Course Overview

DCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 3-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS) X-Series, B-Series, C-Series, next-gen UCS servers including using Cisco Intersight SaaS for UCS management. This custom-built Cisco UCS training class was developed using the best lessons from all available Cisco server courses to maximize the learning experience for individuals who want to focus on day-to-day administration using Intersight SaaS as the primary interface to manage UCS Infrastructure.

Using real-world scenarios and examples, this Cisco training course will explore the components of the UCS B-Series Blades, C-Series Rack Mount, and cover next-gen solutions such as C4500 and X-Series. Intersight SaaS provides a day-to-day administrative single interface for managing UCS infrastructure. Learn to access Intersight, claim devices, run UCSM commands from Intersight, Firmware Upgrades, and other functions.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

After completing this course you should be able to:

  • Understand the B-Series and C-Series product line similarities and differences
  • Claiming resources in Intersight
  • Managing UCS domains in Intersight
  • Describe the Intersight support for C-Series standalone and UCS managed architectures
  • Understand the process for upgrading B-Series and C-Series Firmware with Intersight
  • Administering service profiles, pools, and policies with Intersight running UCS natively
  • Understanding RBAC with Active Directory integration
  • Administering backup and restores in UCS Manager
  • Learn and discuss the various management tools for Cisco UCS including Intersight
  • Perform basic troubleshooting of B-Series and C-Series in normal operations with UCSM and Intersight
  • Describe how to get started with Intersight programmability

Course Content

UCS Infrastructure Components with Intersight

  • Cisco UCS X-Series, Use Cases, and Components
  • Introducing Cisco Intersight Managed Mode
  • Describing Cisco UCS C-Series Servers
  • Describing Next Gen Cisco X-Series Servers
  • Gen 4 and future deployments
  • Integrating with earlier Generations
  • UCS Central use cases with Intersight

Administering Cisco UCS with Intersight

  • Managed Mode Resources Pools
  • Configuring Compute Node LAN Connectivity
  • Configuring Compute Node SAN Connectivity
  • Managed Mode Network Policies
  • Managed Mode Storage Policies
  • Creating Identity and Resource Pools
  • Creating Server Profiles
  • Creating Server Profile Templates and Deriving Server Profiles
  • Managing Server Profiles
  • Installing OS onto blades
  • Troubleshooting Cisco UCS X/B/C-Series Configuration
  • Troubleshooting Cisco UCS X/B/C-Series Operation
  • Managing and Upgrading Cisco UCS X/B/C-Series Firmware

Administering UCS Management Tools with Intersight

  • Describing Cisco UCS User Interfaces
  • Exploring Intersight User Interfaces
  • Describing Cisco UCS Management Framework & Features
  • Describing Cisco UCS Hyperflex
  • Describing Intersight Services for Terraform
  • Describing Intersight Orchestrator

Labs

  • Connecting to the Lab Environment
  • Explore the Cisco UCS GUI and CLI Environment
  • Explore the Cisco Intersight Dashboard and claim devices
  • Create Users, Groups, Roles and Organizations in Intersight
  • IMM Mode Fabric build
  • IMM Mode Create Network and Storage Policies
  • Create IMM mode Resource Pools
  • Create X Series Server Profiles
  • Derive X Series Server Profiles
  • Using Intersight to upgrade Firmware
  • Install an OS from Intersight repository
  • Add ESX host to vCenter
  • Deploy VMs from Intersight Services for Terraform

Course Overview

This 2-part deep-dive training covers Cisco UCS X-Series server family and how Intersight can be the enablement platform for all UCS servers. We will cover Intersight features such as IWOM, IST, ICO, and programmability either On-Prem or in the Cloud. Attendees will learn the breadth of the physical X-Series (pools, policies, firmware, so much more) platform as well as maintaining existing infrastructure with Intersight Infrastructures Services. Also covered is how to manage physical, virtual, cloud platforms and deploy to any or all.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

