Opleidingen
56.187
resultaten
Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD-CPLL]
OVERVIEW
The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting course that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious, suspicious, and risky activities that may have evaded detection by existing tools. In this training, you will learn the core concepts, methods, and processes used in threat hunting investigations. This training provides an environment for attack simulation and threat hunting skill development using a wide array of security products and platforms from Cisco and third-party vendors.
This training prepares you for the 300-220 CBRTHD v1.0 exam. If passed, you earn the Cisco Certified Specialist – Threat Hunting and Defending certification and satisfy the concentration exam requirement for the Cisco Certified CyberOps Professional certification.
This course is worth 40 Continuing Education (CE) Credits.
OBJECTIVES
After completing this course you should be able to:
Define threat hunting and identify core concepts used to conduct threat hunting investigations
Examine threat hunting investigation concepts, frameworks, and threat models
Define cyber threat hunting process fundamentals
Define threat hunting methodologies and procedures
Describe network-based threat hunting
Identify and review endpoint-based threat hunting
Identify and review endpoint memory-based threats and develop endpoint-based threat detection
Define threat hunting methods, processes, and Cisco tools that can be utilized for threat hunting
Describe the process of threat hunting from a practical perspective
Describe the process of threat hunt reporting
CONTENT
Threat Hunting Theory
Threat Hunting Concepts
Threat Hunting Types
Conventional Threat Detection vs Threat Hunting
Threat Hunting Concepts, Frameworks and Threat Models
Cybersecurity Concepts
Common Threat Hunting Platforms
Threat Hunting Frameworks
Threat Modeling
Case Study: Use the PASTA Threat Model
Threat Hunting Process Fundamentals
Threat Hunting Approaches
Threat Hunting Tactics and Threat Intelligence
Defining Threat Hunt Scope and Boundaries
Planning the Threat Hunt Process
Threat Hunting Methodologies and Procedures
Investigative Thinking
Identify Common Anolmalies
Analyze Device and System Logs
Determine the Best Threat Hunt Methods
Automate the Threat Hunting Process
Network-Based Threat Hunting
Operational Security Considerations
Performing Network Data Analysis and Detection Development
Performing Threat Hunting in the Cloud
Endpoint-Based Threat Hunting
Threat Hunting for Endpoint-Based Threats
Acquiring Data from Endpoint
Performing Host-Based Analysis
Endpoint-Based Threat Detection Development
Analyze Endpoint Memory
Examining Systems Memory Using Forensics
Developing Endpoint Detection Methods
Uncovering New Threats, Indicators and Building TTPs
Threat Hunting with Cisco Tools
Threat Hunting with Cisco Tools
Cisco XDR Components
Threat Hunting Investigation Summary: A Practical Approach
Conducting a Threat Hunt
Reporting the Aftermath of a Threat Hunt Investigation
Measure the Success of a Threat Hunt
Report Your Findings
Threat Hunting Outcomes
Labs
Discovery Lab 1: Categorize Threats with MITRE ATTACK Tactics and Techniques
Discovery Lab 2: Compare Techniques Used by Different APTs with MITRE ATTACK Navigator
Discovery Lab 3: Model Threats Using MITRE ATTACK and D3FEND
Discovery Lab 4: Prioritize Threat Hunting Using the MITRE ATTACK Framework and Cyber Kill Chain
Discovery Lab 5: Determine the Priority Level of Attacks Using MITRE CAPEC
Discovery Lab 6: Explore the TaHiTI Methodology
Discovery Lab 7: Perform Threat Analysis Searches Using OSINT
Discovery Lab 8: Attribute Threats to Adversary Groups and Software with MITRE ATTACK
Discovery Lab 9: Emulate Adversaries with MITRE Caldera
Discovery Lab 10: Find Evidence of Compromise Using Native Windows Tools
Discovery Lab 11: Hunt for Suspicious Activities Using Open-Source Tools and SIEM
Discovery Lab 12: Capturing of Network Traffic
Discovery Lab 13: Extraction of IOC from Network Packets
Discovery Lab 14: Usage of ELK Stack for Hunting Large Volumes of Network Data
Discovery Lab 15: Analyzing Windows Event Logs and Mapping Them with MITRE Matrix
Discovery Lab 16: Endpoint Data Acquisition
Discovery Lab 17: Inspect Endpoints with PowerShell
Discovery Lab 18: Perform Memory Forensics with Velociraptor
Discovery Lab 19: Detect Malicious Processes on Endpoints
Discovery Lab 20: Identify Suspicious Files Using Threat Analysis
Discovery Lab 21: Conduct Threat Hunting Using Cisco Secure Firewall, Cisco Secure Network Analytics, and Splunk
Discovery Lab 22: Conduct Threat Hunt Using Cisco XDR Control Center and Investigate
Discovery Lab 23: Initiate, Conduct, and Conclude a Threat Hunt
€825
E-Learning
Cisco Certified Technician Supporting Cisco Collaboration Devices [CLTECH-CPLL]
OVERVIEW
The Cisco Certified Technician Supporting Cisco Collaboration Devices (CLTECH) course focuses on the skills required for onsite support and maintenance of Cisco® collaboration endpoints and operating environments. Technicians in this area must be able to identify Cisco collaboration endpoint models, accessories, cabling, and interfaces; understand the Cisco collaboration software and identify commonly found software; and be able to use the Cisco Command-Line Interface (CLI) to connect and service products. You will increase your competency in collaboration fundamentals, use common network tools for Data, Video, and Voice infrastructure components, perform common service-related tasks specific to Cisco Collaboration products, and achieve basic troubleshooting tasks including replacing hardware due to failure or upgrade.
