Course Overview

This course is intended for individuals who will configure and manage the ViPR Controller. Hands-on labs will cover the validation of the environment, initial discovery, and configuration of the solution. An introduction to integrating ViPR with cloud stacks for provisioning, vRealize Orchestration and Operations, SCVMM, and OpenStack will also be addressed

Course Objectives

Upon successful completion of this course, participants should be able to:

  • Define key components, concepts and architecture of a ViPR solution
  • Configure the ViPR solution
  • Perform basic management and orchestration with the ViPR Controllers
  • Discover and manage assets using ViPR interfaces
  • Ingest existing volumes into a ViPR managed solution
  • Demonstrate how to use the ViPR Plug-ins
  • Perform VMware, Microsoft and OpenStack integration with ViPR
  • Use the REST API to communicate and manage the ViPR solution

Course Content

The content of this course is designed to support the course objectives.

Introduction to ViPR

Architecture and Concepts

ViPR Deployment ModelsViPR

Prepare the Site for ViPR Discovery

Supported Arrays and Devices

Prerequisites for Installation

ViPR Dscovery and Configuration

Projects, Tenants, and Users

ViPR Discovery

ViPR Virtual Resource Provisioning

Virtual Resource Abstraction

Virtual Arrays and Networks

Virtual Pools

ViPR Service Catalogs

Working with Services

Service Catalogs

ViPR File Services

File Provisioning and Management

File Protection and Availability

ViPR Block Services

Block Provisioning and Management

Block Protection and Availability

ViPR Controller in Existing Environments

ViPR Controller in Existing Environments

ViPR Ingestion

ViPR Onboarding

ViPR Integration Overview

ViPR Integration Overview

ViPR Integration Use Cases

ViPR Integration with VMware

ViPR Storage Provider for vCenter Server

EMC VSI for vSphere Web Client

ViPR Plug-in for vRealize

VMware vRealize Operations Plug-in

ViPR Integration with Microsoft

ViPR Add-in for Microsoft SCVMM

ViPR Integration with OpenStack

ViPR Cinder Driver for OpenStack

ViPR Controller REST API

Introduction to the API Ecosystem

ViPR API Implementation

ViPR API Troubleshootin

Course Overview

TCP/IP is the globally accepted group of protocols at the core of the Internet and organizational intranets. A solid understanding of each of these protocols and how they work will give you the ability to deploy the most effective network for your organization. In this course, you will gain the essential knowledge and skills required to set up, configure, support, and troubleshoot your TCP/IP-based network.

Our expert instructors and extensive hands-on labs will prepare you to face and overcome the challenges of today’s complex networks. This course-the longest running of its kind in the industry-also prepares you for more specialized courses in network security, wireless integration, and Voice over IP, as well as for product-specific training such as Cisco, Nortel, and Microsoft.

Course Objectives

  • At the end of this course delegates will be able to
  • The essential elements of the TCP/IP protocol suite
  • Install and configure TCP/IP in a live classroom network
  • The roles of various devices in a TCP/IP network
  • IP addressing and subnetting including Variable Length Subnet Masking (VLSM)
  • Subnet an IP network and implement the resulting addresses
  • Details of ARP, IP, ICMP, TCP, and UDP – their functions and relationships
  • Automate address assignment and name resolution using DHCP and DDNS
  • IP routing and the protocols that support it, such as RIP and OSPF
  • How applications like FTP, HTTP, Telnet, and others work in a TCP/IP network
  • Functions of IPv6 and its related protocols
  • Functions and capabilities of multicasting, Voice over IP, and e-mail
  • Use of a protocol analyzer to isolate and troubleshoot network problems
  • Troubleshoot problems at each layer of a TCP/IP network

Course Content

History and Standards

  • Origin of TCP/IP
  • ARPANET Requirement Documents
  • Collaborative Network Requirements
  • One Protocol?
  • Documentation and RFCs
  • RFC Categories

TCP/IP Numbering Systems

  • Data Representation
  • Converting Binary or Hexadecimal to Decimal
  • Converting Decimal to Binary or Hexadecimal
  • Converting Hexadecimal to Binary and Binary to Hexadecimal
  • Counting
  • Guidelines for Determining Base

Local Signaling

  • Local Signaling
  • Ethernet Addressing
  • The Ethernet Header
  • CSMA/CD

IP Addressing

  • A Logical Address
  • IP Address Structure
  • Private Addressing
  • Network Address Translation
  • Address Assignment IP Subnets
  • A Logical Address
  • Multiple Subnets
  • Planning for Growth
  • Subnetting Subnets

Address Resolution Protocol

  • Address Mapping
  • ARP Cache
  • ARP Restrictions
  • ARP Message Fields
  • How Else Can ARP Help?

