CompTIA Network +

COURSE DESCRIPTION
This course provides a definition and in-depth description of the main modern technologies of computer networks. The main methods of administration, management and troubleshooting of modern networks will also be considered.
THE PURPOSE OF THE COURSE
Teach basic skills in working with network equipment and information security equipment. As a result of this course, students will gain basic practical knowledge on setting up network protocols and security policies
AUDIENCE
engineers partners, customers
COURSE CONTENT
The following topics will be covered in this course:
Basic definitions of OSI and TCP / IP network models
Characteristics of network traffic
Deploy and configure LAN
Configuring IP networks
Deploy and configure routing networks. Basic LAN and WAN routing technologies will be considered
Configuration and monitoring of major ports and protocols
Description of the main network attacks and methods of their elimination and early detection
Deployment and configuration of information security equipment and software
Description of basic methods of authentication and access control
Using remote access methods
Implementation of security policies
DETAILED CONTENT OF THE COURSE
Lesson 1: Explanation of the OSI model and TCP / IP models
Lesson 2: Explain the properties of network traffic
Lesson 3: Installing and configuring dial-up networks
Lesson 4: Configuring IP Networks
Lesson 5: Installing and configuring routed networks
Lesson 6: Configuring and monitoring ports and protocols
Lesson 7: Explaining network applications and storage services
Lesson 8: Monitoring and troubleshooting networks
Lesson 9: Explain network attacks and mitigations
Lesson 10: Installing and Configuring Security Devices
Lesson 11: Explaining authentication and access control
Lesson 12: Deploying and troubleshooting cable solutions
Lesson 13: Implementing and troubleshooting wireless technologies
Lesson 14: Comparing and contrasting WAN technologies
Lesson 15: Using Remote Access Methods
Lesson 16: Defining site policy and best practices
Price: $ 320
Venue: ERC Training Center st. Mark Vovchka, 18-A
Architecting on AWS

Architecting on AWS covers the fundamentals of building IT infrastructure on AWS. The course is designed to teach solutions architects how to optimise the use of the AWS Cloud by understanding AWS services and how these services fit into cloud-based solutions. This course emphasises AWS Cloud best practices and recommended design patterns to help students think through the process of architecting optimal IT solutions on AWS. It also presents case studies throughout the course that showcase how some AWS customers have designed their infrastructures and the strategies and services they implemented. Opportunities to build a variety of infrastructures via a guided, hands-on approach are also provided.
Course objectives
This course teaches you how to:
- Make architectural decisions based on the AWS-recommended architectural principles and best practices
- Leverage AWS services to make your infrastructure scalable, reliable, and highly available
- Leverage AWS-managed services to enable greater flexibility and resiliency in an infrastructure
- Make an AWS-based infrastructure more efficient in order to increase performance and reduce costs
- Use the Well-Architected Framework to improve architectures with AWS solutions
Intended audience
This course is intended for:
- Solutions architects
- Solution design engineers
Course outline
Day 1
- Core AWS Concepts
- Core AWS Knowledge
- Core AWS Services
- Designing Your Environment
- Making Your Environment Highly Available
Day 2
- Forklifting an Existing Application onto AWS
- Event-Driven Scaling
- Automating
- Decoupling
- Build a New Environment
Day 3
- Well-Architected Framework
- Troubleshooting YourEnvironment
- Large-Scale Design Patterns and Case Studies
Training materials: AWS digital kit, iLabs.
Certificate of ettendence: AWS Certificate
C)ISSA – CERTIFIED INFORMATION SYSTEMS SECURITY AUDITOR (C)ISSA-SP1)

BRIEF DESCRIPTION
Many organizations require them to identify critical issues and propose effective audit solutions. And this will require in-depth knowledge of system auditors (System Auditor’s). The set of knowledge and skills included in the curriculum of vendors-independent course “Certified Information Systems Security Auditor – C) ISSA” will not only help prepare for the relevant ISACA® exam, but also provide another important certification in information systems auditing. Thus, the Certified Information Systems Security Auditor course provides the knowledge and skills to identify vulnerabilities, compatibility reports, and implement controls for all types of organizations.
