Course Overview

This Meraki SD-WAN training is targeted to engineers and technical personnel involved in deploying, implementing, operating and optimizing Meraki SD-WAN solution, both in enterprise and Service Provider environments. This training is specially designed for implementing Meraki SD-WAN in integration with the complete feature set of Cisco Umbrella including DNS Security, Cloud Based Firewall and Secure Internet Gateway. The course walks you through how each integration works and how to design and implement it step-by-step.

Course Content

Module 1: Introduction to Meraki SD-WAN and Meraki Key Concepts

  • Meraki Centralized Dashboard
  • Meraki key concepts
    • Meraki Concentrator Modes
    • VPN Topology
    • Split Tunnel and Full Tunnel
    • Hub and Spoke and VPN Mesh
  • Meraki Connection Monitor
  • Data Center Redundancy (DC-DC Failover)
  • Warm Spare for VPN Concentrators
  • Deployment Models:
    • Deploying vMX in the Public and Private Cloud

Module 2: Meraki SD-WAN Deployment Models

  • Introduction
  • Data Center Deployment
  • MX Deployment Considerations
  • MX Deployment Considerations
    • Upstream DC Switching Considerations
    • Routing Considerations
    • Firewall Considerations
  • Branch Deployment
    • AutoVPN at the Branch
    • Hub and Spoke VPN Deployment
    • Hub Priorities and Design considerations
  • Meraki Centralized Policies
    • DIA traffic steering using Smart Path
    • Implementing QoS from the dashboard
    • Configuring arbitrary topologies

Module 3: Meraki SD-WAN Security

  • Exploring the SD-WAN and Security Dashboard
  • Site-to-site VPN Deep Dive
  • Client VPN Technologies
  • Access control and Splash Page
  • NAT and Port Forwarding
  • Firewall and Traffic Shaping
  • Content Filtering and Threat Protection
  • Meraki and Cisco Umbrella Integration

Module 4: Designing and Implementing DNS Security

  • Pre-requisite check before integrating Umbrella with Meraki SD-WAN
    • Making sure you have the correct licensing
    • Platform support check
    • Internet Connectivity check
  • Walking through the Umbrella Dashboard
    • Dashboard Overview
    • DNS Policy GUI Overview
    • Firewall Policy GUI Overview
    • Web Policy GUI Overview
    • Umbrella AD/SAML Integration Overview (optional)
  • Integrating Cisco Umbrella for DNS Security
    • Umbrella API Integration
  • Configuring the DNS Encryption Policy
    • Excluding the local domains
    • Configuring the Security Policy in Meraki
    • Implementing the policy at the DIA Sites

Module 5: Meraki MX and Cisco Umbrella SIG IPSEC Tunnels

  • Cisco Umbrella SIG Overview
  • Phase 1: IPSEC plus Cloud Security
  • Licensing requirement for Phase1
  • Meraki MX IPSEC integration with Cisco Umbrella
  • Enhanced DNS protection with Selective Proxy
  • Security Policy: URL Inspection, HTTPS Inspection, Cloud Delivered Firewall, Granular Content Filtering, Non-Web Traffic Security
  • Phase 2: SIG Integration with Meraki SD-WAN
  • Verification
    • Checking the logs on Umbrella Dashboard

Module 6: Troubleshooting Umbrella Integration

  • Troubleshooting DNS Security
    • API Integration not working
    • DNS for local domain failing
    • No redirection to Cisco Umbrella for external domains
  • Troubleshooting SIG and Firewall
  • Making sure the IPSec Tunnels to Umbrella are operational
  • Troubleshooting the policies for redirection
  • Reviewing logs in Umbrella
  • Checking Alarms and Notifications
    • Checking Alarms on Meraki Dashboard
    • Checking Alarms on Cisco Umbrella
  • Leveraging Meraki Insights for
    • Network Visibility
    • Traffic Analytics using DPI
    • Faster Resolution

Course Overview

In this workshop you will learn why we are implementing Assurance, what it looks like and key features. We will also discuss the Cisco DNA Center appliance and workflow and tasks associated with an implementation.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins

Course Content

Day 1:

Module 1: Introduction to Cisco DNA Center Assurance

  • Introduction to DNA Center
  • System Architecture
  • Key Features and Use Cases
  • Introduction to Cisco ISE and DNAC-ISE integration