Multicasting

  • What is Multicasting?
  • ” Multicast Groups and Internet Group Management Protocol (IGMP)
  • Mapping a Class D IP Address to an Ethernet Multicast Address
  • How Does It All Work Together?

Internet Protocol

  • TCP/IP Protocols
  • Self-Healing Networking
  • IP Header
  • IP Sample Data Exchanges

IP Routing

  • TCP/IP Protocol
  • Routing Function
  • The IP Routing Algorithm
  • The Routing Table
  • Exterior or Interior Protocol
  • Routing Information Protocol
  • Layer 3 Switching

Simple Sessions with User Datagram Protocol

  • TCP/IP Protocols
  • Host-to-Host Layer Categories
  • UDP Header
  • Port Basics
  • UDP Ports and Sockets
  • Applications
  • UDP Sample Data Exchanges

Robust Sessions with TCP

  • TCP/IP Protocols
  • TCP Headers
  • TCP Three-Step Handshake
  • Congestion and TCP
  • Four Step Session Shutdown
  • TCP Sample Session

Autoconfiguration

  • BootP and DHCP
  • Manual vs. Automatic Address Assignment
  • DHCP New Lease Acquisition Process
  • DHCP Scopes and Options
  • DHCP in a Routed Network
  • Troubleshooting

DNS: Names Instead of Numbers

  • DNS Overview
  • A Distributed Service
  • The DNS Tree
  • Generic Top-Level Domains
  • Sponsored Top-Level Domains
  • Name Server
  • DNS Database
  • Resource Records
  • The Name Resolution Process
  • Reversing the Process
  • Dynamic DNS
  • Troubleshooting

Diagnostics and Error Reports via ICMP

  • ICMP Overview
  • ICMP Basics
  • ICMP Message Destinations
  • ICMP Messages
  • ICMP Sample Data Exchanges

Common TCP Applications

  • TCP/IP Protocols
  • Uses of Telnet
  • File Transfer Protocol (FTP)
  • E-mail
  • World Wide Web
  • Uniform Resource Locator (URL)

Common UDP Applications

  • TCP/IP Protocols
  • Trivial File Transfer Protocol (TFTP)
  • TFTP Sample Sessions
  • Simple Network Management Protocol (SNMP)
  • The Structure of Management Information
  • Remote Network Monitoring

VoIP

  • What is VoIP?
  • Why VoIP Instead of TDM Voice?
  • Uses for VoIP
  • Communication Characteristics
  • Protocol Standards
  • How VoIP Works
  • LANs and WANs

Security

  • Protocol Limitations
  • Threats
  • Solutions
  • User Authentication
  • Security-Related Protocols and IPSec
  • Virtual Private Networks (VPNs)

IPv6

  • Overview
  • Addressing
  • Header
  • ICMPv6
  • IPv6 DNS operation
  • Routing Services and Protocols
  • Internet2

Course Overview

The Splunk AppDynamics for Hybrid Application Monitoring (SAHA) training aims to enhance your expertise in full stack observability for hybrid applications using Cisco’s product portfolio, covering various aspects of observability and analytics. You will explore application performance monitoring (APM) and business analytics for hybrid applications using Cisco AppDynamics. You will also learn about customer digital experience and application dependency monitoring, leveraging network insights through Cisco ThousandEyes and integrating them with real user monitoring in AppDynamics. Finally, you will learn about application security with Cisco Application Security. 

Throughout the training, you will not only learn to effectively utilize these solutions but also deploy and configure them within your application environments.