Duration 4 days / 32 hours
PRELIMINARY LEVEL OF TRAINING
At least a year of working with information systems.
course objectives
AFTER COMPLETING THE COURSE YOU WILL BE ABLE TO:
Use in their work advanced knowledge and practical skills of auditing.
Obtain an international auditor’s certificate if you pass the exam
WHO ARE WE INVITE
- IS Security Officers
- IS Managers
- Risk Managers
- Auditors
- Information Systems Owners
- IS Control Assessors
- System Managers
- Government
COURSE PROGRAM
- The Process of Auditing Information Systems
- Risk Based Auditing
- Audit Planning and Performance
- Reporting on Audit
- IT Governance and Management
- Strategic Planning and Models
- Resource Management
- Business Continuity Planning
- Systems Acquisition, Development and Implementation
- Systems Development Models
- Types of Specialized Business Applications
- Application Controls
- Information Systems Operations, Maintenance and Support
- System and Communications
- Hardware
Related to the certification course:
Mile2 C) ISSA – Certified Information Systems Security Auditor
CISACA® CISA are the objectives of this exam
Cryptography Intro

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. Throughout the course participants will be exposed to many exciting open problems in the field and work on fun (optional) programming projects.
COURSE AGENDA
1. Basics
- Course Overview
- What is Cryptography?
- History of Cryptography
- Discrete Probability (Crash Course)
- Discrete Probability (Crash Course, Cont.)
- Information Theoretic Security and The One Time Pad
- Stream Ciphers and Pseudo Random Generators
- Attacks on Stream Ciphers and The One Time Pad
- Real-World Stream Ciphers
- PRG Security Definitions
- Semantic Security
- Stream Ciphers are Semantically Secure
2. Block Ciphers
- What are Block Ciphers?
- The Data Encryption Standard
- Exhaustive Search Attacks
- More Attacks on Block Ciphers
- The AES Block Cipher
- Block Ciphers From PRGs
- Review: PRPs and PRFs
- Modes of Operation: One Time Key
- Security for Many-Time Key (CPA security)
- Modes of Operation: Many Time Key (CBC)
- Modes of Operation: Many Time Key (CTR)
3. Message Integrity
- Message Authentication Codes
- MACs Based On PRFs
- CBC-MAC and NMAC
- MAC Padding
- PMAC and the Carter-Wegman MAC
- Introduction
- Generic Birthday Attack
- The Merkle-Damgard Paradigm
- Constructing Compression Functions
- HMAC
- Timing attacks on MAC verification
4. Authenticated Encryption
- Active Attacks on CPA-Secure Encryption
- Definitions
- Chosen Ciphertext Attacks
- Constructions From Ciphers and MACs
- Case Study: TLS 1.2
- CBC Padding Attacks
- Attacking Non-Atomic Decryption
- Key Derivation
- Deterministic Encryption
- Deterministic Encryption: SIV and Wide PRP
- Tweakable Encryption
- Format Preserving Encryption
5. Basic Key Exchange
- Trusted 3rd Parties
- Merkle Puzzles
- The Diffie-Hellman Protocol
- Public-Key Encryption
- Notation
- Fermat and Euler
- Modular e’th Roots
- Reading: More background on number theory
- Arithmetic algorithms
- Intractable Problems
6. Public-Key Encryption
- Definitions and Security
- Constructions
- The RSA Trapdoor Permutation
- PKCS 1
- Is RSA a One-Way Function?
- RSA in Practice
- The ElGamal Public-key System
- ElGamal Security
- ElGamal Variants With Better Security
- A Unifying Theme
ITIL® Foundation for IT Service Management (with Case Study)

COURSE OVERVIEW
This 3-day course introduces the fundamentals of IT Service Management (ITSM) based on the IT Infrastructure Library (ITIL®). It describes the key concepts, processes, functions and roles of the ITIL® service lifecycle. The course is made up of lectures and practical assignments, which provide an interactive learning experience. This results in good awareness and comprehension of the main aspects of ITIL®. The course prepares attendees for the ITIL® Foundation Certificate examination. An exam voucher is provided to each student upon completion of the training.
