can configure calling features from the Webex Control Hub that will affect the organization  Understand how users or administrators can configure calling features either from the Webex Control Hub or from their personal user portal  Introduce the three different methods available to bring PSTN calling capabilities into the Webex calling solution  Identify the different types of Cisco routers, as well as third-party routers, that can support the local gateway in a premises-based PSTN deployment  Describe different deployment scenarios using the local gateway in a premises-based PSTN Webex Calling solution  Understand how the high-availability solution within Cisco routers can be used in a Webex Calling deployment to offer failover for the local gateway and the Cisco Unified Border Element  Configure the Webex Control Hub to support Webex Calling in a premises-based PSTN deployment  Configure Cisco Unified Border Element and local gateway settings on a Cisco router to support Webex Calling using a premises-based PSTN deployment  Describe different methods that can be used to troubleshoot setup issues and media issues when configuring Webex Calling using the premises-based PSTN deployment    CONTENT Webex Overview Webex Meetings Webex Messaging Webex Calling Webex Control Hub Overview and Monitoring Webex Control Hub Overview Webex Control Hub Monitoring Webex Control Hub Management Management Overview Account and Organization Settings Webex Control Hub Services Webex Services Webex Cloud-Connected Unified Communications Services Hybrid Services Methods to Add Users to Webex Control Hub Add Users Manually Add Users with a CSV File Claim Existing Users Directory Management User/Contract Synchronization Methods to Add Devices to Webex Control Hub Add the Unified IP Phone to Webex Control Hub Add Webex Endpoints to Webex Control Hub Admin-Configurable Webex Calling Features Auto Attendant Call Park Call Queue Call Pickup Hunt Grups Paging Group Other Admin-Confgurable Features User-Configurable Webex Calling Features Annonymous Call Rejection, Call Waiting and Do Not Disturb Selective Calling Call Forwarding, Call Notification, Single Number Reach and Priorty Alert Sequential Ringing and Simultaneous Ringing Webex Calling Public Switched Telephone Network Options Cloud-Connected PSTN (CCP) Cisco PSTN Premises Based PSTN (Local Gateway) Routers Supporting Local Gateway Cisco Routers Third-Party Session Border Controllers Registration and Certificate-Based Local Gateways Deployment Scenarios for Local Gateways Single Site with Local Gateway and PSTN GW/SBC Colocated Dedicated PSTN Gateway/Cisco Unified Border Element Variant ( Preferred Option) Cisco Unified Communications Manager with Colocated PSTN Gateway/SBC and Local Gateway Cisco Unified Communictions Manager with Dedicated PSTN Gateway (Preferred Option) Call Routing Across Multiple Local Gateways Local Gateway and Cisco Unified Border Element with High Availability Local Gateway- High Availability Solution Limitations and Restrictions of the Local Gateway High-Availability Solution Control Hub Settings for Webex Calling Locations Numbers Call Routing Gateway Settings Router Settings for Webex Calling Security Settings Firewall and NAT Traversal Calling from Cisco Unified Border Element Calling to Local Gateway Calling from Local Gateway Calling to Cisco Unified Border Element Webex Calling Troubleshooting Call Flows, Monitoring Tools and Troubleshooting Media Quality Issues for Webex Calling Testing and Troubleshooting Webex Calling Labs: Discovery 1: Set Up Webex Control Hub Discovery 2: Add Users to Webex Control Hub Discovery 3: Configure Admin-Configurable Webex Calling Features Discovery 4: Configure User-Configurable Webex Calling Features Discovery 5: Configure High Availability on Cisco Routers Discovery 6: Configure Webex Control Hub for Webex Calling Discovery 7: Configure Local Gateway for Webex Calling Discovery 8: Troubleshooting Issues with Webex Calling  
€575
E-Learning

Designing Cisco Application Centric Infrastructure [DCACID-CPLL]

OVERVIEW OBJECTIVES CONTENT
€550
E-Learning

Cisco Data Center Nexus Dashboard Advanced [DCNDA-CPLL]