Course Objectives

After completing this course you should be able to:

  • Understand the core principles and architecture of the Cisco Full Stack Observability (FSO) platform and its strategic benefits for application monitoring 
  • Explore best practices for deploying and managing hybrid application monitoring solutions, with a focus on Cisco AppDynamics agents for comprehensive visibility 
  • Configure Cisco AppDynamics for hybrid application monitoring, including setting up baselines, health rules, and proactive monitoring strategies 
  • Apply troubleshooting techniques using anomaly detection, database visibility, and custom dashboards to resolve issues affecting business transactions 
  • Understand the foundations of customer digital experience monitoring (CDEM) with Cisco ThousandEyes and AppDynamics platforms, integrating network and application insights to optimize customer interactions 
  • Deploy and configure Cisco ThousandEyes for CDEM, gaining insights into network and application performance and troubleshooting customer digital experiences 
  • Learn app dependency monitoring with AppDynamics and ThousandEyes, including the deployment and configuration of enterprise agents and leveraging test recommendation services 
  • Explore hybrid application security and business risk observability with Cisco application security, enabling participants to protect applications from attacks and vulnerabilities

Course Content

Hybrid Application Monitoring Foundation

  • The Full-Stack Observability Challenge
  • Cisco Full-Stack Observability Solution
  • Cisco Full-Stack Observability Use Cases
  • Hybrid Application Monitoring Use Case Overview
  • Full-Stack Observability Insights with Cisco AppDynamics
  • Hybrid Application Performance Monitoring with Cisco AppDynamics
  • Cisco AppDynamics Enrichments and Extensions
  • Cisco AppDynamics for Open Telemetry

Deploy Hybrid Application Monitoring

  • Application Performance Monitoring Architecture
  • Application Agents Deployment
  • Application Agents Deployment in Containerized and Kubernetes Environment
  • Infrastructure Visabilty
  • Machine Agent Deployment
  • Database Visability
  • Database Agent Deployment and Collector Configuration
  • Agent Lifecycle Management with Cisco Smart Agent

Hybrid Application Monitoring Configuration

  • Business Transaction Management
  • Business Transaction Discovery
  • Health Rules Management
  • Proactive Monitoring with Policies and Actions
  • Dynamic Baselines Setup
  • Information Points and Data Collectors Configuration
  • Configure and Collect Transaction Analytics Data
  • Build Dash Studio Dashboards

Monitor and Troubleshoot Hybrid Application Performance

  • Hybrid Application Monitoring Strategies
  • Application Performance Monitoring Dashboards
  • Track Business Transaction Performance
  • Diagnose Business Transaction Issues with Snapshots
  • Resolve Issues Through Diagnostic Sessions
  • Troubleshoot with Information Points and Data Collectors
  • Troubleshoot Database Performance
  • Anomaly Detection

Customer Digital Experience Monitoring Foundation

  • Customer Digital Experience Monitoring Use Cae Overview
  • Customer Digital Experience Monitoring with Cisco ThousandEyes
  • Customer Digital Experience Insights with Cisco AppDynamics Browser Real User Monitoring

Customer Digital Experience Monitoring Deployment

  • Cisco ThousandEyesAgents Overview
  • Cisco ThousandEyesAgents Test Types
  • Cisco ThousandEyesAgents Browser Synthetics Overview
  • Transaction Tests for Digital Experience Monitoring
  • Browser Real User Monitoring (BRUM) Enablement
  • JavaScript Agent Injection and Configuration

Customer Digital Experience Monitoring Integration and Configuration

  • Cisco ThousandEyes and Cisco AppDynamics Integration
  • Digital Experience Monitoring Integrated Features
  • Network Insights and Browser Real User Monitoring Integration
  • Cisco ThousandEyes Alerts Configuration
  • Alert Notifications Setup
  • Cisco ThousandEyes API Integration
  • Cisco ThousandEyes for Open Telemetry Configuration

Customer Digital Experience Monitoring and Troubleshooting

  • Digital Experience and Network Performance Diagnostics
  • Dashboard Insights with Cisco ThousandEyes
  • Real User Monitoring Data Exploration
  • User Journey Maps
  • Browser Snapshots and Application Performance Monitoring Correlation

Application Dependency Monitoring Foundation

  • Application Dependency Monitoring Use Case Overview
  • Does it Fit the Use Case?
  • Application Dependency Monitoring with Cisco ThousandEyes
  • End-to-End Application Dependency Monitoring

