
Opleidingen
58.382
resultaten
Implementing Secure Solutions with Virtual Private Networks (SVPN) - CPLL [SVPN-CPLL]
OVERVIEW
The Implementing Secure Solutions with Virtual Private Networks (SVPN) course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.
This course is worth 40 Continuing Education (CE) Credits
OBJECTIVES
After completing this course you should be able to:
Introduce site-to-site VPN options available on Cisco router and firewalls
Introduce remote access VPN options available on Cisco router and firewalls
Review site-to-site and remote access VPN design options
Review troubleshooting processes for various VPN options available on Cisco router and firewalls
CONTENT
Introducing VPN Technology Fundamentals
Role of VPNs in Network Security
VPNs and Cryptography
Implementing Site-to-Site VPN Solutions
Site-to-Site VPN Solutions Overview
Cisco IOS VPN Point-to-Point Solutions
Cisco ASA VPN Point-to-Point Solutions
Cisco IOS VTI Point-to-Point Solutions
Cisco DMVPN Solutions
Implementing Cisco Internetwork Operating System (Cisco IOS®) Site-to-Site FlexVPN Solutions
Overview of the Cisco FlexVPN Solution
Point-to-Point FlexVPN
Hub-and-Spoke FlexVPN
Spoke-to-Spoke FlexVPN
Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions
Overview of Cisco GET VPN Solution
Configure GET VPN
Implementing Cisco AnyConnect VPNs
Remote Access Overview
Design Remote Access Solutions
Basic Cisco AnyConnect VPN on Cisco ASA
Advanced Cisco AnyConnect TLS VPN on Cisco ASA
Advanced AAA in Cisco AnyConnect VPNs
Cisco AnyConnect IKEv2 VPNs
Implementing Clientless VPNs
Remote Access Overview
Design Remote Access Solutions
Clientless TLS VPN Overview
Basic Cisco AnyConnect TLS VPN on Cisco ASA
Application Access in Cisco ASA Clientless VPN
Advanced AAA in Clientless VPN
Labs
Discovery Lab 1: Explore IPsec Technologies
Discovery Lab 2: Implement and Verify Cisco IOS Point-to-Point VPN
Discovery Lab 3: Implement and Verify Cisco ASA Point-to-Point VPN
Discovery Lab 4: Implement and Verify Cisco IOS VTI VPN
Discovery Lab 5: Implement and Verify DMVPN
Discovery Lab 6: Troubleshoot DMVPN
Discovery Lab 7: Implement and Verify FlexVPN with Smart Defaults
Discovery Lab 8: Implement and Verify Point-to-Point FlexVPN
Discovery Lab 9: Implement and Verify Hub and Spoke FlexVPN
Discovery Lab 10: Implement and Verify Spoke-to-Spoke FlexVPN
Discovery Lab 11: Troubleshoot Cisco IOS FlexVPN
Discovery Lab 12: Implement and Verify AnyConnect TLS VPN on ASA
Discovery Lab 13: Implement and Verify AAA on AnyConnect VPN
Discovery Lab 14: Implement and Verify Clientless VPN on ASA