Module 2: Design

  • Network design options
  • Sites
  • Creating Enterprise and Sites Hierarchy
  • Configuring General Network Settings
  • Loading maps into the GUI
  • IP Address Management
  • Software Image Management – Lab on Day 5
  • Network Device Profiles
  • AAA
  • SNMP
  • Syslog
  • IP address pools
  • Creating Enterprise and Guest SSIDs – Lab on Day 2
    • Creating the wireless RF Profile
    • Cresting the Guest Portal for the Guest SSIDs
    • Network profiles – Lab on Day 2
    • Authentication templates

Module 3: Discovery and Provision

  • Device Discovery and Protocols
  • Devices Onboarding
    • Assigning Devices to a site
    • Provisioning device with profiles

Day 2:

Module 3: Discovery and Provision

  • Plug and Play
  • Templates
  • Templates for Day-0
  • Templates for Day-N operations

Day 3:

Module 4: Monitoring Device, Client, and Application Health

  • DNAC Telemetry
  • Monitoring Network Device Health and Performance
  • Monitoring Wired and Wireless Client Health and Performance
  • Monitoring Application Health and Performance

Module 5: Application Visibility and DNAC Integration with Umbrella

  • Monitoring Application Visibility in DNA Center
  • Umbrella Introduction
  • DNA Center Umbrella Integration and Use Cases

Module 6: Troubleshooting Issues, Observing Insights and Trends

  • Detect Issues, Insights, and Trends in the Network
  • DNA Center Integration with other tools for Monitoring and Management

Day 4:

Module 7: Troubleshooting using Cisco DNA Center Assurance Tools

  • DNAC Assurance Troubleshooting Tools
  • Using Sensor Tests
  • Using Intelligent Capture
  • Spectrum Analysis

Module 8: DNAC and Thousand Eyes

  • Introduction to ThousandEyes
  • ThousandEyes Use Cases
  • DNA Center and ThousandEyes Integration

Day 5:

Module 9: AI Analytics and Machine Learning in DNA Center

  • Overview of AI Analytics and ML (Machine Learning)
  • DNA Center AI and ML Use Cases

Module 10: DNA Center Maintenance

  • DNA Center Reports
  • DNA Center Backup and Restore

Lab Outline:

Labs are designed to assure learners a whole practical experience, through the following practical activities:

  • Lab 1: Navigate the Cisco DNA Center GUI
  • Lab 2: Integrate Cisco ISE with Cisco DNA Center –Instructor Demo
  • Lab 3: Design the Network Hierarchy and Configure Network Settings
  • Lab 4: Discover Wired Manually in the Inventory, Assign to Site, and Provision
  • Lab 5: Discover Wired Device using Plug and Play(PnP) using Template Editor
  • Lab 6: Discover and Provision C9800 WLC, Configure Wireless SSIDs and Network Profiles
  • Lab 7: Configure C9800 WLC using Template Editor
  • Lab 8: Configure Cisco DNA Center Assurance Telemetry Profiles and Apply to Devices
  • Lab 9: Generate and Monitor Application Traffic on DNAC for Clients
  • Lab 10 : Application Visibility and Generate Client Traffic to Monitor Top Applications on DNAC
  • Lab 11: DNAC Umbrella Integration for DNS or SIG(Secure Internet Gateway)
  • Lab 12: Assurance Dashboards – Health, Issues and Wi-Fi 6 on DNAC
  • Lab 13: Intelligent Packet Capture and Spectrum Analysis
  • Lab 14: 1800s AP as Sensor – Instructor Demo
  • Lab 15: Application Visibility With ThousandEyes and DNAC
  • Lab 16: AI Endpoint Analytics on DNAC
  • Lab 17: Reporting on Cisco DNAC
  • Lab 18: IOS-XE Device Upgrade / Downgrade using SWIM via DNAC
  • Lab 19: DNAC Configuration Backup on External Server – Instructor Demo

Course Overview

The class is divided into four broad segments. Firstly the class reviews the concepts, principles and terminology behind the TCP/IP protocol. Secondly the class covers the implementation of TCP/IP under z/OS, the required parameters, its close relationship with VTAM/SNA and interaction with application subsystems. Thirdly the Operator Commands required for monitoring and controlling the Network environment will be discussed. The fourth and final segment covers the tools and procedures required for problem resolution.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

This course provides students with a comprehensive grounding in the philosophy, capabilities, structure, commands and interactions of SNA and TCP/IP with other hardware and software components found and implemented within the z/OS environment.