Upon completing this course, the learner will be able to meet these overall objectives:

  • Understand, describe, and configure Cisco Intersight (on prem and SaaS models)
  • Understand, describe, and configure Intersight Advanced features (IST, ICO, IWOM)
  • Understand, describe, and configure IMM and UMM mode for UCS
  • Understand, describe, and configure Cisco X-Series (FI, IFM, X210c Server, Adv Fabric Module)
  • Create Intersight Pools, Policies, and Management for X-Series
  • Design and operate Cisco UCS with Intersight Managed Mode Solutions

Course Content

Section 1: Intersight Foundations

  • Intersight Architecture
  • Licensing
    • Essentials
    • Advantage
    • Premier
  • Security
  • Role-Based Access Control (RBAC)
  • Administration
  • Dashboards Management
  • Create and Manage Widgets
  • Intersight Managed Mode vs. UCS Managed Mode

Section 2: Monitoring and Maintaining UCS Infrastructure with Intersight

  • Device health and Monitoring
  • Virtualization Monitoring
  • Integrated Support
  • Infrastructure Configuration
  • Server Deployment
  • Standalone C-Series Management

Section 3: Designing and Operationalizing Cisco UCS Solutions with Intersight

  • Hyperconvergence Overview
  • Cisco HyperFlex HX-Series Servers
  • Designing Intersight Deployment Options
  • Configuring Intersight Managed Mode

Section 4: Configuring Cisco UCS Server Hardware

  • Cisco UCS X-Series Blade Servers
  • Cisco UCS B-Series Blade Servers
  • Cisco UCS C-Series Rack Servers
  • Cisco UCS S-Series Rack Servers
  • Cisco Virtual Interface Cards
  • Cisco X-Fabric Modules

Section 5: Designing Cisco UCS LAN and SAN Connectivity

  • Cisco UCS Fabric Interconnects
  • Cisco UCS Fabric Interconnect Ethernet End-Host Mode Compared to Switching Mode
  • Cisco UCS Fabric Interconnect Uplink Pinning
  • Cisco UCS X-Series Connectivity

Section 6: Configuring Cisco UCS-X in IMM Mode

  • Fabric Interconnect Domain Profiles and Policies
  • Chassis Policies
  • Cisco UCS Server Profiles
  • Identity Pools
  • Server Pools
  • IP Pools
  • Intersight Provisioning Policies
    • Server Policies
    • Domain Policies
    • Cluster Policies
  • Configuring Cisco UCS Server Profile Templates
  • Deriving Profiles to Blades
  • Deploying ESX to a Blade using Intersight
  • Managing vCenter in Intersight

Section 7: Implementing Cisco UCS Firmware Updates

  • Update X-Series Firmware with Intersight
  • Update Cisco UCS C-Series Server Firmware
  • Download Tasks for the Infrastructure Image
  • Download Tasks for Cisco UCS B-Series Firmware Packages
  • Best Practices for Updating Firmware in Cisco UCS Manager
  • Firmware Upgrades Using Auto Install
  • Capability Catalog Updates
  • Host Firmware Packages
  • Driver Updates for Operating Systems and Hypervisors

Section 8: IWO (Intersight Workload Optimizer)

  • Overview
  • App/Infrastructure Dependencies
  • Analytics
  • Full Stack Automation
  • Ecosystem (AppD, SolarWinds, etc)
  • Application Resource and Performance Management

Section 9: IKS (Intersight Kubernetes Services)

  • Overview K8s
  • App and Infrastructure integration
  • Creating a Profile
  • Out of Box Container Interfaces
    • Networking
    • Storage
    • Load Balancing
  • Managing K8s Clusters
  • IWE

Section 10: ICO (Intersight Cloud Orchestrator)

  • Overview
  • Tasks
  • Workflows
  • Customized Workflows
  • Deploying Virtual Infrastructure
  • Deploying Physical Infrastructure
  • Managing Infrastructure