This course prepares you for the 100-890 Supporting Cisco Collaboration Devices (CLTECH) exam,
OBJECTIVES
After completing this course you should be able to:
Use basic Cisco software configuration and tools: CLI commands, Tera Term, Putty, file transfer protocols, USB Storage, serial connections, and Windows
Describe video and collaboration fundamentals and Cisco collaboration products, including software and hardware components
Perform remedial services (hardware break/fix) on Cisco collaboration products including software and configuration backup and restore, test calls, software upgrade/downgrade, endpoint resets, and change passwords
Recognize correct connections and configuration
Perform basic Layer 1 and basic Layer 2 troubleshooting
CONTENT
Collaboration Environment Overview
Infrastructure Overview
Cisco Converged Network
Introducing Cisco Collaboration Technology and Solution
Basic Video Concepts
Evolution of Cisco IP Video Solutions
Cisco Conferencing Infrastructure Overview
Cisco On-Premises, Cloud, and Hybrid Deployments
Cisco Webex® Product Lines and Their Components
Cisco Unified Communications Manager IM and Presence Service
Introducing Cisco Unified CM
Cisco Collaboration Endpoints Equipment and Related Hardware
Cisco Webex Desktop Series Hardware Components
Cisco Webex Board Hardware Components
Cisco Webex Room Kit System Hardware Components
Cisco Webex Room 55 and Cisco Webex Room 70 G2 Hardware Components
Cisco Webex Room Panorama Immersive System Hardware Components
Cisco MX and SX Quick Set and SX80 Codec
Cisco TelePresence® IX-5000 Hardware Components
Cisco Collaboration Peripherals Hardware
Service-Related Knowledge
Basic IP Settings
Use CLI Commands
Use a Terminal Emulator for a Console Connection
Use a Serial Connection to the CLI
Connect to the Web Interface
Use File Transfer Protocols
Use USB for File Transfers
Backup and Restore
CLI Commands for Hardware Status and Verification
Perform a Test Call
Use the Touch 10 Controller to Find System Information
Manage the Lists of Trusted Certificate Authorities (CAs)
Manage Software
Add an Option or Release Key
Reset Endpoint Devices
Change the Device Passphrase
Find and Edit IP Information
Access Device and Setup Configuration
Identify MAC Address Mismatch
Determining Endpoint Device Status
Special Safety Precautions
Hardware Replacement
Verifying Successful Operation
Content Sharing
Speaker Tracking
Snap to Whiteboard
Presenter Tracking
€275
E-Learning
The Essentials of Webex Calling [CLWXCALL-CPLL]
OVERVIEW
The Essentials of Webex Calling (CLWXCALL) course is designed to guide you through a complete Webex Calling setup, from the initial installation of Webex Control Hub and adding users to configuring Webex Calling features through an existing on-premises Cisco Unified Communications Manager (CUCM) and Cisco Unified Border Element (CUBE) public switch telephone network (PSTN) setup. This training also earns you 18 Continuing Education (CE) credits toward recertification.
This training will help you:
Gain an understanding of the Webex solutions, including Webex Meetings, Webex Messaging, and Webex Calling
Learn how to configure and manage the features of the Webex Control Hub
This course is worth 18 Continuing Eductaion (CE) Credits
e-Learning
Interactive self-paced content that provides flexibility in terms of pace, place and time to suit individuals and organisations. These resources also consist of online books, educational podcasts and vodcasts, and video-based learning.
OBJECTIVES
After completing this course you should be able to:
Introduce the components that make up the Webex solution, including Webex Meetings, Webex Messaging, and Webex Calling
Introduce the components that make up Webex Calling Control Hub, including analytics, troubleshooting, and reporting
Introduce the Management feature of Webex Control Hub, including how to set it up for a business
Introduce the Services section of the Webex Control Hub, including the Webex Services, Cloud-Connected Unified Communications Services, and Hybrid Services
Identify the methods available to add users to the Webex Control Hub
Explain Cisco IP Phone software registration with Webex Control Hub, eligible devices, and provisioning methods
Explain how an administrator can configure calling features from the Webex Control Hub that will affect the organization
Understand how users or administrators can configure calling features either from the Webex Control Hub or from their personal user portal
Introduce the three different methods available to bring PSTN calling capabilities into the Webex calling solution
Identify the different types of Cisco routers, as well as third-party routers, that can support the local gateway in a premises-based PSTN deployment
Describe different deployment scenarios using the local gateway in a premises-based PSTN Webex Calling solution
Understand how the high-availability solution within Cisco routers can be used in a Webex Calling deployment to offer failover for the local gateway and the Cisco Unified Border Element
Configure the Webex Control Hub to support Webex Calling in a premises-based PSTN deployment
Configure Cisco Unified Border Element and local gateway settings on a Cisco router to support Webex Calling using a premises-based PSTN deployment
Describe different methods that can be used to troubleshoot setup issues and media issues when configuring Webex Calling using the premises-based PSTN deployment
CONTENT
Webex Overview
Webex Meetings
Webex Messaging
Webex Calling
Webex Control Hub Overview and Monitoring
Webex Control Hub Overview
Webex Control Hub Monitoring
Webex Control Hub Management
Management Overview
Account and Organization Settings
Webex Control Hub Services
Webex Services