Students will leave the class competent and confident to analyze, diagnose and resolve network problems encountered within that environment. This course contains hands-on labs.

Course Content

TCP/IP Concepts and Principles

  • Background and evolution of the TCP/IP architecture
  • TCP/IP over WANs and LANs
  • ETHERNET
  • MAC address
  • Breaking down the IP address structure (including subnet masking) ?
  • Special and reserved IP addresses
  • Classful and Classless addresses
  • Unicast, Multicast and Broadcast addresses
  • Network numbering and Broadcast numbers
  • Sockets – Internet Protocol
  • Routing and default gateway

TCP/IP and VTAM/SNA Interatction Under z/OS

  • VTAM/SNA Concepts
  • Why we still use parts of VTAM/SNA in 21st century
  • SNA/APPN and HPO
  • Open System Adaptor (OSA)
  • The IP stack under z/OS
  • TCP/IP and VTAM/SNA interdependencies
  • Telnet and Telnet 3270
  • SNA traffic over IP
  • Enterprise Extenders
  • Required VTAMLST and IP PROFILE parameters
  • The TCP/IP start-up procedure
  • VTAM Startup – VTAM Parameters
  • Interaction with application subsystems
  • Describe the Syslog function in the UNIX environment and how to configure the /etc/syslog.conf file
  • Modify the Translate Tables used for connection to hosts that use American Standard Code for Information Interchange (ASCII) character coding

Operating and Controlling TCP/IP and VTAM Under z/OS

  • Use z/OS commands to control TCP/IP resources and debug simple network problems
  • Use z/OS commands to control VTAM
  • START Command
  • STOP Command for each server with outstanding calls to TCP/IP
  • STOP Command for each connected server that does not have outstanding calls
  • DISPLAY Command ??? relevant options related to the TCP/IP address space
  • MODIFY Command ??? relevant options related to the TCP/IP address space
  • VARY Command ??? relevant options related to the TCP/IP address space
  • TSO Command options
  • UNIX Command options
  • Activate and analyze trace data to identify the probable source of network problems

Tools and Procedures For Problem Resolution

  • Type of problem, ABEND, hang or loop?
  • VTAM, TCP/IP or other component ??? identify the root cause?
  • Z/OS I/O problem?
  • Shortage of z/OS Common Storage?
  • Performance problem?
  • Document the problem
  • Problem analysis tools, procedures and techniques
  • Develop reliable diagnostic techniques for solving SNA and TCP/IP problems
  • Tools and methods for failure capture and discovery
  • Operator commands for problem determination
  • Common failures and faults: case studies
  • Understanding logical connections between servers and clients
  • Internal communication between TCP/IP tasks
  • Activating and analyzing traces using z/OS system tools

Course Overview

This course gives network engineers an opportunity to plan for and implement networks utilizing HPE Comware devices. Participants will work HPE IRF, IMC, ACLs, QoS, OSPF, BGP, and Multicast technologies. This course covers basic and advanced topics; learner will experience both theory and hands on real hardware through lab exercises over five days. 

The learner will configure and monitor Comware devices using open standard technologies. You will work with Layer 2 technologies, such as Multiple Instance Spanning Tree (MSTP) and Link Aggregation (Trunks). You will also learn about Layer 3 technologies, such as static routes, Open Shortest Path First (OSPF) with Multi-Area implementations, and Border Gateway Protocol (BGP), along with Multicast solutions leveraging Protocol independent Multicast (PIM) both dense and spare modes. 

Course Objectives

At the conclusion of this course, you should be able to:

 • Protect devices with local and remote authentication using telnet, SSH, web, and SNMP access 

• Navigate the HPE Comware CLI and manage the flash file system 

• Uphttps://education.hpe.com/ww/en/training/docs/cds/h8d09s.pdfgrade the Comware switch operating system • Configure VLANs on HPE Comware switches 

• Configure a Comware switch for DHCP server and DHCP relay 

• Configure multiple spanning tree and apply STP security features • Differentiate between static and dynamic Link Aggregation 

• Configure and troubleshoot Link Aggregation on HPE switches 

• Implement and deploy HPE IRF with MAD technologies to protect your network

 • Configuring and managing HPE Comware devices with HPE IMC 

• Configure, design, and deploy Access Control Lists (ACLs)