Section 11: IST (Intersight Services for Terraform)

  • Overview
  • Connecting to Git
  • Deploying the IST Agent to Intersight
  • Creating an Agent Pool
  • Setting Variables
  • Deploying a Run from ICO
  • Deleting a Run from ICO

Section 12: Intersight API Overview

  • Architecture of API
  • Access methods
  • Request Semantics
  • Management Information Model
  • Querying the API
  • Performing Tasks

Lab Outline:

Labs are designed to assure learners a whole practical experience, through the following practical activities.

Part I:

  • Explore Cisco Intersight
  • Configure UCS-X in IMM Mode
  • Configure NTP, LAN, SAN, Server Policies in IMM Mode
  • Configure Intersight Identity Pools
  • Configure a Cisco UCS Server Profile Using Pools
  • Configure a Server Profile Template
  • Build an ESXi Host in X-Series
  • Optional: Convert a UMM domain to IMM Domain

Part 2:

  • Exploring IWOM
  • Deploy an on-prem K8s with IKS
  • Deploy a workload using Intersight Cloud Orchestrator
  • Deploy a workload using IST to UCS-X
  • API Crawl Lab
  • API Walk Lab
  • API Run La

Course Overview

In this course, you learn about the IBM Verify Access access control mechanisms, Reverse Proxy junctions, authentication methods, as well as logging, auditing, and troubleshooting. 

You gain skills around how to implement the variety of Verify Access Reverse Proxy junctions, including the configuration of authentication and authorization processes.

This course also provides a solid foundation around setting up logging and auditing, preparing you to successfully manage troubleshooting scenarios.

Course Objectives

In this course, you learn about the following foundational capabilities:

  • Explain the object space and the protected objects concept
  • Describe how to control access to the protected objects by using Access Control List (ACL) policies, Protected Object Policies (POP), and Authorization rules
  • Understand the concept of context-based access
  • Describe the Reverse Proxy junctions
  • Explain the basic concepts of Verify Access authentication
  • Describe the core set of authentication methods that are supported by the Reverse Proxy
  • Discuss supplemental post-authentication processes
  • Describe the Verify Access logging framework in a containerized deployment
  • Describe Verify Access auditing capabilities
  • Explain how to troubleshoot the deployment

Course Content

  • Managing access control
  • Explain the object space and the protected objects concept
  • Control access to the protected objects by using Access Control List (ACL) policies
  • Describe and configure Protected Object Policies (POP)- Describe and configure Authorization rules
  • Reverse Proxy junctions- Describe and configure standard junctions
  • Provide an overview of the URL modification methods supported by the Reverse Proxy
  • Describe and configure virtual host junctions
  • Authentication framework and methods- Explain the basic concepts of Verify Access authentication
  • Describe the core set of authentication methods that are supported by the Reverse Proxy
  • Discuss supplemental post-authentication processes
  • Describe the password processing policy options available during the Reverse Proxy authentication
  • Logging, auditing, and troubleshooting
  • Describe the Verify Access logging framework (containerized deployment)
  • Describe Verify Access auditing capabilities
  • Explain how to troubleshoot the deployment and collect the support files for problem determination

Course Overview

In this course, you learn about the IBM Security® Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions. You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine.

First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you set up the WebSEAL reverse proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions. You also learn about other administration tasks.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

In this course, you learn to do the following tasks:

  • Explain the business context for identity and access management as well as the features and functions of IBM Security Verify Access
  • Describe the component architecture
  • Explain the deployment options
  • Install and configure Verify Access in a containerized environment
  • Understand the differences between a virtual machine or containerized deployment
  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains
  • Explain the reverse proxy concepts and capabilities:

– Understand the concept and capabilities

– Describe the authentication and authorization processes

– Explain the protected object space and how to use junctions

– Learn about administrative tasks

Course Content

IBM Security Verify Access introduction

  • Understand the business context for identity and access management
  • Discuss the features and functions of IBM Security Verify Access