OVERVIEW The Data Center Nexus Dashboard Advanced (DCNDA) training focuses on how to deploy and use Cisco Nexus Dashboard Insights (NDI) and Cisco Nexus Dashboard Orchestrator (NDO) to successfully monitor data center networks, and to provision a Cisco Application Centric Infrastructure (ACI)-based multisite network. The training is three days long and includes several activities that are either lab simulations or live labs. Activities that pertain to Nexus Dashboard Insights are implemented with lab simulations based on a real-world lab environment, while the lab activity related to Nexus Dashboard Orchestrator uses live software. This course is worth 24 Continuing Education (CE) credits. OBJECTIVES After completing this course you should be able to: Describe Cisco Nexus Dashboard Insights  Describe day-2 operational needs  Describe the Cisco Nexus Dashboard Insights installation on Cisco Nexus Dashboard  Describe Cisco Nexus Dashboard Insights switch telemetry  Describe assurance analysis including multisite assurance  Describe resource analysis  Describe alerts analysis  Describe Cisco NDI dashboards  Describe the options for exporting data from NDI  Describe Cisco NDI use cases  Explore Cisco Nexus Dashboard Insights  Explore vCenter Integration with Cisco NDI  Explore Cisco NDI Assurance functions  Describe Cisco Nexus Dashboard Orchestrator  Describe Cisco NDO features and use cases  Describe Cisco NDO platform support and the installation process  Describe Cisco intersite connectivity  Describe multisite schemas and templates  Describe multipod and multisite integration  Orchestrate Cisco NDO policies  CONTENT Cisco Nexus Dashboards Insights Overview Cisco NDI Day-2 Operations Benefits of Using Cisco NDI  Day-2 Operational Needs Typical Needs of Day-2 Operations Day-2 Operational Tasks Challenges with Legacy Operational Tools  Cisco Nexus Dashboard Insights Installation on Cisco Nexus Dashboard Cisco NDI Application Installation Process Cisco NDI Installation on a Physical Cluster Cisco NDI Installation on a Virtual Cluster Cohosting Cisco NDI and Other Services Cisco Nexus Dashboard Insights Switch Telemetry Telemetry Benefits Cisco NDI Persistent IP Addresses Flow Telemetry Flow Telemetry Events Software Telemetry Assurance Analysis Including Multisite Assurance Service Assurance with Cisco NDI Assurance Analysis Connectivity Explorer Delta Analysis Pre-Change Analysis Compliance Analysis Resource Analysis Browsing Resources Browsing Environmental Data Browsing Flows Browsing Endpoints Browsing Interfaces Browsing Events Browsing vCenters Alerts Analysis Anomalies Analysis Advisories Analysis  Explore Cisco Nexus Dashboard Insights Discovery Lab 1: Explore Cisco Nexus Dashboard Insights   Cisco Nexus Dashboard Insights Dashboards Overview Dashboard and Central Dashboard Topology View Custom Dashboards in Cisco NDI  Options for Exporting Data from Cisco Nexus Dashboard Insights Operational Data Export from Cisco NDI Reports Export via Email Events Export through the Kafka Message Bus Syslog Messages Export Log Collection Cisco Nexus Dashboard Insights Use Cases Is Efficient Troubleshooting Possible? Does Your Network Comply with the Business Intent? Is a Hardware Refresh Due Soon? Should I Expect Any Problem with the Upcoming Software Upgrade? Something Stopped Working - What Was the Cause? Does the Configured Policy Allow for an Endpoint to Reach a Specific Destination IP? If I make a Change in the Network, What would be the Consequences? Cisco Nexus Dashboard Insights Integration with vCenter Discovery Lab 2: Configure and Explore vCenter Integration with Cisco NDI  Explore Cisco NDI Assurance Functions Discovery Lab 3: Explore Cisco NDI Assurance Functions Cisco NDO Overview Need for Day2Ops Tools Cisco Nexus Dashboard as a Platform for Cisco NDO Cisco NDO Introduction Cisco NDO Features and Use Cases Cisco NDO Key Features and Benefits Cisco NDO Use Cases Cisco NDO Licensing Cisco NDO Platform Support and Installation Cisco NDO Installation Adding Sites to Cisco Nexus dashboard and Cisco NDO ISN Connectivity Provisioning Site Connectivity Configuration Using