 • Configure, design, and deploy Open Shortest Path First (OSPF), in multi-area, and work with external routes

 • Configure, design, and deploy Border Gateway Protocol (BGP) 

• Configure, design, and deploy Quality of Service (QoS)

• Configure, design, and deploy Multicast (Protocol Independent Multicast Dense Mode and Spare mode) along with IGMP technologies

Course Content

H8D09s

Course Overview

This Specialist-level course is targeted for storage/cloud infrastructure administrators requiring in depth knowledge and practical lab work with EMC VNX Unified Storage systems. This training covers all the key elements of VNX Block, File, and Unified deployments. It covers integrating VNX block access for open systems hosts (Linux, Windows and VMware ESXi) through FC, iSCSI and, FCoE, and VNX file level access for Windows and Linux user/application environments via NFS and CIFS. Lastly, the course also covers configuration of local replications solutions for VNX systems.

Course Objectives

Upon successful completion of this course, participants should be able to:

  • Configuring Unisphere security and notifications
  • Provision and manage VNX block-level storage
  • Configure and manage VNX storage features such as LUN migration and expansion, FAST VP, FAST Cache, and deduplication
  • Configure and manage VNX Block local replication solutions–SnapView, VNX  Snapshots, SnapSure
  • Configure VNX File storage services for Linux/Unix/ESXi environments via NFS, and Windows environments via CIFS
  • Manage and monitor file systems, Virtual Data Movers, and Usermapper
  • Configure and manage VNX File local replication solutions with VNX SnapSure

Course Content

The content of this course are designed to support the course objectives.

Introduction to VNX Management

Unisphere Security and Basic Management

  • Unisphere GUI and CLI Interface
  • Unisphere Security Features
  • Notifications and Event Monitoring
  • Unisphere Storage Domains

Storage System Configuration

  • SP Networking and Cache Settings

Host Integration to Block Storage

  • Storage Networking Topologies and Requirements
  • Storage Networking with Fibre Channel and iSCSI
  • Host Registration and Storage Architecture
  • Configure Storage

Managing Block Host Connectivity

  • Data Path Management
  • Managing Block Host Connectivity
  • VNX and VMware API Integration

Advanced Storage Features

  • LUN Migration and LUN Expansion
  • FAST VP and FAST Cache
  • Block Space Efficiency Features
  • Data-At-Rest Encryption (D@RE)

Local Replication for Block

  • SnapView Snapshots and SnapView Clones
  • Managing VNX Snapshots

VNX File Configuration

  • Introduction to VNX File
  • Basic IP Networking Configuration for VNX File
  • Virtual Data Movers
  • Configuration of VNX File Systems – NFS and CIFS

VNX File Content and Space Efficiency Features

  • File System Quotas
  • File Level Retention and File Deduplication
  • Thin LUN File System

Networking Features

  • Networking Features Overview and Configuration
  • Complex Examples and Considerations

VNX SnapSure

  • Writable Checkpoints
  • Configuring SnapSure
  • Planning SnapSure and Managing Checkpoints

Data Mover Failover

  • Data Mover Failover Operations
    Testing Data Mover Failover and Failback

Course Overview

This course provides an introduction to the administration and management of a Vblock System.

Course Objective

  • Understand the main elements of Administration and Management
  • Develop a working understanding of the Vblock system as it pertains to:

o Validation

o Monitoring

o Administration

o Management

o Security

  • Perform resource isolation for simulated multi-tenant environments
  • Explain the steps for configuring monitoring and alert setup including thresholding
  • Build a Vblock System Run Book by walking through each of the component management interfaces.
  • Inventory current Vblock system configuration
  • Enact role based security
  • Understand and explore VCE Vision

Course Content

LAB 1. Capturing the Vblock System Configuration Baseline

  • Establish a Vblock System Configuration Baseline
  • UCS Manager GUI: Capture Compute Resource Configuration
  • UCS Manager CLI: Capture Compute Resource Configuration
  • EMC Unisphere for VNX: Capture VNX Storage Configuration Information
  • Navisphere CLI: Capture VNX Storage Configuration using
  • Solutions Enabler CLI: Capture VMAX Storage Configuration (Optional)
  • NX-OS CLI for MDS Switch: Capture Storage Area Network (SAN) Configuration
  • NX-OS CLI for Nexus 5548: Capture Network Configuration
  • vSphere Web Client: Explore vCenter Configuration
  • Collecting Support Information with VCE Vision and vSphere