PREREQUISITES
- Experience and knowledge of IT computing environments are useful but not essential
AUDIENCE
- IT professionals, business managers and business process owners
- Individuals who require a basic understanding of the ITIL® framework and how it may be used to enhance the quality of IT service management within an organization
- IT professionals that are working within an organization that has adopted and adapted ITIL® who need to be informed about and thereafter contribute to an ongoing service improvement program
COURSE OBJECTIVES
Candidates can expect to gain knowledge and understanding in the following upon successful completion of the education and examination components related to this certification:
- Service management as a practice (comprehension)
- The ITIL® service lifecycle (comprehension)
- Generic concepts and definitions (awareness)
- Key principles and models (comprehension)
- Selected processes (awareness)
- Selected functions (awareness)
- Selected roles (awareness)
- Technology and architecture (awareness)
- Competence and training (awareness)
NEXT STEPS
- Courses from the Lifecycle or Capability streams leading to the ITIL® Expert qualification
BENEFITS TO YOU
- Understand how IT Services create value for the business and the importance of IT Service Management in making this happen
- Understand how IT and the Business can collaborate to improve overall productivity and efficiency
- See how each stage of the service lifecycle contributes to the overall service and how each process and role plays a part
- Discover how to become more proactive
- Learn ITSM concepts via a case study and related assignments
COURSE OUTLINE
Service Management as a Practice
- Define the concept of a service, and comprehend and explain the concept of service management as a practice
The ITIL® service lifecycle
- Understand the value of the ITIL® service lifecycle, how the processes integrate with each other, throughout the lifecycle and explain the objectives, scope and business value for each phase in the lifecycle
Generic concepts and definitions
- Define some of the key terminology and explain the key concepts of service management
Key principles and models
- Comprehend and account for the key principles and models of service management and to balance some of the opposing forces within service management
Processes
- Understand how the service management processes contribute to the ITIL® service lifecycle, to explain the purpose, objectives, scope, basic concepts, activities and interfaces of the processes
Functions
- Explain the role, objectives and organizational structures of the different functions
Roles
- Account for and be aware of the responsibilities of some of the key roles in service management
Technology and architecture
- Understand how service automation assists with expediting service management processes
Competence and training
- Competence and skills for service management
Mock exam
- Help the candidate to pass the ITIL® Foundation exam
For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html
ITIL® Race to Results Simulation

COURSE OVERVIEW
The HP Race to Results Service Management simulation is an exciting and interactive workshop, set in the context of the “high octane” world of motor racing. The simulation is a one-day program that provides participants with a high-level overview of service management. By applying ITIL® lifecycle concepts, processes and the culture of service management, participants aim to win the racing championship through increased service management maturity that leads to dramatic increases in business and race performance.
PREREQUISITES
- IT experience would be helpful but not required
AUDIENCE
- IT professionals who need to understand service management at a high level
- Senior managers wishing to review service management within their own organizations
- Team leaders and process owners, who need to understand the big picture of service management and their part in it
- Business and project managers who need to understand how service management can support improved business performance.
COURSE OBJECTIVES
The objective of the simulation is to give a practical introduction to the essential elements of service management and to give participants the opportunity to experience hands-on how the application of service management can improve business performance
NEXT STEPS
- ITIL® Foundation for IT Service Management (HF421S)
BENEFITS TO YOU
- Identify fundamental concepts and processes involved in service management
- Learn about the essential elements of service management in a shorter time via a fun and interactive approach
- Experience a focus on business outcomes to improve IT’s contribution to business performance, through the effective implementation of service management
COURSE OUTLINE
Introduction to simulation
- Normally delivered over five rounds, the simulation brings out all the aspects of SM as a result of the game dynamic. Initially focusing on Service Operation, the simulation then covers Service Strategy, Service Design, Service Transition and Continual Service Improvement, simulating aspects of ITIL® in a practical environment. In general terms, issues and subjects emerge.