Cisco NDO Cisco NDO with Cisco ACI Multisite Evolution to Multisite Cisco Multisite Architecture Namespace Normalization Intersite Connectivity Intersite Control Plane Per BD Behavior Intersite BUM Traffic Data Plane Intersite Unicast Data Plane  Multisite Schemas and Templates Cisco NDO Schema and Templates Template and Policy Deployment Plan Multisite Connections to External Layer 3 Domains Template Versioning Template Disassociation  Multipod and Multisite Integration Cisco ACI Multipod and Multisite IPN and ISN Connection Orchestrate Cisco NDO Policies  Discovery Lab 4: Orchestrate Cisco NDO Policies  Labs Discovery Lab 1: Explore Cisco Nexus Dashboard Insights  Discovery Lab 2: Configure and Explore vCenter Integration with Cisco NDI  Discovery Lab 3: Explore Cisco NDI Assurance Functions  Discovery Lab 4: Orchestrate Cisco NDO Policies   
€825
E-Learning

Cisco Data Center Nexus Dashboard Essentials [DCNDE-CPLL]

OVERVIEW The Cisco Data Center Nexus Dashboard Essentials training teaches you how to plan, implement, manage, operate, monitor, and troubleshoot the infrastructure of your data centers using the Cisco Nexus Dashboard platform. The goal of this training is to provide fundamental knowledge for the Cisco Nexus Dashboard platform. It discusses the components and the structure of the platform, as well as how to plan for the installment and deployment, looking at the physical and virtual resource requirements, licensing, connectivity, cluster size, and software stack. Additionally, you will be acquainted with the Graphical User Interface (GUI) and the different functions to create and manage sites in the Cisco Nexus Dashboard. You will learn how to monitor, troubleshoot, and administer the platform, including the authentication and authorization of the administrators’ access. This training is worth 26 Continuing Education (CE) credits toward recertification. OBJECTIVES After completing this course you should be able to: Explore the Cisco Nexus Dashboard platform  Explain Cisco Nexus Dashboard licensing options, cluster connectivity, GUI, software stack, roles, permissions, tech support, troubleshooting, and installation procedure for adding applications  Perform Cisco Nexus Dashboard firmware upgrades  Configure Cisco Nexus Dashboard remote authentication  Monitor Cisco Nexus Dashboard resources  Describe Cisco Nexus Dashboard Fabric Controller (NDFC) and its dashboards  Explore the Data Center with Cisco NDFC topology, including customizable templates, deployment, existing network devices, Virtual eXtensible Local Area Network (VXLAN) Ethernet Virtual Private Network (EVPN), Representational State Transfer (REST) Application Program Interface (API), migration, and image, license, and network management  Describe enhanced Role-Based Access Control (RBAC) for fabric objects  CONTENT Cisco Nexus Dashboard Platforms The need for Day-2 Operations Tools Cisco Nexus Dashboard Insights Application Use Cases Cisco Nexus Dashboard Orchestrator Application Use Cases Cisco Nexus Dashboard Fabric Controller Application Use Cases Cisco Nexus Dashboard Data Broker Application Use Cases Physical and Virtual Cisco Nexus Dashboard Platforms Cisco Nexus Dashboard Cluster Node Roles Deployment and Placement of Nodes Across Sites Cisco Nexus Dashboard One View Cisco Nexus Dashboard Licensing Options Cisco Nexus Dashboard Licences Licensing the Cisco Nexus Dashboard Cisco Nexus Dashboard Cluster Connectivity Cisco Nexus Dashboard Logical Network Connectivity Physical Cisco Nexus Dashboard Cluster Connection IP Pools for Services Configuration Connection Mode Comparison Cisco Nexus Dashboard GUI Overview One View Admin Console Sites Menu Services Menu System Resources Menu Operations and Infrastructure Menus Administrative Menu Cisco Nexus Dashboard Software Stack Cisco Nexus Dashboard Software Stack Cisco Nexus Dashboard Installation Procedures User Interface Bootstrap Node registration Connection to Cisco Intersight Onboarding Sites Cisco Nexus Dashboard Firmware Upgrades Firmware Upgrade Prerequisites and Guidelines pND Platform Upgrade vND Platform Upgrade Application Installation on Cisco