Architecture and deployment

  • Describe the components
  • Understand the deployment options
  • Install and configure Verify Access in a containerized environment
  • Understand the differences between a virtual machine or containerized deployment

User, group, and domain configuration

  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains

Reverse proxy concepts

  • Understand the concept and capabilities
  • Describe the authentication and authorization processes
  • Explain the protected object space and how to use junctions
  • Learn about administrative tasks

Course Overview

In this course, you learn about the IBM Verify Access architecture and deployment options and how to position the product within your organization’s landscape of security solutions.

You gain skills around how to deploy Verify Access in a containerized environment or on a virtual machine. First, you improve your Verify Access administration skills by managing users, groups, and domains. Then, you are setting up the Reverse Proxy, including the configuration of authentication and authorization processes, protecting the object space with junctions.

This course also provides a solid foundation around setting up logging and auditing, preparing you to successfully manage troubleshooting scenarios.

Course Objectives

In this course, you learn to do the following tasks:

  • Explain the business context for access management as well as the features and functions of Verify Access
  • Describe the component architecture
  • Explain the deployment options
  • Install and configure Verify Access in a containerized environment
  • Understand the differences between a virtual machine or containerized deployment
  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains
  • Explain the Reverse Proxy concepts and capabilities:
  • Describe how to control access to the protected objects by using Access Control List (ACL) policies, Protected Object Policies (POP), and Authorization rules
  • Understand the concept of context-based access
  • Describe the Reverse Proxy junctions
  • Explain the basic concepts of Verify Access authentication
  • Describe the core set of authentication methods that are supported by the Reverse Proxy
  • Discuss supplemental post-authentication processes
  • Describe the Verify Access logging framework in a containerized deployment
  • Describe Verify Access auditing capabilities
  • Explain how to troubleshoot the deployment

Course Content

Architecture and deployment

  • Describe the components
  • Understand the deployment options
  • Install and configure Verify Access in a containerized environment
  • Install and configure Verify Access in a containerized environment

User, group, and domain configuration

  • Describe the role of the Verify Access administrator
  • Learn how to manage user, groups, and domains

Reverse proxy concepts

  • Understand the concept and capabilities
  • Describe the authentication and authorization processes
  • Explain the protected object space and how to use junctions- Learn about administrative tasks

Managing access control

  • Explain the object space and the protected objects concept
  • Control access to the protected objects by using Access Control List (ACL) policies
  • Describe and configure Protected Object Policies (POP)
  • Describe and configure Authorization rules

Reverse Proxy junctions

  • Describe and configure standard junctions
  • Provide an overview of the URL modification methods supported by the Reverse Proxy
  • Describe and configure virtual host junctions

Authentication framework and methods

  • Explain the basic concepts of Verify Access authentication
  • Describe the core set of authentication methods that are supported by the Reverse Proxy
  • Discuss supplemental post-authentication processes
  • Describe the password processing policy options available during the Reverse Proxy authentication

Logging, auditing, and troubleshooting

  • Describe the Verify Access logging framework (containerized deployment)
  • Describe Verify Access auditing capabilities
  • Explain how to troubleshoot the deployment and collect the support files for problem determination

Course Overview

The Understanding Cisco Wireless Foundations (WLFNDU) course provides the knowledge and skills needed to configure, manage, and troubleshoot a Cisco wireless LAN (WLAN) network. Topics include understanding critical aspects of RF technology, industry standards for Wi-Fi and security, how to design, install, and configure a WLAN network of any size, as well as using Cisco DNA Center.