Application Dependency Monitoring Deployment

  • Enterprise Agent Deployment
  • Virtual Appliance Deployment
  • Select a Test Type for Application Dependency Monitoring
  • Transaction and API Test Configuration

Application Dependency Integration and Configuration

  • Bidirectional Integration for Application Dependency Monitoring
  • Cisco AppDynamics for Test Recommendations Setup
  • Cisco AppDynamics Custom Back-End Detection

Application Dependency Monitoring and Troubleshooting

  • Application Dependency and Network Performance Diagnostics
  • Application Service Health and Dependency Insights Dashboard
  • Application Dependency in Cisco AppDynamics Dashboards

Hybrid Application Security and Business Risk Observability Foundation

  • Hybrid Application Security and Business Risk Observability Use Case Overview
  • Application Security and Business Risk with Cisco Secure Application

Hybrid Application Security Monitoring Deployment

  • Enable and Verify Cisco Secure Application
  • Secure Appliction Alerts Configuration
  • Secure Application Policies Configuration
  • Cisco Secure Application with Splunk Integration

Hybrid Application Security and Business Risk Observability Protection

  • Application Security Dashboard
  • Monitoring Business Transactions with Business Risk Score
  • API Security Insights
  • Library and Vulnerability Monitoring
  • Attack Monitoring

Labs

  • Discovery Lab 1: Monitor Application Performance
  • Discovery Lab 2: Instrument Application Services
  • Discovery Lab 3: Enhance Application Monitoring with Infrastructure and Database Visibility
  • Discovery Lab 4: Improve Monitoring Experience Through Management and Configuration Strategies
  • Discovery Lab 5: Configure Transaction Analytics for Insightful Business Dashboards
  • Discovery Lab 6: Evaluate Hybrid Application Performance
  • Discovery Lab 7: Troubleshoot Business Transaction Performance Using Snapshots
  • Discovery Lab 8: Discover Customer Digital Experience with ThousandEyes and AppDynamics
  • Discovery Lab 9: Configure and Verify Transaction Test
  • Discovery Lab 10: Deploy and Verify Browser Real User Monitoring
  • Discovery Lab 11: Discovery Lab 1: Enable Data Sharing Through Integration
  • Discovery Lab 12: Monitor Digital Experiences with Cisco ThousandEyes
  • Discovery Lab 13: Resolve Digital Experience Issues with Cisco ThousandEyes and Cisco AppDynamics
  • Discovery Lab 14: Uncover Application Dependency Performance with Cisco ThousandEyes and Cisco AppDynamics
  • Discovery Lab 15: Deploy an Enterprise Agent and Configure Tests for Application Dependency Monitoring
  • Discovery Lab 16: Configure Test Recommendations and Integrate the Platforms
  • Discovery Lab 17: Monitor Application Dependency Issues with Cisco ThousandEyes and Cisco AppDynamics
  • Discovery Lab 18: Secure Applications with Cisco AppDynamics Walkthrough
  • Discovery Lab 19: Integrate Cisco Secure Application with Splunk
  • Discovery Lab 20: Enable and Configure Cisco Secure Application
  • Discovery Lab 21: Monitor Application Security Using Cisco Secure Application

Course Overview

This course is intended for individuals who will perform SAN management activities using vendor or EMC tools. The Connectrix family of switches are managed to provide connectivity to host and storage through a SAN. SAN switches are administered through their CLI and GUI management tools for configuration in a multi-switch fabric and to enable communication between the hosts and storage. Fibre Channel, FCIP, iSCSI and FCoE environments are presented for management and switch configuration along with NPIV and NPV. The concepts of EMC SAN best practices, performance monitoring, basic troubleshooting and security are also addressed.

Course Objectives

  • Identify SAN components and list current EMC Connectrix connectivity
  • options, and management tools
  • Perform basic maintenance and configuration tasks on EMC Connectrix BSeries and MDS-Series switches
  • Describe security options for a SAN
  • Show the software licensing options for each Connectrix family of switches
  • Configure virtualization features in a SAN, including VSANs, Virtual Fabrics, NPIV, NPV and Access Gateway
  • Manage zoning
  • Describe the components of a Fibre Channel fabric
  • Expand a Fibre Channel fabric by merging switches
  • Extend a Fibre Channel Fabric using a FCIP tunnel
  • Configure a native iSCSI SAN
  • Describe a basic FCoE configuration
  • Perform basic troubleshooting using SAN Management tools

Course Content

The content of this course is designed to support the course objectives.

