Main › CompTIA Network +

CompTIA Network +

CompTIA Network +

COURSE DESCRIPTION

This course provides a definition and in-depth description of the main modern technologies of computer networks. The main methods of administration, management and troubleshooting of modern networks will also be considered.

THE PURPOSE OF THE COURSE

Teach basic skills in working with network equipment and information security equipment. As a result of this course, students will gain basic practical knowledge on setting up network protocols and security policies

AUDIENCE

engineers partners, customers

COURSE CONTENT

The following topics will be covered in this course:

Basic definitions of OSI and TCP / IP network models
Characteristics of network traffic
Deploy and configure LAN
Configuring IP networks
Deploy and configure routing networks. Basic LAN and WAN routing technologies will be considered
Configuration and monitoring of major ports and protocols
Description of the main network attacks and methods of their elimination and early detection
Deployment and configuration of information security equipment and software
Description of basic methods of authentication and access control
Using remote access methods
Implementation of security policies

DETAILED CONTENT OF THE COURSE

Lesson 1: Explanation of the OSI model and TCP / IP models

Lesson 2: Explain the properties of network traffic

Lesson 3: Installing and configuring dial-up networks

Lesson 4: Configuring IP Networks

Lesson 5: Installing and configuring routed networks

Lesson 6: Configuring and monitoring ports and protocols

Lesson 7: Explaining network applications and storage services

Lesson 8: Monitoring and troubleshooting networks

Lesson 9: Explain network attacks and mitigations

Lesson 10: Installing and Configuring Security Devices

Lesson 11: Explaining authentication and access control

Lesson 12: Deploying and troubleshooting cable solutions

Lesson 13: Implementing and troubleshooting wireless technologies

Lesson 14: Comparing and contrasting WAN technologies

Lesson 15: Using Remote Access Methods

Lesson 16: Defining site policy and best practices

 

Price: $ 320

Venue: ERC Training Center st. Mark Vovchka, 18-A

Main › Architecting on AWS

Architecting on AWS

Architecting on AWS

Architecting on AWS covers the fundamentals of building IT infrastructure on AWS. The course is designed to teach solutions architects how to optimise the use of the AWS Cloud by understanding AWS services and how these services fit into cloud-based solutions. This course emphasises AWS Cloud best practices and recommended design patterns to help students think through the process of architecting optimal IT solutions on AWS. It also presents case studies throughout the course that showcase how some AWS customers have designed their infrastructures and the strategies and services they implemented. Opportunities to build a variety of infrastructures via a guided, hands-on approach are also provided.

Course objectives
This course teaches you how to:
  • Make architectural decisions based on the AWS-recommended architectural principles and best practices
  • Leverage AWS services to make your infrastructure scalable, reliable, and highly available
  • Leverage AWS-managed services to enable greater flexibility and resiliency in an infrastructure
  • Make an AWS-based infrastructure more efficient in order to increase performance and reduce costs
  • Use the Well-Architected Framework to improve architectures with AWS solutions
Intended audience
This course is intended for:
  • Solutions architects
  • Solution design engineers
Course outline

Day 1

  • Core AWS Concepts
  • Core AWS Knowledge
  • Core AWS Services
  • Designing Your Environment
  • Making Your Environment Highly Available

Day 2

  • Forklifting an Existing Application onto AWS
  • Event-Driven Scaling
  • Automating
  • Decoupling
  • Build a New Environment

Day 3

  • Well-Architected Framework
  • Troubleshooting YourEnvironment
  • Large-Scale Design Patterns and Case Studies

Training materials: AWS digital kit, iLabs.

Certificate of ettendence: AWS Certificate

Main › C)ISSA – CERTIFIED INFORMATION SYSTEMS SECURITY AUDITOR (C)ISSA-SP1)

C)ISSA – CERTIFIED INFORMATION SYSTEMS SECURITY AUDITOR (C)ISSA-SP1)

C)ISSA – CERTIFIED INFORMATION SYSTEMS SECURITY AUDITOR (C)ISSA-SP1)

BRIEF DESCRIPTION

Many organizations require them to identify critical issues and propose effective audit solutions. And this will require in-depth knowledge of system auditors (System Auditor’s). The set of knowledge and skills included in the curriculum of vendors-independent course “Certified Information Systems Security Auditor – C) ISSA” will not only help prepare for the relevant ISACA® exam, but also provide another important certification in information systems auditing. Thus, the Certified Information Systems Security Auditor course provides the knowledge and skills to identify vulnerabilities, compatibility reports, and implement controls for all types of organizations.