Nexus Dashboard Installation from the App Store Installation Using a Downloaded Application Package Cisco Nexus Dashboard Roles and Permissions User Roles Configuration Adding a Local User Cisco Nexus Dashboard Remote Authentication Remote Authentication Configuration Cisco Nexus Dashboard Resource Monitoring Introduction to Resource Monitoring System Resources Menu Resource Utilization Dashboards Cisco Nexus Dashboard Tech Support and Troubleshooting Generating a Tech Support Package Using Basic CLI (rescue-user) Add Sites to Cisco Nexus Dashboard Explore Cisco Nexus Dashboard Cisco Nexus Dashboard Fabric Controller Overview Cisco NDFC Overview Cisco NDFC Features Cisco NDFC Use Cases Cisco NDFC High Availability Cisco NDFC Connectivity Cisco NDFC Automation and REST APIs Cisco Nexus Dashboard Fabric Controller Dashboards Dashboard Overview Endpoint Locator Dashboard VM Dashboards Data Center Exploration with Cisco NDFC Topology Topology Window LAN Fabrics LAN Credential Management LAN Switches Cisco NDFC Customizable Templates Customizable Templates Using Templates in Cisco NDFC Image Management Using Cisco NDFC Image Management Overview Upgrading Switches with New Images License Management Using Cisco NDFC Licensing of Cisco NDFC Fabrics License Management in Cisco NDFC Enhanced RBAC for Fabric Objects Cisco NDFC Role-Based Access Contol Cisco NDFC Roles Enhanced RBAC Use Cases Cisco NDFC Integration with External AAA Explore Cisco Nexus Dashboard Fabric Controller Manage the Network with Cisco NDFC Deploying Cisco Nexus Dashboard Fabric Controller Cisco NDFC Form Factors Cisco NDFC Deployment and Connectivity Options Co-Hosting Cisco NDI and Cisco NDFC Discovering Network Devices with Cisco NDFC Configuring Switches for Discovery Using Cisco NDFC to Discover Network Devices Deploy VXLAN EVPN with Cisco NDFC VXLAN Overlays and Underlays Data Center VXLAN EVPN Fabric Underlay Model Configuration Policy Configuration Compliance Deploy vPCs Fabric Peering Fabric Recalculate and Deploy Diffs and Configuration Troubleshooting Managing and Monitoring the Data Center with Cisco NDFC Deploying changes to the Fabric Enabling Freeform Switch Config Fabric Builder for VXLAN EVPN Fabrics Adding Switches to Fabric with POAP MSD VXLAN EVPN Fabric Creation EBGP Peering Session from Fabric Border Gateway Setup as Part of MSD Backup and Restore Fabric Configurations Create Programmable Reports Alarms, Alerts and Monitoring Health Cisco Nexus Dashboard Fabric Controller REST API Exploring APIs for Network Management REST, JSON and Postman Cisco NDFC REST API Automating Cisco NDFC with Ansible Cisco Data Center Network Manager to Cisco NDFC Migration Migration Guidelines and Prerequisites Backing Up a Csico DCNM Configuration with Upgrade Tool Migrating a Cisco DCNM Configuration to Cisco NDFC Post-Migration Steps Configure and Execute Cisco NDFC POAP Configure VXLAN with a BGP Control Plane Labs: Discovery Lab 1: Connect Sites to Cisco Nexus Dashboard Discovery Lab 2: Explore Cisco Nexus Dashboard Discovery Lab 3: Explore Cisco Nexus Dashboard Fabric Controller Discovery Lab 4: Manage the Network with Cisco NDFC Discovery Lab 5: Configure and Execute Cisco NDFC POAP Discovery Lab 6: Configure VXLAN with a BGP Control Plane
€915
E-Learning

Cisco Certified Technician Supporting Cisco Data Center System Devices [DCTECH-CPLL]

OVERVIEW The Cisco Certified Technician Supporting Cisco Data Center System Devices course is designed for field support engineers working with Cisco data center system devices and operating software. This course highlights the proper procedures for diagnosing and resolving common issues to improve the effectiveness of field support engineers and speed time-to-resolution. This course  prepares you for the 010-151 DCTECH exam. If passed, you earn the Cisco Certified Technician (CCT) Data Center certification. OBJECTIVES After completing this course you should be able to: Review Cisco data center networking fundamentals, including Storage Area Networking (SAN), unshielded twisted-pair (UTP) and fiber connectors, the unified computing fabric, and server options Identify Cisco UCS component