Round 1
- Communication issues
- Silo working
Service Operation
- Incident Management
- Service Desk
Round 2
Service Strategy
- Service Portfolio Management
- Financial Management
Service Design
- Service Level Management
- Capacity Management
Service Transition
- Change Management
- Knowledge Management
Service Operation
- Further consideration to Incident Management, confirming prioritization levels
- Problem Management
- Event Management
Round 3
Service Strategy
- Service Portfolio Management maturing
- Financial Management maturing
Service Design
- Service Catalog Management
- IT Service Continuity Management
- Availability Management
- Service Level Management maturing
- Capacity Management maturing
Service Transition
- Change Management maturing
- Knowledge Management maturing
- Configuration Management
- Release and Deployment Management
Service Operation
- Incident Management Process & Service Desk Function mature
- Problem Management maturing
- Event Management maturing
Continual Service Improvement
- Service Level Management
Round 4
Service Strategy
- Service Portfolio Management mature
- Financial Management Mature
Service Design
- Service Catalog Management maturing
- IT Service Continuity Management maturing
- Availability Management maturing
- Service Level Management maturing
- Capacity Management maturing
Service Transition
- Change Management maturing
- Knowledge Management maturing
- Configuration Management maturing
- Release and Deployment Management maturing
Service Operation
- Incident Management Process & Service Desk Function maturing
- Problem Management maturing
- Event Management maturing
Continual Service Improvement
- Service Level Management maturing
Round 5
- Review performance improvement over the 5 rounds, demonstrate links between and reliance of processes on each other
- Review how ITSM maturity has evolved and relate it to participant organization
For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html
Race to results Service Management Simulation – 1/2 day (ITIL® based)

COURSE OVERVIEW
The HP Race to Results Service Management simulation is an exciting and interactive workshop, set in the context of the “high octane” world of motor racing. The simulation is a half-day program that provides participants with a high-level overview of service management. By applying ITIL® lifecycle concepts, processes and the culture of service management, participants aim to win the racing championship through increased service management maturity that leads to dramatic increases in business and race performance.
PREREQUISITES
- IT experience would be helpful but not required
AUDIENCE
This half-day simulation is ideal for executives who do not have time for longer sessions and would like to be introduced to basic service management concepts. It is also suitable for:
- IT professionals who need to understand service management at a high level
- Senior managers wishing to review service management within their own organizations
- Team leaders and process owners, who need to understand the big picture of service management and their part in it
COURSE OBJECTIVES
- The objective of the simulation is to give a practical introduction to the essential elements of service management and to give participants the opportunity to experience hands-on how the application of service management can improve business performance
- For a more comprehensive and in-depth overview of service management, register for the full-day version of the simulation (HF415S).
NEXT STEPS
- ITIL® Foundation for IT Service Management (HF421S)
BENEFITS TO YOU
- Gain familiarity with basic service management concepts
- Learn about the essential elements of service management in a shorter time via a fun and interactive approach
- Experience a focus on business outcomes to improve IT’s contribution to business performance, through the effective implementation of service management
COURSE OUTLINE
Introduction to simulation
- This half-day version introduces the essential aspects of Service Management as a result of the game dynamic. The key ITIL® processes are introduced as follows
Round 1
- Communication issues
- Silo working
Service Operation
- Incident Management
- Service Desk
Round 2
Service Strategy
- Service Portfolio Management
- Financial Management
Service Design
- Service Level Management
- Capacity Management
Service Transition
- Change Management
- Knowledge Management
- Release and Deployment Management
Service Operation
- Further consideration to Incident Management, confirming prioritization levels
- Problem Management
- Event Management
Round 3
This round is run at the instructor Service Strategy
Service Strategy
- Service Portfolio Management maturing
- Financial Management maturing
Service Design
- Service Catalog Management
- IT Service Continuity Management
- Availability Management
- Service Level Management maturing
- Capacity Management maturing
Service Transition
- Change Management maturing
- Knowledge Management maturing
- Configuration Management
- Release and Deployment Management
Service Operation
- Incident Management Process & Service Desk Function mature
- Problem Management maturing
- Event Management maturing
Continual Service Improvement
- Service Level Management
For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html
Certified Data Center Professional Training (CDCP®) (HK258S)

COURSE OVERVIEW
This 2-day course is designed to expose participants to the key components of the data center. CDCP training will address how to setup and improve key aspects such as power, cooling, security, cabling, safety to ensure a hi-available data center. CDCP training will also address key operations and maintenance aspects.