Duration 4 days / 32 hours

PRELIMINARY LEVEL OF TRAINING
At least a year of working with information systems.
course objectives

AFTER COMPLETING THE COURSE YOU WILL BE ABLE TO:
Use in their work advanced knowledge and practical skills of auditing.
Obtain an international auditor’s certificate if you pass the exam

WHO ARE WE INVITE

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government

COURSE PROGRAM

  • The Process of Auditing Information Systems
  • Risk Based Auditing
  • Audit Planning and Performance
  • Reporting on Audit
  • IT Governance and Management
  • Strategic Planning and Models
  • Resource Management
  • Business Continuity Planning
  • Systems Acquisition, Development and Implementation
  • Systems Development Models
  • Types of Specialized Business Applications
  • Application Controls
  • Information Systems Operations, Maintenance and Support
  • System and Communications
  • Hardware

Related to the certification course:

Mile2 C) ISSA – Certified Information Systems Security Auditor
CISACA® CISA are the objectives of this exam

Main › Cryptography Intro

Cryptography Intro

Cryptography Intro

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. Throughout the course participants will be exposed to many exciting open problems in the field and work on fun (optional) programming projects.

COURSE AGENDA

1. Basics

  • Course Overview
  • What is Cryptography?
  • History of Cryptography
  • Discrete Probability (Crash Course)
  • Discrete Probability (Crash Course, Cont.)
  • Information Theoretic Security and The One Time Pad
  • Stream Ciphers and Pseudo Random Generators
  • Attacks on Stream Ciphers and The One Time Pad
  • Real-World Stream Ciphers
  • PRG Security Definitions
  • Semantic Security
  • Stream Ciphers are Semantically Secure

2. Block Ciphers

  • What are Block Ciphers?
  • The Data Encryption Standard
  • Exhaustive Search Attacks
  • More Attacks on Block Ciphers
  • The AES Block Cipher
  • Block Ciphers From PRGs
  • Review: PRPs and PRFs
  • Modes of Operation: One Time Key
  • Security for Many-Time Key (CPA security)
  • Modes of Operation: Many Time Key (CBC)
  • Modes of Operation: Many Time Key (CTR)

3. Message Integrity

  • Message Authentication Codes
  • MACs Based On PRFs
  • CBC-MAC and NMAC
  • MAC Padding
  • PMAC and the Carter-Wegman MAC
  • Introduction
  • Generic Birthday Attack
  • The Merkle-Damgard Paradigm
  • Constructing Compression Functions
  • HMAC
  • Timing attacks on MAC verification

4. Authenticated Encryption

  • Active Attacks on CPA-Secure Encryption
  • Definitions
  • Chosen Ciphertext Attacks
  • Constructions From Ciphers and MACs
  • Case Study: TLS 1.2
  • CBC Padding Attacks
  • Attacking Non-Atomic Decryption
  • Key Derivation
  • Deterministic Encryption
  • Deterministic Encryption: SIV and Wide PRP
  • Tweakable Encryption
  • Format Preserving Encryption

5. Basic Key Exchange

  • Trusted 3rd Parties
  • Merkle Puzzles
  • The Diffie-Hellman Protocol
  • Public-Key Encryption
  • Notation
  • Fermat and Euler
  • Modular e’th Roots
  • Reading: More background on number theory
  • Arithmetic algorithms
  • Intractable Problems

6. Public-Key Encryption

  • Definitions and Security
  • Constructions
  • The RSA Trapdoor Permutation
  • PKCS 1
  • Is RSA a One-Way Function?
  • RSA in Practice
  • The ElGamal Public-key System
  • ElGamal Security
  • ElGamal Variants With Better Security
  • A Unifying Theme

Main › ITIL® Foundation for IT Service Management (with Case Study)

ITIL® Foundation for IT Service Management (with Case Study)

ITIL® Foundation for IT Service Management (with Case Study)

COURSE OVERVIEW

This 3-day course introduces the fundamentals of IT Service Management (ITSM) based on the IT Infrastructure Library (ITIL®). It describes the key concepts, processes, functions and roles of the ITIL® service lifecycle. The course is made up of lectures and practical assignments, which provide an interactive learning experience. This results in good awareness and comprehension of the main aspects of ITIL®. The course prepares attendees for the ITIL® Foundation Certificate examination. An exam voucher is provided to each student upon completion of the training.