Webex Cloud-Connected Unified Communications Services
Hybrid Services
Methods to Add Users to Webex Control Hub
Add Users Manually
Add Users with a CSV File
Claim Existing Users
Directory Management
User/Contract Synchronization
Methods to Add Devices to Webex Control Hub
Add the Unified IP Phone to Webex Control Hub
Add Webex Endpoints to Webex Control Hub
Admin-Configurable Webex Calling Features
Auto Attendant
Call Park
Call Queue
Call Pickup
Hunt Grups
Paging Group
Other Admin-Confgurable Features
User-Configurable Webex Calling Features
Annonymous Call Rejection, Call Waiting and Do Not Disturb
Selective Calling
Call Forwarding, Call Notification, Single Number Reach and Priorty Alert
Sequential Ringing and Simultaneous Ringing
Webex Calling Public Switched Telephone Network Options
Cloud-Connected PSTN (CCP)
Cisco PSTN
Premises Based PSTN (Local Gateway)
Routers Supporting Local Gateway
Cisco Routers
Third-Party Session Border Controllers
Registration and Certificate-Based Local Gateways
Deployment Scenarios for Local Gateways
Single Site with Local Gateway and PSTN GW/SBC Colocated
Dedicated PSTN Gateway/Cisco Unified Border Element Variant ( Preferred Option)
Cisco Unified Communications Manager with Colocated PSTN Gateway/SBC and Local Gateway
Cisco Unified Communictions Manager with Dedicated PSTN Gateway (Preferred Option)
Call Routing Across Multiple Local Gateways
Local Gateway and Cisco Unified Border Element with High Availability
Local Gateway- High Availability Solution
Limitations and Restrictions of the Local Gateway High-Availability Solution
Control Hub Settings for Webex Calling
Locations
Numbers
Call Routing
Gateway Settings
Router Settings for Webex Calling
Security Settings
Firewall and NAT Traversal
Calling from Cisco Unified Border Element
Calling to Local Gateway
Calling from Local Gateway
Calling to Cisco Unified Border Element
Webex Calling Troubleshooting
Call Flows, Monitoring Tools and Troubleshooting Media Quality Issues for Webex Calling
Testing and Troubleshooting Webex Calling
Labs:
Discovery 1: Set Up Webex Control Hub
Discovery 2: Add Users to Webex Control Hub
Discovery 3: Configure Admin-Configurable Webex Calling Features
Discovery 4: Configure User-Configurable Webex Calling Features
Discovery 5: Configure High Availability on Cisco Routers
Discovery 6: Configure Webex Control Hub for Webex Calling
Discovery 7: Configure Local Gateway for Webex Calling
Discovery 8: Troubleshooting Issues with Webex Calling
€575
E-Learning
Designing Cisco Application Centric Infrastructure [DCACID-CPLL]
OVERVIEW
OBJECTIVES
CONTENT
€550
E-Learning
Cisco Data Center Nexus Dashboard Advanced [DCNDA-CPLL]
OVERVIEW
The Data Center Nexus Dashboard Advanced (DCNDA) training focuses on how to deploy and use Cisco Nexus Dashboard Insights (NDI) and Cisco Nexus Dashboard Orchestrator (NDO) to successfully monitor data center networks, and to provision a Cisco Application Centric Infrastructure (ACI)-based multisite network. The training is three days long and includes several activities that are either lab simulations or live labs. Activities that pertain to Nexus Dashboard Insights are implemented with lab simulations based on a real-world lab environment, while the lab activity related to Nexus Dashboard Orchestrator uses live software.
This course is worth 24 Continuing Education (CE) credits.
OBJECTIVES
After completing this course you should be able to:
Describe Cisco Nexus Dashboard Insights
Describe day-2 operational needs
Describe the Cisco Nexus Dashboard Insights installation on Cisco Nexus Dashboard
Describe Cisco Nexus Dashboard Insights switch telemetry
Describe assurance analysis including multisite assurance
Describe resource analysis
Describe alerts analysis
Describe Cisco NDI dashboards
Describe the options for exporting data from NDI
Describe Cisco NDI use cases
Explore Cisco Nexus Dashboard Insights
Explore vCenter Integration with Cisco NDI
Explore Cisco NDI Assurance functions
Describe Cisco Nexus Dashboard Orchestrator
Describe Cisco NDO features and use cases
Describe Cisco NDO platform support and the installation process
Describe Cisco intersite connectivity
Describe multisite schemas and templates
Describe multipod and multisite integration
Orchestrate Cisco NDO policies
CONTENT
Cisco Nexus Dashboards Insights Overview
Cisco NDI Day-2 Operations
Benefits of Using Cisco NDI
Day-2 Operational Needs
Typical Needs of Day-2 Operations
Day-2 Operational Tasks
Challenges with Legacy Operational Tools
Cisco Nexus Dashboard Insights Installation on Cisco Nexus Dashboard
Cisco NDI Application Installation Process
Cisco NDI Installation on a Physical Cluster
Cisco NDI Installation on a Virtual Cluster
Cohosting Cisco NDI and Other Services
Cisco Nexus Dashboard Insights Switch Telemetry
Telemetry Benefits
Cisco NDI Persistent IP Addresses
Flow Telemetry
Flow Telemetry Events
Software Telemetry
Assurance Analysis Including Multisite Assurance
Service Assurance with Cisco NDI
Assurance Analysis
Connectivity Explorer
Delta Analysis
Pre-Change Analysis
Compliance Analysis
Resource Analysis
Browsing Resources
Browsing Environmental Data
Browsing Flows
Browsing Endpoints
Browsing Interfaces
Browsing Events
Browsing vCenters
Alerts Analysis
Anomalies Analysis
Advisories Analysis
Explore Cisco Nexus Dashboard Insights
Discovery Lab 1: Explore Cisco Nexus Dashboard Insights
Cisco Nexus Dashboard Insights Dashboards
Overview Dashboard and Central Dashboard
Topology View
Custom Dashboards in Cisco NDI
Options for Exporting Data from Cisco Nexus Dashboard Insights
Operational Data Export from Cisco NDI
Reports Export via Email
Events Export through the Kafka Message Bus
Syslog Messages Export
Log Collection
Cisco Nexus Dashboard Insights Use Cases
Is Efficient Troubleshooting Possible?