€455
E-Learning
Securing the Web with Cisco Web Security Appliance - CPLL [SWSA-CPLL]
OVERVIEW
The Securing the Web with Cisco Web Security Appliance (SWSA) course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you’ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution’s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
This course is worth 16 Continuing Education (CE) Credits
OBJECTIVES
After completing this course you should be able to:
Describe Cisco WSA
Deploy proxy services
Utilize authentication
Describe decryption policies to control HTTPS traffic
Understand differentiated traffic access policies and identification profiles
Enforce acceptable use control settings
Defend against malware
Describe data security and data loss prevention
Perform administration and troubleshooting
CONTENT
Cisco WSA Overview
Technology Use Case
Cisco WSA Solution
Cisco WSA Features
Cisco WSA Architecture
Proxy Service
Integrated Layer 4 Traffic Monitor
Data Loss Prevention
Cisco Cognitive Intelligence
Management Tools
Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
Cisco Content Security Management Appliance (SMA)
Proxy Services
Explicit Forward Mode vs.Transparent Mode
Transparent Mode Traffic Redirection
Web Cache Control Protocol
Web Cache Communication Protocol
WCCP Upstream and Downstream Flow
Proxy Bypass
Proxy Caching
Proxy Auto-Config (PAC) Files
FTP Proxy
Socket Secure (SOCKS) Proxy
Proxy Access Log and HTTP Headers
Customizing Error Notifications with End User Notification (EUN) Pages
Cisco WSA Authentication
Authentication Protocols
Authentication Realms
Tracking User Credentials
Explicit (Forward) and Transparent Proxy Mode
Bypassing Authentication with Problematic Agents
Reporting and Authentication
Re-Authentication
FTP Proxy Authentication
Troubleshooting Joining Domains and Test Authentication
Integration with Cisco Identity Services Engine (ISE)
Administration and Troubleshooting
Monitor the Cisco Web Security Appliance
Cisco WSA Reports
Monitoring System Activity Through Logs
System Administration Tasks
Troubleshooting
Command Line Interface
Decryption Policies
Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
Certificate Overview
Overview of HTTPS Decryption Policies
Activating HTTPS Proxy Function
Access Control List (ACL) Tags for HTTPS Inspection
Access Log Examples
Differentiated Traffic Access Policies and Identification Profiles
Overview of Access Policies
Access Policy Groups
Overview of Identification Profiles
Identification Profiles and Authentication
Access Policy and Identification Profiles Processing Order
Other Policy Types
Access Log Examples
ACL Decision Tags and Policy Groups
Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications
Defending Against Malware
Web Reputation Filters
Anti-Malware Scanning
Scanning Outbound Traffic
Anti-Malware and Reputation in Policies
File Reputation Filtering and File Analysis
Cisco Advanced Malware Protection
File Reputation and Analysis Features
Integration with Cisco Cognitive Intelligence
Acceptable Use Control Settings
Controlling Web Usage
URL Filtering
URL Category Solutions
Dynamic Content Analysis Engine
Web Application Visibility and Control
Enforcing Media Bandwidth Limits
Software as a Service (SaaS) Access Control
Filtering Adult Content
Data Security and Data Loss Prevention
Data Security
Cisco Data Security Solution
Data Security Policy Definitions
Data Security Logs
Labs:
Discovery Lab 1: Configure the Cisco Web Security Appliance
Discovery Lab 2: Configure Proxy Authentication
Discovery Lab 3: Configure Reporting Services and Web Tracking
Discovery Lab 4: Configure the Cisco Secure Emial and Web Manager for Tracking and Reporting
Discovery Lab 5: Configure HTTPS Inspection
Discovery Lab 6: Create and Enforce a Time/Date-Based Acceptable Use Policy
Discovery Lab 7: Configure Advanced Malware Protection
Discovery Lab 8: Configure Referrer Header Exceptions
Discovery Lab 9: Utilize Third-Party Security Feeds and MS Office 365 External Feed
Discovery Lab 10: Validate an Intermediate Certificate

€455
E-Learning
Fundamentals of IBM Spectrum Protect [TS101DG]
OVERVIEW
The IBM Spectrum Protect (formerly Tivoli Storage Manager or TSM) suite of products includes the Spectrum Protect Server and many add-on products and components for providing enterprise class data protection and disaster recovery.
In this Fundamentals of Spectrum Protect course we provide a simple, easy-to-understand introduction to many
of the components and technologies associated with Spectrum Protect along with a series of videos to help better understand the content.
OBJECTIVES
After this course participants should be able to:
Understand the core data storage and protection concepts that IBM Spectrum Protect is based on
Navigate the main IBM Spectrum Protect command line and GUI interfaces
Perform basic data backups and differentiate between backup types, such as incremental backups and complete backups
CONTENT
Unit 1: Concepts and Components
Unit 2: User Interface Introduction
Exercise Part 1: Administrative Command Line
Exercise 1 Basic Queries
Exercise 2 Use the help command
Exercise 3 Start a Console Mode window for monitoring
Exercise 4 Open the administrative command line using the dsmadmc command
Exercise Part 2: Operations Center
Exercise 5 Navigating the Operations Center
Exercise 6 Use the Operations Center Command Builder
Exercise Part 3: Backup-archive client
Exercise 7 Backup-archive command line introduction
Exercise 8 Backup-archive GUI introduction
Exercise 9 Examine current options in the backup-archive GUI
Exercise 10 Restore and replace files
Exercise 11 Archive selected files
Exercise 12 Retrieve files from archive
Unit 3: Daily Operations
Exercise 1 Perform an incremental, complete backup
Exercise 2 Perform a selective backup with client-side compression
Exercise 3 Send archive data to the storage pools
Exercise 4 Define a container storage pool
Exercise 5 Change policy to send backup data to container storage pool
Exercise 6 Back up files to DEDUPCONTAINER using inline deduplication
Exercise 7 Perform storage pool backup
Exercise 8 Perform a database backup
Exercise 9 Review the configuration of the database and recovery log
Exercise 10 Back up the database again using multiple streams and compression
Exercise 11 Initiate a storage pool migration
Exercise 12 Review the maintenance tasks in the Operations Center
Unit 4: Reporting and Monitoring
Exercise 1 Review security notification
Exercise 2 Configure a mail server for reports
Exercise 3 Review the default reports
Exercise 4 Create a new report and work with report templates
Exercise 5 Review and assign alerts in the Operations Center
Exercise 6 Review the default maintenance tasks in the Operations Center
Exercise 7 Use the Operations Center to review the completed maintenance