models, Cisco Nexus and MDS switches, accessories, cabling, and interfaces Understand Cisco UCS and Cisco Nexus Operating System (NX-OS) operating modes and identify commonly found software Use the Cisco GUI to connect and service Cisco UCS product components Demonstrate effective field servicing and equipment replacement, and how to troubleshoot most common issues with Cisco UCS servers Boost knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center roles CONTENT Pre-assesment Data Center Basics Cisco Equipment and Related Hardware Cisco UCS and Cisco NX-OS Software Service Related Information Post Assessment
€275
E-Learning

Engineering Cisco Meraki Solutions [ECMS-CPLL]

OVERVIEW The Engineering Cisco Meraki Solutions course helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This course combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. Prepare for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies. This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification. This course is worth 24 Continuing Education (CE) credits towards recertification. OBJECTIVES After completing this course you should be able to: Describe Cisco Meraki cloud architecture, administration, and licensing  Describe the hardware and features of Cisco Meraki product families  Describe best practices for troubleshooting and when to contact Cisco Meraki support  Plan new Cisco Meraki architectures and expand existing deployments  Design the network for scalable management and high availability  Describe how to automate and scale Cisco Meraki deployments with dashboard tools  Use dynamic routing protocols to expand networks and improve wide-area network (WAN) performance  Describe proper quality of service (QoS), policy, and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping  Describe virtual private network (VPN) and WAN topologies and how to integrate them  Secure, expand, and shape the network  Implement switched network concepts and practices, and configure guest networks  Implement wireless configuration practices and concepts  Describe endpoint management concepts and practices using Cisco Meraki Systems Manager  Describe physical security concepts and practices  Gain network insight by monitoring applications  Describe how to prepare monitoring, logging, and alerting services  Set up reporting and auditing capabilities in the Cisco Meraki dashboard  Monitor and troubleshoot issues using Cisco Meraki tools   CONTENT Introducing the Cloud and the Cisco Meraki Dashboard  Single Pane of Glass Management Cisco Meraki Full-Stack Capabilities Cisco Meraki Devices and the Cloud Benefits of a Cloud-Based Solution Cisco Meraki Dashboard Organizational Structure Multiorganizational Structure Licensing Cisco Meraki Dasboard Demo Introducing Cisco Meraki Products and Administration Cisco Meraki MX Security and SD-WAN Appliance Cisco Meraki MS Switches Cisco Meraki MR Wireless APs Cisco Meraki Systems Manager Endpoint Management Cisco Meraki MV Security Cameras Cisco Meraki Insight Web-Based Application Analytics Advanced Use of Cisco Meraki Dashboard Demo Introducing Cisco Meraki Troubleshooting Cisco Meraki Dashboard Sync Cisco Meraki Monitoring and Troubleshooting Tools Integration of Cisco Meraki Monitoring and Troubleshooting Tools into existing systems Application Programming Interfaces How to Work with Cisco Meraki Support Cisco Meraki Troubleshooting Demo   Planning New Cisco Meraki Architectures and Expanding Existing Deployment Cisco Meraki Soluton Sizing Explore Various Dashboard User Interface Features Demo Licensing Reference Designing for Scalable Management and High Availability Role-Based Access Tag Design and Structure Cisco Meraki MX Security Appliance High-Availability Cisco Meraki MS Switch High Availability High-Density Wireless Design References Automating and Scaling Cisco Meraki Deployments RBAC with SAML Configure SAML and Create SAML Roles Demo Network Cloning Clone a Network and Synchronize a Configuration Demo Configuration Templates Explore Configuration Template Demo Network Provisioning with APIs Use Google Sheets and Script Editor with the Cisco Meraki