PREREQUISITES
  • Experience and knowledge of IT computing environments are useful but not essential
AUDIENCE
  • IT professionals, business managers and business process owners
  • Individuals who require a basic understanding of the ITIL® framework and how it may be used to enhance the quality of IT service management within an organization
  • IT professionals that are working within an organization that has adopted and adapted ITIL® who need to be informed about and thereafter contribute to an ongoing service improvement program
COURSE OBJECTIVES

Candidates can expect to gain knowledge and understanding in the following upon successful completion of the education and examination components related to this certification:

  • Service management as a practice (comprehension)
  • The ITIL® service lifecycle (comprehension)
  • Generic concepts and definitions (awareness)
  • Key principles and models (comprehension)
  • Selected processes (awareness)
  • Selected functions (awareness)
  • Selected roles (awareness)
  • Technology and architecture (awareness)
  • Competence and training (awareness)
NEXT STEPS
  • Courses from the Lifecycle or Capability streams leading to the ITIL® Expert qualification
BENEFITS TO YOU
  • Understand how IT Services create value for the business and the importance of IT Service Management in making this happen
  • Understand how IT and the Business can collaborate to improve overall productivity and efficiency
  • See how each stage of the service lifecycle contributes to the overall service and how each process and role plays a part
  • Discover how to become more proactive
  • Learn ITSM concepts via a case study and related assignments
COURSE OUTLINE

Service Management as a Practice

  • Define the concept of a service, and comprehend and explain the concept of service management as a practice

The ITIL® service lifecycle

  • Understand the value of the ITIL® service lifecycle, how the processes integrate with each other, throughout the lifecycle and explain the objectives, scope and business value for each phase in the lifecycle

Generic concepts and definitions

  • Define some of the key terminology and explain the key concepts of service management

Key principles and models

  • Comprehend and account for the key principles and models of service management and to balance some of the opposing forces within service management

Processes

  • Understand how the service management processes contribute to the ITIL® service lifecycle, to explain the purpose, objectives, scope, basic concepts, activities and interfaces of the processes

Functions

  • Explain the role, objectives and organizational structures of the different functions

Roles

  • Account for and be aware of the responsibilities of some of the key roles in service management

Technology and architecture

  • Understand how service automation assists with expediting service management processes

Competence and training

  • Competence and skills for service management

Mock exam

  • Help the candidate to pass the ITIL® Foundation exam

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › ITIL® Race to Results Simulation

ITIL® Race to Results Simulation

ITIL® Race to Results Simulation

COURSE OVERVIEW

The HP Race to Results Service Management simulation is an exciting and interactive workshop, set in the context of the “high octane” world of motor racing. The simulation is a one-day program that provides participants with a high-level overview of service management. By applying ITIL® lifecycle concepts, processes and the culture of service management, participants aim to win the racing championship through increased service management maturity that leads to dramatic increases in business and race performance.

PREREQUISITES
  • IT experience would be helpful but not required
AUDIENCE
  • IT professionals who need to understand service management at a high level
  • Senior managers wishing to review service management within their own organizations
  • Team leaders and process owners, who need to understand the big picture of service management and their part in it
  • Business and project managers who need to understand how service management can support improved business performance.
COURSE OBJECTIVES

The objective of the simulation is to give a practical introduction to the essential elements of service management and to give participants the opportunity to experience hands-on how the application of service management can improve business performance

NEXT STEPS
  • ITIL® Foundation for IT Service Management (HF421S)
BENEFITS TO YOU
  • Identify fundamental concepts and processes involved in service management
  • Learn about the essential elements of service management in a shorter time via a fun and interactive approach
  • Experience a focus on business outcomes to improve IT’s contribution to business performance, through the effective implementation of service management
COURSE OUTLINE

Introduction to simulation

  • Normally delivered over five rounds, the simulation brings out all the aspects of SM as a result of the game dynamic. Initially focusing on Service Operation, the simulation then covers Service Strategy, Service Design, Service Transition and Continual Service Improvement, simulating aspects of ITIL® in a practical environment. In general terms, issues and subjects emerge.