€990
E-Learning
Understanding Cisco Wireless Foundations [WLFNDU-CPLL]
OVERVIEW
The Understanding Cisco Wireless Foundations (WLFNDU) v1.0 course gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco Wirless LAN network. This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size.
This course will help you to learn the skills, technologies and best practices needed to manage a Cisco WLAN network, to understand and implement a Cisco wireless network architecture, and to design and implement WLAN maintenance and troubleshooting solutions.
OBJECTIVES
After Completing this course, you should be able to:
Describe and implement foundational wireless theory
Describe and implement basic wireless security and client access
Describe and implement a Cisco wireless network architecture
Configure Cisco centralized wireless networks
Describe and implement WLAN maintenance and troubleshooting
CONTENT
Describing and Implementing Foundational Wireless Theory
Describing and Implementing Foundational Wireless Math and Antennas
Describing and Implementing Foundational Wireless Operation
Describing and Implementing Basic Wireless Security
Describing and Implementing 802.1X and EAP
Implementing Wireless Guest Access and Configuring Wireless Security
Describing and Implementing Cisco Wireless Network Architecture
Describing and Implementing Cisco Wireless Network
Describing and Implementing Cisco Wireless Network Wired Support
Configuring Cisco Centralized Wireless Networks
Labs:
Explore the Physics of Wi-Fi
Explore the Wi-Fi Environment
Analyze Wireless Frames
Configure Client Access
Configure the Wired Infrastructure
Configure a Centralized Cisco WLC Deployment
Configure a Centralized WLAN Deployment
Configure an IPv6 Operation in a Centralized WLAN Deployment
Optimize RF Conditions and Performance for Clients
Perform Centralized Controller Maintenance
Use Troubleshooting Tools

€730
E-Learning
WebSphere Application Server V9 Administration [ZA590G]
OVERVIEW
This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9.
This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.
In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 in a single-server environment. You learn how to deploy enterprise Java applications in a single computer configuration. In addition, you learn how to work with features of WebSphere Application Server V9, such as the wsadmin scripting interface, security, and performance monitoring.
Hands-on exercises throughout the course give you practical experience with the skills you develop in the lectures.
OBJECTIVES
After completing this course, you should be able to:
Relate WebSphere Application Server to the WebSphere family of products
Describe the features and standards in WebSphere Application Server V9
Describe the use of WebSphere Application Server in cloud, hybrid cloud, and on-premises environments
Describe the architectural concepts that are related to WebSphere Application Server
Assemble and install server-side Java enterprise applications
Use WebSphere administrative tools to configure and manage enterprise applications
Use wsadmin scripting
Configure WebSphere Application Server security
View performance information about server and application components
Troubleshoot problems by using problem determination tools and log files
CONTENT
Course introduction
WebSphere product family overview
WebSphere Application Server architecture
WebSphere Application Server administrative console
Introduction to the PlantsByWebSphere application Application assembly
Application installation
Problem determination
Introduction to wsadmin and scripting
WebSphere security Performance monitoring
Course summary
Exercises
Exercise 1: Profile creation
Exercise 2: Exploring the administrative console
Exercise 3: Assembling an application
Exercise 4: Installing an application
Exercise 5: Problem determination
Exercise 6: Using wsadmin
Exercise 7: Configuring WebSphere Application Server security
Exercise 8: Configuring application security
Exercise 9: Using the performance monitoring tools

€1.150
E-Learning
WebSphere Application Server V9 Administration in a Federated Environment [ZA599G]
OVERVIEW
This course teaches you the skills that are needed to administer IBM WebSphere Application Server V9 in a federated environment.
This release of IBM WebSphere Application Server provides enhanced support for standards (notably Java 7 EE), emerging technology, and a choice of development frameworks.
In this course, you learn how to configure and maintain IBM WebSphere Application Server V9 Network Deployment. You learn how to deploy and create a deployment manager and federate a cell. In addition, you learn how to create a cluster within the federated cell.
Throughout the course, hands-on exercises and demonstrations reinforce lecture content. You gain practical experience with WebSphere Application Server V9 by completing tasks such as creating a deployment manager, federating a stand-alone application server, creating a custom profile, and clustering an existing application server.
OBJECTIVES
Course introduction WebSphere Application Server architecture: Federated Federating a cell Exercise: Configuring the lab workstation Exercise: Creating a federated cell Workload management Exercise: Clustering and workload management WebSphere security: SSL Exercise: Configuring SSL for WebSphere Overview of Intelligent Management Course summary
CONTENT
After completing this course, you should be able to:
Describe the architectural concepts that are related to WebSphere Application Server Network Deployment
Create a deployment manager instance
Federate an application server to a cell
Add a stand-alone application server to a WebSphere Application Server cell
Cluster an application server within a WebSphere Application Server cell
Configure WebSphere Application Server SSL security settings
Deploy applications in clustered environments
Describe the features of Intelligent Management