Dashboard API Demo References Designing Routing on the Cisco Meraki Platform Routing Across Cisco Meraki Networks Explore Layer 3 Routing Including Creating, Editing and Moving SVIs Demo Dynamic Routing with OSPF BGP for Scalable WAN Routing and Redundancy Introducing QoS and Traffic Shaping Design Wireless and Wired QoS Design Prepare the Network for Voice Traffic Shaping and Prioritizing on the Cisco Meraki MX Platform Building VPN and WAN Topologies Cisco Meraki MX VPN Operation Modes VPN Design and Topologies Auto VPN Design a Scalable VPN Topology Explore the Cisco Meraki MX Sizing Guide Demo Integrate Cisco Meraki vMX into an Auto VPN Architecture SD-WAN Fundamentals SD-WAN Design Explore CIsco Meraki vMX and SD-WAN Configurations in the Dashboard Demo    Securing, Expanding, and Shaping the Network Cisco Meraki Security Overview Default Behavior and Rule-Processing Order Advanced Security Services Content Filtering Cisco Umbrella Integration Introducing Switched Network Concepts and Practices Access Policies Using Cisco Meraki Authentication Cloning of Switch Settings Switch Templates and Profiles Explore Switch Profiles Demo LAN and WLAN Guest Access Best Practices References Implementing Wireless Configuration Practices and Concepts Cisco Meraki Dashboard Maps and Floor Plans RF Profiles Wireless Encryption and Authentication SSID Modes for Client IP Addressing Bluetooth Low Energy BLE Scanning and Bluetooth Clients Demo Wireless Threats Introducing Endpoint Management Concepts and Practices Cisco Meraki Systems Manager Platform Overview Cisco Meraki Systems Manager Overview Demo Device Deployment Methodologies Deployent of Application and Containerization Profiles Security Policies and Devices Out of Compliance Demo Pairing Network Group Policies with Systems Manager Demo Agentless Onboarding with Trusted Access Introducing Physical Security Concepts and Practices Cisco Meraki MV Architectures Flexible Camera Deployments with Wireless Cisco Meraki MV Product Portfolio, Features and Functionalities Motion Search, Motion Recap, Motion Heat Maps, and Person Detection Demo Business Intelligence   Gaining Network Insight by Monitoring Applications Cisco Meraki Insight Overview Cisco Meraki Insight Scaling and Licensing Cisco Meraki Insight Overview: A Closer Look at Tracked Applications and WAN Health Demo Preparing, Monitoring, Logging, and Alerting Services Logging Capabilities Examine Event, Change, and Video Access Logs Demo Monitoring Tools and Services Examine Monitoring Tools and Features Demo Supported Alerts Cisco Meraki Dashboard API References Setting Up Reporting and Auditing Capabilities in the Cisco Meraki Dashboard Cisco Meraki Reports Manage Firmware Through the Dashboard PCI Auditing References Gaining Visibility and Resolving Issues Using Cisco Meraki Tools Troubleshooting Methods Logging Capabilities Cisco Meraki Security Center Overview Demo Wireless Troubleshooting Explore Wireless Troubleshooting Tools Demo Troubleshoot Cisco Meraki Cloud Application Performance Troubleshoot Cisco Meraki Auto VPN Explore VPN Status, Firewall, and Static Port Forwarding Local Status Page References Labs Discovery Lab 1; Configure the Cisco Meraki Dashboard Discovery Lab 2: Enable Advanced Features and Optimize Networking Discovery Lab 3: Troubleshoot the Network Using the Cisco Meraki Dashboard  Discovery Lab 4: Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs  Discovery Lab 5: Establish Auto VPN Discovery Lab 6: Configure Virtual Interfaces and Routing on Cisco Meraki MS Switches Discovery Lab 7: Configure Routes and Redistribution Discovery Lab 8: Configure QoS, Discovery Lab 9: Configure Traffic Shaping Discovery Lab 10: Configure Load Balancing Discovery Lab 11: Define Firewall Rules Discovery Lab 12: Enable Advanced Malware Protection Discovery Lab 13: Enable Content Filtering Discovery Lab 14: Configure and Apply Access Policies Discovery Lab 15: Configure Wireless Guest Access Discovery Lab 16: Configure SSIDs Discovery Lab 17: Implement RF Profiles Discovery Lab 18: Implement Air Marshal DIscovery Lab 19: Create Cisco Meraki Systems Manager Configuration Profiles Discovery Lab 20: Define Security Polices Discovery Lab 21: Enforce End-to-End Security Discovery Lab 22: Setup Motion Alerts Discovery Lab 23: Deploy Wireless Cameras Discovery Lab 24: Manage Video Retention Discovery Lab 25: Enable Alerts Discovery Lab 26: Add Monitring and Reporting Discovery Lab 27: Generate and Analyze Summary Reports Discovery Lab 28: Manage Firmware Discovery Lab 29: Generate a PCI Compliance Report Discovery Lab 30: Troubleshoot an Offline Device Discovery Lab 31: Troubleshoot Content Filtering Discovery Lab 32: Troubleshoot Remote Site Connectivity