This course is worth 30 Continuing Education (CE) credits towards recertification

Course Objectives

After completing this course you should be able to:

  • Describe and implement foundational wireless theory  
  • Describe and implement foundational wireless math and antennas  
  • Describe and implement foundational wireless operation including Wi-Fi 6  
  • Describe security and client access in a wireless network  
  • Implement 802.1X and Extensible Authentication Protocol (EAP) 
  • Implement wireless guest access and configure wireless security  
  • Describe Cisco wireless architecture components and deployment options  
  • Describe Cisco wireless architecture and its deployment modes, the Control and Provisioning of Wireless Access Points (CAPWAP) protocol, and the Cisco WLC and AP line up  
  • Describe the wired support for implementing wireless networks  
  • Deploy Cisco centralized wireless networks using Cisco 9800 WLC  
  • Describe the centralized wireless access model and its configuration  
  • Describe maintenance and troubleshooting in the centralized WLAN model  
  • Describe the management and monitoring of Cisco Wireless Networks with Cisco DNA Center

Course Content

Module 1: RF and WLAN Theory 

Module 2: WLAN Math and Antennas 

Module 3: Wi-Fi Operations 

Module 4: Basic WLAN Security 

Module 5: Advanced WLAN Security 

Module 6: Configuring WLAN Security 

Module 7: Cisco Wireless Network Architecture 

Module 8: Implementing Cisco Wireless Network 

Module 9: Implementing Cisco Wireless Network Wired Support 

Module 10: Deploying Cisco Centralized Wireless Networks 

Module 11: Configuring Cisco Centralized Wireless Networks 

Module 12: Maintaining and Troubleshooting Cisco Wireless Networks 

Module 13: Managing and Monitoring Cisco Wireless Networks with Cisco DNA Center 

Labs

  • Discovery 1: Practice RF Math 
  • Discovery 2: Antenna Calculations 
  • Discovery 3: Explore the Wi-Fi Environment 
  • Discovery 4: Analyze Wireless Frames 
  • Discovery 5: Configure Client Access 
  • Discovery 6: Deploy Cisco 9800 WLC 
  • Discovery 7: Configure Cisco 9800 WLC 
  • Discovery 8: Perform Cisco 9800 WLC Maintenance 

Course Overview

TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. You will learn basic information about security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data used to investigate security incidents. After completing this course, you will have the basic knowledge required to perform the job role of an associate-level cybersecurity analyst in a threat-centric security operations center to strengthen network protocol, protect your devices and increase operational efficiency. This course prepares you for the Cisco Certified CyberOps Associate certification.

Please note that this course is a combination of Instructor-Led and Self-Paced Study – 5 days in the classroom and approx 1 day of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.

Course Objectives

After completing this course you should be able to:

  • Explain how a SOC operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
  • Explain Network Security Monitoring (NSM) tools that are available to the network security analyst.
  • Explain the data that is available to the network security analyst.
  • Describe the basic concepts and uses of cryptography.
  • Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts.
  • Understand common endpoint security technologies.
  • Understand the kill chain and the diamond models for incident investigations, and the use of exploit kits by threat actors.
  • Identify resources for hunting cyber threats.
  • Explain the need for event data normalization and event correlation.
  • Identify the common attack vectors.
  • Identify malicious activities.
  • Identify patterns of suspicious behaviors.
  • Conduct security incident investigations.
  • Explain the use of a typical playbook in the SOC.
  • Explain the use of SOC metrics to measure the effectiveness of the SOC.
  • Explain the use of a workflow management system and automation to improve the effectiveness of the SOC.
  • Describe a typical incident response plan and the functions of a typical CSIRT.
  • Explain the use of VERIS to document security incidents in a standard format.
  • Describe the Windows operating system features and functionality.
  • Describe the Linux operating system features and functionality