LAB 2. VCE Vision: Administration

  • VCE Vision Intelligent Operations Utilization
  • Vision System Library Administration

LAB 3. VCE Vision Plug-in for vCenter

  • Install VCE Vision Plug-in for vCenter

LAB 4. Additional UCS Configuration Options

  • Modifying the time zone setting using UCS Manager
  • Adding a network time protocol server using UCS Manager

LAB 5. Monitoring for Component Errors or Failures

  • Vblock System Events
  • Log Browser
  • UCS Fault Detection
  • Storage Alerts

LAB 6. Vblock System Assurance

  • Running Compliance Scans
  • Installing New Certification Matrixes
  • Installing Optional components in a Compliance Scan
  • Installing the latest VMware vSphere ESXi 5.1 patch

LAB 7. Proactive Monitoring

  • Validating SNMP Setting within the UCS
  • Validating SNMP on the MDS switches
  • Validating SNMP on Nexus 5K Switches
  • Validating SNMP on VNX
  • Validating SNMP trap forwarding in EMC Unisphere
  • Configure UCS Threshold Policies
  • Syslog Management
  • Using VCE Vision SNMP in Network Management Systems
  • Testing System Library Configuration

LAB 8. Service Profile Templates and Service Profiles

  • Modifying an Initial Service Profile Template
  • Modifying the Service Profile by Bind to an Initial Service Profile Template
  • Cloning a Service Profile to an Updating Service Profile Template
  • Modifying an Updating Service Profile Template and the Bound Service Profile

LAB 9. UCS Manager: Expanding Address and ID Pools

  • UUID Pool
  • Expand MAC Address Pool
  • Expand WWNN Address Pools
  • Expand the WWPN Pool

LAB 10. Managing Boot Devices and Paths

  • MDS NX-OS CLI: WWPN Verification
  • UCS Manager: New Boot Policy (VNX)
  • Unisphere for VNX: Connecting to VNX Storage – New Initiators
  • Unisphere for VNX: Connecting to VNX Storage – Storage Groups
  • Unisphere for VNX: Connecting to VNX Storage – Creating a boot LUN

LAB 11. UCS Manager: Create a Service Profile from Scratch

  • Creating a New Service Profile
  • Associate a new service profile
  • Installing ESX-i
  • Restore Original Service Profile

LAB 12. Deploying Virtual Machines

  • Creating a New Datastore
  • Provision an Additional LUN
  • Create a New Data Store
  • Creating a Virtual Machine
  • Creating a New VM in vSphere Web Client
  • Accessing the VM
  • Capacity Management
  • VMware Capacity Monitoring
  • Monitoring Storage
  • Monitor a Storage Pool
  • Monitoring a RAID group
  • Capacity Expansion
  • Expand A Storage Pool
  • Expand an Existing LUN
  • Expand a Data Store
  • Template Creation and Usage
  • Creating a VM Template in vSphere Web Client
  • Creating a VM from a Template
  • Accessing the VM
  • VLAN Creation
  • Add a VLAN on UCS
  • Adding a VLAN to the Cisco Nexus 5000
  • Adding a VLAN to the Cisco Nexus 1000V
  • Adding the VLAN to VMware Virtual Switch
  • Changing the VLAN for the Application VMs

LAB 13. Creating NFS Stores

  • Configuring advanced settings for VMware vSpere ESXi 5.1
  • Configure File System and NFS Exports
  • ESXi NFS Configuration
  • VM Access to the NFS File System
  • Finding the NFS VLAN
  • Adding a New Interface To VNX
  • Create new network in vSphere
  • Create new NIC the Application VM
  • Create The NFS Mount on the VM

LAB 14. Managing CIFS

  • Creating a CIFS Server
  • Create a Volume
  • Creating a File System Pool
  • Creating a CIFS file system
  • Mount a File System on the CIFS Server in VNX
  • Test the CIFS File System on your Management Workstation
  • Mount CIFS on VM

LAB 15. Protecting Vblock System Metadata

  • VCE Vision Configuration Backup
  • VCE Vision Configuration Restoration
  • VCE Vision Interface to Vblock System Configuration
  • Backup of UCS Manager
  • Backup of the Nexus 5k Switch
  • Backup of the MDS Switch