Does Your Network Comply with the Business Intent?
Is a Hardware Refresh Due Soon?
Should I Expect Any Problem with the Upcoming Software Upgrade?
Something Stopped Working - What Was the Cause?
Does the Configured Policy Allow for an Endpoint to Reach a Specific Destination IP?
If I make a Change in the Network, What would be the Consequences?
Cisco Nexus Dashboard Insights Integration with vCenter
Discovery Lab 2: Configure and Explore vCenter Integration with Cisco NDI
Explore Cisco NDI Assurance Functions
Discovery Lab 3: Explore Cisco NDI Assurance Functions
Cisco NDO Overview
Need for Day2Ops Tools
Cisco Nexus Dashboard as a Platform for Cisco NDO
Cisco NDO Introduction
Cisco NDO Features and Use Cases
Cisco NDO Key Features and Benefits
Cisco NDO Use Cases
Cisco NDO Licensing
Cisco NDO Platform Support and Installation
Cisco NDO Installation
Adding Sites to Cisco Nexus dashboard and Cisco NDO
ISN Connectivity Provisioning
Site Connectivity Configuration Using Cisco NDO
Cisco NDO with Cisco ACI Multisite
Evolution to Multisite
Cisco Multisite Architecture
Namespace Normalization
Intersite Connectivity
Intersite Control Plane
Per BD Behavior
Intersite BUM Traffic Data Plane
Intersite Unicast Data Plane
Multisite Schemas and Templates
Cisco NDO Schema and Templates
Template and Policy Deployment Plan
Multisite Connections to External Layer 3 Domains
Template Versioning
Template Disassociation
Multipod and Multisite Integration
Cisco ACI Multipod and Multisite
IPN and ISN Connection
Orchestrate Cisco NDO Policies
Discovery Lab 4: Orchestrate Cisco NDO Policies
Labs
Discovery Lab 1: Explore Cisco Nexus Dashboard Insights
Discovery Lab 2: Configure and Explore vCenter Integration with Cisco NDI
Discovery Lab 3: Explore Cisco NDI Assurance Functions
Discovery Lab 4: Orchestrate Cisco NDO Policies
€825
E-Learning
Cisco Data Center Nexus Dashboard Essentials [DCNDE-CPLL]
OVERVIEW
The Cisco Data Center Nexus Dashboard Essentials training teaches you how to plan, implement, manage, operate, monitor, and troubleshoot the infrastructure of your data centers using the Cisco Nexus Dashboard platform.
The goal of this training is to provide fundamental knowledge for the Cisco Nexus Dashboard platform. It discusses the components and the structure of the platform, as well as how to plan for the installment and deployment, looking at the physical and virtual resource requirements, licensing, connectivity, cluster size, and software stack. Additionally, you will be acquainted with the Graphical User Interface (GUI) and the different functions to create and manage sites in the Cisco Nexus Dashboard.
You will learn how to monitor, troubleshoot, and administer the platform, including the authentication and authorization of the administrators’ access.
This training is worth 26 Continuing Education (CE) credits toward recertification.
OBJECTIVES
After completing this course you should be able to:
Explore the Cisco Nexus Dashboard platform
Explain Cisco Nexus Dashboard licensing options, cluster connectivity, GUI, software stack, roles, permissions, tech support, troubleshooting, and installation procedure for adding applications
Perform Cisco Nexus Dashboard firmware upgrades
Configure Cisco Nexus Dashboard remote authentication
Monitor Cisco Nexus Dashboard resources
Describe Cisco Nexus Dashboard Fabric Controller (NDFC) and its dashboards
Explore the Data Center with Cisco NDFC topology, including customizable templates, deployment, existing network devices, Virtual eXtensible Local Area Network (VXLAN) Ethernet Virtual Private Network (EVPN), Representational State Transfer (REST) Application Program Interface (API), migration, and image, license, and network management
Describe enhanced Role-Based Access Control (RBAC) for fabric objects
CONTENT
Cisco Nexus Dashboard Platforms
The need for Day-2 Operations Tools
Cisco Nexus Dashboard Insights Application Use Cases
Cisco Nexus Dashboard Orchestrator Application Use Cases
Cisco Nexus Dashboard Fabric Controller Application Use Cases
Cisco Nexus Dashboard Data Broker Application Use Cases
Physical and Virtual Cisco Nexus Dashboard Platforms
Cisco Nexus Dashboard Cluster Node Roles
Deployment and Placement of Nodes Across Sites
Cisco Nexus Dashboard One View
Cisco Nexus Dashboard Licensing Options
Cisco Nexus Dashboard Licences
Licensing the Cisco Nexus Dashboard
Cisco Nexus Dashboard Cluster Connectivity
Cisco Nexus Dashboard Logical Network Connectivity
Physical Cisco Nexus Dashboard Cluster Connection
IP Pools for Services Configuration
Connection Mode Comparison
Cisco Nexus Dashboard GUI Overview
One View
Admin Console
Sites Menu
Services Menu
System Resources Menu
Operations and Infrastructure Menus
Administrative Menu
Cisco Nexus Dashboard Software Stack
Cisco Nexus Dashboard Software Stack
Cisco Nexus Dashboard Installation Procedures
User Interface Bootstrap
Node registration
Connection to Cisco Intersight
Onboarding Sites
Cisco Nexus Dashboard Firmware Upgrades
Firmware Upgrade Prerequisites and Guidelines
pND Platform Upgrade
vND Platform Upgrade
Application Installation on Cisco Nexus Dashboard