AUDIENCE
- The primary audience for this course is an IT, facilities or Data Center Operations professional working in and around the data center and having the responsibility to achieve and improve hi-availability and manageability of the Data Center, such as: Data center managers, Operations / Floor / Facility managers, data center engineers, network / system engineers, data center sales / consultants.
PREREQUISITES
- While there are no specific prerequisites for the CDCP® course, participants who have at least one/two year(s) of actual working experience in a Data Center/facilities environment are best suited.
DELIVERY STRUCTURE
- The courses are lectured by certified trainers. CDCP® is an instructor-led course that uses a combination of lectures and question-and-answer sessions, to discuss participants’ specific needs and issues experienced in their own environment. Participants are able to tap into the trainer’s extensive experience to enable them to solve practical problems in their current environment, thus adding tremendous value.
COURSE OBJECTIVES
After completion of the course the attendee will be able to:
- Choose an optimum site for mission critical Data Center’s based on current and future needs.
- Describe all components important for hi-availability in a Data Center and how to effectively setup the Data Center.
- Name and apply the various industry standards.
- Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc. and to choose and apply them effectively to enhance the hi-availability of the Data Center at minimum cost.
- Review the electrical distribution system to avoid costly downtime.
- Enhance cooling capabilities and efficiency in the Data Center by using techniques and technologies including new methodologies for high-power cooling requirements of the future.
- Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques.
- Create effective maintenance contracts with equipment suppliers ensuring the best return on investment.
- Setup effective Data Center monitoring ensuring the right people get the right message.
- Ensure proper security measures, both process and technical are in place safeguarding your companies precious information in the data center.
EXAMINATION ACCREDITED BY EXIN
- The exam is an hour, 40 questions, multiple choice and closed book exam. The candidate requires a minimum of 27 correct answers to pass the exam. Attendees passing the exam will be awarded the internationally accredited and recognized ‘Certified Data Center Professional’ certificate (CDCP). The certification is valid for three years after which the student needs to re-certify.
BENEFITS TO YOU
- Understand more about the design and build of data centers.
- Receive training and advice from one of the industry’s leading experts.
- Obtain the CDCP® certificate.
NEXT STEPS
- In CDCS® Certified Data Centre Specialist (HK259S) more details will be revealed allowing you to review designs of existing and/or future Data Centers. CDCS® is a ‘must have’ course for those who are expected to manage or be involved in a Data Center build or renovation project.
- CDFOM® Certified Data Center Facilities Operations Manager (HK763S) builds upon knowledge gained in CDCP® which addresses the operational aspects of running a Data Center.