LAB 16. Protecting Vblock System Production Data

  • Protection in Unisphere

LAB 17. Securing the Vblock System

  • Security
  • vCenter Password Retention
  • VCE Vision Appliance and Central Authorization
  • Adjusting Syslog maximum log file size
  • Securing a New VLANs with Roles
  • Creating a QoS Policy on the Nexus 1000v

LAB 18. Trusted Multi-tenant in a Vblock System

  • Trusted Multi-Tenancy
  • Create Admin Account
  • Create Sub-Organization
  • Segregated Storage
  • Create a Segregated Storage Pool on EMC VNX
  • Segregate UCS Compute Environment
  • Segregate vSphere Access

Course Overview

The course prepares students to perform Isilon cluster administration. Topics include the configuration of basic and advanced SmartConnect, SMB and NFS client access; FTP, HTTP configurations; data protection/replication in single and multi-cluster implementations, archive deployment, snapshots and replication, SNMP integration, data protection and caching, analytics and monitoring, auditing and the job engine. This training consists of 8 modules. The total time required to complete this course is approximately 5 days.

Course Objectives

  • Understand the overall Isilon cluster architecture
  • Explain the cluster layout and different types of access
  • Navigate the details of file access
  • Configure cluster features
  • Utilize the tools to perform cluster monitoring

Course Content

  • Isilon architecture overview
  • Isilon cluster architecture
  • Hardware nodes
  • Data protection
  • Storage types
  • Management access
  • RBAC
  • Data layout and protection
  • Protection and overhead
  • Sub pools, data layout, and actual protection
  • Caching
  • Network configuration
  • Access to the cluster
  • External interface connections
  • SmartConnect
  • Directory service integration
  • Access zones
  • File access
  • Identity management
  • Access utilizing multiple protocols
  • Permissions
  • Configuring shares and exports
  • Alternative platform access
  • Storage management
  • Node pools and tiers
  • Smartpools and file pools
  • SmartQuotas
  • SnapShotIQ
  • SyncIQ
  • Deduplication
  • SmartLock
  • Application Integration
  • Hadoop and HDFS
  • NDMP and backup
  • Auditing
  • Monitoring
  • Installing InsightIQ
  • Using InsightIQ and FSA
  • ESRS
  • Job Engine
  • Job engine architecture
  • Built-in jobs
  • Data integrity safeguards
  • Jobs and job management

Course Overview

This course provides practical foundation level training that enables immediate and effective participation in big data and other analytics projects. It includes an introduction to big data and the Data Analytics Lifecycle to address business challenges that leverage big data. The course provides grounding in basic and advanced analytic methods and an introduction to big data analytics technology and tools, including MapReduce and Hadoop. Labs offer opportunities for students to understand how these methods and tools may be applied to real-world business challenges as a practicing data scientist. The course takes an “Open”, or technology-neutral approach, and includes a final lab in which students address a big data analytics challenge by applying the concepts taught in the course in the context of the Data Analytics Lifecycle. The course prepares the student for the Proven™ Professional Data Scientist Associate (EMCDSA) certification exam.

Course Objectives

  • Immediately participate and contribute as a Data Science Team Member on big data and other analytics projects by:
  • Deploying the Data Analytics Lifecycle to address big data analytics projects
  • Reframing a business challenge as an analytics challenge
  • Applying appropriate analytic techniques and tools to analyze big data, create statistical models, and identify insights that can lead to actionable results
  • Selecting appropriate data visualizations to clearly communicate analytic insights to business sponsors and analytic audiences
  • Using tools such as: R and RStudio, MapReduce/Hadoop, in-database analytics, Window and MADlib functions
  • Explain how advanced analytics can be leveraged to create competitive advantage and how the data scientist role and skills differ from those of a traditional business intelligence analyst

Course Content

  • Introduction and Course Agenda
  • Introduction to Big Data Analytics
  • Big Data Overview
  • State of the Practice in Analytics
  • The Data Scientist
  • Big Data Analytics in Industry Verticals
  • Data Analytics Lifecycle
  • Discovery
  • Data Preparation
  • Model Planning
  • Model Building
  • Communicating Results
  • Operationalizing
  • Review of Basic Data Analytic Methods Using R
  • Using R to Look at Data – Introduction to R
  • Analyzing and Exploring the Data
  • Statistics for Model Building and Evaluation
  • Advanced Analytics – Theory And Methods
  • K Means Clustering
  • Association Rules
  • Linear Regression
  • Logistic Regression
  • Naïve Bayesian Classifier
  • Decision Trees
  • Time Series Analysis
  • Text Analysis
  • Advanced Analytics – Technologies and Tools
  • Analytics for Unstructured Data – MapReduce and Hadoop
  • The Hadoop Ecosystem
  • In-database Analytics – SQL Essentials
  • Advanced SQL and MADlib for In-database Analytics
  • The Endgame, or Putting it All Together
  • Operationalizing an Analytics Project
  • Creating the Final Deliverables
  • Data Visualization Techniques
  • Final Lab Exercise on Big Data Analytics