€825
E-Learning

Designing and Implementing Enterprise Network Assurance [ENNA-CPLL]

OVERVIEW The Designing and Implementing Enterprise Network Assurance training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training is structured into four different tracks, collectively encompassing a broad spectrum of network assurance and monitoring aspects. As a participant, you will first overview different Cisco assurance products, followed by two tracks focused on Cisco ThousandEyes solution, and one dedicated to Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day (Day 2) operations that ensure continuous, seamless network assurance. There is 32 hours of content within this course which equates to a 4 day ILT course. This course is worth 32 Continuing Education (CE) credits toward recertification. OBJECTIVES After completing this course you should be able to: Examine Cisco ThousandEyes solution and its high-level use cases  Learn to effectively use Cisco Catalyst Center Assurance for at-a-glance health monitoring, metrics calculation, and data analysis, covering overall network, device, client, service, and application health  Gain valuable insights for troubleshooting and issue resolution, ensuring a reliable user experience in your network environment  Gain an introductory understanding of Cisco AppDynamics, Cisco Catalyst Software-Defined Wide Area Network (SD-WAN) Assurance, and Cisco ThousandEyes    CONTENT Enterprise Network Assurance Overview Modern Network Challenges Network Visability in the Past Active and Passive Monitoring Modern IT Visibility Architecture Use Cases Cisco Enterprise Assurance Portfolio  Introduction to Cisco Catalyst Center Assurance Cisco Catalyst Center Assurance Overview Cisco Catalyst Center Assurance Health Scores Cisco Catalyst Center Assurance Dashboard Time Ranges Concepts Network Device Health and Device 360 View Client Health and Client 360 View Application Health and Application 360 View Issues Operations Introduction to Cisco AppDynamics Cisco AppDynamics Introduction Monitor Applications with Cisco AppDynamics Business Analytics and Custom Dashboards Troubleshoot Performance Problems with Cisco AppDynamics Introduction to Cisco Catalyst SD-WAN Assurance Cisco Catalyst SD-WAN Cisco Catalyst SD-WAN Monitoring Cisco Catalyst SD-WAN Troubleshooting Cisco Catalyst SD-WAN Analytics Overview Introduction to Cisco ThousandEyes Cisco ThousandEyes Visibility How Cisco ThousandEyes Does It Cisco ThousandEyes Cloud Agents Cisco ThousandEyes Enterprise Agents Cisco ThousandEyes EndPoint Agents Cisco ThousandEyes Tests Agent Test Capabilities Agent Locations Enterprise Agents Deployment Enterprise Agent Operation Enterprise Agent Firewall Requirements Enterprise Agent Network Utilization Enterprise Agent Deployment Options Enterprise Agent on Cisco Platforms Virtual Appliance Setup Custom Virtual Appliance Embedded Enterprise Agent CLI Deployment Enterprise Agent Deployment with Cisco Catalyst Center Enterprise Agent Deployment with Cisco Catalyst SD-WAN Manager Enterprise Agent Deployment with Meraki Dashboard Enterprise Agent Deployment in Proxy Environemnts Agent Labels Enterprise Agent Utilization Enterprise Agent Clusters BGP, Network, DNS, and Voice Tests Configuration Routing BGP Test BGP Test - Configuration Network Test Agent-to-Server Network Test - Data Collection Network Test - Path Visualization View Agent-to-Server Network Test - Configuration DNS Tests DNS Tests - Metrics DNS Tests - Configuration Voice Tests Voice Tests - Metrics Voice Tests - Configuration  Web Tests