Round 1

  • Communication issues
  • Silo working

Service Operation

  • Incident Management
  • Service Desk

Round 2

Service Strategy

  • Service Portfolio Management
  • Financial Management

Service Design

  • Service Level Management
  • Capacity Management

Service Transition

  • Change Management
  • Knowledge Management

Service Operation

  • Further consideration to Incident Management, confirming prioritization levels
  • Problem Management
  • Event Management

Round 3

Service Strategy

  • Service Portfolio Management maturing
  • Financial Management maturing

Service Design

  • Service Catalog Management
  • IT Service Continuity Management
  • Availability Management
  • Service Level Management maturing
  • Capacity Management maturing

Service Transition

  • Change Management maturing
  • Knowledge Management maturing
  • Configuration Management
  • Release and Deployment Management

Service Operation

  • Incident Management Process & Service Desk Function mature
  • Problem Management maturing
  • Event Management maturing

Continual Service Improvement

  • Service Level Management

Round 4

Service Strategy

  • Service Portfolio Management mature
  • Financial Management Mature

Service Design

  • Service Catalog Management maturing
  • IT Service Continuity Management maturing
  • Availability Management maturing
  • Service Level Management maturing
  • Capacity Management maturing

Service Transition

  • Change Management maturing
  • Knowledge Management maturing
  • Configuration Management maturing
  • Release and Deployment Management maturing

Service Operation

  • Incident Management Process & Service Desk Function maturing
  • Problem Management maturing
  • Event Management maturing

Continual Service Improvement

  • Service Level Management maturing

Round 5

  • Review performance improvement over the 5 rounds, demonstrate links between and reliance of processes on each other
  • Review how ITSM maturity has evolved and relate it to participant organization

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › Race to results Service Management Simulation – 1/2 day (ITIL® based)

Race to results Service Management Simulation – 1/2 day (ITIL® based)

Race to results Service Management Simulation – 1/2 day (ITIL® based)

COURSE OVERVIEW

The HP Race to Results Service Management simulation is an exciting and interactive workshop, set in the context of the “high octane” world of motor racing. The simulation is a half-day program that provides participants with a high-level overview of service management. By applying ITIL® lifecycle concepts, processes and the culture of service management, participants aim to win the racing championship through increased service management maturity that leads to dramatic increases in business and race performance.

PREREQUISITES
  • IT experience would be helpful but not required
AUDIENCE

This half-day simulation is ideal for executives who do not have time for longer sessions and would like to be introduced to basic service management concepts. It is also suitable for:

  • IT professionals who need to understand service management at a high level
  • Senior managers wishing to review service management within their own organizations
  • Team leaders and process owners, who need to understand the big picture of service management and their part in it
COURSE OBJECTIVES
  • The objective of the simulation is to give a practical introduction to the essential elements of service management and to give participants the opportunity to experience hands-on how the application of service management can improve business performance
  • For a more comprehensive and in-depth overview of service management, register for the full-day version of the simulation (HF415S).
NEXT STEPS
  • ITIL® Foundation for IT Service Management (HF421S)
BENEFITS TO YOU
  • Gain familiarity with basic service management concepts
  • Learn about the essential elements of service management in a shorter time via a fun and interactive approach
  • Experience a focus on business outcomes to improve IT’s contribution to business performance, through the effective implementation of service management
COURSE OUTLINE

Introduction to simulation

  • This half-day version introduces the essential aspects of Service Management as a result of the game dynamic. The key ITIL® processes are introduced as follows

Round 1

  • Communication issues
  • Silo working

Service Operation

  • Incident Management
  • Service Desk

Round 2

Service Strategy

  • Service Portfolio Management
  • Financial Management

Service Design

  • Service Level Management
  • Capacity Management

Service Transition

  • Change Management
  • Knowledge Management
  • Release and Deployment Management

Service Operation

  • Further consideration to Incident Management, confirming prioritization levels
  • Problem Management
  • Event Management

Round 3

This round is run at the instructor Service Strategy

Service Strategy

  • Service Portfolio Management maturing
  • Financial Management maturing

Service Design

  • Service Catalog Management
  • IT Service Continuity Management
  • Availability Management
  • Service Level Management maturing
  • Capacity Management maturing