Course Content

Defining the Security Operations Center

Understanding Network Infrastructure and Network Security Monitoring Tools

Exploring Data Type Categories

Understanding Basic Cryptography Concepts

Understanding Common TCP/IP Attacks

Understanding Endpoint Security Technologies

Understanding Incident Analysis in a Threat-Centric SOC

Identifying Resources for Hunting Cyber Threats

Understanding Event Correlation and Normalization

Identifying Common Attack Vectors

Identifying Malicious Activity

Identifying Patterns of Suspicious Behavior

Conducting Security Incident Investigations

Using a Playbook Model to Organize Security Monitoring

Understanding SOC Metrics

Understanding SOC Workflow and Automation

Describing Incident Response

Understanding the Use of VERIS

Understanding Windows Operating System Basics

Understanding Linux Operating System Basics

Labs

  • Configure the Initial Collaboration Lab Environment
  • Use NSM Tools to Analyze Data Categories
  • Explore Cryptographic Technologies
  • Explore TCP/IP Attacks
  • Explore Endpoint Security
  • Investigate Hacker Methodology
  • Hunt Malicious Traffic
  • Correlate Event Logs, PCAPs, and Alerts of an Attack
  • Investigate Browser-Based Attacks
  • Analyze Suspicious DNS Activity
  • Explore Security Data for Analysis
  • Investigate Suspicious Activity Using Security Onion
  • Investigate Advanced Persistent Threats
  • Explore SOC Playbooks
  • Explore the Windows Operating System
  • Explore the Linux Operating System

Course Overview

This 2-day course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. 

The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. 

The course includes lecture, hands-on labs, interactive demonstrations, and discussions.

Course Topics

• Configuration Project

• Troubleshooting Methodology

• F5 Support

• Troubleshooting – Bottom to Top

• Troubleshooting Tools

• Using System Logs

Course Objectives

At the end of this course, the student will be able to: 

• Describe the role of the BIG-IP system as a full proxy device in an application delivery network

• Set up, start/restart/stop, license, and provision the BIG-IP system

• Create a basic network configuration on the BIG-IP system including VLANs and self IPs

• Use the Configuration utility and TMOS Shell (tmsh) to manage BIG-IP resources and use as a resource when troubleshooting

• Create, restore from, and manage BIG-IP archives

• Understand and implement troubleshooting methodology to find and resolve issues

• View resource status, availability, and statistical information and use this information to determine how the BIG-IP system is currently processing traffic

• Use iApps to update BIG-IP configuration

• Perform troubleshooting and problem determination activities including using the iHealth diagnostic tool, researching known issues and solutions on AskF5, submitting a problem ticket to F5 Technical Support, and view traffic flow using tcpdump

• Understand the tools (ping, netstat, tcpdump, ssldump, WireShark, diff, Kdiff3, Fiddler, BIG-IP logs, etc.) available to use to identify BIG-IP and network issues from bottom to top

• List log files available, understand log levels, and use the appropriate files, log levels, and filters for troubleshooting

• Use High Speed Logging (HSL) and SNMP trap implementations to perform troubleshooting and problem determination activities

• Describe the role of iRules in affecting traffic behavior and how to use them to aid with troubleshooting and problem determination

Course Content

Chapter 1: Setting Up the BIG-IP System

• Introducing the BIG-IP System

• Initially Setting Up the BIG-IP System

• Archiving the BIG-IP System Configuration

Chapter 2: Reviewing Local Traffic Configuration

• Reviewing Nodes, Pools, and Virtual Servers

• Reviewing Address Translation

• Reviewing Routing Assumptions

• Reviewing Application Health Monitoring

• Reviewing Traffic Behavior Modification with Profiles

• Reviewing the TMOS Shell (TMSH)

• Reviewing Managing BIG-IP Configuration Data

• Reviewing High Availability (HA)