Installation from the App Store
Installation Using a Downloaded Application Package
Cisco Nexus Dashboard Roles and Permissions
User Roles Configuration
Adding a Local User
Cisco Nexus Dashboard Remote Authentication
Remote Authentication Configuration
Cisco Nexus Dashboard Resource Monitoring
Introduction to Resource Monitoring
System Resources Menu
Resource Utilization Dashboards
Cisco Nexus Dashboard Tech Support and Troubleshooting
Generating a Tech Support Package
Using Basic CLI (rescue-user)
Add Sites to Cisco Nexus Dashboard
Explore Cisco Nexus Dashboard
Cisco Nexus Dashboard Fabric Controller Overview
Cisco NDFC Overview
Cisco NDFC Features
Cisco NDFC Use Cases
Cisco NDFC High Availability
Cisco NDFC Connectivity
Cisco NDFC Automation and REST APIs
Cisco Nexus Dashboard Fabric Controller Dashboards
Dashboard Overview
Endpoint Locator Dashboard
VM Dashboards
Data Center Exploration with Cisco NDFC Topology
Topology Window
LAN Fabrics
LAN Credential Management
LAN Switches
Cisco NDFC Customizable Templates
Customizable Templates
Using Templates in Cisco NDFC
Image Management Using Cisco NDFC
Image Management Overview
Upgrading Switches with New Images
License Management Using Cisco NDFC
Licensing of Cisco NDFC Fabrics
License Management in Cisco NDFC
Enhanced RBAC for Fabric Objects
Cisco NDFC Role-Based Access Contol
Cisco NDFC Roles
Enhanced RBAC Use Cases
Cisco NDFC Integration with External AAA
Explore Cisco Nexus Dashboard Fabric Controller
Manage the Network with Cisco NDFC
Deploying Cisco Nexus Dashboard Fabric Controller
Cisco NDFC Form Factors
Cisco NDFC Deployment and Connectivity Options
Co-Hosting Cisco NDI and Cisco NDFC
Discovering Network Devices with Cisco NDFC
Configuring Switches for Discovery
Using Cisco NDFC to Discover Network Devices
Deploy VXLAN EVPN with Cisco NDFC
VXLAN Overlays and Underlays
Data Center VXLAN EVPN Fabric Underlay Model
Configuration Policy
Configuration Compliance
Deploy vPCs Fabric Peering
Fabric Recalculate and Deploy Diffs and Configuration Troubleshooting
Managing and Monitoring the Data Center with Cisco NDFC
Deploying changes to the Fabric
Enabling Freeform Switch Config
Fabric Builder for VXLAN EVPN Fabrics
Adding Switches to Fabric with POAP
MSD VXLAN EVPN Fabric Creation
EBGP Peering Session from Fabric
Border Gateway Setup as Part of MSD
Backup and Restore Fabric Configurations
Create Programmable Reports
Alarms, Alerts and Monitoring Health
Cisco Nexus Dashboard Fabric Controller REST API
Exploring APIs for Network Management
REST, JSON and Postman
Cisco NDFC REST API
Automating Cisco NDFC with Ansible
Cisco Data Center Network Manager to Cisco NDFC Migration
Migration Guidelines and Prerequisites
Backing Up a Csico DCNM Configuration with Upgrade Tool
Migrating a Cisco DCNM Configuration to Cisco NDFC
Post-Migration Steps
Configure and Execute Cisco NDFC POAP
Configure VXLAN with a BGP Control Plane
Labs:
Discovery Lab 1: Connect Sites to Cisco Nexus Dashboard
Discovery Lab 2: Explore Cisco Nexus Dashboard
Discovery Lab 3: Explore Cisco Nexus Dashboard Fabric Controller
Discovery Lab 4: Manage the Network with Cisco NDFC
Discovery Lab 5: Configure and Execute Cisco NDFC POAP
Discovery Lab 6: Configure VXLAN with a BGP Control Plane
€915
E-Learning
Cisco Certified Technician Supporting Cisco Data Center System Devices [DCTECH-CPLL]
OVERVIEW
The Cisco Certified Technician Supporting Cisco Data Center System Devices course is designed for field support engineers working with Cisco data center system devices and operating software. This course highlights the proper procedures for diagnosing and resolving common issues to improve the effectiveness of field support engineers and speed time-to-resolution.
This course prepares you for the 010-151 DCTECH exam. If passed, you earn the Cisco Certified Technician (CCT) Data Center certification.
OBJECTIVES
After completing this course you should be able to:
Review Cisco data center networking fundamentals, including Storage Area Networking (SAN), unshielded twisted-pair (UTP) and fiber connectors, the unified computing fabric, and server options
Identify Cisco UCS component models, Cisco Nexus and MDS switches, accessories, cabling, and interfaces
Understand Cisco UCS and Cisco Nexus Operating System (NX-OS) operating modes and identify commonly found software
Use the Cisco GUI to connect and service Cisco UCS product components
Demonstrate effective field servicing and equipment replacement, and how to troubleshoot most common issues with Cisco UCS servers
Boost knowledge for protocols, solutions, and designs to acquire professional-level and expert-level data center roles
CONTENT
Pre-assesment
Data Center Basics
Cisco Equipment and Related Hardware
Cisco UCS and Cisco NX-OS Software
Service Related Information
Post Assessment
€275
E-Learning
Engineering Cisco Meraki Solutions [ECMS-CPLL]
OVERVIEW
The Engineering Cisco Meraki Solutions course helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This course combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. Prepare for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.