Configuration Web Layer Tests HTTP Server Test - Metrics HTTP Server Test - Configuration Page Load Test - Configuration Web Authentication Methods Transaction Test - Metrics Transaction Test - Configuration Transaction Test - Cisco ThousandEyes Recorder Web Layer Tests - Proxy Metrics Endpoint Agent Endpoint Agent Overview Endpoint Agent Use Cases Collected Data System Requirements and Installation Agent Settings Monitoring Settings Endpoint Agent Views System Administration Role-Based Access Control Account Groups User Account Settings Organization Settings Time Zone Settings Activity Log Cisco ThousandEyes Billing Unit Calculator  Network Troubleshooting with Cisco ThousandEyes Troubleshooting Scenario A Troubleshooting Analysis - Scenario A Troubleshooting Scenario B Troubleshooting Analysis - Scenario B Troubleshooting Scenario C Troubleshooting Analysis - Scenario C Troubleshooting Scenario D Troubleshooting Analysis - Scenario D Share Links and Saved Events Multi-Service Views Internet Insights Challenges with Internet Monitoring Internet Insights Overview Internet Insights Packages Internet Insights Dashboard and Views Alerts and Dashboards Configuration Alerts Overview Alert Rule Configuration Dynamic Baselines Alert Views Alert Suppression Window Enterprise Agent Notifications Notification Triggers Data Retention Dashboards Dashboard Snapshots Baseline Metrics Data Aggregation Widget Configuration Dashboard Examples Integrations and Data Export Monitoring Solutions Monitoring Cisco Webex Meetings Monitoring Microsoft 365 Monitoring Microsoft Teams Monitoring Cisco SD-WAN WAN Insights Cisco Meraki Network Assurance Wireless Health  Switch Traffic Analysis Cisco Meraki SD-WAN Monitoring Security Center Logging Capabilities Supported Alerts Cisco Meraki Insights Cisco Meraki Insight Overview Web Application Health Web Application Health Configuration WAN Health VoIP Health VoIP Health Configuration Alert Management Internet Outages Cisco Meraki Insight Licensing Labs: Discovery Lab 1: Troubleshoot the Health of Network Devices Discovery Lab 2: Explore Cisco Catalyst Assurance  Discovery Lab 3: Schedule a Test  Discovery Lab 4: Deploy Enterprise Agent  Discovery Lab 5: Configure Network, DNS, and Voice Tests  Discovery Lab 6: Configure Web Tests  Discovery Lab 7: Deploy and Configure an Endpoint Agent  Discovery Lab 8: Configure Account Administration  Discovery Lab 9: Examine Internet Insights  Discovery Lab 10: Configure Alerts  Discovery Lab 11: Build a Dashboard  Discovery Lab 12: Enable Alerts and Configure Monitoring and Reporting  Discovery Lab 13: Examine Cisco Meraki Insights 
€825
E-Learning

Introducing Cisco Ultra-Reliable Wireless Backhaul Online Configurator, PTP, and PMP Network Topologies [FMIC-CPLL]

OVERVIEW The Introducing Cisco Ultra-Reliable Wireless Backhaul Online Configurator, PTP, and PMP Network Topologies (FMIC) training presents the Cisco® Ultra-Reliable Wireless Backhaul (previously Cisco® Fluidmesh) centralized Radio Configuration Environment (RACER) along with the basics of Ultra-Reliable Wireless Backhaul wireless point-to-point (PTP) and point-to-multipoint (PMP) networking. You will learn the advanced settings needed to configure Ultra-Reliable Wireless Backhaul radios, and how to use those settings within RACER. This training will help you: Understand the operational basics of the RACER configuration interface Use the RACER interface’s advanced device configuration settings Learn the principles of Ultra-Reliable Wireless Backhaul PTP and PMP networking OBJECTIVES After completing this course you should be able to: Describe the operational basics of the RACER configuration interface  Make competent use of the RACER interface’s advanced device configuration settings  Describe the principles behind Ultra-Reliable Wireless Backhaul PTP and PMP networking   CONTENT Introduction to the Cisco Ultra-Reliable Wireless Backhaul RACER  Ultra-Reliable Wireless Backhaul PTP Networking  Ultra-Reliable Wireless Backhaul PMP Networking  Ultra-Reliable Wireless Backhaul Advanced Radio Hardware Settings Labs There are no labs included within this training
€65
E-Learning