Service Transition

  • Change Management maturing
  • Knowledge Management maturing
  • Configuration Management
  • Release and Deployment Management

Service Operation

  • Incident Management Process & Service Desk Function mature
  • Problem Management maturing
  • Event Management maturing

Continual Service Improvement

  • Service Level Management

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › Certified Data Center Professional Training (CDCP®) (HK258S)

Certified Data Center Professional Training (CDCP®) (HK258S)

Certified Data Center Professional Training (CDCP®) (HK258S)

COURSE OVERVIEW

This 2-day course is designed to expose participants to the key components of the data center. CDCP training will address how to setup and improve key aspects such as power, cooling, security, cabling, safety to ensure a hi-available data center. CDCP training will also address key operations and maintenance aspects.

AUDIENCE
  • The primary audience for this course is an IT, facilities or Data Center Operations professional working in and around the data center and having the responsibility to achieve and improve hi-availability and manageability of the Data Center, such as: Data center managers, Operations / Floor / Facility managers, data center engineers, network / system engineers, data center sales / consultants.
PREREQUISITES
  • While there are no specific prerequisites for the CDCP® course, participants who have at least one/two year(s) of actual working experience in a Data Center/facilities environment are best suited.
DELIVERY STRUCTURE
  • The courses are lectured by certified trainers. CDCP® is an instructor-led course that uses a combination of lectures and question-and-answer sessions, to discuss participants’ specific needs and issues experienced in their own environment. Participants are able to tap into the trainer’s extensive experience to enable them to solve practical problems in their current environment, thus adding tremendous value.
COURSE OBJECTIVES

After completion of the course the attendee will be able to:

  • Choose an optimum site for mission critical Data Center’s based on current and future needs.
  • Describe all components important for hi-availability in a Data Center and how to effectively setup the Data Center.
  • Name and apply the various industry standards.
  • Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc. and to choose and apply them effectively to enhance the hi-availability of the Data Center at minimum cost.
  •  Review the electrical distribution system to avoid costly downtime.
  • Enhance cooling capabilities and efficiency in the Data Center by using techniques and technologies including new methodologies for high-power cooling requirements of the future.
  • Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques.
  • Create effective maintenance contracts with equipment suppliers ensuring the best return on investment.
  • Setup effective Data Center monitoring ensuring the right people get the right message.
  • Ensure proper security measures, both process and technical are in place safeguarding your companies precious information in the data center.
EXAMINATION ACCREDITED BY EXIN
  • The exam is an hour, 40 questions, multiple choice and closed book exam. The candidate requires a minimum of 27 correct answers to pass the exam. Attendees passing the exam will be awarded the internationally accredited and recognized ‘Certified Data Center Professional’ certificate (CDCP). The certification is valid for three years after which the student needs to re-certify.
BENEFITS TO YOU
  • Understand more about the design and build of data centers.
  • Receive training and advice from one of the industry’s leading experts.
  • Obtain the CDCP® certificate.
 NEXT STEPS
  • In CDCS® Certified Data Centre Specialist (HK259S) more details will be revealed allowing you to review designs of existing and/or future Data Centers. CDCS® is a ‘must have’ course for those who are expected to manage or be involved in a Data Center build or renovation project.
  • CDFOM® Certified Data Center Facilities Operations Manager (HK763S) builds upon knowledge gained in CDCP® which addresses the operational aspects of running a Data Center.
DETAILED COURSE OUTLINE

The data center, its importance, and causes of downtime

Data center standards and best practices

Data center location, building and construction

  • Selecting appropriate sites and buildings and how to avoid pitfalls
  • Various components of an effective data center and support facilities set up

Raised floor/suspended ceiling

  • Applicable standards
  • Uniform, concentrated and rolling load definitions
  • Signal reference grid; grounding of racks
  • Disability regulations
  • Suspended ceiling usage and requirements

Light

  • Standards
  • Light fixture types and placement
  • Emergency light; EPS

Power infrastructure

  • Power infrastructure layout from generation to rack level
  • ATS and STS systems
  • Redundancy levels and techniques
  • Three phase and single phase usage
  • Power distribution options within the computer room
  • Power cabling versus bus bar trunking
  • Bonding versus grounding; isolation transformers and common mode noise
  • Form factors and IP-protection grades
  • Power quality guidelines
  • Real power versus apparent power
  • How to size and calculate load in the data center
  • Generators
  • Static and dynamic UPS systems and criteria to use the correct one for the correct application
  • Battery types and making the right selection and testing
  • Thermo-graphics