SAN Management Overview

Host SAN ConceptsSAN StorageSAN ConnectivitySAN Management

B-Series Switch Tools

  • B-Series Management Tools
  • Licensing
  • Management Tools Installation and usage
  • Switch Configuration
  • Maintenance Tasks
  • Security for B-Series SANs

MDS-Series Switch Tools

  • MDS-Series Management Tools
  • Licensing
  • Management Tools Installation and usage
  • Switch Configuration
  • Maintenance Tasks
  • Security for MDS-Series SANs

Fabric Virtualization

  • B-Series Virtual Fabrics
  • MDS-Series Virtual SANs
  • Fibre Channel Addressing and Logins

Zoning and Storage Allocation

  • Zoning Overview
  • B-Series Switch Zoning
  • MDS-Series Switch Zoning
  • VNX Storage Provisioning
  • VMAX Storage Provisioning

Merging Fabre Channel Fabrics

  • Fibre Channel Fabric Overview
  • B-Series Fabric Merge
  • MDS-Series Fabric Merge
  • Interoperability Overview

Managing IP SANs

  • FCIP Configuration
  • iSCSI Fabric Configuration

Port Virtualization

  • N_Port ID Virtualization
  • B-Series NPIV and Access Gateway Configuration
  • MDS-Series NPIV and NPV Configuration

IT Transformation

  • Trends Driving IT Transformation
  • Converged Networks Overview
  • FCoE Overview

Troubleshooting and Monitoring

  • Troubleshooting SAN
  • B-Series Troubleshooting and monitoring
  • MDS-Series Troubleshooting and monitoring

Course Overview

The Palo Alto Networks Panorama: Centralized Network Security Management course is three days of instructor-led training that should help you to:

– Learn how to configure and manage the next-generation Panorama management server

– Gain experience configuring templates (including template variables) and device groups

–  Gain experience with administration, log collection, and logging and reporting

– Become familiar with planning and design considerations for Panorama deployment

– Activate, configure, and manage Prisma Access using Panorama

Course Objectives

This course should help students gain in-depth knowledge about configuring and managing a Palo Alto Networks Panorama management server. Administrators that complete this course should become familiar with the Panorama management server’s role in managing and securing the overall network.

Network professionals will be shown how to use Panorama aggregated reporting to provide them with a holistic view of a network of Palo Alto Networks next-generation firewalls.

Course Content

Course Modules

1 – Initial Configuration

2 – Adding Firewalls

3 – Templates

4 – Device Groups

5 – Log Collection and Forwarding

6 – Using Panorama Logs

7 – Panorama Administrative Accounts

8 – Reporting

9 – Troubleshooting

10 – Prisma Access Overview

11 – Activate and Configure

12 – Templates and Device Groups

13 – Configure Service Connections

14 – Secure Remote Networks

Course Overview

The Palo Alto Networks Panorama: Centralized Network Security Administration course is two days of instructor-led  training that should help you to:

– Learn how to configure and manage the next-generation Panorama management server

– Gain experience configuring templates (including template variables) and device groups

– Activate, configure, and manage Prisma Access using Panorama

Course Objectives

This course should help students gain experience configuring and managing Palo Alto Networks Panorama management servers. Administrators that complete this course should become familiar with the Panorama management server’s role in managing and securing the overall network.

Course Content

  1. Initial Configuration
  2. Adding Firewalls
  3. Templates
  4. Device Groups
  5. Prisma Access Overview
  6. Activate and Configure
  7. Templates and Device Groups
  8. Configure Service Connections
  9. Secure Remote Networks

Course Overview

This course goes beyond simple administration and provides an in-depth understanding of how to leverage and optimize XtremIO features and capabilities in specific application areas. The course begins with providing hands-on coverage of operational aspects of the XtremIO environment, and then leads to XtremIO features and performance optimization. Lastly, it focuses on considerations and best practices for system integration with specific application use cases and the industry’s leading data protection solutions such as RecoverPoint and VPLEX.