Course Overview

This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure.

Course Objectives

Designing and Implementing Microsoft Azure Networking Solutions

Course Content

AZ-700 Designing and Implementing Microsoft Azure Networking Solutions

  • Introduction to Azure Virtual Networks
  • Design and implement hybrid networking
  • Design and implement Azure ExpressRoute
  • Load balance non-HTTP(S) traffic in Azure
  • Load balance HTTP(S) traffic in Azure
  • Design and implement network security
  • Design and implement private access to Azure Services
  • Design and implement network monitoring

Course Overview

The Designing and Implementing Enterprise Network Assurance training is designed to enrich and expand your knowledge and skills in the realm of enterprise network assurance and management. This training is structured into four different tracks, collectively encompassing a broad spectrum of network assurance and monitoring aspects. As a participant, you will first overview different Cisco assurance products, followed by two tracks focused on Cisco ThousandEyes solution, and one dedicated to Meraki Insight. You will acquire the skills not just to utilize these solutions effectively, but also to deploy, configure, and manage them in your network environments. This includes learning about the initial setup, fine-tuning for optimal performance, and conducting day-to-day (Day 2) operations that ensure continuous, seamless network assurance.

Course Objectives

After completing this course you should be able to:

  • Examine Cisco ThousandEyes solution and its high-level use cases 
  • Learn to effectively use Cisco Catalyst Center Assurance for at-a-glance health monitoring, metrics calculation, and data analysis, covering overall network, device, client, service, and application health 
  • Gain valuable insights for troubleshooting and issue resolution, ensuring a reliable user experience in your network environment 
  • Gain an introductory understanding of Cisco AppDynamics, Cisco Catalyst Software-Defined Wide Area Network (SD-WAN) Assurance, and Cisco ThousandEyes 

Course Content

Enterprise Network Assurance Overview

  • Modern Network Challenges
  • Network Visability in the Past
  • Active and Passive Monitoring
  • Modern IT Visibility Architecture
  • Use Cases
  • Cisco Enterprise Assurance Portfolio 

Introduction to Cisco Catalyst Center Assurance

  • Cisco Catalyst Center Assurance Overview
  • Cisco Catalyst Center Assurance Health Scores
  • Cisco Catalyst Center Assurance Dashboard Time Ranges Concepts
  • Network Device Health and Device 360 View
  • Client Health and Client 360 View
  • Application Health and Application 360 View
  • Issues Operations

Introduction to Cisco AppDynamics

  • Cisco AppDynamics Introduction
  • Monitor Applications with Cisco AppDynamics
  • Business Analytics and Custom Dashboards
  • Troubleshoot Performance Problems with Cisco AppDynamics

Introduction to Cisco Catalyst SD-WAN Assurance

  • Cisco Catalyst SD-WAN
  • Cisco Catalyst SD-WAN Monitoring
  • Cisco Catalyst SD-WAN Troubleshooting
  • Cisco Catalyst SD-WAN Analytics Overview

Introduction to Cisco ThousandEyes

  • Cisco ThousandEyes Visibility
  • How Cisco ThousandEyes Does It
  • Cisco ThousandEyes Cloud Agents
  • Cisco ThousandEyes Enterprise Agents
  • Cisco ThousandEyes EndPoint Agents
  • Cisco ThousandEyes Tests
  • Agent Test Capabilities
  • Agent Locations

Enterprise Agents Deployment

  • Enterprise Agent Operation
  • Enterprise Agent Firewall Requirements
  • Enterprise Agent Network Utilization
  • Enterprise Agent Deployment Options
  • Enterprise Agent on Cisco Platforms
  • Virtual Appliance Setup
  • Custom Virtual Appliance
  • Embedded Enterprise Agent CLI Deployment
  • Enterprise Agent Deployment with Cisco Catalyst Center
  • Enterprise Agent Deployment with Cisco Catalyst SD-WAN Manager
  • Enterprise Agent Deployment with Meraki Dashboard
  • Enterprise Agent Deployment in Proxy Environemnts
  • Agent Labels
  • Enterprise Agent Utilization
  • Enterprise Agent Clusters