This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification.
This course is worth 24 Continuing Education (CE) credits towards recertification.
OBJECTIVES
After completing this course you should be able to:
Describe Cisco Meraki cloud architecture, administration, and licensing
Describe the hardware and features of Cisco Meraki product families
Describe best practices for troubleshooting and when to contact Cisco Meraki support
Plan new Cisco Meraki architectures and expand existing deployments
Design the network for scalable management and high availability
Describe how to automate and scale Cisco Meraki deployments with dashboard tools
Use dynamic routing protocols to expand networks and improve wide-area network (WAN) performance
Describe proper quality of service (QoS), policy, and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
Describe virtual private network (VPN) and WAN topologies and how to integrate them
Secure, expand, and shape the network
Implement switched network concepts and practices, and configure guest networks
Implement wireless configuration practices and concepts
Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
Describe physical security concepts and practices
Gain network insight by monitoring applications
Describe how to prepare monitoring, logging, and alerting services
Set up reporting and auditing capabilities in the Cisco Meraki dashboard
Monitor and troubleshoot issues using Cisco Meraki tools
CONTENT
Introducing the Cloud and the Cisco Meraki Dashboard
Single Pane of Glass Management
Cisco Meraki Full-Stack Capabilities
Cisco Meraki Devices and the Cloud
Benefits of a Cloud-Based Solution
Cisco Meraki Dashboard Organizational Structure
Multiorganizational Structure
Licensing
Cisco Meraki Dasboard Demo
Introducing Cisco Meraki Products and Administration
Cisco Meraki MX Security and SD-WAN Appliance
Cisco Meraki MS Switches
Cisco Meraki MR Wireless APs
Cisco Meraki Systems Manager Endpoint Management
Cisco Meraki MV Security Cameras
Cisco Meraki Insight Web-Based Application Analytics
Advanced Use of Cisco Meraki Dashboard Demo
Introducing Cisco Meraki Troubleshooting
Cisco Meraki Dashboard Sync
Cisco Meraki Monitoring and Troubleshooting Tools
Integration of Cisco Meraki Monitoring and Troubleshooting Tools into existing systems
Application Programming Interfaces
How to Work with Cisco Meraki Support
Cisco Meraki Troubleshooting Demo
Planning New Cisco Meraki Architectures and Expanding Existing Deployment
Cisco Meraki Soluton Sizing
Explore Various Dashboard User Interface Features Demo
Licensing
Reference
Designing for Scalable Management and High Availability
Role-Based Access
Tag Design and Structure
Cisco Meraki MX Security Appliance High-Availability
Cisco Meraki MS Switch High Availability
High-Density Wireless Design
References
Automating and Scaling Cisco Meraki Deployments
RBAC with SAML
Configure SAML and Create SAML Roles Demo
Network Cloning
Clone a Network and Synchronize a Configuration Demo
Configuration Templates
Explore Configuration Template Demo
Network Provisioning with APIs
Use Google Sheets and Script Editor with the Cisco Meraki Dashboard API Demo
References
Designing Routing on the Cisco Meraki Platform
Routing Across Cisco Meraki Networks
Explore Layer 3 Routing Including Creating, Editing and Moving SVIs Demo
Dynamic Routing with OSPF
BGP for Scalable WAN Routing and Redundancy
Introducing QoS and Traffic Shaping Design
Wireless and Wired QoS Design
Prepare the Network for Voice
Traffic Shaping and Prioritizing on the Cisco Meraki MX Platform
Building VPN and WAN Topologies
Cisco Meraki MX VPN Operation Modes
VPN Design and Topologies
Auto VPN
Design a Scalable VPN Topology
Explore the Cisco Meraki MX Sizing Guide Demo
Integrate Cisco Meraki vMX into an Auto VPN Architecture
SD-WAN Fundamentals
SD-WAN Design
Explore CIsco Meraki vMX and SD-WAN Configurations in the Dashboard Demo
Securing, Expanding, and Shaping the Network
Cisco Meraki Security Overview
Default Behavior and Rule-Processing Order
Advanced Security Services
Content Filtering
Cisco Umbrella Integration
Introducing Switched Network Concepts and Practices
Access Policies Using Cisco Meraki Authentication
Cloning of Switch Settings
Switch Templates and Profiles
Explore Switch Profiles Demo
LAN and WLAN Guest Access Best Practices
References
Implementing Wireless Configuration Practices and Concepts
Cisco Meraki Dashboard Maps and Floor Plans
RF Profiles
Wireless Encryption and Authentication
SSID Modes for Client IP Addressing
Bluetooth Low Energy
BLE Scanning and Bluetooth Clients Demo
Wireless Threats
Introducing Endpoint Management Concepts and Practices
Cisco Meraki Systems Manager Platform Overview
Cisco Meraki Systems Manager Overview Demo
Device Deployment Methodologies
Deployent of Application and Containerization Profiles
Security Policies and Devices Out of Compliance Demo
Pairing Network Group Policies with Systems Manager Demo
Agentless Onboarding with Trusted Access
Introducing Physical Security Concepts and Practices
Cisco Meraki MV Architectures
Flexible Camera Deployments with Wireless
Cisco Meraki MV Product Portfolio, Features and Functionalities