Course Objectives

  • Describe proper configuration and integration of XtremIO systems for end to end communication and all points in between
  • Obtain maximum availability from a solution by properly configuring replication and proactive monitoring through alerts and basic troubleshooting
  • Analyze workloads and optimize for maximum performance thresholds
  • Create custom reports to determine patterns and confirm with SLA guidelines
  • Describe data protection capabilities of XtremIO using RecoverPoint, VPLEX, and AppSync
  • Describe integration best practices for VDI and Oracle environments

Course Content

  • XtremIO Overview and Access Requirements
  • Components, models and resources
  • XtremIO Management Server
  • XtremIO Cluster Management Interface
  • Accessing XtremIO storage management applications (GUI, CLI)
  • Management through REST APIs and Plugins
  • XtremIO Storage Presentation
  • Storage presentation and volume management
  • Host configuration – Windows, Linux, ESXi, Solaris, AIX, and HPUX
  • Connectivity Zoning best practices
  • XtremIO Snapshots
  • Snapshot features, capabilities, and operations
  • XtremIO Features and Integration
  • Encryption, Compression and Deduplication
  • XDP (XtremIO Data Protection)
  • Integration with ViPR, ViPR SRM, EMC Connectrix Manager Converged Network Edition (CMCNE)
  • Integration with Cisco Data Center Network Manager (DCNM)
  • Integration with VMware – VAAI, VSI, Operations Manager
  • Microsoft – ODX, ESI, and VSS Plug-in
  • XtremIO Performance and Reporting
  • Performance overview
  • XtremIO reports and host tools
  • Common performance issues
  • XtremIO Data Protection
  • RecoverPoint native integration with XtremIO arrays
  • RecoverPoint operations and management
  • Implementing XtremIO into a VPLEX Cluster
  • XtremIO Application Integration
  • Integration with Oracle environments
  • Integration with VDI environments
  • XtremIO Advanced Management Operations
  • Managing alerts and power procedures
  • Generating log files, and IP modifications
  • Space reclamation and shrinking deduplication rates

Course Overview

The Cisco NSO Essentials for Programmers and Network Architects (NSO201) course introduces you to Cisco® Network Services Orchestrator (NSO). You will learn to install Cisco NSO and use it to manage devices and create services based on YANG templates with XPath. This course provides an overview of NSO as a network automation solution, as well as introductions to NETCONF, YANG, and XPath. You will learn about managing devices and creating device templates, service management and service package creation, network element drivers, interfacing with other systems using APIs, configuring and troubleshooting system settings, managing alarms and reporting, configuring NSO for scalability and performance, and capabilities that can be added to Cisco NSO.

Course Objectives

After completing this course you should be able to:

  • Explain the transactional service activation and how it relates to business requirements
  • Explain how Cisco NSO communicates with network devices
  • Understand the NETCONF protocol and be able to read and write simple YANG models
  • Understand the difference between devices that are fully NETCONF capable and those that are less or not NETCONF capable
  • Understand the support for candidate configuration and confirmed commit support
  • Use logs to troubleshoot the Cisco NSO deployment and check NSO communication with network devices
  • Explain the YANG service model structure
  • Design a real-world usable service
  • Explain the mapping logic of service parameters to device models and consequently to device configurations
  • Describe the use of different integration options and APIs
  • Explain how to implement action with use of config-templates in NSO package
  • Explain the use of Reactive FASTMAP in for manipulating and implementing advanced NFV components
  • Describe the use of feature components and function packs
  • Define and explain the ETSI MANO principles and solution
  • Work with the alarm console, and understand the NSO alarm structure and how it conforms to modern network operations procedures
  • Describe Cisco NSO 6.0  new features and changes in NSO

Course Content

Introducing Service Orchestration with Cisco NSO

  • Challenges of Network Management
  • Network Management without Cisco NSO
  • Network Management with Cisco NSO
  • Challenges of Network Orchestration
  • Main Components of NSO