€810
E-Learning
IBM WebSphere Application Server V8.5.5 Administration [ZA855G]
OVERVIEW
This 5-day instructor-led course teaches you the skills that are needed to install and administer IBM WebSphere Application Server V8.5.5. This release offers users enhanced support for standards, emerging technology, and a choice of development frameworks.
In this course, you learn how to install, configure, and maintain IBM WebSphere Application Server V8.5.5 base, Network Deployment (ND), and the Liberty profile. You learn how to deploy enterprise Java applications in a single computer or clustered configuration. In addition, you learn how to work with features of WebSphere Application Server V8.5.5, such as IBM Installation Manager, WebSphere Customization Toolbox, security enhancements, Intelligent Management, and centralized installation.
Throughout the course, hands-on exercises and demonstrations reinforce lecture content and give you practical experience with WebSphere Application Server V8.5.5. You complete tasks such as installing and assembling applications, applying problem determination techniques, configuring a clustered environment, and working with fine-grained administrative security.
OBJECTIVES
Course introduction
WebSphere product family overview
WebSphere Application Server architecture - stand-alone
WebSphere Application Server architecture - federated
IBM Installation Manager
WebSphere Application Server installation
Web server installation
Exercise: Installing IBM Installation Manager
Exercise: Installing WebSphere Application Server
Exercise: Installing IBM HTTP Server
WebSphere Application Server administrative console
Exercise: Exploring the administrative console
Introduction to the PlantsByWebSphere application
Application assembly
Exercise: Assembling an application
Application installation
Exercise: Installing an application
Problem determination
Exercise: Problem determination
Introduction to wsadmin and scripting
Exercise: Using wsadmin
Federating a cell
Exercise: Creating a federated cell
Workload management
Exercise: Clustering and workload management
Introduction to WebSphere Messaging
Exercise: Configuring the service integration bus
Job manager and Centralized Installation Manager
Demonstration: Using the job manager
Overview of Intelligent Management
WebSphere security
Exercise: Configuring WebSphere security
Exercise: Configuring application security
Exercise: Configuring SSL for WebSphere
Overview of the Liberty profile
Exercise: Working with the Liberty profile
Performance monitoring
Exercise: Using the performance monitoring tools
WebSphere Batch
Course summary
CONTENT
Relate WebSphere Application Server to the WebSphere family of products
Describe the features and standards in WebSphere Application Server V8.5.5
Describe the architectural concepts that are related to WebSphere Application Server
Install and configure WebSphere Application Server V8.5.5
Install and configure IBM HTTP Server (IHS)
Assemble and install server-side Java enterprise applications
Use WebSphere administrative tools to configure and manage enterprise applications
Use wsadmin scripting
Configure WebSphere Application Server security
Deploy applications in clustered environments
View performance information about server and application components
Use problem determination tools and log files to troubleshoot problems
Configure messaging with the service integration bus
Describe Intelligent Management features
Describe WebSphere Batch features
Describe the Liberty profile
Install and configure the Liberty profile