Motion Search, Motion Recap, Motion Heat Maps, and Person Detection Demo
Business Intelligence
Gaining Network Insight by Monitoring Applications
Cisco Meraki Insight Overview
Cisco Meraki Insight Scaling and Licensing
Cisco Meraki Insight Overview: A Closer Look at Tracked Applications and WAN Health Demo
Preparing, Monitoring, Logging, and Alerting Services
Logging Capabilities
Examine Event, Change, and Video Access Logs Demo
Monitoring Tools and Services
Examine Monitoring Tools and Features Demo
Supported Alerts
Cisco Meraki Dashboard API
References
Setting Up Reporting and Auditing Capabilities in the Cisco Meraki Dashboard
Cisco Meraki Reports
Manage Firmware Through the Dashboard
PCI Auditing
References
Gaining Visibility and Resolving Issues Using Cisco Meraki Tools
Troubleshooting Methods
Logging Capabilities
Cisco Meraki Security Center Overview Demo
Wireless Troubleshooting
Explore Wireless Troubleshooting Tools Demo
Troubleshoot Cisco Meraki Cloud Application Performance
Troubleshoot Cisco Meraki Auto VPN
Explore VPN Status, Firewall, and Static Port Forwarding
Local Status Page
References
Labs
Discovery Lab 1; Configure the Cisco Meraki Dashboard
Discovery Lab 2: Enable Advanced Features and Optimize Networking
Discovery Lab 3: Troubleshoot the Network Using the Cisco Meraki Dashboard
Discovery Lab 4: Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
Discovery Lab 5: Establish Auto VPN
Discovery Lab 6: Configure Virtual Interfaces and Routing on Cisco Meraki MS Switches
Discovery Lab 7: Configure Routes and Redistribution
Discovery Lab 8: Configure QoS,
Discovery Lab 9: Configure Traffic Shaping
Discovery Lab 10: Configure Load Balancing
Discovery Lab 11: Define Firewall Rules
Discovery Lab 12: Enable Advanced Malware Protection
Discovery Lab 13: Enable Content Filtering
Discovery Lab 14: Configure and Apply Access Policies
Discovery Lab 15: Configure Wireless Guest Access
Discovery Lab 16: Configure SSIDs
Discovery Lab 17: Implement RF Profiles
Discovery Lab 18: Implement Air Marshal
DIscovery Lab 19: Create Cisco Meraki Systems Manager Configuration Profiles
Discovery Lab 20: Define Security Polices
Discovery Lab 21: Enforce End-to-End Security
Discovery Lab 22: Setup Motion Alerts
Discovery Lab 23: Deploy Wireless Cameras
Discovery Lab 24: Manage Video Retention
Discovery Lab 25: Enable Alerts
Discovery Lab 26: Add Monitring and Reporting
Discovery Lab 27: Generate and Analyze Summary Reports
Discovery Lab 28: Manage Firmware
Discovery Lab 29: Generate a PCI Compliance Report
Discovery Lab 30: Troubleshoot an Offline Device
Discovery Lab 31: Troubleshoot Content Filtering
Discovery Lab 32: Troubleshoot Remote Site Connectivity
€825
E-Learning
Designing and Implementing Enterprise Network Assurance [ENNA-CPLL]
OVERVIEW
The Designing and Implementing Enterprise Network Assurance training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training is structured into four different tracks, collectively encompassing a broad spectrum of network assurance and monitoring aspects. As a participant, you will first overview different Cisco assurance products, followed by two tracks focused on Cisco ThousandEyes solution, and one dedicated to Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day (Day 2) operations that ensure continuous, seamless network assurance.
There is 32 hours of content within this course which equates to a 4 day ILT course.
This course is worth 32 Continuing Education (CE) credits toward recertification.
OBJECTIVES
After completing this course you should be able to:
Examine Cisco ThousandEyes solution and its high-level use cases
Learn to effectively use Cisco Catalyst Center Assurance for at-a-glance health monitoring, metrics calculation, and data analysis, covering overall network, device, client, service, and application health
Gain valuable insights for troubleshooting and issue resolution, ensuring a reliable user experience in your network environment
Gain an introductory understanding of Cisco AppDynamics, Cisco Catalyst Software-Defined Wide Area Network (SD-WAN) Assurance, and Cisco ThousandEyes
CONTENT
Enterprise Network Assurance Overview
Modern Network Challenges
Network Visability in the Past
Active and Passive Monitoring
Modern IT Visibility Architecture
Use Cases
Cisco Enterprise Assurance Portfolio
Introduction to Cisco Catalyst Center Assurance
Cisco Catalyst Center Assurance Overview
Cisco Catalyst Center Assurance Health Scores
Cisco Catalyst Center Assurance Dashboard Time Ranges Concepts
Network Device Health and Device 360 View
Client Health and Client 360 View
Application Health and Application 360 View
Issues Operations
Introduction to Cisco AppDynamics
Cisco AppDynamics Introduction
Monitor Applications with Cisco AppDynamics
Business Analytics and Custom Dashboards
Troubleshoot Performance Problems with Cisco AppDynamics
Introduction to Cisco Catalyst SD-WAN Assurance
Cisco Catalyst SD-WAN
Cisco Catalyst SD-WAN Monitoring
Cisco Catalyst SD-WAN Troubleshooting
Cisco Catalyst SD-WAN Analytics Overview
Introduction to Cisco ThousandEyes
Cisco ThousandEyes Visibility
How Cisco ThousandEyes Does It
Cisco ThousandEyes Cloud Agents
Cisco ThousandEyes Enterprise Agents