Exploring Cisco NSO Architecture

  • Cisco NSO Architecture
  • Cisco NSO Components
  • Cisco NSO and Ansible

Orchestrating Network Solutions

  • Orchestration Use Cases Overview
  • Orchestration Use Case Examples

Describing Cisco NSO Operation

  • NETCONF and YANG Overview
  • Cisco NSO Packages
  • Cisco NSO Mapping Logic
  • Network Element Drivers

Installing Cisco NSO

  • Setup Overview
  • Cisco NSO Local Installation
  • Installing NEDs
  • Using Netsim

Exploring the Advantages of NETCONF

  • NETCONF Basics
  • NETCONF Operation

Managing Devices Using the Device Manager

  • Device Manager Overview
  • Device Configuration Management
  • Device Connection Management
  • Templates and Groups
  • Device Template Processing
  • Commit Queues

Creating YANG Models

  • YANG Basics
  • YANG Data Types
  • XPath Overview
  • Basic YANG Statements
  • Other Representations of YANG
  • Verify Yang Statements

Using Services

  • Package Architecture
  • Creating a Service Package
  • Sample Service Configuration
  • Service Template
  • YANG Service Model
  • Deploying a Service

Implementing Services with Model-to-Model Mapping

  • Mapping Service Parameters
  • FASTMAP
  • Template Processing
  • NSO Transaction Model

Designing Services in Cisco NSO

  • Service Design Overview
  • Top-Down Service Design
  • Bottom-Up Service Design
  • Device Configuration
  • Service Model

Managing the Service Lifecycle

  • Service Management Tasks
  • CDM Migration
  • Service Lifecycle Management Guidelines

Programming with Python in Cisco NSO

  • Cisco NSO Programmability Overview
  • NSO Python API Overview
  • Python Scripting
  • Python Service Skeleton
  • Creating a Service YANG Model
  • Creating a Service Template
  • Template Processing with Python

Configuring and Troubleshooting System Settings

  • System Configuration
  • Role-Based Access Control
  • System Troubleshooting

Discovering Cisco NSO Northbound APIs

  • NSO Integration Options
  • NETCONF Server
  • Web Integration
  • SNMP Agent

Managing Alarms and Reporting

  • Alarm Management
  • Reporting

Configuring Cisco NSO for Scalability and Performance

  • High Availability
  • High-Availability Cluster Communications
  • Addressing Performance Limitations
  • Layered Service Architecture

Describing Cisco NSO VNF Manager and Function Packs

  • Function Packs
  • Cisco SD-WAN Solution
  • NFV Orchestration
  • Reactive FastMap

Labs

  • Discovery Lab 1: Install Cisco NSO
  • Discovery Lab 2: Use Device Manager
  • Discovery Lab 3: Create a Device Template
  • Discovery Lab 4: Create a Loopback Template Service
  • Discovery Lab 5: Create a VLAN Template Service
  • Discovery Lab 6: Create an L3VPN Template Service
  • Discovery Lab 7: Migrate a CDM Device
  • Discovery Lab 8: Set Up Device Using Python Scripts
  • Discovery Lab 9: Create an SVI Python Template Service
  • Discovery Lab 10: Use NSO RESTCONF API with Postman

Course Overview

The Networking Essentials for Cloud Applications on AWS course provides a comprehensive understanding of networking concepts and services within the Amazon Web Services (AWS) cloud environment. Designed for novice and experienced networking engineers, this course covers essential topics, best practices, and hands-on labs. Its purpose is to equip learners with the knowledge and skills that are required to design, configure, and optimize network infrastructure on AWS.

Target Audience

This course is intended for:

  • Newly hired cloud engineers
  • On-premises IT engineers
  • Cloud architects
  • Cloud engineers
  • Network engineers

Course Objectives

In this course, you will learn to:

  • Design a networking infrastructure for a scalable production application, considering design trade-offs between different networking services.
  • Configure networking services for a highly available, resilient, and scalable application.
  • Implement the networking infrastructure according to evolving business requirements.
  • Implement networking best practices to align towards AWS Well-Architected Framework.

  • Course Code NWIW

Course Overview

This course focuses on optimizing EMC NetWorker performance and integrating with EMC backup products, Microsoft applications, virtual environments, Oracle and SAP. Operational best practices will be provided with a focus on configuring and performing backup and recovery of the listed applications. This course provides participants with hands-on labs to reinforce the training.