Electromagnetic fields

  • Sources of EMF
  • Electrical fields and magnetic fields definitions
  • Effects of EMF on human health and equipment
  • (H)EMP
  • Standards
  • EMF shielding solutions

Equipment Racks

  • Rack properties
  • Security considerations
  • Power rail/strip options

Cooling infrastructure

  • Temperature and humidity settings
  • Cooling measurement units and conversion rates
  • Sensible and latent heat definitions
  • Difference between comfort and precision cooling
  • Overview of different air conditioner technologies
  • Raised floor versus non-raised floor cooling
  • Supplemental cooling options
  • Cold aisle / hot aisle containment

Water supply

  • Importance of water supply and application areas
  • Backup water supply techniques

Designing a scalable network infrastructure

  • The importance of a Structured Cabling System
  • Planning considerations
  • Copper and Fiber cable technology and standards
  • TIA-942 Cabling hierarchy and recommendations
  • Testing and verification
  • SAN storage cabling
  • Network redundancy
  • Building-to-building connectivity
  • Network monitoring system requirements

Fire suppression

  • Standards for fire suppression
  • Detection systems
  • Various fire suppression techniques and systems, their benefits and disadvantages
  • Signage and safety
  • Regulatory requirements and best practices
  • How to ensure that your fire suppression is working

Data center monitoring

  • Data Center monitoring requirements
  • EMS versus BMS
  • Water leak detection systems
  • Notification options and considerations

Operational security and safety practices

  • Data center security layers
  • Physical, infrastructure and organizational security
  • Safety measures and essential signage

Labelling

  • Choosing a labelling scheme
  • Recommended labelling practices
  • Network labelling

Documentation

  • How to set up proper documentation
  • Document management policies and procedures

Cleaning

  • Cleaning practices for the data center

MTBF/MTTR

  • Standards and definitions
  • Calculation models
  • The “real” value

Maintenance contracts, SLAs and OLAs

Mock exam

EXAM: Certified Data Center Professional

For more information about HP training programs in Ukraine visit http://www8.hp.com/ua/ru/training/index.html

Main › Creating HP Software Defined Networks (H8D01S)

Creating HP Software Defined Networks (H8D01S)

Creating HP Software Defined Networks (H8D01S)

COURSE OVERVIEW

Creating HP Software-defined Networks is an introductory course to SDN. The course provides an overview of SDN concepts, architecture, network design elements, how SDN-enabled applications can dynamically control network behavior, and how SDN will make deploying new solutions more efficient and less time consuming.

COURSE DESCRIPTION

In this course you will learn how SDN is used in networking environments, and how SDN separates the control and data plane using OpenFlow as the open standard transport mechanism. SDN “use cases” are used to demonstrate how SDN can be used in real-world situations to solve network challenges, and demonstrate the implications that SDN will have on the current and future network designs.

You will learn how to implement the HP VAN SDN Controller into an existing network by installing, configuring and licensing the HP VAN SDN Controller. The Network Protector SDN Application running on the HP VAN SDN Controller enables automated network posture assessment and real-time security across OpenFlow-enabled network devices. In the course you will be installing, configuring and testing this new HP SDN Application during hands-on labs.

At course completion, the learner will have a solid understanding of what SDN concepts, how it works, why it is used, and how the HP VAN SDN Controller can be implemented in an HP network.

This course is approximately 50% lecture and 50% learning activities and hands-on lab exercises.
The Creating HP Software-defined Networks course prepares candidates for one of the specialty exams in the HP ASE FlexNetwork Architect V2 and soon-to-be-released HP ASE – FlexNetwork Integrator V1 certification within the HP ExpertOne program.

PREREQUISITES
  • HP FlexNetwork Fundamentals or similar experience with HP Comware and Provision switches
AUDIENCE

The Creating HP Software-defined Networks course is suitable for all IT Professionals who want to learn about SDN. The focus of this course is on designing and implementing Software-defined Networks.

WHAT IS NEW?