Chapter 3: Troubleshooting Methodology

• Step-By-Step Process

• Documenting a Problem

• Putting Troubleshooting Steps to Use

Chapter 4: Working with F5 Support

• Leveraging F5 Support Resources

• Leveraging F5 Labs

• Working with F5 Technical Support

• Running End User Diagnostics (EUD) – Hardware Only

• New Platform Diagnostic Tools

• Always-On Management (AOM) Subsystem

• Requesting Return Materials Authorization

• F5’s Software Version Policy

• Managing the BIG-IP License for Upgrades

• Managing BIG-IP Disk Space

• Upgrading BIG-IP Software

Chapter 5: Troubleshooting – Bottom to Top

• Introducing Differences between BIG-IP and LINUX Tools

• Troubleshooting with Layer 1/Layer 2 Tools

• Troubleshooting with Layer 2/Layer 3 Tools

• Troubleshooting with Layer 3 Tools

• Troubleshooting Network Communication

• Troubleshooting Memory and CPU

• Troubleshooting with watch

• Troubleshooting with Additional tmsh commands

Chapter 6: Troubleshooting Tools

• tcpdump

• Wireshark

• SSL/TLS

• Fiddler

• diff

• KDiff3

• cURL

Chapter 7: Using System Logs

• Configuring Logging

• Log Files

• Understanding BIG-IP Daemons Functions

• Triggering an iRule

• Deploying and Testing iRules

• Application Visibility and Reporting

Chapter 8: Troubleshooting Lab Projects

• Network Configurations for Project

Chapter 9: Additional Training and Certification

• Getting Started Series Web-Based Training

• F5 Instructor Led Training Curriculum

• F5 Professional Certification Program

Course Changes since v15

The Troubleshooting BIG-IP v16.1 course presents much of the same content as v15.1 with minor modifications to improve flow. Password length is 8 digits.

Course Overview

Learn the details of Vulnerability Response in ServiceNow.

This two-day course covers Vulnerability Response essentials such as why customers need Vulnerability Response, what Vulnerability Response is, and how to properly implement Vulnerability Response.

Participants will learn the common technical aspects of a Vulnerability Response implementation as well as experience various processes to effectively manage a Vulnerability Response implementation. Additionally, participants will learn tactical skills and strategies that will better prepare them to implement Vulnerability Response in a scalable, repeatable, and efficient manner.

Topics include: Vulnerability Response Overview, Getting Data into Vulnerability Response, Tools to Manage Vulnerability Response Data, Automating Vulnerability Response, Vulnerability Response Data Visualization, Vulnerability Response Delta for the Paris Release, Capstone Project for Vulnerability Response Implementation

These objectives are achieved through a combination of demos, lecture, and group discussions. Lab exercises woven throughout the class walk you through how to effectively implement Vulnerability Response.

Course Objectives

After you complete this course you will be able to:

  • Prepare to Implement Vulnerability Response
  • Configure NVD Auto-Updates
  • Perform a full Qualys Integration
  • Preview Rapid7 and Tenable Integrations
  • Configure Vulnerability Groups
  • Configure Criticality Calculator Groups
  • Perform Vulnerability Remediation Task Assignments
  • Design a Severe Vulnerability Workflow
  • Work with Vulnerability Dashboards and Reports

Course Content


Vulnerability Response Overview

  • Define ServiceNow Security Operations
  • Discuss Vulnerability Response
  • Examine Vulnerability Response within the ServiceNow Platform
  • Lab 1.2 Exploring Vulnerability Response
  • Lab 1.3 Preparing to Implement Vulnerability Response

Getting Data Into Vulnerability Response

  • Definition of Vulnerabilities and Vulnerable Items
  • Integrate Vulnerability Response with Vulnerability Scanners and Other Data Sources
  • Scanner Integration and CMDB Reconciliation
  • Lab 2.1 Configure NVD Auto-Update
  • Lab 2.2 Full Qualys Integration and Store Preview

Tools to Manage Vulnerability Response

  • Configure Vulnerability Groups for Easier Management
  • Employ Tasking for Vulnerability Remediation
  • Lab 3.1 Configure Vulnerability Groups
  • Lab 3.2 Configure Vulnerability Calculator Groups
  • Lab 3.3 Vulnerability Remediation Task Assignment