Course Objectives

  • Configure NetWorker resources in accordance with best practices.
  • Configure and perform backup and recovery of filesystem and application data.
  • Understand, configure, and perform backup and recovery using Data Domain devices in accordance with best practices.
  • Understand, configure, and perform backup and recovery using Avamar deduplication nodes.
  • Describe and configure backup and recovery of Microsoft SQL, Exchange, and SharePoint data following best practices.
  • Describe configuration, backup and recovery of Microsoft Hyper-V.
  • Describe configuration, backup and recovery of Oracle databases.
  • Describe configuration, backup and recovery of VMware ESXi.
  • Describe VMware protection strategies.
  • Describe configuration and use cases for NetWorker Snapshot Management.
  • Describe configuration, backup and recovery of SAP and SAP HANA.

Course Content

  • Module 1: NetWorker Performance Management
  • Lesson 1: NetWorker Process Communication
  • Lesson 2: Sizing NetWorker for Best Performance
  • Lesson 3: NetWorker Performance Best Practices
  • Lesson 4: Backup and Recovery Best Practices
  • Lab 1: Performing NetWorker File Backup and Recovery
  • Module 2: NetWorker Integration with Avamar
  • Lesson 1: Capabilities and Use Cases
  • Lesson 2: Configuring the Integration
  • Lab 2: Configuring Avamar in a NetWorker Environment
  • Module 3: NetWorker Integration with Data Domain
  • Lesson 1: NetWorker to DD Integration and Use Cases
  • Lesson 2: Configuring NetWorker Integration with Data Domain
  • Lab 3: Configure Data Domain in NetWorker Environment
  • Module 4: NetWorker Integration with Microsoft SQL
  • Lesson 1: Microsoft SQL VSS-based backup with NMM
  • Lesson 2: Microsoft SQL VSS-based recovery with NMM
  • Lesson 3: Microsoft SQL VDI-based backup with NMM
  • Lesson 4: Microsoft SQL VDI-based recovery with NMM
  • Lab 4: Microsoft SQL Backup and Recovery
  • Module 5: NetWorker Integration with Microsoft Exchange
  • Lesson 1: Exchange Backup with NMM
  • Lesson 2: Exchange Mailbox Database Recovery
  • Lesson 3: Exchange Granular Level Recovery
  • Lesson 4: Exchange DAG backup and recovery with NMM
  • Lab 5: Microsoft Exchange Backup and Recovery
  • Module 6: NetWorker Integration with Microsoft SharePoint
  • Lesson 1: NMM and SharePoint Backup
  • Lesson 2: Microsoft SharePoint Backup and Recovery with NMM
  • Lab 6: Microsoft SharePoint Backup and Recovery
  • Module 7: NetWorker Integration with Microsoft Hyper-V
  • Lesson 1: NMM Configuration or Hyper-V Backup
  • Lesson 2: NMM Configuration for Hyper-V Recovery
  • Lab 7: Microsoft Hyper-V Backup and Recovery
  • Module 8: NetWorker Integration with Oracle
  • Lesson 1: Oracle and NMDA Overview
  • Lesson 2: Oracle Database Backup with NMDA
  • Lesson 3: Oracle Database Recovery with NMDA
  • Lab 8: Oracle Backup and Recovery
  • Module 9: NetWorker Integration with VMware
  • Lesson 1: VMware Data Protection Fundamentals
  • Lesson 2: EMC Backup and Recovery Appliance Overview
  • Lesson 3: EBR Installation and Configuration
  • Lesson 4: VMware Backup and Recovery with NetWorker and EBR
  • Lab 6: VMware Backup and Recovery
  • Module 10: NetWorker Snapshot Management
  • Lesson 1: NetWorker Snapshot Management Overview
  • Lesson 2: NSM Requirements and Configuration Checker
  • Lesson 3: NSM File System Backup and Recovery
  • Lesson 4: NSM Application Backup and Recovery
  • Module 11: NetWorker Integration with SAP
  • Lesson 1: SAP and NMSAP Overview
  • Lesson 2: SAP Backup with NMSAP
  • Lesson 3: SAP Recovery with NMSAP
  • Lesson 4: SAP HANA Backup and Recovery with NMSAP