DETAILED COURSE OUTLINE
The data center, its importance, and causes of downtime
Data center standards and best practices
Data center location, building and construction
- Selecting appropriate sites and buildings and how to avoid pitfalls
- Various components of an effective data center and support facilities set up
Raised floor/suspended ceiling
- Applicable standards
- Uniform, concentrated and rolling load definitions
- Signal reference grid; grounding of racks
- Disability regulations
- Suspended ceiling usage and requirements
Light
- Standards
- Light fixture types and placement
- Emergency light; EPS
Power infrastructure
- Power infrastructure layout from generation to rack level
- ATS and STS systems
- Redundancy levels and techniques
- Three phase and single phase usage
- Power distribution options within the computer room
- Power cabling versus bus bar trunking
- Bonding versus grounding; isolation transformers and common mode noise
- Form factors and IP-protection grades
- Power quality guidelines
- Real power versus apparent power
- How to size and calculate load in the data center
- Generators
- Static and dynamic UPS systems and criteria to use the correct one for the correct application
- Battery types and making the right selection and testing
- Thermo-graphics
Electromagnetic fields
- Sources of EMF
- Electrical fields and magnetic fields definitions
- Effects of EMF on human health and equipment
- (H)EMP
- Standards
- EMF shielding solutions
Equipment Racks
- Rack properties
- Security considerations
- Power rail/strip options
Cooling infrastructure
- Temperature and humidity settings
- Cooling measurement units and conversion rates
- Sensible and latent heat definitions
- Difference between comfort and precision cooling
- Overview of different air conditioner technologies
- Raised floor versus non-raised floor cooling
- Supplemental cooling options
- Cold aisle / hot aisle containment
Water supply
- Importance of water supply and application areas
- Backup water supply techniques
Designing a scalable network infrastructure
- The importance of a Structured Cabling System
- Planning considerations
- Copper and Fiber cable technology and standards
- TIA-942 Cabling hierarchy and recommendations
- Testing and verification
- SAN storage cabling
- Network redundancy
- Building-to-building connectivity
- Network monitoring system requirements
Fire suppression
- Standards for fire suppression
- Detection systems
- Various fire suppression techniques and systems, their benefits and disadvantages
- Signage and safety
- Regulatory requirements and best practices
- How to ensure that your fire suppression is working
Data center monitoring
- Data Center monitoring requirements
- EMS versus BMS
- Water leak detection systems
- Notification options and considerations
Operational security and safety practices
- Data center security layers
- Physical, infrastructure and organizational security
- Safety measures and essential signage
Labelling
- Choosing a labelling scheme
- Recommended labelling practices
- Network labelling
Documentation
- How to set up proper documentation
- Document management policies and procedures
Cleaning
- Cleaning practices for the data center
MTBF/MTTR
- Standards and definitions
- Calculation models
- The “real” value
Maintenance contracts, SLAs and OLAs
Mock exam
EXAM: Certified Data Center Professional
For more information about HP training programs in Ukraine visit http://www8.hp.com/ua/ru/training/index.html
Creating HP Software Defined Networks (H8D01S)

COURSE OVERVIEW
Creating HP Software-defined Networks is an introductory course to SDN. The course provides an overview of SDN concepts, architecture, network design elements, how SDN-enabled applications can dynamically control network behavior, and how SDN will make deploying new solutions more efficient and less time consuming.
COURSE DESCRIPTION
In this course you will learn how SDN is used in networking environments, and how SDN separates the control and data plane using OpenFlow as the open standard transport mechanism. SDN “use cases” are used to demonstrate how SDN can be used in real-world situations to solve network challenges, and demonstrate the implications that SDN will have on the current and future network designs.
You will learn how to implement the HP VAN SDN Controller into an existing network by installing, configuring and licensing the HP VAN SDN Controller. The Network Protector SDN Application running on the HP VAN SDN Controller enables automated network posture assessment and real-time security across OpenFlow-enabled network devices. In the course you will be installing, configuring and testing this new HP SDN Application during hands-on labs.
At course completion, the learner will have a solid understanding of what SDN concepts, how it works, why it is used, and how the HP VAN SDN Controller can be implemented in an HP network.
This course is approximately 50% lecture and 50% learning activities and hands-on lab exercises.
The Creating HP Software-defined Networks course prepares candidates for one of the specialty exams in the HP ASE FlexNetwork Architect V2 and soon-to-be-released HP ASE – FlexNetwork Integrator V1 certification within the HP ExpertOne program.
PREREQUISITES
- HP FlexNetwork Fundamentals or similar experience with HP Comware and Provision switches
AUDIENCE
The Creating HP Software-defined Networks course is suitable for all IT Professionals who want to learn about SDN. The focus of this course is on designing and implementing Software-defined Networks.
WHAT IS NEW?