€2.000
E-Learning
IBM MQ V9 System Administration (using Windows for labs) [ZM153G]
OVERVIEW
This course provides technical professionals with the skills that are needed to administer IBM MQ queue managers on distributed operating systems and in the Cloud. In addition to the instructor-led lectures, you participate in hands-on lab exercises that are designed to reinforce lecture content.
The lab exercises use IBM MQ V9.0, giving you practical experience with tasks such as handling queue recovery, implementing security, and problem determination.
Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i.
For information about other related courses, see the IBM Training website:http://www.ibm.com/training
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms
OBJECTIVES
After completing this course, you should be able to:
Describe the IBM MQ deployment options
Plan for the implementation of IBM MQ on-premises or in the Cloud
Use IBM MQ commands and the IBM MQ Explorer to create and manage queue managers, queues, and channels
Use the IBM MQ sample programs and utilities to test the IBM MQ network
Enable a queue manager to exchange messages with another queue manager
Configure client connections to a queue manager
Use a trigger message and a trigger monitor to start an application to process messages
Implement basic queue manager restart and recovery procedures
Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network
Plan for and implement basic IBM MQ security features
Use accounting and statistics messages to monitor the activities of an IBM MQ system
Define and administer a simple queue manager cluster
CONTENT
Course introduction
IBM MQ review
IBM MQ installation and deployment options
Creating a queue manager and queues
Exercise: Using commands to create a queue manager and queues
Introduction to IBM MQ Explorer
Exercise: Using IBM MQ Explorer to create queue managers and queues
Testing the IBM MQ implementation
Exercise: Using IBM MQ sample programs to test the configuration
Implementing distributed queuing
Exercise: Connecting queue managers
IBM MQ clients
Exercise: Connecting an IBM MQ client
Implementing trigger messages and monitors
Exercise: Implementing a trigger monitor
Diagnosing problems
Exercise: Running an IBM MQ trace
Implementing basic security in IBM MQ
Exercise: Controlling access to IBM MQ
Backing up and restoring IBM MQ messages and object definitions
Exercise: Using a media image to restore a queue
Exercise: Backing up and restoring IBM MQ object definitions
Introduction to queue manager clusters
Exercise: Implementing a basic cluster
Monitoring and configuring IBM MQ for performance
Exercise: Monitoring IBM MQ for performance
Course summary

€1.670
E-Learning
IBM MQ V9.1 System Administration [ZM156G]
OVERVIEW
This course is also available as classroom course IBM MQ V9.1 System Administration (WM156G).
This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the recorded lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance.
Note: This course does not cover any of the features of MQ for z/OS or MQ for IBM i.
OBJECTIVES
After completing this course, you should be able to:
Describe the IBM MQ deployment options
Create and manage queue managers, queues, and channels
Use the IBM MQ sample programs and utilities to test the IBM MQ network
Configure distributed queuing
Configure MQ client connections to a queue manager
Define and administer a queue manager cluster
Administer Java Message Service (JMS) in MQ
Implement basic queue manager restart and recovery procedures
Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network
Manage IBM MQ security
Monitor the activities and performance of an IBM MQ system
CONTENT

€2.000
E-Learning
IBM MQ V9 Advanced System Administration (Distributed) [ZM213G]
OVERVIEW
This course is also available as classroom course IBM MQ V9 Advanced System Administration (Distributed) (WM213G).
This course expands the basic skill sets that are developed in courses WM103/ZM103, Technical Introduction to IBM MQ, and WM153/ZM153, IBM MQ V9 System Administration (using Windows for labs) or WM154, IBM MQ V9 System Administration (using Linux for labs).
The course focuses on advanced features of IBM MQ, such as implementing workload management by using a queue manager cluster, and authenticating connections, channels, and users. It also covers securing channels with Transport Layer Security (TLS), advanced client connection features, event and message monitoring, and publish/subscribe administration.
In addition to the instructor-led lectures, you participate in hands-on lab exercises that reinforce lecture content. The lab exercises give you practical experience with tasks such as implementing security, configuring workload management for a queue manager cluster, and advanced troubleshooting techniques.
Completing this course can also help you prepare for the appropriate IBM MQ Administrator certifications.
For information about other related courses, see the IBM Training website:ibm.com/training
OBJECTIVES
After this course participants should be able to:
Use conversation sharing, read-ahead, and asynchronous put to improve the performance of MQI client connections
Use Transport Layer Security (TLS) to secure TCP/IP channels
Authenticate IBM MQ channels, connections, and users
Manage the workload in an IBM MQ queue manager cluster
Implement IBM MQ high availability
Monitor application activity, events, and messages
Use the IBM MQ dead-letter queue message handler to manage a dead-letter queue
Administer distributed publish/subscribe networks
Use the IBM MQ Console to administer IBM MQ objects and resource usage
Administer Java Message Service (JMS) in MQ
CONTENT
Course introduction
Managing clients and client connections
Securing IBM MQ channels with TLS
Exercise: Securing channels with TLS
Authenticating channels and connections
Exercise: Implementing connection authentication
Implementing workload management in an IBM MQ cluster
Exercise: Implementing workload management in a cluster
More troubleshooting tools and techniques
Exercise: Tracing message routes
Exercise: Handling messages on the dead-letter queue
High availability
Introduction to distributed publish/subscribe
Exercise: Configuring distributed publish/subscribe
Supporting JMS with IBM MQ Introduction to the IBM MQ Console
Exercise: Getting started with the IBM MQ Console
Course summary

€1.670
E-Learning