BGP, Network, DNS, and Voice Tests Configuration

  • Routing BGP Test
  • BGP Test – Configuration
  • Network Test
  • Agent-to-Server Network Test – Data Collection
  • Network Test – Path Visualization View
  • Agent-to-Server Network Test – Configuration
  • DNS Tests
  • DNS Tests – Metrics
  • DNS Tests – Configuration
  • Voice Tests
  • Voice Tests – Metrics
  • Voice Tests – Configuration 

Web Tests Configuration

  • Web Layer Tests
  • HTTP Server Test – Metrics
  • HTTP Server Test – Configuration
  • Page Load Test – Configuration
  • Web Authentication Methods
  • Transaction Test – Metrics
  • Transaction Test – Configuration
  • Transaction Test – Cisco ThousandEyes Recorder
  • Web Layer Tests – Proxy Metrics

Endpoint Agent

  • Endpoint Agent Overview
  • Endpoint Agent Use Cases
  • Collected Data
  • System Requirements and Installation
  • Agent Settings
  • Monitoring Settings
  • Endpoint Agent Views

System Administration

  • Role-Based Access Control
  • Account Groups
  • User Account Settings
  • Organization Settings
  • Time Zone Settings
  • Activity Log
  • Cisco ThousandEyes Billing
  • Unit Calculator 

Network Troubleshooting with Cisco ThousandEyes

  • Troubleshooting Scenario A
  • Troubleshooting Analysis – Scenario A
  • Troubleshooting Scenario B
  • Troubleshooting Analysis – Scenario B
  • Troubleshooting Scenario C
  • Troubleshooting Analysis – Scenario C
  • Troubleshooting Scenario D
  • Troubleshooting Analysis – Scenario D
  • Share Links and Saved Events
  • Multi-Service Views

Internet Insights

  • Challenges with Internet Monitoring
  • Internet Insights Overview
  • Internet Insights Packages
  • Internet Insights Dashboard and Views

Alerts and Dashboards Configuration

  • Alerts Overview
  • Alert Rule Configuration
  • Dynamic Baselines
  • Alert Views
  • Alert Suppression Window
  • Enterprise Agent Notifications
  • Notification Triggers
  • Data Retention
  • Dashboards
  • Dashboard Snapshots
  • Baseline Metrics
  • Data Aggregation
  • Widget Configuration
  • Dashboard Examples
  • Integrations and Data Export

Monitoring Solutions

  • Monitoring Cisco Webex Meetings
  • Monitoring Microsoft 365
  • Monitoring Microsoft Teams
  • Monitoring Cisco SD-WAN
  • WAN Insights

Cisco Meraki Network Assurance

  • Wireless Health
  •  Switch Traffic Analysis
  • Cisco Meraki SD-WAN Monitoring
  • Security Center
  • Logging Capabilities
  • Supported Alerts

Cisco Meraki Insights

  • Cisco Meraki Insight Overview
  • Web Application Health
  • Web Application Health Configuration
  • WAN Health
  • VoIP Health
  • VoIP Health Configuration
  • Alert Management
  • Internet Outages
  • Cisco Meraki Insight Licensing

Labs:

  • Discovery Lab 1: Troubleshoot the Health of Network Devices
  • Discovery Lab 2: Explore Cisco Catalyst Assurance 
  • Discovery Lab 3: Schedule a Test 
  • Discovery Lab 4: Deploy Enterprise Agent 
  • Discovery Lab 5: Configure Network, DNS, and Voice Tests 
  • Discovery Lab 6: Configure Web Tests 
  • Discovery Lab 7: Deploy and Configure an Endpoint Agent 
  • Discovery Lab 8: Configure Account Administration 
  • Discovery Lab 9: Examine Internet Insights 
  • Discovery Lab 10: Configure Alerts 
  • Discovery Lab 11: Build a Dashboard 
  • Discovery Lab 12: Enable Alerts and Configure Monitoring and Reporting 
  • Discovery Lab 13: Examine Cisco Meraki Insights