The Creating HP Software-defined Networks is a new course and is one of the electives in the new HP ASE – FlexNetwork Architect V2 and soon-tobe-released HP ASE – FlexNetwork Integrator V1 certification tracks.

COURSE OBJECTIVES
  • Explain what SDN means, from a technical and a business perspective
  • Understand how SDN can be integrated in the HP FlexNetwork Architecture through SDN use cases
  • Explain and understand how OpenFlow is the open-standard transport mechanism used for making SDN possible
  • Understand how OpenFlow enables the separation of the control and data planes
  • Understand the difference between OpenFlow 1.0 and 1.3
  • Explain and understand how SDN can enhance the network performance, security and simplification, via applications such as Sentinel
  • Understand what it takes to transition from traditional networking to Software-defined Networking
  • Install and configure the HP VAN SDN Controller
  • Understand and configure how the HP VAN SDN controller communicates with different components, both internal and external to the controller, via secure channels
  • Explain the HP VAN SDN Controller RESTful API, including information about RSDoc
  • Demonstrate how to use a script to make API calls, focusing on application implementation rather than development of applications
  • Configure a controller team to provide high availability in a SDN environment
CERTIFICATION(S)
  • HP ASE – FlexNetwork Architect V2
EXAM(S)
  • HP2-Z31 – Creating HP Software-defined Networks

For more information about HP training programs in Ukraine visit http://www8.hp.com/ua/ru/training/index.html

Main › Configuring HP FlexNetwork Technologies for Comware Devices (H4C87S)

Configuring HP FlexNetwork Technologies for Comware Devices (H4C87S)

Configuring HP FlexNetwork Technologies for Comware Devices (H4C87S)

COURSE OVERVIEW

This course introduces network professionals to the basic features of modern networks such as VLANs, redundancy technologies such as MSTP,IRF, link aggregation technologies like LACP, static IP routing, and dynamic routing with OSPF.

COURSE DESCRIPTION

In this course participants will learn how these technologies are implemented in the HP Comware 7 switch platform, and will have opportunities to practice configuring these features, monitor their functionality, and design a solution based on provided criteria. This course also includes an introduction to network management with HP’s Intelligent Management Center (IMC) version 7.

This course is approximately 40 percent lecture and learning activities and 60 percent hands-on lab activities.

PREREQUISITES
  • Students should possess experience with networking and common LAN protocols
AUDIENCE
  • IT professionals who will deploy and manage networks based on HP Comware products
COURSE OBJECTIVES
  • Describe how HP’s FlexNetwork strategy applies to components such as FlexCampus, FlexBranch, FlexManagement, and Software-Defined Networks (SDN)
  • Protect devices with local and remote authentication using telnet, SSH, web, and SNMP access
  • Navigate the HP Comware CLI and manage the flash file system
  • Upgrade the Comware switch operating system
  • Configure VLANs on HP Comware switches
  • Implement basic routing on directly connected VLANs or links
  • Configure a Comware switch for DHCP server and DHCP relay
  • Interpret Comware logs
  • Understand how different varieties of spanning tree are implemented on Comware switches
  • Configure multiple spanning tree and apply STP security features
  • Differentiate between static and dynamic link aggregation
  • Configure and troubleshoot link aggregation on HP switches
  • Identify applications for static and dynamic routing
  • Configure single-area OSPF routing
  • Understand the basic operation of HP’s Intelligent Resilient Framework (IRF)
  • Identify IRF’s advantages when compared with other technologies that manage redundant paths
  • Describe how the Multi-Active Detection (MAD) protocol deals with an IRF split stack
  • Configure and verify a simple IRF topology
  • Identify the components and protocols that support HP’s Intelligent Management Center
  • Install IMC and use it to configure and monitor network devices
  • Differentiate applications for two- and three-tier network designs
  • Identify an appropriate VLAN design based on a given scenario
  • Based on a given scenario, choose appropriate link types and redundancy solutions
  • Use best practices for IP addressing and OSPF routing when implementing a network design
BENEFITS TO YOU

This course will enhance your knowledge and skills in several areas of networking. You will gain proficiency in using the Comware CLI, including the application of device access security, updating software, and managing the Comware file system.
As a learner you will have sole control of set of equipment that includes four Comware 5900 switches, as well as a server and client.

For more information about HP training programs in Ukraine visit http://www8.hp.com/ua/ru/training/index.html