Cisco ThousandEyes EndPoint Agents
Cisco ThousandEyes Tests
Agent Test Capabilities
Agent Locations
Enterprise Agents Deployment
Enterprise Agent Operation
Enterprise Agent Firewall Requirements
Enterprise Agent Network Utilization
Enterprise Agent Deployment Options
Enterprise Agent on Cisco Platforms
Virtual Appliance Setup
Custom Virtual Appliance
Embedded Enterprise Agent CLI Deployment
Enterprise Agent Deployment with Cisco Catalyst Center
Enterprise Agent Deployment with Cisco Catalyst SD-WAN Manager
Enterprise Agent Deployment with Meraki Dashboard
Enterprise Agent Deployment in Proxy Environemnts
Agent Labels
Enterprise Agent Utilization
Enterprise Agent Clusters
BGP, Network, DNS, and Voice Tests Configuration
Routing BGP Test
BGP Test - Configuration
Network Test
Agent-to-Server Network Test - Data Collection
Network Test - Path Visualization View
Agent-to-Server Network Test - Configuration
DNS Tests
DNS Tests - Metrics
DNS Tests - Configuration
Voice Tests
Voice Tests - Metrics
Voice Tests - Configuration
Web Tests Configuration
Web Layer Tests
HTTP Server Test - Metrics
HTTP Server Test - Configuration
Page Load Test - Configuration
Web Authentication Methods
Transaction Test - Metrics
Transaction Test - Configuration
Transaction Test - Cisco ThousandEyes Recorder
Web Layer Tests - Proxy Metrics
Endpoint Agent
Endpoint Agent Overview
Endpoint Agent Use Cases
Collected Data
System Requirements and Installation
Agent Settings
Monitoring Settings
Endpoint Agent Views
System Administration
Role-Based Access Control
Account Groups
User Account Settings
Organization Settings
Time Zone Settings
Activity Log
Cisco ThousandEyes Billing
Unit Calculator
Network Troubleshooting with Cisco ThousandEyes
Troubleshooting Scenario A
Troubleshooting Analysis - Scenario A
Troubleshooting Scenario B
Troubleshooting Analysis - Scenario B
Troubleshooting Scenario C
Troubleshooting Analysis - Scenario C
Troubleshooting Scenario D
Troubleshooting Analysis - Scenario D
Share Links and Saved Events
Multi-Service Views
Internet Insights
Challenges with Internet Monitoring
Internet Insights Overview
Internet Insights Packages
Internet Insights Dashboard and Views
Alerts and Dashboards Configuration
Alerts Overview
Alert Rule Configuration
Dynamic Baselines
Alert Views
Alert Suppression Window
Enterprise Agent Notifications
Notification Triggers
Data Retention
Dashboards
Dashboard Snapshots
Baseline Metrics
Data Aggregation
Widget Configuration
Dashboard Examples
Integrations and Data Export
Monitoring Solutions
Monitoring Cisco Webex Meetings
Monitoring Microsoft 365
Monitoring Microsoft Teams
Monitoring Cisco SD-WAN
WAN Insights
Cisco Meraki Network Assurance
Wireless Health
Switch Traffic Analysis
Cisco Meraki SD-WAN Monitoring
Security Center
Logging Capabilities
Supported Alerts
Cisco Meraki Insights
Cisco Meraki Insight Overview
Web Application Health
Web Application Health Configuration
WAN Health
VoIP Health
VoIP Health Configuration
Alert Management
Internet Outages
Cisco Meraki Insight Licensing
Labs:
Discovery Lab 1: Troubleshoot the Health of Network Devices
Discovery Lab 2: Explore Cisco Catalyst Assurance
Discovery Lab 3: Schedule a Test
Discovery Lab 4: Deploy Enterprise Agent
Discovery Lab 5: Configure Network, DNS, and Voice Tests
Discovery Lab 6: Configure Web Tests
Discovery Lab 7: Deploy and Configure an Endpoint Agent
Discovery Lab 8: Configure Account Administration
Discovery Lab 9: Examine Internet Insights
Discovery Lab 10: Configure Alerts
Discovery Lab 11: Build a Dashboard
Discovery Lab 12: Enable Alerts and Configure Monitoring and Reporting
Discovery Lab 13: Examine Cisco Meraki Insights
€825
E-Learning
Introducing Cisco Ultra-Reliable Wireless Backhaul Online Configurator, PTP, and PMP Network Topologies [FMIC-CPLL]
OVERVIEW
The Introducing Cisco Ultra-Reliable Wireless Backhaul Online Configurator, PTP, and PMP Network Topologies (FMIC) training presents the Cisco® Ultra-Reliable Wireless Backhaul (previously Cisco® Fluidmesh) centralized Radio Configuration Environment (RACER) along with the basics of Ultra-Reliable Wireless Backhaul wireless point-to-point (PTP) and point-to-multipoint (PMP) networking. You will learn the advanced settings needed to configure Ultra-Reliable Wireless Backhaul radios, and how to use those settings within RACER.
This training will help you:
Understand the operational basics of the RACER configuration interface
Use the RACER interface’s advanced device configuration settings
Learn the principles of Ultra-Reliable Wireless Backhaul PTP and PMP networking
OBJECTIVES
After completing this course you should be able to:
Describe the operational basics of the RACER configuration interface
Make competent use of the RACER interface’s advanced device configuration settings
Describe the principles behind Ultra-Reliable Wireless Backhaul PTP and PMP networking
CONTENT
Introduction to the Cisco Ultra-Reliable Wireless Backhaul RACER
Ultra-Reliable Wireless Backhaul PTP Networking
Ultra-Reliable Wireless Backhaul PMP Networking
Ultra-Reliable Wireless Backhaul Advanced Radio Hardware Settings
Labs
There are no labs included within this training
€65
E-Learning