Automating Vulnerability Response

  • Demonstrate how to handle Vulnerability Exceptions
  • Construct Workflows for Process Automation
  • Lab 4.1 Configure Vulnerability Exception Workflow

Vulnerability Response Data Visualization

  • Demonstrate Data Visualization through Dashboards and Reporting
  • Discuss Performance Analytics
  • Lab 5.1 Dashboards and Reports

Vulnerability Response Paris Delta

  • Discuss the new features in the Paris release
  • Define the changed features in the Paris release

Vulnerability Response Implementation Capstone Project

  • In order to reinforce the various topics presented in the Vulnerability Response Implementation course, the final course component is a take-home five task capstone project

Course Overview

Learn how to effectively manage a Vendor Risk Management Implementation.

This two-day course covers the domain knowledge, common implementation technical  aspects, and various processes needed to effectively manage a Vendor Risk Management (VRM) implementation.

Attendees will learn and practice various tactical skills and strategies that will better prepare them to implement VRM. Through lectures, group discussion, hands-on labs and demonstrations, participants build on existing knowledge and skills by applying implementation best practices.

Topics include: Vendor Risk Management Review,  Core Configuration, Assessment Configuration, Vendor Risk Issues and Processes, Vendor Portal Configuration, Application Relationships, Dashboards and Reports

Course Objectives

After you complete this course you will be able to:

  • Define key concepts and roles related to Vendor Risk Management in ServiceNow and navigate the Vendor Risk Management application components
  • Configure vendor portfolio data and vendor process workflows
  • Develop Questionnaire Templates, Document Request Templates, and Assessment Templates, which are used to create vendor risk assessments
  • Access the Vendor Assessment Portal, manage vendor contacts, complete assessments, and interact with the Vendor Risk team
  • Create and manage Vendor Risk Assessment related issues and remediation
  • Translate assessment responses into Risk and Control Compliance using existing GRC applications
  • Analyze baseline VRM reports and dashboards
  • Examine solution features and implementation considerations
  • Discuss supported integrations and share best practices

Course Content

Vendor Risk Management Review

  • About VRM
  • VRM Process
  • Technical Details
  • Lab 1.1 Preparing to Implement ServiceNow Vendor Risk Management

Core Configuration

  • Vendor Portfolio Configuration
  • Lab 2.1 Vendor Setup
  • Vendor Contacts Configuration
  • Lab 2.2 Populate Vendor Contacts
  • Vendor Tiering Configuration
  • Lab 2.3 Vendor Tiering
  • Vendor Security Scoring Configuration
  • Lab 2.4 Vendor Hierarchy and Engagements

Assessment Configuration

  • Assessment Basics
  • Vendor Assessment Configuration
  • Vendor Risk Assessment Generation
  • Lab 3.1 Vendor Risk Assessment Templates
  • Lab 3.2 [CHALLENGE] Data Privacy Assessment
  • Vendor Risk Assessment Calculations
  • Vendor Risk Assessment Lifecyle
  • Lab 3.3 Vendor Risk Assessments

Risk Issues and Processes

  • Vendor Risk Issue Configuration
  • Lab 4.1 Configure Vendor Risk Issue Approval Workflow
  • Vendor Risk Task Configuration
  • Vendor Risk Process Workflows
  • Lab 4.2 Configure Vendor Assessment Reminders Workflow

Vendor Portal Configuration

  • Contact Configuration
  • Lab 5.1 Working in the Vendor Assessment Portal
  • Vendor Assessment Processing and Configuration
  • Lab 5.2 Vendor Risk Issues
  • Lab 5.3: Vendor Risk Areas and Criteria Affecting Engagements

Application Relationships

  • ServiceNow GRC Overview
  • Monitor Risk and Control Compliance
  • Other Application Relationships
  • Lab 6.1 GRC Integration

Dashboards and Reports