The Creating HP Software-defined Networks is a new course and is one of the electives in the new HP ASE – FlexNetwork Architect V2 and soon-tobe-released HP ASE – FlexNetwork Integrator V1 certification tracks.
COURSE OBJECTIVES
- Explain what SDN means, from a technical and a business perspective
- Understand how SDN can be integrated in the HP FlexNetwork Architecture through SDN use cases
- Explain and understand how OpenFlow is the open-standard transport mechanism used for making SDN possible
- Understand how OpenFlow enables the separation of the control and data planes
- Understand the difference between OpenFlow 1.0 and 1.3
- Explain and understand how SDN can enhance the network performance, security and simplification, via applications such as Sentinel
- Understand what it takes to transition from traditional networking to Software-defined Networking
- Install and configure the HP VAN SDN Controller
- Understand and configure how the HP VAN SDN controller communicates with different components, both internal and external to the controller, via secure channels
- Explain the HP VAN SDN Controller RESTful API, including information about RSDoc
- Demonstrate how to use a script to make API calls, focusing on application implementation rather than development of applications
- Configure a controller team to provide high availability in a SDN environment
CERTIFICATION(S)
- HP ASE – FlexNetwork Architect V2
EXAM(S)
- HP2-Z31 – Creating HP Software-defined Networks
For more information about HP training programs in Ukraine visit http://www8.hp.com/ua/ru/training/index.html
Configuring HP FlexNetwork Technologies for Comware Devices (H4C87S)

COURSE OVERVIEW
This course introduces network professionals to the basic features of modern networks such as VLANs, redundancy technologies such as MSTP,IRF, link aggregation technologies like LACP, static IP routing, and dynamic routing with OSPF.
COURSE DESCRIPTION
In this course participants will learn how these technologies are implemented in the HP Comware 7 switch platform, and will have opportunities to practice configuring these features, monitor their functionality, and design a solution based on provided criteria. This course also includes an introduction to network management with HP’s Intelligent Management Center (IMC) version 7.
This course is approximately 40 percent lecture and learning activities and 60 percent hands-on lab activities.
PREREQUISITES
- Students should possess experience with networking and common LAN protocols
AUDIENCE
- IT professionals who will deploy and manage networks based on HP Comware products
COURSE OBJECTIVES
- Describe how HP’s FlexNetwork strategy applies to components such as FlexCampus, FlexBranch, FlexManagement, and Software-Defined Networks (SDN)
- Protect devices with local and remote authentication using telnet, SSH, web, and SNMP access
- Navigate the HP Comware CLI and manage the flash file system
- Upgrade the Comware switch operating system
- Configure VLANs on HP Comware switches
- Implement basic routing on directly connected VLANs or links
- Configure a Comware switch for DHCP server and DHCP relay
- Interpret Comware logs
- Understand how different varieties of spanning tree are implemented on Comware switches
- Configure multiple spanning tree and apply STP security features
- Differentiate between static and dynamic link aggregation
- Configure and troubleshoot link aggregation on HP switches
- Identify applications for static and dynamic routing
- Configure single-area OSPF routing
- Understand the basic operation of HP’s Intelligent Resilient Framework (IRF)
- Identify IRF’s advantages when compared with other technologies that manage redundant paths
- Describe how the Multi-Active Detection (MAD) protocol deals with an IRF split stack
- Configure and verify a simple IRF topology
- Identify the components and protocols that support HP’s Intelligent Management Center
- Install IMC and use it to configure and monitor network devices
- Differentiate applications for two- and three-tier network designs
- Identify an appropriate VLAN design based on a given scenario
- Based on a given scenario, choose appropriate link types and redundancy solutions
- Use best practices for IP addressing and OSPF routing when implementing a network design
BENEFITS TO YOU
This course will enhance your knowledge and skills in several areas of networking. You will gain proficiency in using the Comware CLI, including the application of device access security, updating software, and managing the Comware file system.
As a learner you will have sole control of set of equipment that includes four Comware 5900 switches, as well as a server and client.
For more information about HP training programs in Ukraine visit http://www8.hp.com/ua/ru/training/index.html